diff --git a/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_HIGH-baseline-resolved-profile_catalog-min.json b/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_HIGH-baseline-resolved-profile_catalog-min.json index 2b551956..45d90403 100644 --- a/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_HIGH-baseline-resolved-profile_catalog-min.json +++ b/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_HIGH-baseline-resolved-profile_catalog-min.json @@ -1 +1 @@ -{"catalog":{"uuid":"d42ac376-bf01-4baf-bad5-d0b7ee2626d5","metadata":{"title":"NIST Special Publication 800-53 Revision 4 HIGH IMPACT BASELINE","last-modified":"2023-11-02T11:49:45.965719-04:00","version":"2015-01-22","oscal-version":"1.1.1","props":[{"name":"resolution-tool","value":"OSCAL Profile Resolver XSLT Pipeline OPRXP"}],"links":[{"href":"NIST_SP-800-53_rev4_HIGH-baseline_profile.xml","rel":"source-profile"}],"roles":[{"id":"creator","title":"Document Creator"},{"id":"contact","title":"Contact"}],"parties":[{"uuid":"71c97c27-4f09-4d06-a6a4-065a54c19a1f","type":"organization","name":"Joint Task Force, Transformation Initiative","email-addresses":["sec-cert@nist.gov"],"addresses":[{"addr-lines":["National Institute of Standards and Technology","Attn: Computer Security Division","Information Technology Laboratory","100 Bureau Drive (Mail Stop 8930)"],"city":"Gaithersburg","state":"MD","postal-code":"20899-8930"}]}],"responsible-parties":[{"role-id":"creator","party-uuids":["31a5dd8f-978a-4558-8ade-846211607d40"]},{"role-id":"contact","party-uuids":["31a5dd8f-978a-4558-8ade-846211607d40"]}]},"groups":[{"id":"ac","class":"family","title":"Access Control","controls":[{"id":"ac-1","class":"SP800-53","title":"Access Control Policy and Procedures","params":[{"id":"ac-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ac-1_prm_2","label":"organization-defined frequency"},{"id":"ac-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-1"},{"name":"sort-id","value":"ac-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ac-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ac-1_prm_1 }}:","parts":[{"id":"ac-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ac-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the access control policy and associated access controls; and"}]},{"id":"ac-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ac-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Access control policy {{ insert: param, ac-1_prm_2 }}; and"},{"id":"ac-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Access control procedures {{ insert: param, ac-1_prm_3 }}."}]}]},{"id":"ac-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the AC family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ac-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-1.a_obj","name":"objective","props":[{"name":"label","value":"AC-1(a)"}],"parts":[{"id":"ac-1.a.1_obj","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)"}],"parts":[{"id":"ac-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1]"}],"prose":"develops and documents an access control policy that addresses:","parts":[{"id":"ac-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ac-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ac-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ac-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ac-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ac-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ac-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ac-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the access control policy are to be disseminated;"},{"id":"ac-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[3]"}],"prose":"disseminates the access control policy to organization-defined personnel or roles;"}]},{"id":"ac-1.a.2_obj","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)"}],"parts":[{"id":"ac-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the access control policy and associated access control controls;"},{"id":"ac-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ac-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ac-1.b_obj","name":"objective","props":[{"name":"label","value":"AC-1(b)"}],"parts":[{"id":"ac-1.b.1_obj","name":"objective","props":[{"name":"label","value":"AC-1(b)(1)"}],"parts":[{"id":"ac-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current access control policy;"},{"id":"ac-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(b)(1)[2]"}],"prose":"reviews and updates the current access control policy with the organization-defined frequency;"}]},{"id":"ac-1.b.2_obj","name":"objective","props":[{"name":"label","value":"AC-1(b)(2)"}],"parts":[{"id":"ac-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current access control procedures; and"},{"id":"ac-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(b)(2)[2]"}],"prose":"reviews and updates the current access control procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access control responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ac-2","class":"SP800-53","title":"Account Management","params":[{"id":"ac-2_prm_1","label":"organization-defined information system account types"},{"id":"ac-2_prm_2","label":"organization-defined personnel or roles"},{"id":"ac-2_prm_3","label":"organization-defined procedures or conditions"},{"id":"ac-2_prm_4","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-2"},{"name":"sort-id","value":"ac-02"}],"parts":[{"id":"ac-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Identifies and selects the following types of information system accounts to support organizational missions\/business functions: {{ insert: param, ac-2_prm_1 }};"},{"id":"ac-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Assigns account managers for information system accounts;"},{"id":"ac-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Establishes conditions for group and role membership;"},{"id":"ac-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Specifies authorized users of the information system, group and role membership, and access authorizations (i.e., privileges) and other attributes (as required) for each account;"},{"id":"ac-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Requires approvals by {{ insert: param, ac-2_prm_2 }} for requests to create information system accounts;"},{"id":"ac-2_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Creates, enables, modifies, disables, and removes information system accounts in accordance with {{ insert: param, ac-2_prm_3 }};"},{"id":"ac-2_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Monitors the use of information system accounts;"},{"id":"ac-2_smt.h","name":"item","props":[{"name":"label","value":"h."}],"prose":"Notifies account managers:","parts":[{"id":"ac-2_smt.h.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"When accounts are no longer required;"},{"id":"ac-2_smt.h.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"When users are terminated or transferred; and"},{"id":"ac-2_smt.h.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"When individual information system usage or need-to-know changes;"}]},{"id":"ac-2_smt.i","name":"item","props":[{"name":"label","value":"i."}],"prose":"Authorizes access to the information system based on:","parts":[{"id":"ac-2_smt.i.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A valid access authorization;"},{"id":"ac-2_smt.i.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Intended system usage; and"},{"id":"ac-2_smt.i.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Other attributes as required by the organization or associated missions\/business functions;"}]},{"id":"ac-2_smt.j","name":"item","props":[{"name":"label","value":"j."}],"prose":"Reviews accounts for compliance with account management requirements {{ insert: param, ac-2_prm_4 }}; and"},{"id":"ac-2_smt.k","name":"item","props":[{"name":"label","value":"k."}],"prose":"Establishes a process for reissuing shared\/group account credentials (if deployed) when individuals are removed from the group."}]},{"id":"ac-2_gdn","name":"guidance","prose":"Information system account types include, for example, individual, shared, group, system, guest\/anonymous, emergency, developer\/manufacturer\/vendor, temporary, and service. Some of the account management requirements listed above can be implemented by organizational information systems. The identification of authorized users of the information system and the specification of access privileges reflects the requirements in other security controls in the security plan. Users requiring administrative privileges on information system accounts receive additional scrutiny by appropriate organizational personnel (e.g., system owner, mission\/business owner, or chief information security officer) responsible for approving such accounts and privileged access. Organizations may choose to define access privileges or other attributes by account, by type of account, or a combination of both. Other attributes required for authorizing access include, for example, restrictions on time-of-day, day-of-week, and point-of-origin. In defining other account attributes, organizations consider system-related requirements (e.g., scheduled maintenance, system upgrades) and mission\/business requirements, (e.g., time zone differences, customer requirements, remote access to support travel requirements). Failure to consider these factors could affect information system availability. Temporary and emergency accounts are accounts intended for short-term use. Organizations establish temporary accounts as a part of normal account activation procedures when there is a need for short-term accounts without the demand for immediacy in account activation. Organizations establish emergency accounts in response to crisis situations and with the need for rapid account activation. Therefore, emergency account activation may bypass normal account authorization processes. Emergency and temporary accounts are not to be confused with infrequently used accounts (e.g., local logon accounts used for special tasks defined by organizations or when network resources are unavailable). Such accounts remain available and are not subject to automatic disabling or removal dates. Conditions for disabling or deactivating accounts include, for example: (i) when shared\/group, emergency, or temporary accounts are no longer required; or (ii) when individuals are transferred or terminated. Some types of information system accounts may require specialized training.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-5","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-10","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ma-3","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"ac-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-2.a_obj","name":"objective","props":[{"name":"label","value":"AC-2(a)"}],"parts":[{"id":"ac-2.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(a)[1]"}],"prose":"defines information system account types to be identified and selected to support organizational missions\/business functions;"},{"id":"ac-2.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(a)[2]"}],"prose":"identifies and selects organization-defined information system account types to support organizational missions\/business functions;"}]},{"id":"ac-2.b_obj","name":"objective","props":[{"name":"label","value":"AC-2(b)"}],"prose":"assigns account managers for information system accounts;"},{"id":"ac-2.c_obj","name":"objective","props":[{"name":"label","value":"AC-2(c)"}],"prose":"establishes conditions for group and role membership;"},{"id":"ac-2.d_obj","name":"objective","props":[{"name":"label","value":"AC-2(d)"}],"prose":"specifies for each account (as required):","parts":[{"id":"ac-2.d_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(d)[1]"}],"prose":"authorized users of the information system;"},{"id":"ac-2.d_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(d)[2]"}],"prose":"group and role membership;"},{"id":"ac-2.d_obj.3","name":"objective","props":[{"name":"label","value":"AC-2(d)[3]"}],"prose":"access authorizations (i.e., privileges);"},{"id":"ac-2.d_obj.4","name":"objective","props":[{"name":"label","value":"AC-2(d)[4]"}],"prose":"other attributes;"}]},{"id":"ac-2.e_obj","name":"objective","props":[{"name":"label","value":"AC-2(e)"}],"parts":[{"id":"ac-2.e_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(e)[1]"}],"prose":"defines personnel or roles required to approve requests to create information system accounts;"},{"id":"ac-2.e_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(e)[2]"}],"prose":"requires approvals by organization-defined personnel or roles for requests to create information system accounts;"}]},{"id":"ac-2.f_obj","name":"objective","props":[{"name":"label","value":"AC-2(f)"}],"parts":[{"id":"ac-2.f_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(f)[1]"}],"prose":"defines procedures or conditions to:","parts":[{"id":"ac-2.f_obj.1.a","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][a]"}],"prose":"create information system accounts;"},{"id":"ac-2.f_obj.1.b","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][b]"}],"prose":"enable information system accounts;"},{"id":"ac-2.f_obj.1.c","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][c]"}],"prose":"modify information system accounts;"},{"id":"ac-2.f_obj.1.d","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][d]"}],"prose":"disable information system accounts;"},{"id":"ac-2.f_obj.1.e","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][e]"}],"prose":"remove information system accounts;"}]},{"id":"ac-2.f_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(f)[2]"}],"prose":"in accordance with organization-defined procedures or conditions:","parts":[{"id":"ac-2.f_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][a]"}],"prose":"creates information system accounts;"},{"id":"ac-2.f_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][b]"}],"prose":"enables information system accounts;"},{"id":"ac-2.f_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][c]"}],"prose":"modifies information system accounts;"},{"id":"ac-2.f_obj.2.d","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][d]"}],"prose":"disables information system accounts;"},{"id":"ac-2.f_obj.2.e","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][e]"}],"prose":"removes information system accounts;"}]}]},{"id":"ac-2.g_obj","name":"objective","props":[{"name":"label","value":"AC-2(g)"}],"prose":"monitors the use of information system accounts;"},{"id":"ac-2.h_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)"}],"prose":"notifies account managers:","parts":[{"id":"ac-2.h.1_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)(1)"}],"prose":"when accounts are no longer required;"},{"id":"ac-2.h.2_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)(2)"}],"prose":"when users are terminated or transferred;"},{"id":"ac-2.h.3_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)(3)"}],"prose":"when individual information system usage or need to know changes;"}]},{"id":"ac-2.i_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)"}],"prose":"authorizes access to the information system based on;","parts":[{"id":"ac-2.i.1_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)(1)"}],"prose":"a valid access authorization;"},{"id":"ac-2.i.2_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)(2)"}],"prose":"intended system usage;"},{"id":"ac-2.i.3_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)(3)"}],"prose":"other attributes as required by the organization or associated missions\/business functions;"}]},{"id":"ac-2.j_obj","name":"objective","props":[{"name":"label","value":"AC-2(j)"}],"parts":[{"id":"ac-2.j_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(j)[1]"}],"prose":"defines the frequency to review accounts for compliance with account management requirements;"},{"id":"ac-2.j_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(j)[2]"}],"prose":"reviews accounts for compliance with account management requirements with the organization-defined frequency; and"}]},{"id":"ac-2.k_obj","name":"objective","props":[{"name":"label","value":"AC-2(k)"}],"prose":"establishes a process for reissuing shared\/group account credentials (if deployed) when individuals are removed from the group."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of active system accounts along with the name of the individual associated with each account\n\nlist of conditions for group and role membership\n\nnotifications or records of recently transferred, separated, or terminated employees\n\nlist of recently disabled information system accounts along with the name of the individual associated with each account\n\naccess authorization records\n\naccount management compliance reviews\n\ninformation system monitoring records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes account management on the information system\n\nautomated mechanisms for implementing account management"}]}],"controls":[{"id":"ac-2.1","class":"SP800-53-enhancement","title":"Automated System Account Management","props":[{"name":"label","value":"AC-2(1)"},{"name":"sort-id","value":"ac-02.01"}],"parts":[{"id":"ac-2.1_smt","name":"statement","prose":"The organization employs automated mechanisms to support the management of information system accounts."},{"id":"ac-2.1_gdn","name":"guidance","prose":"The use of automated mechanisms can include, for example: using email or text messaging to automatically notify account managers when users are terminated or transferred; using the information system to monitor account usage; and using telephonic notification to report atypical system account usage."},{"id":"ac-2.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to support the management of information system accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]},{"id":"ac-2.2","class":"SP800-53-enhancement","title":"Removal of Temporary \/ Emergency Accounts","params":[{"id":"ac-2.2_prm_1","select":{"choice":["removes","disables"]}},{"id":"ac-2.2_prm_2","label":"organization-defined time period for each type of account"}],"props":[{"name":"label","value":"AC-2(2)"},{"name":"sort-id","value":"ac-02.02"}],"parts":[{"id":"ac-2.2_smt","name":"statement","prose":"The information system automatically {{ insert: param, ac-2.2_prm_1 }} temporary and emergency accounts after {{ insert: param, ac-2.2_prm_2 }}."},{"id":"ac-2.2_gdn","name":"guidance","prose":"This control enhancement requires the removal of both temporary and emergency accounts automatically after a predefined period of time has elapsed, rather than at the convenience of the systems administrator."},{"id":"ac-2.2_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-2.2_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(2)[1]"}],"prose":"the organization defines the time period after which the information system automatically removes or disables temporary and emergency accounts; and"},{"id":"ac-2.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(2)[2]"}],"prose":"the information system automatically removes or disables temporary and emergency accounts after the organization-defined time period for each type of account."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system-generated list of temporary accounts removed and\/or disabled\n\ninformation system-generated list of emergency accounts removed and\/or disabled\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]},{"id":"ac-2.3","class":"SP800-53-enhancement","title":"Disable Inactive Accounts","params":[{"id":"ac-2.3_prm_1","label":"organization-defined time period"}],"props":[{"name":"label","value":"AC-2(3)"},{"name":"sort-id","value":"ac-02.03"}],"parts":[{"id":"ac-2.3_smt","name":"statement","prose":"The information system automatically disables inactive accounts after {{ insert: param, ac-2.3_prm_1 }}."},{"id":"ac-2.3_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-2.3_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(3)[1]"}],"prose":"the organization defines the time period after which the information system automatically disables inactive accounts; and"},{"id":"ac-2.3_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(3)[2]"}],"prose":"the information system automatically disables inactive accounts after the organization-defined time period."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system-generated list of temporary accounts removed and\/or disabled\n\ninformation system-generated list of emergency accounts removed and\/or disabled\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]},{"id":"ac-2.4","class":"SP800-53-enhancement","title":"Automated Audit Actions","params":[{"id":"ac-2.4_prm_1","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"AC-2(4)"},{"name":"sort-id","value":"ac-02.04"}],"parts":[{"id":"ac-2.4_smt","name":"statement","prose":"The information system automatically audits account creation, modification, enabling, disabling, and removal actions, and notifies {{ insert: param, ac-2.4_prm_1 }}."},{"id":"ac-2.4_gdn","name":"guidance","links":[{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"}]},{"id":"ac-2.4_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-2.4_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(4)[1]"}],"prose":"the information system automatically audits the following account actions:","parts":[{"id":"ac-2.4_obj.1.a","name":"objective","props":[{"name":"label","value":"AC-2(4)[1][a]"}],"prose":"creation;"},{"id":"ac-2.4_obj.1.b","name":"objective","props":[{"name":"label","value":"AC-2(4)[1][b]"}],"prose":"modification;"},{"id":"ac-2.4_obj.1.c","name":"objective","props":[{"name":"label","value":"AC-2(4)[1][c]"}],"prose":"enabling;"},{"id":"ac-2.4_obj.1.d","name":"objective","props":[{"name":"label","value":"AC-2(4)[1][d]"}],"prose":"disabling;"},{"id":"ac-2.4_obj.1.e","name":"objective","props":[{"name":"label","value":"AC-2(4)[1][e]"}],"prose":"removal;"}]},{"id":"ac-2.4_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(4)[2]"}],"prose":"the organization defines personnel or roles to be notified of the following account actions:","parts":[{"id":"ac-2.4_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-2(4)[2][a]"}],"prose":"creation;"},{"id":"ac-2.4_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-2(4)[2][b]"}],"prose":"modification;"},{"id":"ac-2.4_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-2(4)[2][c]"}],"prose":"enabling;"},{"id":"ac-2.4_obj.2.d","name":"objective","props":[{"name":"label","value":"AC-2(4)[2][d]"}],"prose":"disabling;"},{"id":"ac-2.4_obj.2.e","name":"objective","props":[{"name":"label","value":"AC-2(4)[2][e]"}],"prose":"removal;"}]},{"id":"ac-2.4_obj.3","name":"objective","props":[{"name":"label","value":"AC-2(4)[3]"}],"prose":"the information system notifies organization-defined personnel or roles of the following account actions:","parts":[{"id":"ac-2.4_obj.3.a","name":"objective","props":[{"name":"label","value":"AC-2(4)[3][a]"}],"prose":"creation;"},{"id":"ac-2.4_obj.3.b","name":"objective","props":[{"name":"label","value":"AC-2(4)[3][b]"}],"prose":"modification;"},{"id":"ac-2.4_obj.3.c","name":"objective","props":[{"name":"label","value":"AC-2(4)[3][c]"}],"prose":"enabling;"},{"id":"ac-2.4_obj.3.d","name":"objective","props":[{"name":"label","value":"AC-2(4)[3][d]"}],"prose":"disabling; and"},{"id":"ac-2.4_obj.3.e","name":"objective","props":[{"name":"label","value":"AC-2(4)[3][e]"}],"prose":"removal."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nnotifications\/alerts of account creation, modification, enabling, disabling, and removal actions\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]},{"id":"ac-2.5","class":"SP800-53-enhancement","title":"Inactivity Logout","params":[{"id":"ac-2.5_prm_1","label":"organization-defined time-period of expected inactivity or description of when to log out"}],"props":[{"name":"label","value":"AC-2(5)"},{"name":"sort-id","value":"ac-02.05"}],"parts":[{"id":"ac-2.5_smt","name":"statement","prose":"The organization requires that users log out when {{ insert: param, ac-2.5_prm_1 }}."},{"id":"ac-2.5_gdn","name":"guidance","links":[{"href":"#sc-23","rel":"related"}]},{"id":"ac-2.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-2.5_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(5)[1]"}],"prose":"defines either the time period of expected inactivity that requires users to log out or the description of when users are required to log out; and"},{"id":"ac-2.5_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(5)[2]"}],"prose":"requires that users log out when the organization-defined time period of inactivity is reached or in accordance with organization-defined description of when to log out."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity violation reports\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nusers that must comply with inactivity logout policy"}]}]},{"id":"ac-2.11","class":"SP800-53-enhancement","title":"Usage Conditions","params":[{"id":"ac-2.11_prm_1","label":"organization-defined circumstances and\/or usage conditions"},{"id":"ac-2.11_prm_2","label":"organization-defined information system accounts"}],"props":[{"name":"label","value":"AC-2(11)"},{"name":"sort-id","value":"ac-02.11"}],"parts":[{"id":"ac-2.11_smt","name":"statement","prose":"The information system enforces {{ insert: param, ac-2.11_prm_1 }} for {{ insert: param, ac-2.11_prm_2 }}."},{"id":"ac-2.11_gdn","name":"guidance","prose":"Organizations can describe the specific conditions or circumstances under which information system accounts can be used, for example, by restricting usage to certain days of the week, time of day, or specific durations of time."},{"id":"ac-2.11_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-2.11_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(11)[1]"}],"prose":"the organization defines circumstances and\/or usage conditions to be enforced for information system accounts;"},{"id":"ac-2.11_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(11)[2]"}],"prose":"the organization defines information system accounts for which organization-defined circumstances and\/or usage conditions are to be enforced; and"},{"id":"ac-2.11_obj.3","name":"objective","props":[{"name":"label","value":"AC-2(11)[3]"}],"prose":"the information system enforces organization-defined circumstances and\/or usage conditions for organization-defined information system accounts."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsystem-generated list of information system accounts and associated assignments of usage circumstances and\/or usage conditions\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]},{"id":"ac-2.12","class":"SP800-53-enhancement","title":"Account Monitoring \/ Atypical Usage","params":[{"id":"ac-2.12_prm_1","label":"organization-defined atypical usage"},{"id":"ac-2.12_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"AC-2(12)"},{"name":"sort-id","value":"ac-02.12"}],"parts":[{"id":"ac-2.12_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-2.12_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Monitors information system accounts for {{ insert: param, ac-2.12_prm_1 }}; and"},{"id":"ac-2.12_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Reports atypical usage of information system accounts to {{ insert: param, ac-2.12_prm_2 }}."}]},{"id":"ac-2.12_gdn","name":"guidance","prose":"Atypical usage includes, for example, accessing information systems at certain times of the day and from locations that are not consistent with the normal usage patterns of individuals working in organizations.","links":[{"href":"#ca-7","rel":"related"}]},{"id":"ac-2.12_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-2.12.a_obj","name":"objective","props":[{"name":"label","value":"AC-2(12)(a)"}],"parts":[{"id":"ac-2.12.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(12)(a)[1]"}],"prose":"defines atypical usage to be monitored for information system accounts;"},{"id":"ac-2.12.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(12)(a)[2]"}],"prose":"monitors information system accounts for organization-defined atypical usage;"}],"links":[{"href":"#ac-2.12_smt.a","rel":"corresp"}]},{"id":"ac-2.12.b_obj","name":"objective","props":[{"name":"label","value":"AC-2(12)(b)"}],"parts":[{"id":"ac-2.12.b_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(12)(b)[1]"}],"prose":"defines personnel or roles to whom atypical usage of information system accounts are to be reported; and"},{"id":"ac-2.12.b_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(12)(b)[2]"}],"prose":"reports atypical usage of information system accounts to organization-defined personnel or roles."}],"links":[{"href":"#ac-2.12_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system monitoring records\n\ninformation system audit records\n\naudit tracking and monitoring reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]},{"id":"ac-2.13","class":"SP800-53-enhancement","title":"Disable Accounts for High-risk Individuals","params":[{"id":"ac-2.13_prm_1","label":"organization-defined time period"}],"props":[{"name":"label","value":"AC-2(13)"},{"name":"sort-id","value":"ac-02.13"}],"parts":[{"id":"ac-2.13_smt","name":"statement","prose":"The organization disables accounts of users posing a significant risk within {{ insert: param, ac-2.13_prm_1 }} of discovery of the risk."},{"id":"ac-2.13_gdn","name":"guidance","prose":"Users posing a significant risk to organizations include individuals for whom reliable evidence or intelligence indicates either the intention to use authorized access to information systems to cause harm or through whom adversaries will cause harm. Harm includes potential adverse impacts to organizational operations and assets, individuals, other organizations, or the Nation. Close coordination between authorizing officials, information system administrators, and human resource managers is essential in order for timely execution of this control enhancement.","links":[{"href":"#ps-4","rel":"related"}]},{"id":"ac-2.13_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-2.13_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(13)[1]"}],"prose":"defines the time period within which accounts are disabled upon discovery of a significant risk posed by users of such accounts; and"},{"id":"ac-2.13_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(13)[2]"}],"prose":"disables accounts of users posing a significant risk within the organization-defined time period of discovery of the risk."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsystem-generated list of disabled accounts\n\nlist of user activities posing significant organizational risk\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]}]},{"id":"ac-3","class":"SP800-53","title":"Access Enforcement","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-3"},{"name":"sort-id","value":"ac-03"}],"parts":[{"id":"ac-3_smt","name":"statement","prose":"The information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies."},{"id":"ac-3_gdn","name":"guidance","prose":"Access control policies (e.g., identity-based policies, role-based policies, control matrices, cryptography) control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (e.g., devices, files, records, domains) in information systems. In addition to enforcing authorized access at the information system level and recognizing that information systems can host many applications and services in support of organizational missions and business operations, access enforcement mechanisms can also be employed at the application and service level to provide increased information security.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-5","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-16","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ac-21","rel":"related"},{"href":"#ac-22","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ma-3","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#pe-3","rel":"related"}]},{"id":"ac-3_obj","name":"objective","prose":"Determine if the information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing access enforcement\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of approved authorizations (user privileges)\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access enforcement responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing access control policy"}]}]},{"id":"ac-4","class":"SP800-53","title":"Information Flow Enforcement","params":[{"id":"ac-4_prm_1","label":"organization-defined information flow control policies"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-4"},{"name":"sort-id","value":"ac-04"}],"parts":[{"id":"ac-4_smt","name":"statement","prose":"The information system enforces approved authorizations for controlling the flow of information within the system and between interconnected systems based on {{ insert: param, ac-4_prm_1 }}."},{"id":"ac-4_gdn","name":"guidance","prose":"Information flow control regulates where information is allowed to travel within an information system and between information systems (as opposed to who is allowed to access the information) and without explicit regard to subsequent accesses to that information. Flow control restrictions include, for example, keeping export-controlled information from being transmitted in the clear to the Internet, blocking outside traffic that claims to be from within the organization, restricting web requests to the Internet that are not from the internal web proxy server, and limiting information transfers between organizations based on data structures and content. Transferring information between information systems representing different security domains with different security policies introduces risk that such transfers violate one or more domain security policies. In such situations, information owners\/stewards provide guidance at designated policy enforcement points between interconnected systems. Organizations consider mandating specific architectural solutions when required to enforce specific security policies. Enforcement includes, for example: (i) prohibiting information transfers between interconnected systems (i.e., allowing access only); (ii) employing hardware mechanisms to enforce one-way information flows; and (iii) implementing trustworthy regrading mechanisms to reassign security attributes and security labels. Organizations commonly employ information flow control policies and enforcement mechanisms to control the flow of information between designated sources and destinations (e.g., networks, individuals, and devices) within information systems and between interconnected systems. Flow control is based on the characteristics of the information and\/or the information path. Enforcement occurs, for example, in boundary protection devices (e.g., gateways, routers, guards, encrypted tunnels, firewalls) that employ rule sets or establish configuration settings that restrict information system services, provide a packet-filtering capability based on header information, or message-filtering capability based on message content (e.g., implementing key word searches or using document characteristics). Organizations also consider the trustworthiness of filtering\/inspection mechanisms (i.e., hardware, firmware, and software components) that are critical to information flow enforcement. Control enhancements 3 through 22 primarily address cross-domain solution needs which focus on more advanced filtering techniques, in-depth analysis, and stronger flow enforcement mechanisms implemented in cross-domain products, for example, high-assurance guards. Such capabilities are generally not available in commercial off-the-shelf information technology products.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-21","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sc-2","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-18","rel":"related"}]},{"id":"ac-4_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-4_obj.1","name":"objective","props":[{"name":"label","value":"AC-4[1]"}],"prose":"the organization defines information flow control policies to control the flow of information within the system and between interconnected systems; and"},{"id":"ac-4_obj.2","name":"objective","props":[{"name":"label","value":"AC-4[2]"}],"prose":"the information system enforces approved authorizations for controlling the flow of information within the system and between interconnected systems based on organization-defined information flow control policies."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\ninformation flow control policies\n\nprocedures addressing information flow enforcement\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system baseline configuration\n\nlist of information flow authorizations\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information flow enforcement policy"}]}]},{"id":"ac-5","class":"SP800-53","title":"Separation of Duties","params":[{"id":"ac-5_prm_1","label":"organization-defined duties of individuals"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-5"},{"name":"sort-id","value":"ac-05"}],"parts":[{"id":"ac-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Separates {{ insert: param, ac-5_prm_1 }};"},{"id":"ac-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents separation of duties of individuals; and"},{"id":"ac-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Defines information system access authorizations to support separation of duties."}]},{"id":"ac-5_gdn","name":"guidance","prose":"Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes, for example: (i) dividing mission functions and information system support functions among different individuals and\/or roles; (ii) conducting information system support functions with different individuals (e.g., system management, programming, configuration management, quality assurance and testing, and network security); and (iii) ensuring security personnel administering access control functions do not also administer audit functions.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#ps-2","rel":"related"}]},{"id":"ac-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-5.a_obj","name":"objective","props":[{"name":"label","value":"AC-5(a)"}],"parts":[{"id":"ac-5.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-5(a)[1]"}],"prose":"defines duties of individuals to be separated;"},{"id":"ac-5.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-5(a)[2]"}],"prose":"separates organization-defined duties of individuals;"}]},{"id":"ac-5.b_obj","name":"objective","props":[{"name":"label","value":"AC-5(b)"}],"prose":"documents separation of duties; and"},{"id":"ac-5.c_obj","name":"objective","props":[{"name":"label","value":"AC-5(c)"}],"prose":"defines information system access authorizations to support separation of duties."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing divisions of responsibility and separation of duties\n\ninformation system configuration settings and associated documentation\n\nlist of divisions of responsibility and separation of duties\n\ninformation system access authorizations\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining appropriate divisions of responsibility and separation of duties\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing separation of duties policy"}]}]},{"id":"ac-6","class":"SP800-53","title":"Least Privilege","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-6"},{"name":"sort-id","value":"ac-06"}],"parts":[{"id":"ac-6_smt","name":"statement","prose":"The organization employs the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions."},{"id":"ac-6_gdn","name":"guidance","prose":"Organizations employ least privilege for specific duties and information systems. The principle of least privilege is also applied to information system processes, ensuring that the processes operate at privilege levels no higher than necessary to accomplish required organizational missions\/business functions. Organizations consider the creation of additional processes, roles, and information system accounts as necessary, to achieve least privilege. Organizations also apply least privilege to the development, implementation, and operation of organizational information systems.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#pl-2","rel":"related"}]},{"id":"ac-6_obj","name":"objective","prose":"Determine if the organization employs the principle of least privilege, allowing only authorized access for users (and processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\nlist of assigned access authorizations (user privileges)\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions"}]}],"controls":[{"id":"ac-6.1","class":"SP800-53-enhancement","title":"Authorize Access to Security Functions","params":[{"id":"ac-6.1_prm_1","label":"organization-defined security functions (deployed in hardware, software, and firmware) and security-relevant information"}],"props":[{"name":"label","value":"AC-6(1)"},{"name":"sort-id","value":"ac-06.01"}],"parts":[{"id":"ac-6.1_smt","name":"statement","prose":"The organization explicitly authorizes access to {{ insert: param, ac-6.1_prm_1 }}."},{"id":"ac-6.1_gdn","name":"guidance","prose":"Security functions include, for example, establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters. Security-relevant information includes, for example, filtering rules for routers\/firewalls, cryptographic key management information, configuration parameters for security services, and access control lists. Explicitly authorized personnel include, for example, security administrators, system and network administrators, system security officers, system maintenance personnel, system programmers, and other privileged users.","links":[{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"}]},{"id":"ac-6.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-6.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-6(1)[1]"}],"prose":"defines security-relevant information for which access must be explicitly authorized;"},{"id":"ac-6.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-6(1)[2]"}],"prose":"defines security functions deployed in:","parts":[{"id":"ac-6.1_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-6(1)[2][a]"}],"prose":"hardware;"},{"id":"ac-6.1_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-6(1)[2][b]"}],"prose":"software;"},{"id":"ac-6.1_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-6(1)[2][c]"}],"prose":"firmware;"}]},{"id":"ac-6.1_obj.3","name":"objective","props":[{"name":"label","value":"AC-6(1)[3]"}],"prose":"explicitly authorizes access to:","parts":[{"id":"ac-6.1_obj.3.a","name":"objective","props":[{"name":"label","value":"AC-6(1)[3][a]"}],"prose":"organization-defined security functions; and"},{"id":"ac-6.1_obj.3.b","name":"objective","props":[{"name":"label","value":"AC-6(1)[3][b]"}],"prose":"security-relevant information."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\nlist of security functions (deployed in hardware, software, and firmware) and security-relevant information for which access must be explicitly authorized\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions"}]}]},{"id":"ac-6.2","class":"SP800-53-enhancement","title":"Non-privileged Access for Nonsecurity Functions","params":[{"id":"ac-6.2_prm_1","label":"organization-defined security functions or security-relevant information"}],"props":[{"name":"label","value":"AC-6(2)"},{"name":"sort-id","value":"ac-06.02"}],"parts":[{"id":"ac-6.2_smt","name":"statement","prose":"The organization requires that users of information system accounts, or roles, with access to {{ insert: param, ac-6.2_prm_1 }}, use non-privileged accounts or roles, when accessing nonsecurity functions."},{"id":"ac-6.2_gdn","name":"guidance","prose":"This control enhancement limits exposure when operating from within privileged accounts or roles. The inclusion of roles addresses situations where organizations implement access control policies such as role-based access control and where a change of role provides the same degree of assurance in the change of access authorizations for both the user and all processes acting on behalf of the user as would be provided by a change between a privileged and non-privileged account.","links":[{"href":"#pl-4","rel":"related"}]},{"id":"ac-6.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-6.2_obj.1","name":"objective","props":[{"name":"label","value":"AC-6(2)[1]"}],"prose":"defines security functions or security-relevant information to which users of information system accounts, or roles, have access; and"},{"id":"ac-6.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-6(2)[2]"}],"prose":"requires that users of information system accounts, or roles, with access to organization-defined security functions or security-relevant information, use non-privileged accounts, or roles, when accessing nonsecurity functions."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\nlist of system-generated security functions or security-relevant information assigned to information system accounts or roles\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions"}]}]},{"id":"ac-6.3","class":"SP800-53-enhancement","title":"Network Access to Privileged Commands","params":[{"id":"ac-6.3_prm_1","label":"organization-defined privileged commands"},{"id":"ac-6.3_prm_2","label":"organization-defined compelling operational needs"}],"props":[{"name":"label","value":"AC-6(3)"},{"name":"sort-id","value":"ac-06.03"}],"parts":[{"id":"ac-6.3_smt","name":"statement","prose":"The organization authorizes network access to {{ insert: param, ac-6.3_prm_1 }} only for {{ insert: param, ac-6.3_prm_2 }} and documents the rationale for such access in the security plan for the information system."},{"id":"ac-6.3_gdn","name":"guidance","prose":"Network access is any access across a network connection in lieu of local access (i.e., user being physically present at the device).","links":[{"href":"#ac-17","rel":"related"}]},{"id":"ac-6.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-6.3_obj.1","name":"objective","props":[{"name":"label","value":"AC-6(3)[1]"}],"prose":"defines privileged commands to which network access is to be authorized only for compelling operational needs;"},{"id":"ac-6.3_obj.2","name":"objective","props":[{"name":"label","value":"AC-6(3)[2]"}],"prose":"defines compelling operational needs for which network access to organization-defined privileged commands are to be solely authorized;"},{"id":"ac-6.3_obj.3","name":"objective","props":[{"name":"label","value":"AC-6(3)[3]"}],"prose":"authorizes network access to organization-defined privileged commands only for organization-defined compelling operational needs; and"},{"id":"ac-6.3_obj.4","name":"objective","props":[{"name":"label","value":"AC-6(3)[4]"}],"prose":"documents the rationale for authorized network access to organization-defined privileged commands in the security plan for the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of operational needs for authorizing network access to privileged commands\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions"}]}]},{"id":"ac-6.5","class":"SP800-53-enhancement","title":"Privileged Accounts","params":[{"id":"ac-6.5_prm_1","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"AC-6(5)"},{"name":"sort-id","value":"ac-06.05"}],"parts":[{"id":"ac-6.5_smt","name":"statement","prose":"The organization restricts privileged accounts on the information system to {{ insert: param, ac-6.5_prm_1 }}."},{"id":"ac-6.5_gdn","name":"guidance","prose":"Privileged accounts, including super user accounts, are typically described as system administrator for various types of commercial off-the-shelf operating systems. Restricting privileged accounts to specific personnel or roles prevents day-to-day users from having access to privileged information\/functions. Organizations may differentiate in the application of this control enhancement between allowed privileges for local accounts and for domain accounts provided organizations retain the ability to control information system configurations for key security parameters and as otherwise necessary to sufficiently mitigate risk.","links":[{"href":"#cm-6","rel":"related"}]},{"id":"ac-6.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-6.5_obj.1","name":"objective","props":[{"name":"label","value":"AC-6(5)[1]"}],"prose":"defines personnel or roles for which privileged accounts on the information system are to be restricted; and"},{"id":"ac-6.5_obj.2","name":"objective","props":[{"name":"label","value":"AC-6(5)[2]"}],"prose":"restricts privileged accounts on the information system to organization-defined personnel or roles."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\nlist of system-generated privileged accounts\n\nlist of system administration personnel\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions"}]}]},{"id":"ac-6.9","class":"SP800-53-enhancement","title":"Auditing Use of Privileged Functions","props":[{"name":"label","value":"AC-6(9)"},{"name":"sort-id","value":"ac-06.09"}],"parts":[{"id":"ac-6.9_smt","name":"statement","prose":"The information system audits the execution of privileged functions."},{"id":"ac-6.9_gdn","name":"guidance","prose":"Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and ongoing concern and can have significant adverse impacts on organizations. Auditing the use of privileged functions is one way to detect such misuse, and in doing so, help mitigate the risk from insider threats and the advanced persistent threat (APT).","links":[{"href":"#au-2","rel":"related"}]},{"id":"ac-6.9_obj","name":"objective","prose":"Determine if the information system audits the execution of privileged functions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of privileged functions to be audited\n\nlist of audited events\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for reviewing least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms auditing the execution of least privilege functions"}]}]},{"id":"ac-6.10","class":"SP800-53-enhancement","title":"Prohibit Non-privileged Users from Executing Privileged Functions","props":[{"name":"label","value":"AC-6(10)"},{"name":"sort-id","value":"ac-06.10"}],"parts":[{"id":"ac-6.10_smt","name":"statement","prose":"The information system prevents non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards\/countermeasures."},{"id":"ac-6.10_gdn","name":"guidance","prose":"Privileged functions include, for example, establishing information system accounts, performing system integrity checks, or administering cryptographic key management activities. Non-privileged users are individuals that do not possess appropriate authorizations. Circumventing intrusion detection and prevention mechanisms or malicious code protection mechanisms are examples of privileged functions that require protection from non-privileged users."},{"id":"ac-6.10_obj","name":"objective","prose":"Determine if the information system prevents non-privileged users from executing privileged functions to include:","parts":[{"id":"ac-6.10_obj.1","name":"objective","props":[{"name":"label","value":"AC-6(10)[1]"}],"prose":"disabling implemented security safeguards\/countermeasures;"},{"id":"ac-6.10_obj.2","name":"objective","props":[{"name":"label","value":"AC-6(10)[2]"}],"prose":"circumventing security safeguards\/countermeasures; or"},{"id":"ac-6.10_obj.3","name":"objective","props":[{"name":"label","value":"AC-6(10)[3]"}],"prose":"altering implemented security safeguards\/countermeasures."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of privileged functions and associated user account assignments\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions for non-privileged users"}]}]}]},{"id":"ac-7","class":"SP800-53","title":"Unsuccessful Logon Attempts","params":[{"id":"ac-7_prm_1","label":"organization-defined number"},{"id":"ac-7_prm_2","label":"organization-defined time period"},{"id":"ac-7_prm_3","select":{"choice":["locks the account\/node for an {{ insert: param, ac-7_prm_4 }} ","locks the account\/node until released by an administrator","delays next logon prompt according to {{ insert: param, ac-7_prm_5 }} "]}},{"id":"ac-7_prm_4","depends-on":"ac-7_prm_3","label":"organization-defined time period"},{"id":"ac-7_prm_5","depends-on":"ac-7_prm_3","label":"organization-defined delay algorithm"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"AC-7"},{"name":"sort-id","value":"ac-07"}],"parts":[{"id":"ac-7_smt","name":"statement","prose":"The information system:","parts":[{"id":"ac-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Enforces a limit of {{ insert: param, ac-7_prm_1 }} consecutive invalid logon attempts by a user during a {{ insert: param, ac-7_prm_2 }}; and"},{"id":"ac-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Automatically {{ insert: param, ac-7_prm_3 }} when the maximum number of unsuccessful attempts is exceeded."}]},{"id":"ac-7_gdn","name":"guidance","prose":"This control applies regardless of whether the logon occurs via a local or network connection. Due to the potential for denial of service, automatic lockouts initiated by information systems are usually temporary and automatically release after a predetermined time period established by organizations. If a delay algorithm is selected, organizations may choose to employ different algorithms for different information system components based on the capabilities of those components. Responses to unsuccessful logon attempts may be implemented at both the operating system and the application levels.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-9","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ia-5","rel":"related"}]},{"id":"ac-7_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-7.a_obj","name":"objective","props":[{"name":"label","value":"AC-7(a)"}],"parts":[{"id":"ac-7.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-7(a)[1]"}],"prose":"the organization defines the number of consecutive invalid logon attempts allowed to the information system by a user during an organization-defined time period;"},{"id":"ac-7.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-7(a)[2]"}],"prose":"the organization defines the time period allowed by a user of the information system for an organization-defined number of consecutive invalid logon attempts;"},{"id":"ac-7.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-7(a)[3]"}],"prose":"the information system enforces a limit of organization-defined number of consecutive invalid logon attempts by a user during an organization-defined time period;"}]},{"id":"ac-7.b_obj","name":"objective","props":[{"name":"label","value":"AC-7(b)"}],"parts":[{"id":"ac-7.b_obj.1","name":"objective","props":[{"name":"label","value":"AC-7(b)[1]"}],"prose":"the organization defines account\/node lockout time period or logon delay algorithm to be automatically enforced by the information system when the maximum number of unsuccessful logon attempts is exceeded;"},{"id":"ac-7.b_obj.2","name":"objective","props":[{"name":"label","value":"AC-7(b)[2]"}],"prose":"the information system, when the maximum number of unsuccessful logon attempts is exceeded, automatically:","parts":[{"id":"ac-7.b_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-7(b)[2][a]"}],"prose":"locks the account\/node for the organization-defined time period;"},{"id":"ac-7.b_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-7(b)[2][b]"}],"prose":"locks the account\/node until released by an administrator; or"},{"id":"ac-7.b_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-7(b)[2][c]"}],"prose":"delays next logon prompt according to the organization-defined delay algorithm."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing unsuccessful logon attempts\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem developers\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing access control policy for unsuccessful logon attempts"}]}]},{"id":"ac-8","class":"SP800-53","title":"System Use Notification","params":[{"id":"ac-8_prm_1","label":"organization-defined system use notification message or banner"},{"id":"ac-8_prm_2","label":"organization-defined conditions"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-8"},{"name":"sort-id","value":"ac-08"}],"parts":[{"id":"ac-8_smt","name":"statement","prose":"The information system:","parts":[{"id":"ac-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Displays to users {{ insert: param, ac-8_prm_1 }} before granting access to the system that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance and states that:","parts":[{"id":"ac-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Users are accessing a U.S. Government information system;"},{"id":"ac-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Information system usage may be monitored, recorded, and subject to audit;"},{"id":"ac-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Unauthorized use of the information system is prohibited and subject to criminal and civil penalties; and"},{"id":"ac-8_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Use of the information system indicates consent to monitoring and recording;"}]},{"id":"ac-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Retains the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the information system; and"},{"id":"ac-8_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"For publicly accessible systems:","parts":[{"id":"ac-8_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Displays system use information {{ insert: param, ac-8_prm_2 }}, before granting further access;"},{"id":"ac-8_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Displays references, if any, to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities; and"},{"id":"ac-8_smt.c.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Includes a description of the authorized uses of the system."}]}]},{"id":"ac-8_gdn","name":"guidance","prose":"System use notifications can be implemented using messages or warning banners displayed before individuals log in to information systems. System use notifications are used only for access via logon interfaces with human users and are not required when such human interfaces do not exist. Organizations consider system use notification messages\/banners displayed in multiple languages based on specific organizational needs and the demographics of information system users. Organizations also consult with the Office of the General Counsel for legal review and approval of warning banner content."},{"id":"ac-8_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-8.a_obj","name":"objective","props":[{"name":"label","value":"AC-8(a)"}],"parts":[{"id":"ac-8.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-8(a)[1]"}],"prose":"the organization defines a system use notification message or banner to be displayed by the information system to users before granting access to the system;"},{"id":"ac-8.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2]"}],"prose":"the information system displays to users the organization-defined system use notification message or banner before granting access to the information system that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance, and states that:","parts":[{"id":"ac-8.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](1)"}],"prose":"users are accessing a U.S. Government information system;"},{"id":"ac-8.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](2)"}],"prose":"information system usage may be monitored, recorded, and subject to audit;"},{"id":"ac-8.a.3_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](3)"}],"prose":"unauthorized use of the information system is prohibited and subject to criminal and civil penalties;"},{"id":"ac-8.a.4_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](4)"}],"prose":"use of the information system indicates consent to monitoring and recording;"}]}]},{"id":"ac-8.b_obj","name":"objective","props":[{"name":"label","value":"AC-8(b)"}],"prose":"the information system retains the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the information system;"},{"id":"ac-8.c_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)"}],"prose":"for publicly accessible systems:","parts":[{"id":"ac-8.c.1_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)(1)"}],"parts":[{"id":"ac-8.c.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-8(c)(1)[1]"}],"prose":"the organization defines conditions for system use to be displayed by the information system before granting further access;"},{"id":"ac-8.c.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(c)(1)[2]"}],"prose":"the information system displays organization-defined conditions before granting further access;"}]},{"id":"ac-8.c.2_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)(2)"}],"prose":"the information system displays references, if any, to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities; and"},{"id":"ac-8.c.3_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)(3)"}],"prose":"the information system includes a description of the authorized uses of the system."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprivacy and security policies, procedures addressing system use notification\n\ndocumented approval of information system use notification messages or banners\n\ninformation system audit records\n\nuser acknowledgements of notification message or banner\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system use notification messages\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibility for providing legal advice\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing system use notification"}]}]},{"id":"ac-10","class":"SP800-53","title":"Concurrent Session Control","params":[{"id":"ac-10_prm_1","label":"organization-defined account and\/or account type"},{"id":"ac-10_prm_2","label":"organization-defined number"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AC-10"},{"name":"sort-id","value":"ac-10"}],"parts":[{"id":"ac-10_smt","name":"statement","prose":"The information system limits the number of concurrent sessions for each {{ insert: param, ac-10_prm_1 }} to {{ insert: param, ac-10_prm_2 }}."},{"id":"ac-10_gdn","name":"guidance","prose":"Organizations may define the maximum number of concurrent sessions for information system accounts globally, by account type (e.g., privileged user, non-privileged user, domain, specific application), by account, or a combination. For example, organizations may limit the number of concurrent sessions for system administrators or individuals working in particularly sensitive domains or mission-critical applications. This control addresses concurrent sessions for information system accounts and does not address concurrent sessions by single users via multiple system accounts."},{"id":"ac-10_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-10_obj.1","name":"objective","props":[{"name":"label","value":"AC-10[1]"}],"prose":"the organization defines account and\/or account types for the information system;"},{"id":"ac-10_obj.2","name":"objective","props":[{"name":"label","value":"AC-10[2]"}],"prose":"the organization defines the number of concurrent sessions to be allowed for each organization-defined account and\/or account type; and"},{"id":"ac-10_obj.3","name":"objective","props":[{"name":"label","value":"AC-10[3]"}],"prose":"the information system limits the number of concurrent sessions for each organization-defined account and\/or account type to the organization-defined number of concurrent sessions allowed."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing concurrent session control\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing access control policy for concurrent session control"}]}]},{"id":"ac-11","class":"SP800-53","title":"Session Lock","params":[{"id":"ac-11_prm_1","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AC-11"},{"name":"sort-id","value":"ac-11"}],"links":[{"href":"#4da24a96-6cf8-435d-9d1f-c73247cad109","rel":"reference"}],"parts":[{"id":"ac-11_smt","name":"statement","prose":"The information system:","parts":[{"id":"ac-11_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Prevents further access to the system by initiating a session lock after {{ insert: param, ac-11_prm_1 }} of inactivity or upon receiving a request from a user; and"},{"id":"ac-11_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Retains the session lock until the user reestablishes access using established identification and authentication procedures."}]},{"id":"ac-11_gdn","name":"guidance","prose":"Session locks are temporary actions taken when users stop work and move away from the immediate vicinity of information systems but do not want to log out because of the temporary nature of their absences. Session locks are implemented where session activities can be determined. This is typically at the operating system level, but can also be at the application level. Session locks are not an acceptable substitute for logging out of information systems, for example, if organizations require users to log out at the end of workdays.","links":[{"href":"#ac-7","rel":"related"}]},{"id":"ac-11_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-11.a_obj","name":"objective","props":[{"name":"label","value":"AC-11(a)"}],"parts":[{"id":"ac-11.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-11(a)[1]"}],"prose":"the organization defines the time period of user inactivity after which the information system initiates a session lock;"},{"id":"ac-11.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-11(a)[2]"}],"prose":"the information system prevents further access to the system by initiating a session lock after organization-defined time period of user inactivity or upon receiving a request from a user; and"}]},{"id":"ac-11.b_obj","name":"objective","props":[{"name":"label","value":"AC-11(b)"}],"prose":"the information system retains the session lock until the user reestablishes access using established identification and authentication procedures."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing session lock\n\nprocedures addressing identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing access control policy for session lock"}]}],"controls":[{"id":"ac-11.1","class":"SP800-53-enhancement","title":"Pattern-hiding Displays","props":[{"name":"label","value":"AC-11(1)"},{"name":"sort-id","value":"ac-11.01"}],"parts":[{"id":"ac-11.1_smt","name":"statement","prose":"The information system conceals, via the session lock, information previously visible on the display with a publicly viewable image."},{"id":"ac-11.1_gdn","name":"guidance","prose":"Publicly viewable images can include static or dynamic images, for example, patterns used with screen savers, photographic images, solid colors, clock, battery life indicator, or a blank screen, with the additional caveat that none of the images convey sensitive information."},{"id":"ac-11.1_obj","name":"objective","prose":"Determine if the information system conceals, via the session lock, information previously visible on the display with a publicly viewable image."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing session lock\n\ndisplay screen with session lock activated\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Information system session lock mechanisms"}]}]}]},{"id":"ac-12","class":"SP800-53","title":"Session Termination","params":[{"id":"ac-12_prm_1","label":"organization-defined conditions or trigger events requiring session disconnect"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"AC-12"},{"name":"sort-id","value":"ac-12"}],"parts":[{"id":"ac-12_smt","name":"statement","prose":"The information system automatically terminates a user session after {{ insert: param, ac-12_prm_1 }}."},{"id":"ac-12_gdn","name":"guidance","prose":"This control addresses the termination of user-initiated logical sessions in contrast to SC-10 which addresses the termination of network connections that are associated with communications sessions (i.e., network disconnect). A logical session (for local, network, and remote access) is initiated whenever a user (or process acting on behalf of a user) accesses an organizational information system. Such user sessions can be terminated (and thus terminate user access) without terminating network sessions. Session termination terminates all processes associated with a user’s logical session except those processes that are specifically created by the user (i.e., session owner) to continue after the session is terminated. Conditions or trigger events requiring automatic session termination can include, for example, organization-defined periods of user inactivity, targeted responses to certain types of incidents, time-of-day restrictions on information system use.","links":[{"href":"#sc-10","rel":"related"},{"href":"#sc-23","rel":"related"}]},{"id":"ac-12_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-12_obj.1","name":"objective","props":[{"name":"label","value":"AC-12[1]"}],"prose":"the organization defines conditions or trigger events requiring session disconnect; and"},{"id":"ac-12_obj.2","name":"objective","props":[{"name":"label","value":"AC-12[2]"}],"prose":"the information system automatically terminates a user session after organization-defined conditions or trigger events requiring session disconnect occurs."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing session termination\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of conditions or trigger events requiring session disconnect\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing user session termination"}]}]},{"id":"ac-14","class":"SP800-53","title":"Permitted Actions Without Identification or Authentication","params":[{"id":"ac-14_prm_1","label":"organization-defined user actions"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AC-14"},{"name":"sort-id","value":"ac-14"}],"parts":[{"id":"ac-14_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-14_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Identifies {{ insert: param, ac-14_prm_1 }} that can be performed on the information system without identification or authentication consistent with organizational missions\/business functions; and"},{"id":"ac-14_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents and provides supporting rationale in the security plan for the information system, user actions not requiring identification or authentication."}]},{"id":"ac-14_gdn","name":"guidance","prose":"This control addresses situations in which organizations determine that no identification or authentication is required in organizational information systems. Organizations may allow a limited number of user actions without identification or authentication including, for example, when individuals access public websites or other publicly accessible federal information systems, when individuals use mobile phones to receive calls, or when facsimiles are received. Organizations also identify actions that normally require identification or authentication but may under certain circumstances (e.g., emergencies), allow identification or authentication mechanisms to be bypassed. Such bypasses may occur, for example, via a software-readable physical switch that commands bypass of the logon functionality and is protected from accidental or unmonitored use. This control does not apply to situations where identification and authentication have already occurred and are not repeated, but rather to situations where identification and authentication have not yet occurred. Organizations may decide that there are no user actions that can be performed on organizational information systems without identification and authentication and thus, the values for assignment statements can be none.","links":[{"href":"#cp-2","rel":"related"},{"href":"#ia-2","rel":"related"}]},{"id":"ac-14_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-14.a_obj","name":"objective","props":[{"name":"label","value":"AC-14(a)"}],"parts":[{"id":"ac-14.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-14(a)[1]"}],"prose":"defines user actions that can be performed on the information system without identification or authentication consistent with organizational missions\/business functions;"},{"id":"ac-14.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-14(a)[2]"}],"prose":"identifies organization-defined user actions that can be performed on the information system without identification or authentication consistent with organizational missions\/business functions; and"}]},{"id":"ac-14.b_obj","name":"objective","props":[{"name":"label","value":"AC-14(b)"}],"prose":"documents and provides supporting rationale in the security plan for the information system, user actions not requiring identification or authentication."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing permitted actions without identification or authentication\n\ninformation system configuration settings and associated documentation\n\nsecurity plan\n\nlist of user actions that can be performed without identification or authentication\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ac-17","class":"SP800-53","title":"Remote Access","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-17"},{"name":"sort-id","value":"ac-17"}],"links":[{"href":"#5309d4d0-46f8-4213-a749-e7584164e5e8","rel":"reference"},{"href":"#99f331f2-a9f0-46c2-9856-a3cbb9b89442","rel":"reference"},{"href":"#349fe082-502d-464a-aa0c-1443c6a5cf40","rel":"reference"},{"href":"#1201fcf3-afb1-4675-915a-fb4ae0435717","rel":"reference"},{"href":"#d1a4e2a9-e512-4132-8795-5357aba29254","rel":"reference"}],"parts":[{"id":"ac-17_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-17_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes and documents usage restrictions, configuration\/connection requirements, and implementation guidance for each type of remote access allowed; and"},{"id":"ac-17_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes remote access to the information system prior to allowing such connections."}]},{"id":"ac-17_gdn","name":"guidance","prose":"Remote access is access to organizational information systems by users (or processes acting on behalf of users) communicating through external networks (e.g., the Internet). Remote access methods include, for example, dial-up, broadband, and wireless. Organizations often employ encrypted virtual private networks (VPNs) to enhance confidentiality and integrity over remote connections. The use of encrypted VPNs does not make the access non-remote; however, the use of VPNs, when adequately provisioned with appropriate security controls (e.g., employing appropriate encryption techniques for confidentiality and integrity protection) may provide sufficient assurance to the organization that it can effectively treat such connections as internal networks. Still, VPN connections traverse external networks, and the encrypted VPN does not enhance the availability of remote connections. Also, VPNs with encrypted tunnels can affect the organizational capability to adequately monitor network communications traffic for malicious code. Remote access controls apply to information systems other than public web servers or systems designed for public access. This control addresses authorization prior to allowing remote access without specifying the formats for such authorization. While organizations may use interconnection security agreements to authorize remote access connections, such agreements are not required by this control. Enforcing access restrictions for remote connections is addressed in AC-3.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#pe-17","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sc-10","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ac-17_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-17.a_obj","name":"objective","props":[{"name":"label","value":"AC-17(a)"}],"parts":[{"id":"ac-17.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-17(a)[1]"}],"prose":"identifies the types of remote access allowed to the information system;"},{"id":"ac-17.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-17(a)[2]"}],"prose":"establishes for each type of remote access allowed:","parts":[{"id":"ac-17.a_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-17(a)[2][a]"}],"prose":"usage restrictions;"},{"id":"ac-17.a_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-17(a)[2][b]"}],"prose":"configuration\/connection requirements;"},{"id":"ac-17.a_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-17(a)[2][c]"}],"prose":"implementation guidance;"}]},{"id":"ac-17.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-17(a)[3]"}],"prose":"documents for each type of remote access allowed:","parts":[{"id":"ac-17.a_obj.3.a","name":"objective","props":[{"name":"label","value":"AC-17(a)[3][a]"}],"prose":"usage restrictions;"},{"id":"ac-17.a_obj.3.b","name":"objective","props":[{"name":"label","value":"AC-17(a)[3][b]"}],"prose":"configuration\/connection requirements;"},{"id":"ac-17.a_obj.3.c","name":"objective","props":[{"name":"label","value":"AC-17(a)[3][c]"}],"prose":"implementation guidance; and"}]}]},{"id":"ac-17.b_obj","name":"objective","props":[{"name":"label","value":"AC-17(b)"}],"prose":"authorizes remote access to the information system prior to allowing such connections."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access implementation and usage (including restrictions)\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\nremote access authorizations\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing remote access connections\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Remote access management capability for the information system"}]}],"controls":[{"id":"ac-17.1","class":"SP800-53-enhancement","title":"Automated Monitoring \/ Control","props":[{"name":"label","value":"AC-17(1)"},{"name":"sort-id","value":"ac-17.01"}],"parts":[{"id":"ac-17.1_smt","name":"statement","prose":"The information system monitors and controls remote access methods."},{"id":"ac-17.1_gdn","name":"guidance","prose":"Automated monitoring and control of remote access sessions allows organizations to detect cyber attacks and also ensure ongoing compliance with remote access policies by auditing connection activities of remote users on a variety of information system components (e.g., servers, workstations, notebook computers, smart phones, and tablets).","links":[{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"}]},{"id":"ac-17.1_obj","name":"objective","prose":"Determine if the information system monitors and controls remote access methods."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access to the information system\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\ninformation system monitoring records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms monitoring and controlling remote access methods"}]}]},{"id":"ac-17.2","class":"SP800-53-enhancement","title":"Protection of Confidentiality \/ Integrity Using Encryption","props":[{"name":"label","value":"AC-17(2)"},{"name":"sort-id","value":"ac-17.02"}],"parts":[{"id":"ac-17.2_smt","name":"statement","prose":"The information system implements cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions."},{"id":"ac-17.2_gdn","name":"guidance","prose":"The encryption strength of mechanism is selected based on the security categorization of the information.","links":[{"href":"#sc-8","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"ac-17.2_obj","name":"objective","prose":"Determine if the information system implements cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access to the information system\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ncryptographic mechanisms and associated configuration documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Cryptographic mechanisms protecting confidentiality and integrity of remote access sessions"}]}]},{"id":"ac-17.3","class":"SP800-53-enhancement","title":"Managed Access Control Points","params":[{"id":"ac-17.3_prm_1","label":"organization-defined number"}],"props":[{"name":"label","value":"AC-17(3)"},{"name":"sort-id","value":"ac-17.03"}],"parts":[{"id":"ac-17.3_smt","name":"statement","prose":"The information system routes all remote accesses through {{ insert: param, ac-17.3_prm_1 }} managed network access control points."},{"id":"ac-17.3_gdn","name":"guidance","prose":"Limiting the number of access control points for remote accesses reduces the attack surface for organizations. Organizations consider the Trusted Internet Connections (TIC) initiative requirements for external network connections.","links":[{"href":"#sc-7","rel":"related"}]},{"id":"ac-17.3_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-17.3_obj.1","name":"objective","props":[{"name":"label","value":"AC-17(3)[1]"}],"prose":"the organization defines the number of managed network access control points through which all remote accesses are to be routed; and"},{"id":"ac-17.3_obj.2","name":"objective","props":[{"name":"label","value":"AC-17(3)[2]"}],"prose":"the information system routes all remote accesses through the organization-defined number of managed network access control points."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access to the information system\n\ninformation system design documentation\n\nlist of all managed network access control points\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms routing all remote accesses through managed network access control points"}]}]},{"id":"ac-17.4","class":"SP800-53-enhancement","title":"Privileged Commands \/ Access","params":[{"id":"ac-17.4_prm_1","label":"organization-defined needs"}],"props":[{"name":"label","value":"AC-17(4)"},{"name":"sort-id","value":"ac-17.04"}],"parts":[{"id":"ac-17.4_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-17.4_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Authorizes the execution of privileged commands and access to security-relevant information via remote access only for {{ insert: param, ac-17.4_prm_1 }}; and"},{"id":"ac-17.4_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Documents the rationale for such access in the security plan for the information system."}]},{"id":"ac-17.4_gdn","name":"guidance","links":[{"href":"#ac-6","rel":"related"}]},{"id":"ac-17.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-17.4.a_obj","name":"objective","props":[{"name":"label","value":"AC-17(4)(a)"}],"parts":[{"id":"ac-17.4.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-17(4)(a)[1]"}],"prose":"defines needs to authorize the execution of privileged commands and access to security-relevant information via remote access;"},{"id":"ac-17.4.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-17(4)(a)[2]"}],"prose":"authorizes the execution of privileged commands and access to security-relevant information via remote access only for organization-defined needs; and"}],"links":[{"href":"#ac-17.4_smt.a","rel":"corresp"}]},{"id":"ac-17.4.b_obj","name":"objective","props":[{"name":"label","value":"AC-17(4)(b)"}],"prose":"documents the rationale for such access in the information system security plan.","links":[{"href":"#ac-17.4_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access to the information system\n\ninformation system configuration settings and associated documentation\n\nsecurity plan\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing remote access management"}]}]}]},{"id":"ac-18","class":"SP800-53","title":"Wireless Access","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-18"},{"name":"sort-id","value":"ac-18"}],"links":[{"href":"#238ed479-eccb-49f6-82ec-ab74a7a428cf","rel":"reference"},{"href":"#d1b1d689-0f66-4474-9924-c81119758dc1","rel":"reference"},{"href":"#6f336ecd-f2a0-4c84-9699-0491d81b6e0d","rel":"reference"}],"parts":[{"id":"ac-18_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-18_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes usage restrictions, configuration\/connection requirements, and implementation guidance for wireless access; and"},{"id":"ac-18_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes wireless access to the information system prior to allowing such connections."}]},{"id":"ac-18_gdn","name":"guidance","prose":"Wireless technologies include, for example, microwave, packet radio (UHF\/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP\/TLS, PEAP), which provide credential protection and mutual authentication.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ac-18_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-18.a_obj","name":"objective","props":[{"name":"label","value":"AC-18(a)"}],"prose":"establishes for wireless access:","parts":[{"id":"ac-18.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-18(a)[1]"}],"prose":"usage restrictions;"},{"id":"ac-18.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-18(a)[2]"}],"prose":"configuration\/connection requirement;"},{"id":"ac-18.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-18(a)[3]"}],"prose":"implementation guidance; and"}]},{"id":"ac-18.b_obj","name":"objective","props":[{"name":"label","value":"AC-18(b)"}],"prose":"authorizes wireless access to the information system prior to allowing such connections."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing wireless access implementation and usage (including restrictions)\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nwireless access authorizations\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing wireless access connections\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Wireless access management capability for the information system"}]}],"controls":[{"id":"ac-18.1","class":"SP800-53-enhancement","title":"Authentication and Encryption","params":[{"id":"ac-18.1_prm_1","select":{"how-many":"one-or-more","choice":["users","devices"]}}],"props":[{"name":"label","value":"AC-18(1)"},{"name":"sort-id","value":"ac-18.01"}],"parts":[{"id":"ac-18.1_smt","name":"statement","prose":"The information system protects wireless access to the system using authentication of {{ insert: param, ac-18.1_prm_1 }} and encryption."},{"id":"ac-18.1_gdn","name":"guidance","links":[{"href":"#sc-8","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"ac-18.1_obj","name":"objective","prose":"Determine if the information system protects wireless access to the system using encryption and one or more of the following:","parts":[{"id":"ac-18.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-18(1)[1]"}],"prose":"authentication of users; and\/or"},{"id":"ac-18.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-18(1)[2]"}],"prose":"authentication of devices."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing wireless implementation and usage (including restrictions)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing wireless access protections to the information system"}]}]},{"id":"ac-18.4","class":"SP800-53-enhancement","title":"Restrict Configurations by Users","props":[{"name":"label","value":"AC-18(4)"},{"name":"sort-id","value":"ac-18.04"}],"parts":[{"id":"ac-18.4_smt","name":"statement","prose":"The organization identifies and explicitly authorizes users allowed to independently configure wireless networking capabilities."},{"id":"ac-18.4_gdn","name":"guidance","prose":"Organizational authorizations to allow selected users to configure wireless networking capability are enforced in part, by the access enforcement mechanisms employed within organizational information systems.","links":[{"href":"#ac-3","rel":"related"},{"href":"#sc-15","rel":"related"}]},{"id":"ac-18.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-18.4_obj.1","name":"objective","props":[{"name":"label","value":"AC-18(4)[1]"}],"prose":"identifies users allowed to independently configure wireless networking capabilities; and"},{"id":"ac-18.4_obj.2","name":"objective","props":[{"name":"label","value":"AC-18(4)[2]"}],"prose":"explicitly authorizes the identified users allowed to independently configure wireless networking capabilities."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing wireless implementation and usage (including restrictions)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms authorizing independent user configuration of wireless networking capabilities"}]}]},{"id":"ac-18.5","class":"SP800-53-enhancement","title":"Antennas \/ Transmission Power Levels","props":[{"name":"label","value":"AC-18(5)"},{"name":"sort-id","value":"ac-18.05"}],"parts":[{"id":"ac-18.5_smt","name":"statement","prose":"The organization selects radio antennas and calibrates transmission power levels to reduce the probability that usable signals can be received outside of organization-controlled boundaries."},{"id":"ac-18.5_gdn","name":"guidance","prose":"Actions that may be taken by organizations to limit unauthorized use of wireless communications outside of organization-controlled boundaries include, for example: (i) reducing the power of wireless transmissions so that the transmissions are less likely to emit a signal that can be used by adversaries outside of the physical perimeters of organizations; (ii) employing measures such as TEMPEST to control wireless emanations; and (iii) using directional\/beam forming antennas that reduce the likelihood that unintended receivers will be able to intercept signals. Prior to taking such actions, organizations can conduct periodic wireless surveys to understand the radio frequency profile of organizational information systems as well as other systems that may be operating in the area.","links":[{"href":"#pe-19","rel":"related"}]},{"id":"ac-18.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-18.5_obj.1","name":"objective","props":[{"name":"label","value":"AC-18(5)[1]"}],"prose":"selects radio antennas to reduce the probability that usable signals can be received outside of organization-controlled boundaries; and"},{"id":"ac-18.5_obj.2","name":"objective","props":[{"name":"label","value":"AC-18(5)[2]"}],"prose":"calibrates transmission power levels to reduce the probability that usable signals can be received outside of organization-controlled boundaries."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing wireless implementation and usage (including restrictions)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Wireless access capability protecting usable signals from unauthorized access outside organization-controlled boundaries"}]}]}]},{"id":"ac-19","class":"SP800-53","title":"Access Control for Mobile Devices","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-19"},{"name":"sort-id","value":"ac-19"}],"links":[{"href":"#4da24a96-6cf8-435d-9d1f-c73247cad109","rel":"reference"},{"href":"#1201fcf3-afb1-4675-915a-fb4ae0435717","rel":"reference"},{"href":"#0293a393-fbe8-4ed1-b0b4-f6fbd3ae1589","rel":"reference"},{"href":"#6513e480-fada-4876-abba-1397084dfb26","rel":"reference"}],"parts":[{"id":"ac-19_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-19_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes usage restrictions, configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices; and"},{"id":"ac-19_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes the connection of mobile devices to organizational information systems."}]},{"id":"ac-19_gdn","name":"guidance","prose":"A mobile device is a computing device that: (i) has a small form factor such that it can easily be carried by a single individual; (ii) is designed to operate without a physical connection (e.g., wirelessly transmit or receive information); (iii) possesses local, non-removable or removable data storage; and (iv) includes a self-contained power source. Mobile devices may also include voice communication capabilities, on-board sensors that allow the device to capture information, and\/or built-in features for synchronizing local data with remote locations. Examples include smart phones, E-readers, and tablets. Mobile devices are typically associated with a single individual and the device is usually in close proximity to the individual; however, the degree of proximity can vary depending upon on the form factor and size of the device. The processing, storage, and transmission capability of the mobile device may be comparable to or merely a subset of desktop systems, depending upon the nature and intended purpose of the device. Due to the large variety of mobile devices with different technical characteristics and capabilities, organizational restrictions may vary for the different classes\/types of such devices. Usage restrictions and specific implementation guidance for mobile devices include, for example, configuration management, device identification and authentication, implementation of mandatory protective software (e.g., malicious code detection, firewall), scanning devices for malicious code, updating virus protection software, scanning for critical software updates and patches, conducting primary operating system (and possibly other resident software) integrity checks, and disabling unnecessary hardware (e.g., wireless, infrared). Organizations are cautioned that the need to provide adequate security for mobile devices goes beyond the requirements in this control. Many safeguards and countermeasures for mobile devices are reflected in other security controls in the catalog allocated in the initial control baselines as starting points for the development of security plans and overlays using the tailoring process. There may also be some degree of overlap in the requirements articulated by the security controls within the different families of controls. AC-20 addresses mobile devices that are not organization-controlled.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-7","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ca-9","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-43","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ac-19_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-19.a_obj","name":"objective","props":[{"name":"label","value":"AC-19(a)"}],"prose":"establishes for organization-controlled mobile devices:","parts":[{"id":"ac-19.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-19(a)[1]"}],"prose":"usage restrictions;"},{"id":"ac-19.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-19(a)[2]"}],"prose":"configuration\/connection requirement;"},{"id":"ac-19.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-19(a)[3]"}],"prose":"implementation guidance; and"}]},{"id":"ac-19.b_obj","name":"objective","props":[{"name":"label","value":"AC-19(b)"}],"prose":"authorizes the connection of mobile devices to organizational information systems."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing access control for mobile device usage (including restrictions)\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nauthorizations for mobile device connections to organizational information systems\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel using mobile devices to access organizational information systems\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Access control capability authorizing mobile device connections to organizational information systems"}]}],"controls":[{"id":"ac-19.5","class":"SP800-53-enhancement","title":"Full Device \/ Container-based Encryption","params":[{"id":"ac-19.5_prm_1","select":{"choice":["full-device encryption","container encryption"]}},{"id":"ac-19.5_prm_2","label":"organization-defined mobile devices"}],"props":[{"name":"label","value":"AC-19(5)"},{"name":"sort-id","value":"ac-19.05"}],"parts":[{"id":"ac-19.5_smt","name":"statement","prose":"The organization employs {{ insert: param, ac-19.5_prm_1 }} to protect the confidentiality and integrity of information on {{ insert: param, ac-19.5_prm_2 }}."},{"id":"ac-19.5_gdn","name":"guidance","prose":"Container-based encryption provides a more fine-grained approach to the encryption of data\/information on mobile devices, including for example, encrypting selected data structures such as files, records, or fields.","links":[{"href":"#mp-5","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-28","rel":"related"}]},{"id":"ac-19.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-19.5_obj.1","name":"objective","props":[{"name":"label","value":"AC-19(5)[1]"}],"prose":"defines mobile devices for which full-device encryption or container encryption is required to protect the confidentiality and integrity of information on such devices; and"},{"id":"ac-19.5_obj.2","name":"objective","props":[{"name":"label","value":"AC-19(5)[2]"}],"prose":"employs full-device encryption or container encryption to protect the confidentiality and integrity of information on organization-defined mobile devices."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing access control for mobile devices\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nencryption mechanism s and associated configuration documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access control responsibilities for mobile devices\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Encryption mechanisms protecting confidentiality and integrity of information on mobile devices"}]}]}]},{"id":"ac-20","class":"SP800-53","title":"Use of External Information Systems","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-20"},{"name":"sort-id","value":"ac-20"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"}],"parts":[{"id":"ac-20_smt","name":"statement","prose":"The organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and\/or maintaining external information systems, allowing authorized individuals to:","parts":[{"id":"ac-20_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Access the information system from external information systems; and"},{"id":"ac-20_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Process, store, or transmit organization-controlled information using external information systems."}]},{"id":"ac-20_gdn","name":"guidance","prose":"External information systems are information systems or components of information systems that are outside of the authorization boundary established by organizations and for which organizations typically have no direct supervision and authority over the application of required security controls or the assessment of control effectiveness. External information systems include, for example: (i) personally owned information systems\/devices (e.g., notebook computers, smart phones, tablets, personal digital assistants); (ii) privately owned computing and communications devices resident in commercial or public facilities (e.g., hotels, train stations, convention centers, shopping malls, or airports); (iii) information systems owned or controlled by nonfederal governmental organizations; and (iv) federal information systems that are not owned by, operated by, or under the direct supervision and authority of organizations. This control also addresses the use of external information systems for the processing, storage, or transmission of organizational information, including, for example, accessing cloud services (e.g., infrastructure as a service, platform as a service, or software as a service) from organizational information systems. For some external information systems (i.e., information systems operated by other federal agencies, including organizations subordinate to those agencies), the trust relationships that have been established between those organizations and the originating organization may be such, that no explicit terms and conditions are required. Information systems within these organizations would not be considered external. These situations occur when, for example, there are pre-existing sharing\/trust agreements (either implicit or explicit) established between federal agencies or organizations subordinate to those agencies, or when such trust agreements are specified by applicable laws, Executive Orders, directives, or policies. Authorized individuals include, for example, organizational personnel, contractors, or other individuals with authorized access to organizational information systems and over which organizations have the authority to impose rules of behavior with regard to system access. Restrictions that organizations impose on authorized individuals need not be uniform, as those restrictions may vary depending upon the trust relationships between organizations. Therefore, organizations may choose to impose different security restrictions on contractors than on state, local, or tribal governments. This control does not apply to the use of external information systems to access public interfaces to organizational information systems (e.g., individuals accessing federal information through www.usa.gov). Organizations establish terms and conditions for the use of external information systems in accordance with organizational security policies and procedures. Terms and conditions address as a minimum: types of applications that can be accessed on organizational information systems from external information systems; and the highest security category of information that can be processed, stored, or transmitted on external information systems. If terms and conditions with the owners of external information systems cannot be established, organizations may impose restrictions on organizational personnel using those external systems.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sa-9","rel":"related"}]},{"id":"ac-20_obj","name":"objective","prose":"Determine if the organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and\/or maintaining external information systems, allowing authorized individuals to:","parts":[{"id":"ac-20.a_obj","name":"objective","props":[{"name":"label","value":"AC-20(a)"}],"prose":"access the information system from the external information systems; and"},{"id":"ac-20.b_obj","name":"objective","props":[{"name":"label","value":"AC-20(b)"}],"prose":"process, store, or transmit organization-controlled information using external information systems."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing the use of external information systems\n\nexternal information systems terms and conditions\n\nlist of types of applications accessible from external information systems\n\nmaximum security categorization for information processed, stored, or transmitted on external information systems\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining terms and conditions for use of external information systems to access organizational systems\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing terms and conditions on use of external information systems"}]}],"controls":[{"id":"ac-20.1","class":"SP800-53-enhancement","title":"Limits On Authorized Use","props":[{"name":"label","value":"AC-20(1)"},{"name":"sort-id","value":"ac-20.01"}],"parts":[{"id":"ac-20.1_smt","name":"statement","prose":"The organization permits authorized individuals to use an external information system to access the information system or to process, store, or transmit organization-controlled information only when the organization:","parts":[{"id":"ac-20.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Verifies the implementation of required security controls on the external system as specified in the organization’s information security policy and security plan; or"},{"id":"ac-20.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Retains approved information system connection or processing agreements with the organizational entity hosting the external information system."}]},{"id":"ac-20.1_gdn","name":"guidance","prose":"This control enhancement recognizes that there are circumstances where individuals using external information systems (e.g., contractors, coalition partners) need to access organizational information systems. In those situations, organizations need confidence that the external information systems contain the necessary security safeguards (i.e., security controls), so as not to compromise, damage, or otherwise harm organizational information systems. Verification that the required security controls have been implemented can be achieved, for example, by third-party, independent assessments, attestations, or other means, depending on the confidence level required by organizations.","links":[{"href":"#ca-2","rel":"related"}]},{"id":"ac-20.1_obj","name":"objective","prose":"Determine if the organization permits authorized individuals to use an external information system to access the information system or to process, store, or transmit organization-controlled information only when the organization:","parts":[{"id":"ac-20.1.a_obj","name":"objective","props":[{"name":"label","value":"AC-20(1)(a)"}],"prose":"verifies the implementation of required security controls on the external system as specified in the organization’s information security policy and security plan; or","links":[{"href":"#ac-20.1_smt.a","rel":"corresp"}]},{"id":"ac-20.1.b_obj","name":"objective","props":[{"name":"label","value":"AC-20(1)(b)"}],"prose":"retains approved information system connection or processing agreements with the organizational entity hosting the external information system.","links":[{"href":"#ac-20.1_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing the use of external information systems\n\nsecurity plan\n\ninformation system connection or processing agreements\n\naccount management documents\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing limits on use of external information systems"}]}]},{"id":"ac-20.2","class":"SP800-53-enhancement","title":"Portable Storage Devices","params":[{"id":"ac-20.2_prm_1","select":{"choice":["restricts","prohibits"]}}],"props":[{"name":"label","value":"AC-20(2)"},{"name":"sort-id","value":"ac-20.02"}],"parts":[{"id":"ac-20.2_smt","name":"statement","prose":"The organization {{ insert: param, ac-20.2_prm_1 }} the use of organization-controlled portable storage devices by authorized individuals on external information systems."},{"id":"ac-20.2_gdn","name":"guidance","prose":"Limits on the use of organization-controlled portable storage devices in external information systems include, for example, complete prohibition of the use of such devices or restrictions on how the devices may be used and under what conditions the devices may be used."},{"id":"ac-20.2_obj","name":"objective","prose":"Determine if the organization restricts or prohibits the use of organization-controlled portable storage devices by authorized individuals on external information systems."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing the use of external information systems\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\ninformation system connection or processing agreements\n\naccount management documents\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for restricting or prohibiting use of organization-controlled storage devices on external information systems\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing restrictions on use of portable storage devices"}]}]}]},{"id":"ac-21","class":"SP800-53","title":"Information Sharing","params":[{"id":"ac-21_prm_1","label":"organization-defined information sharing circumstances where user discretion is required"},{"id":"ac-21_prm_2","label":"organization-defined automated mechanisms or manual processes"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"AC-21"},{"name":"sort-id","value":"ac-21"}],"parts":[{"id":"ac-21_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-21_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Facilitates information sharing by enabling authorized users to determine whether access authorizations assigned to the sharing partner match the access restrictions on the information for {{ insert: param, ac-21_prm_1 }}; and"},{"id":"ac-21_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Employs {{ insert: param, ac-21_prm_2 }} to assist users in making information sharing\/collaboration decisions."}]},{"id":"ac-21_gdn","name":"guidance","prose":"This control applies to information that may be restricted in some manner (e.g., privileged medical information, contract-sensitive information, proprietary information, personally identifiable information, classified information related to special access programs or compartments) based on some formal or administrative determination. Depending on the particular information-sharing circumstances, sharing partners may be defined at the individual, group, or organizational level. Information may be defined by content, type, security category, or special access program\/compartment.","links":[{"href":"#ac-3","rel":"related"}]},{"id":"ac-21_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-21.a_obj","name":"objective","props":[{"name":"label","value":"AC-21(a)"}],"parts":[{"id":"ac-21.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-21(a)[1]"}],"prose":"defines information sharing circumstances where user discretion is required;"},{"id":"ac-21.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-21(a)[2]"}],"prose":"facilitates information sharing by enabling authorized users to determine whether access authorizations assigned to the sharing partner match the access restrictions on the information for organization-defined information sharing circumstances;"}]},{"id":"ac-21.b_obj","name":"objective","props":[{"name":"label","value":"AC-21(b)"}],"parts":[{"id":"ac-21.b_obj.1","name":"objective","props":[{"name":"label","value":"AC-21(b)[1]"}],"prose":"defines automated mechanisms or manual processes to be employed to assist users in making information sharing\/collaboration decisions; and"},{"id":"ac-21.b_obj.2","name":"objective","props":[{"name":"label","value":"AC-21(b)[2]"}],"prose":"employs organization-defined automated mechanisms or manual processes to assist users in making information sharing\/collaboration decisions."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing user-based collaboration and information sharing (including restrictions)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of users authorized to make information sharing\/collaboration decisions\n\nlist of information sharing circumstances requiring user discretion\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel responsible for making information sharing\/collaboration decisions\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms or manual process implementing access authorizations supporting information sharing\/user collaboration decisions"}]}]},{"id":"ac-22","class":"SP800-53","title":"Publicly Accessible Content","params":[{"id":"ac-22_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AC-22"},{"name":"sort-id","value":"ac-22"}],"parts":[{"id":"ac-22_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-22_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Designates individuals authorized to post information onto a publicly accessible information system;"},{"id":"ac-22_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Trains authorized individuals to ensure that publicly accessible information does not contain nonpublic information;"},{"id":"ac-22_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included; and"},{"id":"ac-22_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Reviews the content on the publicly accessible information system for nonpublic information {{ insert: param, ac-22_prm_1 }} and removes such information, if discovered."}]},{"id":"ac-22_gdn","name":"guidance","prose":"In accordance with federal laws, Executive Orders, directives, policies, regulations, standards, and\/or guidance, the general public is not authorized access to nonpublic information (e.g., information protected under the Privacy Act and proprietary information). This control addresses information systems that are controlled by the organization and accessible to the general public, typically without identification or authentication. The posting of information on non-organization information systems is covered by organizational policy.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#au-13","rel":"related"}]},{"id":"ac-22_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-22.a_obj","name":"objective","props":[{"name":"label","value":"AC-22(a)"}],"prose":"designates individuals authorized to post information onto a publicly accessible information system;"},{"id":"ac-22.b_obj","name":"objective","props":[{"name":"label","value":"AC-22(b)"}],"prose":"trains authorized individuals to ensure that publicly accessible information does not contain nonpublic information;"},{"id":"ac-22.c_obj","name":"objective","props":[{"name":"label","value":"AC-22(c)"}],"prose":"reviews the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included;"},{"id":"ac-22.d_obj","name":"objective","props":[{"name":"label","value":"AC-22(d)"}],"parts":[{"id":"ac-22.d_obj.1","name":"objective","props":[{"name":"label","value":"AC-22(d)[1]"}],"prose":"defines the frequency to review the content on the publicly accessible information system for nonpublic information;"},{"id":"ac-22.d_obj.2","name":"objective","props":[{"name":"label","value":"AC-22(d)[2]"}],"prose":"reviews the content on the publicly accessible information system for nonpublic information with the organization-defined frequency; and"},{"id":"ac-22.d_obj.3","name":"objective","props":[{"name":"label","value":"AC-22(d)[3]"}],"prose":"removes nonpublic information from the publicly accessible information system, if discovered."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing publicly accessible content\n\nlist of users authorized to post publicly accessible content on organizational information systems\n\ntraining materials and\/or records\n\nrecords of publicly accessible information reviews\n\nrecords of response to nonpublic information on public websites\n\nsystem audit logs\n\nsecurity awareness training records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing publicly accessible information posted on organizational information systems\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing management of publicly accessible content"}]}]}]},{"id":"at","class":"family","title":"Awareness and Training","controls":[{"id":"at-1","class":"SP800-53","title":"Security Awareness and Training Policy and Procedures","params":[{"id":"at-1_prm_1","label":"organization-defined personnel or roles"},{"id":"at-1_prm_2","label":"organization-defined frequency"},{"id":"at-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AT-1"},{"name":"sort-id","value":"at-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"at-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"at-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, at-1_prm_1 }}:","parts":[{"id":"at-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A security awareness and training policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"at-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the security awareness and training policy and associated security awareness and training controls; and"}]},{"id":"at-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"at-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security awareness and training policy {{ insert: param, at-1_prm_2 }}; and"},{"id":"at-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Security awareness and training procedures {{ insert: param, at-1_prm_3 }}."}]}]},{"id":"at-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the AT family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"at-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-1.a_obj","name":"objective","props":[{"name":"label","value":"AT-1(a)"}],"parts":[{"id":"at-1.a.1_obj","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)"}],"parts":[{"id":"at-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1]"}],"prose":"develops and documents an security awareness and training policy that addresses:","parts":[{"id":"at-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"at-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"at-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"at-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"at-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"at-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"at-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"at-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the security awareness and training policy are to be disseminated;"},{"id":"at-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[3]"}],"prose":"disseminates the security awareness and training policy to organization-defined personnel or roles;"}]},{"id":"at-1.a.2_obj","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)"}],"parts":[{"id":"at-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the security awareness and training policy and associated awareness and training controls;"},{"id":"at-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"at-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"at-1.b_obj","name":"objective","props":[{"name":"label","value":"AT-1(b)"}],"parts":[{"id":"at-1.b.1_obj","name":"objective","props":[{"name":"label","value":"AT-1(b)(1)"}],"parts":[{"id":"at-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current security awareness and training policy;"},{"id":"at-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(b)(1)[2]"}],"prose":"reviews and updates the current security awareness and training policy with the organization-defined frequency;"}]},{"id":"at-1.b.2_obj","name":"objective","props":[{"name":"label","value":"AT-1(b)(2)"}],"parts":[{"id":"at-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current security awareness and training procedures; and"},{"id":"at-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(b)(2)[2]"}],"prose":"reviews and updates the current security awareness and training procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security awareness and training responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"at-2","class":"SP800-53","title":"Security Awareness Training","params":[{"id":"at-2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AT-2"},{"name":"sort-id","value":"at-02"}],"links":[{"href":"#bb61234b-46c3-4211-8c2b-9869222a720d","rel":"reference"},{"href":"#c5034e0c-eba6-4ecd-a541-79f0678f4ba4","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"at-2_smt","name":"statement","prose":"The organization provides basic security awareness training to information system users (including managers, senior executives, and contractors):","parts":[{"id":"at-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"As part of initial training for new users;"},{"id":"at-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"at-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, at-2_prm_1 }} thereafter."}]},{"id":"at-2_gdn","name":"guidance","prose":"Organizations determine the appropriate content of security awareness training and security awareness techniques based on the specific organizational requirements and the information systems to which personnel have authorized access. The content includes a basic understanding of the need for information security and user actions to maintain security and to respond to suspected security incidents. The content also addresses awareness of the need for operations security. Security awareness techniques can include, for example, displaying posters, offering supplies inscribed with security reminders, generating email advisories\/notices from senior organizational officials, displaying logon screen messages, and conducting information security awareness events.","links":[{"href":"#at-3","rel":"related"},{"href":"#at-4","rel":"related"},{"href":"#pl-4","rel":"related"}]},{"id":"at-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-2.a_obj","name":"objective","props":[{"name":"label","value":"AT-2(a)"}],"prose":"provides basic security awareness training to information system users (including managers, senior executives, and contractors) as part of initial training for new users;"},{"id":"at-2.b_obj","name":"objective","props":[{"name":"label","value":"AT-2(b)"}],"prose":"provides basic security awareness training to information system users (including managers, senior executives, and contractors) when required by information system changes; and"},{"id":"at-2.c_obj","name":"objective","props":[{"name":"label","value":"AT-2(c)"}],"parts":[{"id":"at-2.c_obj.1","name":"objective","props":[{"name":"label","value":"AT-2(c)[1]"}],"prose":"defines the frequency to provide refresher security awareness training thereafter to information system users (including managers, senior executives, and contractors); and"},{"id":"at-2.c_obj.2","name":"objective","props":[{"name":"label","value":"AT-2(c)[2]"}],"prose":"provides refresher security awareness training to information users (including managers, senior executives, and contractors) with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security awareness training implementation\n\nappropriate codes of federal regulations\n\nsecurity awareness training curriculum\n\nsecurity awareness training materials\n\nsecurity plan\n\ntraining records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for security awareness training\n\norganizational personnel with information security responsibilities\n\norganizational personnel comprising the general information system user community"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms managing security awareness training"}]}],"controls":[{"id":"at-2.2","class":"SP800-53-enhancement","title":"Insider Threat","props":[{"name":"label","value":"AT-2(2)"},{"name":"sort-id","value":"at-02.02"}],"parts":[{"id":"at-2.2_smt","name":"statement","prose":"The organization includes security awareness training on recognizing and reporting potential indicators of insider threat."},{"id":"at-2.2_gdn","name":"guidance","prose":"Potential indicators and possible precursors of insider threat can include behaviors such as inordinate, long-term job dissatisfaction, attempts to gain access to information not required for job performance, unexplained access to financial resources, bullying or sexual harassment of fellow employees, workplace violence, and other serious violations of organizational policies, procedures, directives, rules, or practices. Security awareness training includes how to communicate employee and management concerns regarding potential indicators of insider threat through appropriate organizational channels in accordance with established organizational policies and procedures.","links":[{"href":"#pl-4","rel":"related"},{"href":"#pm-12","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ps-6","rel":"related"}]},{"id":"at-2.2_obj","name":"objective","prose":"Determine if the organization includes security awareness training on recognizing and reporting potential indicators of insider threat."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security awareness training implementation\n\nsecurity awareness training curriculum\n\nsecurity awareness training materials\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel that participate in security awareness training\n\norganizational personnel with responsibilities for basic security awareness training\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"at-3","class":"SP800-53","title":"Role-based Security Training","params":[{"id":"at-3_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AT-3"},{"name":"sort-id","value":"at-03"}],"links":[{"href":"#bb61234b-46c3-4211-8c2b-9869222a720d","rel":"reference"},{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"at-3_smt","name":"statement","prose":"The organization provides role-based security training to personnel with assigned security roles and responsibilities:","parts":[{"id":"at-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Before authorizing access to the information system or performing assigned duties;"},{"id":"at-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"at-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, at-3_prm_1 }} thereafter."}]},{"id":"at-3_gdn","name":"guidance","prose":"Organizations determine the appropriate content of security training based on the assigned roles and responsibilities of individuals and the specific security requirements of organizations and the information systems to which personnel have authorized access. In addition, organizations provide enterprise architects, information system developers, software developers, acquisition\/procurement officials, information system managers, system\/network administrators, personnel conducting configuration management and auditing activities, personnel performing independent verification and validation activities, security control assessors, and other personnel having access to system-level software, adequate security-related technical training specifically tailored for their assigned duties. Comprehensive role-based training addresses management, operational, and technical roles and responsibilities covering physical, personnel, and technical safeguards and countermeasures. Such training can include for example, policies, procedures, tools, and artifacts for the organizational security roles defined. Organizations also provide the training necessary for individuals to carry out their responsibilities related to operations and supply chain security within the context of organizational information security programs. Role-based security training also applies to contractors providing services to federal agencies.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-4","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#ps-7","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#sa-16","rel":"related"}]},{"id":"at-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-3.a_obj","name":"objective","props":[{"name":"label","value":"AT-3(a)"}],"prose":"provides role-based security training to personnel with assigned security roles and responsibilities before authorizing access to the information system or performing assigned duties;"},{"id":"at-3.b_obj","name":"objective","props":[{"name":"label","value":"AT-3(b)"}],"prose":"provides role-based security training to personnel with assigned security roles and responsibilities when required by information system changes; and"},{"id":"at-3.c_obj","name":"objective","props":[{"name":"label","value":"AT-3(c)"}],"parts":[{"id":"at-3.c_obj.1","name":"objective","props":[{"name":"label","value":"AT-3(c)[1]"}],"prose":"defines the frequency to provide refresher role-based security training thereafter to personnel with assigned security roles and responsibilities; and"},{"id":"at-3.c_obj.2","name":"objective","props":[{"name":"label","value":"AT-3(c)[2]"}],"prose":"provides refresher role-based security training to personnel with assigned security roles and responsibilities with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security training implementation\n\ncodes of federal regulations\n\nsecurity training curriculum\n\nsecurity training materials\n\nsecurity plan\n\ntraining records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for role-based security training\n\norganizational personnel with assigned information system security roles and responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms managing role-based security training"}]}]},{"id":"at-4","class":"SP800-53","title":"Security Training Records","params":[{"id":"at-4_prm_1","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AT-4"},{"name":"sort-id","value":"at-04"}],"parts":[{"id":"at-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"at-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Documents and monitors individual information system security training activities including basic security awareness training and specific information system security training; and"},{"id":"at-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Retains individual training records for {{ insert: param, at-4_prm_1 }}."}]},{"id":"at-4_gdn","name":"guidance","prose":"Documentation for specialized training may be maintained by individual supervisors at the option of the organization.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#pm-14","rel":"related"}]},{"id":"at-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-4.a_obj","name":"objective","props":[{"name":"label","value":"AT-4(a)"}],"parts":[{"id":"at-4.a_obj.1","name":"objective","props":[{"name":"label","value":"AT-4(a)[1]"}],"prose":"documents individual information system security training activities including:","parts":[{"id":"at-4.a_obj.1.a","name":"objective","props":[{"name":"label","value":"AT-4(a)[1][a]"}],"prose":"basic security awareness training;"},{"id":"at-4.a_obj.1.b","name":"objective","props":[{"name":"label","value":"AT-4(a)[1][b]"}],"prose":"specific role-based information system security training;"}]},{"id":"at-4.a_obj.2","name":"objective","props":[{"name":"label","value":"AT-4(a)[2]"}],"prose":"monitors individual information system security training activities including:","parts":[{"id":"at-4.a_obj.2.a","name":"objective","props":[{"name":"label","value":"AT-4(a)[2][a]"}],"prose":"basic security awareness training;"},{"id":"at-4.a_obj.2.b","name":"objective","props":[{"name":"label","value":"AT-4(a)[2][b]"}],"prose":"specific role-based information system security training;"}]}]},{"id":"at-4.b_obj","name":"objective","props":[{"name":"label","value":"AT-4(b)"}],"parts":[{"id":"at-4.b_obj.1","name":"objective","props":[{"name":"label","value":"AT-4(b)[1]"}],"prose":"defines a time period to retain individual training records; and"},{"id":"at-4.b_obj.2","name":"objective","props":[{"name":"label","value":"AT-4(b)[2]"}],"prose":"retains individual training records for the organization-defined time period."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security training records\n\nsecurity awareness and training records\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security training record retention responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting management of security training records"}]}]}]},{"id":"au","class":"family","title":"Audit and Accountability","controls":[{"id":"au-1","class":"SP800-53","title":"Audit and Accountability Policy and Procedures","params":[{"id":"au-1_prm_1","label":"organization-defined personnel or roles"},{"id":"au-1_prm_2","label":"organization-defined frequency"},{"id":"au-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-1"},{"name":"sort-id","value":"au-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"au-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"au-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, au-1_prm_1 }}:","parts":[{"id":"au-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An audit and accountability policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"au-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls; and"}]},{"id":"au-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"au-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Audit and accountability policy {{ insert: param, au-1_prm_2 }}; and"},{"id":"au-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Audit and accountability procedures {{ insert: param, au-1_prm_3 }}."}]}]},{"id":"au-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the AU family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"au-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-1.a_obj","name":"objective","props":[{"name":"label","value":"AU-1(a)"}],"parts":[{"id":"au-1.a.1_obj","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)"}],"parts":[{"id":"au-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1]"}],"prose":"develops and documents an audit and accountability policy that addresses:","parts":[{"id":"au-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"au-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"au-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"au-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"au-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"au-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"au-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"au-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the audit and accountability policy are to be disseminated;"},{"id":"au-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[3]"}],"prose":"disseminates the audit and accountability policy to organization-defined personnel or roles;"}]},{"id":"au-1.a.2_obj","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)"}],"parts":[{"id":"au-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls;"},{"id":"au-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"au-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"au-1.b_obj","name":"objective","props":[{"name":"label","value":"AU-1(b)"}],"parts":[{"id":"au-1.b.1_obj","name":"objective","props":[{"name":"label","value":"AU-1(b)(1)"}],"parts":[{"id":"au-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current audit and accountability policy;"},{"id":"au-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(b)(1)[2]"}],"prose":"reviews and updates the current audit and accountability policy with the organization-defined frequency;"}]},{"id":"au-1.b.2_obj","name":"objective","props":[{"name":"label","value":"AU-1(b)(2)"}],"parts":[{"id":"au-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current audit and accountability procedures; and"},{"id":"au-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(b)(2)[2]"}],"prose":"reviews and updates the current audit and accountability procedures in accordance with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"au-2","class":"SP800-53","title":"Audit Events","params":[{"id":"au-2_prm_1","label":"organization-defined auditable events"},{"id":"au-2_prm_2","label":"organization-defined audited events (the subset of the auditable events defined in AU-2 a.) along with the frequency of (or situation requiring) auditing for each identified event"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-2"},{"name":"sort-id","value":"au-02"}],"links":[{"href":"#672fd561-b92b-4713-b9cf-6c9d9456728b","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"au-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"au-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Determines that the information system is capable of auditing the following events: {{ insert: param, au-2_prm_1 }};"},{"id":"au-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events;"},{"id":"au-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Provides a rationale for why the auditable events are deemed to be adequate to support after-the-fact investigations of security incidents; and"},{"id":"au-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Determines that the following events are to be audited within the information system: {{ insert: param, au-2_prm_2 }}."}]},{"id":"au-2_gdn","name":"guidance","prose":"An event is any observable occurrence in an organizational information system. Organizations identify audit events as those events which are significant and relevant to the security of information systems and the environments in which those systems operate in order to meet specific and ongoing audit needs. Audit events can include, for example, password changes, failed logons, or failed accesses related to information systems, administrative privilege usage, PIV credential usage, or third-party credential usage. In determining the set of auditable events, organizations consider the auditing appropriate for each of the security controls to be implemented. To balance auditing requirements with other information system needs, this control also requires identifying that subset of auditable events that are audited at a given point in time. For example, organizations may determine that information systems must have the capability to log every file access both successful and unsuccessful, but not activate that capability except for specific circumstances due to the potential burden on system performance. Auditing requirements, including the need for auditable events, may be referenced in other security controls and control enhancements. Organizations also include auditable events that are required by applicable federal laws, Executive Orders, directives, policies, regulations, and standards. Audit records can be generated at various levels of abstraction, including at the packet level as information traverses the network. Selecting the appropriate level of abstraction is a critical aspect of an audit capability and can facilitate the identification of root causes to problems. Organizations consider in the definition of auditable events, the auditing necessary to cover related events such as the steps in distributed, transaction-based processes (e.g., processes that are distributed across multiple organizations) and actions that occur in service-oriented architectures.","links":[{"href":"#ac-6","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"au-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-2.a_obj","name":"objective","props":[{"name":"label","value":"AU-2(a)"}],"parts":[{"id":"au-2.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-2(a)[1]"}],"prose":"defines the auditable events that the information system must be capable of auditing;"},{"id":"au-2.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-2(a)[2]"}],"prose":"determines that the information system is capable of auditing organization-defined auditable events;"}]},{"id":"au-2.b_obj","name":"objective","props":[{"name":"label","value":"AU-2(b)"}],"prose":"coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events;"},{"id":"au-2.c_obj","name":"objective","props":[{"name":"label","value":"AU-2(c)"}],"prose":"provides a rationale for why the auditable events are deemed to be adequate to support after-the-fact investigations of security incidents;"},{"id":"au-2.d_obj","name":"objective","props":[{"name":"label","value":"AU-2(d)"}],"parts":[{"id":"au-2.d_obj.1","name":"objective","props":[{"name":"label","value":"AU-2(d)[1]"}],"prose":"defines the subset of auditable events defined in AU-2a that are to be audited within the information system;"},{"id":"au-2.d_obj.2","name":"objective","props":[{"name":"label","value":"AU-2(d)[2]"}],"prose":"determines that the subset of auditable events defined in AU-2a are to be audited within the information system; and"},{"id":"au-2.d_obj.3","name":"objective","props":[{"name":"label","value":"AU-2(d)[3]"}],"prose":"determines the frequency of (or situation requiring) auditing for each identified event."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing auditable events\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\ninformation system auditable events\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information system auditing"}]}],"controls":[{"id":"au-2.3","class":"SP800-53-enhancement","title":"Reviews and Updates","params":[{"id":"au-2.3_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"AU-2(3)"},{"name":"sort-id","value":"au-02.03"}],"parts":[{"id":"au-2.3_smt","name":"statement","prose":"The organization reviews and updates the audited events {{ insert: param, au-2.3_prm_1 }}."},{"id":"au-2.3_gdn","name":"guidance","prose":"Over time, the events that organizations believe should be audited may change. Reviewing and updating the set of audited events periodically is necessary to ensure that the current set is still necessary and sufficient."},{"id":"au-2.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-2.3_obj.1","name":"objective","props":[{"name":"label","value":"AU-2(3)[1]"}],"prose":"defines the frequency to review and update the audited events; and"},{"id":"au-2.3_obj.2","name":"objective","props":[{"name":"label","value":"AU-2(3)[2]"}],"prose":"reviews and updates the auditable events with organization-defined frequency."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing auditable events\n\nsecurity plan\n\nlist of organization-defined auditable events\n\nauditable events review and update records\n\ninformation system audit records\n\ninformation system incident reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting review and update of auditable events"}]}]}]},{"id":"au-3","class":"SP800-53","title":"Content of Audit Records","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-3"},{"name":"sort-id","value":"au-03"}],"parts":[{"id":"au-3_smt","name":"statement","prose":"The information system generates audit records containing information that establishes what type of event occurred, when the event occurred, where the event occurred, the source of the event, the outcome of the event, and the identity of any individuals or subjects associated with the event."},{"id":"au-3_gdn","name":"guidance","prose":"Audit record content that may be necessary to satisfy the requirement of this control, includes, for example, time stamps, source and destination addresses, user\/process identifiers, event descriptions, success\/fail indications, filenames involved, and access control or flow control rules invoked. Event outcomes can include indicators of event success or failure and event-specific results (e.g., the security state of the information system after the event occurred).","links":[{"href":"#au-2","rel":"related"},{"href":"#au-8","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#si-11","rel":"related"}]},{"id":"au-3_obj","name":"objective","prose":"Determine if the information system generates audit records containing information that establishes:","parts":[{"id":"au-3_obj.1","name":"objective","props":[{"name":"label","value":"AU-3[1]"}],"prose":"what type of event occurred;"},{"id":"au-3_obj.2","name":"objective","props":[{"name":"label","value":"AU-3[2]"}],"prose":"when the event occurred;"},{"id":"au-3_obj.3","name":"objective","props":[{"name":"label","value":"AU-3[3]"}],"prose":"where the event occurred;"},{"id":"au-3_obj.4","name":"objective","props":[{"name":"label","value":"AU-3[4]"}],"prose":"the source of the event;"},{"id":"au-3_obj.5","name":"objective","props":[{"name":"label","value":"AU-3[5]"}],"prose":"the outcome of the event; and"},{"id":"au-3_obj.6","name":"objective","props":[{"name":"label","value":"AU-3[6]"}],"prose":"the identity of any individuals or subjects associated with the event."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing content of audit records\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of organization-defined auditable events\n\ninformation system audit records\n\ninformation system incident reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information system auditing of auditable events"}]}],"controls":[{"id":"au-3.1","class":"SP800-53-enhancement","title":"Additional Audit Information","params":[{"id":"au-3.1_prm_1","label":"organization-defined additional, more detailed information"}],"props":[{"name":"label","value":"AU-3(1)"},{"name":"sort-id","value":"au-03.01"}],"parts":[{"id":"au-3.1_smt","name":"statement","prose":"The information system generates audit records containing the following additional information: {{ insert: param, au-3.1_prm_1 }}."},{"id":"au-3.1_gdn","name":"guidance","prose":"Detailed information that organizations may consider in audit records includes, for example, full text recording of privileged commands or the individual identities of group account users. Organizations consider limiting the additional audit information to only that information explicitly needed for specific audit requirements. This facilitates the use of audit trails and audit logs by not including information that could potentially be misleading or could make it more difficult to locate information of interest."},{"id":"au-3.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-3.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-3(1)[1]"}],"prose":"the organization defines additional, more detailed information to be contained in audit records that the information system generates; and"},{"id":"au-3.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-3(1)[2]"}],"prose":"the information system generates audit records containing the organization-defined additional, more detailed information."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing content of audit records\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of organization-defined auditable events\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Information system audit capability"}]}]},{"id":"au-3.2","class":"SP800-53-enhancement","title":"Centralized Management of Planned Audit Record Content","params":[{"id":"au-3.2_prm_1","label":"organization-defined information system components"}],"props":[{"name":"label","value":"AU-3(2)"},{"name":"sort-id","value":"au-03.02"}],"parts":[{"id":"au-3.2_smt","name":"statement","prose":"The information system provides centralized management and configuration of the content to be captured in audit records generated by {{ insert: param, au-3.2_prm_1 }}."},{"id":"au-3.2_gdn","name":"guidance","prose":"This control enhancement requires that the content to be captured in audit records be configured from a central location (necessitating automation). Organizations coordinate the selection of required audit content to support the centralized management and configuration capability provided by the information system.","links":[{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"}]},{"id":"au-3.2_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-3.2_obj.1","name":"objective","props":[{"name":"label","value":"AU-3(2)[1]"}],"prose":"the organization defines information system components that generate audit records whose content is to be centrally managed and configured by the information system; and"},{"id":"au-3.2_obj.2","name":"objective","props":[{"name":"label","value":"AU-3(2)[2]"}],"prose":"the information system provides centralized management and configuration of the content to be captured in audit records generated by the organization-defined information system components."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing content of audit records\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of organization-defined auditable events\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Information system capability implementing centralized management and configuration of audit record content"}]}]}]},{"id":"au-4","class":"SP800-53","title":"Audit Storage Capacity","params":[{"id":"au-4_prm_1","label":"organization-defined audit record storage requirements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-4"},{"name":"sort-id","value":"au-04"}],"parts":[{"id":"au-4_smt","name":"statement","prose":"The organization allocates audit record storage capacity in accordance with {{ insert: param, au-4_prm_1 }}."},{"id":"au-4_gdn","name":"guidance","prose":"Organizations consider the types of auditing to be performed and the audit processing requirements when allocating audit storage capacity. Allocating sufficient audit storage capacity reduces the likelihood of such capacity being exceeded and resulting in the potential loss or reduction of auditing capability.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-5","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"},{"href":"#au-11","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"au-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-4_obj.1","name":"objective","props":[{"name":"label","value":"AU-4[1]"}],"prose":"defines audit record storage requirements; and"},{"id":"au-4_obj.2","name":"objective","props":[{"name":"label","value":"AU-4[2]"}],"prose":"allocates audit record storage capacity in accordance with the organization-defined audit record storage requirements."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit storage capacity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit record storage requirements\n\naudit record storage capability for information system components\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Audit record storage capacity and related configuration settings"}]}]},{"id":"au-5","class":"SP800-53","title":"Response to Audit Processing Failures","params":[{"id":"au-5_prm_1","label":"organization-defined personnel or roles"},{"id":"au-5_prm_2","label":"organization-defined actions to be taken (e.g., shut down information system, overwrite oldest audit records, stop generating audit records)"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-5"},{"name":"sort-id","value":"au-05"}],"parts":[{"id":"au-5_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Alerts {{ insert: param, au-5_prm_1 }} in the event of an audit processing failure; and"},{"id":"au-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Takes the following additional actions: {{ insert: param, au-5_prm_2 }}."}]},{"id":"au-5_gdn","name":"guidance","prose":"Audit processing failures include, for example, software\/hardware errors, failures in the audit capturing mechanisms, and audit storage capacity being reached or exceeded. Organizations may choose to define additional actions for different audit processing failures (e.g., by type, by location, by severity, or a combination of such factors). This control applies to each audit data storage repository (i.e., distinct information system component where audit records are stored), the total audit storage capacity of organizations (i.e., all audit data storage repositories combined), or both.","links":[{"href":"#au-4","rel":"related"},{"href":"#si-12","rel":"related"}]},{"id":"au-5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-5.a_obj","name":"objective","props":[{"name":"label","value":"AU-5(a)"}],"parts":[{"id":"au-5.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-5(a)[1]"}],"prose":"the organization defines the personnel or roles to be alerted in the event of an audit processing failure;"},{"id":"au-5.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-5(a)[2]"}],"prose":"the information system alerts the organization-defined personnel or roles in the event of an audit processing failure;"}]},{"id":"au-5.b_obj","name":"objective","props":[{"name":"label","value":"AU-5(b)"}],"parts":[{"id":"au-5.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-5(b)[1]"}],"prose":"the organization defines additional actions to be taken (e.g., shutdown information system, overwrite oldest audit records, stop generating audit records) in the event of an audit processing failure; and"},{"id":"au-5.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-5(b)[2]"}],"prose":"the information system takes the additional organization-defined actions in the event of an audit processing failure."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing response to audit processing failures\n\ninformation system design documentation\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\nlist of personnel to be notified in case of an audit processing failure\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information system response to audit processing failures"}]}],"controls":[{"id":"au-5.1","class":"SP800-53-enhancement","title":"Audit Storage Capacity","params":[{"id":"au-5.1_prm_1","label":"organization-defined personnel, roles, and\/or locations"},{"id":"au-5.1_prm_2","label":"organization-defined time period"},{"id":"au-5.1_prm_3","label":"organization-defined percentage"}],"props":[{"name":"label","value":"AU-5(1)"},{"name":"sort-id","value":"au-05.01"}],"parts":[{"id":"au-5.1_smt","name":"statement","prose":"The information system provides a warning to {{ insert: param, au-5.1_prm_1 }} within {{ insert: param, au-5.1_prm_2 }} when allocated audit record storage volume reaches {{ insert: param, au-5.1_prm_3 }} of repository maximum audit record storage capacity."},{"id":"au-5.1_gdn","name":"guidance","prose":"Organizations may have multiple audit data storage repositories distributed across multiple information system components, with each repository having different storage volume capacities."},{"id":"au-5.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-5.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-5(1)[1]"}],"prose":"the organization defines:","parts":[{"id":"au-5.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AU-5(1)[1][a]"}],"prose":"personnel to be warned when allocated audit record storage volume reaches organization-defined percentage of repository maximum audit record storage capacity;"},{"id":"au-5.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AU-5(1)[1][b]"}],"prose":"roles to be warned when allocated audit record storage volume reaches organization-defined percentage of repository maximum audit record storage capacity; and\/or"},{"id":"au-5.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AU-5(1)[1][c]"}],"prose":"locations to be warned when allocated audit record storage volume reaches organization-defined percentage of repository maximum audit record storage capacity;"}]},{"id":"au-5.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-5(1)[2]"}],"prose":"the organization defines the time period within which the information system is to provide a warning to the organization-defined personnel, roles, and\/or locations when allocated audit record storage volume reaches the organization-defined percentage of repository maximum audit record storage capacity;"},{"id":"au-5.1_obj.3","name":"objective","props":[{"name":"label","value":"AU-5(1)[3]"}],"prose":"the organization defines the percentage of repository maximum audit record storage capacity that, if reached, requires a warning to be provided; and"},{"id":"au-5.1_obj.4","name":"objective","props":[{"name":"label","value":"AU-5(1)[4]"}],"prose":"the information system provides a warning to the organization-defined personnel, roles, and\/or locations within the organization-defined time period when allocated audit record storage volume reaches the organization-defined percentage of repository maximum audit record storage capacity."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing response to audit processing failures\n\ninformation system design documentation\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing audit storage limit warnings"}]}]},{"id":"au-5.2","class":"SP800-53-enhancement","title":"Real-time Alerts","params":[{"id":"au-5.2_prm_1","label":"organization-defined real-time period"},{"id":"au-5.2_prm_2","label":"organization-defined personnel, roles, and\/or locations"},{"id":"au-5.2_prm_3","label":"organization-defined audit failure events requiring real-time alerts"}],"props":[{"name":"label","value":"AU-5(2)"},{"name":"sort-id","value":"au-05.02"}],"parts":[{"id":"au-5.2_smt","name":"statement","prose":"The information system provides an alert in {{ insert: param, au-5.2_prm_1 }} to {{ insert: param, au-5.2_prm_2 }} when the following audit failure events occur: {{ insert: param, au-5.2_prm_3 }}."},{"id":"au-5.2_gdn","name":"guidance","prose":"Alerts provide organizations with urgent messages. Real-time alerts provide these messages at information technology speed (i.e., the time from event detection to alert occurs in seconds or less)."},{"id":"au-5.2_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-5.2_obj.1","name":"objective","props":[{"name":"label","value":"AU-5(2)[1]"}],"prose":"the organization defines audit failure events requiring real-time alerts;"},{"id":"au-5.2_obj.2","name":"objective","props":[{"name":"label","value":"AU-5(2)[2]"}],"prose":"the organization defines:","parts":[{"id":"au-5.2_obj.2.a","name":"objective","props":[{"name":"label","value":"AU-5(2)[2][a]"}],"prose":"personnel to be alerted when organization-defined audit failure events requiring real-time alerts occur;"},{"id":"au-5.2_obj.2.b","name":"objective","props":[{"name":"label","value":"AU-5(2)[2][b]"}],"prose":"roles to be alerted when organization-defined audit failure events requiring real-time alerts occur; and\/or"},{"id":"au-5.2_obj.2.c","name":"objective","props":[{"name":"label","value":"AU-5(2)[2][c]"}],"prose":"locations to be alerted when organization-defined audit failure events requiring real-time alerts occur;"}]},{"id":"au-5.2_obj.3","name":"objective","props":[{"name":"label","value":"AU-5(2)[3]"}],"prose":"the organization defines the real-time period within which the information system is to provide an alert to the organization-defined personnel, roles, and\/or locations when the organization-defined audit failure events requiring real-time alerts occur; and"},{"id":"au-5.2_obj.4","name":"objective","props":[{"name":"label","value":"AU-5(2)[4]"}],"prose":"the information system provides an alert within the organization-defined real-time period to the organization-defined personnel, roles, and\/or locations when organization-defined audit failure events requiring real-time alerts occur."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing response to audit processing failures\n\ninformation system design documentation\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\nrecords of notifications or real-time alerts when audit processing failures occur\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing real-time audit alerts when organization-defined audit failure events occur"}]}]}]},{"id":"au-6","class":"SP800-53","title":"Audit Review, Analysis, and Reporting","params":[{"id":"au-6_prm_1","label":"organization-defined frequency"},{"id":"au-6_prm_2","label":"organization-defined inappropriate or unusual activity"},{"id":"au-6_prm_3","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-6"},{"name":"sort-id","value":"au-06"}],"parts":[{"id":"au-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"au-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Reviews and analyzes information system audit records {{ insert: param, au-6_prm_1 }} for indications of {{ insert: param, au-6_prm_2 }}; and"},{"id":"au-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reports findings to {{ insert: param, au-6_prm_3 }}."}]},{"id":"au-6_gdn","name":"guidance","prose":"Audit review, analysis, and reporting covers information security-related auditing performed by organizations including, for example, auditing that results from monitoring of account usage, remote access, wireless connectivity, mobile device connection, configuration settings, system component inventory, use of maintenance tools and nonlocal maintenance, physical access, temperature and humidity, equipment delivery and removal, communications at the information system boundaries, use of mobile code, and use of VoIP. Findings can be reported to organizational entities that include, for example, incident response team, help desk, information security group\/department. If organizations are prohibited from reviewing and analyzing audit information or unable to conduct such activities (e.g., in certain national security applications or systems), the review\/analysis may be carried out by other organizations granted such authority.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#au-7","rel":"related"},{"href":"#au-16","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-10","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ir-5","rel":"related"},{"href":"#ir-6","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-6","rel":"related"},{"href":"#pe-14","rel":"related"},{"href":"#pe-16","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-18","rel":"related"},{"href":"#sc-19","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"au-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-6.a_obj","name":"objective","props":[{"name":"label","value":"AU-6(a)"}],"parts":[{"id":"au-6.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-6(a)[1]"}],"prose":"defines the types of inappropriate or unusual activity to look for when information system audit records are reviewed and analyzed;"},{"id":"au-6.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-6(a)[2]"}],"prose":"defines the frequency to review and analyze information system audit records for indications of organization-defined inappropriate or unusual activity;"},{"id":"au-6.a_obj.3","name":"objective","props":[{"name":"label","value":"AU-6(a)[3]"}],"prose":"reviews and analyzes information system audit records for indications of organization-defined inappropriate or unusual activity with the organization-defined frequency;"}]},{"id":"au-6.b_obj","name":"objective","props":[{"name":"label","value":"AU-6(b)"}],"parts":[{"id":"au-6.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-6(b)[1]"}],"prose":"defines personnel or roles to whom findings resulting from reviews and analysis of information system audit records are to be reported; and"},{"id":"au-6.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-6(b)[2]"}],"prose":"reports findings to organization-defined personnel or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit review, analysis, and reporting\n\nreports of audit findings\n\nrecords of actions taken in response to reviews\/analyses of audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit review, analysis, and reporting responsibilities\n\norganizational personnel with information security responsibilities"}]}],"controls":[{"id":"au-6.1","class":"SP800-53-enhancement","title":"Process Integration","props":[{"name":"label","value":"AU-6(1)"},{"name":"sort-id","value":"au-06.01"}],"parts":[{"id":"au-6.1_smt","name":"statement","prose":"The organization employs automated mechanisms to integrate audit review, analysis, and reporting processes to support organizational processes for investigation and response to suspicious activities."},{"id":"au-6.1_gdn","name":"guidance","prose":"Organizational processes benefiting from integrated audit review, analysis, and reporting include, for example, incident response, continuous monitoring, contingency planning, and Inspector General audits.","links":[{"href":"#au-12","rel":"related"},{"href":"#pm-7","rel":"related"}]},{"id":"au-6.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-6.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-6(1)[1]"}],"prose":"employs automated mechanisms to integrate:","parts":[{"id":"au-6.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AU-6(1)[1][a]"}],"prose":"audit review;"},{"id":"au-6.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AU-6(1)[1][b]"}],"prose":"analysis;"},{"id":"au-6.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AU-6(1)[1][c]"}],"prose":"reporting processes;"}]},{"id":"au-6.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-6(1)[2]"}],"prose":"uses integrated audit review, analysis and reporting processes to support organizational processes for:","parts":[{"id":"au-6.1_obj.2.a","name":"objective","props":[{"name":"label","value":"AU-6(1)[2][a]"}],"prose":"investigation of suspicious activities; and"},{"id":"au-6.1_obj.2.b","name":"objective","props":[{"name":"label","value":"AU-6(1)[2][b]"}],"prose":"response to suspicious activities."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit review, analysis, and reporting\n\nprocedures addressing investigation and response to suspicious activities\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit review, analysis, and reporting responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms integrating audit review, analysis, and reporting processes"}]}]},{"id":"au-6.3","class":"SP800-53-enhancement","title":"Correlate Audit Repositories","props":[{"name":"label","value":"AU-6(3)"},{"name":"sort-id","value":"au-06.03"}],"parts":[{"id":"au-6.3_smt","name":"statement","prose":"The organization analyzes and correlates audit records across different repositories to gain organization-wide situational awareness."},{"id":"au-6.3_gdn","name":"guidance","prose":"Organization-wide situational awareness includes awareness across all three tiers of risk management (i.e., organizational, mission\/business process, and information system) and supports cross-organization awareness.","links":[{"href":"#au-12","rel":"related"},{"href":"#ir-4","rel":"related"}]},{"id":"au-6.3_obj","name":"objective","prose":"Determine if the organization analyzes and correlates audit records across different repositories to gain organization-wide situational awareness."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit review, analysis, and reporting\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records across different repositories\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit review, analysis, and reporting responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting analysis and correlation of audit records"}]}]},{"id":"au-6.5","class":"SP800-53-enhancement","title":"Integration \/ Scanning and Monitoring Capabilities","params":[{"id":"au-6.5_prm_1","select":{"how-many":"one-or-more","choice":["vulnerability scanning information","performance data","information system monitoring information"," {{ insert: param, au-6.5_prm_2 }} "]}},{"id":"au-6.5_prm_2","depends-on":"au-6.5_prm_1","label":"organization-defined data\/information collected from other sources"}],"props":[{"name":"label","value":"AU-6(5)"},{"name":"sort-id","value":"au-06.05"}],"parts":[{"id":"au-6.5_smt","name":"statement","prose":"The organization integrates analysis of audit records with analysis of {{ insert: param, au-6.5_prm_1 }} to further enhance the ability to identify inappropriate or unusual activity."},{"id":"au-6.5_gdn","name":"guidance","prose":"This control enhancement does not require vulnerability scanning, the generation of performance data, or information system monitoring. Rather, the enhancement requires that the analysis of information being otherwise produced in these areas is integrated with the analysis of audit information. Security Event and Information Management System tools can facilitate audit record aggregation\/consolidation from multiple information system components as well as audit record correlation and analysis. The use of standardized audit record analysis scripts developed by organizations (with localized script adjustments, as necessary) provides more cost-effective approaches for analyzing audit record information collected. The correlation of audit record information with vulnerability scanning information is important in determining the veracity of vulnerability scans and correlating attack detection events with scanning results. Correlation with performance data can help uncover denial of service attacks or cyber attacks resulting in unauthorized use of resources. Correlation with system monitoring information can assist in uncovering attacks and in better relating audit information to operational situations.","links":[{"href":"#au-12","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ra-5","rel":"related"}]},{"id":"au-6.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-6.5_obj.1","name":"objective","props":[{"name":"label","value":"AU-6(5)[1]"}],"prose":"defines data\/information to be collected from other sources;"},{"id":"au-6.5_obj.2","name":"objective","props":[{"name":"label","value":"AU-6(5)[2]"}],"prose":"selects sources of data\/information to be analyzed and integrated with the analysis of audit records from one or more of the following:","parts":[{"id":"au-6.5_obj.2.a","name":"objective","props":[{"name":"label","value":"AU-6(5)[2][a]"}],"prose":"vulnerability scanning information;"},{"id":"au-6.5_obj.2.b","name":"objective","props":[{"name":"label","value":"AU-6(5)[2][b]"}],"prose":"performance data;"},{"id":"au-6.5_obj.2.c","name":"objective","props":[{"name":"label","value":"AU-6(5)[2][c]"}],"prose":"information system monitoring information; and\/or"},{"id":"au-6.5_obj.2.d","name":"objective","props":[{"name":"label","value":"AU-6(5)[2][d]"}],"prose":"organization-defined data\/information collected from other sources; and"}]},{"id":"au-6.5_obj.3","name":"objective","props":[{"name":"label","value":"AU-6(5)[3]"}],"prose":"integrates the analysis of audit records with the analysis of selected data\/information to further enhance the ability to identify inappropriate or unusual activity."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit review, analysis, and reporting\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nintegrated analysis of audit records, vulnerability scanning information, performance data, network monitoring information and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit review, analysis, and reporting responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing capability to integrate analysis of audit records with analysis of data\/information sources"}]}]},{"id":"au-6.6","class":"SP800-53-enhancement","title":"Correlation with Physical Monitoring","props":[{"name":"label","value":"AU-6(6)"},{"name":"sort-id","value":"au-06.06"}],"parts":[{"id":"au-6.6_smt","name":"statement","prose":"The organization correlates information from audit records with information obtained from monitoring physical access to further enhance the ability to identify suspicious, inappropriate, unusual, or malevolent activity."},{"id":"au-6.6_gdn","name":"guidance","prose":"The correlation of physical audit information and audit logs from information systems may assist organizations in identifying examples of suspicious behavior or supporting evidence of such behavior. For example, the correlation of an individual’s identity for logical access to certain information systems with the additional physical security information that the individual was actually present at the facility when the logical access occurred, may prove to be useful in investigations."},{"id":"au-6.6_obj","name":"objective","prose":"Determine if the organization correlates information from audit records with information obtained from monitoring physical access to enhance the ability to identify suspicious, inappropriate, unusual, or malevolent activity."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit review, analysis, and reporting\n\nprocedures addressing physical access monitoring\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ndocumentation providing evidence of correlated information obtained from audit records and physical access monitoring records\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit review, analysis, and reporting responsibilities\n\norganizational personnel with physical access monitoring responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing capability to correlate information from audit records with information from monitoring physical access"}]}]}]},{"id":"au-7","class":"SP800-53","title":"Audit Reduction and Report Generation","props":[{"name":"priority","value":"P2"},{"name":"label","value":"AU-7"},{"name":"sort-id","value":"au-07"}],"parts":[{"id":"au-7_smt","name":"statement","prose":"The information system provides an audit reduction and report generation capability that:","parts":[{"id":"au-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Supports on-demand audit review, analysis, and reporting requirements and after-the-fact investigations of security incidents; and"},{"id":"au-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Does not alter the original content or time ordering of audit records."}]},{"id":"au-7_gdn","name":"guidance","prose":"Audit reduction is a process that manipulates collected audit information and organizes such information in a summary format that is more meaningful to analysts. Audit reduction and report generation capabilities do not always emanate from the same information system or from the same organizational entities conducting auditing activities. Audit reduction capability can include, for example, modern data mining techniques with advanced data filters to identify anomalous behavior in audit records. The report generation capability provided by the information system can generate customizable reports. Time ordering of audit records can be a significant issue if the granularity of the timestamp in the record is insufficient.","links":[{"href":"#au-6","rel":"related"}]},{"id":"au-7_obj","name":"objective","prose":"Determine if the information system provides an audit reduction and report generation capability that supports:","parts":[{"id":"au-7.a_obj","name":"objective","props":[{"name":"label","value":"AU-7(a)"}],"parts":[{"id":"au-7.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-7(a)[1]"}],"prose":"on-demand audit review;"},{"id":"au-7.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-7(a)[2]"}],"prose":"analysis;"},{"id":"au-7.a_obj.3","name":"objective","props":[{"name":"label","value":"AU-7(a)[3]"}],"prose":"reporting requirements;"},{"id":"au-7.a_obj.4","name":"objective","props":[{"name":"label","value":"AU-7(a)[4]"}],"prose":"after-the-fact investigations of security incidents; and"}]},{"id":"au-7.b_obj","name":"objective","props":[{"name":"label","value":"AU-7(b)"}],"prose":"does not alter the original content or time ordering of audit records."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit reduction and report generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit reduction, review, analysis, and reporting tools\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit reduction and report generation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Audit reduction and report generation capability"}]}],"controls":[{"id":"au-7.1","class":"SP800-53-enhancement","title":"Automatic Processing","params":[{"id":"au-7.1_prm_1","label":"organization-defined audit fields within audit records"}],"props":[{"name":"label","value":"AU-7(1)"},{"name":"sort-id","value":"au-07.01"}],"parts":[{"id":"au-7.1_smt","name":"statement","prose":"The information system provides the capability to process audit records for events of interest based on {{ insert: param, au-7.1_prm_1 }}."},{"id":"au-7.1_gdn","name":"guidance","prose":"Events of interest can be identified by the content of specific audit record fields including, for example, identities of individuals, event types, event locations, event times, event dates, system resources involved, IP addresses involved, or information objects accessed. Organizations may define audit event criteria to any degree of granularity required, for example, locations selectable by general networking location (e.g., by network or subnetwork) or selectable by specific information system component.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"}]},{"id":"au-7.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-7.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-7(1)[1]"}],"prose":"the organization defines audit fields within audit records in order to process audit records for events of interest; and"},{"id":"au-7.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-7(1)[2]"}],"prose":"the information system provides the capability to process audit records for events of interest based on the organization-defined audit fields within audit records."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit reduction and report generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit reduction, review, analysis, and reporting tools\n\naudit record criteria (fields) establishing events of interest\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit reduction and report generation responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Audit reduction and report generation capability"}]}]}]},{"id":"au-8","class":"SP800-53","title":"Time Stamps","params":[{"id":"au-8_prm_1","label":"organization-defined granularity of time measurement"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-8"},{"name":"sort-id","value":"au-08"}],"parts":[{"id":"au-8_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Uses internal system clocks to generate time stamps for audit records; and"},{"id":"au-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT) and meets {{ insert: param, au-8_prm_1 }}."}]},{"id":"au-8_gdn","name":"guidance","prose":"Time stamps generated by the information system include date and time. Time is commonly expressed in Coordinated Universal Time (UTC), a modern continuation of Greenwich Mean Time (GMT), or local time with an offset from UTC. Granularity of time measurements refers to the degree of synchronization between information system clocks and reference clocks, for example, clocks synchronizing within hundreds of milliseconds or within tens of milliseconds. Organizations may define different time granularities for different system components. Time service can also be critical to other security capabilities such as access control and identification and authentication, depending on the nature of the mechanisms used to support those capabilities.","links":[{"href":"#au-3","rel":"related"},{"href":"#au-12","rel":"related"}]},{"id":"au-8_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-8.a_obj","name":"objective","props":[{"name":"label","value":"AU-8(a)"}],"prose":"the information system uses internal system clocks to generate time stamps for audit records;"},{"id":"au-8.b_obj","name":"objective","props":[{"name":"label","value":"AU-8(b)"}],"parts":[{"id":"au-8.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-8(b)[1]"}],"prose":"the information system records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT);"},{"id":"au-8.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-8(b)[2]"}],"prose":"the organization defines the granularity of time measurement to be met when recording time stamps for audit records; and"},{"id":"au-8.b_obj.3","name":"objective","props":[{"name":"label","value":"AU-8(b)[3]"}],"prose":"the organization records time stamps for audit records that meet the organization-defined granularity of time measurement."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing time stamp generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing time stamp generation"}]}],"controls":[{"id":"au-8.1","class":"SP800-53-enhancement","title":"Synchronization with Authoritative Time Source","params":[{"id":"au-8.1_prm_1","label":"organization-defined frequency"},{"id":"au-8.1_prm_2","label":"organization-defined authoritative time source"},{"id":"au-8.1_prm_3","label":"organization-defined time period"}],"props":[{"name":"label","value":"AU-8(1)"},{"name":"sort-id","value":"au-08.01"}],"parts":[{"id":"au-8.1_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-8.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Compares the internal information system clocks {{ insert: param, au-8.1_prm_1 }} with {{ insert: param, au-8.1_prm_2 }}; and"},{"id":"au-8.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Synchronizes the internal system clocks to the authoritative time source when the time difference is greater than {{ insert: param, au-8.1_prm_3 }}."}]},{"id":"au-8.1_gdn","name":"guidance","prose":"This control enhancement provides uniformity of time stamps for information systems with multiple system clocks and systems connected over a network."},{"id":"au-8.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-8.1.a_obj","name":"objective","props":[{"name":"label","value":"AU-8(1)(a)"}],"parts":[{"id":"au-8.1.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-8(1)(a)[1]"}],"prose":"the organization defines the authoritative time source to which internal information system clocks are to be compared;"},{"id":"au-8.1.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-8(1)(a)[2]"}],"prose":"the organization defines the frequency to compare the internal information system clocks with the organization-defined authoritative time source; and"},{"id":"au-8.1.a_obj.3","name":"objective","props":[{"name":"label","value":"AU-8(1)(a)[3]"}],"prose":"the information system compares the internal information system clocks with the organization-defined authoritative time source with organization-defined frequency; and"}],"links":[{"href":"#au-8.1_smt.a","rel":"corresp"}]},{"id":"au-8.1.b_obj","name":"objective","props":[{"name":"label","value":"AU-8(1)(b)"}],"parts":[{"id":"au-8.1.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-8(1)(b)[1]"}],"prose":"the organization defines the time period that, if exceeded by the time difference between the internal system clocks and the authoritative time source, will result in the internal system clocks being synchronized to the authoritative time source; and"},{"id":"au-8.1.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-8(1)(b)[2]"}],"prose":"the information system synchronizes the internal information system clocks to the authoritative time source when the time difference is greater than the organization-defined time period."}],"links":[{"href":"#au-8.1_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing time stamp generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing internal information system clock synchronization"}]}]}]},{"id":"au-9","class":"SP800-53","title":"Protection of Audit Information","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-9"},{"name":"sort-id","value":"au-09"}],"parts":[{"id":"au-9_smt","name":"statement","prose":"The information system protects audit information and audit tools from unauthorized access, modification, and deletion."},{"id":"au-9_gdn","name":"guidance","prose":"Audit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully audit information system activity. This control focuses on technical protection of audit information. Physical protection of audit information is addressed by media protection controls and physical and environmental protection controls.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-6","rel":"related"}]},{"id":"au-9_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-9_obj.1","name":"objective","props":[{"name":"label","value":"AU-9[1]"}],"prose":"the information system protects audit information from unauthorized:","parts":[{"id":"au-9_obj.1.a","name":"objective","props":[{"name":"label","value":"AU-9[1][a]"}],"prose":"access;"},{"id":"au-9_obj.1.b","name":"objective","props":[{"name":"label","value":"AU-9[1][b]"}],"prose":"modification;"},{"id":"au-9_obj.1.c","name":"objective","props":[{"name":"label","value":"AU-9[1][c]"}],"prose":"deletion;"}]},{"id":"au-9_obj.2","name":"objective","props":[{"name":"label","value":"AU-9[2]"}],"prose":"the information system protects audit tools from unauthorized:","parts":[{"id":"au-9_obj.2.a","name":"objective","props":[{"name":"label","value":"AU-9[2][a]"}],"prose":"access;"},{"id":"au-9_obj.2.b","name":"objective","props":[{"name":"label","value":"AU-9[2][b]"}],"prose":"modification; and"},{"id":"au-9_obj.2.c","name":"objective","props":[{"name":"label","value":"AU-9[2][c]"}],"prose":"deletion."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\naccess control policy and procedures\n\nprocedures addressing protection of audit information\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation, information system audit records\n\naudit tools\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing audit information protection"}]}],"controls":[{"id":"au-9.2","class":"SP800-53-enhancement","title":"Audit Backup On Separate Physical Systems \/ Components","params":[{"id":"au-9.2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"AU-9(2)"},{"name":"sort-id","value":"au-09.02"}],"parts":[{"id":"au-9.2_smt","name":"statement","prose":"The information system backs up audit records {{ insert: param, au-9.2_prm_1 }} onto a physically different system or system component than the system or component being audited."},{"id":"au-9.2_gdn","name":"guidance","prose":"This control enhancement helps to ensure that a compromise of the information system being audited does not also result in a compromise of the audit records.","links":[{"href":"#au-4","rel":"related"},{"href":"#au-5","rel":"related"},{"href":"#au-11","rel":"related"}]},{"id":"au-9.2_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-9.2_obj.1","name":"objective","props":[{"name":"label","value":"AU-9(2)[1]"}],"prose":"the organization defines the frequency to back up audit records onto a physically different system or system component than the system or component being audited; and"},{"id":"au-9.2_obj.2","name":"objective","props":[{"name":"label","value":"AU-9(2)[2]"}],"prose":"the information system backs up audit records with the organization-defined frequency, onto a physically different system or system component than the system or component being audited."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing protection of audit information\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation, system or media storing backups of information system audit records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing the backing up of audit records"}]}]},{"id":"au-9.3","class":"SP800-53-enhancement","title":"Cryptographic Protection","props":[{"name":"label","value":"AU-9(3)"},{"name":"sort-id","value":"au-09.03"}],"parts":[{"id":"au-9.3_smt","name":"statement","prose":"The information system implements cryptographic mechanisms to protect the integrity of audit information and audit tools."},{"id":"au-9.3_gdn","name":"guidance","prose":"Cryptographic mechanisms used for protecting the integrity of audit information include, for example, signed hash functions using asymmetric cryptography enabling distribution of the public key to verify the hash information while maintaining the confidentiality of the secret key used to generate the hash.","links":[{"href":"#au-10","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"au-9.3_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"au-9.3_obj.1","name":"objective","props":[{"name":"label","value":"AU-9(3)[1]"}],"prose":"uses cryptographic mechanisms to protect the integrity of audit information; and"},{"id":"au-9.3_obj.2","name":"objective","props":[{"name":"label","value":"AU-9(3)[2]"}],"prose":"uses cryptographic mechanisms to protect the integrity of audit tools."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\naccess control policy and procedures\n\nprocedures addressing protection of audit information\n\ninformation system design documentation\n\ninformation system hardware settings\n\ninformation system configuration settings and associated documentation, information system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Cryptographic mechanisms protecting integrity of audit information and tools"}]}]},{"id":"au-9.4","class":"SP800-53-enhancement","title":"Access by Subset of Privileged Users","params":[{"id":"au-9.4_prm_1","label":"organization-defined subset of privileged users"}],"props":[{"name":"label","value":"AU-9(4)"},{"name":"sort-id","value":"au-09.04"}],"parts":[{"id":"au-9.4_smt","name":"statement","prose":"The organization authorizes access to management of audit functionality to only {{ insert: param, au-9.4_prm_1 }}."},{"id":"au-9.4_gdn","name":"guidance","prose":"Individuals with privileged access to an information system and who are also the subject of an audit by that system, may affect the reliability of audit information by inhibiting audit activities or modifying audit records. This control enhancement requires that privileged access be further defined between audit-related privileges and other privileges, thus limiting the users with audit-related privileges.","links":[{"href":"#ac-5","rel":"related"}]},{"id":"au-9.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-9.4_obj.1","name":"objective","props":[{"name":"label","value":"AU-9(4)[1]"}],"prose":"defines a subset of privileged users to be authorized access to management of audit functionality; and"},{"id":"au-9.4_obj.2","name":"objective","props":[{"name":"label","value":"AU-9(4)[2]"}],"prose":"authorizes access to management of audit functionality to only the organization-defined subset of privileged users."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\naccess control policy and procedures\n\nprocedures addressing protection of audit information\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation, system-generated list of privileged users with access to management of audit functionality\n\naccess authorizations\n\naccess control list\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms managing access to audit functionality"}]}]}]},{"id":"au-10","class":"SP800-53","title":"Non-repudiation","params":[{"id":"au-10_prm_1","label":"organization-defined actions to be covered by non-repudiation"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"AU-10"},{"name":"sort-id","value":"au-10"}],"parts":[{"id":"au-10_smt","name":"statement","prose":"The information system protects against an individual (or process acting on behalf of an individual) falsely denying having performed {{ insert: param, au-10_prm_1 }}."},{"id":"au-10_gdn","name":"guidance","prose":"Types of individual actions covered by non-repudiation include, for example, creating information, sending and receiving messages, approving information (e.g., indicating concurrence or signing a contract). Non-repudiation protects individuals against later claims by: (i) authors of not having authored particular documents; (ii) senders of not having transmitted messages; (iii) receivers of not having received messages; or (iv) signatories of not having signed documents. Non-repudiation services can be used to determine if information originated from a particular individual, or if an individual took specific actions (e.g., sending an email, signing a contract, approving a procurement request) or received specific information. Organizations obtain non-repudiation services by employing various techniques or mechanisms (e.g., digital signatures, digital message receipts).","links":[{"href":"#sc-12","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-16","rel":"related"},{"href":"#sc-17","rel":"related"},{"href":"#sc-23","rel":"related"}]},{"id":"au-10_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-10_obj.1","name":"objective","props":[{"name":"label","value":"AU-10[1]"}],"prose":"the organization defines actions to be covered by non-repudiation; and"},{"id":"au-10_obj.2","name":"objective","props":[{"name":"label","value":"AU-10[2]"}],"prose":"the information system protects against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing non-repudiation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing non-repudiation capability"}]}]},{"id":"au-11","class":"SP800-53","title":"Audit Record Retention","params":[{"id":"au-11_prm_1","label":"organization-defined time period consistent with records retention policy"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AU-11"},{"name":"sort-id","value":"au-11"}],"parts":[{"id":"au-11_smt","name":"statement","prose":"The organization retains audit records for {{ insert: param, au-11_prm_1 }} to provide support for after-the-fact investigations of security incidents and to meet regulatory and organizational information retention requirements."},{"id":"au-11_gdn","name":"guidance","prose":"Organizations retain audit records until it is determined that they are no longer needed for administrative, legal, audit, or other operational purposes. This includes, for example, retention and availability of audit records relative to Freedom of Information Act (FOIA) requests, subpoenas, and law enforcement actions. Organizations develop standard categories of audit records relative to such types of actions and standard response processes for each type of action. The National Archives and Records Administration (NARA) General Records Schedules provide federal policy on record retention.","links":[{"href":"#au-4","rel":"related"},{"href":"#au-5","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#mp-6","rel":"related"}]},{"id":"au-11_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-11_obj.1","name":"objective","props":[{"name":"label","value":"AU-11[1]"}],"prose":"defines a time period to retain audit records that is consistent with records retention policy;"},{"id":"au-11_obj.2","name":"objective","props":[{"name":"label","value":"AU-11[2]"}],"prose":"retains audit records for the organization-defined time period consistent with records retention policy to:","parts":[{"id":"au-11_obj.2.a","name":"objective","props":[{"name":"label","value":"AU-11[2][a]"}],"prose":"provide support for after-the-fact investigations of security incidents; and"},{"id":"au-11_obj.2.b","name":"objective","props":[{"name":"label","value":"AU-11[2][b]"}],"prose":"meet regulatory and organizational information retention requirements."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\naudit record retention policy and procedures\n\nsecurity plan\n\norganization-defined retention period for audit records\n\naudit record archives\n\naudit logs\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit record retention responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]}]},{"id":"au-12","class":"SP800-53","title":"Audit Generation","params":[{"id":"au-12_prm_1","label":"organization-defined information system components"},{"id":"au-12_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-12"},{"name":"sort-id","value":"au-12"}],"parts":[{"id":"au-12_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-12_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Provides audit record generation capability for the auditable events defined in AU-2 a. at {{ insert: param, au-12_prm_1 }};"},{"id":"au-12_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Allows {{ insert: param, au-12_prm_2 }} to select which auditable events are to be audited by specific components of the information system; and"},{"id":"au-12_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Generates audit records for the events defined in AU-2 d. with the content defined in AU-3."}]},{"id":"au-12_gdn","name":"guidance","prose":"Audit records can be generated from many different information system components. The list of audited events is the set of events for which audits are to be generated. These events are typically a subset of all events for which the information system is capable of generating audit records.","links":[{"href":"#ac-3","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"}]},{"id":"au-12_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-12.a_obj","name":"objective","props":[{"name":"label","value":"AU-12(a)"}],"parts":[{"id":"au-12.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-12(a)[1]"}],"prose":"the organization defines the information system components which are to provide audit record generation capability for the auditable events defined in AU-2a;"},{"id":"au-12.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-12(a)[2]"}],"prose":"the information system provides audit record generation capability, for the auditable events defined in AU-2a, at organization-defined information system components;"}]},{"id":"au-12.b_obj","name":"objective","props":[{"name":"label","value":"AU-12(b)"}],"parts":[{"id":"au-12.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-12(b)[1]"}],"prose":"the organization defines the personnel or roles allowed to select which auditable events are to be audited by specific components of the information system;"},{"id":"au-12.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-12(b)[2]"}],"prose":"the information system allows the organization-defined personnel or roles to select which auditable events are to be audited by specific components of the system; and"}]},{"id":"au-12.c_obj","name":"objective","props":[{"name":"label","value":"AU-12(c)"}],"prose":"the information system generates audit records for the events defined in AU-2d with the content in defined in AU-3."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit record generation\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of auditable events\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit record generation responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing audit record generation capability"}]}],"controls":[{"id":"au-12.1","class":"SP800-53-enhancement","title":"System-wide \/ Time-correlated Audit Trail","params":[{"id":"au-12.1_prm_1","label":"organization-defined information system components"},{"id":"au-12.1_prm_2","label":"organization-defined level of tolerance for the relationship between time stamps of individual records in the audit trail"}],"props":[{"name":"label","value":"AU-12(1)"},{"name":"sort-id","value":"au-12.01"}],"parts":[{"id":"au-12.1_smt","name":"statement","prose":"The information system compiles audit records from {{ insert: param, au-12.1_prm_1 }} into a system-wide (logical or physical) audit trail that is time-correlated to within {{ insert: param, au-12.1_prm_2 }}."},{"id":"au-12.1_gdn","name":"guidance","prose":"Audit trails are time-correlated if the time stamps in the individual audit records can be reliably related to the time stamps in other audit records to achieve a time ordering of the records within organizational tolerances.","links":[{"href":"#au-8","rel":"related"},{"href":"#au-12","rel":"related"}]},{"id":"au-12.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-12.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-12(1)[1]"}],"prose":"the organization defines the information system components from which audit records are to be compiled into a system-wide (logical or physical) audit trail;"},{"id":"au-12.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-12(1)[2]"}],"prose":"the organization defines the level of tolerance for the relationship between time stamps of individual records in the audit trail; and"},{"id":"au-12.1_obj.3","name":"objective","props":[{"name":"label","value":"AU-12(1)[3]"}],"prose":"the information system compiles audit records from organization-defined information system components into a system-wide (logical or physical) audit trail that is time-correlated to within the organization-defined level of tolerance for the relationship between time stamps of individual records in the audit trail."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit record generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsystem-wide audit trail (logical or physical)\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit record generation responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing audit record generation capability"}]}]},{"id":"au-12.3","class":"SP800-53-enhancement","title":"Changes by Authorized Individuals","params":[{"id":"au-12.3_prm_1","label":"organization-defined individuals or roles"},{"id":"au-12.3_prm_2","label":"organization-defined information system components"},{"id":"au-12.3_prm_3","label":"organization-defined selectable event criteria"},{"id":"au-12.3_prm_4","label":"organization-defined time thresholds"}],"props":[{"name":"label","value":"AU-12(3)"},{"name":"sort-id","value":"au-12.03"}],"parts":[{"id":"au-12.3_smt","name":"statement","prose":"The information system provides the capability for {{ insert: param, au-12.3_prm_1 }} to change the auditing to be performed on {{ insert: param, au-12.3_prm_2 }} based on {{ insert: param, au-12.3_prm_3 }} within {{ insert: param, au-12.3_prm_4 }}."},{"id":"au-12.3_gdn","name":"guidance","prose":"This control enhancement enables organizations to extend or limit auditing as necessary to meet organizational requirements. Auditing that is limited to conserve information system resources may be extended to address certain threat situations. In addition, auditing may be limited to a specific set of events to facilitate audit reduction, analysis, and reporting. Organizations can establish time thresholds in which audit actions are changed, for example, near real-time, within minutes, or within hours.","links":[{"href":"#au-7","rel":"related"}]},{"id":"au-12.3_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-12.3_obj.1","name":"objective","props":[{"name":"label","value":"AU-12(3)[1]"}],"prose":"the organization defines information system components on which auditing is to be performed;"},{"id":"au-12.3_obj.2","name":"objective","props":[{"name":"label","value":"AU-12(3)[2]"}],"prose":"the organization defines individuals or roles authorized to change the auditing to be performed on organization-defined information system components;"},{"id":"au-12.3_obj.3","name":"objective","props":[{"name":"label","value":"AU-12(3)[3]"}],"prose":"the organization defines time thresholds within which organization-defined individuals or roles can change the auditing to be performed on organization-defined information system components;"},{"id":"au-12.3_obj.4","name":"objective","props":[{"name":"label","value":"AU-12(3)[4]"}],"prose":"the organization defines selectable event criteria that support the capability for organization-defined individuals or roles to change the auditing to be performed on organization-defined information system components; and"},{"id":"au-12.3_obj.5","name":"objective","props":[{"name":"label","value":"AU-12(3)[5]"}],"prose":"the information system provides the capability for organization-defined individuals or roles to change the auditing to be performed on organization-defined information system components based on organization-defined selectable event criteria within organization-defined time thresholds."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit record generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsystem-generated list of individuals or roles authorized to change auditing to be performed\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit record generation responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing audit record generation capability"}]}]}]}]},{"id":"ca","class":"family","title":"Security Assessment and Authorization","controls":[{"id":"ca-1","class":"SP800-53","title":"Security Assessment and Authorization Policy and Procedures","params":[{"id":"ca-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ca-1_prm_2","label":"organization-defined frequency"},{"id":"ca-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CA-1"},{"name":"sort-id","value":"ca-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ca-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ca-1_prm_1 }}:","parts":[{"id":"ca-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ca-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the security assessment and authorization policy and associated security assessment and authorization controls; and"}]},{"id":"ca-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ca-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security assessment and authorization policy {{ insert: param, ca-1_prm_2 }}; and"},{"id":"ca-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Security assessment and authorization procedures {{ insert: param, ca-1_prm_3 }}."}]}]},{"id":"ca-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the CA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ca-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-1.a_obj","name":"objective","props":[{"name":"label","value":"CA-1(a)"}],"parts":[{"id":"ca-1.a.1_obj","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)"}],"parts":[{"id":"ca-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1]"}],"prose":"develops and documents a security assessment and authorization policy that addresses:","parts":[{"id":"ca-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ca-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ca-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ca-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ca-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ca-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ca-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ca-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the security assessment and authorization policy is to be disseminated;"},{"id":"ca-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[3]"}],"prose":"disseminates the security assessment and authorization policy to organization-defined personnel or roles;"}]},{"id":"ca-1.a.2_obj","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)"}],"parts":[{"id":"ca-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the security assessment and authorization policy and associated assessment and authorization controls;"},{"id":"ca-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ca-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ca-1.b_obj","name":"objective","props":[{"name":"label","value":"CA-1(b)"}],"parts":[{"id":"ca-1.b.1_obj","name":"objective","props":[{"name":"label","value":"CA-1(b)(1)"}],"parts":[{"id":"ca-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current security assessment and authorization policy;"},{"id":"ca-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(b)(1)[2]"}],"prose":"reviews and updates the current security assessment and authorization policy with the organization-defined frequency;"}]},{"id":"ca-1.b.2_obj","name":"objective","props":[{"name":"label","value":"CA-1(b)(2)"}],"parts":[{"id":"ca-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current security assessment and authorization procedures; and"},{"id":"ca-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(b)(2)[2]"}],"prose":"reviews and updates the current security assessment and authorization procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security assessment and authorization responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ca-2","class":"SP800-53","title":"Security Assessments","params":[{"id":"ca-2_prm_1","label":"organization-defined frequency"},{"id":"ca-2_prm_2","label":"organization-defined individuals or roles"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-2"},{"name":"sort-id","value":"ca-02"}],"links":[{"href":"#c5034e0c-eba6-4ecd-a541-79f0678f4ba4","rel":"reference"},{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"}],"parts":[{"id":"ca-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a security assessment plan that describes the scope of the assessment including:","parts":[{"id":"ca-2_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security controls and control enhancements under assessment;"},{"id":"ca-2_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Assessment procedures to be used to determine security control effectiveness; and"},{"id":"ca-2_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Assessment environment, assessment team, and assessment roles and responsibilities;"}]},{"id":"ca-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Assesses the security controls in the information system and its environment of operation {{ insert: param, ca-2_prm_1 }} to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;"},{"id":"ca-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Produces a security assessment report that documents the results of the assessment; and"},{"id":"ca-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Provides the results of the security control assessment to {{ insert: param, ca-2_prm_2 }}."}]},{"id":"ca-2_gdn","name":"guidance","prose":"Organizations assess security controls in organizational information systems and the environments in which those systems operate as part of: (i) initial and ongoing security authorizations; (ii) FISMA annual assessments; (iii) continuous monitoring; and (iv) system development life cycle activities. Security assessments: (i) ensure that information security is built into organizational information systems; (ii) identify weaknesses and deficiencies early in the development process; (iii) provide essential information needed to make risk-based decisions as part of security authorization processes; and (iv) ensure compliance to vulnerability mitigation procedures. Assessments are conducted on the implemented security controls from Appendix F (main catalog) and Appendix G (Program Management controls) as documented in System Security Plans and Information Security Program Plans. Organizations can use other types of assessment activities such as vulnerability scanning and system monitoring to maintain the security posture of information systems during the entire life cycle. Security assessment reports document assessment results in sufficient detail as deemed necessary by organizations, to determine the accuracy and completeness of the reports and whether the security controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting security requirements. The FISMA requirement for assessing security controls at least annually does not require additional assessment activities to those activities already in place in organizational security authorization processes. Security assessment results are provided to the individuals or roles appropriate for the types of assessments being conducted. For example, assessments conducted in support of security authorization decisions are provided to authorizing officials or authorizing official designated representatives. To satisfy annual assessment requirements, organizations can use assessment results from the following sources: (i) initial or ongoing information system authorizations; (ii) continuous monitoring; or (iii) system development life cycle activities. Organizations ensure that security assessment results are current, relevant to the determination of security control effectiveness, and obtained with the appropriate level of assessor independence. Existing security control assessment results can be reused to the extent that the results are still valid and can also be supplemented with additional assessments as needed. Subsequent to initial authorizations and in accordance with OMB policy, organizations assess security controls during continuous monitoring. Organizations establish the frequency for ongoing security control assessments in accordance with organizational continuous monitoring strategies. Information Assurance Vulnerability Alerts provide useful examples of vulnerability mitigation procedures. External audits (e.g., audits by external entities such as regulatory agencies) are outside the scope of this control.","links":[{"href":"#ca-5","rel":"related"},{"href":"#ca-6","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-2.a_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)"}],"prose":"develops a security assessment plan that describes the scope of the assessment including:","parts":[{"id":"ca-2.a.1_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)(1)"}],"prose":"security controls and control enhancements under assessment;"},{"id":"ca-2.a.2_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)(2)"}],"prose":"assessment procedures to be used to determine security control effectiveness;"},{"id":"ca-2.a.3_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)"}],"parts":[{"id":"ca-2.a.3_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)[1]"}],"prose":"assessment environment;"},{"id":"ca-2.a.3_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)[2]"}],"prose":"assessment team;"},{"id":"ca-2.a.3_obj.3","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)[3]"}],"prose":"assessment roles and responsibilities;"}]}]},{"id":"ca-2.b_obj","name":"objective","props":[{"name":"label","value":"CA-2(b)"}],"parts":[{"id":"ca-2.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(b)[1]"}],"prose":"defines the frequency to assess the security controls in the information system and its environment of operation;"},{"id":"ca-2.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(b)[2]"}],"prose":"assesses the security controls in the information system with the organization-defined frequency to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;"}]},{"id":"ca-2.c_obj","name":"objective","props":[{"name":"label","value":"CA-2(c)"}],"prose":"produces a security assessment report that documents the results of the assessment;"},{"id":"ca-2.d_obj","name":"objective","props":[{"name":"label","value":"CA-2(d)"}],"parts":[{"id":"ca-2.d_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(d)[1]"}],"prose":"defines individuals or roles to whom the results of the security control assessment are to be provided; and"},{"id":"ca-2.d_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(d)[2]"}],"prose":"provides the results of the security control assessment to organization-defined individuals or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing security assessment planning\n\nprocedures addressing security assessments\n\nsecurity assessment plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security assessment responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting security assessment, security assessment plan development, and\/or security assessment reporting"}]}],"controls":[{"id":"ca-2.1","class":"SP800-53-enhancement","title":"Independent Assessors","params":[{"id":"ca-2.1_prm_1","label":"organization-defined level of independence"}],"props":[{"name":"label","value":"CA-2(1)"},{"name":"sort-id","value":"ca-02.01"}],"parts":[{"id":"ca-2.1_smt","name":"statement","prose":"The organization employs assessors or assessment teams with {{ insert: param, ca-2.1_prm_1 }} to conduct security control assessments."},{"id":"ca-2.1_gdn","name":"guidance","prose":"Independent assessors or assessment teams are individuals or groups who conduct impartial assessments of organizational information systems. Impartiality implies that assessors are free from any perceived or actual conflicts of interest with regard to the development, operation, or management of the organizational information systems under assessment or to the determination of security control effectiveness. To achieve impartiality, assessors should not: (i) create a mutual or conflicting interest with the organizations where the assessments are being conducted; (ii) assess their own work; (iii) act as management or employees of the organizations they are serving; or (iv) place themselves in positions of advocacy for the organizations acquiring their services. Independent assessments can be obtained from elements within organizations or can be contracted to public or private sector entities outside of organizations. Authorizing officials determine the required level of independence based on the security categories of information systems and\/or the ultimate risk to organizational operations, organizational assets, or individuals. Authorizing officials also determine if the level of assessor independence provides sufficient assurance that the results are sound and can be used to make credible, risk-based decisions. This includes determining whether contracted security assessment services have sufficient independence, for example, when information system owners are not directly involved in contracting processes or cannot unduly influence the impartiality of assessors conducting assessments. In special situations, for example, when organizations that own the information systems are small or organizational structures require that assessments are conducted by individuals that are in the developmental, operational, or management chain of system owners, independence in assessment processes can be achieved by ensuring that assessment results are carefully reviewed and analyzed by independent teams of experts to validate the completeness, accuracy, integrity, and reliability of the results. Organizations recognize that assessments performed for purposes other than direct support to authorization decisions are, when performed by assessors with sufficient independence, more likely to be useable for such decisions, thereby reducing the need to repeat assessments."},{"id":"ca-2.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-2.1_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(1)[1]"}],"prose":"defines the level of independence to be employed to conduct security control assessments; and"},{"id":"ca-2.1_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(1)[2]"}],"prose":"employs assessors or assessment teams with the organization-defined level of independence to conduct security control assessments."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing security assessments\n\nsecurity authorization package (including security plan, security assessment plan, security assessment report, plan of action and milestones, authorization statement)\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security assessment responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ca-2.2","class":"SP800-53-enhancement","title":"Specialized Assessments","params":[{"id":"ca-2.2_prm_1","label":"organization-defined frequency"},{"id":"ca-2.2_prm_2","select":{"choice":["announced","unannounced"]}},{"id":"ca-2.2_prm_3","select":{"how-many":"one-or-more","choice":["in-depth monitoring","vulnerability scanning","malicious user testing","insider threat assessment","performance\/load testing"," {{ insert: param, ca-2.2_prm_4 }} "]}},{"id":"ca-2.2_prm_4","depends-on":"ca-2.2_prm_3","label":"organization-defined other forms of security assessment"}],"props":[{"name":"label","value":"CA-2(2)"},{"name":"sort-id","value":"ca-02.02"}],"parts":[{"id":"ca-2.2_smt","name":"statement","prose":"The organization includes as part of security control assessments, {{ insert: param, ca-2.2_prm_1 }}, {{ insert: param, ca-2.2_prm_2 }}, {{ insert: param, ca-2.2_prm_3 }}."},{"id":"ca-2.2_gdn","name":"guidance","prose":"Organizations can employ information system monitoring, insider threat assessments, malicious user testing, and other forms of testing (e.g., verification and validation) to improve readiness by exercising organizational capabilities and indicating current performance levels as a means of focusing actions to improve security. Organizations conduct assessment activities in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. Authorizing officials approve the assessment methods in coordination with the organizational risk executive function. Organizations can incorporate vulnerabilities uncovered during assessments into vulnerability remediation processes.","links":[{"href":"#pe-3","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"ca-2.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-2.2_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(2)[1]"}],"prose":"selects one or more of the following forms of specialized security assessment to be included as part of security control assessments:","parts":[{"id":"ca-2.2_obj.1.a","name":"objective","props":[{"name":"label","value":"CA-2(2)[1][a]"}],"prose":"in-depth monitoring;"},{"id":"ca-2.2_obj.1.b","name":"objective","props":[{"name":"label","value":"CA-2(2)[1][b]"}],"prose":"vulnerability scanning;"},{"id":"ca-2.2_obj.1.c","name":"objective","props":[{"name":"label","value":"CA-2(2)[1][c]"}],"prose":"malicious user testing;"},{"id":"ca-2.2_obj.1.d","name":"objective","props":[{"name":"label","value":"CA-2(2)[1][d]"}],"prose":"insider threat assessment;"},{"id":"ca-2.2_obj.1.e","name":"objective","props":[{"name":"label","value":"CA-2(2)[1][e]"}],"prose":"performance\/load testing; and\/or"},{"id":"ca-2.2_obj.1.f","name":"objective","props":[{"name":"label","value":"CA-2(2)[1][f]"}],"prose":"other forms of organization-defined specialized security assessment;"}]},{"id":"ca-2.2_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(2)[2]"}],"prose":"defines the frequency for conducting the selected form(s) of specialized security assessment;"},{"id":"ca-2.2_obj.3","name":"objective","props":[{"name":"label","value":"CA-2(2)[3]"}],"prose":"defines whether the specialized security assessment will be announced or unannounced; and"},{"id":"ca-2.2_obj.4","name":"objective","props":[{"name":"label","value":"CA-2(2)[4]"}],"prose":"conducts announced or unannounced organization-defined forms of specialized security assessments with the organization-defined frequency as part of security control assessments."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing security assessments\n\nsecurity plan\n\nsecurity assessment plan\n\nsecurity assessment report\n\nsecurity assessment evidence\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security assessment responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting security control assessment"}]}]}]},{"id":"ca-3","class":"SP800-53","title":"System Interconnections","params":[{"id":"ca-3_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CA-3"},{"name":"sort-id","value":"ca-03"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#2711f068-734e-4afd-94ba-0b22247fbc88","rel":"reference"}],"parts":[{"id":"ca-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;"},{"id":"ca-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents, for each interconnection, the interface characteristics, security requirements, and the nature of the information communicated; and"},{"id":"ca-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews and updates Interconnection Security Agreements {{ insert: param, ca-3_prm_1 }}."}]},{"id":"ca-3_gdn","name":"guidance","prose":"This control applies to dedicated connections between information systems (i.e., system interconnections) and does not apply to transitory, user-controlled connections such as email and website browsing. Organizations carefully consider the risks that may be introduced when information systems are connected to other systems with different security requirements and security controls, both within organizations and external to organizations. Authorizing officials determine the risk associated with information system connections and the appropriate controls employed. If interconnecting systems have the same authorizing official, organizations do not need to develop Interconnection Security Agreements. Instead, organizations can describe the interface characteristics between those interconnecting systems in their respective security plans. If interconnecting systems have different authorizing officials within the same organization, organizations can either develop Interconnection Security Agreements or describe the interface characteristics between systems in the security plans for the respective systems. Organizations may also incorporate Interconnection Security Agreement information into formal contracts, especially for interconnections established between federal agencies and nonfederal (i.e., private sector) organizations. Risk considerations also include information systems sharing the same networks. For certain technologies (e.g., space, unmanned aerial vehicles, and medical devices), there may be specialized connections in place during preoperational testing. Such connections may require Interconnection Security Agreements and be subject to additional security controls.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#au-16","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#sa-9","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-3.a_obj","name":"objective","props":[{"name":"label","value":"CA-3(a)"}],"prose":"authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;"},{"id":"ca-3.b_obj","name":"objective","props":[{"name":"label","value":"CA-3(b)"}],"prose":"documents, for each interconnection:","parts":[{"id":"ca-3.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-3(b)[1]"}],"prose":"the interface characteristics;"},{"id":"ca-3.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-3(b)[2]"}],"prose":"the security requirements;"},{"id":"ca-3.b_obj.3","name":"objective","props":[{"name":"label","value":"CA-3(b)[3]"}],"prose":"the nature of the information communicated;"}]},{"id":"ca-3.c_obj","name":"objective","props":[{"name":"label","value":"CA-3(c)"}],"parts":[{"id":"ca-3.c_obj.1","name":"objective","props":[{"name":"label","value":"CA-3(c)[1]"}],"prose":"defines the frequency to review and update Interconnection Security Agreements; and"},{"id":"ca-3.c_obj.2","name":"objective","props":[{"name":"label","value":"CA-3(c)[2]"}],"prose":"reviews and updates Interconnection Security Agreements with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing information system connections\n\nsystem and communications protection policy\n\ninformation system Interconnection Security Agreements\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for developing, implementing, or approving information system interconnection agreements\n\norganizational personnel with information security responsibilities\n\npersonnel managing the system(s) to which the Interconnection Security Agreement applies"}]}],"controls":[{"id":"ca-3.5","class":"SP800-53-enhancement","title":"Restrictions On External System Connections","params":[{"id":"ca-3.5_prm_1","select":{"choice":["allow-all, deny-by-exception","deny-all, permit-by-exception"]}},{"id":"ca-3.5_prm_2","label":"organization-defined information systems"}],"props":[{"name":"label","value":"CA-3(5)"},{"name":"sort-id","value":"ca-03.05"}],"parts":[{"id":"ca-3.5_smt","name":"statement","prose":"The organization employs {{ insert: param, ca-3.5_prm_1 }} policy for allowing {{ insert: param, ca-3.5_prm_2 }} to connect to external information systems."},{"id":"ca-3.5_gdn","name":"guidance","prose":"Organizations can constrain information system connectivity to external domains (e.g., websites) by employing one of two policies with regard to such connectivity: (i) allow-all, deny by exception, also known as blacklisting (the weaker of the two policies); or (ii) deny-all, allow by exception, also known as whitelisting (the stronger of the two policies). For either policy, organizations determine what exceptions, if any, are acceptable.","links":[{"href":"#cm-7","rel":"related"}]},{"id":"ca-3.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-3.5_obj.1","name":"objective","props":[{"name":"label","value":"CA-3(5)[1]"}],"prose":"defines information systems to be allowed to connect to external information systems;"},{"id":"ca-3.5_obj.2","name":"objective","props":[{"name":"label","value":"CA-3(5)[2]"}],"prose":"employs one of the following policies for allowing organization-defined information systems to connect to external information systems:","parts":[{"id":"ca-3.5_obj.2.a","name":"objective","props":[{"name":"label","value":"CA-3(5)[2][a]"}],"prose":"allow-all policy;"},{"id":"ca-3.5_obj.2.b","name":"objective","props":[{"name":"label","value":"CA-3(5)[2][b]"}],"prose":"deny-by-exception policy;"},{"id":"ca-3.5_obj.2.c","name":"objective","props":[{"name":"label","value":"CA-3(5)[2][c]"}],"prose":"deny-all policy; or"},{"id":"ca-3.5_obj.2.d","name":"objective","props":[{"name":"label","value":"CA-3(5)[2][d]"}],"prose":"permit-by-exception policy."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing information system connections\n\nsystem and communications protection policy\n\ninformation system interconnection agreements\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity assessment report\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for managing connections to external information systems\n\nnetwork administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing restrictions on external system connections"}]}]}]},{"id":"ca-5","class":"SP800-53","title":"Plan of Action and Milestones","params":[{"id":"ca-5_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"CA-5"},{"name":"sort-id","value":"ca-05"}],"links":[{"href":"#2c5884cd-7b96-425c-862a-99877e1cf909","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"}],"parts":[{"id":"ca-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a plan of action and milestones for the information system to document the organization’s planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls and to reduce or eliminate known vulnerabilities in the system; and"},{"id":"ca-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Updates existing plan of action and milestones {{ insert: param, ca-5_prm_1 }} based on the findings from security controls assessments, security impact analyses, and continuous monitoring activities."}]},{"id":"ca-5_gdn","name":"guidance","prose":"Plans of action and milestones are key documents in security authorization packages and are subject to federal reporting requirements established by OMB.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#pm-4","rel":"related"}]},{"id":"ca-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-5.a_obj","name":"objective","props":[{"name":"label","value":"CA-5(a)"}],"prose":"develops a plan of action and milestones for the information system to:","parts":[{"id":"ca-5.a_obj.1","name":"objective","props":[{"name":"label","value":"CA-5(a)[1]"}],"prose":"document the organization’s planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls;"},{"id":"ca-5.a_obj.2","name":"objective","props":[{"name":"label","value":"CA-5(a)[2]"}],"prose":"reduce or eliminate known vulnerabilities in the system;"}]},{"id":"ca-5.b_obj","name":"objective","props":[{"name":"label","value":"CA-5(b)"}],"parts":[{"id":"ca-5.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-5(b)[1]"}],"prose":"defines the frequency to update the existing plan of action and milestones;"},{"id":"ca-5.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-5(b)[2]"}],"prose":"updates the existing plan of action and milestones with the organization-defined frequency based on the findings from:","parts":[{"id":"ca-5.b_obj.2.a","name":"objective","props":[{"name":"label","value":"CA-5(b)[2][a]"}],"prose":"security controls assessments;"},{"id":"ca-5.b_obj.2.b","name":"objective","props":[{"name":"label","value":"CA-5(b)[2][b]"}],"prose":"security impact analyses; and"},{"id":"ca-5.b_obj.2.c","name":"objective","props":[{"name":"label","value":"CA-5(b)[2][c]"}],"prose":"continuous monitoring activities."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing plan of action and milestones\n\nsecurity plan\n\nsecurity assessment plan\n\nsecurity assessment report\n\nsecurity assessment evidence\n\nplan of action and milestones\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with plan of action and milestones development and implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms for developing, implementing, and maintaining plan of action and milestones"}]}]},{"id":"ca-6","class":"SP800-53","title":"Security Authorization","params":[{"id":"ca-6_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-6"},{"name":"sort-id","value":"ca-06"}],"links":[{"href":"#9f77f845-e3ea-4ca4-b2c0-aa9eedc214ab","rel":"reference"},{"href":"#bedb15b7-ec5c-4a68-807f-385125751fcd","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"}],"parts":[{"id":"ca-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Assigns a senior-level executive or manager as the authorizing official for the information system;"},{"id":"ca-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Ensures that the authorizing official authorizes the information system for processing before commencing operations; and"},{"id":"ca-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Updates the security authorization {{ insert: param, ca-6_prm_1 }}."}]},{"id":"ca-6_gdn","name":"guidance","prose":"Security authorizations are official management decisions, conveyed through authorization decision documents, by senior organizational officials or executives (i.e., authorizing officials) to authorize operation of information systems and to explicitly accept the risk to organizational operations and assets, individuals, other organizations, and the Nation based on the implementation of agreed-upon security controls. Authorizing officials provide budgetary oversight for organizational information systems or assume responsibility for the mission\/business operations supported by those systems. The security authorization process is an inherently federal responsibility and therefore, authorizing officials must be federal employees. Through the security authorization process, authorizing officials assume responsibility and are accountable for security risks associated with the operation and use of organizational information systems. Accordingly, authorizing officials are in positions with levels of authority commensurate with understanding and accepting such information security-related risks. OMB policy requires that organizations conduct ongoing authorizations of information systems by implementing continuous monitoring programs. Continuous monitoring programs can satisfy three-year reauthorization requirements, so separate reauthorization processes are not necessary. Through the employment of comprehensive continuous monitoring processes, critical information contained in authorization packages (i.e., security plans, security assessment reports, and plans of action and milestones) is updated on an ongoing basis, providing authorizing officials and information system owners with an up-to-date status of the security state of organizational information systems and environments of operation. To reduce the administrative cost of security reauthorization, authorizing officials use the results of continuous monitoring processes to the maximum extent possible as the basis for rendering reauthorization decisions.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#pm-10","rel":"related"}]},{"id":"ca-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-6.a_obj","name":"objective","props":[{"name":"label","value":"CA-6(a)"}],"prose":"assigns a senior-level executive or manager as the authorizing official for the information system;"},{"id":"ca-6.b_obj","name":"objective","props":[{"name":"label","value":"CA-6(b)"}],"prose":"ensures that the authorizing official authorizes the information system for processing before commencing operations;"},{"id":"ca-6.c_obj","name":"objective","props":[{"name":"label","value":"CA-6(c)"}],"parts":[{"id":"ca-6.c_obj.1","name":"objective","props":[{"name":"label","value":"CA-6(c)[1]"}],"prose":"defines the frequency to update the security authorization; and"},{"id":"ca-6.c_obj.2","name":"objective","props":[{"name":"label","value":"CA-6(c)[2]"}],"prose":"updates the security authorization with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing security authorization\n\nsecurity authorization package (including security plan\n\nsecurity assessment report\n\nplan of action and milestones\n\nauthorization statement)\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security authorization responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms that facilitate security authorizations and updates"}]}]},{"id":"ca-7","class":"SP800-53","title":"Continuous Monitoring","params":[{"id":"ca-7_prm_1","label":"organization-defined metrics"},{"id":"ca-7_prm_2","label":"organization-defined frequencies"},{"id":"ca-7_prm_3","label":"organization-defined frequencies"},{"id":"ca-7_prm_4","label":"organization-defined personnel or roles"},{"id":"ca-7_prm_5","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-7"},{"name":"sort-id","value":"ca-07"}],"links":[{"href":"#bedb15b7-ec5c-4a68-807f-385125751fcd","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"},{"href":"#8ade2fbe-e468-4ca8-9a40-54d7f23c32bb","rel":"reference"},{"href":"#2d8b14e9-c8b5-4d3d-8bdc-155078f3281b","rel":"reference"}],"parts":[{"id":"ca-7_smt","name":"statement","prose":"The organization develops a continuous monitoring strategy and implements a continuous monitoring program that includes:","parts":[{"id":"ca-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishment of {{ insert: param, ca-7_prm_1 }} to be monitored;"},{"id":"ca-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishment of {{ insert: param, ca-7_prm_2 }} for monitoring and {{ insert: param, ca-7_prm_3 }} for assessments supporting such monitoring;"},{"id":"ca-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ongoing security control assessments in accordance with the organizational continuous monitoring strategy;"},{"id":"ca-7_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;"},{"id":"ca-7_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Correlation and analysis of security-related information generated by assessments and monitoring;"},{"id":"ca-7_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Response actions to address results of the analysis of security-related information; and"},{"id":"ca-7_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Reporting the security status of organization and the information system to {{ insert: param, ca-7_prm_4 }} {{ insert: param, ca-7_prm_5 }}."}]},{"id":"ca-7_gdn","name":"guidance","prose":"Continuous monitoring programs facilitate ongoing awareness of threats, vulnerabilities, and information security to support organizational risk management decisions. The terms continuous and ongoing imply that organizations assess\/analyze security controls and information security-related risks at a frequency sufficient to support organizational risk-based decisions. The results of continuous monitoring programs generate appropriate risk response actions by organizations. Continuous monitoring programs also allow organizations to maintain the security authorizations of information systems and common controls over time in highly dynamic environments of operation with changing mission\/business needs, threats, vulnerabilities, and technologies. Having access to security-related information on a continuing basis through reports\/dashboards gives organizational officials the capability to make more effective and timely risk management decisions, including ongoing security authorization decisions. Automation supports more frequent updates to security authorization packages, hardware\/software\/firmware inventories, and other system information. Effectiveness is further enhanced when continuous monitoring outputs are formatted to provide information that is specific, measurable, actionable, relevant, and timely. Continuous monitoring activities are scaled in accordance with the security categories of information systems.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-5","rel":"related"},{"href":"#ca-6","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#pm-6","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-2","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-7.a_obj","name":"objective","props":[{"name":"label","value":"CA-7(a)"}],"parts":[{"id":"ca-7.a_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(a)[1]"}],"prose":"develops a continuous monitoring strategy that defines metrics to be monitored;"},{"id":"ca-7.a_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(a)[2]"}],"prose":"develops a continuous monitoring strategy that includes monitoring of organization-defined metrics;"},{"id":"ca-7.a_obj.3","name":"objective","props":[{"name":"label","value":"CA-7(a)[3]"}],"prose":"implements a continuous monitoring program that includes monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.b_obj","name":"objective","props":[{"name":"label","value":"CA-7(b)"}],"parts":[{"id":"ca-7.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(b)[1]"}],"prose":"develops a continuous monitoring strategy that defines frequencies for monitoring;"},{"id":"ca-7.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(b)[2]"}],"prose":"defines frequencies for assessments supporting monitoring;"},{"id":"ca-7.b_obj.3","name":"objective","props":[{"name":"label","value":"CA-7(b)[3]"}],"prose":"develops a continuous monitoring strategy that includes establishment of the organization-defined frequencies for monitoring and for assessments supporting monitoring;"},{"id":"ca-7.b_obj.4","name":"objective","props":[{"name":"label","value":"CA-7(b)[4]"}],"prose":"implements a continuous monitoring program that includes establishment of organization-defined frequencies for monitoring and for assessments supporting such monitoring in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.c_obj","name":"objective","props":[{"name":"label","value":"CA-7(c)"}],"parts":[{"id":"ca-7.c_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(c)[1]"}],"prose":"develops a continuous monitoring strategy that includes ongoing security control assessments;"},{"id":"ca-7.c_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(c)[2]"}],"prose":"implements a continuous monitoring program that includes ongoing security control assessments in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.d_obj","name":"objective","props":[{"name":"label","value":"CA-7(d)"}],"parts":[{"id":"ca-7.d_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(d)[1]"}],"prose":"develops a continuous monitoring strategy that includes ongoing security status monitoring of organization-defined metrics;"},{"id":"ca-7.d_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(d)[2]"}],"prose":"implements a continuous monitoring program that includes ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.e_obj","name":"objective","props":[{"name":"label","value":"CA-7(e)"}],"parts":[{"id":"ca-7.e_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(e)[1]"}],"prose":"develops a continuous monitoring strategy that includes correlation and analysis of security-related information generated by assessments and monitoring;"},{"id":"ca-7.e_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(e)[2]"}],"prose":"implements a continuous monitoring program that includes correlation and analysis of security-related information generated by assessments and monitoring in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.f_obj","name":"objective","props":[{"name":"label","value":"CA-7(f)"}],"parts":[{"id":"ca-7.f_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(f)[1]"}],"prose":"develops a continuous monitoring strategy that includes response actions to address results of the analysis of security-related information;"},{"id":"ca-7.f_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(f)[2]"}],"prose":"implements a continuous monitoring program that includes response actions to address results of the analysis of security-related information in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.g_obj","name":"objective","props":[{"name":"label","value":"CA-7(g)"}],"parts":[{"id":"ca-7.g_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(g)[1]"}],"prose":"develops a continuous monitoring strategy that defines the personnel or roles to whom the security status of the organization and information system are to be reported;"},{"id":"ca-7.g_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(g)[2]"}],"prose":"develops a continuous monitoring strategy that defines the frequency to report the security status of the organization and information system to organization-defined personnel or roles;"},{"id":"ca-7.g_obj.3","name":"objective","props":[{"name":"label","value":"CA-7(g)[3]"}],"prose":"develops a continuous monitoring strategy that includes reporting the security status of the organization or information system to organizational-defined personnel or roles with the organization-defined frequency; and"},{"id":"ca-7.g_obj.4","name":"objective","props":[{"name":"label","value":"CA-7(g)[4]"}],"prose":"implements a continuous monitoring program that includes reporting the security status of the organization and information system to organization-defined personnel or roles with the organization-defined frequency in accordance with the organizational continuous monitoring strategy."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing continuous monitoring of information system security controls\n\nprocedures addressing configuration management\n\nsecurity plan\n\nsecurity assessment report\n\nplan of action and milestones\n\ninformation system monitoring records\n\nconfiguration management records, security impact analyses\n\nstatus reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with continuous monitoring responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Mechanisms implementing continuous monitoring"}]}],"controls":[{"id":"ca-7.1","class":"SP800-53-enhancement","title":"Independent Assessment","params":[{"id":"ca-7.1_prm_1","label":"organization-defined level of independence"}],"props":[{"name":"label","value":"CA-7(1)"},{"name":"sort-id","value":"ca-07.01"}],"parts":[{"id":"ca-7.1_smt","name":"statement","prose":"The organization employs assessors or assessment teams with {{ insert: param, ca-7.1_prm_1 }} to monitor the security controls in the information system on an ongoing basis."},{"id":"ca-7.1_gdn","name":"guidance","prose":"Organizations can maximize the value of assessments of security controls during the continuous monitoring process by requiring that such assessments be conducted by assessors or assessment teams with appropriate levels of independence based on continuous monitoring strategies. Assessor independence provides a degree of impartiality to the monitoring process. To achieve such impartiality, assessors should not: (i) create a mutual or conflicting interest with the organizations where the assessments are being conducted; (ii) assess their own work; (iii) act as management or employees of the organizations they are serving; or (iv) place themselves in advocacy positions for the organizations acquiring their services."},{"id":"ca-7.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-7.1_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(1)[1]"}],"prose":"defines a level of independence to be employed to monitor the security controls in the information system on an ongoing basis; and"},{"id":"ca-7.1_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(1)[2]"}],"prose":"employs assessors or assessment teams with the organization-defined level of independence to monitor the security controls in the information system on an ongoing basis."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing continuous monitoring of information system security controls\n\nsecurity plan\n\nsecurity assessment report\n\nplan of action and milestones\n\ninformation system monitoring records\n\nsecurity impact analyses\n\nstatus reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with continuous monitoring responsibilities\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"ca-8","class":"SP800-53","title":"Penetration Testing","params":[{"id":"ca-8_prm_1","label":"organization-defined frequency"},{"id":"ca-8_prm_2","label":"organization-defined information systems or system components"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-8"},{"name":"sort-id","value":"ca-08"}],"parts":[{"id":"ca-8_smt","name":"statement","prose":"The organization conducts penetration testing {{ insert: param, ca-8_prm_1 }} on {{ insert: param, ca-8_prm_2 }}."},{"id":"ca-8_gdn","name":"guidance","prose":"Penetration testing is a specialized type of assessment conducted on information systems or individual system components to identify vulnerabilities that could be exploited by adversaries. Such testing can be used to either validate vulnerabilities or determine the degree of resistance organizational information systems have to adversaries within a set of specified constraints (e.g., time, resources, and\/or skills). Penetration testing attempts to duplicate the actions of adversaries in carrying out hostile cyber attacks against organizations and provides a more in-depth analysis of security-related weaknesses\/deficiencies. Organizations can also use the results of vulnerability analyses to support penetration testing activities. Penetration testing can be conducted on the hardware, software, or firmware components of an information system and can exercise both physical and technical security controls. A standard method for penetration testing includes, for example: (i) pretest analysis based on full knowledge of the target system; (ii) pretest identification of potential vulnerabilities based on pretest analysis; and (iii) testing designed to determine exploitability of identified vulnerabilities. All parties agree to the rules of engagement before the commencement of penetration testing scenarios. Organizations correlate the penetration testing rules of engagement with the tools, techniques, and procedures that are anticipated to be employed by adversaries carrying out attacks. Organizational risk assessments guide decisions on the level of independence required for personnel conducting penetration testing.","links":[{"href":"#sa-12","rel":"related"}]},{"id":"ca-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-8_obj.1","name":"objective","props":[{"name":"label","value":"CA-8[1]"}],"prose":"defines information systems or system components on which penetration testing is to be conducted;"},{"id":"ca-8_obj.2","name":"objective","props":[{"name":"label","value":"CA-8[2]"}],"prose":"defines the frequency to conduct penetration testing on organization-defined information systems or system components; and"},{"id":"ca-8_obj.3","name":"objective","props":[{"name":"label","value":"CA-8[3]"}],"prose":"conducts penetration testing on organization-defined information systems or system components with the organization-defined frequency."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing penetration testing\n\nsecurity plan\n\nsecurity assessment plan\n\npenetration test report\n\nsecurity assessment report\n\nsecurity assessment evidence\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security assessment responsibilities\n\norganizational personnel with information security responsibilities, system\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting penetration testing"}]}]},{"id":"ca-9","class":"SP800-53","title":"Internal System Connections","params":[{"id":"ca-9_prm_1","label":"organization-defined information system components or classes of components"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-9"},{"name":"sort-id","value":"ca-09"}],"parts":[{"id":"ca-9_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Authorizes internal connections of {{ insert: param, ca-9_prm_1 }} to the information system; and"},{"id":"ca-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents, for each internal connection, the interface characteristics, security requirements, and the nature of the information communicated."}]},{"id":"ca-9_gdn","name":"guidance","prose":"This control applies to connections between organizational information systems and (separate) constituent system components (i.e., intra-system connections) including, for example, system connections with mobile devices, notebook\/desktop computers, printers, copiers, facsimile machines, scanners, sensors, and servers. Instead of authorizing each individual internal connection, organizations can authorize internal connections for a class of components with common characteristics and\/or configurations, for example, all digital printers, scanners, and copiers with a specified processing, storage, and transmission capability or all smart phones with a specific baseline configuration.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-9_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-9.a_obj","name":"objective","props":[{"name":"label","value":"CA-9(a)"}],"parts":[{"id":"ca-9.a_obj.1","name":"objective","props":[{"name":"label","value":"CA-9(a)[1]"}],"prose":"defines information system components or classes of components to be authorized as internal connections to the information system;"},{"id":"ca-9.a_obj.2","name":"objective","props":[{"name":"label","value":"CA-9(a)[2]"}],"prose":"authorizes internal connections of organization-defined information system components or classes of components to the information system;"}]},{"id":"ca-9.b_obj","name":"objective","props":[{"name":"label","value":"CA-9(b)"}],"prose":"documents, for each internal connection:","parts":[{"id":"ca-9.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-9(b)[1]"}],"prose":"the interface characteristics;"},{"id":"ca-9.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-9(b)[2]"}],"prose":"the security requirements; and"},{"id":"ca-9.b_obj.3","name":"objective","props":[{"name":"label","value":"CA-9(b)[3]"}],"prose":"the nature of the information communicated."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing information system connections\n\nsystem and communications protection policy\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of components or classes of components authorized as internal system connections\n\nsecurity assessment report\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for developing, implementing, or authorizing internal system connections\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"cm","class":"family","title":"Configuration Management","controls":[{"id":"cm-1","class":"SP800-53","title":"Configuration Management Policy and Procedures","params":[{"id":"cm-1_prm_1","label":"organization-defined personnel or roles"},{"id":"cm-1_prm_2","label":"organization-defined frequency"},{"id":"cm-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-1"},{"name":"sort-id","value":"cm-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"cm-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, cm-1_prm_1 }}:","parts":[{"id":"cm-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"cm-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the configuration management policy and associated configuration management controls; and"}]},{"id":"cm-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"cm-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Configuration management policy {{ insert: param, cm-1_prm_2 }}; and"},{"id":"cm-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Configuration management procedures {{ insert: param, cm-1_prm_3 }}."}]}]},{"id":"cm-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the CM family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"cm-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-1.a_obj","name":"objective","props":[{"name":"label","value":"CM-1(a)"}],"parts":[{"id":"cm-1.a.1_obj","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)"}],"parts":[{"id":"cm-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1]"}],"prose":"develops and documents a configuration management policy that addresses:","parts":[{"id":"cm-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"cm-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"cm-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"cm-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"cm-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"cm-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"cm-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"cm-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the configuration management policy is to be disseminated;"},{"id":"cm-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[3]"}],"prose":"disseminates the configuration management policy to organization-defined personnel or roles;"}]},{"id":"cm-1.a.2_obj","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)"}],"parts":[{"id":"cm-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the configuration management policy and associated configuration management controls;"},{"id":"cm-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"cm-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"cm-1.b_obj","name":"objective","props":[{"name":"label","value":"CM-1(b)"}],"parts":[{"id":"cm-1.b.1_obj","name":"objective","props":[{"name":"label","value":"CM-1(b)(1)"}],"parts":[{"id":"cm-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current configuration management policy;"},{"id":"cm-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(b)(1)[2]"}],"prose":"reviews and updates the current configuration management policy with the organization-defined frequency;"}]},{"id":"cm-1.b.2_obj","name":"objective","props":[{"name":"label","value":"CM-1(b)(2)"}],"parts":[{"id":"cm-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current configuration management procedures; and"},{"id":"cm-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(b)(2)[2]"}],"prose":"reviews and updates the current configuration management procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]}]},{"id":"cm-2","class":"SP800-53","title":"Baseline Configuration","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-2"},{"name":"sort-id","value":"cm-02"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-2_smt","name":"statement","prose":"The organization develops, documents, and maintains under configuration control, a current baseline configuration of the information system."},{"id":"cm-2_gdn","name":"guidance","prose":"This control establishes baseline configurations for information systems and system components including communications and connectivity-related aspects of systems. Baseline configurations are documented, formally reviewed and agreed-upon sets of specifications for information systems or configuration items within those systems. Baseline configurations serve as a basis for future builds, releases, and\/or changes to information systems. Baseline configurations include information about information system components (e.g., standard software packages installed on workstations, notebook computers, servers, network components, or mobile devices; current version numbers and patch information on operating systems and applications; and configuration settings\/parameters), network topology, and the logical placement of those components within the system architecture. Maintaining baseline configurations requires creating new baselines as organizational information systems change over time. Baseline configurations of information systems reflect the current enterprise architecture.","links":[{"href":"#cm-3","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#pm-5","rel":"related"},{"href":"#pm-7","rel":"related"}]},{"id":"cm-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-2_obj.1","name":"objective","props":[{"name":"label","value":"CM-2[1]"}],"prose":"develops and documents a current baseline configuration of the information system; and"},{"id":"cm-2_obj.2","name":"objective","props":[{"name":"label","value":"CM-2[2]"}],"prose":"maintains, under configuration control, a current baseline configuration of the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing the baseline configuration of the information system\n\nconfiguration management plan\n\nenterprise architecture documentation\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nchange control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing baseline configurations\n\nautomated mechanisms supporting configuration control of the baseline configuration"}]}],"controls":[{"id":"cm-2.1","class":"SP800-53-enhancement","title":"Reviews and Updates","params":[{"id":"cm-2.1_prm_1","label":"organization-defined frequency"},{"id":"cm-2.1_prm_2","label":"Assignment organization-defined circumstances"}],"props":[{"name":"label","value":"CM-2(1)"},{"name":"sort-id","value":"cm-02.01"}],"parts":[{"id":"cm-2.1_smt","name":"statement","prose":"The organization reviews and updates the baseline configuration of the information system:","parts":[{"id":"cm-2.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":" {{ insert: param, cm-2.1_prm_1 }};"},{"id":"cm-2.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"When required due to {{ insert: param, cm-2.1_prm_2 }}; and"},{"id":"cm-2.1_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"As an integral part of information system component installations and upgrades."}]},{"id":"cm-2.1_gdn","name":"guidance","links":[{"href":"#cm-5","rel":"related"}]},{"id":"cm-2.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-2.1.a_obj","name":"objective","props":[{"name":"label","value":"CM-2(1)(a)"}],"parts":[{"id":"cm-2.1.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(1)(a)[1]"}],"prose":"defines the frequency to review and update the baseline configuration of the information system;"},{"id":"cm-2.1.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(1)(a)[2]"}],"prose":"reviews and updates the baseline configuration of the information system with the organization-defined frequency;"}],"links":[{"href":"#cm-2.1_smt.a","rel":"corresp"}]},{"id":"cm-2.1.b_obj","name":"objective","props":[{"name":"label","value":"CM-2(1)(b)"}],"parts":[{"id":"cm-2.1.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(1)(b)[1]"}],"prose":"defines circumstances that require the baseline configuration of the information system to be reviewed and updated;"},{"id":"cm-2.1.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(1)(b)[2]"}],"prose":"reviews and updates the baseline configuration of the information system when required due to organization-defined circumstances; and"}],"links":[{"href":"#cm-2.1_smt.b","rel":"corresp"}]},{"id":"cm-2.1.c_obj","name":"objective","props":[{"name":"label","value":"CM-2(1)(c)"}],"prose":"reviews and updates the baseline configuration of the information system as an integral part of information system component installations and upgrades.","links":[{"href":"#cm-2.1_smt.c","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nconfiguration management plan\n\nprocedures addressing the baseline configuration of the information system\n\nprocedures addressing information system component installations and upgrades\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nrecords of information system baseline configuration reviews and updates\n\ninformation system component installations\/upgrades and associated records\n\nchange control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing baseline configurations\n\nautomated mechanisms supporting review and update of the baseline configuration"}]}]},{"id":"cm-2.2","class":"SP800-53-enhancement","title":"Automation Support for Accuracy \/ Currency","props":[{"name":"label","value":"CM-2(2)"},{"name":"sort-id","value":"cm-02.02"}],"parts":[{"id":"cm-2.2_smt","name":"statement","prose":"The organization employs automated mechanisms to maintain an up-to-date, complete, accurate, and readily available baseline configuration of the information system."},{"id":"cm-2.2_gdn","name":"guidance","prose":"Automated mechanisms that help organizations maintain consistent baseline configurations for information systems include, for example, hardware and software inventory tools, configuration management tools, and network management tools. Such tools can be deployed and\/or allocated as common controls, at the information system level, or at the operating system or component level (e.g., on workstations, servers, notebook computers, network components, or mobile devices). Tools can be used, for example, to track version numbers on operating system applications, types of software installed, and current patch levels. This control enhancement can be satisfied by the implementation of CM-8 (2) for organizations that choose to combine information system component inventory and baseline configuration activities.","links":[{"href":"#cm-7","rel":"related"},{"href":"#ra-5","rel":"related"}]},{"id":"cm-2.2_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to maintain:","parts":[{"id":"cm-2.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(2)[1]"}],"prose":"an up-to-date baseline configuration of the information system;"},{"id":"cm-2.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(2)[2]"}],"prose":"a complete baseline configuration of the information system;"},{"id":"cm-2.2_obj.3","name":"objective","props":[{"name":"label","value":"CM-2(2)[3]"}],"prose":"an accurate baseline configuration of the information system; and"},{"id":"cm-2.2_obj.4","name":"objective","props":[{"name":"label","value":"CM-2(2)[4]"}],"prose":"a readily available baseline configuration of the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing the baseline configuration of the information system\n\nconfiguration management plan\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nconfiguration change control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing baseline configurations\n\nautomated mechanisms implementing baseline configuration maintenance"}]}]},{"id":"cm-2.3","class":"SP800-53-enhancement","title":"Retention of Previous Configurations","params":[{"id":"cm-2.3_prm_1","label":"organization-defined previous versions of baseline configurations of the information system"}],"props":[{"name":"label","value":"CM-2(3)"},{"name":"sort-id","value":"cm-02.03"}],"parts":[{"id":"cm-2.3_smt","name":"statement","prose":"The organization retains {{ insert: param, cm-2.3_prm_1 }} to support rollback."},{"id":"cm-2.3_gdn","name":"guidance","prose":"Retaining previous versions of baseline configurations to support rollback may include, for example, hardware, software, firmware, configuration files, and configuration records."},{"id":"cm-2.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-2.3_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(3)[1]"}],"prose":"defines previous versions of baseline configurations of the information system to be retained to support rollback; and"},{"id":"cm-2.3_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(3)[2]"}],"prose":"retains organization-defined previous versions of baseline configurations of the information system to support rollback."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing the baseline configuration of the information system\n\nconfiguration management plan\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\ncopies of previous baseline configuration versions\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing baseline configurations"}]}]},{"id":"cm-2.7","class":"SP800-53-enhancement","title":"Configure Systems, Components, or Devices for High-risk Areas","params":[{"id":"cm-2.7_prm_1","label":"organization-defined information systems, system components, or devices"},{"id":"cm-2.7_prm_2","label":"organization-defined configurations"},{"id":"cm-2.7_prm_3","label":"organization-defined security safeguards"}],"props":[{"name":"label","value":"CM-2(7)"},{"name":"sort-id","value":"cm-02.07"}],"parts":[{"id":"cm-2.7_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-2.7_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Issues {{ insert: param, cm-2.7_prm_1 }} with {{ insert: param, cm-2.7_prm_2 }} to individuals traveling to locations that the organization deems to be of significant risk; and"},{"id":"cm-2.7_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Applies {{ insert: param, cm-2.7_prm_3 }} to the devices when the individuals return."}]},{"id":"cm-2.7_gdn","name":"guidance","prose":"When it is known that information systems, system components, or devices (e.g., notebook computers, mobile devices) will be located in high-risk areas, additional security controls may be implemented to counter the greater threat in such areas coupled with the lack of physical security relative to organizational-controlled areas. For example, organizational policies and procedures for notebook computers used by individuals departing on and returning from travel include, for example, determining which locations are of concern, defining required configurations for the devices, ensuring that the devices are configured as intended before travel is initiated, and applying specific safeguards to the device after travel is completed. Specially configured notebook computers include, for example, computers with sanitized hard drives, limited applications, and additional hardening (e.g., more stringent configuration settings). Specified safeguards applied to mobile devices upon return from travel include, for example, examining the device for signs of physical tampering and purging\/reimaging the hard disk drive. Protecting information residing on mobile devices is covered in the media protection family."},{"id":"cm-2.7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-2.7.a_obj","name":"objective","props":[{"name":"label","value":"CM-2(7)(a)"}],"parts":[{"id":"cm-2.7.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(7)(a)[1]"}],"prose":"defines information systems, system components, or devices to be issued to individuals traveling to locations that the organization deems to be of significant risk;"},{"id":"cm-2.7.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(7)(a)[2]"}],"prose":"defines configurations to be employed on organization-defined information systems, system components, or devices issued to individuals traveling to such locations;"},{"id":"cm-2.7.a_obj.3","name":"objective","props":[{"name":"label","value":"CM-2(7)(a)[3]"}],"prose":"issues organization-defined information systems, system components, or devices with organization-defined configurations to individuals traveling to locations that the organization deems to be of significant risk;"}],"links":[{"href":"#cm-2.7_smt.a","rel":"corresp"}]},{"id":"cm-2.7.b_obj","name":"objective","props":[{"name":"label","value":"CM-2(7)(b)"}],"parts":[{"id":"cm-2.7.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(7)(b)[1]"}],"prose":"defines security safeguards to be applied to the devices when the individuals return; and"},{"id":"cm-2.7.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(7)(b)[2]"}],"prose":"applies organization-defined safeguards to the devices when the individuals return."}],"links":[{"href":"#cm-2.7_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nconfiguration management plan\n\nprocedures addressing the baseline configuration of the information system\n\nprocedures addressing information system component installations and upgrades\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nrecords of information system baseline configuration reviews and updates\n\ninformation system component installations\/upgrades and associated records\n\nchange control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing baseline configurations"}]}]}]},{"id":"cm-3","class":"SP800-53","title":"Configuration Change Control","params":[{"id":"cm-3_prm_1","label":"organization-defined time period"},{"id":"cm-3_prm_2","label":"organization-defined configuration change control element (e.g., committee, board)"},{"id":"cm-3_prm_3","select":{"how-many":"one-or-more","choice":[" {{ insert: param, cm-3_prm_4 }} "," {{ insert: param, cm-3_prm_5 }} "]}},{"id":"cm-3_prm_4","depends-on":"cm-3_prm_3","label":"organization-defined frequency"},{"id":"cm-3_prm_5","depends-on":"cm-3_prm_3","label":"organization-defined configuration change conditions"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-3"},{"name":"sort-id","value":"cm-03"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Determines the types of changes to the information system that are configuration-controlled;"},{"id":"cm-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews proposed configuration-controlled changes to the information system and approves or disapproves such changes with explicit consideration for security impact analyses;"},{"id":"cm-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Documents configuration change decisions associated with the information system;"},{"id":"cm-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Implements approved configuration-controlled changes to the information system;"},{"id":"cm-3_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Retains records of configuration-controlled changes to the information system for {{ insert: param, cm-3_prm_1 }};"},{"id":"cm-3_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Audits and reviews activities associated with configuration-controlled changes to the information system; and"},{"id":"cm-3_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Coordinates and provides oversight for configuration change control activities through {{ insert: param, cm-3_prm_2 }} that convenes {{ insert: param, cm-3_prm_3 }}."}]},{"id":"cm-3_gdn","name":"guidance","prose":"Configuration change controls for organizational information systems involve the systematic proposal, justification, implementation, testing, review, and disposition of changes to the systems, including system upgrades and modifications. Configuration change control includes changes to baseline configurations for components and configuration items of information systems, changes to configuration settings for information technology products (e.g., operating systems, applications, firewalls, routers, and mobile devices), unscheduled\/unauthorized changes, and changes to remediate vulnerabilities. Typical processes for managing configuration changes to information systems include, for example, Configuration Control Boards that approve proposed changes to systems. For new development information systems or systems undergoing major upgrades, organizations consider including representatives from development organizations on the Configuration Control Boards. Auditing of changes includes activities before and after changes are made to organizational information systems and the auditing activities required to implement such changes.","links":[{"href":"#ca-7","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#si-2","rel":"related"},{"href":"#si-12","rel":"related"}]},{"id":"cm-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-3.a_obj","name":"objective","props":[{"name":"label","value":"CM-3(a)"}],"prose":"determines the type of changes to the information system that must be configuration-controlled;"},{"id":"cm-3.b_obj","name":"objective","props":[{"name":"label","value":"CM-3(b)"}],"prose":"reviews proposed configuration-controlled changes to the information system and approves or disapproves such changes with explicit consideration for security impact analyses;"},{"id":"cm-3.c_obj","name":"objective","props":[{"name":"label","value":"CM-3(c)"}],"prose":"documents configuration change decisions associated with the information system;"},{"id":"cm-3.d_obj","name":"objective","props":[{"name":"label","value":"CM-3(d)"}],"prose":"implements approved configuration-controlled changes to the information system;"},{"id":"cm-3.e_obj","name":"objective","props":[{"name":"label","value":"CM-3(e)"}],"parts":[{"id":"cm-3.e_obj.1","name":"objective","props":[{"name":"label","value":"CM-3(e)[1]"}],"prose":"defines a time period to retain records of configuration-controlled changes to the information system;"},{"id":"cm-3.e_obj.2","name":"objective","props":[{"name":"label","value":"CM-3(e)[2]"}],"prose":"retains records of configuration-controlled changes to the information system for the organization-defined time period;"}]},{"id":"cm-3.f_obj","name":"objective","props":[{"name":"label","value":"CM-3(f)"}],"prose":"audits and reviews activities associated with configuration-controlled changes to the information system;"},{"id":"cm-3.g_obj","name":"objective","props":[{"name":"label","value":"CM-3(g)"}],"parts":[{"id":"cm-3.g_obj.1","name":"objective","props":[{"name":"label","value":"CM-3(g)[1]"}],"prose":"defines a configuration change control element (e.g., committee, board) responsible for coordinating and providing oversight for configuration change control activities;"},{"id":"cm-3.g_obj.2","name":"objective","props":[{"name":"label","value":"CM-3(g)[2]"}],"prose":"defines the frequency with which the configuration change control element must convene; and\/or"},{"id":"cm-3.g_obj.3","name":"objective","props":[{"name":"label","value":"CM-3(g)[3]"}],"prose":"defines configuration change conditions that prompt the configuration change control element to convene; and"},{"id":"cm-3.g_obj.4","name":"objective","props":[{"name":"label","value":"CM-3(g)[4]"}],"prose":"coordinates and provides oversight for configuration change control activities through organization-defined configuration change control element that convenes at organization-defined frequency and\/or for any organization-defined configuration change conditions."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system configuration change control\n\nconfiguration management plan\n\ninformation system architecture and configuration documentation\n\nsecurity plan\n\nchange control records\n\ninformation system audit records\n\nchange control audit and review reports\n\nagenda \/minutes from configuration change control oversight meetings\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration change control responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nmembers of change control board or similar"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for configuration change control\n\nautomated mechanisms that implement configuration change control"}]}],"controls":[{"id":"cm-3.1","class":"SP800-53-enhancement","title":"Automated Document \/ Notification \/ Prohibition of Changes","params":[{"id":"cm-3.1_prm_1","label":"organized-defined approval authorities"},{"id":"cm-3.1_prm_2","label":"organization-defined time period"},{"id":"cm-3.1_prm_3","label":"organization-defined personnel"}],"props":[{"name":"label","value":"CM-3(1)"},{"name":"sort-id","value":"cm-03.01"}],"parts":[{"id":"cm-3.1_smt","name":"statement","prose":"The organization employs automated mechanisms to:","parts":[{"id":"cm-3.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Document proposed changes to the information system;"},{"id":"cm-3.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Notify {{ insert: param, cm-3.1_prm_1 }} of proposed changes to the information system and request change approval;"},{"id":"cm-3.1_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Highlight proposed changes to the information system that have not been approved or disapproved by {{ insert: param, cm-3.1_prm_2 }};"},{"id":"cm-3.1_smt.d","name":"item","props":[{"name":"label","value":"(d)"}],"prose":"Prohibit changes to the information system until designated approvals are received;"},{"id":"cm-3.1_smt.e","name":"item","props":[{"name":"label","value":"(e)"}],"prose":"Document all changes to the information system; and"},{"id":"cm-3.1_smt.f","name":"item","props":[{"name":"label","value":"(f)"}],"prose":"Notify {{ insert: param, cm-3.1_prm_3 }} when approved changes to the information system are completed."}]},{"id":"cm-3.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-3.1.a_obj","name":"objective","props":[{"name":"label","value":"CM-3(1)(a)"}],"prose":"employs automated mechanisms to document proposed changes to the information system;","links":[{"href":"#cm-3.1_smt.a","rel":"corresp"}]},{"id":"cm-3.1.b_obj","name":"objective","props":[{"name":"label","value":"CM-3(1)(b)"}],"parts":[{"id":"cm-3.1.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-3(1)(b)[1]"}],"prose":"defines approval authorities to be notified of proposed changes to the information system and request change approval;"},{"id":"cm-3.1.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-3(1)(b)[2]"}],"prose":"employs automated mechanisms to notify organization-defined approval authorities of proposed changes to the information system and request change approval;"}],"links":[{"href":"#cm-3.1_smt.b","rel":"corresp"}]},{"id":"cm-3.1.c_obj","name":"objective","props":[{"name":"label","value":"CM-3(1)(c)"}],"parts":[{"id":"cm-3.1.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-3(1)(c)[1]"}],"prose":"defines the time period within which proposed changes to the information system that have not been approved or disapproved must be highlighted;"},{"id":"cm-3.1.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-3(1)(c)[2]"}],"prose":"employs automated mechanisms to highlight proposed changes to the information system that have not been approved or disapproved by organization-defined time period;"}],"links":[{"href":"#cm-3.1_smt.c","rel":"corresp"}]},{"id":"cm-3.1.d_obj","name":"objective","props":[{"name":"label","value":"CM-3(1)(d)"}],"prose":"employs automated mechanisms to prohibit changes to the information system until designated approvals are received;","links":[{"href":"#cm-3.1_smt.d","rel":"corresp"}]},{"id":"cm-3.1.e_obj","name":"objective","props":[{"name":"label","value":"CM-3(1)(e)"}],"prose":"employs automated mechanisms to document all changes to the information system;","links":[{"href":"#cm-3.1_smt.e","rel":"corresp"}]},{"id":"cm-3.1.f_obj","name":"objective","props":[{"name":"label","value":"CM-3(1)(f)"}],"parts":[{"id":"cm-3.1.f_obj.1","name":"objective","props":[{"name":"label","value":"CM-3(1)(f)[1]"}],"prose":"defines personnel to be notified when approved changes to the information system are completed; and"},{"id":"cm-3.1.f_obj.2","name":"objective","props":[{"name":"label","value":"CM-3(1)(f)[2]"}],"prose":"employs automated mechanisms to notify organization-defined personnel when approved changes to the information system are completed."}],"links":[{"href":"#cm-3.1_smt.f","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system configuration change control\n\nconfiguration management plan\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\nautomated configuration control mechanisms\n\ninformation system configuration settings and associated documentation\n\nchange control records\n\ninformation system audit records\n\nchange approval requests\n\nchange approvals\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration change control responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for configuration change control\n\nautomated mechanisms implementing configuration change control activities"}]}]},{"id":"cm-3.2","class":"SP800-53-enhancement","title":"Test \/ Validate \/ Document Changes","props":[{"name":"label","value":"CM-3(2)"},{"name":"sort-id","value":"cm-03.02"}],"parts":[{"id":"cm-3.2_smt","name":"statement","prose":"The organization tests, validates, and documents changes to the information system before implementing the changes on the operational system."},{"id":"cm-3.2_gdn","name":"guidance","prose":"Changes to information systems include modifications to hardware, software, or firmware components and configuration settings defined in CM-6. Organizations ensure that testing does not interfere with information system operations. Individuals\/groups conducting tests understand organizational security policies and procedures, information system security policies and procedures, and the specific health, safety, and environmental risks associated with particular facilities\/processes. Operational systems may need to be taken off-line, or replicated to the extent feasible, before testing can be conducted. If information systems must be taken off-line for testing, the tests are scheduled to occur during planned system outages whenever possible. If testing cannot be conducted on operational systems, organizations employ compensating controls (e.g., testing on replicated systems)."},{"id":"cm-3.2_obj","name":"objective","prose":"Determine if the organization, before implementing changes on the operational system:","parts":[{"id":"cm-3.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-3(2)[1]"}],"prose":"tests changes to the information system;"},{"id":"cm-3.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-3(2)[2]"}],"prose":"validates changes to the information system; and"},{"id":"cm-3.2_obj.3","name":"objective","props":[{"name":"label","value":"CM-3(2)[3]"}],"prose":"documents changes to the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nconfiguration management plan\n\nprocedures addressing information system configuration change control\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\ntest records\n\nvalidation records\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration change control responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for configuration change control\n\nautomated mechanisms supporting and\/or implementing testing, validating, and documenting information system changes"}]}]}]},{"id":"cm-4","class":"SP800-53","title":"Security Impact Analysis","props":[{"name":"priority","value":"P2"},{"name":"label","value":"CM-4"},{"name":"sort-id","value":"cm-04"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-4_smt","name":"statement","prose":"The organization analyzes changes to the information system to determine potential security impacts prior to change implementation."},{"id":"cm-4_gdn","name":"guidance","prose":"Organizational personnel with information security responsibilities (e.g., Information System Administrators, Information System Security Officers, Information System Security Managers, and Information System Security Engineers) conduct security impact analyses. Individuals conducting security impact analyses possess the necessary skills\/technical expertise to analyze the changes to information systems and the associated security ramifications. Security impact analysis may include, for example, reviewing security plans to understand security control requirements and reviewing system design documentation to understand control implementation and how specific changes might affect the controls. Security impact analyses may also include assessments of risk to better understand the impact of the changes and to determine if additional security controls are required. Security impact analyses are scaled in accordance with the security categories of the information systems.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"cm-4_obj","name":"objective","prose":"Determine if the organization analyzes changes to the information system to determine potential security impacts prior to change implementation."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing security impact analysis for changes to the information system\n\nconfiguration management plan\n\nsecurity impact analysis documentation\n\nanalysis tools and associated outputs\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for conducting security impact analysis\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security impact analysis"}]}],"controls":[{"id":"cm-4.1","class":"SP800-53-enhancement","title":"Separate Test Environments","props":[{"name":"label","value":"CM-4(1)"},{"name":"sort-id","value":"cm-04.01"}],"parts":[{"id":"cm-4.1_smt","name":"statement","prose":"The organization analyzes changes to the information system in a separate test environment before implementation in an operational environment, looking for security impacts due to flaws, weaknesses, incompatibility, or intentional malice."},{"id":"cm-4.1_gdn","name":"guidance","prose":"Separate test environment in this context means an environment that is physically or logically isolated and distinct from the operational environment. The separation is sufficient to ensure that activities in the test environment do not impact activities in the operational environment, and information in the operational environment is not inadvertently transmitted to the test environment. Separate environments can be achieved by physical or logical means. If physically separate test environments are not used, organizations determine the strength of mechanism required when implementing logical separation (e.g., separation achieved through virtual machines).","links":[{"href":"#sa-11","rel":"related"},{"href":"#sc-3","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"cm-4.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-4.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-4(1)[1]"}],"prose":"analyzes changes to the information system in a separate test environment before implementation in an operational environment;"},{"id":"cm-4.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-4(1)[2]"}],"prose":"when analyzing changes to the information system in a separate test environment, looks for security impacts due to:","parts":[{"id":"cm-4.1_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-4(1)[2][a]"}],"prose":"flaws;"},{"id":"cm-4.1_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-4(1)[2][b]"}],"prose":"weaknesses;"},{"id":"cm-4.1_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-4(1)[2][c]"}],"prose":"incompatibility; and"},{"id":"cm-4.1_obj.2.d","name":"objective","props":[{"name":"label","value":"CM-4(1)[2][d]"}],"prose":"intentional malice."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing security impact analysis for changes to the information system\n\nconfiguration management plan\n\nsecurity impact analysis documentation\n\nanalysis tools and associated outputs information system design documentation\n\ninformation system architecture and configuration documentation\n\nchange control records\n\ninformation system audit records\n\ndocumentation evidence of separate test and operational environments\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for conducting security impact analysis\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security impact analysis\n\nautomated mechanisms supporting and\/or implementing security impact analysis of changes"}]}]}]},{"id":"cm-5","class":"SP800-53","title":"Access Restrictions for Change","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-5"},{"name":"sort-id","value":"cm-05"}],"parts":[{"id":"cm-5_smt","name":"statement","prose":"The organization defines, documents, approves, and enforces physical and logical access restrictions associated with changes to the information system."},{"id":"cm-5_gdn","name":"guidance","prose":"Any changes to the hardware, software, and\/or firmware components of information systems can potentially have significant effects on the overall security of the systems. Therefore, organizations permit only qualified and authorized individuals to access information systems for purposes of initiating changes, including upgrades and modifications. Organizations maintain records of access to ensure that configuration change control is implemented and to support after-the-fact actions should organizations discover any unauthorized changes. Access restrictions for change also include software libraries. Access restrictions include, for example, physical and logical access controls (see AC-3 and PE-3), workflow automation, media libraries, abstract layers (e.g., changes implemented into third-party interfaces rather than directly into information systems), and change windows (e.g., changes occur only during specified times, making unauthorized changes easy to discover).","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#pe-3","rel":"related"}]},{"id":"cm-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-5_obj.1","name":"objective","props":[{"name":"label","value":"CM-5[1]"}],"prose":"defines physical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.2","name":"objective","props":[{"name":"label","value":"CM-5[2]"}],"prose":"documents physical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.3","name":"objective","props":[{"name":"label","value":"CM-5[3]"}],"prose":"approves physical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.4","name":"objective","props":[{"name":"label","value":"CM-5[4]"}],"prose":"enforces physical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.5","name":"objective","props":[{"name":"label","value":"CM-5[5]"}],"prose":"defines logical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.6","name":"objective","props":[{"name":"label","value":"CM-5[6]"}],"prose":"documents logical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.7","name":"objective","props":[{"name":"label","value":"CM-5[7]"}],"prose":"approves logical access restrictions associated with changes to the information system; and"},{"id":"cm-5_obj.8","name":"objective","props":[{"name":"label","value":"CM-5[8]"}],"prose":"enforces logical access restrictions associated with changes to the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing access restrictions for changes to the information system\n\nconfiguration management plan\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nlogical access approvals\n\nphysical access approvals\n\naccess credentials\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with logical access control responsibilities\n\norganizational personnel with physical access control responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing access restrictions to change\n\nautomated mechanisms supporting\/implementing\/enforcing access restrictions associated with changes to the information system"}]}],"controls":[{"id":"cm-5.1","class":"SP800-53-enhancement","title":"Automated Access Enforcement \/ Auditing","props":[{"name":"label","value":"CM-5(1)"},{"name":"sort-id","value":"cm-05.01"}],"parts":[{"id":"cm-5.1_smt","name":"statement","prose":"The information system enforces access restrictions and supports auditing of the enforcement actions."},{"id":"cm-5.1_gdn","name":"guidance","links":[{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-6","rel":"related"}]},{"id":"cm-5.1_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"cm-5.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-5(1)[1]"}],"prose":"enforces access restrictions for change; and"},{"id":"cm-5.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-5(1)[2]"}],"prose":"supports auditing of the enforcement actions."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing access restrictions for changes to the information system\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing access restrictions to change\n\nautomated mechanisms implementing enforcement of access restrictions for changes to the information system\n\nautomated mechanisms supporting auditing of enforcement actions"}]}]},{"id":"cm-5.2","class":"SP800-53-enhancement","title":"Review System Changes","params":[{"id":"cm-5.2_prm_1","label":"organization-defined frequency"},{"id":"cm-5.2_prm_2","label":"organization-defined circumstances"}],"props":[{"name":"label","value":"CM-5(2)"},{"name":"sort-id","value":"cm-05.02"}],"parts":[{"id":"cm-5.2_smt","name":"statement","prose":"The organization reviews information system changes {{ insert: param, cm-5.2_prm_1 }} and {{ insert: param, cm-5.2_prm_2 }} to determine whether unauthorized changes have occurred."},{"id":"cm-5.2_gdn","name":"guidance","prose":"Indications that warrant review of information system changes and the specific circumstances justifying such reviews may be obtained from activities carried out by organizations during the configuration change process.","links":[{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#pe-6","rel":"related"},{"href":"#pe-8","rel":"related"}]},{"id":"cm-5.2_obj","name":"objective","prose":"Determine if the organization, in an effort to ascertain whether unauthorized changes have occurred:","parts":[{"id":"cm-5.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-5(2)[1]"}],"prose":"defines the frequency to review information system changes;"},{"id":"cm-5.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-5(2)[2]"}],"prose":"defines circumstances that warrant review of information system changes;"},{"id":"cm-5.2_obj.3","name":"objective","props":[{"name":"label","value":"CM-5(2)[3]"}],"prose":"reviews information system changes with the organization-defined frequency; and"},{"id":"cm-5.2_obj.4","name":"objective","props":[{"name":"label","value":"CM-5(2)[4]"}],"prose":"reviews information system changes with the organization-defined circumstances."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing access restrictions for changes to the information system\n\nconfiguration management plan\n\nsecurity plan\n\nreviews of information system changes\n\naudit and review reports\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing access restrictions to change\n\nautomated mechanisms supporting\/implementing information system reviews to determine whether unauthorized changes have occurred"}]}]},{"id":"cm-5.3","class":"SP800-53-enhancement","title":"Signed Components","params":[{"id":"cm-5.3_prm_1","label":"organization-defined software and firmware components"}],"props":[{"name":"label","value":"CM-5(3)"},{"name":"sort-id","value":"cm-05.03"}],"parts":[{"id":"cm-5.3_smt","name":"statement","prose":"The information system prevents the installation of {{ insert: param, cm-5.3_prm_1 }} without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization."},{"id":"cm-5.3_gdn","name":"guidance","prose":"Software and firmware components prevented from installation unless signed with recognized and approved certificates include, for example, software and firmware version updates, patches, service packs, device drivers, and basic input output system (BIOS) updates. Organizations can identify applicable software and firmware components by type, by specific items, or a combination of both. Digital signatures and organizational verification of such signatures, is a method of code authentication.","links":[{"href":"#cm-7","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"cm-5.3_obj","name":"objective","prose":"Determine if:","parts":[{"id":"cm-5.3_obj.1","name":"objective","props":[{"name":"label","value":"CM-5(3)[1]"}],"prose":"the organization defines software and firmware components that the information system will prevent from being installed without verification that such components have been digitally signed using a certificate that is recognized and approved by the organization; and"},{"id":"cm-5.3_obj.2","name":"objective","props":[{"name":"label","value":"CM-5(3)[2]"}],"prose":"the information system prevents the installation of organization-defined software and firmware components without verification that such components have been digitally signed using a certificate that is recognized and approved by the organization."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing access restrictions for changes to the information system\n\nconfiguration management plan\n\nsecurity plan\n\nlist of software and firmware components to be prohibited from installation without a recognized and approved certificate\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing access restrictions to change\n\nautomated mechanisms preventing installation of software and firmware components not signed with an organization-recognized and approved certificate"}]}]}]},{"id":"cm-6","class":"SP800-53","title":"Configuration Settings","params":[{"id":"cm-6_prm_1","label":"organization-defined security configuration checklists"},{"id":"cm-6_prm_2","label":"organization-defined information system components"},{"id":"cm-6_prm_3","label":"organization-defined operational requirements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-6"},{"name":"sort-id","value":"cm-06"}],"links":[{"href":"#990268bf-f4a9-4c81-91ae-dc7d3115f4b1","rel":"reference"},{"href":"#0b3d8ba9-051f-498d-81ea-97f0f018c612","rel":"reference"},{"href":"#0916ef02-3618-411b-a525-565c088849a6","rel":"reference"},{"href":"#84a37532-6db6-477b-9ea8-f9085ebca0fc","rel":"reference"},{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"},{"href":"#275cc052-0f7f-423c-bdb6-ed503dc36228","rel":"reference"},{"href":"#e95dd121-2733-413e-bf1e-f1eb49f20a98","rel":"reference"},{"href":"#647b6de3-81d0-4d22-bec1-5f1333e34380","rel":"reference"}],"parts":[{"id":"cm-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes and documents configuration settings for information technology products employed within the information system using {{ insert: param, cm-6_prm_1 }} that reflect the most restrictive mode consistent with operational requirements;"},{"id":"cm-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Implements the configuration settings;"},{"id":"cm-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Identifies, documents, and approves any deviations from established configuration settings for {{ insert: param, cm-6_prm_2 }} based on {{ insert: param, cm-6_prm_3 }}; and"},{"id":"cm-6_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Monitors and controls changes to the configuration settings in accordance with organizational policies and procedures."}]},{"id":"cm-6_gdn","name":"guidance","prose":"Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the information system that affect the security posture and\/or functionality of the system. Information technology products for which security-related configuration settings can be defined include, for example, mainframe computers, servers (e.g., database, electronic mail, authentication, web, proxy, file, domain name), workstations, input\/output devices (e.g., scanners, copiers, and printers), network components (e.g., firewalls, routers, gateways, voice and data switches, wireless access points, network appliances, sensors), operating systems, middleware, and applications. Security-related parameters are those parameters impacting the security state of information systems including the parameters required to satisfy other security control requirements. Security-related parameters include, for example: (i) registry settings; (ii) account, file, directory permission settings; and (iii) settings for functions, ports, protocols, services, and remote connections. Organizations establish organization-wide configuration settings and subsequently derive specific settings for information systems. The established settings become part of the systems configuration baseline. Common secure configurations (also referred to as security configuration checklists, lockdown and hardening guides, security reference guides, security technical implementation guides) provide recognized, standardized, and established benchmarks that stipulate secure configuration settings for specific information technology platforms\/products and instructions for configuring those information system components to meet operational requirements. Common secure configurations can be developed by a variety of organizations including, for example, information technology product developers, manufacturers, vendors, consortia, academia, industry, federal agencies, and other organizations in the public and private sectors. Common secure configurations include the United States Government Configuration Baseline (USGCB) which affects the implementation of CM-6 and other controls such as AC-19 and CM-7. The Security Content Automation Protocol (SCAP) and the defined standards within the protocol (e.g., Common Configuration Enumeration) provide an effective method to uniquely identify, track, and control configuration settings. OMB establishes federal policy on configuration requirements for federal information systems.","links":[{"href":"#ac-19","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"cm-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-6.a_obj","name":"objective","props":[{"name":"label","value":"CM-6(a)"}],"parts":[{"id":"cm-6.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(a)[1]"}],"prose":"defines security configuration checklists to be used to establish and document configuration settings for the information technology products employed;"},{"id":"cm-6.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(a)[2]"}],"prose":"ensures the defined security configuration checklists reflect the most restrictive mode consistent with operational requirements;"},{"id":"cm-6.a_obj.3","name":"objective","props":[{"name":"label","value":"CM-6(a)[3]"}],"prose":"establishes and documents configuration settings for information technology products employed within the information system using organization-defined security configuration checklists;"}]},{"id":"cm-6.b_obj","name":"objective","props":[{"name":"label","value":"CM-6(b)"}],"prose":"implements the configuration settings established\/documented in CM-6(a);;"},{"id":"cm-6.c_obj","name":"objective","props":[{"name":"label","value":"CM-6(c)"}],"parts":[{"id":"cm-6.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(c)[1]"}],"prose":"defines information system components for which any deviations from established configuration settings must be:","parts":[{"id":"cm-6.c_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-6(c)[1][a]"}],"prose":"identified;"},{"id":"cm-6.c_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-6(c)[1][b]"}],"prose":"documented;"},{"id":"cm-6.c_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-6(c)[1][c]"}],"prose":"approved;"}]},{"id":"cm-6.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(c)[2]"}],"prose":"defines operational requirements to support:","parts":[{"id":"cm-6.c_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-6(c)[2][a]"}],"prose":"the identification of any deviations from established configuration settings;"},{"id":"cm-6.c_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-6(c)[2][b]"}],"prose":"the documentation of any deviations from established configuration settings;"},{"id":"cm-6.c_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-6(c)[2][c]"}],"prose":"the approval of any deviations from established configuration settings;"}]},{"id":"cm-6.c_obj.3","name":"objective","props":[{"name":"label","value":"CM-6(c)[3]"}],"prose":"identifies any deviations from established configuration settings for organization-defined information system components based on organizational-defined operational requirements;"},{"id":"cm-6.c_obj.4","name":"objective","props":[{"name":"label","value":"CM-6(c)[4]"}],"prose":"documents any deviations from established configuration settings for organization-defined information system components based on organizational-defined operational requirements;"},{"id":"cm-6.c_obj.5","name":"objective","props":[{"name":"label","value":"CM-6(c)[5]"}],"prose":"approves any deviations from established configuration settings for organization-defined information system components based on organizational-defined operational requirements;"}]},{"id":"cm-6.d_obj","name":"objective","props":[{"name":"label","value":"CM-6(d)"}],"parts":[{"id":"cm-6.d_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(d)[1]"}],"prose":"monitors changes to the configuration settings in accordance with organizational policies and procedures; and"},{"id":"cm-6.d_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(d)[2]"}],"prose":"controls changes to the configuration settings in accordance with organizational policies and procedures."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing configuration settings for the information system\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity configuration checklists\n\nevidence supporting approved deviations from established configuration settings\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing configuration settings\n\nautomated mechanisms that implement, monitor, and\/or control information system configuration settings\n\nautomated mechanisms that identify and\/or document deviations from established configuration settings"}]}],"controls":[{"id":"cm-6.1","class":"SP800-53-enhancement","title":"Automated Central Management \/ Application \/ Verification","params":[{"id":"cm-6.1_prm_1","label":"organization-defined information system components"}],"props":[{"name":"label","value":"CM-6(1)"},{"name":"sort-id","value":"cm-06.01"}],"parts":[{"id":"cm-6.1_smt","name":"statement","prose":"The organization employs automated mechanisms to centrally manage, apply, and verify configuration settings for {{ insert: param, cm-6.1_prm_1 }}."},{"id":"cm-6.1_gdn","name":"guidance","links":[{"href":"#ca-7","rel":"related"},{"href":"#cm-4","rel":"related"}]},{"id":"cm-6.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-6.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(1)[1]"}],"prose":"defines information system components for which automated mechanisms are to be employed to:","parts":[{"id":"cm-6.1_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-6(1)[1][a]"}],"prose":"centrally manage configuration settings of such components;"},{"id":"cm-6.1_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-6(1)[1][b]"}],"prose":"apply configuration settings of such components;"},{"id":"cm-6.1_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-6(1)[1][c]"}],"prose":"verify configuration settings of such components;"}]},{"id":"cm-6.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(1)[2]"}],"prose":"employs automated mechanisms to:","parts":[{"id":"cm-6.1_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-6(1)[2][a]"}],"prose":"centrally manage configuration settings for organization-defined information system components;"},{"id":"cm-6.1_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-6(1)[2][b]"}],"prose":"apply configuration settings for organization-defined information system components; and"},{"id":"cm-6.1_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-6(1)[2][c]"}],"prose":"verify configuration settings for organization-defined information system components."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing configuration settings for the information system\n\nconfiguration management plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity configuration checklists\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing configuration settings\n\nautomated mechanisms implemented to centrally manage, apply, and verify information system configuration settings"}]}]},{"id":"cm-6.2","class":"SP800-53-enhancement","title":"Respond to Unauthorized Changes","params":[{"id":"cm-6.2_prm_1","label":"organization-defined security safeguards"},{"id":"cm-6.2_prm_2","label":"organization-defined configuration settings"}],"props":[{"name":"label","value":"CM-6(2)"},{"name":"sort-id","value":"cm-06.02"}],"parts":[{"id":"cm-6.2_smt","name":"statement","prose":"The organization employs {{ insert: param, cm-6.2_prm_1 }} to respond to unauthorized changes to {{ insert: param, cm-6.2_prm_2 }}."},{"id":"cm-6.2_gdn","name":"guidance","prose":"Responses to unauthorized changes to configuration settings can include, for example, alerting designated organizational personnel, restoring established configuration settings, or in extreme cases, halting affected information system processing.","links":[{"href":"#ir-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"cm-6.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-6.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(2)[1]"}],"prose":"defines configuration settings that, if modified by unauthorized changes, result in organizational security safeguards being employed to respond to such changes;"},{"id":"cm-6.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(2)[2]"}],"prose":"defines security safeguards to be employed to respond to unauthorized changes to organization-defined configuration settings; and"},{"id":"cm-6.2_obj.3","name":"objective","props":[{"name":"label","value":"CM-6(2)[3]"}],"prose":"employs organization-defined security safeguards to respond to unauthorized changes to organization-defined configuration settings."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing configuration settings for the information system\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nalerts\/notifications of unauthorized changes to information system configuration settings\n\ndocumented responses to unauthorized changes to information system configuration settings\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for responding to unauthorized changes to information system configuration settings\n\nautomated mechanisms supporting and\/or implementing security safeguards for response to unauthorized changes"}]}]}]},{"id":"cm-7","class":"SP800-53","title":"Least Functionality","params":[{"id":"cm-7_prm_1","label":"organization-defined prohibited or restricted functions, ports, protocols, and\/or services"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-7"},{"name":"sort-id","value":"cm-07"}],"links":[{"href":"#e42b2099-3e1c-415b-952c-61c96533c12e","rel":"reference"}],"parts":[{"id":"cm-7_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Configures the information system to provide only essential capabilities; and"},{"id":"cm-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Prohibits or restricts the use of the following functions, ports, protocols, and\/or services: {{ insert: param, cm-7_prm_1 }}."}]},{"id":"cm-7_gdn","name":"guidance","prose":"Information systems can provide a wide variety of functions and services. Some of the functions and services, provided by default, may not be necessary to support essential organizational operations (e.g., key missions, functions). Additionally, it is sometimes convenient to provide multiple services from single information system components, but doing so increases risk over limiting the services provided by any one component. Where feasible, organizations limit component functionality to a single function per device (e.g., email servers or web servers, but not both). Organizations review functions and services provided by information systems or individual components of information systems, to determine which functions and services are candidates for elimination (e.g., Voice Over Internet Protocol, Instant Messaging, auto-execute, and file sharing). Organizations consider disabling unused or unnecessary physical and logical ports\/protocols (e.g., Universal Serial Bus, File Transfer Protocol, and Hyper Text Transfer Protocol) on information systems to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling. Organizations can utilize network scanning tools, intrusion detection and prevention systems, and end-point protections such as firewalls and host-based intrusion detection systems to identify and prevent the use of prohibited functions, ports, protocols, and services.","links":[{"href":"#ac-6","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"cm-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-7.a_obj","name":"objective","props":[{"name":"label","value":"CM-7(a)"}],"prose":"configures the information system to provide only essential capabilities;"},{"id":"cm-7.b_obj","name":"objective","props":[{"name":"label","value":"CM-7(b)"}],"parts":[{"id":"cm-7.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(b)[1]"}],"prose":"defines prohibited or restricted:","parts":[{"id":"cm-7.b_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][a]"}],"prose":"functions;"},{"id":"cm-7.b_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][b]"}],"prose":"ports;"},{"id":"cm-7.b_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.b_obj.1.d","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][d]"}],"prose":"services;"}]},{"id":"cm-7.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(b)[2]"}],"prose":"prohibits or restricts the use of organization-defined:","parts":[{"id":"cm-7.b_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][a]"}],"prose":"functions;"},{"id":"cm-7.b_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][b]"}],"prose":"ports;"},{"id":"cm-7.b_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.b_obj.2.d","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][d]"}],"prose":"services."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nconfiguration management plan\n\nprocedures addressing least functionality in the information system\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity configuration checklists\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes prohibiting or restricting functions, ports, protocols, and\/or services\n\nautomated mechanisms implementing restrictions or prohibition of functions, ports, protocols, and\/or services"}]}],"controls":[{"id":"cm-7.1","class":"SP800-53-enhancement","title":"Periodic Review","params":[{"id":"cm-7.1_prm_1","label":"organization-defined frequency"},{"id":"cm-7.1_prm_2","label":"organization-defined functions, ports, protocols, and services within the information system deemed to be unnecessary and\/or nonsecure"}],"props":[{"name":"label","value":"CM-7(1)"},{"name":"sort-id","value":"cm-07.01"}],"parts":[{"id":"cm-7.1_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-7.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Reviews the information system {{ insert: param, cm-7.1_prm_1 }} to identify unnecessary and\/or nonsecure functions, ports, protocols, and services; and"},{"id":"cm-7.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Disables {{ insert: param, cm-7.1_prm_2 }}."}]},{"id":"cm-7.1_gdn","name":"guidance","prose":"The organization can either make a determination of the relative security of the function, port, protocol, and\/or service or base the security decision on the assessment of other entities. Bluetooth, FTP, and peer-to-peer networking are examples of less than secure protocols.","links":[{"href":"#ac-18","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#ia-2","rel":"related"}]},{"id":"cm-7.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-7.1.a_obj","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)"}],"parts":[{"id":"cm-7.1.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[1]"}],"prose":"defines the frequency to review the information system to identify unnecessary and\/or nonsecure:","parts":[{"id":"cm-7.1.a_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[1][a]"}],"prose":"functions;"},{"id":"cm-7.1.a_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[1][b]"}],"prose":"ports;"},{"id":"cm-7.1.a_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[1][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.1.a_obj.1.d","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[1][d]"}],"prose":"services;"}]},{"id":"cm-7.1.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[2]"}],"prose":"reviews the information system with the organization-defined frequency to identify unnecessary and\/or nonsecure:","parts":[{"id":"cm-7.1.a_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[2][a]"}],"prose":"functions;"},{"id":"cm-7.1.a_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[2][b]"}],"prose":"ports;"},{"id":"cm-7.1.a_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[2][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.1.a_obj.2.d","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[2][d]"}],"prose":"services;"}]}],"links":[{"href":"#cm-7.1_smt.a","rel":"corresp"}]},{"id":"cm-7.1.b_obj","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)"}],"parts":[{"id":"cm-7.1.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[1]"}],"prose":"defines, within the information system, unnecessary and\/or nonsecure:","parts":[{"id":"cm-7.1.b_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[1][a]"}],"prose":"functions;"},{"id":"cm-7.1.b_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[1][b]"}],"prose":"ports;"},{"id":"cm-7.1.b_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[1][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.1.b_obj.1.d","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[1][d]"}],"prose":"services;"}]},{"id":"cm-7.1.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[2]"}],"prose":"disables organization-defined unnecessary and\/or nonsecure:","parts":[{"id":"cm-7.1.b_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[2][a]"}],"prose":"functions;"},{"id":"cm-7.1.b_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[2][b]"}],"prose":"ports;"},{"id":"cm-7.1.b_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[2][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.1.b_obj.2.d","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[2][d]"}],"prose":"services."}]}],"links":[{"href":"#cm-7.1_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing least functionality in the information system\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity configuration checklists\n\ndocumented reviews of functions, ports, protocols, and\/or services\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for reviewing functions, ports, protocols, and services on the information system\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for reviewing\/disabling nonsecure functions, ports, protocols, and\/or services\n\nautomated mechanisms implementing review and disabling of nonsecure functions, ports, protocols, and\/or services"}]}]},{"id":"cm-7.2","class":"SP800-53-enhancement","title":"Prevent Program Execution","params":[{"id":"cm-7.2_prm_1","select":{"how-many":"one-or-more","choice":[" {{ insert: param, cm-7.2_prm_2 }} ","rules authorizing the terms and conditions of software program usage"]}},{"id":"cm-7.2_prm_2","depends-on":"cm-7.2_prm_1","label":"organization-defined policies regarding software program usage and restrictions"}],"props":[{"name":"label","value":"CM-7(2)"},{"name":"sort-id","value":"cm-07.02"}],"parts":[{"id":"cm-7.2_smt","name":"statement","prose":"The information system prevents program execution in accordance with {{ insert: param, cm-7.2_prm_1 }}."},{"id":"cm-7.2_gdn","name":"guidance","links":[{"href":"#cm-8","rel":"related"},{"href":"#pm-5","rel":"related"}]},{"id":"cm-7.2_obj","name":"objective","prose":"Determine if:","parts":[{"id":"cm-7.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(2)[1]"}],"prose":"the organization defines policies regarding software program usage and restrictions;"},{"id":"cm-7.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(2)[2]"}],"prose":"the information system prevents program execution in accordance with one or more of the following:","parts":[{"id":"cm-7.2_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-7(2)[2][a]"}],"prose":"organization-defined policies regarding program usage and restrictions; and\/or"},{"id":"cm-7.2_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-7(2)[2][b]"}],"prose":"rules authorizing the terms and conditions of software program usage."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing least functionality in the information system\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\nspecifications for preventing software program execution\n\ninformation system configuration settings and associated documentation\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes preventing program execution on the information system\n\norganizational processes for software program usage and restrictions\n\nautomated mechanisms preventing program execution on the information system\n\nautomated mechanisms supporting and\/or implementing software program usage and restrictions"}]}]},{"id":"cm-7.5","class":"SP800-53-enhancement","title":"Authorized Software \/ Whitelisting","params":[{"id":"cm-7.5_prm_1","label":"organization-defined software programs authorized to execute on the information system"},{"id":"cm-7.5_prm_2","label":"organization-defined frequency"}],"props":[{"name":"label","value":"CM-7(5)"},{"name":"sort-id","value":"cm-07.05"}],"parts":[{"id":"cm-7.5_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-7.5_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Identifies {{ insert: param, cm-7.5_prm_1 }};"},{"id":"cm-7.5_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Employs a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the information system; and"},{"id":"cm-7.5_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Reviews and updates the list of authorized software programs {{ insert: param, cm-7.5_prm_2 }}."}]},{"id":"cm-7.5_gdn","name":"guidance","prose":"The process used to identify software programs that are authorized to execute on organizational information systems is commonly referred to as whitelisting. In addition to whitelisting, organizations consider verifying the integrity of white-listed software programs using, for example, cryptographic checksums, digital signatures, or hash functions. Verification of white-listed software can occur either prior to execution or at system startup.","links":[{"href":"#cm-2","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#pm-5","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#sc-34","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"cm-7.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-7.5.a_obj","name":"objective","props":[{"name":"label","value":"CM-7(5)(a)"}],"prose":"Identifies\/defines software programs authorized to execute on the information system;","links":[{"href":"#cm-7.5_smt.a","rel":"corresp"}]},{"id":"cm-7.5.b_obj","name":"objective","props":[{"name":"label","value":"CM-7(5)(b)"}],"prose":"employs a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the information system;","links":[{"href":"#cm-7.5_smt.b","rel":"corresp"}]},{"id":"cm-7.5.c_obj","name":"objective","props":[{"name":"label","value":"CM-7(5)(c)"}],"parts":[{"id":"cm-7.5.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(5)(c)[1]"}],"prose":"defines the frequency to review and update the list of authorized software programs on the information system; and"},{"id":"cm-7.5.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(5)(c)[2]"}],"prose":"reviews and updates the list of authorized software programs with the organization-defined frequency."}],"links":[{"href":"#cm-7.5_smt.c","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing least functionality in the information system\n\nconfiguration management plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of software programs authorized to execute on the information system\n\nsecurity configuration checklists\n\nreview and update records associated with list of authorized software programs\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for identifying software authorized to execute on the information system\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for identifying, reviewing, and updating programs authorized to execute on the information system\n\norganizational process for implementing whitelisting\n\nautomated mechanisms implementing whitelisting"}]}]}]},{"id":"cm-8","class":"SP800-53","title":"Information System Component Inventory","params":[{"id":"cm-8_prm_1","label":"organization-defined information deemed necessary to achieve effective information system component accountability"},{"id":"cm-8_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-8"},{"name":"sort-id","value":"cm-08"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops and documents an inventory of information system components that:","parts":[{"id":"cm-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Accurately reflects the current information system;"},{"id":"cm-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Includes all components within the authorization boundary of the information system;"},{"id":"cm-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Is at the level of granularity deemed necessary for tracking and reporting; and"},{"id":"cm-8_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Includes {{ insert: param, cm-8_prm_1 }}; and"}]},{"id":"cm-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the information system component inventory {{ insert: param, cm-8_prm_2 }}."}]},{"id":"cm-8_gdn","name":"guidance","prose":"Organizations may choose to implement centralized information system component inventories that include components from all organizational information systems. In such situations, organizations ensure that the resulting inventories include system-specific information required for proper component accountability (e.g., information system association, information system owner). Information deemed necessary for effective accountability of information system components includes, for example, hardware inventory specifications, software license information, software version numbers, component owners, and for networked components or devices, machine names and network addresses. Inventory specifications include, for example, manufacturer, device type, model, serial number, and physical location.","links":[{"href":"#cm-2","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#pm-5","rel":"related"}]},{"id":"cm-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-8.a_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)"}],"parts":[{"id":"cm-8.a.1_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(1)"}],"prose":"develops and documents an inventory of information system components that accurately reflects the current information system;"},{"id":"cm-8.a.2_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(2)"}],"prose":"develops and documents an inventory of information system components that includes all components within the authorization boundary of the information system;"},{"id":"cm-8.a.3_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(3)"}],"prose":"develops and documents an inventory of information system components that is at the level of granularity deemed necessary for tracking and reporting;"},{"id":"cm-8.a.4_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(4)"}],"parts":[{"id":"cm-8.a.4_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(a)(4)[1]"}],"prose":"defines the information deemed necessary to achieve effective information system component accountability;"},{"id":"cm-8.a.4_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(a)(4)[2]"}],"prose":"develops and documents an inventory of information system components that includes organization-defined information deemed necessary to achieve effective information system component accountability;"}]}]},{"id":"cm-8.b_obj","name":"objective","props":[{"name":"label","value":"CM-8(b)"}],"parts":[{"id":"cm-8.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(b)[1]"}],"prose":"defines the frequency to review and update the information system component inventory; and"},{"id":"cm-8.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(b)[2]"}],"prose":"reviews and updates the information system component inventory with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system component inventory\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system inventory records\n\ninventory reviews and update records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for information system component inventory\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for developing and documenting an inventory of information system components\n\nautomated mechanisms supporting and\/or implementing the information system component inventory"}]}],"controls":[{"id":"cm-8.1","class":"SP800-53-enhancement","title":"Updates During Installations \/ Removals","props":[{"name":"label","value":"CM-8(1)"},{"name":"sort-id","value":"cm-08.01"}],"parts":[{"id":"cm-8.1_smt","name":"statement","prose":"The organization updates the inventory of information system components as an integral part of component installations, removals, and information system updates."},{"id":"cm-8.1_obj","name":"objective","prose":"Determine if the organization updates the inventory of information system components as an integral part of:","parts":[{"id":"cm-8.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(1)[1]"}],"prose":"component installations;"},{"id":"cm-8.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(1)[2]"}],"prose":"component removals; and"},{"id":"cm-8.1_obj.3","name":"objective","props":[{"name":"label","value":"CM-8(1)[3]"}],"prose":"information system updates."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system component inventory\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system inventory records\n\ninventory reviews and update records\n\ncomponent installation records\n\ncomponent removal records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for updating the information system component inventory\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for updating inventory of information system components\n\nautomated mechanisms implementing updating of the information system component inventory"}]}]},{"id":"cm-8.2","class":"SP800-53-enhancement","title":"Automated Maintenance","props":[{"name":"label","value":"CM-8(2)"},{"name":"sort-id","value":"cm-08.02"}],"parts":[{"id":"cm-8.2_smt","name":"statement","prose":"The organization employs automated mechanisms to help maintain an up-to-date, complete, accurate, and readily available inventory of information system components."},{"id":"cm-8.2_gdn","name":"guidance","prose":"Organizations maintain information system inventories to the extent feasible. Virtual machines, for example, can be difficult to monitor because such machines are not visible to the network when not in use. In such cases, organizations maintain as up-to-date, complete, and accurate an inventory as is deemed reasonable. This control enhancement can be satisfied by the implementation of CM-2 (2) for organizations that choose to combine information system component inventory and baseline configuration activities.","links":[{"href":"#si-7","rel":"related"}]},{"id":"cm-8.2_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to maintain an inventory of information system components that is:","parts":[{"id":"cm-8.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(2)[1]"}],"prose":"up-to-date;"},{"id":"cm-8.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(2)[2]"}],"prose":"complete;"},{"id":"cm-8.2_obj.3","name":"objective","props":[{"name":"label","value":"CM-8(2)[3]"}],"prose":"accurate; and"},{"id":"cm-8.2_obj.4","name":"objective","props":[{"name":"label","value":"CM-8(2)[4]"}],"prose":"readily available."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nconfiguration management plan\n\nprocedures addressing information system component inventory\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system inventory records\n\nchange control records\n\ninformation system maintenance records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing the automated mechanisms implementing the information system component inventory\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for maintaining the inventory of information system components\n\nautomated mechanisms implementing the information system component inventory"}]}]},{"id":"cm-8.3","class":"SP800-53-enhancement","title":"Automated Unauthorized Component Detection","params":[{"id":"cm-8.3_prm_1","label":"organization-defined frequency"},{"id":"cm-8.3_prm_2","select":{"how-many":"one-or-more","choice":["disables network access by such components","isolates the components","notifies {{ insert: param, cm-8.3_prm_3 }} "]}},{"id":"cm-8.3_prm_3","depends-on":"cm-8.3_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"CM-8(3)"},{"name":"sort-id","value":"cm-08.03"}],"parts":[{"id":"cm-8.3_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-8.3_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Employs automated mechanisms {{ insert: param, cm-8.3_prm_1 }} to detect the presence of unauthorized hardware, software, and firmware components within the information system; and"},{"id":"cm-8.3_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Takes the following actions when unauthorized components are detected: {{ insert: param, cm-8.3_prm_2 }}."}]},{"id":"cm-8.3_gdn","name":"guidance","prose":"This control enhancement is applied in addition to the monitoring for unauthorized remote connections and mobile devices. Monitoring for unauthorized system components may be accomplished on an ongoing basis or by the periodic scanning of systems for that purpose. Automated mechanisms can be implemented within information systems or in other separate devices. Isolation can be achieved, for example, by placing unauthorized information system components in separate domains or subnets or otherwise quarantining such components. This type of component isolation is commonly referred to as sandboxing.","links":[{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"},{"href":"#ra-5","rel":"related"}]},{"id":"cm-8.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-8.3.a_obj","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)"}],"parts":[{"id":"cm-8.3.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[1]"}],"prose":"defines the frequency to employ automated mechanisms to detect the presence of unauthorized:","parts":[{"id":"cm-8.3.a_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[1][a]"}],"prose":"hardware components within the information system;"},{"id":"cm-8.3.a_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[1][b]"}],"prose":"software components within the information system;"},{"id":"cm-8.3.a_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[1][c]"}],"prose":"firmware components within the information system;"}]},{"id":"cm-8.3.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[2]"}],"prose":"employs automated mechanisms with the organization-defined frequency to detect the presence of unauthorized:","parts":[{"id":"cm-8.3.a_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[2][a]"}],"prose":"hardware components within the information system;"},{"id":"cm-8.3.a_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[2][b]"}],"prose":"software components within the information system;"},{"id":"cm-8.3.a_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[2][c]"}],"prose":"firmware components within the information system;"}]}],"links":[{"href":"#cm-8.3_smt.a","rel":"corresp"}]},{"id":"cm-8.3.b_obj","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)"}],"parts":[{"id":"cm-8.3.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)[1]"}],"prose":"defines personnel or roles to be notified when unauthorized components are detected;"},{"id":"cm-8.3.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)[2]"}],"prose":"takes one or more of the following actions when unauthorized components are detected:","parts":[{"id":"cm-8.3.b_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)[2][a]"}],"prose":"disables network access by such components;"},{"id":"cm-8.3.b_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)[2][b]"}],"prose":"isolates the components; and\/or"},{"id":"cm-8.3.b_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)[2][c]"}],"prose":"notifies organization-defined personnel or roles."}]}],"links":[{"href":"#cm-8.3_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system component inventory\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system inventory records\n\nalerts\/notifications of unauthorized components within the information system\n\ninformation system monitoring records\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing the automated mechanisms implementing unauthorized information system component detection\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for detection of unauthorized information system components\n\nautomated mechanisms implementing the detection of unauthorized information system components"}]}]},{"id":"cm-8.4","class":"SP800-53-enhancement","title":"Accountability Information","params":[{"id":"cm-8.4_prm_1","select":{"how-many":"one-or-more","choice":["name","position","role"]}}],"props":[{"name":"label","value":"CM-8(4)"},{"name":"sort-id","value":"cm-08.04"}],"parts":[{"id":"cm-8.4_smt","name":"statement","prose":"The organization includes in the information system component inventory information, a means for identifying by {{ insert: param, cm-8.4_prm_1 }}, individuals responsible\/accountable for administering those components."},{"id":"cm-8.4_gdn","name":"guidance","prose":"Identifying individuals who are both responsible and accountable for administering information system components helps to ensure that the assigned components are properly administered and organizations can contact those individuals if some action is required (e.g., component is determined to be the source of a breach\/compromise, component needs to be recalled\/replaced, or component needs to be relocated)."},{"id":"cm-8.4_obj","name":"objective","prose":"Determine if the organization includes in the information system component inventory for information system components, a means for identifying the individuals responsible and accountable for administering those components by one or more of the following:","parts":[{"id":"cm-8.4_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(4)[1]"}],"prose":"name;"},{"id":"cm-8.4_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(4)[2]"}],"prose":"position; and\/or"},{"id":"cm-8.4_obj.3","name":"objective","props":[{"name":"label","value":"CM-8(4)[3]"}],"prose":"role."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system component inventory\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system inventory records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing the information system component inventory\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for maintaining the inventory of information system components\n\nautomated mechanisms implementing the information system component inventory"}]}]},{"id":"cm-8.5","class":"SP800-53-enhancement","title":"No Duplicate Accounting of Components","props":[{"name":"label","value":"CM-8(5)"},{"name":"sort-id","value":"cm-08.05"}],"parts":[{"id":"cm-8.5_smt","name":"statement","prose":"The organization verifies that all components within the authorization boundary of the information system are not duplicated in other information system component inventories."},{"id":"cm-8.5_gdn","name":"guidance","prose":"This control enhancement addresses the potential problem of duplicate accounting of information system components in large or complex interconnected systems."},{"id":"cm-8.5_obj","name":"objective","prose":"Determine if the organization verifies that all components within the authorization boundary of the information system are not duplicated in other information system inventories."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system component inventory\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system inventory records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system inventory responsibilities\n\norganizational personnel with responsibilities for defining information system components within the authorization boundary of the system\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for maintaining the inventory of information system components\n\nautomated mechanisms implementing the information system component inventory"}]}]}]},{"id":"cm-9","class":"SP800-53","title":"Configuration Management Plan","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-9"},{"name":"sort-id","value":"cm-09"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-9_smt","name":"statement","prose":"The organization develops, documents, and implements a configuration management plan for the information system that:","parts":[{"id":"cm-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Addresses roles, responsibilities, and configuration management processes and procedures;"},{"id":"cm-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishes a process for identifying configuration items throughout the system development life cycle and for managing the configuration of the configuration items;"},{"id":"cm-9_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Defines the configuration items for the information system and places the configuration items under configuration management; and"},{"id":"cm-9_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects the configuration management plan from unauthorized disclosure and modification."}]},{"id":"cm-9_gdn","name":"guidance","prose":"Configuration management plans satisfy the requirements in configuration management policies while being tailored to individual information systems. Such plans define detailed processes and procedures for how configuration management is used to support system development life cycle activities at the information system level. Configuration management plans are typically developed during the development\/acquisition phase of the system development life cycle. The plans describe how to move changes through change management processes, how to update configuration settings and baselines, how to maintain information system component inventories, how to control development, test, and operational environments, and how to develop, release, and update key documents. Organizations can employ templates to help ensure consistent and timely development and implementation of configuration management plans. Such templates can represent a master configuration management plan for the organization at large with subsets of the plan implemented on a system by system basis. Configuration management approval processes include designation of key management stakeholders responsible for reviewing and approving proposed changes to information systems, and personnel that conduct security impact analyses prior to the implementation of changes to the systems. Configuration items are the information system items (hardware, software, firmware, and documentation) to be configuration-managed. As information systems continue through the system development life cycle, new configuration items may be identified and some existing configuration items may no longer need to be under configuration control.","links":[{"href":"#cm-2","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#sa-10","rel":"related"}]},{"id":"cm-9_obj","name":"objective","prose":"Determine if the organization develops, documents, and implements a configuration management plan for the information system that:","parts":[{"id":"cm-9.a_obj","name":"objective","props":[{"name":"label","value":"CM-9(a)"}],"parts":[{"id":"cm-9.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-9(a)[1]"}],"prose":"addresses roles;"},{"id":"cm-9.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-9(a)[2]"}],"prose":"addresses responsibilities;"},{"id":"cm-9.a_obj.3","name":"objective","props":[{"name":"label","value":"CM-9(a)[3]"}],"prose":"addresses configuration management processes and procedures;"}]},{"id":"cm-9.b_obj","name":"objective","props":[{"name":"label","value":"CM-9(b)"}],"prose":"establishes a process for:","parts":[{"id":"cm-9.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-9(b)[1]"}],"prose":"identifying configuration items throughout the SDLC;"},{"id":"cm-9.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-9(b)[2]"}],"prose":"managing the configuration of the configuration items;"}]},{"id":"cm-9.c_obj","name":"objective","props":[{"name":"label","value":"CM-9(c)"}],"parts":[{"id":"cm-9.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-9(c)[1]"}],"prose":"defines the configuration items for the information system;"},{"id":"cm-9.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-9(c)[2]"}],"prose":"places the configuration items under configuration management;"}]},{"id":"cm-9.d_obj","name":"objective","props":[{"name":"label","value":"CM-9(d)"}],"prose":"protects the configuration management plan from unauthorized:","parts":[{"id":"cm-9.d_obj.1","name":"objective","props":[{"name":"label","value":"CM-9(d)[1]"}],"prose":"disclosure; and"},{"id":"cm-9.d_obj.2","name":"objective","props":[{"name":"label","value":"CM-9(d)[2]"}],"prose":"modification."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing configuration management planning\n\nconfiguration management plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for developing the configuration management plan\n\norganizational personnel with responsibilities for implementing and managing processes defined in the configuration management plan\n\norganizational personnel with responsibilities for protecting the configuration management plan\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for developing and documenting the configuration management plan\n\norganizational processes for identifying and managing configuration items\n\norganizational processes for protecting the configuration management plan\n\nautomated mechanisms implementing the configuration management plan\n\nautomated mechanisms for managing configuration items\n\nautomated mechanisms for protecting the configuration management plan"}]}]},{"id":"cm-10","class":"SP800-53","title":"Software Usage Restrictions","props":[{"name":"priority","value":"P2"},{"name":"label","value":"CM-10"},{"name":"sort-id","value":"cm-10"}],"parts":[{"id":"cm-10_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-10_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Uses software and associated documentation in accordance with contract agreements and copyright laws;"},{"id":"cm-10_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Tracks the use of software and associated documentation protected by quantity licenses to control copying and distribution; and"},{"id":"cm-10_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Controls and documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work."}]},{"id":"cm-10_gdn","name":"guidance","prose":"Software license tracking can be accomplished by manual methods (e.g., simple spreadsheets) or automated methods (e.g., specialized tracking applications) depending on organizational needs.","links":[{"href":"#ac-17","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"cm-10_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-10.a_obj","name":"objective","props":[{"name":"label","value":"CM-10(a)"}],"prose":"uses software and associated documentation in accordance with contract agreements and copyright laws;"},{"id":"cm-10.b_obj","name":"objective","props":[{"name":"label","value":"CM-10(b)"}],"prose":"tracks the use of software and associated documentation protected by quantity licenses to control copying and distribution; and"},{"id":"cm-10.c_obj","name":"objective","props":[{"name":"label","value":"CM-10(c)"}],"prose":"controls and documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing software usage restrictions\n\nconfiguration management plan\n\nsecurity plan\n\nsoftware contract agreements and copyright laws\n\nsite license documentation\n\nlist of software usage restrictions\n\nsoftware license tracking reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\norganizational personnel operating, using, and\/or maintaining the information system\n\norganizational personnel with software license management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for tracking the use of software protected by quantity licenses\n\norganization process for controlling\/documenting the use of peer-to-peer file sharing technology\n\nautomated mechanisms implementing software license tracking\n\nautomated mechanisms implementing and controlling the use of peer-to-peer files sharing technology"}]}]},{"id":"cm-11","class":"SP800-53","title":"User-installed Software","params":[{"id":"cm-11_prm_1","label":"organization-defined policies"},{"id":"cm-11_prm_2","label":"organization-defined methods"},{"id":"cm-11_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-11"},{"name":"sort-id","value":"cm-11"}],"parts":[{"id":"cm-11_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-11_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes {{ insert: param, cm-11_prm_1 }} governing the installation of software by users;"},{"id":"cm-11_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Enforces software installation policies through {{ insert: param, cm-11_prm_2 }}; and"},{"id":"cm-11_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Monitors policy compliance at {{ insert: param, cm-11_prm_3 }}."}]},{"id":"cm-11_gdn","name":"guidance","prose":"If provided the necessary privileges, users have the ability to install software in organizational information systems. To maintain control over the types of software installed, organizations identify permitted and prohibited actions regarding software installation. Permitted software installations may include, for example, updates and security patches to existing software and downloading applications from organization-approved “app stores” Prohibited software installations may include, for example, software with unknown or suspect pedigrees or software that organizations consider potentially malicious. The policies organizations select governing user-installed software may be organization-developed or provided by some external entity. Policy enforcement methods include procedural methods (e.g., periodic examination of user accounts), automated methods (e.g., configuration settings implemented on organizational information systems), or both.","links":[{"href":"#ac-3","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#pl-4","rel":"related"}]},{"id":"cm-11_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-11.a_obj","name":"objective","props":[{"name":"label","value":"CM-11(a)"}],"parts":[{"id":"cm-11.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-11(a)[1]"}],"prose":"defines policies to govern the installation of software by users;"},{"id":"cm-11.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-11(a)[2]"}],"prose":"establishes organization-defined policies governing the installation of software by users;"}]},{"id":"cm-11.b_obj","name":"objective","props":[{"name":"label","value":"CM-11(b)"}],"parts":[{"id":"cm-11.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-11(b)[1]"}],"prose":"defines methods to enforce software installation policies;"},{"id":"cm-11.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-11(b)[2]"}],"prose":"enforces software installation policies through organization-defined methods;"}]},{"id":"cm-11.c_obj","name":"objective","props":[{"name":"label","value":"CM-11(c)"}],"parts":[{"id":"cm-11.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-11(c)[1]"}],"prose":"defines frequency to monitor policy compliance; and"},{"id":"cm-11.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-11(c)[2]"}],"prose":"monitors policy compliance at organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing user installed software\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of rules governing user installed software\n\ninformation system monitoring records\n\ninformation system audit records\n\nother relevant documents or records\n\ncontinuous monitoring strategy"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for governing user-installed software\n\norganizational personnel operating, using, and\/or maintaining the information system\n\norganizational personnel monitoring compliance with user-installed software policy\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes governing user-installed software on the information system\n\nautomated mechanisms enforcing rules\/methods for governing the installation of software by users\n\nautomated mechanisms monitoring policy compliance"}]}]}]},{"id":"cp","class":"family","title":"Contingency Planning","controls":[{"id":"cp-1","class":"SP800-53","title":"Contingency Planning Policy and Procedures","params":[{"id":"cp-1_prm_1","label":"organization-defined personnel or roles"},{"id":"cp-1_prm_2","label":"organization-defined frequency"},{"id":"cp-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-1"},{"name":"sort-id","value":"cp-01"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"cp-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, cp-1_prm_1 }}:","parts":[{"id":"cp-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A contingency planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"cp-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls; and"}]},{"id":"cp-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"cp-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Contingency planning policy {{ insert: param, cp-1_prm_2 }}; and"},{"id":"cp-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Contingency planning procedures {{ insert: param, cp-1_prm_3 }}."}]}]},{"id":"cp-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the CP family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"cp-1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"cp-1.a_obj","name":"objective","props":[{"name":"label","value":"CP-1(a)"}],"parts":[{"id":"cp-1.a.1_obj","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)"}],"parts":[{"id":"cp-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1]"}],"prose":"the organization develops and documents a contingency planning policy that addresses:","parts":[{"id":"cp-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"cp-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"cp-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"cp-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"cp-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"cp-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"cp-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"cp-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[2]"}],"prose":"the organization defines personnel or roles to whom the contingency planning policy is to be disseminated;"},{"id":"cp-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[3]"}],"prose":"the organization disseminates the contingency planning policy to organization-defined personnel or roles;"}]},{"id":"cp-1.a.2_obj","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)"}],"parts":[{"id":"cp-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)[1]"}],"prose":"the organization develops and documents procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls;"},{"id":"cp-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)[2]"}],"prose":"the organization defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"cp-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)[3]"}],"prose":"the organization disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"cp-1.b_obj","name":"objective","props":[{"name":"label","value":"CP-1(b)"}],"parts":[{"id":"cp-1.b.1_obj","name":"objective","props":[{"name":"label","value":"CP-1(b)(1)"}],"parts":[{"id":"cp-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(b)(1)[1]"}],"prose":"the organization defines the frequency to review and update the current contingency planning policy;"},{"id":"cp-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(b)(1)[2]"}],"prose":"the organization reviews and updates the current contingency planning with the organization-defined frequency;"}]},{"id":"cp-1.b.2_obj","name":"objective","props":[{"name":"label","value":"CP-1(b)(2)"}],"parts":[{"id":"cp-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(b)(2)[1]"}],"prose":"the organization defines the frequency to review and update the current contingency planning procedures; and"},{"id":"cp-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(b)(2)[2]"}],"prose":"the organization reviews and updates the current contingency planning procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-2","class":"SP800-53","title":"Contingency Plan","params":[{"id":"cp-2_prm_1","label":"organization-defined personnel or roles"},{"id":"cp-2_prm_2","label":"organization-defined key contingency personnel (identified by name and\/or by role) and organizational elements"},{"id":"cp-2_prm_3","label":"organization-defined frequency"},{"id":"cp-2_prm_4","label":"organization-defined key contingency personnel (identified by name and\/or by role) and organizational elements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-2"},{"name":"sort-id","value":"cp-02"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a contingency plan for the information system that:","parts":[{"id":"cp-2_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Identifies essential missions and business functions and associated contingency requirements;"},{"id":"cp-2_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Provides recovery objectives, restoration priorities, and metrics;"},{"id":"cp-2_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Addresses contingency roles, responsibilities, assigned individuals with contact information;"},{"id":"cp-2_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Addresses maintaining essential missions and business functions despite an information system disruption, compromise, or failure;"},{"id":"cp-2_smt.a.5","name":"item","props":[{"name":"label","value":"5."}],"prose":"Addresses eventual, full information system restoration without deterioration of the security safeguards originally planned and implemented; and"},{"id":"cp-2_smt.a.6","name":"item","props":[{"name":"label","value":"6."}],"prose":"Is reviewed and approved by {{ insert: param, cp-2_prm_1 }};"}]},{"id":"cp-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Distributes copies of the contingency plan to {{ insert: param, cp-2_prm_2 }};"},{"id":"cp-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Coordinates contingency planning activities with incident handling activities;"},{"id":"cp-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Reviews the contingency plan for the information system {{ insert: param, cp-2_prm_3 }};"},{"id":"cp-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Updates the contingency plan to address changes to the organization, information system, or environment of operation and problems encountered during contingency plan implementation, execution, or testing;"},{"id":"cp-2_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Communicates contingency plan changes to {{ insert: param, cp-2_prm_4 }}; and"},{"id":"cp-2_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Protects the contingency plan from unauthorized disclosure and modification."}]},{"id":"cp-2_gdn","name":"guidance","prose":"Contingency planning for information systems is part of an overall organizational program for achieving continuity of operations for mission\/business functions. Contingency planning addresses both information system restoration and implementation of alternative mission\/business processes when systems are compromised. The effectiveness of contingency planning is maximized by considering such planning throughout the phases of the system development life cycle. Performing contingency planning on hardware, software, and firmware development can be an effective means of achieving information system resiliency. Contingency plans reflect the degree of restoration required for organizational information systems since not all systems may need to fully recover to achieve the level of continuity of operations desired. Information system recovery objectives reflect applicable laws, Executive Orders, directives, policies, standards, regulations, and guidelines. In addition to information system availability, contingency plans also address other security-related events resulting in a reduction in mission and\/or business effectiveness, such as malicious attacks compromising the confidentiality or integrity of information systems. Actions addressed in contingency plans include, for example, orderly\/graceful degradation, information system shutdown, fallback to a manual mode, alternate information flows, and operating in modes reserved for when systems are under attack. By closely coordinating contingency planning with incident handling activities, organizations can ensure that the necessary contingency planning activities are in place and activated in the event of a security incident.","links":[{"href":"#ac-14","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#cp-7","rel":"related"},{"href":"#cp-8","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#cp-10","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#pm-8","rel":"related"},{"href":"#pm-11","rel":"related"}]},{"id":"cp-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-2.a_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)"}],"prose":"develops and documents a contingency plan for the information system that:","parts":[{"id":"cp-2.a.1_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(1)"}],"prose":"identifies essential missions and business functions and associated contingency requirements;"},{"id":"cp-2.a.2_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)"}],"parts":[{"id":"cp-2.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)[1]"}],"prose":"provides recovery objectives;"},{"id":"cp-2.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)[2]"}],"prose":"provides restoration priorities;"},{"id":"cp-2.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)[3]"}],"prose":"provides metrics;"}]},{"id":"cp-2.a.3_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)"}],"parts":[{"id":"cp-2.a.3_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)[1]"}],"prose":"addresses contingency roles;"},{"id":"cp-2.a.3_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)[2]"}],"prose":"addresses contingency responsibilities;"},{"id":"cp-2.a.3_obj.3","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)[3]"}],"prose":"addresses assigned individuals with contact information;"}]},{"id":"cp-2.a.4_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(4)"}],"prose":"addresses maintaining essential missions and business functions despite an information system disruption, compromise, or failure;"},{"id":"cp-2.a.5_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(5)"}],"prose":"addresses eventual, full information system restoration without deterioration of the security safeguards originally planned and implemented;"},{"id":"cp-2.a.6_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(6)"}],"parts":[{"id":"cp-2.a.6_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(a)(6)[1]"}],"prose":"defines personnel or roles to review and approve the contingency plan for the information system;"},{"id":"cp-2.a.6_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(a)(6)[2]"}],"prose":"is reviewed and approved by organization-defined personnel or roles;"}]}]},{"id":"cp-2.b_obj","name":"objective","props":[{"name":"label","value":"CP-2(b)"}],"parts":[{"id":"cp-2.b_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(b)[1]"}],"prose":"defines key contingency personnel (identified by name and\/or by role) and organizational elements to whom copies of the contingency plan are to be distributed;"},{"id":"cp-2.b_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(b)[2]"}],"prose":"distributes copies of the contingency plan to organization-defined key contingency personnel and organizational elements;"}]},{"id":"cp-2.c_obj","name":"objective","props":[{"name":"label","value":"CP-2(c)"}],"prose":"coordinates contingency planning activities with incident handling activities;"},{"id":"cp-2.d_obj","name":"objective","props":[{"name":"label","value":"CP-2(d)"}],"parts":[{"id":"cp-2.d_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(d)[1]"}],"prose":"defines a frequency to review the contingency plan for the information system;"},{"id":"cp-2.d_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(d)[2]"}],"prose":"reviews the contingency plan with the organization-defined frequency;"}]},{"id":"cp-2.e_obj","name":"objective","props":[{"name":"label","value":"CP-2(e)"}],"prose":"updates the contingency plan to address:","parts":[{"id":"cp-2.e_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(e)[1]"}],"prose":"changes to the organization, information system, or environment of operation;"},{"id":"cp-2.e_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(e)[2]"}],"prose":"problems encountered during plan implementation, execution, and testing;"}]},{"id":"cp-2.f_obj","name":"objective","props":[{"name":"label","value":"CP-2(f)"}],"parts":[{"id":"cp-2.f_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(f)[1]"}],"prose":"defines key contingency personnel (identified by name and\/or by role) and organizational elements to whom contingency plan changes are to be communicated;"},{"id":"cp-2.f_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(f)[2]"}],"prose":"communicates contingency plan changes to organization-defined key contingency personnel and organizational elements; and"}]},{"id":"cp-2.g_obj","name":"objective","props":[{"name":"label","value":"CP-2(g)"}],"prose":"protects the contingency plan from unauthorized disclosure and modification."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nsecurity plan\n\nevidence of contingency plan reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with incident handling responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency plan development, review, update, and protection\n\nautomated mechanisms for developing, reviewing, updating and\/or protecting the contingency plan"}]}],"controls":[{"id":"cp-2.1","class":"SP800-53-enhancement","title":"Coordinate with Related Plans","props":[{"name":"label","value":"CP-2(1)"},{"name":"sort-id","value":"cp-02.01"}],"parts":[{"id":"cp-2.1_smt","name":"statement","prose":"The organization coordinates contingency plan development with organizational elements responsible for related plans."},{"id":"cp-2.1_gdn","name":"guidance","prose":"Plans related to contingency plans for organizational information systems include, for example, Business Continuity Plans, Disaster Recovery Plans, Continuity of Operations Plans, Crisis Communications Plans, Critical Infrastructure Plans, Cyber Incident Response Plans, Insider Threat Implementation Plan, and Occupant Emergency Plans."},{"id":"cp-2.1_obj","name":"objective","prose":"Determine if the organization coordinates contingency plan development with organizational elements responsible for related plans."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nbusiness contingency plans\n\ndisaster recovery plans\n\ncontinuity of operations plans\n\ncrisis communications plans\n\ncritical infrastructure plans\n\ncyber incident response plan\n\ninsider threat implementation plans\n\noccupant emergency plans\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities\n\npersonnel with responsibility for related plans"}]}]},{"id":"cp-2.2","class":"SP800-53-enhancement","title":"Capacity Planning","props":[{"name":"label","value":"CP-2(2)"},{"name":"sort-id","value":"cp-02.02"}],"parts":[{"id":"cp-2.2_smt","name":"statement","prose":"The organization conducts capacity planning so that necessary capacity for information processing, telecommunications, and environmental support exists during contingency operations."},{"id":"cp-2.2_gdn","name":"guidance","prose":"Capacity planning is needed because different types of threats (e.g., natural disasters, targeted cyber attacks) can result in a reduction of the available processing, telecommunications, and support services originally intended to support the organizational missions\/business functions. Organizations may need to anticipate degraded operations during contingency operations and factor such degradation into capacity planning."},{"id":"cp-2.2_obj","name":"objective","prose":"Determine if the organization conducts capacity planning so that necessary capacity exists during contingency operations for:","parts":[{"id":"cp-2.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(2)[1]"}],"prose":"information processing;"},{"id":"cp-2.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(2)[2]"}],"prose":"telecommunications; and"},{"id":"cp-2.2_obj.3","name":"objective","props":[{"name":"label","value":"CP-2(2)[3]"}],"prose":"environmental support."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\ncapacity planning documents\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-2.3","class":"SP800-53-enhancement","title":"Resume Essential Missions \/ Business Functions","params":[{"id":"cp-2.3_prm_1","label":"organization-defined time period"}],"props":[{"name":"label","value":"CP-2(3)"},{"name":"sort-id","value":"cp-02.03"}],"parts":[{"id":"cp-2.3_smt","name":"statement","prose":"The organization plans for the resumption of essential missions and business functions within {{ insert: param, cp-2.3_prm_1 }} of contingency plan activation."},{"id":"cp-2.3_gdn","name":"guidance","prose":"Organizations may choose to carry out the contingency planning activities in this control enhancement as part of organizational business continuity planning including, for example, as part of business impact analyses. The time period for resumption of essential missions\/business functions may be dependent on the severity\/extent of disruptions to the information system and its supporting infrastructure.","links":[{"href":"#pe-12","rel":"related"}]},{"id":"cp-2.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-2.3_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(3)[1]"}],"prose":"defines the time period to plan for the resumption of essential missions and business functions as a result of contingency plan activation; and"},{"id":"cp-2.3_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(3)[2]"}],"prose":"plans for the resumption of essential missions and business functions within organization-defined time period of contingency plan activation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nsecurity plan\n\nbusiness impact assessment\n\nother related plans\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for resumption of missions and business functions"}]}]},{"id":"cp-2.4","class":"SP800-53-enhancement","title":"Resume All Missions \/ Business Functions","params":[{"id":"cp-2.4_prm_1","label":"organization-defined time period"}],"props":[{"name":"label","value":"CP-2(4)"},{"name":"sort-id","value":"cp-02.04"}],"parts":[{"id":"cp-2.4_smt","name":"statement","prose":"The organization plans for the resumption of all missions and business functions within {{ insert: param, cp-2.4_prm_1 }} of contingency plan activation."},{"id":"cp-2.4_gdn","name":"guidance","prose":"Organizations may choose to carry out the contingency planning activities in this control enhancement as part of organizational business continuity planning including, for example, as part of business impact analyses. The time period for resumption of all missions\/business functions may be dependent on the severity\/extent of disruptions to the information system and its supporting infrastructure.","links":[{"href":"#pe-12","rel":"related"}]},{"id":"cp-2.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-2.4_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(4)[1]"}],"prose":"defines the time period to plan for the resumption of all missions and business functions as a result of contingency plan activation; and"},{"id":"cp-2.4_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(4)[2]"}],"prose":"plans for the resumption of all missions and business functions within organization-defined time period of contingency plan activation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nsecurity plan\n\nbusiness impact assessment\n\nother related plans\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for resumption of missions and business functions"}]}]},{"id":"cp-2.5","class":"SP800-53-enhancement","title":"Continue Essential Missions \/ Business Functions","props":[{"name":"label","value":"CP-2(5)"},{"name":"sort-id","value":"cp-02.05"}],"parts":[{"id":"cp-2.5_smt","name":"statement","prose":"The organization plans for the continuance of essential missions and business functions with little or no loss of operational continuity and sustains that continuity until full information system restoration at primary processing and\/or storage sites."},{"id":"cp-2.5_gdn","name":"guidance","prose":"Organizations may choose to carry out the contingency planning activities in this control enhancement as part of organizational business continuity planning including, for example, as part of business impact analyses. Primary processing and\/or storage sites defined by organizations as part of contingency planning may change depending on the circumstances associated with the contingency (e.g., backup sites may become primary sites).","links":[{"href":"#pe-12","rel":"related"}]},{"id":"cp-2.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-2.5_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(5)[1]"}],"prose":"plans for the continuance of essential missions and business functions with little or no loss of operational continuity; and"},{"id":"cp-2.5_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(5)[2]"}],"prose":"sustains that operational continuity until full information system restoration at primary processing and\/or storage sites."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nbusiness impact assessment\n\nprimary processing site agreements\n\nprimary storage site agreements\n\nalternate processing site agreements\n\nalternate storage site agreements\n\ncontingency plan test documentation\n\ncontingency plan test results\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for continuing missions and business functions"}]}]},{"id":"cp-2.8","class":"SP800-53-enhancement","title":"Identify Critical Assets","props":[{"name":"label","value":"CP-2(8)"},{"name":"sort-id","value":"cp-02.08"}],"parts":[{"id":"cp-2.8_smt","name":"statement","prose":"The organization identifies critical information system assets supporting essential missions and business functions."},{"id":"cp-2.8_gdn","name":"guidance","prose":"Organizations may choose to carry out the contingency planning activities in this control enhancement as part of organizational business continuity planning including, for example, as part of business impact analyses. Organizations identify critical information system assets so that additional safeguards and countermeasures can be employed (above and beyond those safeguards and countermeasures routinely implemented) to help ensure that organizational missions\/business functions can continue to be conducted during contingency operations. In addition, the identification of critical information assets facilitates the prioritization of organizational resources. Critical information system assets include technical and operational aspects. Technical aspects include, for example, information technology services, information system components, information technology products, and mechanisms. Operational aspects include, for example, procedures (manually executed operations) and personnel (individuals operating technical safeguards and\/or executing manual procedures). Organizational program protection plans can provide assistance in identifying critical assets.","links":[{"href":"#sa-14","rel":"related"},{"href":"#sa-15","rel":"related"}]},{"id":"cp-2.8_obj","name":"objective","prose":"Determine if the organization identifies critical information system assets supporting essential missions and business functions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nbusiness impact assessment\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"cp-3","class":"SP800-53","title":"Contingency Training","params":[{"id":"cp-3_prm_1","label":"organization-defined time period"},{"id":"cp-3_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CP-3"},{"name":"sort-id","value":"cp-03"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"cp-3_smt","name":"statement","prose":"The organization provides contingency training to information system users consistent with assigned roles and responsibilities:","parts":[{"id":"cp-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Within {{ insert: param, cp-3_prm_1 }} of assuming a contingency role or responsibility;"},{"id":"cp-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"cp-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, cp-3_prm_2 }} thereafter."}]},{"id":"cp-3_gdn","name":"guidance","prose":"Contingency training provided by organizations is linked to the assigned roles and responsibilities of organizational personnel to ensure that the appropriate content and level of detail is included in such training. For example, regular users may only need to know when and where to report for duty during contingency operations and if normal duties are affected; system administrators may require additional training on how to set up information systems at alternate processing and storage sites; and managers\/senior leaders may receive more specific training on how to conduct mission-essential functions in designated off-site locations and how to establish communications with other governmental entities for purposes of coordination on contingency-related activities. Training for contingency roles\/responsibilities reflects the specific continuity requirements in the contingency plan.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#ir-2","rel":"related"}]},{"id":"cp-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-3.a_obj","name":"objective","props":[{"name":"label","value":"CP-3(a)"}],"parts":[{"id":"cp-3.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-3(a)[1]"}],"prose":"defines a time period within which contingency training is to be provided to information system users assuming a contingency role or responsibility;"},{"id":"cp-3.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-3(a)[2]"}],"prose":"provides contingency training to information system users consistent with assigned roles and responsibilities within the organization-defined time period of assuming a contingency role or responsibility;"}]},{"id":"cp-3.b_obj","name":"objective","props":[{"name":"label","value":"CP-3(b)"}],"prose":"provides contingency training to information system users consistent with assigned roles and responsibilities when required by information system changes;"},{"id":"cp-3.c_obj","name":"objective","props":[{"name":"label","value":"CP-3(c)"}],"parts":[{"id":"cp-3.c_obj.1","name":"objective","props":[{"name":"label","value":"CP-3(c)[1]"}],"prose":"defines the frequency for contingency training thereafter; and"},{"id":"cp-3.c_obj.2","name":"objective","props":[{"name":"label","value":"CP-3(c)[2]"}],"prose":"provides contingency training to information system users consistent with assigned roles and responsibilities with the organization-defined frequency thereafter."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency training\n\ncontingency plan\n\ncontingency training curriculum\n\ncontingency training material\n\nsecurity plan\n\ncontingency training records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning, plan implementation, and training responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency training"}]}],"controls":[{"id":"cp-3.1","class":"SP800-53-enhancement","title":"Simulated Events","props":[{"name":"label","value":"CP-3(1)"},{"name":"sort-id","value":"cp-03.01"}],"parts":[{"id":"cp-3.1_smt","name":"statement","prose":"The organization incorporates simulated events into contingency training to facilitate effective response by personnel in crisis situations."},{"id":"cp-3.1_obj","name":"objective","prose":"Determine if the organization incorporates simulated events into contingency training to facilitate effective response by personnel in crisis situations."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency training\n\ncontingency plan\n\ncontingency training curriculum\n\ncontingency training material\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning, plan implementation, and training responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency training\n\nautomated mechanisms for simulating contingency events"}]}]}]},{"id":"cp-4","class":"SP800-53","title":"Contingency Plan Testing","params":[{"id":"cp-4_prm_1","label":"organization-defined frequency"},{"id":"cp-4_prm_2","label":"organization-defined tests"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CP-4"},{"name":"sort-id","value":"cp-04"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"},{"href":"#0243a05a-e8a3-4d51-9364-4a9d20b0dcdf","rel":"reference"}],"parts":[{"id":"cp-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Tests the contingency plan for the information system {{ insert: param, cp-4_prm_1 }} using {{ insert: param, cp-4_prm_2 }} to determine the effectiveness of the plan and the organizational readiness to execute the plan;"},{"id":"cp-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews the contingency plan test results; and"},{"id":"cp-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Initiates corrective actions, if needed."}]},{"id":"cp-4_gdn","name":"guidance","prose":"Methods for testing contingency plans to determine the effectiveness of the plans and to identify potential weaknesses in the plans include, for example, walk-through and tabletop exercises, checklists, simulations (parallel, full interrupt), and comprehensive exercises. Organizations conduct testing based on the continuity requirements in contingency plans and include a determination of the effects on organizational operations, assets, and individuals arising due to contingency operations. Organizations have flexibility and discretion in the breadth, depth, and timelines of corrective actions.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-3","rel":"related"},{"href":"#ir-3","rel":"related"}]},{"id":"cp-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-4.a_obj","name":"objective","props":[{"name":"label","value":"CP-4(a)"}],"parts":[{"id":"cp-4.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-4(a)[1]"}],"prose":"defines tests to determine the effectiveness of the contingency plan and the organizational readiness to execute the plan;"},{"id":"cp-4.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-4(a)[2]"}],"prose":"defines a frequency to test the contingency plan for the information system;"},{"id":"cp-4.a_obj.3","name":"objective","props":[{"name":"label","value":"CP-4(a)[3]"}],"prose":"tests the contingency plan for the information system with the organization-defined frequency, using organization-defined tests to determine the effectiveness of the plan and the organizational readiness to execute the plan;"}]},{"id":"cp-4.b_obj","name":"objective","props":[{"name":"label","value":"CP-4(b)"}],"prose":"reviews the contingency plan test results; and"},{"id":"cp-4.c_obj","name":"objective","props":[{"name":"label","value":"CP-4(c)"}],"prose":"initiates corrective actions, if needed."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency plan testing\n\ncontingency plan\n\nsecurity plan\n\ncontingency plan test documentation\n\ncontingency plan test results\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for contingency plan testing, reviewing or responding to contingency plan tests\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency plan testing\n\nautomated mechanisms supporting the contingency plan and\/or contingency plan testing"}]}],"controls":[{"id":"cp-4.1","class":"SP800-53-enhancement","title":"Coordinate with Related Plans","props":[{"name":"label","value":"CP-4(1)"},{"name":"sort-id","value":"cp-04.01"}],"parts":[{"id":"cp-4.1_smt","name":"statement","prose":"The organization coordinates contingency plan testing with organizational elements responsible for related plans."},{"id":"cp-4.1_gdn","name":"guidance","prose":"Plans related to contingency plans for organizational information systems include, for example, Business Continuity Plans, Disaster Recovery Plans, Continuity of Operations Plans, Crisis Communications Plans, Critical Infrastructure Plans, Cyber Incident Response Plans, and Occupant Emergency Plans. This control enhancement does not require organizations to create organizational elements to handle related plans or to align such elements with specific plans. It does require, however, that if such organizational elements are responsible for related plans, organizations should coordinate with those elements.","links":[{"href":"#ir-8","rel":"related"},{"href":"#pm-8","rel":"related"}]},{"id":"cp-4.1_obj","name":"objective","prose":"Determine if the organization coordinates contingency plan testing with organizational elements responsible for related plans."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nincident response policy\n\nprocedures addressing contingency plan testing\n\ncontingency plan testing documentation\n\ncontingency plan\n\nbusiness continuity plans\n\ndisaster recovery plans\n\ncontinuity of operations plans\n\ncrisis communications plans\n\ncritical infrastructure plans\n\ncyber incident response plans\n\noccupant emergency plans\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan testing responsibilities\n\norganizational personnel\n\npersonnel with responsibilities for related plans\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-4.2","class":"SP800-53-enhancement","title":"Alternate Processing Site","props":[{"name":"label","value":"CP-4(2)"},{"name":"sort-id","value":"cp-04.02"}],"parts":[{"id":"cp-4.2_smt","name":"statement","prose":"The organization tests the contingency plan at the alternate processing site:","parts":[{"id":"cp-4.2_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"To familiarize contingency personnel with the facility and available resources; and"},{"id":"cp-4.2_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"To evaluate the capabilities of the alternate processing site to support contingency operations."}]},{"id":"cp-4.2_gdn","name":"guidance","links":[{"href":"#cp-7","rel":"related"}]},{"id":"cp-4.2_obj","name":"objective","prose":"Determine if the organization tests the contingency plan at the alternate processing site to:","parts":[{"id":"cp-4.2.a_obj","name":"objective","props":[{"name":"label","value":"CP-4(2)(a)"}],"prose":"familiarize contingency personnel with the facility and available resources; and","links":[{"href":"#cp-4.2_smt.a","rel":"corresp"}]},{"id":"cp-4.2.b_obj","name":"objective","props":[{"name":"label","value":"CP-4(2)(b)"}],"prose":"evaluate the capabilities of the alternate processing site to support contingency operations.","links":[{"href":"#cp-4.2_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency plan testing\n\ncontingency plan\n\ncontingency plan test documentation\n\ncontingency plan test results\n\nalternate processing site agreements\n\nservice-level agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency plan testing\n\nautomated mechanisms supporting the contingency plan and\/or contingency plan testing"}]}]}]},{"id":"cp-6","class":"SP800-53","title":"Alternate Storage Site","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-6"},{"name":"sort-id","value":"cp-06"}],"links":[{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes an alternate storage site including necessary agreements to permit the storage and retrieval of information system backup information; and"},{"id":"cp-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Ensures that the alternate storage site provides information security safeguards equivalent to that of the primary site."}]},{"id":"cp-6_gdn","name":"guidance","prose":"Alternate storage sites are sites that are geographically distinct from primary storage sites. An alternate storage site maintains duplicate copies of information and data in the event that the primary storage site is not available. Items covered by alternate storage site agreements include, for example, environmental conditions at alternate sites, access rules, physical and environmental protection requirements, and coordination of delivery\/retrieval of backup media. Alternate storage sites reflect the requirements in contingency plans so that organizations can maintain essential missions\/business functions despite disruption, compromise, or failure in organizational information systems.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-7","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#cp-10","rel":"related"},{"href":"#mp-4","rel":"related"}]},{"id":"cp-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-6_obj.1","name":"objective","props":[{"name":"label","value":"CP-6[1]"}],"prose":"establishes an alternate storage site including necessary agreements to permit the storage and retrieval of information system backup information; and"},{"id":"cp-6_obj.2","name":"objective","props":[{"name":"label","value":"CP-6[2]"}],"prose":"ensures that the alternate storage site provides information security safeguards equivalent to that of the primary site."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate storage sites\n\ncontingency plan\n\nalternate storage site agreements\n\nprimary storage site agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate storage site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for storing and retrieving information system backup information at the alternate storage site\n\nautomated mechanisms supporting and\/or implementing storage and retrieval of information system backup information at the alternate storage site"}]}],"controls":[{"id":"cp-6.1","class":"SP800-53-enhancement","title":"Separation from Primary Site","props":[{"name":"label","value":"CP-6(1)"},{"name":"sort-id","value":"cp-06.01"}],"parts":[{"id":"cp-6.1_smt","name":"statement","prose":"The organization identifies an alternate storage site that is separated from the primary storage site to reduce susceptibility to the same threats."},{"id":"cp-6.1_gdn","name":"guidance","prose":"Threats that affect alternate storage sites are typically defined in organizational assessments of risk and include, for example, natural disasters, structural failures, hostile cyber attacks, and errors of omission\/commission. Organizations determine what is considered a sufficient degree of separation between primary and alternate storage sites based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber attack), the degree of separation between sites is less relevant.","links":[{"href":"#ra-3","rel":"related"}]},{"id":"cp-6.1_obj","name":"objective","prose":"Determine if the organization identifies an alternate storage site that is separated from the primary storage site to reduce susceptibility to the same threats."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate storage sites\n\ncontingency plan\n\nalternate storage site\n\nalternate storage site agreements\n\nprimary storage site agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate storage site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-6.2","class":"SP800-53-enhancement","title":"Recovery Time \/ Point Objectives","props":[{"name":"label","value":"CP-6(2)"},{"name":"sort-id","value":"cp-06.02"}],"parts":[{"id":"cp-6.2_smt","name":"statement","prose":"The organization configures the alternate storage site to facilitate recovery operations in accordance with recovery time and recovery point objectives."},{"id":"cp-6.2_obj","name":"objective","prose":"Determine if the organization configures the alternate storage site to facilitate recovery operations in accordance with recovery time objectives and recovery point objectives (as specified in the information system contingency plan)."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate storage sites\n\ncontingency plan\n\nalternate storage site\n\nalternate storage site agreements\n\nalternate storage site configurations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan testing responsibilities\n\norganizational personnel with responsibilities for testing related plans\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency plan testing\n\nautomated mechanisms supporting recovery time\/point objectives"}]}]},{"id":"cp-6.3","class":"SP800-53-enhancement","title":"Accessibility","props":[{"name":"label","value":"CP-6(3)"},{"name":"sort-id","value":"cp-06.03"}],"parts":[{"id":"cp-6.3_smt","name":"statement","prose":"The organization identifies potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions."},{"id":"cp-6.3_gdn","name":"guidance","prose":"Area-wide disruptions refer to those types of disruptions that are broad in geographic scope (e.g., hurricane, regional power outage) with such determinations made by organizations based on organizational assessments of risk. Explicit mitigation actions include, for example: (i) duplicating backup information at other alternate storage sites if access problems occur at originally designated alternate sites; or (ii) planning for physical access to retrieve backup information if electronic accessibility to the alternate site is disrupted.","links":[{"href":"#ra-3","rel":"related"}]},{"id":"cp-6.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-6.3_obj.1","name":"objective","props":[{"name":"label","value":"CP-6(3)[1]"}],"prose":"identifies potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster; and"},{"id":"cp-6.3_obj.2","name":"objective","props":[{"name":"label","value":"CP-6(3)[2]"}],"prose":"outlines explicit mitigation actions for such potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate storage sites\n\ncontingency plan\n\nalternate storage site\n\nlist of potential accessibility problems to alternate storage site\n\nmitigation actions for accessibility problems to alternate storage site\n\norganizational risk assessments\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate storage site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"cp-7","class":"SP800-53","title":"Alternate Processing Site","params":[{"id":"cp-7_prm_1","label":"organization-defined information system operations"},{"id":"cp-7_prm_2","label":"organization-defined time period consistent with recovery time and recovery point objectives"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-7"},{"name":"sort-id","value":"cp-07"}],"links":[{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-7_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes an alternate processing site including necessary agreements to permit the transfer and resumption of {{ insert: param, cp-7_prm_1 }} for essential missions\/business functions within {{ insert: param, cp-7_prm_2 }} when the primary processing capabilities are unavailable;"},{"id":"cp-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Ensures that equipment and supplies required to transfer and resume operations are available at the alternate processing site or contracts are in place to support delivery to the site within the organization-defined time period for transfer\/resumption; and"},{"id":"cp-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensures that the alternate processing site provides information security safeguards equivalent to those of the primary site."}]},{"id":"cp-7_gdn","name":"guidance","prose":"Alternate processing sites are sites that are geographically distinct from primary processing sites. An alternate processing site provides processing capability in the event that the primary processing site is not available. Items covered by alternate processing site agreements include, for example, environmental conditions at alternate sites, access rules, physical and environmental protection requirements, and coordination for the transfer\/assignment of personnel. Requirements are specifically allocated to alternate processing sites that reflect the requirements in contingency plans to maintain essential missions\/business functions despite disruption, compromise, or failure in organizational information systems.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#cp-8","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#cp-10","rel":"related"},{"href":"#ma-6","rel":"related"}]},{"id":"cp-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-7.a_obj","name":"objective","props":[{"name":"label","value":"CP-7(a)"}],"parts":[{"id":"cp-7.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-7(a)[1]"}],"prose":"defines information system operations requiring an alternate processing site to be established to permit the transfer and resumption of such operations;"},{"id":"cp-7.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-7(a)[2]"}],"prose":"defines the time period consistent with recovery time objectives and recovery point objectives (as specified in the information system contingency plan) for transfer\/resumption of organization-defined information system operations for essential missions\/business functions;"},{"id":"cp-7.a_obj.3","name":"objective","props":[{"name":"label","value":"CP-7(a)[3]"}],"prose":"establishes an alternate processing site including necessary agreements to permit the transfer and resumption of organization-defined information system operations for essential missions\/business functions, within the organization-defined time period, when the primary processing capabilities are unavailable;"}]},{"id":"cp-7.b_obj","name":"objective","props":[{"name":"label","value":"CP-7(b)"}],"parts":[{"id":"cp-7.b_obj.1","name":"objective","props":[{"name":"label","value":"CP-7(b)[1]"}],"prose":"ensures that equipment and supplies required to transfer and resume operations are available at the alternate processing site; or"},{"id":"cp-7.b_obj.2","name":"objective","props":[{"name":"label","value":"CP-7(b)[2]"}],"prose":"ensures that contracts are in place to support delivery to the site within the organization-defined time period for transfer\/resumption; and"}]},{"id":"cp-7.c_obj","name":"objective","props":[{"name":"label","value":"CP-7(c)"}],"prose":"ensures that the alternate processing site provides information security safeguards equivalent to those of the primary site."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate processing sites\n\ncontingency plan\n\nalternate processing site agreements\n\nprimary processing site agreements\n\nspare equipment and supplies inventory at alternate processing site\n\nequipment and supply contracts\n\nservice-level agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for contingency planning and\/or alternate site arrangements\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for recovery at the alternate site\n\nautomated mechanisms supporting and\/or implementing recovery at the alternate processing site"}]}],"controls":[{"id":"cp-7.1","class":"SP800-53-enhancement","title":"Separation from Primary Site","props":[{"name":"label","value":"CP-7(1)"},{"name":"sort-id","value":"cp-07.01"}],"parts":[{"id":"cp-7.1_smt","name":"statement","prose":"The organization identifies an alternate processing site that is separated from the primary processing site to reduce susceptibility to the same threats."},{"id":"cp-7.1_gdn","name":"guidance","prose":"Threats that affect alternate processing sites are typically defined in organizational assessments of risk and include, for example, natural disasters, structural failures, hostile cyber attacks, and errors of omission\/commission. Organizations determine what is considered a sufficient degree of separation between primary and alternate processing sites based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber attack), the degree of separation between sites is less relevant.","links":[{"href":"#ra-3","rel":"related"}]},{"id":"cp-7.1_obj","name":"objective","prose":"Determine if the organization identifies an alternate processing site that is separated from the primary storage site to reduce susceptibility to the same threats."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate processing sites\n\ncontingency plan\n\nalternate processing site\n\nalternate processing site agreements\n\nprimary processing site agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate processing site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-7.2","class":"SP800-53-enhancement","title":"Accessibility","props":[{"name":"label","value":"CP-7(2)"},{"name":"sort-id","value":"cp-07.02"}],"parts":[{"id":"cp-7.2_smt","name":"statement","prose":"The organization identifies potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions."},{"id":"cp-7.2_gdn","name":"guidance","prose":"Area-wide disruptions refer to those types of disruptions that are broad in geographic scope (e.g., hurricane, regional power outage) with such determinations made by organizations based on organizational assessments of risk.","links":[{"href":"#ra-3","rel":"related"}]},{"id":"cp-7.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-7.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-7(2)[1]"}],"prose":"identifies potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster; and"},{"id":"cp-7.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-7(2)[2]"}],"prose":"outlines explicit mitigation actions for such potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate processing sites\n\ncontingency plan\n\nalternate processing site\n\nalternate processing site agreements\n\nprimary processing site agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate processing site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-7.3","class":"SP800-53-enhancement","title":"Priority of Service","props":[{"name":"label","value":"CP-7(3)"},{"name":"sort-id","value":"cp-07.03"}],"parts":[{"id":"cp-7.3_smt","name":"statement","prose":"The organization develops alternate processing site agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives)."},{"id":"cp-7.3_gdn","name":"guidance","prose":"Priority-of-service agreements refer to negotiated agreements with service providers that ensure that organizations receive priority treatment consistent with their availability requirements and the availability of information resources at the alternate processing site."},{"id":"cp-7.3_obj","name":"objective","prose":"Determine if the organization develops alternate processing site agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives as specified in the information system contingency plan)."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate processing sites\n\ncontingency plan\n\nalternate processing site agreements\n\nservice-level agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate processing site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibility for acquisitions\/contractual agreements"}]}]},{"id":"cp-7.4","class":"SP800-53-enhancement","title":"Preparation for Use","props":[{"name":"label","value":"CP-7(4)"},{"name":"sort-id","value":"cp-07.04"}],"parts":[{"id":"cp-7.4_smt","name":"statement","prose":"The organization prepares the alternate processing site so that the site is ready to be used as the operational site supporting essential missions and business functions."},{"id":"cp-7.4_gdn","name":"guidance","prose":"Site preparation includes, for example, establishing configuration settings for information system components at the alternate processing site consistent with the requirements for such settings at the primary site and ensuring that essential supplies and other logistical considerations are in place.","links":[{"href":"#cm-2","rel":"related"},{"href":"#cm-6","rel":"related"}]},{"id":"cp-7.4_obj","name":"objective","prose":"Determine if the organization prepares the alternate processing site so that the site is ready to be used as the operational site supporting essential missions and business functions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate processing sites\n\ncontingency plan\n\nalternate processing site\n\nalternate processing site agreements\n\nalternate processing site configurations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate processing site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing recovery at the alternate processing site"}]}]}]},{"id":"cp-8","class":"SP800-53","title":"Telecommunications Services","params":[{"id":"cp-8_prm_1","label":"organization-defined information system operations"},{"id":"cp-8_prm_2","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-8"},{"name":"sort-id","value":"cp-08"}],"links":[{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"},{"href":"#fb5844de-ff96-47c0-b258-4f52bcc2f30d","rel":"reference"},{"href":"#3ac12e79-f54f-4a63-9f4b-ee4bcd4df604","rel":"reference"}],"parts":[{"id":"cp-8_smt","name":"statement","prose":"The organization establishes alternate telecommunications services including necessary agreements to permit the resumption of {{ insert: param, cp-8_prm_1 }} for essential missions and business functions within {{ insert: param, cp-8_prm_2 }} when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites."},{"id":"cp-8_gdn","name":"guidance","prose":"This control applies to telecommunications services (data and voice) for primary and alternate processing and storage sites. Alternate telecommunications services reflect the continuity requirements in contingency plans to maintain essential missions\/business functions despite the loss of primary telecommunications services. Organizations may specify different time periods for primary\/alternate sites. Alternate telecommunications services include, for example, additional organizational or commercial ground-based circuits\/lines or satellites in lieu of ground-based communications. Organizations consider factors such as availability, quality of service, and access when entering into alternate telecommunications agreements.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#cp-7","rel":"related"}]},{"id":"cp-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-8_obj.1","name":"objective","props":[{"name":"label","value":"CP-8[1]"}],"prose":"defines information system operations requiring alternate telecommunications services to be established to permit the resumption of such operations;"},{"id":"cp-8_obj.2","name":"objective","props":[{"name":"label","value":"CP-8[2]"}],"prose":"defines the time period to permit resumption of organization-defined information system operations for essential missions and business functions; and"},{"id":"cp-8_obj.3","name":"objective","props":[{"name":"label","value":"CP-8[3]"}],"prose":"establishes alternate telecommunications services including necessary agreements to permit the resumption of organization-defined information system operations for essential missions and business functions, within the organization-defined time period, when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate telecommunications services\n\ncontingency plan\n\nprimary and alternate telecommunications service agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan telecommunications responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibility for acquisitions\/contractual agreements"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting telecommunications"}]}],"controls":[{"id":"cp-8.1","class":"SP800-53-enhancement","title":"Priority of Service Provisions","props":[{"name":"label","value":"CP-8(1)"},{"name":"sort-id","value":"cp-08.01"}],"parts":[{"id":"cp-8.1_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-8.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Develops primary and alternate telecommunications service agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives); and"},{"id":"cp-8.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Requests Telecommunications Service Priority for all telecommunications services used for national security emergency preparedness in the event that the primary and\/or alternate telecommunications services are provided by a common carrier."}]},{"id":"cp-8.1_gdn","name":"guidance","prose":"Organizations consider the potential mission\/business impact in situations where telecommunications service providers are servicing other organizations with similar priority-of-service provisions."},{"id":"cp-8.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-8.1_obj.1","name":"objective","props":[{"name":"label","value":"CP-8(1)[1]"}],"prose":"develops primary and alternate telecommunications service agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives as specified in the information system contingency plan); and"},{"id":"cp-8.1_obj.2","name":"objective","props":[{"name":"label","value":"CP-8(1)[2]"}],"prose":"requests Telecommunications Service Priority for all telecommunications services used for national security emergency preparedness in the event that the primary and\/or alternate telecommunications services are provided by a common carrier."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing primary and alternate telecommunications services\n\ncontingency plan\n\nprimary and alternate telecommunications service agreements\n\nTelecommunications Service Priority documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan telecommunications responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibility for acquisitions\/contractual agreements"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting telecommunications"}]}]},{"id":"cp-8.2","class":"SP800-53-enhancement","title":"Single Points of Failure","props":[{"name":"label","value":"CP-8(2)"},{"name":"sort-id","value":"cp-08.02"}],"parts":[{"id":"cp-8.2_smt","name":"statement","prose":"The organization obtains alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services."},{"id":"cp-8.2_obj","name":"objective","prose":"Determine if the organization obtains alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing primary and alternate telecommunications services\n\ncontingency plan\n\nprimary and alternate telecommunications service agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan telecommunications responsibilities\n\norganizational personnel with information system recovery responsibilities\n\nprimary and alternate telecommunications service providers\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-8.3","class":"SP800-53-enhancement","title":"Separation of Primary \/ Alternate Providers","props":[{"name":"label","value":"CP-8(3)"},{"name":"sort-id","value":"cp-08.03"}],"parts":[{"id":"cp-8.3_smt","name":"statement","prose":"The organization obtains alternate telecommunications services from providers that are separated from primary service providers to reduce susceptibility to the same threats."},{"id":"cp-8.3_gdn","name":"guidance","prose":"Threats that affect telecommunications services are typically defined in organizational assessments of risk and include, for example, natural disasters, structural failures, hostile cyber\/physical attacks, and errors of omission\/commission. Organizations seek to reduce common susceptibilities by, for example, minimizing shared infrastructure among telecommunications service providers and achieving sufficient geographic separation between services. Organizations may consider using a single service provider in situations where the service provider can provide alternate telecommunications services meeting the separation needs addressed in the risk assessment."},{"id":"cp-8.3_obj","name":"objective","prose":"Determine if the organization obtains alternate telecommunications services from providers that are separated from primary service providers to reduce susceptibility to the same threats."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing primary and alternate telecommunications services\n\ncontingency plan\n\nprimary and alternate telecommunications service agreements\n\nalternate telecommunications service provider site\n\nprimary telecommunications service provider site\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan telecommunications responsibilities\n\norganizational personnel with information system recovery responsibilities\n\nprimary and alternate telecommunications service providers\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-8.4","class":"SP800-53-enhancement","title":"Provider Contingency Plan","params":[{"id":"cp-8.4_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"CP-8(4)"},{"name":"sort-id","value":"cp-08.04"}],"parts":[{"id":"cp-8.4_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-8.4_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Requires primary and alternate telecommunications service providers to have contingency plans;"},{"id":"cp-8.4_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Reviews provider contingency plans to ensure that the plans meet organizational contingency requirements; and"},{"id":"cp-8.4_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Obtains evidence of contingency testing\/training by providers {{ insert: param, cp-8.4_prm_1 }}."}]},{"id":"cp-8.4_gdn","name":"guidance","prose":"Reviews of provider contingency plans consider the proprietary nature of such plans. In some situations, a summary of provider contingency plans may be sufficient evidence for organizations to satisfy the review requirement. Telecommunications service providers may also participate in ongoing disaster recovery exercises in coordination with the Department of Homeland Security, state, and local governments. Organizations may use these types of activities to satisfy evidentiary requirements related to service provider contingency plan reviews, testing, and training."},{"id":"cp-8.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-8.4.a_obj","name":"objective","props":[{"name":"label","value":"CP-8(4)(a)"}],"parts":[{"id":"cp-8.4.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-8(4)(a)[1]"}],"prose":"requires primary telecommunications service provider to have contingency plans;"},{"id":"cp-8.4.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-8(4)(a)[2]"}],"prose":"requires alternate telecommunications service provider(s) to have contingency plans;"}],"links":[{"href":"#cp-8.4_smt.a","rel":"corresp"}]},{"id":"cp-8.4.b_obj","name":"objective","props":[{"name":"label","value":"CP-8(4)(b)"}],"prose":"reviews provider contingency plans to ensure that the plans meet organizational contingency requirements;","links":[{"href":"#cp-8.4_smt.b","rel":"corresp"}]},{"id":"cp-8.4.c_obj","name":"objective","props":[{"name":"label","value":"CP-8(4)(c)"}],"parts":[{"id":"cp-8.4.c_obj.1","name":"objective","props":[{"name":"label","value":"CP-8(4)(c)[1]"}],"prose":"defines the frequency to obtain evidence of contingency testing\/training by providers; and"},{"id":"cp-8.4.c_obj.2","name":"objective","props":[{"name":"label","value":"CP-8(4)(c)[2]"}],"prose":"obtains evidence of contingency testing\/training by providers with the organization-defined frequency."}],"links":[{"href":"#cp-8.4_smt.c","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing primary and alternate telecommunications services\n\ncontingency plan\n\nprovider contingency plans\n\nevidence of contingency testing\/training by providers\n\nprimary and alternate telecommunications service agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning, plan implementation, and testing responsibilities\n\nprimary and alternate telecommunications service providers\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibility for acquisitions\/contractual agreements"}]}]}]},{"id":"cp-9","class":"SP800-53","title":"Information System Backup","params":[{"id":"cp-9_prm_1","label":"organization-defined frequency consistent with recovery time and recovery point objectives"},{"id":"cp-9_prm_2","label":"organization-defined frequency consistent with recovery time and recovery point objectives"},{"id":"cp-9_prm_3","label":"organization-defined frequency consistent with recovery time and recovery point objectives"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-9"},{"name":"sort-id","value":"cp-09"}],"links":[{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-9_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Conducts backups of user-level information contained in the information system {{ insert: param, cp-9_prm_1 }};"},{"id":"cp-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Conducts backups of system-level information contained in the information system {{ insert: param, cp-9_prm_2 }};"},{"id":"cp-9_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Conducts backups of information system documentation including security-related documentation {{ insert: param, cp-9_prm_3 }}; and"},{"id":"cp-9_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects the confidentiality, integrity, and availability of backup information at storage locations."}]},{"id":"cp-9_gdn","name":"guidance","prose":"System-level information includes, for example, system-state information, operating system and application software, and licenses. User-level information includes any information other than system-level information. Mechanisms employed by organizations to protect the integrity of information system backups include, for example, digital signatures and cryptographic hashes. Protection of system backup information while in transit is beyond the scope of this control. Information system backups reflect the requirements in contingency plans as well as other organizational requirements for backing up information.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"cp-9_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-9.a_obj","name":"objective","props":[{"name":"label","value":"CP-9(a)"}],"parts":[{"id":"cp-9.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(a)[1]"}],"prose":"defines a frequency, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to conduct backups of user-level information contained in the information system;"},{"id":"cp-9.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(a)[2]"}],"prose":"conducts backups of user-level information contained in the information system with the organization-defined frequency;"}]},{"id":"cp-9.b_obj","name":"objective","props":[{"name":"label","value":"CP-9(b)"}],"parts":[{"id":"cp-9.b_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(b)[1]"}],"prose":"defines a frequency, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to conduct backups of system-level information contained in the information system;"},{"id":"cp-9.b_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(b)[2]"}],"prose":"conducts backups of system-level information contained in the information system with the organization-defined frequency;"}]},{"id":"cp-9.c_obj","name":"objective","props":[{"name":"label","value":"CP-9(c)"}],"parts":[{"id":"cp-9.c_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(c)[1]"}],"prose":"defines a frequency, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to conduct backups of information system documentation including security-related documentation;"},{"id":"cp-9.c_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(c)[2]"}],"prose":"conducts backups of information system documentation, including security-related documentation, with the organization-defined frequency; and"}]},{"id":"cp-9.d_obj","name":"objective","props":[{"name":"label","value":"CP-9(d)"}],"prose":"protects the confidentiality, integrity, and availability of backup information at storage locations."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\nbackup storage location(s)\n\ninformation system backup logs or records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system backup responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for conducting information system backups\n\nautomated mechanisms supporting and\/or implementing information system backups"}]}],"controls":[{"id":"cp-9.1","class":"SP800-53-enhancement","title":"Testing for Reliability \/ Integrity","params":[{"id":"cp-9.1_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"CP-9(1)"},{"name":"sort-id","value":"cp-09.01"}],"parts":[{"id":"cp-9.1_smt","name":"statement","prose":"The organization tests backup information {{ insert: param, cp-9.1_prm_1 }} to verify media reliability and information integrity."},{"id":"cp-9.1_gdn","name":"guidance","links":[{"href":"#cp-4","rel":"related"}]},{"id":"cp-9.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-9.1_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(1)[1]"}],"prose":"defines the frequency to test backup information to verify media reliability and information integrity; and"},{"id":"cp-9.1_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(1)[2]"}],"prose":"tests backup information with the organization-defined frequency to verify media reliability and information integrity."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\ninformation system backup test results\n\ncontingency plan test documentation\n\ncontingency plan test results\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system backup responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for conducting information system backups\n\nautomated mechanisms supporting and\/or implementing information system backups"}]}]},{"id":"cp-9.2","class":"SP800-53-enhancement","title":"Test Restoration Using Sampling","props":[{"name":"label","value":"CP-9(2)"},{"name":"sort-id","value":"cp-09.02"}],"parts":[{"id":"cp-9.2_smt","name":"statement","prose":"The organization uses a sample of backup information in the restoration of selected information system functions as part of contingency plan testing."},{"id":"cp-9.2_gdn","name":"guidance","links":[{"href":"#cp-4","rel":"related"}]},{"id":"cp-9.2_obj","name":"objective","prose":"Determine if the organization uses a sample of backup information in the restoration of selected information system functions as part of contingency plan testing."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\ninformation system backup test results\n\ncontingency plan test documentation\n\ncontingency plan test results\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system backup responsibilities\n\norganizational personnel with contingency planning\/contingency plan testing responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for conducting information system backups\n\nautomated mechanisms supporting and\/or implementing information system backups"}]}]},{"id":"cp-9.3","class":"SP800-53-enhancement","title":"Separate Storage for Critical Information","params":[{"id":"cp-9.3_prm_1","label":"organization-defined critical information system software and other security-related information"}],"props":[{"name":"label","value":"CP-9(3)"},{"name":"sort-id","value":"cp-09.03"}],"parts":[{"id":"cp-9.3_smt","name":"statement","prose":"The organization stores backup copies of {{ insert: param, cp-9.3_prm_1 }} in a separate facility or in a fire-rated container that is not collocated with the operational system."},{"id":"cp-9.3_gdn","name":"guidance","prose":"Critical information system software includes, for example, operating systems, cryptographic key management systems, and intrusion detection\/prevention systems. Security-related information includes, for example, organizational inventories of hardware, software, and firmware components. Alternate storage sites typically serve as separate storage facilities for organizations.","links":[{"href":"#cm-2","rel":"related"},{"href":"#cm-8","rel":"related"}]},{"id":"cp-9.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-9.3_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(3)[1]"}],"parts":[{"id":"cp-9.3_obj.1.a","name":"objective","props":[{"name":"label","value":"CP-9(3)[1][a]"}],"prose":"defines critical information system software and other security-related information requiring backup copies to be stored in a separate facility; or"},{"id":"cp-9.3_obj.1.b","name":"objective","props":[{"name":"label","value":"CP-9(3)[1][b]"}],"prose":"defines critical information system software and other security-related information requiring backup copies to be stored in a fire-rated container that is not collocated with the operational system; and"}]},{"id":"cp-9.3_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(3)[2]"}],"prose":"stores backup copies of organization-defined critical information system software and other security-related information in a separate facility or in a fire-rated container that is not collocated with the operational system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\nbackup storage location(s)\n\ninformation system backup configurations and associated documentation\n\ninformation system backup logs or records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information system backup responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-9.5","class":"SP800-53-enhancement","title":"Transfer to Alternate Storage Site","params":[{"id":"cp-9.5_prm_1","label":"organization-defined time period and transfer rate consistent with the recovery time and recovery point objectives"}],"props":[{"name":"label","value":"CP-9(5)"},{"name":"sort-id","value":"cp-09.05"}],"parts":[{"id":"cp-9.5_smt","name":"statement","prose":"The organization transfers information system backup information to the alternate storage site {{ insert: param, cp-9.5_prm_1 }}."},{"id":"cp-9.5_gdn","name":"guidance","prose":"Information system backup information can be transferred to alternate storage sites either electronically or by physical shipment of storage media."},{"id":"cp-9.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-9.5_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(5)[1]"}],"prose":"defines a time period, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to transfer information system backup information to the alternate storage site;"},{"id":"cp-9.5_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(5)[2]"}],"prose":"defines a transfer rate, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to transfer information system backup information to the alternate storage site; and"},{"id":"cp-9.5_obj.3","name":"objective","props":[{"name":"label","value":"CP-9(5)[3]"}],"prose":"transfers information system backup information to the alternate storage site with the organization-defined time period and transfer rate."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\ninformation system backup logs or records\n\nevidence of system backup information transferred to alternate storage site\n\nalternate storage site agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system backup responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for transferring information system backups to the alternate storage site\n\nautomated mechanisms supporting and\/or implementing information system backups\n\nautomated mechanisms supporting and\/or implementing information transfer to the alternate storage site"}]}]}]},{"id":"cp-10","class":"SP800-53","title":"Information System Recovery and Reconstitution","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-10"},{"name":"sort-id","value":"cp-10"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-10_smt","name":"statement","prose":"The organization provides for the recovery and reconstitution of the information system to a known state after a disruption, compromise, or failure."},{"id":"cp-10_gdn","name":"guidance","prose":"Recovery is executing information system contingency plan activities to restore organizational missions\/business functions. Reconstitution takes place following recovery and includes activities for returning organizational information systems to fully operational states. Recovery and reconstitution operations reflect mission and business priorities, recovery point\/time and reconstitution objectives, and established organizational metrics consistent with contingency plan requirements. Reconstitution includes the deactivation of any interim information system capabilities that may have been needed during recovery operations. Reconstitution also includes assessments of fully restored information system capabilities, reestablishment of continuous monitoring activities, potential information system reauthorizations, and activities to prepare the systems against future disruptions, compromises, or failures. Recovery\/reconstitution capabilities employed by organizations can include both automated mechanisms and manual procedures.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-6","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#cp-7","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#sc-24","rel":"related"}]},{"id":"cp-10_obj","name":"objective","prose":"Determine if the organization provides for:","parts":[{"id":"cp-10_obj.1","name":"objective","props":[{"name":"label","value":"CP-10[1]"}],"prose":"the recovery of the information system to a known state after:","parts":[{"id":"cp-10_obj.1.a","name":"objective","props":[{"name":"label","value":"CP-10[1][a]"}],"prose":"a disruption;"},{"id":"cp-10_obj.1.b","name":"objective","props":[{"name":"label","value":"CP-10[1][b]"}],"prose":"a compromise; or"},{"id":"cp-10_obj.1.c","name":"objective","props":[{"name":"label","value":"CP-10[1][c]"}],"prose":"a failure;"}]},{"id":"cp-10_obj.2","name":"objective","props":[{"name":"label","value":"CP-10[2]"}],"prose":"the reconstitution of the information system to a known state after:","parts":[{"id":"cp-10_obj.2.a","name":"objective","props":[{"name":"label","value":"CP-10[2][a]"}],"prose":"a disruption;"},{"id":"cp-10_obj.2.b","name":"objective","props":[{"name":"label","value":"CP-10[2][b]"}],"prose":"a compromise; or"},{"id":"cp-10_obj.2.c","name":"objective","props":[{"name":"label","value":"CP-10[2][c]"}],"prose":"a failure."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\ninformation system backup test results\n\ncontingency plan test results\n\ncontingency plan test documentation\n\nredundant secondary system for information system backups\n\nlocation(s) of redundant secondary backup system(s)\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning, recovery, and\/or reconstitution responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes implementing information system recovery and reconstitution operations\n\nautomated mechanisms supporting and\/or implementing information system recovery and reconstitution operations"}]}],"controls":[{"id":"cp-10.2","class":"SP800-53-enhancement","title":"Transaction Recovery","props":[{"name":"label","value":"CP-10(2)"},{"name":"sort-id","value":"cp-10.02"}],"parts":[{"id":"cp-10.2_smt","name":"statement","prose":"The information system implements transaction recovery for systems that are transaction-based."},{"id":"cp-10.2_gdn","name":"guidance","prose":"Transaction-based information systems include, for example, database management systems and transaction processing systems. Mechanisms supporting transaction recovery include, for example, transaction rollback and transaction journaling."},{"id":"cp-10.2_obj","name":"objective","prose":"Determine if the information system implements transaction recovery for systems that are transaction-based."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system recovery and reconstitution\n\ncontingency plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ncontingency plan test documentation\n\ncontingency plan test results\n\ninformation system transaction recovery records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for transaction recovery\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing transaction recovery capability"}]}]},{"id":"cp-10.4","class":"SP800-53-enhancement","title":"Restore Within Time Period","params":[{"id":"cp-10.4_prm_1","label":"organization-defined restoration time-periods"}],"props":[{"name":"label","value":"CP-10(4)"},{"name":"sort-id","value":"cp-10.04"}],"parts":[{"id":"cp-10.4_smt","name":"statement","prose":"The organization provides the capability to restore information system components within {{ insert: param, cp-10.4_prm_1 }} from configuration-controlled and integrity-protected information representing a known, operational state for the components."},{"id":"cp-10.4_gdn","name":"guidance","prose":"Restoration of information system components includes, for example, reimaging which restores components to known, operational states.","links":[{"href":"#cm-2","rel":"related"}]},{"id":"cp-10.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-10.4_obj.1","name":"objective","props":[{"name":"label","value":"CP-10(4)[1]"}],"prose":"defines a time period to restore information system components from configuration-controlled and integrity-protected information representing a known, operational state for the components; and"},{"id":"cp-10.4_obj.2","name":"objective","props":[{"name":"label","value":"CP-10(4)[2]"}],"prose":"provides the capability to restore information system components within the organization-defined time period from configuration-controlled and integrity-protected information representing a known, operational state for the components."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system recovery and reconstitution\n\ncontingency plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ncontingency plan test documentation\n\ncontingency plan test results\n\nevidence of information system recovery and reconstitution operations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system recovery and reconstitution responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing recovery\/reconstitution of information system information"}]}]}]}]},{"id":"ia","class":"family","title":"Identification and Authentication","controls":[{"id":"ia-1","class":"SP800-53","title":"Identification and Authentication Policy and Procedures","params":[{"id":"ia-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ia-1_prm_2","label":"organization-defined frequency"},{"id":"ia-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-1"},{"name":"sort-id","value":"ia-01"}],"links":[{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ia-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ia-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ia-1_prm_1 }}:","parts":[{"id":"ia-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ia-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls; and"}]},{"id":"ia-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ia-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Identification and authentication policy {{ insert: param, ia-1_prm_2 }}; and"},{"id":"ia-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Identification and authentication procedures {{ insert: param, ia-1_prm_3 }}."}]}]},{"id":"ia-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the IA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ia-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ia-1.a_obj","name":"objective","props":[{"name":"label","value":"IA-1(a)"}],"parts":[{"id":"ia-1.a.1_obj","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)"}],"parts":[{"id":"ia-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1]"}],"prose":"develops and documents an identification and authentication policy that addresses:","parts":[{"id":"ia-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ia-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ia-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ia-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ia-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ia-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ia-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ia-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the identification and authentication policy is to be disseminated; and"},{"id":"ia-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[3]"}],"prose":"disseminates the identification and authentication policy to organization-defined personnel or roles;"}]},{"id":"ia-1.a.2_obj","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)"}],"parts":[{"id":"ia-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls;"},{"id":"ia-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ia-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ia-1.b_obj","name":"objective","props":[{"name":"label","value":"IA-1(b)"}],"parts":[{"id":"ia-1.b.1_obj","name":"objective","props":[{"name":"label","value":"IA-1(b)(1)"}],"parts":[{"id":"ia-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current identification and authentication policy;"},{"id":"ia-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(b)(1)[2]"}],"prose":"reviews and updates the current identification and authentication policy with the organization-defined frequency; and"}]},{"id":"ia-1.b.2_obj","name":"objective","props":[{"name":"label","value":"IA-1(b)(2)"}],"parts":[{"id":"ia-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current identification and authentication procedures; and"},{"id":"ia-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(b)(2)[2]"}],"prose":"reviews and updates the current identification and authentication procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with identification and authentication responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ia-2","class":"SP800-53","title":"Identification and Authentication (organizational Users)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-2"},{"name":"sort-id","value":"ia-02"}],"links":[{"href":"#ad733a42-a7ed-4774-b988-4930c28852f3","rel":"reference"},{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#4da24a96-6cf8-435d-9d1f-c73247cad109","rel":"reference"},{"href":"#74e740a4-c45d-49f3-a86e-eb747c549e01","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#ba557c91-ba3e-4792-adc6-a4ae479b39ff","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ia-2_smt","name":"statement","prose":"The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users)."},{"id":"ia-2_gdn","name":"guidance","prose":"Organizational users include employees or individuals that organizations deem to have equivalent status of employees (e.g., contractors, guest researchers). This control applies to all accesses other than: (i) accesses that are explicitly identified and documented in AC-14; and (ii) accesses that occur through authorized use of group authenticators without individual authentication. Organizations may require unique identification of individuals in group accounts (e.g., shared privilege accounts) or for detailed accountability of individual activity. Organizations employ passwords, tokens, or biometrics to authenticate user identities, or in the case multifactor authentication, or some combination thereof. Access to organizational information systems is defined as either local access or network access. Local access is any access to organizational information systems by users (or processes acting on behalf of users) where such access is obtained by direct connections without the use of networks. Network access is access to organizational information systems by users (or processes acting on behalf of users) where such access is obtained through network connections (i.e., nonlocal accesses). Remote access is a type of network access that involves communication through external networks (e.g., the Internet). Internal networks include local area networks and wide area networks. In addition, the use of encrypted virtual private networks (VPNs) for network connections between organization-controlled endpoints and non-organization controlled endpoints may be treated as internal networks from the perspective of protecting the confidentiality and integrity of information traversing the network. Organizations can satisfy the identification and authentication requirements in this control by complying with the requirements in Homeland Security Presidential Directive 12 consistent with the specific organizational implementation plans. Multifactor authentication requires the use of two or more different factors to achieve authentication. The factors are defined as: (i) something you know (e.g., password, personal identification number [PIN]); (ii) something you have (e.g., cryptographic identification device, token); or (iii) something you are (e.g., biometric). Multifactor solutions that require devices separate from information systems gaining access include, for example, hardware tokens providing time-based or challenge-response authenticators and smart cards such as the U.S. Government Personal Identity Verification card and the DoD common access card. In addition to identifying and authenticating users at the information system level (i.e., at logon), organizations also employ identification and authentication mechanisms at the application level, when necessary, to provide increased information security. Identification and authentication requirements for other than organizational users are described in IA-8.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"}]},{"id":"ia-2_obj","name":"objective","prose":"Determine if the information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users)."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for uniquely identifying and authenticating users\n\nautomated mechanisms supporting and\/or implementing identification and authentication capability"}]}],"controls":[{"id":"ia-2.1","class":"SP800-53-enhancement","title":"Network Access to Privileged Accounts","props":[{"name":"label","value":"IA-2(1)"},{"name":"sort-id","value":"ia-02.01"}],"parts":[{"id":"ia-2.1_smt","name":"statement","prose":"The information system implements multifactor authentication for network access to privileged accounts."},{"id":"ia-2.1_gdn","name":"guidance","links":[{"href":"#ac-6","rel":"related"}]},{"id":"ia-2.1_obj","name":"objective","prose":"Determine if the information system implements multifactor authentication for network access to privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing multifactor authentication capability"}]}]},{"id":"ia-2.2","class":"SP800-53-enhancement","title":"Network Access to Non-privileged Accounts","props":[{"name":"label","value":"IA-2(2)"},{"name":"sort-id","value":"ia-02.02"}],"parts":[{"id":"ia-2.2_smt","name":"statement","prose":"The information system implements multifactor authentication for network access to non-privileged accounts."},{"id":"ia-2.2_obj","name":"objective","prose":"Determine if the information system implements multifactor authentication for network access to non-privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing multifactor authentication capability"}]}]},{"id":"ia-2.3","class":"SP800-53-enhancement","title":"Local Access to Privileged Accounts","props":[{"name":"label","value":"IA-2(3)"},{"name":"sort-id","value":"ia-02.03"}],"parts":[{"id":"ia-2.3_smt","name":"statement","prose":"The information system implements multifactor authentication for local access to privileged accounts."},{"id":"ia-2.3_gdn","name":"guidance","links":[{"href":"#ac-6","rel":"related"}]},{"id":"ia-2.3_obj","name":"objective","prose":"Determine if the information system implements multifactor authentication for local access to privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing multifactor authentication capability"}]}]},{"id":"ia-2.4","class":"SP800-53-enhancement","title":"Local Access to Non-privileged Accounts","props":[{"name":"label","value":"IA-2(4)"},{"name":"sort-id","value":"ia-02.04"}],"parts":[{"id":"ia-2.4_smt","name":"statement","prose":"The information system implements multifactor authentication for local access to non-privileged accounts."},{"id":"ia-2.4_obj","name":"objective","prose":"Determine if the information system implements multifactor authentication for local access to non-privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing multifactor authentication capability"}]}]},{"id":"ia-2.8","class":"SP800-53-enhancement","title":"Network Access to Privileged Accounts - Replay Resistant","props":[{"name":"label","value":"IA-2(8)"},{"name":"sort-id","value":"ia-02.08"}],"parts":[{"id":"ia-2.8_smt","name":"statement","prose":"The information system implements replay-resistant authentication mechanisms for network access to privileged accounts."},{"id":"ia-2.8_gdn","name":"guidance","prose":"Authentication processes resist replay attacks if it is impractical to achieve successful authentications by replaying previous authentication messages. Replay-resistant techniques include, for example, protocols that use nonces or challenges such as Transport Layer Security (TLS) and time synchronous or challenge-response one-time authenticators."},{"id":"ia-2.8_obj","name":"objective","prose":"Determine if the information system implements replay-resistant authentication mechanisms for network access to privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of privileged information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms supporting and\/or implementing replay resistant authentication mechanisms"}]}]},{"id":"ia-2.9","class":"SP800-53-enhancement","title":"Network Access to Non-privileged Accounts - Replay Resistant","props":[{"name":"label","value":"IA-2(9)"},{"name":"sort-id","value":"ia-02.09"}],"parts":[{"id":"ia-2.9_smt","name":"statement","prose":"The information system implements replay-resistant authentication mechanisms for network access to non-privileged accounts."},{"id":"ia-2.9_gdn","name":"guidance","prose":"Authentication processes resist replay attacks if it is impractical to achieve successful authentications by recording\/replaying previous authentication messages. Replay-resistant techniques include, for example, protocols that use nonces or challenges such as Transport Layer Security (TLS) and time synchronous or challenge-response one-time authenticators."},{"id":"ia-2.9_obj","name":"objective","prose":"Determine if the information system implements replay-resistant authentication mechanisms for network access to non-privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of non-privileged information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms supporting and\/or implementing replay resistant authentication mechanisms"}]}]},{"id":"ia-2.11","class":"SP800-53-enhancement","title":"Remote Access - Separate Device","params":[{"id":"ia-2.11_prm_1","label":"organization-defined strength of mechanism requirements"}],"props":[{"name":"label","value":"IA-2(11)"},{"name":"sort-id","value":"ia-02.11"}],"parts":[{"id":"ia-2.11_smt","name":"statement","prose":"The information system implements multifactor authentication for remote access to privileged and non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets {{ insert: param, ia-2.11_prm_1 }}."},{"id":"ia-2.11_gdn","name":"guidance","prose":"For remote access to privileged\/non-privileged accounts, the purpose of requiring a device that is separate from the information system gaining access for one of the factors during multifactor authentication is to reduce the likelihood of compromising authentication credentials stored on the system. For example, adversaries deploying malicious code on organizational information systems can potentially compromise such credentials resident on the system and subsequently impersonate authorized users.","links":[{"href":"#ac-6","rel":"related"}]},{"id":"ia-2.11_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ia-2.11_obj.1","name":"objective","props":[{"name":"label","value":"IA-2(11)[1]"}],"prose":"the information system implements multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access;"},{"id":"ia-2.11_obj.2","name":"objective","props":[{"name":"label","value":"IA-2(11)[2]"}],"prose":"the information system implements multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access;"},{"id":"ia-2.11_obj.3","name":"objective","props":[{"name":"label","value":"IA-2(11)[3]"}],"prose":"the organization defines strength of mechanism requirements to be enforced by a device separate from the system gaining remote access to privileged accounts;"},{"id":"ia-2.11_obj.4","name":"objective","props":[{"name":"label","value":"IA-2(11)[4]"}],"prose":"the organization defines strength of mechanism requirements to be enforced by a device separate from the system gaining remote access to non-privileged accounts;"},{"id":"ia-2.11_obj.5","name":"objective","props":[{"name":"label","value":"IA-2(11)[5]"}],"prose":"the information system implements multifactor authentication for remote access to privileged accounts such that a device, separate from the system gaining access, meets organization-defined strength of mechanism requirements; and"},{"id":"ia-2.11_obj.6","name":"objective","props":[{"name":"label","value":"IA-2(11)[6]"}],"prose":"the information system implements multifactor authentication for remote access to non-privileged accounts such that a device, separate from the system gaining access, meets organization-defined strength of mechanism requirements."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of privileged and non-privileged information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability"}]}]},{"id":"ia-2.12","class":"SP800-53-enhancement","title":"Acceptance of PIV Credentials","props":[{"name":"label","value":"IA-2(12)"},{"name":"sort-id","value":"ia-02.12"}],"parts":[{"id":"ia-2.12_smt","name":"statement","prose":"The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials."},{"id":"ia-2.12_gdn","name":"guidance","prose":"This control enhancement applies to organizations implementing logical access control systems (LACS) and physical access control systems (PACS). Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11 requires federal agencies to continue implementing the requirements specified in HSPD-12 to enable agency-wide use of PIV credentials.","links":[{"href":"#au-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#sa-4","rel":"related"}]},{"id":"ia-2.12_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"ia-2.12_obj.1","name":"objective","props":[{"name":"label","value":"IA-2(12)[1]"}],"prose":"accepts Personal Identity Verification (PIV) credentials; and"},{"id":"ia-2.12_obj.2","name":"objective","props":[{"name":"label","value":"IA-2(12)[2]"}],"prose":"electronically verifies Personal Identity Verification (PIV) credentials."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nPIV verification records\n\nevidence of PIV credentials\n\nPIV credential authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing acceptance and verification of PIV credentials"}]}]}]},{"id":"ia-3","class":"SP800-53","title":"Device Identification and Authentication","params":[{"id":"ia-3_prm_1","label":"organization-defined specific and\/or types of devices"},{"id":"ia-3_prm_2","select":{"how-many":"one-or-more","choice":["local","remote","network"]}}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-3"},{"name":"sort-id","value":"ia-03"}],"parts":[{"id":"ia-3_smt","name":"statement","prose":"The information system uniquely identifies and authenticates {{ insert: param, ia-3_prm_1 }} before establishing a {{ insert: param, ia-3_prm_2 }} connection."},{"id":"ia-3_gdn","name":"guidance","prose":"Organizational devices requiring unique device-to-device identification and authentication may be defined by type, by device, or by a combination of type\/device. Information systems typically use either shared known information (e.g., Media Access Control [MAC] or Transmission Control Protocol\/Internet Protocol [TCP\/IP] addresses) for device identification or organizational authentication solutions (e.g., IEEE 802.1x and Extensible Authentication Protocol [EAP], Radius server with EAP-Transport Layer Security [TLS] authentication, Kerberos) to identify\/authenticate devices on local and\/or wide area networks. Organizations determine the required strength of authentication mechanisms by the security categories of information systems. Because of the challenges of applying this control on large scale, organizations are encouraged to only apply the control to those limited number (and type) of devices that truly need to support this capability.","links":[{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"}]},{"id":"ia-3_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ia-3_obj.1","name":"objective","props":[{"name":"label","value":"IA-3[1]"}],"prose":"the organization defines specific and\/or types of devices that the information system uniquely identifies and authenticates before establishing one or more of the following:","parts":[{"id":"ia-3_obj.1.a","name":"objective","props":[{"name":"label","value":"IA-3[1][a]"}],"prose":"a local connection;"},{"id":"ia-3_obj.1.b","name":"objective","props":[{"name":"label","value":"IA-3[1][b]"}],"prose":"a remote connection; and\/or"},{"id":"ia-3_obj.1.c","name":"objective","props":[{"name":"label","value":"IA-3[1][c]"}],"prose":"a network connection; and"}]},{"id":"ia-3_obj.2","name":"objective","props":[{"name":"label","value":"IA-3[2]"}],"prose":"the information system uniquely identifies and authenticates organization-defined devices before establishing one or more of the following:","parts":[{"id":"ia-3_obj.2.a","name":"objective","props":[{"name":"label","value":"IA-3[2][a]"}],"prose":"a local connection;"},{"id":"ia-3_obj.2.b","name":"objective","props":[{"name":"label","value":"IA-3[2][b]"}],"prose":"a remote connection; and\/or"},{"id":"ia-3_obj.2.c","name":"objective","props":[{"name":"label","value":"IA-3[2][c]"}],"prose":"a network connection."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing device identification and authentication\n\ninformation system design documentation\n\nlist of devices requiring unique identification and authentication\n\ndevice connection reports\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with operational responsibilities for device identification and authentication\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing device identification and authentication capability"}]}]},{"id":"ia-4","class":"SP800-53","title":"Identifier Management","params":[{"id":"ia-4_prm_1","label":"organization-defined personnel or roles"},{"id":"ia-4_prm_2","label":"organization-defined time period"},{"id":"ia-4_prm_3","label":"organization-defined time period of inactivity"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-4"},{"name":"sort-id","value":"ia-04"}],"links":[{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"}],"parts":[{"id":"ia-4_smt","name":"statement","prose":"The organization manages information system identifiers by:","parts":[{"id":"ia-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Receiving authorization from {{ insert: param, ia-4_prm_1 }} to assign an individual, group, role, or device identifier;"},{"id":"ia-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Selecting an identifier that identifies an individual, group, role, or device;"},{"id":"ia-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Assigning the identifier to the intended individual, group, role, or device;"},{"id":"ia-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Preventing reuse of identifiers for {{ insert: param, ia-4_prm_2 }}; and"},{"id":"ia-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Disabling the identifier after {{ insert: param, ia-4_prm_3 }}."}]},{"id":"ia-4_gdn","name":"guidance","prose":"Common device identifiers include, for example, media access control (MAC), Internet protocol (IP) addresses, or device-unique token identifiers. Management of individual identifiers is not applicable to shared information system accounts (e.g., guest and anonymous accounts). Typically, individual identifiers are the user names of the information system accounts assigned to those individuals. In such instances, the account management activities of AC-2 use account names provided by IA-4. This control also addresses individual identifiers not necessarily associated with information system accounts (e.g., identifiers used in physical security control databases accessed by badge reader systems for access to information systems). Preventing reuse of identifiers implies preventing the assignment of previously used individual, group, role, or device identifiers to different individuals, groups, roles, or devices.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#sc-37","rel":"related"}]},{"id":"ia-4_obj","name":"objective","prose":"Determine if the organization manages information system identifiers by:","parts":[{"id":"ia-4.a_obj","name":"objective","props":[{"name":"label","value":"IA-4(a)"}],"parts":[{"id":"ia-4.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(a)[1]"}],"prose":"defining personnel or roles from whom authorization must be received to assign:","parts":[{"id":"ia-4.a_obj.1.a","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][a]"}],"prose":"an individual identifier;"},{"id":"ia-4.a_obj.1.b","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][b]"}],"prose":"a group identifier;"},{"id":"ia-4.a_obj.1.c","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][c]"}],"prose":"a role identifier; and\/or"},{"id":"ia-4.a_obj.1.d","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][d]"}],"prose":"a device identifier;"}]},{"id":"ia-4.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(a)[2]"}],"prose":"receiving authorization from organization-defined personnel or roles to assign:","parts":[{"id":"ia-4.a_obj.2.a","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][a]"}],"prose":"an individual identifier;"},{"id":"ia-4.a_obj.2.b","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][b]"}],"prose":"a group identifier;"},{"id":"ia-4.a_obj.2.c","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][c]"}],"prose":"a role identifier; and\/or"},{"id":"ia-4.a_obj.2.d","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][d]"}],"prose":"a device identifier;"}]}]},{"id":"ia-4.b_obj","name":"objective","props":[{"name":"label","value":"IA-4(b)"}],"prose":"selecting an identifier that identifies:","parts":[{"id":"ia-4.b_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(b)[1]"}],"prose":"an individual;"},{"id":"ia-4.b_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(b)[2]"}],"prose":"a group;"},{"id":"ia-4.b_obj.3","name":"objective","props":[{"name":"label","value":"IA-4(b)[3]"}],"prose":"a role; and\/or"},{"id":"ia-4.b_obj.4","name":"objective","props":[{"name":"label","value":"IA-4(b)[4]"}],"prose":"a device;"}]},{"id":"ia-4.c_obj","name":"objective","props":[{"name":"label","value":"IA-4(c)"}],"prose":"assigning the identifier to the intended:","parts":[{"id":"ia-4.c_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(c)[1]"}],"prose":"individual;"},{"id":"ia-4.c_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(c)[2]"}],"prose":"group;"},{"id":"ia-4.c_obj.3","name":"objective","props":[{"name":"label","value":"IA-4(c)[3]"}],"prose":"role; and\/or"},{"id":"ia-4.c_obj.4","name":"objective","props":[{"name":"label","value":"IA-4(c)[4]"}],"prose":"device;"}]},{"id":"ia-4.d_obj","name":"objective","props":[{"name":"label","value":"IA-4(d)"}],"parts":[{"id":"ia-4.d_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(d)[1]"}],"prose":"defining a time period for preventing reuse of identifiers;"},{"id":"ia-4.d_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(d)[2]"}],"prose":"preventing reuse of identifiers for the organization-defined time period;"}]},{"id":"ia-4.e_obj","name":"objective","props":[{"name":"label","value":"IA-4(e)"}],"parts":[{"id":"ia-4.e_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(e)[1]"}],"prose":"defining a time period of inactivity to disable the identifier; and"},{"id":"ia-4.e_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(e)[2]"}],"prose":"disabling the identifier after the organization-defined time period of inactivity."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing identifier management\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of information system accounts\n\nlist of identifiers generated from physical access control devices\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with identifier management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identifier management"}]}]},{"id":"ia-5","class":"SP800-53","title":"Authenticator Management","params":[{"id":"ia-5_prm_1","label":"organization-defined time period by authenticator type"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-5"},{"name":"sort-id","value":"ia-05"}],"links":[{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#74e740a4-c45d-49f3-a86e-eb747c549e01","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#ba557c91-ba3e-4792-adc6-a4ae479b39ff","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ia-5_smt","name":"statement","prose":"The organization manages information system authenticators by:","parts":[{"id":"ia-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, or device receiving the authenticator;"},{"id":"ia-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishing initial authenticator content for authenticators defined by the organization;"},{"id":"ia-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensuring that authenticators have sufficient strength of mechanism for their intended use;"},{"id":"ia-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Establishing and implementing administrative procedures for initial authenticator distribution, for lost\/compromised or damaged authenticators, and for revoking authenticators;"},{"id":"ia-5_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Changing default content of authenticators prior to information system installation;"},{"id":"ia-5_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Establishing minimum and maximum lifetime restrictions and reuse conditions for authenticators;"},{"id":"ia-5_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Changing\/refreshing authenticators {{ insert: param, ia-5_prm_1 }};"},{"id":"ia-5_smt.h","name":"item","props":[{"name":"label","value":"h."}],"prose":"Protecting authenticator content from unauthorized disclosure and modification;"},{"id":"ia-5_smt.i","name":"item","props":[{"name":"label","value":"i."}],"prose":"Requiring individuals to take, and having devices implement, specific security safeguards to protect authenticators; and"},{"id":"ia-5_smt.j","name":"item","props":[{"name":"label","value":"j."}],"prose":"Changing authenticators for group\/role accounts when membership to those accounts changes."}]},{"id":"ia-5_gdn","name":"guidance","prose":"Individual authenticators include, for example, passwords, tokens, biometrics, PKI certificates, and key cards. Initial authenticator content is the actual content (e.g., the initial password) as opposed to requirements about authenticator content (e.g., minimum password length). In many cases, developers ship information system components with factory default authentication credentials to allow for initial installation and configuration. Default authentication credentials are often well known, easily discoverable, and present a significant security risk. The requirement to protect individual authenticators may be implemented via control PL-4 or PS-6 for authenticators in the possession of individuals and by controls AC-3, AC-6, and SC-28 for authenticators stored within organizational information systems (e.g., passwords stored in hashed or encrypted formats, files containing encrypted or hashed passwords accessible with administrator privileges). Information systems support individual authenticator management by organization-defined settings and restrictions for various authenticator characteristics including, for example, minimum password length, password composition, validation time window for time synchronous one-time tokens, and number of allowed rejections during the verification stage of biometric authentication. Specific actions that can be taken to safeguard authenticators include, for example, maintaining possession of individual authenticators, not loaning or sharing individual authenticators with others, and reporting lost, stolen, or compromised authenticators immediately. Authenticator management includes issuing and revoking, when no longer needed, authenticators for temporary access such as that required for remote maintenance. Device authenticators include, for example, certificates and passwords.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#ps-5","rel":"related"},{"href":"#ps-6","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-17","rel":"related"},{"href":"#sc-28","rel":"related"}]},{"id":"ia-5_obj","name":"objective","prose":"Determine if the organization manages information system authenticators by:","parts":[{"id":"ia-5.a_obj","name":"objective","props":[{"name":"label","value":"IA-5(a)"}],"prose":"verifying, as part of the initial authenticator distribution, the identity of:","parts":[{"id":"ia-5.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(a)[1]"}],"prose":"the individual receiving the authenticator;"},{"id":"ia-5.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(a)[2]"}],"prose":"the group receiving the authenticator;"},{"id":"ia-5.a_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(a)[3]"}],"prose":"the role receiving the authenticator; and\/or"},{"id":"ia-5.a_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(a)[4]"}],"prose":"the device receiving the authenticator;"}]},{"id":"ia-5.b_obj","name":"objective","props":[{"name":"label","value":"IA-5(b)"}],"prose":"establishing initial authenticator content for authenticators defined by the organization;"},{"id":"ia-5.c_obj","name":"objective","props":[{"name":"label","value":"IA-5(c)"}],"prose":"ensuring that authenticators have sufficient strength of mechanism for their intended use;"},{"id":"ia-5.d_obj","name":"objective","props":[{"name":"label","value":"IA-5(d)"}],"parts":[{"id":"ia-5.d_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(d)[1]"}],"prose":"establishing and implementing administrative procedures for initial authenticator distribution;"},{"id":"ia-5.d_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(d)[2]"}],"prose":"establishing and implementing administrative procedures for lost\/compromised or damaged authenticators;"},{"id":"ia-5.d_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(d)[3]"}],"prose":"establishing and implementing administrative procedures for revoking authenticators;"}]},{"id":"ia-5.e_obj","name":"objective","props":[{"name":"label","value":"IA-5(e)"}],"prose":"changing default content of authenticators prior to information system installation;"},{"id":"ia-5.f_obj","name":"objective","props":[{"name":"label","value":"IA-5(f)"}],"parts":[{"id":"ia-5.f_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(f)[1]"}],"prose":"establishing minimum lifetime restrictions for authenticators;"},{"id":"ia-5.f_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(f)[2]"}],"prose":"establishing maximum lifetime restrictions for authenticators;"},{"id":"ia-5.f_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(f)[3]"}],"prose":"establishing reuse conditions for authenticators;"}]},{"id":"ia-5.g_obj","name":"objective","props":[{"name":"label","value":"IA-5(g)"}],"parts":[{"id":"ia-5.g_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(g)[1]"}],"prose":"defining a time period (by authenticator type) for changing\/refreshing authenticators;"},{"id":"ia-5.g_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(g)[2]"}],"prose":"changing\/refreshing authenticators with the organization-defined time period by authenticator type;"}]},{"id":"ia-5.h_obj","name":"objective","props":[{"name":"label","value":"IA-5(h)"}],"prose":"protecting authenticator content from unauthorized:","parts":[{"id":"ia-5.h_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(h)[1]"}],"prose":"disclosure;"},{"id":"ia-5.h_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(h)[2]"}],"prose":"modification;"}]},{"id":"ia-5.i_obj","name":"objective","props":[{"name":"label","value":"IA-5(i)"}],"parts":[{"id":"ia-5.i_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(i)[1]"}],"prose":"requiring individuals to take specific security safeguards to protect authenticators;"},{"id":"ia-5.i_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(i)[2]"}],"prose":"having devices implement specific security safeguards to protect authenticators; and"}]},{"id":"ia-5.j_obj","name":"objective","props":[{"name":"label","value":"IA-5(j)"}],"prose":"changing authenticators for group\/role accounts when membership to those accounts changes."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator management\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of information system authenticator types\n\nchange control records associated with managing information system authenticators\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing authenticator management capability"}]}],"controls":[{"id":"ia-5.1","class":"SP800-53-enhancement","title":"Password-based Authentication","params":[{"id":"ia-5.1_prm_1","label":"organization-defined requirements for case sensitivity, number of characters, mix of upper-case letters, lower-case letters, numbers, and special characters, including minimum requirements for each type"},{"id":"ia-5.1_prm_2","label":"organization-defined number"},{"id":"ia-5.1_prm_3","label":"organization-defined numbers for lifetime minimum, lifetime maximum"},{"id":"ia-5.1_prm_4","label":"organization-defined number"}],"props":[{"name":"label","value":"IA-5(1)"},{"name":"sort-id","value":"ia-05.01"}],"parts":[{"id":"ia-5.1_smt","name":"statement","prose":"The information system, for password-based authentication:","parts":[{"id":"ia-5.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Enforces minimum password complexity of {{ insert: param, ia-5.1_prm_1 }};"},{"id":"ia-5.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Enforces at least the following number of changed characters when new passwords are created: {{ insert: param, ia-5.1_prm_2 }};"},{"id":"ia-5.1_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Stores and transmits only cryptographically-protected passwords;"},{"id":"ia-5.1_smt.d","name":"item","props":[{"name":"label","value":"(d)"}],"prose":"Enforces password minimum and maximum lifetime restrictions of {{ insert: param, ia-5.1_prm_3 }};"},{"id":"ia-5.1_smt.e","name":"item","props":[{"name":"label","value":"(e)"}],"prose":"Prohibits password reuse for {{ insert: param, ia-5.1_prm_4 }} generations; and"},{"id":"ia-5.1_smt.f","name":"item","props":[{"name":"label","value":"(f)"}],"prose":"Allows the use of a temporary password for system logons with an immediate change to a permanent password."}]},{"id":"ia-5.1_gdn","name":"guidance","prose":"This control enhancement applies to single-factor authentication of individuals using passwords as individual or group authenticators, and in a similar manner, when passwords are part of multifactor authenticators. This control enhancement does not apply when passwords are used to unlock hardware authenticators (e.g., Personal Identity Verification cards). The implementation of such password mechanisms may not meet all of the requirements in the enhancement. Cryptographically-protected passwords include, for example, encrypted versions of passwords and one-way cryptographic hashes of passwords. The number of changed characters refers to the number of changes required with respect to the total number of positions in the current password. Password lifetime restrictions do not apply to temporary passwords. To mitigate certain brute force attacks against passwords, organizations may also consider salting passwords.","links":[{"href":"#ia-6","rel":"related"}]},{"id":"ia-5.1_obj","name":"objective","prose":"Determine if, for password-based authentication:","parts":[{"id":"ia-5.1.a_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)"}],"parts":[{"id":"ia-5.1.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[1]"}],"prose":"the organization defines requirements for case sensitivity;"},{"id":"ia-5.1.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[2]"}],"prose":"the organization defines requirements for number of characters;"},{"id":"ia-5.1.a_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[3]"}],"prose":"the organization defines requirements for the mix of upper-case letters, lower-case letters, numbers and special characters;"},{"id":"ia-5.1.a_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[4]"}],"prose":"the organization defines minimum requirements for each type of character;"},{"id":"ia-5.1.a_obj.5","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[5]"}],"prose":"the information system enforces minimum password complexity of organization-defined requirements for case sensitivity, number of characters, mix of upper-case letters, lower-case letters, numbers, and special characters, including minimum requirements for each type;"}],"links":[{"href":"#ia-5.1_smt.a","rel":"corresp"}]},{"id":"ia-5.1.b_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(b)"}],"parts":[{"id":"ia-5.1.b_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(b)[1]"}],"prose":"the organization defines a minimum number of changed characters to be enforced when new passwords are created;"},{"id":"ia-5.1.b_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(b)[2]"}],"prose":"the information system enforces at least the organization-defined minimum number of characters that must be changed when new passwords are created;"}],"links":[{"href":"#ia-5.1_smt.b","rel":"corresp"}]},{"id":"ia-5.1.c_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(c)"}],"prose":"the information system stores and transmits only encrypted representations of passwords;","links":[{"href":"#ia-5.1_smt.c","rel":"corresp"}]},{"id":"ia-5.1.d_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)"}],"parts":[{"id":"ia-5.1.d_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[1]"}],"prose":"the organization defines numbers for password minimum lifetime restrictions to be enforced for passwords;"},{"id":"ia-5.1.d_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[2]"}],"prose":"the organization defines numbers for password maximum lifetime restrictions to be enforced for passwords;"},{"id":"ia-5.1.d_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[3]"}],"prose":"the information system enforces password minimum lifetime restrictions of organization-defined numbers for lifetime minimum;"},{"id":"ia-5.1.d_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[4]"}],"prose":"the information system enforces password maximum lifetime restrictions of organization-defined numbers for lifetime maximum;"}],"links":[{"href":"#ia-5.1_smt.d","rel":"corresp"}]},{"id":"ia-5.1.e_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(e)"}],"parts":[{"id":"ia-5.1.e_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(e)[1]"}],"prose":"the organization defines the number of password generations to be prohibited from password reuse;"},{"id":"ia-5.1.e_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(e)[2]"}],"prose":"the information system prohibits password reuse for the organization-defined number of generations; and"}],"links":[{"href":"#ia-5.1_smt.e","rel":"corresp"}]},{"id":"ia-5.1.f_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(f)"}],"prose":"the information system allows the use of a temporary password for system logons with an immediate change to a permanent password.","links":[{"href":"#ia-5.1_smt.f","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\npassword policy\n\nprocedures addressing authenticator management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\npassword configurations and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing password-based authenticator management capability"}]}]},{"id":"ia-5.2","class":"SP800-53-enhancement","title":"Pki-based Authentication","props":[{"name":"label","value":"IA-5(2)"},{"name":"sort-id","value":"ia-05.02"}],"parts":[{"id":"ia-5.2_smt","name":"statement","prose":"The information system, for PKI-based authentication:","parts":[{"id":"ia-5.2_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Validates certifications by constructing and verifying a certification path to an accepted trust anchor including checking certificate status information;"},{"id":"ia-5.2_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Enforces authorized access to the corresponding private key;"},{"id":"ia-5.2_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Maps the authenticated identity to the account of the individual or group; and"},{"id":"ia-5.2_smt.d","name":"item","props":[{"name":"label","value":"(d)"}],"prose":"Implements a local cache of revocation data to support path discovery and validation in case of inability to access revocation information via the network."}]},{"id":"ia-5.2_gdn","name":"guidance","prose":"Status information for certification paths includes, for example, certificate revocation lists or certificate status protocol responses. For PIV cards, validation of certifications involves the construction and verification of a certification path to the Common Policy Root trust anchor including certificate policy processing.","links":[{"href":"#ia-6","rel":"related"}]},{"id":"ia-5.2_obj","name":"objective","prose":"Determine if the information system, for PKI-based authentication:","parts":[{"id":"ia-5.2.a_obj","name":"objective","props":[{"name":"label","value":"IA-5(2)(a)"}],"parts":[{"id":"ia-5.2.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(2)(a)[1]"}],"prose":"validates certifications by constructing a certification path to an accepted trust anchor;"},{"id":"ia-5.2.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(2)(a)[2]"}],"prose":"validates certifications by verifying a certification path to an accepted trust anchor;"},{"id":"ia-5.2.a_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(2)(a)[3]"}],"prose":"includes checking certificate status information when constructing and verifying the certification path;"}],"links":[{"href":"#ia-5.2_smt.a","rel":"corresp"}]},{"id":"ia-5.2.b_obj","name":"objective","props":[{"name":"label","value":"IA-5(2)(b)"}],"prose":"enforces authorized access to the corresponding private key;","links":[{"href":"#ia-5.2_smt.b","rel":"corresp"}]},{"id":"ia-5.2.c_obj","name":"objective","props":[{"name":"label","value":"IA-5(2)(c)"}],"prose":"maps the authenticated identity to the account of the individual or group; and","links":[{"href":"#ia-5.2_smt.c","rel":"corresp"}]},{"id":"ia-5.2.d_obj","name":"objective","props":[{"name":"label","value":"IA-5(2)(d)"}],"prose":"implements a local cache of revocation data to support path discovery and validation in case of inability to access revocation information via the network.","links":[{"href":"#ia-5.2_smt.d","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nPKI certification validation records\n\nPKI certification revocation lists\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with PKI-based, authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing PKI-based, authenticator management capability"}]}]},{"id":"ia-5.3","class":"SP800-53-enhancement","title":"In-person or Trusted Third-party Registration","params":[{"id":"ia-5.3_prm_1","label":"organization-defined types of and\/or specific authenticators"},{"id":"ia-5.3_prm_2","select":{"choice":["in person","by a trusted third party"]}},{"id":"ia-5.3_prm_3","label":"organization-defined registration authority"},{"id":"ia-5.3_prm_4","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"IA-5(3)"},{"name":"sort-id","value":"ia-05.03"}],"parts":[{"id":"ia-5.3_smt","name":"statement","prose":"The organization requires that the registration process to receive {{ insert: param, ia-5.3_prm_1 }} be conducted {{ insert: param, ia-5.3_prm_2 }} before {{ insert: param, ia-5.3_prm_3 }} with authorization by {{ insert: param, ia-5.3_prm_4 }}."},{"id":"ia-5.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ia-5.3_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(3)[1]"}],"prose":"defines types of and\/or specific authenticators to be received in person or by a trusted third party;"},{"id":"ia-5.3_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(3)[2]"}],"prose":"defines the registration authority with oversight of the registration process for receipt of organization-defined types of and\/or specific authenticators;"},{"id":"ia-5.3_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(3)[3]"}],"prose":"defines personnel or roles responsible for authorizing organization-defined registration authority;"},{"id":"ia-5.3_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(3)[4]"}],"prose":"defines if the registration process is to be conducted:","parts":[{"id":"ia-5.3_obj.4.a","name":"objective","props":[{"name":"label","value":"IA-5(3)[4][a]"}],"prose":"in person; or"},{"id":"ia-5.3_obj.4.b","name":"objective","props":[{"name":"label","value":"IA-5(3)[4][b]"}],"prose":"by a trusted third party; and"}]},{"id":"ia-5.3_obj.5","name":"objective","props":[{"name":"label","value":"IA-5(3)[5]"}],"prose":"requires that the registration process to receive organization-defined types of and\/or specific authenticators be conducted in person or by a trusted third party before organization-defined registration authority with authorization by organization-defined personnel or roles."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator management\n\nregistration process for receiving information system authenticators\n\nlist of authenticators requiring in-person registration\n\nlist of authenticators requiring trusted third party registration\n\nauthenticator registration documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\nregistration authority\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ia-5.11","class":"SP800-53-enhancement","title":"Hardware Token-based Authentication","params":[{"id":"ia-5.11_prm_1","label":"organization-defined token quality requirements"}],"props":[{"name":"label","value":"IA-5(11)"},{"name":"sort-id","value":"ia-05.11"}],"parts":[{"id":"ia-5.11_smt","name":"statement","prose":"The information system, for hardware token-based authentication, employs mechanisms that satisfy {{ insert: param, ia-5.11_prm_1 }}."},{"id":"ia-5.11_gdn","name":"guidance","prose":"Hardware token-based authentication typically refers to the use of PKI-based tokens, such as the U.S. Government Personal Identity Verification (PIV) card. Organizations define specific requirements for tokens, such as working with a particular PKI."},{"id":"ia-5.11_obj","name":"objective","prose":"Determine if, for hardware token-based authentication:","parts":[{"id":"ia-5.11_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(11)[1]"}],"prose":"the organization defines token quality requirements to be satisfied; and"},{"id":"ia-5.11_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(11)[2]"}],"prose":"the information system employs mechanisms that satisfy organization-defined token quality requirements."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator management\n\nsecurity plan\n\ninformation system design documentation\n\nautomated mechanisms employing hardware token-based authentication for the information system\n\nlist of token quality requirements\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing hardware token-based authenticator management capability"}]}]}]},{"id":"ia-6","class":"SP800-53","title":"Authenticator Feedback","props":[{"name":"priority","value":"P2"},{"name":"label","value":"IA-6"},{"name":"sort-id","value":"ia-06"}],"parts":[{"id":"ia-6_smt","name":"statement","prose":"The information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation\/use by unauthorized individuals."},{"id":"ia-6_gdn","name":"guidance","prose":"The feedback from information systems does not provide information that would allow unauthorized individuals to compromise authentication mechanisms. For some types of information systems or system components, for example, desktops\/notebooks with relatively large monitors, the threat (often referred to as shoulder surfing) may be significant. For other types of systems or components, for example, mobile devices with 2-4 inch screens, this threat may be less significant, and may need to be balanced against the increased likelihood of typographic input errors due to the small keyboards. Therefore, the means for obscuring the authenticator feedback is selected accordingly. Obscuring the feedback of authentication information includes, for example, displaying asterisks when users type passwords into input devices, or displaying feedback for a very limited time before fully obscuring it.","links":[{"href":"#pe-18","rel":"related"}]},{"id":"ia-6_obj","name":"objective","prose":"Determine if the information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation\/use by unauthorized individuals."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator feedback\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing the obscuring of feedback of authentication information during authentication"}]}]},{"id":"ia-7","class":"SP800-53","title":"Cryptographic Module Authentication","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-7"},{"name":"sort-id","value":"ia-07"}],"links":[{"href":"#39f9087d-7687-46d2-8eda-b6f4b7a4d8a9","rel":"reference"},{"href":"#b09d1a31-d3c9-4138-a4f4-4c63816afd7d","rel":"reference"}],"parts":[{"id":"ia-7_smt","name":"statement","prose":"The information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication."},{"id":"ia-7_gdn","name":"guidance","prose":"Authentication mechanisms may be required within a cryptographic module to authenticate an operator accessing the module and to verify that the operator is authorized to assume the requested role and perform services within that role.","links":[{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"ia-7_obj","name":"objective","prose":"Determine if the information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing cryptographic module authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for cryptographic module authentication\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing cryptographic module authentication"}]}]},{"id":"ia-8","class":"SP800-53","title":"Identification and Authentication (non-organizational Users)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-8"},{"name":"sort-id","value":"ia-08"}],"links":[{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#74e740a4-c45d-49f3-a86e-eb747c549e01","rel":"reference"},{"href":"#599fe9ba-4750-4450-9eeb-b95bd19a5e8f","rel":"reference"},{"href":"#ba557c91-ba3e-4792-adc6-a4ae479b39ff","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#2157bb7e-192c-4eaa-877f-93ef6b0a3292","rel":"reference"},{"href":"#654f21e2-f3bc-43b2-abdc-60ab8d09744b","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ia-8_smt","name":"statement","prose":"The information system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users)."},{"id":"ia-8_gdn","name":"guidance","prose":"Non-organizational users include information system users other than organizational users explicitly covered by IA-2. These individuals are uniquely identified and authenticated for accesses other than those accesses explicitly identified and documented in AC-14. In accordance with the E-Authentication E-Government initiative, authentication of non-organizational users accessing federal information systems may be required to protect federal, proprietary, or privacy-related information (with exceptions noted for national security systems). Organizations use risk assessments to determine authentication needs and consider scalability, practicality, and security in balancing the need to ensure ease of use for access to federal information and information systems with the need to protect and adequately mitigate risk. IA-2 addresses identification and authentication requirements for access to information systems by organizational users.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#sc-8","rel":"related"}]},{"id":"ia-8_obj","name":"objective","prose":"Determine if the information system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users)."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability"}]}],"controls":[{"id":"ia-8.1","class":"SP800-53-enhancement","title":"Acceptance of PIV Credentials from Other Agencies","props":[{"name":"label","value":"IA-8(1)"},{"name":"sort-id","value":"ia-08.01"}],"parts":[{"id":"ia-8.1_smt","name":"statement","prose":"The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials from other federal agencies."},{"id":"ia-8.1_gdn","name":"guidance","prose":"This control enhancement applies to logical access control systems (LACS) and physical access control systems (PACS). Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11 requires federal agencies to continue implementing the requirements specified in HSPD-12 to enable agency-wide use of PIV credentials.","links":[{"href":"#au-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#sa-4","rel":"related"}]},{"id":"ia-8.1_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"ia-8.1_obj.1","name":"objective","props":[{"name":"label","value":"IA-8(1)[1]"}],"prose":"accepts Personal Identity Verification (PIV) credentials from other agencies; and"},{"id":"ia-8.1_obj.2","name":"objective","props":[{"name":"label","value":"IA-8(1)[2]"}],"prose":"electronically verifies Personal Identity Verification (PIV) credentials from other agencies."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nPIV verification records\n\nevidence of PIV credentials\n\nPIV credential authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms that accept and verify PIV credentials"}]}]},{"id":"ia-8.2","class":"SP800-53-enhancement","title":"Acceptance of Third-party Credentials","props":[{"name":"label","value":"IA-8(2)"},{"name":"sort-id","value":"ia-08.02"}],"parts":[{"id":"ia-8.2_smt","name":"statement","prose":"The information system accepts only FICAM-approved third-party credentials."},{"id":"ia-8.2_gdn","name":"guidance","prose":"This control enhancement typically applies to organizational information systems that are accessible to the general public, for example, public-facing websites. Third-party credentials are those credentials issued by nonfederal government entities approved by the Federal Identity, Credential, and Access Management (FICAM) Trust Framework Solutions initiative. Approved third-party credentials meet or exceed the set of minimum federal government-wide technical, security, privacy, and organizational maturity requirements. This allows federal government relying parties to trust such credentials at their approved assurance levels.","links":[{"href":"#au-2","rel":"related"}]},{"id":"ia-8.2_obj","name":"objective","prose":"Determine if the information system accepts only FICAM-approved third-party credentials."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of FICAM-approved, third-party credentialing products, components, or services procured and implemented by organization\n\nthird-party credential verification records\n\nevidence of FICAM-approved third-party credentials\n\nthird-party credential authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms that accept FICAM-approved credentials"}]}]},{"id":"ia-8.3","class":"SP800-53-enhancement","title":"Use of Ficam-approved Products","params":[{"id":"ia-8.3_prm_1","label":"organization-defined information systems"}],"props":[{"name":"label","value":"IA-8(3)"},{"name":"sort-id","value":"ia-08.03"}],"parts":[{"id":"ia-8.3_smt","name":"statement","prose":"The organization employs only FICAM-approved information system components in {{ insert: param, ia-8.3_prm_1 }} to accept third-party credentials."},{"id":"ia-8.3_gdn","name":"guidance","prose":"This control enhancement typically applies to information systems that are accessible to the general public, for example, public-facing websites. FICAM-approved information system components include, for example, information technology products and software libraries that have been approved by the Federal Identity, Credential, and Access Management conformance program.","links":[{"href":"#sa-4","rel":"related"}]},{"id":"ia-8.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ia-8.3_obj.1","name":"objective","props":[{"name":"label","value":"IA-8(3)[1]"}],"prose":"defines information systems in which only FICAM-approved information system components are to be employed to accept third-party credentials; and"},{"id":"ia-8.3_obj.2","name":"objective","props":[{"name":"label","value":"IA-8(3)[2]"}],"prose":"employs only FICAM-approved information system components in organization-defined information systems to accept third-party credentials."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nsystem and services acquisition policy\n\nprocedures addressing user identification and authentication\n\nprocedures addressing the integration of security requirements into the acquisition process\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nthird-party credential validations\n\nthird-party credential authorizations\n\nthird-party credential records\n\nlist of FICAM-approved information system components procured and implemented by organization\n\nacquisition documentation\n\nacquisition contracts for information system procurements or services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information system security, acquisition, and contracting responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability"}]}]},{"id":"ia-8.4","class":"SP800-53-enhancement","title":"Use of Ficam-issued Profiles","props":[{"name":"label","value":"IA-8(4)"},{"name":"sort-id","value":"ia-08.04"}],"parts":[{"id":"ia-8.4_smt","name":"statement","prose":"The information system conforms to FICAM-issued profiles."},{"id":"ia-8.4_gdn","name":"guidance","prose":"This control enhancement addresses open identity management standards. To ensure that these standards are viable, robust, reliable, sustainable (e.g., available in commercial information technology products), and interoperable as documented, the United States Government assesses and scopes identity management standards and technology implementations against applicable federal legislation, directives, policies, and requirements. The result is FICAM-issued implementation profiles of approved protocols (e.g., FICAM authentication protocols such as SAML 2.0 and OpenID 2.0, as well as other protocols such as the FICAM Backend Attribute Exchange).","links":[{"href":"#sa-4","rel":"related"}]},{"id":"ia-8.4_obj","name":"objective","prose":"Determine if the information system conforms to FICAM-issued profiles."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nsystem and services acquisition policy\n\nprocedures addressing user identification and authentication\n\nprocedures addressing the integration of security requirements into the acquisition process\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of FICAM-issued profiles and associated, approved protocols\n\nacquisition documentation\n\nacquisition contracts for information system procurements or services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms supporting and\/or implementing conformance with FICAM-issued profiles"}]}]}]}]},{"id":"ir","class":"family","title":"Incident Response","controls":[{"id":"ir-1","class":"SP800-53","title":"Incident Response Policy and Procedures","params":[{"id":"ir-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ir-1_prm_2","label":"organization-defined frequency"},{"id":"ir-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-1"},{"name":"sort-id","value":"ir-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"},{"href":"#6d431fee-658f-4a0e-9f2e-a38b5d398fab","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ir-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ir-1_prm_1 }}:","parts":[{"id":"ir-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An incident response policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ir-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the incident response policy and associated incident response controls; and"}]},{"id":"ir-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ir-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Incident response policy {{ insert: param, ir-1_prm_2 }}; and"},{"id":"ir-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Incident response procedures {{ insert: param, ir-1_prm_3 }}."}]}]},{"id":"ir-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the IR family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ir-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-1.a_obj","name":"objective","props":[{"name":"label","value":"IR-1(a)"}],"parts":[{"id":"ir-1.a.1_obj","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)"}],"parts":[{"id":"ir-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1]"}],"prose":"develops and documents an incident response policy that addresses:","parts":[{"id":"ir-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ir-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ir-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ir-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ir-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ir-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ir-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ir-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the incident response policy is to be disseminated;"},{"id":"ir-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[3]"}],"prose":"disseminates the incident response policy to organization-defined personnel or roles;"}]},{"id":"ir-1.a.2_obj","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)"}],"parts":[{"id":"ir-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the incident response policy and associated incident response controls;"},{"id":"ir-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ir-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ir-1.b_obj","name":"objective","props":[{"name":"label","value":"IR-1(b)"}],"parts":[{"id":"ir-1.b.1_obj","name":"objective","props":[{"name":"label","value":"IR-1(b)(1)"}],"parts":[{"id":"ir-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current incident response policy;"},{"id":"ir-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(b)(1)[2]"}],"prose":"reviews and updates the current incident response policy with the organization-defined frequency;"}]},{"id":"ir-1.b.2_obj","name":"objective","props":[{"name":"label","value":"IR-1(b)(2)"}],"parts":[{"id":"ir-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current incident response procedures; and"},{"id":"ir-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(b)(2)[2]"}],"prose":"reviews and updates the current incident response procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ir-2","class":"SP800-53","title":"Incident Response Training","params":[{"id":"ir-2_prm_1","label":"organization-defined time period"},{"id":"ir-2_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"IR-2"},{"name":"sort-id","value":"ir-02"}],"links":[{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"ir-2_smt","name":"statement","prose":"The organization provides incident response training to information system users consistent with assigned roles and responsibilities:","parts":[{"id":"ir-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Within {{ insert: param, ir-2_prm_1 }} of assuming an incident response role or responsibility;"},{"id":"ir-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"ir-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, ir-2_prm_2 }} thereafter."}]},{"id":"ir-2_gdn","name":"guidance","prose":"Incident response training provided by organizations is linked to the assigned roles and responsibilities of organizational personnel to ensure the appropriate content and level of detail is included in such training. For example, regular users may only need to know who to call or how to recognize an incident on the information system; system administrators may require additional training on how to handle\/remediate incidents; and incident responders may receive more specific training on forensics, reporting, system recovery, and restoration. Incident response training includes user training in the identification and reporting of suspicious activities, both from external and internal sources.","links":[{"href":"#at-3","rel":"related"},{"href":"#cp-3","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"ir-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-2.a_obj","name":"objective","props":[{"name":"label","value":"IR-2(a)"}],"parts":[{"id":"ir-2.a_obj.1","name":"objective","props":[{"name":"label","value":"IR-2(a)[1]"}],"prose":"defines a time period within which incident response training is to be provided to information system users assuming an incident response role or responsibility;"},{"id":"ir-2.a_obj.2","name":"objective","props":[{"name":"label","value":"IR-2(a)[2]"}],"prose":"provides incident response training to information system users consistent with assigned roles and responsibilities within the organization-defined time period of assuming an incident response role or responsibility;"}]},{"id":"ir-2.b_obj","name":"objective","props":[{"name":"label","value":"IR-2(b)"}],"prose":"provides incident response training to information system users consistent with assigned roles and responsibilities when required by information system changes;"},{"id":"ir-2.c_obj","name":"objective","props":[{"name":"label","value":"IR-2(c)"}],"parts":[{"id":"ir-2.c_obj.1","name":"objective","props":[{"name":"label","value":"IR-2(c)[1]"}],"prose":"defines the frequency to provide refresher incident response training to information system users consistent with assigned roles or responsibilities; and"},{"id":"ir-2.c_obj.2","name":"objective","props":[{"name":"label","value":"IR-2(c)[2]"}],"prose":"after the initial incident response training, provides refresher incident response training to information system users consistent with assigned roles and responsibilities in accordance with the organization-defined frequency to provide refresher training."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response training\n\nincident response training curriculum\n\nincident response training materials\n\nsecurity plan\n\nincident response plan\n\nsecurity plan\n\nincident response training records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response training and operational responsibilities\n\norganizational personnel with information security responsibilities"}]}],"controls":[{"id":"ir-2.1","class":"SP800-53-enhancement","title":"Simulated Events","props":[{"name":"label","value":"IR-2(1)"},{"name":"sort-id","value":"ir-02.01"}],"parts":[{"id":"ir-2.1_smt","name":"statement","prose":"The organization incorporates simulated events into incident response training to facilitate effective response by personnel in crisis situations."},{"id":"ir-2.1_obj","name":"objective","prose":"Determine if the organization incorporates simulated events into incident response training to facilitate effective response by personnel in crisis situations."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response training\n\nincident response training curriculum\n\nincident response training materials\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response training and operational responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms that support and\/or implement simulated events for incident response training"}]}]},{"id":"ir-2.2","class":"SP800-53-enhancement","title":"Automated Training Environments","props":[{"name":"label","value":"IR-2(2)"},{"name":"sort-id","value":"ir-02.02"}],"parts":[{"id":"ir-2.2_smt","name":"statement","prose":"The organization employs automated mechanisms to provide a more thorough and realistic incident response training environment."},{"id":"ir-2.2_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to provide a more thorough and realistic incident response training environment."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response training\n\nincident response training curriculum\n\nincident response training materials\n\nautomated mechanisms supporting incident response training\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response training and operational responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms that provide a thorough and realistic incident response training environment"}]}]}]},{"id":"ir-3","class":"SP800-53","title":"Incident Response Testing","params":[{"id":"ir-3_prm_1","label":"organization-defined frequency"},{"id":"ir-3_prm_2","label":"organization-defined tests"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"IR-3"},{"name":"sort-id","value":"ir-03"}],"links":[{"href":"#0243a05a-e8a3-4d51-9364-4a9d20b0dcdf","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"}],"parts":[{"id":"ir-3_smt","name":"statement","prose":"The organization tests the incident response capability for the information system {{ insert: param, ir-3_prm_1 }} using {{ insert: param, ir-3_prm_2 }} to determine the incident response effectiveness and documents the results."},{"id":"ir-3_gdn","name":"guidance","prose":"Organizations test incident response capabilities to determine the overall effectiveness of the capabilities and to identify potential weaknesses or deficiencies. Incident response testing includes, for example, the use of checklists, walk-through or tabletop exercises, simulations (parallel\/full interrupt), and comprehensive exercises. Incident response testing can also include a determination of the effects on organizational operations (e.g., reduction in mission capabilities), organizational assets, and individuals due to incident response.","links":[{"href":"#cp-4","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"ir-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-3_obj.1","name":"objective","props":[{"name":"label","value":"IR-3[1]"}],"prose":"defines incident response tests to test the incident response capability for the information system;"},{"id":"ir-3_obj.2","name":"objective","props":[{"name":"label","value":"IR-3[2]"}],"prose":"defines the frequency to test the incident response capability for the information system; and"},{"id":"ir-3_obj.3","name":"objective","props":[{"name":"label","value":"IR-3[3]"}],"prose":"tests the incident response capability for the information system with the organization-defined frequency, using organization-defined tests to determine the incident response effectiveness and documents the results."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\ncontingency planning policy\n\nprocedures addressing incident response testing\n\nprocedures addressing contingency plan testing\n\nincident response testing material\n\nincident response test results\n\nincident response test plan\n\nincident response plan\n\ncontingency plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response testing responsibilities\n\norganizational personnel with information security responsibilities"}]}],"controls":[{"id":"ir-3.2","class":"SP800-53-enhancement","title":"Coordination with Related Plans","props":[{"name":"label","value":"IR-3(2)"},{"name":"sort-id","value":"ir-03.02"}],"parts":[{"id":"ir-3.2_smt","name":"statement","prose":"The organization coordinates incident response testing with organizational elements responsible for related plans."},{"id":"ir-3.2_gdn","name":"guidance","prose":"Organizational plans related to incident response testing include, for example, Business Continuity Plans, Contingency Plans, Disaster Recovery Plans, Continuity of Operations Plans, Crisis Communications Plans, Critical Infrastructure Plans, and Occupant Emergency Plans."},{"id":"ir-3.2_obj","name":"objective","prose":"Determine if the organization coordinates incident response testing with organizational elements responsible for related plans."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\ncontingency planning policy\n\nprocedures addressing incident response testing\n\nincident response testing documentation\n\nincident response plan\n\nbusiness continuity plans\n\ncontingency plans\n\ndisaster recovery plans\n\ncontinuity of operations plans\n\ncrisis communications plans\n\ncritical infrastructure plans\n\noccupant emergency plans\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response testing responsibilities\n\norganizational personnel with responsibilities for testing organizational plans related to incident response testing\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"ir-4","class":"SP800-53","title":"Incident Handling","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-4"},{"name":"sort-id","value":"ir-04"}],"links":[{"href":"#c5034e0c-eba6-4ecd-a541-79f0678f4ba4","rel":"reference"},{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"}],"parts":[{"id":"ir-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Implements an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery;"},{"id":"ir-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Coordinates incident handling activities with contingency planning activities; and"},{"id":"ir-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Incorporates lessons learned from ongoing incident handling activities into incident response procedures, training, and testing, and implements the resulting changes accordingly."}]},{"id":"ir-4_gdn","name":"guidance","prose":"Organizations recognize that incident response capability is dependent on the capabilities of organizational information systems and the mission\/business processes being supported by those systems. Therefore, organizations consider incident response as part of the definition, design, and development of mission\/business processes and information systems. Incident-related information can be obtained from a variety of sources including, for example, audit monitoring, network monitoring, physical access monitoring, user\/administrator reports, and reported supply chain events. Effective incident handling capability includes coordination among many organizational entities including, for example, mission\/business owners, information system owners, authorizing officials, human resources offices, physical and personnel security offices, legal departments, operations personnel, procurement offices, and the risk executive (function).","links":[{"href":"#au-6","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#cp-4","rel":"related"},{"href":"#ir-2","rel":"related"},{"href":"#ir-3","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#pe-6","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"ir-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-4.a_obj","name":"objective","props":[{"name":"label","value":"IR-4(a)"}],"prose":"implements an incident handling capability for security incidents that includes:","parts":[{"id":"ir-4.a_obj.1","name":"objective","props":[{"name":"label","value":"IR-4(a)[1]"}],"prose":"preparation;"},{"id":"ir-4.a_obj.2","name":"objective","props":[{"name":"label","value":"IR-4(a)[2]"}],"prose":"detection and analysis;"},{"id":"ir-4.a_obj.3","name":"objective","props":[{"name":"label","value":"IR-4(a)[3]"}],"prose":"containment;"},{"id":"ir-4.a_obj.4","name":"objective","props":[{"name":"label","value":"IR-4(a)[4]"}],"prose":"eradication;"},{"id":"ir-4.a_obj.5","name":"objective","props":[{"name":"label","value":"IR-4(a)[5]"}],"prose":"recovery;"}]},{"id":"ir-4.b_obj","name":"objective","props":[{"name":"label","value":"IR-4(b)"}],"prose":"coordinates incident handling activities with contingency planning activities;"},{"id":"ir-4.c_obj","name":"objective","props":[{"name":"label","value":"IR-4(c)"}],"parts":[{"id":"ir-4.c_obj.1","name":"objective","props":[{"name":"label","value":"IR-4(c)[1]"}],"prose":"incorporates lessons learned from ongoing incident handling activities into:","parts":[{"id":"ir-4.c_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-4(c)[1][a]"}],"prose":"incident response procedures;"},{"id":"ir-4.c_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-4(c)[1][b]"}],"prose":"training;"},{"id":"ir-4.c_obj.1.c","name":"objective","props":[{"name":"label","value":"IR-4(c)[1][c]"}],"prose":"testing\/exercises;"}]},{"id":"ir-4.c_obj.2","name":"objective","props":[{"name":"label","value":"IR-4(c)[2]"}],"prose":"implements the resulting changes accordingly to:","parts":[{"id":"ir-4.c_obj.2.a","name":"objective","props":[{"name":"label","value":"IR-4(c)[2][a]"}],"prose":"incident response procedures;"},{"id":"ir-4.c_obj.2.b","name":"objective","props":[{"name":"label","value":"IR-4(c)[2][b]"}],"prose":"training; and"},{"id":"ir-4.c_obj.2.c","name":"objective","props":[{"name":"label","value":"IR-4(c)[2][c]"}],"prose":"testing\/exercises."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\ncontingency planning policy\n\nprocedures addressing incident handling\n\nincident response plan\n\ncontingency plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident handling responsibilities\n\norganizational personnel with contingency planning responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Incident handling capability for the organization"}]}],"controls":[{"id":"ir-4.1","class":"SP800-53-enhancement","title":"Automated Incident Handling Processes","props":[{"name":"label","value":"IR-4(1)"},{"name":"sort-id","value":"ir-04.01"}],"parts":[{"id":"ir-4.1_smt","name":"statement","prose":"The organization employs automated mechanisms to support the incident handling process."},{"id":"ir-4.1_gdn","name":"guidance","prose":"Automated mechanisms supporting incident handling processes include, for example, online incident management systems."},{"id":"ir-4.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to support the incident handling process."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident handling\n\nautomated mechanisms supporting incident handling\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident handling responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms that support and\/or implement the incident handling process"}]}]},{"id":"ir-4.4","class":"SP800-53-enhancement","title":"Information Correlation","props":[{"name":"label","value":"IR-4(4)"},{"name":"sort-id","value":"ir-04.04"}],"parts":[{"id":"ir-4.4_smt","name":"statement","prose":"The organization correlates incident information and individual incident responses to achieve an organization-wide perspective on incident awareness and response."},{"id":"ir-4.4_gdn","name":"guidance","prose":"Sometimes the nature of a threat event, for example, a hostile cyber attack, is such that it can only be observed by bringing together information from different sources including various reports and reporting procedures established by organizations."},{"id":"ir-4.4_obj","name":"objective","prose":"Determine if the organization correlates incident information and individual incident responses to achieve an organization-wide perspective on incident awareness and response."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident handling\n\nincident response plan\n\nsecurity plan\n\nautomated mechanisms supporting incident and event correlation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nincident management correlation logs\n\nevent management correlation logs\n\nsecurity information and event management logs\n\nincident management correlation reports\n\nevent management correlation reports\n\nsecurity information and event management reports\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident handling responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with whom incident information and individual incident responses are to be correlated"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for correlating incident information and individual incident responses\n\nautomated mechanisms that support and or implement correlation of incident response information with individual incident responses"}]}]}]},{"id":"ir-5","class":"SP800-53","title":"Incident Monitoring","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-5"},{"name":"sort-id","value":"ir-05"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"}],"parts":[{"id":"ir-5_smt","name":"statement","prose":"The organization tracks and documents information system security incidents."},{"id":"ir-5_gdn","name":"guidance","prose":"Documenting information system security incidents includes, for example, maintaining records about each incident, the status of the incident, and other pertinent information necessary for forensics, evaluating incident details, trends, and handling. Incident information can be obtained from a variety of sources including, for example, incident reports, incident response teams, audit monitoring, network monitoring, physical access monitoring, and user\/administrator reports.","links":[{"href":"#au-6","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#pe-6","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"ir-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-5_obj.1","name":"objective","props":[{"name":"label","value":"IR-5[1]"}],"prose":"tracks information system security incidents; and"},{"id":"ir-5_obj.2","name":"objective","props":[{"name":"label","value":"IR-5[2]"}],"prose":"documents information system security incidents."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident monitoring\n\nincident response records and documentation\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident monitoring responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Incident monitoring capability for the organization\n\nautomated mechanisms supporting and\/or implementing tracking and documenting of system security incidents"}]}],"controls":[{"id":"ir-5.1","class":"SP800-53-enhancement","title":"Automated Tracking \/ Data Collection \/ Analysis","props":[{"name":"label","value":"IR-5(1)"},{"name":"sort-id","value":"ir-05.01"}],"parts":[{"id":"ir-5.1_smt","name":"statement","prose":"The organization employs automated mechanisms to assist in the tracking of security incidents and in the collection and analysis of incident information."},{"id":"ir-5.1_gdn","name":"guidance","prose":"Automated mechanisms for tracking security incidents and collecting\/analyzing incident information include, for example, the Einstein network monitoring device and monitoring online Computer Incident Response Centers (CIRCs) or other electronic databases of incidents.","links":[{"href":"#au-7","rel":"related"},{"href":"#ir-4","rel":"related"}]},{"id":"ir-5.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to assist in:","parts":[{"id":"ir-5.1_obj.1","name":"objective","props":[{"name":"label","value":"IR-5(1)[1]"}],"prose":"the tracking of security incidents;"},{"id":"ir-5.1_obj.2","name":"objective","props":[{"name":"label","value":"IR-5(1)[2]"}],"prose":"the collection of incident information; and"},{"id":"ir-5.1_obj.3","name":"objective","props":[{"name":"label","value":"IR-5(1)[3]"}],"prose":"the analysis of incident information."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident monitoring\n\nautomated mechanisms supporting incident monitoring\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nincident response plan\n\nsecurity plan\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident monitoring responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms assisting in tracking of security incidents and in the collection and analysis of incident information"}]}]}]},{"id":"ir-6","class":"SP800-53","title":"Incident Reporting","params":[{"id":"ir-6_prm_1","label":"organization-defined time period"},{"id":"ir-6_prm_2","label":"organization-defined authorities"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-6"},{"name":"sort-id","value":"ir-06"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"},{"href":"#02631467-668b-4233-989b-3dfded2fd184","rel":"reference"}],"parts":[{"id":"ir-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Requires personnel to report suspected security incidents to the organizational incident response capability within {{ insert: param, ir-6_prm_1 }}; and"},{"id":"ir-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reports security incident information to {{ insert: param, ir-6_prm_2 }}."}]},{"id":"ir-6_gdn","name":"guidance","prose":"The intent of this control is to address both specific incident reporting requirements within an organization and the formal incident reporting requirements for federal agencies and their subordinate organizations. Suspected security incidents include, for example, the receipt of suspicious email communications that can potentially contain malicious code. The types of security incidents reported, the content and timeliness of the reports, and the designated reporting authorities reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Current federal policy requires that all federal agencies (unless specifically exempted from such requirements) report security incidents to the United States Computer Emergency Readiness Team (US-CERT) within specified time frames designated in the US-CERT Concept of Operations for Federal Cyber Security Incident Handling.","links":[{"href":"#ir-4","rel":"related"},{"href":"#ir-5","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"ir-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-6.a_obj","name":"objective","props":[{"name":"label","value":"IR-6(a)"}],"parts":[{"id":"ir-6.a_obj.1","name":"objective","props":[{"name":"label","value":"IR-6(a)[1]"}],"prose":"defines the time period within which personnel report suspected security incidents to the organizational incident response capability;"},{"id":"ir-6.a_obj.2","name":"objective","props":[{"name":"label","value":"IR-6(a)[2]"}],"prose":"requires personnel to report suspected security incidents to the organizational incident response capability within the organization-defined time period;"}]},{"id":"ir-6.b_obj","name":"objective","props":[{"name":"label","value":"IR-6(b)"}],"parts":[{"id":"ir-6.b_obj.1","name":"objective","props":[{"name":"label","value":"IR-6(b)[1]"}],"prose":"defines authorities to whom security incident information is to be reported; and"},{"id":"ir-6.b_obj.2","name":"objective","props":[{"name":"label","value":"IR-6(b)[2]"}],"prose":"reports security incident information to organization-defined authorities."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident reporting\n\nincident reporting records and documentation\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident reporting responsibilities\n\norganizational personnel with information security responsibilities\n\npersonnel who have\/should have reported incidents\n\npersonnel (authorities) to whom incident information is to be reported"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incident reporting\n\nautomated mechanisms supporting and\/or implementing incident reporting"}]}],"controls":[{"id":"ir-6.1","class":"SP800-53-enhancement","title":"Automated Reporting","props":[{"name":"label","value":"IR-6(1)"},{"name":"sort-id","value":"ir-06.01"}],"parts":[{"id":"ir-6.1_smt","name":"statement","prose":"The organization employs automated mechanisms to assist in the reporting of security incidents."},{"id":"ir-6.1_gdn","name":"guidance","links":[{"href":"#ir-7","rel":"related"}]},{"id":"ir-6.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to assist in the reporting of security incidents."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident reporting\n\nautomated mechanisms supporting incident reporting\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident reporting responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incident reporting\n\nautomated mechanisms supporting and\/or implementing reporting of security incidents"}]}]}]},{"id":"ir-7","class":"SP800-53","title":"Incident Response Assistance","props":[{"name":"priority","value":"P2"},{"name":"label","value":"IR-7"},{"name":"sort-id","value":"ir-07"}],"parts":[{"id":"ir-7_smt","name":"statement","prose":"The organization provides an incident response support resource, integral to the organizational incident response capability that offers advice and assistance to users of the information system for the handling and reporting of security incidents."},{"id":"ir-7_gdn","name":"guidance","prose":"Incident response support resources provided by organizations include, for example, help desks, assistance groups, and access to forensics services, when required.","links":[{"href":"#at-2","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ir-6","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#sa-9","rel":"related"}]},{"id":"ir-7_obj","name":"objective","prose":"Determine if the organization provides an incident response support resource:","parts":[{"id":"ir-7_obj.1","name":"objective","props":[{"name":"label","value":"IR-7[1]"}],"prose":"that is integral to the organizational incident response capability; and"},{"id":"ir-7_obj.2","name":"objective","props":[{"name":"label","value":"IR-7[2]"}],"prose":"that offers advice and assistance to users of the information system for the handling and reporting of security incidents."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response assistance\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response assistance and support responsibilities\n\norganizational personnel with access to incident response support and assistance capability\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incident response assistance\n\nautomated mechanisms supporting and\/or implementing incident response assistance"}]}],"controls":[{"id":"ir-7.1","class":"SP800-53-enhancement","title":"Automation Support for Availability of Information \/ Support","props":[{"name":"label","value":"IR-7(1)"},{"name":"sort-id","value":"ir-07.01"}],"parts":[{"id":"ir-7.1_smt","name":"statement","prose":"The organization employs automated mechanisms to increase the availability of incident response-related information and support."},{"id":"ir-7.1_gdn","name":"guidance","prose":"Automated mechanisms can provide a push and\/or pull capability for users to obtain incident response assistance. For example, individuals might have access to a website to query the assistance capability, or conversely, the assistance capability may have the ability to proactively send information to users (general distribution or targeted) as part of increasing understanding of current response capabilities and support."},{"id":"ir-7.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to increase the availability of incident response-related information and support."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response assistance\n\nautomated mechanisms supporting incident response support and assistance\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response support and assistance responsibilities\n\norganizational personnel with access to incident response support and assistance capability\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incident response assistance\n\nautomated mechanisms supporting and\/or implementing an increase in the availability of incident response information and support"}]}]}]},{"id":"ir-8","class":"SP800-53","title":"Incident Response Plan","params":[{"id":"ir-8_prm_1","label":"organization-defined personnel or roles"},{"id":"ir-8_prm_2","label":"organization-defined incident response personnel (identified by name and\/or by role) and organizational elements"},{"id":"ir-8_prm_3","label":"organization-defined frequency"},{"id":"ir-8_prm_4","label":"organization-defined incident response personnel (identified by name and\/or by role) and organizational elements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-8"},{"name":"sort-id","value":"ir-08"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"}],"parts":[{"id":"ir-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops an incident response plan that:","parts":[{"id":"ir-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Provides the organization with a roadmap for implementing its incident response capability;"},{"id":"ir-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Describes the structure and organization of the incident response capability;"},{"id":"ir-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Provides a high-level approach for how the incident response capability fits into the overall organization;"},{"id":"ir-8_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Meets the unique requirements of the organization, which relate to mission, size, structure, and functions;"},{"id":"ir-8_smt.a.5","name":"item","props":[{"name":"label","value":"5."}],"prose":"Defines reportable incidents;"},{"id":"ir-8_smt.a.6","name":"item","props":[{"name":"label","value":"6."}],"prose":"Provides metrics for measuring the incident response capability within the organization;"},{"id":"ir-8_smt.a.7","name":"item","props":[{"name":"label","value":"7."}],"prose":"Defines the resources and management support needed to effectively maintain and mature an incident response capability; and"},{"id":"ir-8_smt.a.8","name":"item","props":[{"name":"label","value":"8."}],"prose":"Is reviewed and approved by {{ insert: param, ir-8_prm_1 }};"}]},{"id":"ir-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Distributes copies of the incident response plan to {{ insert: param, ir-8_prm_2 }};"},{"id":"ir-8_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the incident response plan {{ insert: param, ir-8_prm_3 }};"},{"id":"ir-8_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Updates the incident response plan to address system\/organizational changes or problems encountered during plan implementation, execution, or testing;"},{"id":"ir-8_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Communicates incident response plan changes to {{ insert: param, ir-8_prm_4 }}; and"},{"id":"ir-8_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Protects the incident response plan from unauthorized disclosure and modification."}]},{"id":"ir-8_gdn","name":"guidance","prose":"It is important that organizations develop and implement a coordinated approach to incident response. Organizational missions, business functions, strategies, goals, and objectives for incident response help to determine the structure of incident response capabilities. As part of a comprehensive incident response capability, organizations consider the coordination and sharing of information with external organizations, including, for example, external service providers and organizations involved in the supply chain for organizational information systems.","links":[{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"}]},{"id":"ir-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-8.a_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)"}],"prose":"develops an incident response plan that:","parts":[{"id":"ir-8.a.1_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(1)"}],"prose":"provides the organization with a roadmap for implementing its incident response capability;"},{"id":"ir-8.a.2_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(2)"}],"prose":"describes the structure and organization of the incident response capability;"},{"id":"ir-8.a.3_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(3)"}],"prose":"provides a high-level approach for how the incident response capability fits into the overall organization;"},{"id":"ir-8.a.4_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)"}],"prose":"meets the unique requirements of the organization, which relate to:","parts":[{"id":"ir-8.a.4_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[1]"}],"prose":"mission;"},{"id":"ir-8.a.4_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[2]"}],"prose":"size;"},{"id":"ir-8.a.4_obj.3","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[3]"}],"prose":"structure;"},{"id":"ir-8.a.4_obj.4","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[4]"}],"prose":"functions;"}]},{"id":"ir-8.a.5_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(5)"}],"prose":"defines reportable incidents;"},{"id":"ir-8.a.6_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(6)"}],"prose":"provides metrics for measuring the incident response capability within the organization;"},{"id":"ir-8.a.7_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(7)"}],"prose":"defines the resources and management support needed to effectively maintain and mature an incident response capability;"},{"id":"ir-8.a.8_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(8)"}],"parts":[{"id":"ir-8.a.8_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(a)(8)[1]"}],"prose":"defines personnel or roles to review and approve the incident response plan;"},{"id":"ir-8.a.8_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(a)(8)[2]"}],"prose":"is reviewed and approved by organization-defined personnel or roles;"}]}]},{"id":"ir-8.b_obj","name":"objective","props":[{"name":"label","value":"IR-8(b)"}],"parts":[{"id":"ir-8.b_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(b)[1]"}],"parts":[{"id":"ir-8.b_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-8(b)[1][a]"}],"prose":"defines incident response personnel (identified by name and\/or by role) to whom copies of the incident response plan are to be distributed;"},{"id":"ir-8.b_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-8(b)[1][b]"}],"prose":"defines organizational elements to whom copies of the incident response plan are to be distributed;"}]},{"id":"ir-8.b_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(b)[2]"}],"prose":"distributes copies of the incident response plan to organization-defined incident response personnel (identified by name and\/or by role) and organizational elements;"}]},{"id":"ir-8.c_obj","name":"objective","props":[{"name":"label","value":"IR-8(c)"}],"parts":[{"id":"ir-8.c_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(c)[1]"}],"prose":"defines the frequency to review the incident response plan;"},{"id":"ir-8.c_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(c)[2]"}],"prose":"reviews the incident response plan with the organization-defined frequency;"}]},{"id":"ir-8.d_obj","name":"objective","props":[{"name":"label","value":"IR-8(d)"}],"prose":"updates the incident response plan to address system\/organizational changes or problems encountered during plan:","parts":[{"id":"ir-8.d_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(d)[1]"}],"prose":"implementation;"},{"id":"ir-8.d_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(d)[2]"}],"prose":"execution; or"},{"id":"ir-8.d_obj.3","name":"objective","props":[{"name":"label","value":"IR-8(d)[3]"}],"prose":"testing;"}]},{"id":"ir-8.e_obj","name":"objective","props":[{"name":"label","value":"IR-8(e)"}],"parts":[{"id":"ir-8.e_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(e)[1]"}],"parts":[{"id":"ir-8.e_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-8(e)[1][a]"}],"prose":"defines incident response personnel (identified by name and\/or by role) to whom incident response plan changes are to be communicated;"},{"id":"ir-8.e_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-8(e)[1][b]"}],"prose":"defines organizational elements to whom incident response plan changes are to be communicated;"}]},{"id":"ir-8.e_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(e)[2]"}],"prose":"communicates incident response plan changes to organization-defined incident response personnel (identified by name and\/or by role) and organizational elements; and"}]},{"id":"ir-8.f_obj","name":"objective","props":[{"name":"label","value":"IR-8(f)"}],"prose":"protects the incident response plan from unauthorized disclosure and modification."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response planning\n\nincident response plan\n\nrecords of incident response plan reviews and approvals\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response planning responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational incident response plan and related organizational processes"}]}]}]},{"id":"ma","class":"family","title":"Maintenance","controls":[{"id":"ma-1","class":"SP800-53","title":"System Maintenance Policy and Procedures","params":[{"id":"ma-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ma-1_prm_2","label":"organization-defined frequency"},{"id":"ma-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MA-1"},{"name":"sort-id","value":"ma-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ma-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ma-1_prm_1 }}:","parts":[{"id":"ma-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system maintenance policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ma-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system maintenance policy and associated system maintenance controls; and"}]},{"id":"ma-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ma-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System maintenance policy {{ insert: param, ma-1_prm_2 }}; and"},{"id":"ma-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System maintenance procedures {{ insert: param, ma-1_prm_3 }}."}]}]},{"id":"ma-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the MA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ma-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-1.a_obj","name":"objective","props":[{"name":"label","value":"MA-1(a)"}],"parts":[{"id":"ma-1.a.1_obj","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)"}],"parts":[{"id":"ma-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1]"}],"prose":"develops and documents a system maintenance policy that addresses:","parts":[{"id":"ma-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ma-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ma-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ma-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ma-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ma-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ma-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ma-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system maintenance policy is to be disseminated;"},{"id":"ma-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[3]"}],"prose":"disseminates the system maintenance policy to organization-defined personnel or roles;"}]},{"id":"ma-1.a.2_obj","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)"}],"parts":[{"id":"ma-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the maintenance policy and associated system maintenance controls;"},{"id":"ma-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ma-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ma-1.b_obj","name":"objective","props":[{"name":"label","value":"MA-1(b)"}],"parts":[{"id":"ma-1.b.1_obj","name":"objective","props":[{"name":"label","value":"MA-1(b)(1)"}],"parts":[{"id":"ma-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system maintenance policy;"},{"id":"ma-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(b)(1)[2]"}],"prose":"reviews and updates the current system maintenance policy with the organization-defined frequency;"}]},{"id":"ma-1.b.2_obj","name":"objective","props":[{"name":"label","value":"MA-1(b)(2)"}],"parts":[{"id":"ma-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system maintenance procedures; and"},{"id":"ma-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(b)(2)[2]"}],"prose":"reviews and updates the current system maintenance procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Maintenance policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ma-2","class":"SP800-53","title":"Controlled Maintenance","params":[{"id":"ma-2_prm_1","label":"organization-defined personnel or roles"},{"id":"ma-2_prm_2","label":"organization-defined maintenance-related information"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-2"},{"name":"sort-id","value":"ma-02"}],"parts":[{"id":"ma-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Schedules, performs, documents, and reviews records of maintenance and repairs on information system components in accordance with manufacturer or vendor specifications and\/or organizational requirements;"},{"id":"ma-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Approves and monitors all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;"},{"id":"ma-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Requires that {{ insert: param, ma-2_prm_1 }} explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions; and"},{"id":"ma-2_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Includes {{ insert: param, ma-2_prm_2 }} in organizational maintenance records."}]},{"id":"ma-2_gdn","name":"guidance","prose":"This control addresses the information security aspects of the information system maintenance program and applies to all types of maintenance to any system component (including applications) conducted by any local or nonlocal entity (e.g., in-contract, warranty, in-house, software maintenance agreement). System maintenance also includes those components not directly associated with information processing and\/or data\/information retention such as scanners, copiers, and printers. Information necessary for creating effective maintenance records includes, for example: (i) date and time of maintenance; (ii) name of individuals or group performing the maintenance; (iii) name of escort, if necessary; (iv) a description of the maintenance performed; and (v) information system components\/equipment removed or replaced (including identification numbers, if applicable). The level of detail included in maintenance records can be informed by the security categories of organizational information systems. Organizations consider supply chain issues associated with replacement components for information systems.","links":[{"href":"#cm-3","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-6","rel":"related"},{"href":"#pe-16","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"ma-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-2.a_obj","name":"objective","props":[{"name":"label","value":"MA-2(a)"}],"parts":[{"id":"ma-2.a_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(a)[1]"}],"prose":"schedules maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.1.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[1][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.1.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[1][b]"}],"prose":"organizational requirements;"}]},{"id":"ma-2.a_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(a)[2]"}],"prose":"performs maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.2.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[2][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.2.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[2][b]"}],"prose":"organizational requirements;"}]},{"id":"ma-2.a_obj.3","name":"objective","props":[{"name":"label","value":"MA-2(a)[3]"}],"prose":"documents maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.3.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[3][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.3.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[3][b]"}],"prose":"organizational requirements;"}]},{"id":"ma-2.a_obj.4","name":"objective","props":[{"name":"label","value":"MA-2(a)[4]"}],"prose":"reviews records of maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.4.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[4][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.4.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[4][b]"}],"prose":"organizational requirements;"}]}]},{"id":"ma-2.b_obj","name":"objective","props":[{"name":"label","value":"MA-2(b)"}],"parts":[{"id":"ma-2.b_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(b)[1]"}],"prose":"approves all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;"},{"id":"ma-2.b_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(b)[2]"}],"prose":"monitors all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;"}]},{"id":"ma-2.c_obj","name":"objective","props":[{"name":"label","value":"MA-2(c)"}],"parts":[{"id":"ma-2.c_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(c)[1]"}],"prose":"defines personnel or roles required to explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2.c_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(c)[2]"}],"prose":"requires that organization-defined personnel or roles explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;"}]},{"id":"ma-2.d_obj","name":"objective","props":[{"name":"label","value":"MA-2(d)"}],"prose":"sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2.e_obj","name":"objective","props":[{"name":"label","value":"MA-2(e)"}],"prose":"checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions;"},{"id":"ma-2.f_obj","name":"objective","props":[{"name":"label","value":"MA-2(f)"}],"parts":[{"id":"ma-2.f_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(f)[1]"}],"prose":"defines maintenance-related information to be included in organizational maintenance records; and"},{"id":"ma-2.f_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(f)[2]"}],"prose":"includes organization-defined maintenance-related information in organizational maintenance records."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing controlled information system maintenance\n\nmaintenance records\n\nmanufacturer\/vendor maintenance specifications\n\nequipment sanitization records\n\nmedia sanitization records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel responsible for media sanitization\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for scheduling, performing, documenting, reviewing, approving, and monitoring maintenance and repairs for the information system\n\norganizational processes for sanitizing information system components\n\nautomated mechanisms supporting and\/or implementing controlled maintenance\n\nautomated mechanisms implementing sanitization of information system components"}]}],"controls":[{"id":"ma-2.2","class":"SP800-53-enhancement","title":"Automated Maintenance Activities","props":[{"name":"label","value":"MA-2(2)"},{"name":"sort-id","value":"ma-02.02"}],"parts":[{"id":"ma-2.2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-2.2_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Employs automated mechanisms to schedule, conduct, and document maintenance and repairs; and"},{"id":"ma-2.2_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Produces up-to date, accurate, and complete records of all maintenance and repair actions requested, scheduled, in process, and completed."}]},{"id":"ma-2.2_gdn","name":"guidance","links":[{"href":"#ca-7","rel":"related"},{"href":"#ma-3","rel":"related"}]},{"id":"ma-2.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-2.2.a_obj","name":"objective","props":[{"name":"label","value":"MA-2(2)(a)"}],"prose":"employs automated mechanisms to:","parts":[{"id":"ma-2.2.a_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(2)(a)[1]"}],"prose":"schedule maintenance and repairs;"},{"id":"ma-2.2.a_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(2)(a)[2]"}],"prose":"conduct maintenance and repairs;"},{"id":"ma-2.2.a_obj.3","name":"objective","props":[{"name":"label","value":"MA-2(2)(a)[3]"}],"prose":"document maintenance and repairs;"}],"links":[{"href":"#ma-2.2_smt.a","rel":"corresp"}]},{"id":"ma-2.2.b_obj","name":"objective","props":[{"name":"label","value":"MA-2(2)(b)"}],"prose":"produces up-to-date, accurate, and complete records of all maintenance and repair actions:","parts":[{"id":"ma-2.2.b_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(2)(b)[1]"}],"prose":"requested;"},{"id":"ma-2.2.b_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(2)(b)[2]"}],"prose":"scheduled;"},{"id":"ma-2.2.b_obj.3","name":"objective","props":[{"name":"label","value":"MA-2(2)(b)[3]"}],"prose":"in process; and"},{"id":"ma-2.2.b_obj.4","name":"objective","props":[{"name":"label","value":"MA-2(2)(b)[4]"}],"prose":"completed."}],"links":[{"href":"#ma-2.2_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing controlled information system maintenance\n\nautomated mechanisms supporting information system maintenance activities\n\ninformation system configuration settings and associated documentation\n\nmaintenance records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing controlled maintenance\n\nautomated mechanisms supporting and\/or implementing production of records of maintenance and repair actions"}]}]}]},{"id":"ma-3","class":"SP800-53","title":"Maintenance Tools","props":[{"name":"priority","value":"P3"},{"name":"label","value":"MA-3"},{"name":"sort-id","value":"ma-03"}],"links":[{"href":"#263823e0-a971-4b00-959d-315b26278b22","rel":"reference"}],"parts":[{"id":"ma-3_smt","name":"statement","prose":"The organization approves, controls, and monitors information system maintenance tools."},{"id":"ma-3_gdn","name":"guidance","prose":"This control addresses security-related issues associated with maintenance tools used specifically for diagnostic and repair actions on organizational information systems. Maintenance tools can include hardware, software, and firmware items. Maintenance tools are potential vehicles for transporting malicious code, either intentionally or unintentionally, into a facility and subsequently into organizational information systems. Maintenance tools can include, for example, hardware\/software diagnostic test equipment and hardware\/software packet sniffers. This control does not cover hardware\/software components that may support information system maintenance, yet are a part of the system, for example, the software implementing “ping,” “ls,” “ipconfig, or the hardware and software implementing the monitoring port of an Ethernet switch.","links":[{"href":"#ma-2","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#mp-6","rel":"related"}]},{"id":"ma-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-3_obj.1","name":"objective","props":[{"name":"label","value":"MA-3[1]"}],"prose":"approves information system maintenance tools;"},{"id":"ma-3_obj.2","name":"objective","props":[{"name":"label","value":"MA-3[2]"}],"prose":"controls information system maintenance tools; and"},{"id":"ma-3_obj.3","name":"objective","props":[{"name":"label","value":"MA-3[3]"}],"prose":"monitors information system maintenance tools."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing information system maintenance tools\n\ninformation system maintenance tools and associated documentation\n\nmaintenance records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for approving, controlling, and monitoring maintenance tools\n\nautomated mechanisms supporting and\/or implementing approval, control, and\/or monitoring of maintenance tools"}]}],"controls":[{"id":"ma-3.1","class":"SP800-53-enhancement","title":"Inspect Tools","props":[{"name":"label","value":"MA-3(1)"},{"name":"sort-id","value":"ma-03.01"}],"parts":[{"id":"ma-3.1_smt","name":"statement","prose":"The organization inspects the maintenance tools carried into a facility by maintenance personnel for improper or unauthorized modifications."},{"id":"ma-3.1_gdn","name":"guidance","prose":"If, upon inspection of maintenance tools, organizations determine that the tools have been modified in an improper\/unauthorized manner or contain malicious code, the incident is handled consistent with organizational policies and procedures for incident handling.","links":[{"href":"#si-7","rel":"related"}]},{"id":"ma-3.1_obj","name":"objective","prose":"Determine if the organization inspects the maintenance tools carried into a facility by maintenance personnel for improper or unauthorized modifications."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing information system maintenance tools\n\ninformation system maintenance tools and associated documentation\n\nmaintenance tool inspection records\n\nmaintenance records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for inspecting maintenance tools\n\nautomated mechanisms supporting and\/or implementing inspection of maintenance tools"}]}]},{"id":"ma-3.2","class":"SP800-53-enhancement","title":"Inspect Media","props":[{"name":"label","value":"MA-3(2)"},{"name":"sort-id","value":"ma-03.02"}],"parts":[{"id":"ma-3.2_smt","name":"statement","prose":"The organization checks media containing diagnostic and test programs for malicious code before the media are used in the information system."},{"id":"ma-3.2_gdn","name":"guidance","prose":"If, upon inspection of media containing maintenance diagnostic and test programs, organizations determine that the media contain malicious code, the incident is handled consistent with organizational incident handling policies and procedures.","links":[{"href":"#si-3","rel":"related"}]},{"id":"ma-3.2_obj","name":"objective","prose":"Determine if the organization checks media containing diagnostic and test programs for malicious code before the media are used in the information system."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing information system maintenance tools\n\ninformation system maintenance tools and associated documentation\n\nmaintenance records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for inspecting media for malicious code\n\nautomated mechanisms supporting and\/or implementing inspection of media used for maintenance"}]}]},{"id":"ma-3.3","class":"SP800-53-enhancement","title":"Prevent Unauthorized Removal","params":[{"id":"ma-3.3_prm_1","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"MA-3(3)"},{"name":"sort-id","value":"ma-03.03"}],"parts":[{"id":"ma-3.3_smt","name":"statement","prose":"The organization prevents the unauthorized removal of maintenance equipment containing organizational information by:","parts":[{"id":"ma-3.3_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Verifying that there is no organizational information contained on the equipment;"},{"id":"ma-3.3_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Sanitizing or destroying the equipment;"},{"id":"ma-3.3_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Retaining the equipment within the facility; or"},{"id":"ma-3.3_smt.d","name":"item","props":[{"name":"label","value":"(d)"}],"prose":"Obtaining an exemption from {{ insert: param, ma-3.3_prm_1 }} explicitly authorizing removal of the equipment from the facility."}]},{"id":"ma-3.3_gdn","name":"guidance","prose":"Organizational information includes all information specifically owned by organizations and information provided to organizations in which organizations serve as information stewards."},{"id":"ma-3.3_obj","name":"objective","prose":"Determine if the organization prevents the unauthorized removal of maintenance equipment containing organizational information by:","parts":[{"id":"ma-3.3.a_obj","name":"objective","props":[{"name":"label","value":"MA-3(3)(a)"}],"prose":"verifying that there is no organizational information contained on the equipment;","links":[{"href":"#ma-3.3_smt.a","rel":"corresp"}]},{"id":"ma-3.3.b_obj","name":"objective","props":[{"name":"label","value":"MA-3(3)(b)"}],"prose":"sanitizing or destroying the equipment;","links":[{"href":"#ma-3.3_smt.b","rel":"corresp"}]},{"id":"ma-3.3.c_obj","name":"objective","props":[{"name":"label","value":"MA-3(3)(c)"}],"prose":"retaining the equipment within the facility; or","links":[{"href":"#ma-3.3_smt.c","rel":"corresp"}]},{"id":"ma-3.3.d_obj","name":"objective","props":[{"name":"label","value":"MA-3(3)(d)"}],"parts":[{"id":"ma-3.3.d_obj.1","name":"objective","props":[{"name":"label","value":"MA-3(3)(d)[1]"}],"prose":"defining personnel or roles that can grant an exemption from explicitly authorizing removal of the equipment from the facility; and"},{"id":"ma-3.3.d_obj.2","name":"objective","props":[{"name":"label","value":"MA-3(3)(d)[2]"}],"prose":"obtaining an exemption from organization-defined personnel or roles explicitly authorizing removal of the equipment from the facility."}],"links":[{"href":"#ma-3.3_smt.d","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing information system maintenance tools\n\ninformation system maintenance tools and associated documentation\n\nmaintenance records\n\nequipment sanitization records\n\nmedia sanitization records\n\nexemptions for equipment removal\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel responsible for media sanitization"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for preventing unauthorized removal of information\n\nautomated mechanisms supporting media sanitization or destruction of equipment\n\nautomated mechanisms supporting verification of media sanitization"}]}]}]},{"id":"ma-4","class":"SP800-53","title":"Nonlocal Maintenance","props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-4"},{"name":"sort-id","value":"ma-04"}],"links":[{"href":"#d715b234-9b5b-4e07-b1ed-99836727664d","rel":"reference"},{"href":"#f2dbd4ec-c413-4714-b85b-6b7184d1c195","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#263823e0-a971-4b00-959d-315b26278b22","rel":"reference"},{"href":"#a4aa9645-9a8a-4b51-90a9-e223250f9a75","rel":"reference"}],"parts":[{"id":"ma-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Approves and monitors nonlocal maintenance and diagnostic activities;"},{"id":"ma-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Allows the use of nonlocal maintenance and diagnostic tools only as consistent with organizational policy and documented in the security plan for the information system;"},{"id":"ma-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions;"},{"id":"ma-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Maintains records for nonlocal maintenance and diagnostic activities; and"},{"id":"ma-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Terminates session and network connections when nonlocal maintenance is completed."}]},{"id":"ma-4_gdn","name":"guidance","prose":"Nonlocal maintenance and diagnostic activities are those activities conducted by individuals communicating through a network, either an external network (e.g., the Internet) or an internal network. Local maintenance and diagnostic activities are those activities carried out by individuals physically present at the information system or information system component and not communicating across a network connection. Authentication techniques used in the establishment of nonlocal maintenance and diagnostic sessions reflect the network access requirements in IA-2. Typically, strong authentication requires authenticators that are resistant to replay attacks and employ multifactor authentication. Strong authenticators include, for example, PKI where certificates are stored on a token protected by a password, passphrase, or biometric. Enforcing requirements in MA-4 is accomplished in part by other controls.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#ma-2","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#mp-6","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-10","rel":"related"},{"href":"#sc-17","rel":"related"}]},{"id":"ma-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-4.a_obj","name":"objective","props":[{"name":"label","value":"MA-4(a)"}],"parts":[{"id":"ma-4.a_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(a)[1]"}],"prose":"approves nonlocal maintenance and diagnostic activities;"},{"id":"ma-4.a_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(a)[2]"}],"prose":"monitors nonlocal maintenance and diagnostic activities;"}]},{"id":"ma-4.b_obj","name":"objective","props":[{"name":"label","value":"MA-4(b)"}],"prose":"allows the use of nonlocal maintenance and diagnostic tools only:","parts":[{"id":"ma-4.b_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(b)[1]"}],"prose":"as consistent with organizational policy;"},{"id":"ma-4.b_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(b)[2]"}],"prose":"as documented in the security plan for the information system;"}]},{"id":"ma-4.c_obj","name":"objective","props":[{"name":"label","value":"MA-4(c)"}],"prose":"employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions;"},{"id":"ma-4.d_obj","name":"objective","props":[{"name":"label","value":"MA-4(d)"}],"prose":"maintains records for nonlocal maintenance and diagnostic activities;"},{"id":"ma-4.e_obj","name":"objective","props":[{"name":"label","value":"MA-4(e)"}],"parts":[{"id":"ma-4.e_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(e)[1]"}],"prose":"terminates sessions when nonlocal maintenance or diagnostics is completed; and"},{"id":"ma-4.e_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(e)[2]"}],"prose":"terminates network connections when nonlocal maintenance or diagnostics is completed."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing nonlocal information system maintenance\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nmaintenance records\n\ndiagnostic records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing nonlocal maintenance\n\nautomated mechanisms implementing, supporting, and\/or managing nonlocal maintenance\n\nautomated mechanisms for strong authentication of nonlocal maintenance diagnostic sessions\n\nautomated mechanisms for terminating nonlocal maintenance sessions and network connections"}]}],"controls":[{"id":"ma-4.2","class":"SP800-53-enhancement","title":"Document Nonlocal Maintenance","props":[{"name":"label","value":"MA-4(2)"},{"name":"sort-id","value":"ma-04.02"}],"parts":[{"id":"ma-4.2_smt","name":"statement","prose":"The organization documents in the security plan for the information system, the policies and procedures for the establishment and use of nonlocal maintenance and diagnostic connections."},{"id":"ma-4.2_obj","name":"objective","prose":"Determine if the organization documents in the security plan for the information system:","parts":[{"id":"ma-4.2_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(2)[1]"}],"prose":"the policies for the establishment and use of nonlocal maintenance and diagnostic connections; and"},{"id":"ma-4.2_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(2)[2]"}],"prose":"the procedures for the establishment and use of nonlocal maintenance and diagnostic connections."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing non-local information system maintenance\n\nsecurity plan\n\nmaintenance records\n\ndiagnostic records\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ma-4.3","class":"SP800-53-enhancement","title":"Comparable Security \/ Sanitization","props":[{"name":"label","value":"MA-4(3)"},{"name":"sort-id","value":"ma-04.03"}],"parts":[{"id":"ma-4.3_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-4.3_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Requires that nonlocal maintenance and diagnostic services be performed from an information system that implements a security capability comparable to the capability implemented on the system being serviced; or"},{"id":"ma-4.3_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Removes the component to be serviced from the information system prior to nonlocal maintenance or diagnostic services, sanitizes the component (with regard to organizational information) before removal from organizational facilities, and after the service is performed, inspects and sanitizes the component (with regard to potentially malicious software) before reconnecting the component to the information system."}]},{"id":"ma-4.3_gdn","name":"guidance","prose":"Comparable security capability on information systems, diagnostic tools, and equipment providing maintenance services implies that the implemented security controls on those systems, tools, and equipment are at least as comprehensive as the controls on the information system being serviced.","links":[{"href":"#ma-3","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"ma-4.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-4.3.a_obj","name":"objective","props":[{"name":"label","value":"MA-4(3)(a)"}],"prose":"requires that nonlocal maintenance and diagnostic services be performed from an information system that implements a security capability comparable to the capability implemented on the system being serviced; or","links":[{"href":"#ma-4.3_smt.a","rel":"corresp"}]},{"id":"ma-4.3.b_obj","name":"objective","props":[{"name":"label","value":"MA-4(3)(b)"}],"parts":[{"id":"ma-4.3.b_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(3)(b)[1]"}],"prose":"removes the component to be serviced from the information system;"},{"id":"ma-4.3.b_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(3)(b)[2]"}],"prose":"sanitizes the component (with regard to organizational information) prior to nonlocal maintenance or diagnostic services and\/or before removal from organizational facilities; and"},{"id":"ma-4.3.b_obj.3","name":"objective","props":[{"name":"label","value":"MA-4(3)(b)[3]"}],"prose":"inspects and sanitizes the component (with regard to potentially malicious software) after service is performed on the component and before reconnecting the component to the information system."}],"links":[{"href":"#ma-4.3_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing nonlocal information system maintenance\n\nservice provider contracts and\/or service-level agreements\n\nmaintenance records\n\ninspection records\n\naudit records\n\nequipment sanitization records\n\nmedia sanitization records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\ninformation system maintenance provider\n\norganizational personnel with information security responsibilities\n\norganizational personnel responsible for media sanitization\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for comparable security and sanitization for nonlocal maintenance\n\norganizational processes for removal, sanitization, and inspection of components serviced via nonlocal maintenance\n\nautomated mechanisms supporting and\/or implementing component sanitization and inspection"}]}]}]},{"id":"ma-5","class":"SP800-53","title":"Maintenance Personnel","props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-5"},{"name":"sort-id","value":"ma-05"}],"parts":[{"id":"ma-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes a process for maintenance personnel authorization and maintains a list of authorized maintenance organizations or personnel;"},{"id":"ma-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and"},{"id":"ma-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations."}]},{"id":"ma-5_gdn","name":"guidance","prose":"This control applies to individuals performing hardware or software maintenance on organizational information systems, while PE-2 addresses physical access for individuals whose maintenance duties place them within the physical protection perimeter of the systems (e.g., custodial staff, physical plant maintenance personnel). Technical competence of supervising individuals relates to the maintenance performed on the information systems while having required access authorizations refers to maintenance on and near the systems. Individuals not previously identified as authorized maintenance personnel, such as information technology manufacturers, vendors, systems integrators, and consultants, may require privileged access to organizational information systems, for example, when required to conduct maintenance activities with little or no notice. Based on organizational assessments of risk, organizations may issue temporary credentials to these individuals. Temporary credentials may be for one-time use or for very limited time periods.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#ra-3","rel":"related"}]},{"id":"ma-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-5.a_obj","name":"objective","props":[{"name":"label","value":"MA-5(a)"}],"parts":[{"id":"ma-5.a_obj.1","name":"objective","props":[{"name":"label","value":"MA-5(a)[1]"}],"prose":"establishes a process for maintenance personnel authorization;"},{"id":"ma-5.a_obj.2","name":"objective","props":[{"name":"label","value":"MA-5(a)[2]"}],"prose":"maintains a list of authorized maintenance organizations or personnel;"}]},{"id":"ma-5.b_obj","name":"objective","props":[{"name":"label","value":"MA-5(b)"}],"prose":"ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and"},{"id":"ma-5.c_obj","name":"objective","props":[{"name":"label","value":"MA-5(c)"}],"prose":"designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing maintenance personnel\n\nservice provider contracts\n\nservice-level agreements\n\nlist of authorized personnel\n\nmaintenance records\n\naccess control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for authorizing and managing maintenance personnel\n\nautomated mechanisms supporting and\/or implementing authorization of maintenance personnel"}]}],"controls":[{"id":"ma-5.1","class":"SP800-53-enhancement","title":"Individuals Without Appropriate Access","props":[{"name":"label","value":"MA-5(1)"},{"name":"sort-id","value":"ma-05.01"}],"parts":[{"id":"ma-5.1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-5.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Implements procedures for the use of maintenance personnel that lack appropriate security clearances or are not U.S. citizens, that include the following requirements:","parts":[{"id":"ma-5.1_smt.a.1","name":"item","props":[{"name":"label","value":"(1)"}],"prose":"Maintenance personnel who do not have needed access authorizations, clearances, or formal access approvals are escorted and supervised during the performance of maintenance and diagnostic activities on the information system by approved organizational personnel who are fully cleared, have appropriate access authorizations, and are technically qualified;"},{"id":"ma-5.1_smt.a.2","name":"item","props":[{"name":"label","value":"(2)"}],"prose":"Prior to initiating maintenance or diagnostic activities by personnel who do not have needed access authorizations, clearances or formal access approvals, all volatile information storage components within the information system are sanitized and all nonvolatile storage media are removed or physically disconnected from the system and secured; and"}]},{"id":"ma-5.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Develops and implements alternate security safeguards in the event an information system component cannot be sanitized, removed, or disconnected from the system."}]},{"id":"ma-5.1_gdn","name":"guidance","prose":"This control enhancement denies individuals who lack appropriate security clearances (i.e., individuals who do not possess security clearances or possess security clearances at a lower level than required) or who are not U.S. citizens, visual and electronic access to any classified information, Controlled Unclassified Information (CUI), or any other sensitive information contained on organizational information systems. Procedures for the use of maintenance personnel can be documented in security plans for the information systems.","links":[{"href":"#mp-6","rel":"related"},{"href":"#pl-2","rel":"related"}]},{"id":"ma-5.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-5.1.a_obj","name":"objective","props":[{"name":"label","value":"MA-5(1)(a)"}],"prose":"implements procedures for the use of maintenance personnel that lack appropriate security clearances or are not U.S. citizens, that include the following requirements:","parts":[{"id":"ma-5.1.a.1_obj","name":"objective","props":[{"name":"label","value":"MA-5(1)(a)(1)"}],"prose":"maintenance personnel who do not have needed access authorizations, clearances, or formal access approvals are escorted and supervised during the performance of maintenance and diagnostic activities on the information system by approved organizational personnel who:","parts":[{"id":"ma-5.1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"MA-5(1)(a)(1)[1]"}],"prose":"are fully cleared;"},{"id":"ma-5.1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"MA-5(1)(a)(1)[2]"}],"prose":"have appropriate access authorizations;"},{"id":"ma-5.1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"MA-5(1)(a)(1)[3]"}],"prose":"are technically qualified;"}],"links":[{"href":"#ma-5.1_smt.a.1","rel":"corresp"}]},{"id":"ma-5.1.a.2_obj","name":"objective","props":[{"name":"label","value":"MA-5(1)(a)(2)"}],"prose":"prior to initiating maintenance or diagnostic activities by personnel who do not have needed access authorizations, clearances, or formal access approvals:","parts":[{"id":"ma-5.1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"MA-5(1)(a)(2)[1]"}],"prose":"all volatile information storage components within the information system are sanitized; and"},{"id":"ma-5.1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"MA-5(1)(a)(2)[2]"}],"prose":"all nonvolatile storage media are removed; or"},{"id":"ma-5.1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"MA-5(1)(a)(2)[3]"}],"prose":"all nonvolatile storage media are physically disconnected from the system and secured; and"}],"links":[{"href":"#ma-5.1_smt.a.2","rel":"corresp"}]}],"links":[{"href":"#ma-5.1_smt.a","rel":"corresp"}]},{"id":"ma-5.1.b_obj","name":"objective","props":[{"name":"label","value":"MA-5(1)(b)"}],"prose":"develops and implements alternative security safeguards in the event an information system component cannot be sanitized, removed, or disconnected from the system.","links":[{"href":"#ma-5.1_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing maintenance personnel\n\ninformation system media protection policy\n\nphysical and environmental protection policy\n\nsecurity plan\n\nlist of maintenance personnel requiring escort\/supervision\n\nmaintenance records\n\naccess control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with personnel security responsibilities\n\norganizational personnel with physical access control responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel responsible for media sanitization\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing maintenance personnel without appropriate access\n\nautomated mechanisms supporting and\/or implementing alternative security safeguards\n\nautomated mechanisms supporting and\/or implementing information storage component sanitization"}]}]}]},{"id":"ma-6","class":"SP800-53","title":"Timely Maintenance","params":[{"id":"ma-6_prm_1","label":"organization-defined information system components"},{"id":"ma-6_prm_2","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-6"},{"name":"sort-id","value":"ma-06"}],"parts":[{"id":"ma-6_smt","name":"statement","prose":"The organization obtains maintenance support and\/or spare parts for {{ insert: param, ma-6_prm_1 }} within {{ insert: param, ma-6_prm_2 }} of failure."},{"id":"ma-6_gdn","name":"guidance","prose":"Organizations specify the information system components that result in increased risk to organizational operations and assets, individuals, other organizations, or the Nation when the functionality provided by those components is not operational. Organizational actions to obtain maintenance support typically include having appropriate contracts in place.","links":[{"href":"#cm-8","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#cp-7","rel":"related"},{"href":"#sa-14","rel":"related"},{"href":"#sa-15","rel":"related"}]},{"id":"ma-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-6_obj.1","name":"objective","props":[{"name":"label","value":"MA-6[1]"}],"prose":"defines information system components for which maintenance support and\/or spare parts are to be obtained;"},{"id":"ma-6_obj.2","name":"objective","props":[{"name":"label","value":"MA-6[2]"}],"prose":"defines the time period within which maintenance support and\/or spare parts are to be obtained after a failure;"},{"id":"ma-6_obj.3","name":"objective","props":[{"name":"label","value":"MA-6[3]"}],"parts":[{"id":"ma-6_obj.3.a","name":"objective","props":[{"name":"label","value":"MA-6[3][a]"}],"prose":"obtains maintenance support for organization-defined information system components within the organization-defined time period of failure; and\/or"},{"id":"ma-6_obj.3.b","name":"objective","props":[{"name":"label","value":"MA-6[3][b]"}],"prose":"obtains spare parts for organization-defined information system components within the organization-defined time period of failure."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing information system maintenance\n\nservice provider contracts\n\nservice-level agreements\n\ninventory and availability of spare parts\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for ensuring timely maintenance"}]}]}]},{"id":"mp","class":"family","title":"Media Protection","controls":[{"id":"mp-1","class":"SP800-53","title":"Media Protection Policy and Procedures","params":[{"id":"mp-1_prm_1","label":"organization-defined personnel or roles"},{"id":"mp-1_prm_2","label":"organization-defined frequency"},{"id":"mp-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-1"},{"name":"sort-id","value":"mp-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"mp-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, mp-1_prm_1 }}:","parts":[{"id":"mp-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A media protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"mp-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the media protection policy and associated media protection controls; and"}]},{"id":"mp-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"mp-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Media protection policy {{ insert: param, mp-1_prm_2 }}; and"},{"id":"mp-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Media protection procedures {{ insert: param, mp-1_prm_3 }}."}]}]},{"id":"mp-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the MP family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"mp-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-1.a_obj","name":"objective","props":[{"name":"label","value":"MP-1(a)"}],"parts":[{"id":"mp-1.a.1_obj","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)"}],"parts":[{"id":"mp-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1]"}],"prose":"develops and documents a media protection policy that addresses:","parts":[{"id":"mp-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"mp-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"mp-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"mp-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"mp-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"mp-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"mp-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"mp-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the media protection policy is to be disseminated;"},{"id":"mp-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[3]"}],"prose":"disseminates the media protection policy to organization-defined personnel or roles;"}]},{"id":"mp-1.a.2_obj","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)"}],"parts":[{"id":"mp-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the media protection policy and associated media protection controls;"},{"id":"mp-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"mp-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"mp-1.b_obj","name":"objective","props":[{"name":"label","value":"MP-1(b)"}],"parts":[{"id":"mp-1.b.1_obj","name":"objective","props":[{"name":"label","value":"MP-1(b)(1)"}],"parts":[{"id":"mp-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current media protection policy;"},{"id":"mp-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(b)(1)[2]"}],"prose":"reviews and updates the current media protection policy with the organization-defined frequency;"}]},{"id":"mp-1.b.2_obj","name":"objective","props":[{"name":"label","value":"MP-1(b)(2)"}],"parts":[{"id":"mp-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current media protection procedures; and"},{"id":"mp-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(b)(2)[2]"}],"prose":"reviews and updates the current media protection procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Media protection policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with media protection responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"mp-2","class":"SP800-53","title":"Media Access","params":[{"id":"mp-2_prm_1","label":"organization-defined types of digital and\/or non-digital media"},{"id":"mp-2_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-2"},{"name":"sort-id","value":"mp-02"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","rel":"reference"}],"parts":[{"id":"mp-2_smt","name":"statement","prose":"The organization restricts access to {{ insert: param, mp-2_prm_1 }} to {{ insert: param, mp-2_prm_2 }}."},{"id":"mp-2_gdn","name":"guidance","prose":"Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. Restricting non-digital media access includes, for example, denying access to patient medical records in a community hospital unless the individuals seeking access to such records are authorized healthcare providers. Restricting access to digital media includes, for example, limiting access to design specifications stored on compact disks in the media library to the project leader and the individuals on the development team.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pl-2","rel":"related"}]},{"id":"mp-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-2_obj.1","name":"objective","props":[{"name":"label","value":"MP-2[1]"}],"prose":"defines types of digital and\/or non-digital media requiring restricted access;"},{"id":"mp-2_obj.2","name":"objective","props":[{"name":"label","value":"MP-2[2]"}],"prose":"defines personnel or roles authorized to access organization-defined types of digital and\/or non-digital media; and"},{"id":"mp-2_obj.3","name":"objective","props":[{"name":"label","value":"MP-2[3]"}],"prose":"restricts access to organization-defined types of digital and\/or non-digital media to organization-defined personnel or roles."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media access restrictions\n\naccess control policy and procedures\n\nphysical and environmental protection policy and procedures\n\nmedia storage facilities\n\naccess control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media protection responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for restricting information media\n\nautomated mechanisms supporting and\/or implementing media access restrictions"}]}]},{"id":"mp-3","class":"SP800-53","title":"Media Marking","params":[{"id":"mp-3_prm_1","label":"organization-defined types of information system media"},{"id":"mp-3_prm_2","label":"organization-defined controlled areas"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"MP-3"},{"name":"sort-id","value":"mp-03"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"}],"parts":[{"id":"mp-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Marks information system media indicating the distribution limitations, handling caveats, and applicable security markings (if any) of the information; and"},{"id":"mp-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Exempts {{ insert: param, mp-3_prm_1 }} from marking as long as the media remain within {{ insert: param, mp-3_prm_2 }}."}]},{"id":"mp-3_gdn","name":"guidance","prose":"The term security marking refers to the application\/use of human-readable security attributes. The term security labeling refers to the application\/use of security attributes with regard to internal data structures within information systems (see AC-16). Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. Security marking is generally not required for media containing information determined by organizations to be in the public domain or to be publicly releasable. However, some organizations may require markings for public information indicating that the information is publicly releasable. Marking of information system media reflects applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.","links":[{"href":"#ac-16","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#ra-3","rel":"related"}]},{"id":"mp-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-3.a_obj","name":"objective","props":[{"name":"label","value":"MP-3(a)"}],"prose":"marks information system media indicating the:","parts":[{"id":"mp-3.a_obj.1","name":"objective","props":[{"name":"label","value":"MP-3(a)[1]"}],"prose":"distribution limitations of the information;"},{"id":"mp-3.a_obj.2","name":"objective","props":[{"name":"label","value":"MP-3(a)[2]"}],"prose":"handling caveats of the information;"},{"id":"mp-3.a_obj.3","name":"objective","props":[{"name":"label","value":"MP-3(a)[3]"}],"prose":"applicable security markings (if any) of the information;"}]},{"id":"mp-3.b_obj","name":"objective","props":[{"name":"label","value":"MP-3(b)"}],"parts":[{"id":"mp-3.b_obj.1","name":"objective","props":[{"name":"label","value":"MP-3(b)[1]"}],"prose":"defines types of information system media to be exempted from marking as long as the media remain in designated controlled areas;"},{"id":"mp-3.b_obj.2","name":"objective","props":[{"name":"label","value":"MP-3(b)[2]"}],"prose":"defines controlled areas where organization-defined types of information system media exempt from marking are to be retained; and"},{"id":"mp-3.b_obj.3","name":"objective","props":[{"name":"label","value":"MP-3(b)[3]"}],"prose":"exempts organization-defined types of information system media from marking as long as the media remain within organization-defined controlled areas."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media marking\n\nphysical and environmental protection policy and procedures\n\nsecurity plan\n\nlist of information system media marking security attributes\n\ndesignated controlled areas\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media protection and marking responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for marking information media\n\nautomated mechanisms supporting and\/or implementing media marking"}]}]},{"id":"mp-4","class":"SP800-53","title":"Media Storage","params":[{"id":"mp-4_prm_1","label":"organization-defined types of digital and\/or non-digital media"},{"id":"mp-4_prm_2","label":"organization-defined controlled areas"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-4"},{"name":"sort-id","value":"mp-04"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#81f09e01-d0b0-4ae2-aa6a-064ed9950070","rel":"reference"},{"href":"#a6c774c0-bf50-4590-9841-2a5c1c91ac6f","rel":"reference"},{"href":"#3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","rel":"reference"}],"parts":[{"id":"mp-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Physically controls and securely stores {{ insert: param, mp-4_prm_1 }} within {{ insert: param, mp-4_prm_2 }}; and"},{"id":"mp-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Protects information system media until the media are destroyed or sanitized using approved equipment, techniques, and procedures."}]},{"id":"mp-4_gdn","name":"guidance","prose":"Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. Physically controlling information system media includes, for example, conducting inventories, ensuring procedures are in place to allow individuals to check out and return media to the media library, and maintaining accountability for all stored media. Secure storage includes, for example, a locked drawer, desk, or cabinet, or a controlled media library. The type of media storage is commensurate with the security category and\/or classification of the information residing on the media. Controlled areas are areas for which organizations provide sufficient physical and procedural safeguards to meet the requirements established for protecting information and\/or information systems. For media containing information determined by organizations to be in the public domain, to be publicly releasable, or to have limited or no adverse impact on organizations or individuals if accessed by other than authorized personnel, fewer safeguards may be needed. In these situations, physical access controls provide adequate protection.","links":[{"href":"#cp-6","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-7","rel":"related"},{"href":"#pe-3","rel":"related"}]},{"id":"mp-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-4.a_obj","name":"objective","props":[{"name":"label","value":"MP-4(a)"}],"parts":[{"id":"mp-4.a_obj.1","name":"objective","props":[{"name":"label","value":"MP-4(a)[1]"}],"prose":"defines types of digital and\/or non-digital media to be physically controlled and securely stored within designated controlled areas;"},{"id":"mp-4.a_obj.2","name":"objective","props":[{"name":"label","value":"MP-4(a)[2]"}],"prose":"defines controlled areas designated to physically control and securely store organization-defined types of digital and\/or non-digital media;"},{"id":"mp-4.a_obj.3","name":"objective","props":[{"name":"label","value":"MP-4(a)[3]"}],"prose":"physically controls organization-defined types of digital and\/or non-digital media within organization-defined controlled areas;"},{"id":"mp-4.a_obj.4","name":"objective","props":[{"name":"label","value":"MP-4(a)[4]"}],"prose":"securely stores organization-defined types of digital and\/or non-digital media within organization-defined controlled areas; and"}]},{"id":"mp-4.b_obj","name":"objective","props":[{"name":"label","value":"MP-4(b)"}],"prose":"protects information system media until the media are destroyed or sanitized using approved equipment, techniques, and procedures."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media storage\n\nphysical and environmental protection policy and procedures\n\naccess control policy and procedures\n\nsecurity plan\n\ninformation system media\n\ndesignated controlled areas\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media protection and storage responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for storing information media\n\nautomated mechanisms supporting and\/or implementing secure media storage\/media protection"}]}]},{"id":"mp-5","class":"SP800-53","title":"Media Transport","params":[{"id":"mp-5_prm_1","label":"organization-defined types of information system media"},{"id":"mp-5_prm_2","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-5"},{"name":"sort-id","value":"mp-05"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"}],"parts":[{"id":"mp-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Protects and controls {{ insert: param, mp-5_prm_1 }} during transport outside of controlled areas using {{ insert: param, mp-5_prm_2 }};"},{"id":"mp-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Maintains accountability for information system media during transport outside of controlled areas;"},{"id":"mp-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Documents activities associated with the transport of information system media; and"},{"id":"mp-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Restricts the activities associated with the transport of information system media to authorized personnel."}]},{"id":"mp-5_gdn","name":"guidance","prose":"Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. This control also applies to mobile devices with information storage capability (e.g., smart phones, tablets, E-readers), that are transported outside of controlled areas. Controlled areas are areas or spaces for which organizations provide sufficient physical and\/or procedural safeguards to meet the requirements established for protecting information and\/or information systems. Physical and technical safeguards for media are commensurate with the security category or classification of the information residing on the media. Safeguards to protect media during transport include, for example, locked containers and cryptography. Cryptographic mechanisms can provide confidentiality and integrity protections depending upon the mechanisms used. Activities associated with transport include the actual transport as well as those activities such as releasing media for transport and ensuring that media enters the appropriate transport processes. For the actual transport, authorized transport and courier personnel may include individuals from outside the organization (e.g., U.S. Postal Service or a commercial transport or delivery service). Maintaining accountability of media during transport includes, for example, restricting transport activities to authorized personnel, and tracking and\/or obtaining explicit records of transport activities as the media moves through the transportation system to prevent and detect loss, destruction, or tampering. Organizations establish documentation requirements for activities associated with the transport of information system media in accordance with organizational assessments of risk to include the flexibility to define different record-keeping methods for the different types of media transport as part of an overall system of transport-related records.","links":[{"href":"#ac-19","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#mp-3","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-28","rel":"related"}]},{"id":"mp-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-5.a_obj","name":"objective","props":[{"name":"label","value":"MP-5(a)"}],"parts":[{"id":"mp-5.a_obj.1","name":"objective","props":[{"name":"label","value":"MP-5(a)[1]"}],"prose":"defines types of information system media to be protected and controlled during transport outside of controlled areas;"},{"id":"mp-5.a_obj.2","name":"objective","props":[{"name":"label","value":"MP-5(a)[2]"}],"prose":"defines security safeguards to protect and control organization-defined information system media during transport outside of controlled areas;"},{"id":"mp-5.a_obj.3","name":"objective","props":[{"name":"label","value":"MP-5(a)[3]"}],"prose":"protects and controls organization-defined information system media during transport outside of controlled areas using organization-defined security safeguards;"}]},{"id":"mp-5.b_obj","name":"objective","props":[{"name":"label","value":"MP-5(b)"}],"prose":"maintains accountability for information system media during transport outside of controlled areas;"},{"id":"mp-5.c_obj","name":"objective","props":[{"name":"label","value":"MP-5(c)"}],"prose":"documents activities associated with the transport of information system media; and"},{"id":"mp-5.d_obj","name":"objective","props":[{"name":"label","value":"MP-5(d)"}],"prose":"restricts the activities associated with transport of information system media to authorized personnel."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media storage\n\nphysical and environmental protection policy and procedures\n\naccess control policy and procedures\n\nsecurity plan\n\ninformation system media\n\ndesignated controlled areas\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media protection and storage responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for storing information media\n\nautomated mechanisms supporting and\/or implementing media storage\/media protection"}]}],"controls":[{"id":"mp-5.4","class":"SP800-53-enhancement","title":"Cryptographic Protection","props":[{"name":"label","value":"MP-5(4)"},{"name":"sort-id","value":"mp-05.04"}],"parts":[{"id":"mp-5.4_smt","name":"statement","prose":"The information system implements cryptographic mechanisms to protect the confidentiality and integrity of information stored on digital media during transport outside of controlled areas."},{"id":"mp-5.4_gdn","name":"guidance","prose":"This control enhancement applies to both portable storage devices (e.g., USB memory sticks, compact disks, digital video disks, external\/removable hard disk drives) and mobile devices with storage capability (e.g., smart phones, tablets, E-readers).","links":[{"href":"#mp-2","rel":"related"}]},{"id":"mp-5.4_obj","name":"objective","prose":"Determine if the organization employs cryptographic mechanisms to protect the confidentiality and integrity of information stored on digital media during transport outside of controlled areas."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media transport\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system media transport records\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media transport responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Cryptographic mechanisms protecting information on digital media during transportation outside controlled areas"}]}]}]},{"id":"mp-6","class":"SP800-53","title":"Media Sanitization","params":[{"id":"mp-6_prm_1","label":"organization-defined information system media"},{"id":"mp-6_prm_2","label":"organization-defined sanitization techniques and procedures"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-6"},{"name":"sort-id","value":"mp-06"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"},{"href":"#263823e0-a971-4b00-959d-315b26278b22","rel":"reference"},{"href":"#a47466c4-c837-4f06-a39f-e68412a5f73d","rel":"reference"}],"parts":[{"id":"mp-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Sanitizes {{ insert: param, mp-6_prm_1 }} prior to disposal, release out of organizational control, or release for reuse using {{ insert: param, mp-6_prm_2 }} in accordance with applicable federal and organizational standards and policies; and"},{"id":"mp-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Employs sanitization mechanisms with the strength and integrity commensurate with the security category or classification of the information."}]},{"id":"mp-6_gdn","name":"guidance","prose":"This control applies to all information system media, both digital and non-digital, subject to disposal or reuse, whether or not the media is considered removable. Examples include media found in scanners, copiers, printers, notebook computers, workstations, network components, and mobile devices. The sanitization process removes information from the media such that the information cannot be retrieved or reconstructed. Sanitization techniques, including clearing, purging, cryptographic erase, and destruction, prevent the disclosure of information to unauthorized individuals when such media is reused or released for disposal. Organizations determine the appropriate sanitization methods recognizing that destruction is sometimes necessary when other methods cannot be applied to media requiring sanitization. Organizations use discretion on the employment of approved sanitization techniques and procedures for media containing information deemed to be in the public domain or publicly releasable, or deemed to have no adverse impact on organizations or individuals if released for reuse or disposal. Sanitization of non-digital media includes, for example, removing a classified appendix from an otherwise unclassified document, or redacting selected sections or words from a document by obscuring the redacted sections\/words in a manner equivalent in effectiveness to removing them from the document. NSA standards and policies control the sanitization process for media containing classified information.","links":[{"href":"#ma-2","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-4","rel":"related"}]},{"id":"mp-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-6.a_obj","name":"objective","props":[{"name":"label","value":"MP-6(a)"}],"parts":[{"id":"mp-6.a_obj.1","name":"objective","props":[{"name":"label","value":"MP-6(a)[1]"}],"prose":"defines information system media to be sanitized prior to:","parts":[{"id":"mp-6.a_obj.1.a","name":"objective","props":[{"name":"label","value":"MP-6(a)[1][a]"}],"prose":"disposal;"},{"id":"mp-6.a_obj.1.b","name":"objective","props":[{"name":"label","value":"MP-6(a)[1][b]"}],"prose":"release out of organizational control; or"},{"id":"mp-6.a_obj.1.c","name":"objective","props":[{"name":"label","value":"MP-6(a)[1][c]"}],"prose":"release for reuse;"}]},{"id":"mp-6.a_obj.2","name":"objective","props":[{"name":"label","value":"MP-6(a)[2]"}],"prose":"defines sanitization techniques or procedures to be used for sanitizing organization-defined information system media prior to:","parts":[{"id":"mp-6.a_obj.2.a","name":"objective","props":[{"name":"label","value":"MP-6(a)[2][a]"}],"prose":"disposal;"},{"id":"mp-6.a_obj.2.b","name":"objective","props":[{"name":"label","value":"MP-6(a)[2][b]"}],"prose":"release out of organizational control; or"},{"id":"mp-6.a_obj.2.c","name":"objective","props":[{"name":"label","value":"MP-6(a)[2][c]"}],"prose":"release for reuse;"}]},{"id":"mp-6.a_obj.3","name":"objective","props":[{"name":"label","value":"MP-6(a)[3]"}],"prose":"sanitizes organization-defined information system media prior to disposal, release out of organizational control, or release for reuse using organization-defined sanitization techniques or procedures in accordance with applicable federal and organizational standards and policies; and"}]},{"id":"mp-6.b_obj","name":"objective","props":[{"name":"label","value":"MP-6(b)"}],"prose":"employs sanitization mechanisms with strength and integrity commensurate with the security category or classification of the information."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media sanitization and disposal\n\napplicable federal standards and policies addressing media sanitization\n\nmedia sanitization records\n\naudit records\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with media sanitization responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media sanitization\n\nautomated mechanisms supporting and\/or implementing media sanitization"}]}],"controls":[{"id":"mp-6.1","class":"SP800-53-enhancement","title":"Review \/ Approve \/ Track \/ Document \/ Verify","props":[{"name":"label","value":"MP-6(1)"},{"name":"sort-id","value":"mp-06.01"}],"parts":[{"id":"mp-6.1_smt","name":"statement","prose":"The organization reviews, approves, tracks, documents, and verifies media sanitization and disposal actions."},{"id":"mp-6.1_gdn","name":"guidance","prose":"Organizations review and approve media to be sanitized to ensure compliance with records-retention policies. Tracking\/documenting actions include, for example, listing personnel who reviewed and approved sanitization and disposal actions, types of media sanitized, specific files stored on the media, sanitization methods used, date and time of the sanitization actions, personnel who performed the sanitization, verification actions taken, personnel who performed the verification, and disposal action taken. Organizations verify that the sanitization of the media was effective prior to disposal.","links":[{"href":"#si-12","rel":"related"}]},{"id":"mp-6.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-6.1_obj.1","name":"objective","props":[{"name":"label","value":"MP-6(1)[1]"}],"prose":"reviews media sanitization and disposal actions;"},{"id":"mp-6.1_obj.2","name":"objective","props":[{"name":"label","value":"MP-6(1)[2]"}],"prose":"approves media sanitization and disposal actions;"},{"id":"mp-6.1_obj.3","name":"objective","props":[{"name":"label","value":"MP-6(1)[3]"}],"prose":"tracks media sanitization and disposal actions;"},{"id":"mp-6.1_obj.4","name":"objective","props":[{"name":"label","value":"MP-6(1)[4]"}],"prose":"documents media sanitization and disposal actions; and"},{"id":"mp-6.1_obj.5","name":"objective","props":[{"name":"label","value":"MP-6(1)[5]"}],"prose":"verifies media sanitization and disposal actions."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media sanitization and disposal\n\nmedia sanitization and disposal records\n\nreview records for media sanitization and disposal actions\n\napprovals for media sanitization and disposal actions\n\ntracking records\n\nverification records\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media sanitization and disposal responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media sanitization\n\nautomated mechanisms supporting and\/or implementing media sanitization"}]}]},{"id":"mp-6.2","class":"SP800-53-enhancement","title":"Equipment Testing","params":[{"id":"mp-6.2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"MP-6(2)"},{"name":"sort-id","value":"mp-06.02"}],"parts":[{"id":"mp-6.2_smt","name":"statement","prose":"The organization tests sanitization equipment and procedures {{ insert: param, mp-6.2_prm_1 }} to verify that the intended sanitization is being achieved."},{"id":"mp-6.2_gdn","name":"guidance","prose":"Testing of sanitization equipment and procedures may be conducted by qualified and authorized external entities (e.g., other federal agencies or external service providers)."},{"id":"mp-6.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-6.2_obj.1","name":"objective","props":[{"name":"label","value":"MP-6(2)[1]"}],"prose":"defines the frequency for testing sanitization equipment and procedures to verify that the intended sanitization is being achieved; and"},{"id":"mp-6.2_obj.2","name":"objective","props":[{"name":"label","value":"MP-6(2)[2]"}],"prose":"tests sanitization equipment and procedures with the organization-defined frequency to verify that the intended sanitization is being achieved."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media sanitization and disposal\n\nprocedures addressing testing of media sanitization equipment\n\nresults of media sanitization equipment and procedures testing\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media sanitization responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media sanitization\n\nautomated mechanisms supporting and\/or implementing media sanitization"}]}]},{"id":"mp-6.3","class":"SP800-53-enhancement","title":"Nondestructive Techniques","params":[{"id":"mp-6.3_prm_1","label":"organization-defined circumstances requiring sanitization of portable storage devices"}],"props":[{"name":"label","value":"MP-6(3)"},{"name":"sort-id","value":"mp-06.03"}],"parts":[{"id":"mp-6.3_smt","name":"statement","prose":"The organization applies nondestructive sanitization techniques to portable storage devices prior to connecting such devices to the information system under the following circumstances: {{ insert: param, mp-6.3_prm_1 }}."},{"id":"mp-6.3_gdn","name":"guidance","prose":"This control enhancement applies to digital media containing classified information and Controlled Unclassified Information (CUI). Portable storage devices can be the source of malicious code insertions into organizational information systems. Many of these devices are obtained from unknown and potentially untrustworthy sources and may contain malicious code that can be readily transferred to information systems through USB ports or other entry portals. While scanning such storage devices is always recommended, sanitization provides additional assurance that the devices are free of malicious code to include code capable of initiating zero-day attacks. Organizations consider nondestructive sanitization of portable storage devices when such devices are first purchased from the manufacturer or vendor prior to initial use or when organizations lose a positive chain of custody for the devices.","links":[{"href":"#si-3","rel":"related"}]},{"id":"mp-6.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-6.3_obj.1","name":"objective","props":[{"name":"label","value":"MP-6(3)[1]"}],"prose":"defines circumstances requiring sanitization of portable storage devices; and"},{"id":"mp-6.3_obj.2","name":"objective","props":[{"name":"label","value":"MP-6(3)[2]"}],"prose":"applies nondestructive sanitization techniques to portable storage devices prior to connecting such devices to the information system under organization-defined circumstances requiring sanitization of portable storage devices."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media sanitization and disposal\n\nlist of circumstances requiring sanitization of portable storage devices\n\nmedia sanitization records\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media sanitization responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media sanitization of portable storage devices\n\nautomated mechanisms supporting and\/or implementing media sanitization"}]}]}]},{"id":"mp-7","class":"SP800-53","title":"Media Use","params":[{"id":"mp-7_prm_1","select":{"choice":["restricts","prohibits"]}},{"id":"mp-7_prm_2","label":"organization-defined types of information system media"},{"id":"mp-7_prm_3","label":"organization-defined information systems or system components"},{"id":"mp-7_prm_4","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-7"},{"name":"sort-id","value":"mp-07"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","rel":"reference"}],"parts":[{"id":"mp-7_smt","name":"statement","prose":"The organization {{ insert: param, mp-7_prm_1 }} the use of {{ insert: param, mp-7_prm_2 }} on {{ insert: param, mp-7_prm_3 }} using {{ insert: param, mp-7_prm_4 }}."},{"id":"mp-7_gdn","name":"guidance","prose":"Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. This control also applies to mobile devices with information storage capability (e.g., smart phones, tablets, E-readers). In contrast to MP-2, which restricts user access to media, this control restricts the use of certain types of media on information systems, for example, restricting\/prohibiting the use of flash drives or external hard disk drives. Organizations can employ technical and nontechnical safeguards (e.g., policies, procedures, rules of behavior) to restrict the use of information system media. Organizations may restrict the use of portable storage devices, for example, by using physical cages on workstations to prohibit access to certain external ports, or disabling\/removing the ability to insert, read or write to such devices. Organizations may also limit the use of portable storage devices to only approved devices including, for example, devices provided by the organization, devices provided by other approved organizations, and devices that are not personally owned. Finally, organizations may restrict the use of portable storage devices based on the type of device, for example, prohibiting the use of writeable, portable storage devices, and implementing this restriction by disabling or removing the capability to write to such devices.","links":[{"href":"#ac-19","rel":"related"},{"href":"#pl-4","rel":"related"}]},{"id":"mp-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-7_obj.1","name":"objective","props":[{"name":"label","value":"MP-7[1]"}],"prose":"defines types of information system media to be:","parts":[{"id":"mp-7_obj.1.a","name":"objective","props":[{"name":"label","value":"MP-7[1][a]"}],"prose":"restricted on information systems or system components; or"},{"id":"mp-7_obj.1.b","name":"objective","props":[{"name":"label","value":"MP-7[1][b]"}],"prose":"prohibited from use on information systems or system components;"}]},{"id":"mp-7_obj.2","name":"objective","props":[{"name":"label","value":"MP-7[2]"}],"prose":"defines information systems or system components on which the use of organization-defined types of information system media is to be one of the following:","parts":[{"id":"mp-7_obj.2.a","name":"objective","props":[{"name":"label","value":"MP-7[2][a]"}],"prose":"restricted; or"},{"id":"mp-7_obj.2.b","name":"objective","props":[{"name":"label","value":"MP-7[2][b]"}],"prose":"prohibited;"}]},{"id":"mp-7_obj.3","name":"objective","props":[{"name":"label","value":"MP-7[3]"}],"prose":"defines security safeguards to be employed to restrict or prohibit the use of organization-defined types of information system media on organization-defined information systems or system components; and"},{"id":"mp-7_obj.4","name":"objective","props":[{"name":"label","value":"MP-7[4]"}],"prose":"restricts or prohibits the use of organization-defined information system media on organization-defined information systems or system components using organization-defined security safeguards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nsystem use policy\n\nprocedures addressing media usage restrictions\n\nsecurity plan\n\nrules of behavior\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media use responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media use\n\nautomated mechanisms restricting or prohibiting use of information system media on information systems or system components"}]}],"controls":[{"id":"mp-7.1","class":"SP800-53-enhancement","title":"Prohibit Use Without Owner","props":[{"name":"label","value":"MP-7(1)"},{"name":"sort-id","value":"mp-07.01"}],"parts":[{"id":"mp-7.1_smt","name":"statement","prose":"The organization prohibits the use of portable storage devices in organizational information systems when such devices have no identifiable owner."},{"id":"mp-7.1_gdn","name":"guidance","prose":"Requiring identifiable owners (e.g., individuals, organizations, or projects) for portable storage devices reduces the risk of using such technologies by allowing organizations to assign responsibility and accountability for addressing known vulnerabilities in the devices (e.g., malicious code insertion).","links":[{"href":"#pl-4","rel":"related"}]},{"id":"mp-7.1_obj","name":"objective","prose":"Determine if the organization prohibits the use of portable storage devices in organizational information systems when such devices have no identifiable owner."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nsystem use policy\n\nprocedures addressing media usage restrictions\n\nsecurity plan\n\nrules of behavior\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media use responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media use\n\nautomated mechanisms prohibiting use of media on information systems or system components"}]}]}]}]},{"id":"pe","class":"family","title":"Physical and Environmental Protection","controls":[{"id":"pe-1","class":"SP800-53","title":"Physical and Environmental Protection Policy and Procedures","params":[{"id":"pe-1_prm_1","label":"organization-defined personnel or roles"},{"id":"pe-1_prm_2","label":"organization-defined frequency"},{"id":"pe-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-1"},{"name":"sort-id","value":"pe-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"pe-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, pe-1_prm_1 }}:","parts":[{"id":"pe-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A physical and environmental protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"pe-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls; and"}]},{"id":"pe-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"pe-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Physical and environmental protection policy {{ insert: param, pe-1_prm_2 }}; and"},{"id":"pe-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Physical and environmental protection procedures {{ insert: param, pe-1_prm_3 }}."}]}]},{"id":"pe-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the PE family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"pe-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-1.a_obj","name":"objective","props":[{"name":"label","value":"PE-1(a)"}],"parts":[{"id":"pe-1.a.1_obj","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)"}],"parts":[{"id":"pe-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1]"}],"prose":"develops and documents a physical and environmental protection policy that addresses:","parts":[{"id":"pe-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"pe-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"pe-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"pe-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"pe-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"pe-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"pe-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"pe-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the physical and environmental protection policy is to be disseminated;"},{"id":"pe-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[3]"}],"prose":"disseminates the physical and environmental protection policy to organization-defined personnel or roles;"}]},{"id":"pe-1.a.2_obj","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)"}],"parts":[{"id":"pe-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls;"},{"id":"pe-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"pe-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"pe-1.b_obj","name":"objective","props":[{"name":"label","value":"PE-1(b)"}],"parts":[{"id":"pe-1.b.1_obj","name":"objective","props":[{"name":"label","value":"PE-1(b)(1)"}],"parts":[{"id":"pe-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current physical and environmental protection policy;"},{"id":"pe-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(b)(1)[2]"}],"prose":"reviews and updates the current physical and environmental protection policy with the organization-defined frequency;"}]},{"id":"pe-1.b.2_obj","name":"objective","props":[{"name":"label","value":"PE-1(b)(2)"}],"parts":[{"id":"pe-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current physical and environmental protection procedures; and"},{"id":"pe-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(b)(2)[2]"}],"prose":"reviews and updates the current physical and environmental protection procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical and environmental protection responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"pe-2","class":"SP800-53","title":"Physical Access Authorizations","params":[{"id":"pe-2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-2"},{"name":"sort-id","value":"pe-02"}],"parts":[{"id":"pe-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, approves, and maintains a list of individuals with authorized access to the facility where the information system resides;"},{"id":"pe-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Issues authorization credentials for facility access;"},{"id":"pe-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the access list detailing authorized facility access by individuals {{ insert: param, pe-2_prm_1 }}; and"},{"id":"pe-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Removes individuals from the facility access list when access is no longer required."}]},{"id":"pe-2_gdn","name":"guidance","prose":"This control applies to organizational employees and visitors. Individuals (e.g., employees, contractors, and others) with permanent physical access authorization credentials are not considered visitors. Authorization credentials include, for example, badges, identification cards, and smart cards. Organizations determine the strength of authorization credentials needed (including level of forge-proof badges, smart cards, or identification cards) consistent with federal standards, policies, and procedures. This control only applies to areas within facilities that have not been designated as publicly accessible.","links":[{"href":"#pe-3","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#ps-3","rel":"related"}]},{"id":"pe-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-2.a_obj","name":"objective","props":[{"name":"label","value":"PE-2(a)"}],"parts":[{"id":"pe-2.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-2(a)[1]"}],"prose":"develops a list of individuals with authorized access to the facility where the information system resides;"},{"id":"pe-2.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-2(a)[2]"}],"prose":"approves a list of individuals with authorized access to the facility where the information system resides;"},{"id":"pe-2.a_obj.3","name":"objective","props":[{"name":"label","value":"PE-2(a)[3]"}],"prose":"maintains a list of individuals with authorized access to the facility where the information system resides;"}]},{"id":"pe-2.b_obj","name":"objective","props":[{"name":"label","value":"PE-2(b)"}],"prose":"issues authorization credentials for facility access;"},{"id":"pe-2.c_obj","name":"objective","props":[{"name":"label","value":"PE-2(c)"}],"parts":[{"id":"pe-2.c_obj.1","name":"objective","props":[{"name":"label","value":"PE-2(c)[1]"}],"prose":"defines the frequency to review the access list detailing authorized facility access by individuals;"},{"id":"pe-2.c_obj.2","name":"objective","props":[{"name":"label","value":"PE-2(c)[2]"}],"prose":"reviews the access list detailing authorized facility access by individuals with the organization-defined frequency; and"}]},{"id":"pe-2.d_obj","name":"objective","props":[{"name":"label","value":"PE-2(d)"}],"prose":"removes individuals from the facility access list when access is no longer required."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access authorizations\n\nsecurity plan\n\nauthorized personnel access list\n\nauthorization credentials\n\nphysical access list reviews\n\nphysical access termination records and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access authorization responsibilities\n\norganizational personnel with physical access to information system facility\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for physical access authorizations\n\nautomated mechanisms supporting and\/or implementing physical access authorizations"}]}]},{"id":"pe-3","class":"SP800-53","title":"Physical Access Control","params":[{"id":"pe-3_prm_1","label":"organization-defined entry\/exit points to the facility where the information system resides"},{"id":"pe-3_prm_2","select":{"how-many":"one-or-more","choice":[" {{ insert: param, pe-3_prm_3 }} ","guards"]}},{"id":"pe-3_prm_3","depends-on":"pe-3_prm_2","label":"organization-defined physical access control systems\/devices"},{"id":"pe-3_prm_4","label":"organization-defined entry\/exit points"},{"id":"pe-3_prm_5","label":"organization-defined security safeguards"},{"id":"pe-3_prm_6","label":"organization-defined circumstances requiring visitor escorts and monitoring"},{"id":"pe-3_prm_7","label":"organization-defined physical access devices"},{"id":"pe-3_prm_8","label":"organization-defined frequency"},{"id":"pe-3_prm_9","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-3"},{"name":"sort-id","value":"pe-03"}],"links":[{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#2157bb7e-192c-4eaa-877f-93ef6b0a3292","rel":"reference"},{"href":"#6caa237b-531b-43ac-9711-d8f6b97b0377","rel":"reference"},{"href":"#398e33fd-f404-4e5c-b90e-2d50d3181244","rel":"reference"},{"href":"#61081e7f-041d-4033-96a7-44a439071683","rel":"reference"},{"href":"#dd2f5acd-08f1-435a-9837-f8203088dc1a","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"},{"href":"#5ed1f4d5-1494-421b-97ed-39d3c88ab51f","rel":"reference"}],"parts":[{"id":"pe-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Enforces physical access authorizations at {{ insert: param, pe-3_prm_1 }} by;","parts":[{"id":"pe-3_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Verifying individual access authorizations before granting access to the facility; and"},{"id":"pe-3_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Controlling ingress\/egress to the facility using {{ insert: param, pe-3_prm_2 }};"}]},{"id":"pe-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Maintains physical access audit logs for {{ insert: param, pe-3_prm_4 }};"},{"id":"pe-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Provides {{ insert: param, pe-3_prm_5 }} to control access to areas within the facility officially designated as publicly accessible;"},{"id":"pe-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Escorts visitors and monitors visitor activity {{ insert: param, pe-3_prm_6 }};"},{"id":"pe-3_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Secures keys, combinations, and other physical access devices;"},{"id":"pe-3_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Inventories {{ insert: param, pe-3_prm_7 }} every {{ insert: param, pe-3_prm_8 }}; and"},{"id":"pe-3_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Changes combinations and keys {{ insert: param, pe-3_prm_9 }} and\/or when keys are lost, combinations are compromised, or individuals are transferred or terminated."}]},{"id":"pe-3_gdn","name":"guidance","prose":"This control applies to organizational employees and visitors. Individuals (e.g., employees, contractors, and others) with permanent physical access authorization credentials are not considered visitors. Organizations determine the types of facility guards needed including, for example, professional physical security staff or other personnel such as administrative staff or information system users. Physical access devices include, for example, keys, locks, combinations, and card readers. Safeguards for publicly accessible areas within organizational facilities include, for example, cameras, monitoring by guards, and isolating selected information systems and\/or system components in secured areas. Physical access control systems comply with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. The Federal Identity, Credential, and Access Management Program provides implementation guidance for identity, credential, and access management capabilities for physical access control systems. Organizations have flexibility in the types of audit logs employed. Audit logs can be procedural (e.g., a written log of individuals accessing the facility and when such access occurred), automated (e.g., capturing ID provided by a PIV card), or some combination thereof. Physical access points can include facility access points, interior access points to information systems and\/or components requiring supplemental access controls, or both. Components of organizational information systems (e.g., workstations, terminals) may be located in areas designated as publicly accessible with organizations safeguarding access to such devices.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#pe-5","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ra-3","rel":"related"}]},{"id":"pe-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-3.a_obj","name":"objective","props":[{"name":"label","value":"PE-3(a)"}],"parts":[{"id":"pe-3.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(a)[1]"}],"prose":"defines entry\/exit points to the facility where the information system resides;"},{"id":"pe-3.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2]"}],"prose":"enforces physical access authorizations at organization-defined entry\/exit points to the facility where the information system resides by:","parts":[{"id":"pe-3.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](1)"}],"prose":"verifying individual access authorizations before granting access to the facility;"},{"id":"pe-3.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)"}],"parts":[{"id":"pe-3.a.2_obj.2.a","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[a]"}],"prose":"defining physical access control systems\/devices to be employed to control ingress\/egress to the facility where the information system resides;"},{"id":"pe-3.a.2_obj.2.b","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[b]"}],"prose":"using one or more of the following ways to control ingress\/egress to the facility:","parts":[{"id":"pe-3.a.2_obj.2.b.1","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[b][1]"}],"prose":"organization-defined physical access control systems\/devices; and\/or"},{"id":"pe-3.a.2_obj.2.b.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[b][2]"}],"prose":"guards;"}]}]}]}]},{"id":"pe-3.b_obj","name":"objective","props":[{"name":"label","value":"PE-3(b)"}],"parts":[{"id":"pe-3.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(b)[1]"}],"prose":"defines entry\/exit points for which physical access audit logs are to be maintained;"},{"id":"pe-3.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(b)[2]"}],"prose":"maintains physical access audit logs for organization-defined entry\/exit points;"}]},{"id":"pe-3.c_obj","name":"objective","props":[{"name":"label","value":"PE-3(c)"}],"parts":[{"id":"pe-3.c_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(c)[1]"}],"prose":"defines security safeguards to be employed to control access to areas within the facility officially designated as publicly accessible;"},{"id":"pe-3.c_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(c)[2]"}],"prose":"provides organization-defined security safeguards to control access to areas within the facility officially designated as publicly accessible;"}]},{"id":"pe-3.d_obj","name":"objective","props":[{"name":"label","value":"PE-3(d)"}],"parts":[{"id":"pe-3.d_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(d)[1]"}],"prose":"defines circumstances requiring visitor:","parts":[{"id":"pe-3.d_obj.1.a","name":"objective","props":[{"name":"label","value":"PE-3(d)[1][a]"}],"prose":"escorts;"},{"id":"pe-3.d_obj.1.b","name":"objective","props":[{"name":"label","value":"PE-3(d)[1][b]"}],"prose":"monitoring;"}]},{"id":"pe-3.d_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(d)[2]"}],"prose":"in accordance with organization-defined circumstances requiring visitor escorts and monitoring:","parts":[{"id":"pe-3.d_obj.2.a","name":"objective","props":[{"name":"label","value":"PE-3(d)[2][a]"}],"prose":"escorts visitors;"},{"id":"pe-3.d_obj.2.b","name":"objective","props":[{"name":"label","value":"PE-3(d)[2][b]"}],"prose":"monitors visitor activities;"}]}]},{"id":"pe-3.e_obj","name":"objective","props":[{"name":"label","value":"PE-3(e)"}],"parts":[{"id":"pe-3.e_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(e)[1]"}],"prose":"secures keys;"},{"id":"pe-3.e_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(e)[2]"}],"prose":"secures combinations;"},{"id":"pe-3.e_obj.3","name":"objective","props":[{"name":"label","value":"PE-3(e)[3]"}],"prose":"secures other physical access devices;"}]},{"id":"pe-3.f_obj","name":"objective","props":[{"name":"label","value":"PE-3(f)"}],"parts":[{"id":"pe-3.f_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(f)[1]"}],"prose":"defines physical access devices to be inventoried;"},{"id":"pe-3.f_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(f)[2]"}],"prose":"defines the frequency to inventory organization-defined physical access devices;"},{"id":"pe-3.f_obj.3","name":"objective","props":[{"name":"label","value":"PE-3(f)[3]"}],"prose":"inventories the organization-defined physical access devices with the organization-defined frequency;"}]},{"id":"pe-3.g_obj","name":"objective","props":[{"name":"label","value":"PE-3(g)"}],"parts":[{"id":"pe-3.g_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(g)[1]"}],"prose":"defines the frequency to change combinations and keys; and"},{"id":"pe-3.g_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(g)[2]"}],"prose":"changes combinations and keys with the organization-defined frequency and\/or when:","parts":[{"id":"pe-3.g_obj.2.a","name":"objective","props":[{"name":"label","value":"PE-3(g)[2][a]"}],"prose":"keys are lost;"},{"id":"pe-3.g_obj.2.b","name":"objective","props":[{"name":"label","value":"PE-3(g)[2][b]"}],"prose":"combinations are compromised;"},{"id":"pe-3.g_obj.2.c","name":"objective","props":[{"name":"label","value":"PE-3(g)[2][c]"}],"prose":"individuals are transferred or terminated."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access control\n\nsecurity plan\n\nphysical access control logs or records\n\ninventory records of physical access control devices\n\ninformation system entry and exit points\n\nrecords of key and lock combination changes\n\nstorage locations for physical access control devices\n\nphysical access control devices\n\nlist of security safeguards controlling access to designated publicly accessible areas within facility\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access control responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for physical access control\n\nautomated mechanisms supporting and\/or implementing physical access control\n\nphysical access control devices"}]}],"controls":[{"id":"pe-3.1","class":"SP800-53-enhancement","title":"Information System Access","params":[{"id":"pe-3.1_prm_1","label":"organization-defined physical spaces containing one or more components of the information system"}],"props":[{"name":"label","value":"PE-3(1)"},{"name":"sort-id","value":"pe-03.01"}],"parts":[{"id":"pe-3.1_smt","name":"statement","prose":"The organization enforces physical access authorizations to the information system in addition to the physical access controls for the facility at {{ insert: param, pe-3.1_prm_1 }}."},{"id":"pe-3.1_gdn","name":"guidance","prose":"This control enhancement provides additional physical security for those areas within facilities where there is a concentration of information system components (e.g., server rooms, media storage areas, data and communications centers).","links":[{"href":"#ps-2","rel":"related"}]},{"id":"pe-3.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-3.1_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(1)[1]"}],"prose":"defines physical spaces containing one or more components of the information system; and"},{"id":"pe-3.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(1)[2]"}],"prose":"enforces physical access authorizations to the information system in addition to the physical access controls for the facility at organization-defined physical spaces containing one or more components of the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access control\n\nphysical access control logs or records\n\nphysical access control devices\n\naccess authorizations\n\naccess credentials\n\ninformation system entry and exit points\n\nlist of areas within the facility containing concentrations of information system components or information system components requiring additional physical protection\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access authorization responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for physical access control to the information system\/components\n\nautomated mechanisms supporting and\/or implementing physical access control for facility areas containing information system components"}]}]}]},{"id":"pe-4","class":"SP800-53","title":"Access Control for Transmission Medium","params":[{"id":"pe-4_prm_1","label":"organization-defined information system distribution and transmission lines"},{"id":"pe-4_prm_2","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-4"},{"name":"sort-id","value":"pe-04"}],"links":[{"href":"#06dff0ea-3848-4945-8d91-e955ee69f05d","rel":"reference"}],"parts":[{"id":"pe-4_smt","name":"statement","prose":"The organization controls physical access to {{ insert: param, pe-4_prm_1 }} within organizational facilities using {{ insert: param, pe-4_prm_2 }}."},{"id":"pe-4_gdn","name":"guidance","prose":"Physical security safeguards applied to information system distribution and transmission lines help to prevent accidental damage, disruption, and physical tampering. In addition, physical safeguards may be necessary to help prevent eavesdropping or in transit modification of unencrypted transmissions. Security safeguards to control physical access to system distribution and transmission lines include, for example: (i) locked wiring closets; (ii) disconnected or locked spare jacks; and\/or (iii) protection of cabling by conduit or cable trays.","links":[{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-8","rel":"related"}]},{"id":"pe-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-4_obj.1","name":"objective","props":[{"name":"label","value":"PE-4[1]"}],"prose":"defines information system distribution and transmission lines requiring physical access controls;"},{"id":"pe-4_obj.2","name":"objective","props":[{"name":"label","value":"PE-4[2]"}],"prose":"defines security safeguards to be employed to control physical access to organization-defined information system distribution and transmission lines within organizational facilities; and"},{"id":"pe-4_obj.3","name":"objective","props":[{"name":"label","value":"PE-4[3]"}],"prose":"controls physical access to organization-defined information system distribution and transmission lines within organizational facilities using organization-defined security safeguards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing access control for transmission medium\n\ninformation system design documentation\n\nfacility communications and wiring diagrams\n\nlist of physical security safeguards applied to information system distribution and transmission lines\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access control responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for access control to distribution and transmission lines\n\nautomated mechanisms\/security safeguards supporting and\/or implementing access control to distribution and transmission lines"}]}]},{"id":"pe-5","class":"SP800-53","title":"Access Control for Output Devices","props":[{"name":"priority","value":"P2"},{"name":"label","value":"PE-5"},{"name":"sort-id","value":"pe-05"}],"parts":[{"id":"pe-5_smt","name":"statement","prose":"The organization controls physical access to information system output devices to prevent unauthorized individuals from obtaining the output."},{"id":"pe-5_gdn","name":"guidance","prose":"Controlling physical access to output devices includes, for example, placing output devices in locked rooms or other secured areas and allowing access to authorized individuals only, and placing output devices in locations that can be monitored by organizational personnel. Monitors, printers, copiers, scanners, facsimile machines, and audio devices are examples of information system output devices.","links":[{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#pe-18","rel":"related"}]},{"id":"pe-5_obj","name":"objective","prose":"Determine if the organization controls physical access to information system output devices to prevent unauthorized individuals from obtaining the output."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing access control for display medium\n\nfacility layout of information system components\n\nactual displays from information system components\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access control responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for access control to output devices\n\nautomated mechanisms supporting and\/or implementing access control to output devices"}]}]},{"id":"pe-6","class":"SP800-53","title":"Monitoring Physical Access","params":[{"id":"pe-6_prm_1","label":"organization-defined frequency"},{"id":"pe-6_prm_2","label":"organization-defined events or potential indications of events"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-6"},{"name":"sort-id","value":"pe-06"}],"parts":[{"id":"pe-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Monitors physical access to the facility where the information system resides to detect and respond to physical security incidents;"},{"id":"pe-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews physical access logs {{ insert: param, pe-6_prm_1 }} and upon occurrence of {{ insert: param, pe-6_prm_2 }}; and"},{"id":"pe-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Coordinates results of reviews and investigations with the organizational incident response capability."}]},{"id":"pe-6_gdn","name":"guidance","prose":"Organizational incident response capabilities include investigations of and responses to detected physical security incidents. Security incidents include, for example, apparent security violations or suspicious physical access activities. Suspicious physical access activities include, for example: (i) accesses outside of normal work hours; (ii) repeated accesses to areas not normally accessed; (iii) accesses for unusual lengths of time; and (iv) out-of-sequence accesses.","links":[{"href":"#ca-7","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"pe-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-6.a_obj","name":"objective","props":[{"name":"label","value":"PE-6(a)"}],"prose":"monitors physical access to the facility where the information system resides to detect and respond to physical security incidents;"},{"id":"pe-6.b_obj","name":"objective","props":[{"name":"label","value":"PE-6(b)"}],"parts":[{"id":"pe-6.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-6(b)[1]"}],"prose":"defines the frequency to review physical access logs;"},{"id":"pe-6.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-6(b)[2]"}],"prose":"defines events or potential indication of events requiring physical access logs to be reviewed;"},{"id":"pe-6.b_obj.3","name":"objective","props":[{"name":"label","value":"PE-6(b)[3]"}],"prose":"reviews physical access logs with the organization-defined frequency and upon occurrence of organization-defined events or potential indications of events; and"}]},{"id":"pe-6.c_obj","name":"objective","props":[{"name":"label","value":"PE-6(c)"}],"prose":"coordinates results of reviews and investigations with the organizational incident response capability."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access monitoring\n\nsecurity plan\n\nphysical access logs or records\n\nphysical access monitoring records\n\nphysical access log reviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access monitoring responsibilities\n\norganizational personnel with incident response responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring physical access\n\nautomated mechanisms supporting and\/or implementing physical access monitoring\n\nautomated mechanisms supporting and\/or implementing reviewing of physical access logs"}]}],"controls":[{"id":"pe-6.1","class":"SP800-53-enhancement","title":"Intrusion Alarms \/ Surveillance Equipment","props":[{"name":"label","value":"PE-6(1)"},{"name":"sort-id","value":"pe-06.01"}],"parts":[{"id":"pe-6.1_smt","name":"statement","prose":"The organization monitors physical intrusion alarms and surveillance equipment."},{"id":"pe-6.1_obj","name":"objective","prose":"Determine if the organization monitors physical intrusion alarms and surveillance equipment."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access monitoring\n\nsecurity plan\n\nphysical access logs or records\n\nphysical access monitoring records\n\nphysical access log reviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access monitoring responsibilities\n\norganizational personnel with incident response responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring physical intrusion alarms and surveillance equipment\n\nautomated mechanisms supporting and\/or implementing physical access monitoring\n\nautomated mechanisms supporting and\/or implementing physical intrusion alarms and surveillance equipment"}]}]},{"id":"pe-6.4","class":"SP800-53-enhancement","title":"Monitoring Physical Access to Information Systems","params":[{"id":"pe-6.4_prm_1","label":"organization-defined physical spaces containing one or more components of the information system"}],"props":[{"name":"label","value":"PE-6(4)"},{"name":"sort-id","value":"pe-06.04"}],"parts":[{"id":"pe-6.4_smt","name":"statement","prose":"The organization monitors physical access to the information system in addition to the physical access monitoring of the facility as {{ insert: param, pe-6.4_prm_1 }}."},{"id":"pe-6.4_gdn","name":"guidance","prose":"This control enhancement provides additional monitoring for those areas within facilities where there is a concentration of information system components (e.g., server rooms, media storage areas, communications centers).","links":[{"href":"#ps-2","rel":"related"},{"href":"#ps-3","rel":"related"}]},{"id":"pe-6.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-6.4_obj.1","name":"objective","props":[{"name":"label","value":"PE-6(4)[1]"}],"prose":"defines physical spaces containing one or more components of the information system; and"},{"id":"pe-6.4_obj.2","name":"objective","props":[{"name":"label","value":"PE-6(4)[2]"}],"prose":"monitors physical access to the information system in addition to the physical access monitoring of the facility at organization-defined physical spaces containing one or more components of the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access monitoring\n\nphysical access control logs or records\n\nphysical access control devices\n\naccess authorizations\n\naccess credentials\n\nlist of areas within the facility containing concentrations of information system components or information system components requiring additional physical access monitoring\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access monitoring responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring physical access to the information system\n\nautomated mechanisms supporting and\/or implementing physical access monitoring for facility areas containing information system components"}]}]}]},{"id":"pe-8","class":"SP800-53","title":"Visitor Access Records","params":[{"id":"pe-8_prm_1","label":"organization-defined time period"},{"id":"pe-8_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"PE-8"},{"name":"sort-id","value":"pe-08"}],"parts":[{"id":"pe-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Maintains visitor access records to the facility where the information system resides for {{ insert: param, pe-8_prm_1 }}; and"},{"id":"pe-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews visitor access records {{ insert: param, pe-8_prm_2 }}."}]},{"id":"pe-8_gdn","name":"guidance","prose":"Visitor access records include, for example, names and organizations of persons visiting, visitor signatures, forms of identification, dates of access, entry and departure times, purposes of visits, and names and organizations of persons visited. Visitor access records are not required for publicly accessible areas."},{"id":"pe-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-8.a_obj","name":"objective","props":[{"name":"label","value":"PE-8(a)"}],"parts":[{"id":"pe-8.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-8(a)[1]"}],"prose":"defines the time period to maintain visitor access records to the facility where the information system resides;"},{"id":"pe-8.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-8(a)[2]"}],"prose":"maintains visitor access records to the facility where the information system resides for the organization-defined time period;"}]},{"id":"pe-8.b_obj","name":"objective","props":[{"name":"label","value":"PE-8(b)"}],"parts":[{"id":"pe-8.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-8(b)[1]"}],"prose":"defines the frequency to review visitor access records; and"},{"id":"pe-8.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-8(b)[2]"}],"prose":"reviews visitor access records with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing visitor access records\n\nsecurity plan\n\nvisitor access control logs or records\n\nvisitor access record or log reviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with visitor access records responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for maintaining and reviewing visitor access records\n\nautomated mechanisms supporting and\/or implementing maintenance and review of visitor access records"}]}],"controls":[{"id":"pe-8.1","class":"SP800-53-enhancement","title":"Automated Records Maintenance \/ Review","props":[{"name":"label","value":"PE-8(1)"},{"name":"sort-id","value":"pe-08.01"}],"parts":[{"id":"pe-8.1_smt","name":"statement","prose":"The organization employs automated mechanisms to facilitate the maintenance and review of visitor access records."},{"id":"pe-8.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to facilitate the maintenance and review of visitor access records."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing visitor access records\n\nautomated mechanisms supporting management of visitor access records\n\nvisitor access control logs or records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with visitor access records responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for maintaining and reviewing visitor access records\n\nautomated mechanisms supporting and\/or implementing maintenance and review of visitor access records"}]}]}]},{"id":"pe-9","class":"SP800-53","title":"Power Equipment and Cabling","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-9"},{"name":"sort-id","value":"pe-09"}],"parts":[{"id":"pe-9_smt","name":"statement","prose":"The organization protects power equipment and power cabling for the information system from damage and destruction."},{"id":"pe-9_gdn","name":"guidance","prose":"Organizations determine the types of protection necessary for power equipment and cabling employed at different locations both internal and external to organizational facilities and environments of operation. This includes, for example, generators and power cabling outside of buildings, internal cabling and uninterruptable power sources within an office or data center, and power sources for self-contained entities such as vehicles and satellites.","links":[{"href":"#pe-4","rel":"related"}]},{"id":"pe-9_obj","name":"objective","prose":"Determine if the organization protects power equipment and power cabling for the information system from damage and destruction."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing power equipment\/cabling protection\n\nfacilities housing power equipment\/cabling\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for protecting power equipment\/cabling\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing protection of power equipment\/cabling"}]}]},{"id":"pe-10","class":"SP800-53","title":"Emergency Shutoff","params":[{"id":"pe-10_prm_1","label":"organization-defined location by information system or system component"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-10"},{"name":"sort-id","value":"pe-10"}],"parts":[{"id":"pe-10_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-10_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Provides the capability of shutting off power to the information system or individual system components in emergency situations;"},{"id":"pe-10_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Places emergency shutoff switches or devices in {{ insert: param, pe-10_prm_1 }} to facilitate safe and easy access for personnel; and"},{"id":"pe-10_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Protects emergency power shutoff capability from unauthorized activation."}]},{"id":"pe-10_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms.","links":[{"href":"#pe-15","rel":"related"}]},{"id":"pe-10_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-10.a_obj","name":"objective","props":[{"name":"label","value":"PE-10(a)"}],"prose":"provides the capability of shutting off power to the information system or individual system components in emergency situations;"},{"id":"pe-10.b_obj","name":"objective","props":[{"name":"label","value":"PE-10(b)"}],"parts":[{"id":"pe-10.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-10(b)[1]"}],"prose":"defines the location of emergency shutoff switches or devices by information system or system component;"},{"id":"pe-10.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-10(b)[2]"}],"prose":"places emergency shutoff switches or devices in the organization-defined location by information system or system component to facilitate safe and easy access for personnel; and"}]},{"id":"pe-10.c_obj","name":"objective","props":[{"name":"label","value":"PE-10(c)"}],"prose":"protects emergency power shutoff capability from unauthorized activation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing power source emergency shutoff\n\nsecurity plan\n\nemergency shutoff controls or switches\n\nlocations housing emergency shutoff switches and devices\n\nsecurity safeguards protecting emergency power shutoff capability from unauthorized activation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for emergency power shutoff capability (both implementing and using the capability)\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing emergency power shutoff"}]}]},{"id":"pe-11","class":"SP800-53","title":"Emergency Power","params":[{"id":"pe-11_prm_1","select":{"how-many":"one-or-more","choice":["an orderly shutdown of the information system","transition of the information system to long-term alternate power"]}}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-11"},{"name":"sort-id","value":"pe-11"}],"parts":[{"id":"pe-11_smt","name":"statement","prose":"The organization provides a short-term uninterruptible power supply to facilitate {{ insert: param, pe-11_prm_1 }} in the event of a primary power source loss."},{"id":"pe-11_gdn","name":"guidance","links":[{"href":"#at-3","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#cp-7","rel":"related"}]},{"id":"pe-11_obj","name":"objective","prose":"Determine if the organization provides a short-term uninterruptible power supply to facilitate one or more of the following in the event of a primary power source loss:","parts":[{"id":"pe-11_obj.1","name":"objective","props":[{"name":"label","value":"PE-11[1]"}],"prose":"an orderly shutdown of the information system; and\/or"},{"id":"pe-11_obj.2","name":"objective","props":[{"name":"label","value":"PE-11[2]"}],"prose":"transition of the information system to long-term alternate power."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing emergency power\n\nuninterruptible power supply\n\nuninterruptible power supply documentation\n\nuninterruptible power supply test records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for emergency power and\/or planning\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing uninterruptible power supply\n\nthe uninterruptable power supply"}]}],"controls":[{"id":"pe-11.1","class":"SP800-53-enhancement","title":"Long-term Alternate Power Supply - Minimal Operational Capability","props":[{"name":"label","value":"PE-11(1)"},{"name":"sort-id","value":"pe-11.01"}],"parts":[{"id":"pe-11.1_smt","name":"statement","prose":"The organization provides a long-term alternate power supply for the information system that is capable of maintaining minimally required operational capability in the event of an extended loss of the primary power source."},{"id":"pe-11.1_gdn","name":"guidance","prose":"This control enhancement can be satisfied, for example, by the use of a secondary commercial power supply or other external power supply. Long-term alternate power supplies for the information system can be either manually or automatically activated."},{"id":"pe-11.1_obj","name":"objective","prose":"Determine if the organization provides a long-term alternate power supply for the information system that is capable of maintaining minimally required operational capability in the event of an extended loss of the primary power source."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing emergency power\n\nalternate power supply\n\nalternate power supply documentation\n\nalternate power supply test records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for emergency power and\/or planning\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing alternate power supply\n\nthe alternate power supply"}]}]}]},{"id":"pe-12","class":"SP800-53","title":"Emergency Lighting","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-12"},{"name":"sort-id","value":"pe-12"}],"parts":[{"id":"pe-12_smt","name":"statement","prose":"The organization employs and maintains automatic emergency lighting for the information system that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility."},{"id":"pe-12_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-7","rel":"related"}]},{"id":"pe-12_obj","name":"objective","prose":"Determine if the organization employs and maintains automatic emergency lighting for the information system that:","parts":[{"id":"pe-12_obj.1","name":"objective","props":[{"name":"label","value":"PE-12[1]"}],"prose":"activates in the event of a power outage or disruption; and"},{"id":"pe-12_obj.2","name":"objective","props":[{"name":"label","value":"PE-12[2]"}],"prose":"covers emergency exits and evacuation routes within the facility."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing emergency lighting\n\nemergency lighting documentation\n\nemergency lighting test records\n\nemergency exits and evacuation routes\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for emergency lighting and\/or planning\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing emergency lighting capability"}]}]},{"id":"pe-13","class":"SP800-53","title":"Fire Protection","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-13"},{"name":"sort-id","value":"pe-13"}],"parts":[{"id":"pe-13_smt","name":"statement","prose":"The organization employs and maintains fire suppression and detection devices\/systems for the information system that are supported by an independent energy source."},{"id":"pe-13_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms. Fire suppression and detection devices\/systems include, for example, sprinkler systems, handheld fire extinguishers, fixed fire hoses, and smoke detectors."},{"id":"pe-13_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-13_obj.1","name":"objective","props":[{"name":"label","value":"PE-13[1]"}],"prose":"employs fire suppression and detection devices\/systems for the information system that are supported by an independent energy source; and"},{"id":"pe-13_obj.2","name":"objective","props":[{"name":"label","value":"PE-13[2]"}],"prose":"maintains fire suppression and detection devices\/systems for the information system that are supported by an independent energy source."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing fire protection\n\nfire suppression and detection devices\/systems\n\nfire suppression and detection devices\/systems documentation\n\ntest records of fire suppression and detection devices\/systems\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for fire detection and suppression devices\/systems\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing fire suppression\/detection devices\/systems"}]}],"controls":[{"id":"pe-13.1","class":"SP800-53-enhancement","title":"Detection Devices \/ Systems","params":[{"id":"pe-13.1_prm_1","label":"organization-defined personnel or roles"},{"id":"pe-13.1_prm_2","label":"organization-defined emergency responders"}],"props":[{"name":"label","value":"PE-13(1)"},{"name":"sort-id","value":"pe-13.01"}],"parts":[{"id":"pe-13.1_smt","name":"statement","prose":"The organization employs fire detection devices\/systems for the information system that activate automatically and notify {{ insert: param, pe-13.1_prm_1 }} and {{ insert: param, pe-13.1_prm_2 }} in the event of a fire."},{"id":"pe-13.1_gdn","name":"guidance","prose":"Organizations can identify specific personnel, roles, and emergency responders in the event that individuals on the notification list must have appropriate access authorizations and\/or clearances, for example, to obtain access to facilities where classified operations are taking place or where there are information systems containing classified information."},{"id":"pe-13.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-13.1_obj.1","name":"objective","props":[{"name":"label","value":"PE-13(1)[1]"}],"prose":"defines personnel or roles to be notified in the event of a fire;"},{"id":"pe-13.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-13(1)[2]"}],"prose":"defines emergency responders to be notified in the event of a fire;"},{"id":"pe-13.1_obj.3","name":"objective","props":[{"name":"label","value":"PE-13(1)[3]"}],"prose":"employs fire detection devices\/systems for the information system that, in the event of a fire,:","parts":[{"id":"pe-13.1_obj.3.a","name":"objective","props":[{"name":"label","value":"PE-13(1)[3][a]"}],"prose":"activate automatically;"},{"id":"pe-13.1_obj.3.b","name":"objective","props":[{"name":"label","value":"PE-13(1)[3][b]"}],"prose":"notify organization-defined personnel or roles; and"},{"id":"pe-13.1_obj.3.c","name":"objective","props":[{"name":"label","value":"PE-13(1)[3][c]"}],"prose":"notify organization-defined emergency responders."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing fire protection\n\nfacility housing the information system\n\nalarm service-level agreements\n\ntest records of fire suppression and detection devices\/systems\n\nfire suppression and detection devices\/systems documentation\n\nalerts\/notifications of fire events\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for fire detection and suppression devices\/systems\n\norganizational personnel with responsibilities for notifying appropriate personnel, roles, and emergency responders of fires\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing fire detection devices\/systems\n\nactivation of fire detection devices\/systems (simulated)\n\nautomated notifications"}]}]},{"id":"pe-13.2","class":"SP800-53-enhancement","title":"Suppression Devices \/ Systems","params":[{"id":"pe-13.2_prm_1","label":"organization-defined personnel or roles"},{"id":"pe-13.2_prm_2","label":"organization-defined emergency responders"}],"props":[{"name":"label","value":"PE-13(2)"},{"name":"sort-id","value":"pe-13.02"}],"parts":[{"id":"pe-13.2_smt","name":"statement","prose":"The organization employs fire suppression devices\/systems for the information system that provide automatic notification of any activation to {{ insert: param, pe-13.2_prm_1 }} and {{ insert: param, pe-13.2_prm_2 }}."},{"id":"pe-13.2_gdn","name":"guidance","prose":"Organizations can identify specific personnel, roles, and emergency responders in the event that individuals on the notification list must have appropriate access authorizations and\/or clearances, for example, to obtain access to facilities where classified operations are taking place or where there are information systems containing classified information."},{"id":"pe-13.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-13.2_obj.1","name":"objective","props":[{"name":"label","value":"PE-13(2)[1]"}],"prose":"defines personnel or roles to be provided automatic notification of any activation of fire suppression devices\/systems for the information system;"},{"id":"pe-13.2_obj.2","name":"objective","props":[{"name":"label","value":"PE-13(2)[2]"}],"prose":"defines emergency responders to be provided automatic notification of any activation of fire suppression devices\/systems for the information system;"},{"id":"pe-13.2_obj.3","name":"objective","props":[{"name":"label","value":"PE-13(2)[3]"}],"prose":"employs fire suppression devices\/systems for the information system that provide automatic notification of any activation to:","parts":[{"id":"pe-13.2_obj.3.a","name":"objective","props":[{"name":"label","value":"PE-13(2)[3][a]"}],"prose":"organization-defined personnel or roles; and"},{"id":"pe-13.2_obj.3.b","name":"objective","props":[{"name":"label","value":"PE-13(2)[3][b]"}],"prose":"organization-defined emergency responders."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing fire protection\n\nfire suppression and detection devices\/systems documentation\n\nfacility housing the information system\n\nalarm service-level agreements\n\ntest records of fire suppression and detection devices\/systems\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for fire detection and suppression devices\/systems\n\norganizational personnel with responsibilities for providing automatic notifications of any activation of fire suppression devices\/systems to appropriate personnel, roles, and emergency responders\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing fire suppression devices\/systems\n\nactivation of fire suppression devices\/systems (simulated)\n\nautomated notifications"}]}]},{"id":"pe-13.3","class":"SP800-53-enhancement","title":"Automatic Fire Suppression","props":[{"name":"label","value":"PE-13(3)"},{"name":"sort-id","value":"pe-13.03"}],"parts":[{"id":"pe-13.3_smt","name":"statement","prose":"The organization employs an automatic fire suppression capability for the information system when the facility is not staffed on a continuous basis."},{"id":"pe-13.3_obj","name":"objective","prose":"Determine if the organization employs an automatic fire suppression capability for the information system when the facility is not staffed on a continuous basis."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing fire protection\n\nfire suppression and detection devices\/systems documentation\n\nfacility housing the information system\n\nalarm service-level agreements\n\ntest records of fire suppression and detection devices\/systems\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for fire detection and suppression devices\/systems\n\norganizational personnel with responsibilities for providing automatic notifications of any activation of fire suppression devices\/systems to appropriate personnel, roles, and emergency responders\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing fire suppression devices\/systems\n\nactivation of fire suppression devices\/systems (simulated)"}]}]}]},{"id":"pe-14","class":"SP800-53","title":"Temperature and Humidity Controls","params":[{"id":"pe-14_prm_1","label":"organization-defined acceptable levels"},{"id":"pe-14_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-14"},{"name":"sort-id","value":"pe-14"}],"parts":[{"id":"pe-14_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-14_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Maintains temperature and humidity levels within the facility where the information system resides at {{ insert: param, pe-14_prm_1 }}; and"},{"id":"pe-14_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Monitors temperature and humidity levels {{ insert: param, pe-14_prm_2 }}."}]},{"id":"pe-14_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources, for example, data centers, server rooms, and mainframe computer rooms.","links":[{"href":"#at-3","rel":"related"}]},{"id":"pe-14_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-14.a_obj","name":"objective","props":[{"name":"label","value":"PE-14(a)"}],"parts":[{"id":"pe-14.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-14(a)[1]"}],"prose":"defines acceptable temperature levels to be maintained within the facility where the information system resides;"},{"id":"pe-14.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-14(a)[2]"}],"prose":"defines acceptable humidity levels to be maintained within the facility where the information system resides;"},{"id":"pe-14.a_obj.3","name":"objective","props":[{"name":"label","value":"PE-14(a)[3]"}],"prose":"maintains temperature levels within the facility where the information system resides at the organization-defined levels;"},{"id":"pe-14.a_obj.4","name":"objective","props":[{"name":"label","value":"PE-14(a)[4]"}],"prose":"maintains humidity levels within the facility where the information system resides at the organization-defined levels;"}]},{"id":"pe-14.b_obj","name":"objective","props":[{"name":"label","value":"PE-14(b)"}],"parts":[{"id":"pe-14.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-14(b)[1]"}],"prose":"defines the frequency to monitor temperature levels;"},{"id":"pe-14.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-14(b)[2]"}],"prose":"defines the frequency to monitor humidity levels;"},{"id":"pe-14.b_obj.3","name":"objective","props":[{"name":"label","value":"PE-14(b)[3]"}],"prose":"monitors temperature levels with the organization-defined frequency; and"},{"id":"pe-14.b_obj.4","name":"objective","props":[{"name":"label","value":"PE-14(b)[4]"}],"prose":"monitors humidity levels with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing temperature and humidity control\n\nsecurity plan\n\ntemperature and humidity controls\n\nfacility housing the information system\n\ntemperature and humidity controls documentation\n\ntemperature and humidity records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for information system environmental controls\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing maintenance and monitoring of temperature and humidity levels"}]}]},{"id":"pe-15","class":"SP800-53","title":"Water Damage Protection","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-15"},{"name":"sort-id","value":"pe-15"}],"parts":[{"id":"pe-15_smt","name":"statement","prose":"The organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are accessible, working properly, and known to key personnel."},{"id":"pe-15_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms. Isolation valves can be employed in addition to or in lieu of master shutoff valves to shut off water supplies in specific areas of concern, without affecting entire organizations.","links":[{"href":"#at-3","rel":"related"}]},{"id":"pe-15_obj","name":"objective","prose":"Determine if the organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are:","parts":[{"id":"pe-15_obj.1","name":"objective","props":[{"name":"label","value":"PE-15[1]"}],"prose":"accessible;"},{"id":"pe-15_obj.2","name":"objective","props":[{"name":"label","value":"PE-15[2]"}],"prose":"working properly; and"},{"id":"pe-15_obj.3","name":"objective","props":[{"name":"label","value":"PE-15[3]"}],"prose":"known to key personnel."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing water damage protection\n\nfacility housing the information system\n\nmaster shutoff valves\n\nlist of key personnel with knowledge of location and activation procedures for master shutoff valves for the plumbing system\n\nmaster shutoff valve documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for information system environmental controls\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Master water-shutoff valves\n\norganizational process for activating master water-shutoff"}]}],"controls":[{"id":"pe-15.1","class":"SP800-53-enhancement","title":"Automation Support","params":[{"id":"pe-15.1_prm_1","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"PE-15(1)"},{"name":"sort-id","value":"pe-15.01"}],"parts":[{"id":"pe-15.1_smt","name":"statement","prose":"The organization employs automated mechanisms to detect the presence of water in the vicinity of the information system and alerts {{ insert: param, pe-15.1_prm_1 }}."},{"id":"pe-15.1_gdn","name":"guidance","prose":"Automated mechanisms can include, for example, water detection sensors, alarms, and notification systems."},{"id":"pe-15.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-15.1_obj.1","name":"objective","props":[{"name":"label","value":"PE-15(1)[1]"}],"prose":"defines personnel or roles to be alerted when the presence of water is detected in the vicinity of the information system;"},{"id":"pe-15.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-15(1)[2]"}],"prose":"employs automated mechanisms to detect the presence of water in the vicinity of the information system; and"},{"id":"pe-15.1_obj.3","name":"objective","props":[{"name":"label","value":"PE-15(1)[3]"}],"prose":"alerts organization-defined personnel or roles when the presence of water is detected in the vicinity of the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing water damage protection\n\nfacility housing the information system\n\nautomated mechanisms for water shutoff valves\n\nautomated mechanisms detecting presence of water in vicinity of information system\n\nalerts\/notifications of water detection in information system facility\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for information system environmental controls\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing water detection capability and alerts for the information system"}]}]}]},{"id":"pe-16","class":"SP800-53","title":"Delivery and Removal","params":[{"id":"pe-16_prm_1","label":"organization-defined types of information system components"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PE-16"},{"name":"sort-id","value":"pe-16"}],"parts":[{"id":"pe-16_smt","name":"statement","prose":"The organization authorizes, monitors, and controls {{ insert: param, pe-16_prm_1 }} entering and exiting the facility and maintains records of those items."},{"id":"pe-16_gdn","name":"guidance","prose":"Effectively enforcing authorizations for entry and exit of information system components may require restricting access to delivery areas and possibly isolating the areas from the information system and media libraries.","links":[{"href":"#cm-3","rel":"related"},{"href":"#ma-2","rel":"related"},{"href":"#ma-3","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#sa-12","rel":"related"}]},{"id":"pe-16_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-16_obj.1","name":"objective","props":[{"name":"label","value":"PE-16[1]"}],"prose":"defines types of information system components to be authorized, monitored, and controlled as such components are entering and exiting the facility;"},{"id":"pe-16_obj.2","name":"objective","props":[{"name":"label","value":"PE-16[2]"}],"prose":"authorizes organization-defined information system components entering the facility;"},{"id":"pe-16_obj.3","name":"objective","props":[{"name":"label","value":"PE-16[3]"}],"prose":"monitors organization-defined information system components entering the facility;"},{"id":"pe-16_obj.4","name":"objective","props":[{"name":"label","value":"PE-16[4]"}],"prose":"controls organization-defined information system components entering the facility;"},{"id":"pe-16_obj.5","name":"objective","props":[{"name":"label","value":"PE-16[5]"}],"prose":"authorizes organization-defined information system components exiting the facility;"},{"id":"pe-16_obj.6","name":"objective","props":[{"name":"label","value":"PE-16[6]"}],"prose":"monitors organization-defined information system components exiting the facility;"},{"id":"pe-16_obj.7","name":"objective","props":[{"name":"label","value":"PE-16[7]"}],"prose":"controls organization-defined information system components exiting the facility;"},{"id":"pe-16_obj.8","name":"objective","props":[{"name":"label","value":"PE-16[8]"}],"prose":"maintains records of information system components entering the facility; and"},{"id":"pe-16_obj.9","name":"objective","props":[{"name":"label","value":"PE-16[9]"}],"prose":"maintains records of information system components exiting the facility."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing delivery and removal of information system components from the facility\n\nsecurity plan\n\nfacility housing the information system\n\nrecords of items entering and exiting the facility\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for controlling information system components entering and exiting the facility\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for authorizing, monitoring, and controlling information system-related items entering and exiting the facility\n\nautomated mechanisms supporting and\/or implementing authorizing, monitoring, and controlling information system-related items entering and exiting the facility"}]}]},{"id":"pe-17","class":"SP800-53","title":"Alternate Work Site","params":[{"id":"pe-17_prm_1","label":"organization-defined security controls"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PE-17"},{"name":"sort-id","value":"pe-17"}],"links":[{"href":"#5309d4d0-46f8-4213-a749-e7584164e5e8","rel":"reference"}],"parts":[{"id":"pe-17_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-17_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Employs {{ insert: param, pe-17_prm_1 }} at alternate work sites;"},{"id":"pe-17_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Assesses as feasible, the effectiveness of security controls at alternate work sites; and"},{"id":"pe-17_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Provides a means for employees to communicate with information security personnel in case of security incidents or problems."}]},{"id":"pe-17_gdn","name":"guidance","prose":"Alternate work sites may include, for example, government facilities or private residences of employees. While commonly distinct from alternative processing sites, alternate work sites may provide readily available alternate locations as part of contingency operations. Organizations may define different sets of security controls for specific alternate work sites or types of sites depending on the work-related activities conducted at those sites. This control supports the contingency planning activities of organizations and the federal telework initiative.","links":[{"href":"#ac-17","rel":"related"},{"href":"#cp-7","rel":"related"}]},{"id":"pe-17_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-17.a_obj","name":"objective","props":[{"name":"label","value":"PE-17(a)"}],"parts":[{"id":"pe-17.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-17(a)[1]"}],"prose":"defines security controls to be employed at alternate work sites;"},{"id":"pe-17.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-17(a)[2]"}],"prose":"employs organization-defined security controls at alternate work sites;"}]},{"id":"pe-17.b_obj","name":"objective","props":[{"name":"label","value":"PE-17(b)"}],"prose":"assesses, as feasible, the effectiveness of security controls at alternate work sites; and"},{"id":"pe-17.c_obj","name":"objective","props":[{"name":"label","value":"PE-17(c)"}],"prose":"provides a means for employees to communicate with information security personnel in case of security incidents or problems."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing alternate work sites for organizational personnel\n\nsecurity plan\n\nlist of security controls required for alternate work sites\n\nassessments of security controls at alternate work sites\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel approving use of alternate work sites\n\norganizational personnel using alternate work sites\n\norganizational personnel assessing controls at alternate work sites\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security at alternate work sites\n\nautomated mechanisms supporting alternate work sites\n\nsecurity controls employed at alternate work sites\n\nmeans of communications between personnel at alternate work sites and security personnel"}]}]},{"id":"pe-18","class":"SP800-53","title":"Location of Information System Components","params":[{"id":"pe-18_prm_1","label":"organization-defined physical and environmental hazards"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"PE-18"},{"name":"sort-id","value":"pe-18"}],"parts":[{"id":"pe-18_smt","name":"statement","prose":"The organization positions information system components within the facility to minimize potential damage from {{ insert: param, pe-18_prm_1 }} and to minimize the opportunity for unauthorized access."},{"id":"pe-18_gdn","name":"guidance","prose":"Physical and environmental hazards include, for example, flooding, fire, tornados, earthquakes, hurricanes, acts of terrorism, vandalism, electromagnetic pulse, electrical interference, and other forms of incoming electromagnetic radiation. In addition, organizations consider the location of physical entry points where unauthorized individuals, while not being granted access, might nonetheless be in close proximity to information systems and therefore increase the potential for unauthorized access to organizational communications (e.g., through the use of wireless sniffers or microphones).","links":[{"href":"#cp-2","rel":"related"},{"href":"#pe-19","rel":"related"},{"href":"#ra-3","rel":"related"}]},{"id":"pe-18_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-18_obj.1","name":"objective","props":[{"name":"label","value":"PE-18[1]"}],"prose":"defines physical hazards that could result in potential damage to information system components within the facility;"},{"id":"pe-18_obj.2","name":"objective","props":[{"name":"label","value":"PE-18[2]"}],"prose":"defines environmental hazards that could result in potential damage to information system components within the facility;"},{"id":"pe-18_obj.3","name":"objective","props":[{"name":"label","value":"PE-18[3]"}],"prose":"positions information system components within the facility to minimize potential damage from organization-defined physical and environmental hazards; and"},{"id":"pe-18_obj.4","name":"objective","props":[{"name":"label","value":"PE-18[4]"}],"prose":"positions information system components within the facility to minimize the opportunity for unauthorized access."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing positioning of information system components\n\ndocumentation providing the location and position of information system components within the facility\n\nlocations housing information system components within the facility\n\nlist of physical and environmental hazards with potential to damage information system components within the facility\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for positioning information system components\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for positioning information system components"}]}]}]},{"id":"pl","class":"family","title":"Planning","controls":[{"id":"pl-1","class":"SP800-53","title":"Security Planning Policy and Procedures","params":[{"id":"pl-1_prm_1","label":"organization-defined personnel or roles"},{"id":"pl-1_prm_2","label":"organization-defined frequency"},{"id":"pl-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PL-1"},{"name":"sort-id","value":"pl-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9c5c9e8c-dc81-4f55-a11c-d71d7487790f","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"pl-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, pl-1_prm_1 }}:","parts":[{"id":"pl-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A security planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"pl-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the security planning policy and associated security planning controls; and"}]},{"id":"pl-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"pl-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security planning policy {{ insert: param, pl-1_prm_2 }}; and"},{"id":"pl-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Security planning procedures {{ insert: param, pl-1_prm_3 }}."}]}]},{"id":"pl-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the PL family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"pl-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-1.a_obj","name":"objective","props":[{"name":"label","value":"PL-1(a)"}],"parts":[{"id":"pl-1.a.1_obj","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)"}],"parts":[{"id":"pl-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1]"}],"prose":"develops and documents a planning policy that addresses:","parts":[{"id":"pl-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"pl-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"pl-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"pl-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"pl-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"pl-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"pl-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"pl-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the planning policy is to be disseminated;"},{"id":"pl-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[3]"}],"prose":"disseminates the planning policy to organization-defined personnel or roles;"}]},{"id":"pl-1.a.2_obj","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)"}],"parts":[{"id":"pl-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the planning policy and associated planning controls;"},{"id":"pl-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"pl-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"pl-1.b_obj","name":"objective","props":[{"name":"label","value":"PL-1(b)"}],"parts":[{"id":"pl-1.b.1_obj","name":"objective","props":[{"name":"label","value":"PL-1(b)(1)"}],"parts":[{"id":"pl-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current planning policy;"},{"id":"pl-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(b)(1)[2]"}],"prose":"reviews and updates the current planning policy with the organization-defined frequency;"}]},{"id":"pl-1.b.2_obj","name":"objective","props":[{"name":"label","value":"PL-1(b)(2)"}],"parts":[{"id":"pl-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current planning procedures; and"},{"id":"pl-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(b)(2)[2]"}],"prose":"reviews and updates the current planning procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Planning policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with planning responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"pl-2","class":"SP800-53","title":"System Security Plan","params":[{"id":"pl-2_prm_1","label":"organization-defined personnel or roles"},{"id":"pl-2_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PL-2"},{"name":"sort-id","value":"pl-02"}],"links":[{"href":"#9c5c9e8c-dc81-4f55-a11c-d71d7487790f","rel":"reference"}],"parts":[{"id":"pl-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a security plan for the information system that:","parts":[{"id":"pl-2_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Is consistent with the organization’s enterprise architecture;"},{"id":"pl-2_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Explicitly defines the authorization boundary for the system;"},{"id":"pl-2_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Describes the operational context of the information system in terms of missions and business processes;"},{"id":"pl-2_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Provides the security categorization of the information system including supporting rationale;"},{"id":"pl-2_smt.a.5","name":"item","props":[{"name":"label","value":"5."}],"prose":"Describes the operational environment for the information system and relationships with or connections to other information systems;"},{"id":"pl-2_smt.a.6","name":"item","props":[{"name":"label","value":"6."}],"prose":"Provides an overview of the security requirements for the system;"},{"id":"pl-2_smt.a.7","name":"item","props":[{"name":"label","value":"7."}],"prose":"Identifies any relevant overlays, if applicable;"},{"id":"pl-2_smt.a.8","name":"item","props":[{"name":"label","value":"8."}],"prose":"Describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring decisions; and"},{"id":"pl-2_smt.a.9","name":"item","props":[{"name":"label","value":"9."}],"prose":"Is reviewed and approved by the authorizing official or designated representative prior to plan implementation;"}]},{"id":"pl-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Distributes copies of the security plan and communicates subsequent changes to the plan to {{ insert: param, pl-2_prm_1 }};"},{"id":"pl-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the security plan for the information system {{ insert: param, pl-2_prm_2 }};"},{"id":"pl-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Updates the plan to address changes to the information system\/environment of operation or problems identified during plan implementation or security control assessments; and"},{"id":"pl-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Protects the security plan from unauthorized disclosure and modification."}]},{"id":"pl-2_gdn","name":"guidance","prose":"Security plans relate security requirements to a set of security controls and control enhancements. Security plans also describe, at a high level, how the security controls and control enhancements meet those security requirements, but do not provide detailed, technical descriptions of the specific design or implementation of the controls\/enhancements. Security plans contain sufficient information (including the specification of parameter values for assignment and selection statements either explicitly or by reference) to enable a design and implementation that is unambiguously compliant with the intent of the plans and subsequent determinations of risk to organizational operations and assets, individuals, other organizations, and the Nation if the plan is implemented as intended. Organizations can also apply tailoring guidance to the security control baselines in Appendix D and CNSS Instruction 1253 to develop overlays for community-wide use or to address specialized requirements, technologies, or missions\/environments of operation (e.g., DoD-tactical, Federal Public Key Infrastructure, or Federal Identity, Credential, and Access Management, space operations). Appendix I provides guidance on developing overlays. Security plans need not be single documents; the plans can be a collection of various documents including documents that already exist. Effective security plans make extensive use of references to policies, procedures, and additional documents (e.g., design and implementation specifications) where more detailed information can be obtained. This reduces the documentation requirements associated with security programs and maintains security-related information in other established management\/operational areas related to enterprise architecture, system development life cycle, systems engineering, and acquisition. For example, security plans do not contain detailed contingency plan or incident response plan information but instead provide explicitly or by reference, sufficient information to define what needs to be accomplished by those plans.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ca-2","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#pl-7","rel":"related"},{"href":"#pm-1","rel":"related"},{"href":"#pm-7","rel":"related"},{"href":"#pm-8","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#pm-11","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-17","rel":"related"}]},{"id":"pl-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-2.a_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)"}],"prose":"develops a security plan for the information system that:","parts":[{"id":"pl-2.a.1_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(1)"}],"prose":"is consistent with the organization’s enterprise architecture;"},{"id":"pl-2.a.2_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(2)"}],"prose":"explicitly defines the authorization boundary for the system;"},{"id":"pl-2.a.3_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(3)"}],"prose":"describes the operational context of the information system in terms of missions and business processes;"},{"id":"pl-2.a.4_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(4)"}],"prose":"provides the security categorization of the information system including supporting rationale;"},{"id":"pl-2.a.5_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(5)"}],"prose":"describes the operational environment for the information system and relationships with or connections to other information systems;"},{"id":"pl-2.a.6_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(6)"}],"prose":"provides an overview of the security requirements for the system;"},{"id":"pl-2.a.7_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(7)"}],"prose":"identifies any relevant overlays, if applicable;"},{"id":"pl-2.a.8_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(8)"}],"prose":"describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring and supplemental decisions;"},{"id":"pl-2.a.9_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(9)"}],"prose":"is reviewed and approved by the authorizing official or designated representative prior to plan implementation;"}]},{"id":"pl-2.b_obj","name":"objective","props":[{"name":"label","value":"PL-2(b)"}],"parts":[{"id":"pl-2.b_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(b)[1]"}],"prose":"defines personnel or roles to whom copies of the security plan are to be distributed and subsequent changes to the plan are to be communicated;"},{"id":"pl-2.b_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(b)[2]"}],"prose":"distributes copies of the security plan and communicates subsequent changes to the plan to organization-defined personnel or roles;"}]},{"id":"pl-2.c_obj","name":"objective","props":[{"name":"label","value":"PL-2(c)"}],"parts":[{"id":"pl-2.c_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(c)[1]"}],"prose":"defines the frequency to review the security plan for the information system;"},{"id":"pl-2.c_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(c)[2]"}],"prose":"reviews the security plan for the information system with the organization-defined frequency;"}]},{"id":"pl-2.d_obj","name":"objective","props":[{"name":"label","value":"PL-2(d)"}],"prose":"updates the plan to address:","parts":[{"id":"pl-2.d_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(d)[1]"}],"prose":"changes to the information system\/environment of operation;"},{"id":"pl-2.d_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(d)[2]"}],"prose":"problems identified during plan implementation;"},{"id":"pl-2.d_obj.3","name":"objective","props":[{"name":"label","value":"PL-2(d)[3]"}],"prose":"problems identified during security control assessments;"}]},{"id":"pl-2.e_obj","name":"objective","props":[{"name":"label","value":"PL-2(e)"}],"prose":"protects the security plan from unauthorized:","parts":[{"id":"pl-2.e_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(e)[1]"}],"prose":"disclosure; and"},{"id":"pl-2.e_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(e)[2]"}],"prose":"modification."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\nprocedures addressing security plan development and implementation\n\nprocedures addressing security plan reviews and updates\n\nenterprise architecture documentation\n\nsecurity plan for the information system\n\nrecords of security plan reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security plan development\/review\/update\/approval\n\nautomated mechanisms supporting the information system security plan"}]}],"controls":[{"id":"pl-2.3","class":"SP800-53-enhancement","title":"Plan \/ Coordinate with Other Organizational Entities","params":[{"id":"pl-2.3_prm_1","label":"organization-defined individuals or groups"}],"props":[{"name":"label","value":"PL-2(3)"},{"name":"sort-id","value":"pl-02.03"}],"parts":[{"id":"pl-2.3_smt","name":"statement","prose":"The organization plans and coordinates security-related activities affecting the information system with {{ insert: param, pl-2.3_prm_1 }} before conducting such activities in order to reduce the impact on other organizational entities."},{"id":"pl-2.3_gdn","name":"guidance","prose":"Security-related activities include, for example, security assessments, audits, hardware and software maintenance, patch management, and contingency plan testing. Advance planning and coordination includes emergency and nonemergency (i.e., planned or nonurgent unplanned) situations. The process defined by organizations to plan and coordinate security-related activities can be included in security plans for information systems or other documents, as appropriate.","links":[{"href":"#cp-4","rel":"related"},{"href":"#ir-4","rel":"related"}]},{"id":"pl-2.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-2.3_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(3)[1]"}],"prose":"defines individuals or groups with whom security-related activities affecting the information system are to be planned and coordinated before conducting such activities in order to reduce the impact on other organizational entities; and"},{"id":"pl-2.3_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(3)[2]"}],"prose":"plans and coordinates security-related activities affecting the information system with organization-defined individuals or groups before conducting such activities in order to reduce the impact on other organizational entities."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\naccess control policy\n\ncontingency planning policy\n\nprocedures addressing security-related activity planning for the information system\n\nsecurity plan for the information system\n\ncontingency plan for the information system\n\ninformation system design documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security planning and plan implementation responsibilities\n\norganizational individuals or groups with whom security-related activities are to be planned and coordinated\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"pl-4","class":"SP800-53","title":"Rules of Behavior","params":[{"id":"pl-4_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PL-4"},{"name":"sort-id","value":"pl-04"}],"links":[{"href":"#9c5c9e8c-dc81-4f55-a11c-d71d7487790f","rel":"reference"}],"parts":[{"id":"pl-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes and makes readily available to individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;"},{"id":"pl-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Receives a signed acknowledgment from such individuals, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the information system;"},{"id":"pl-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews and updates the rules of behavior {{ insert: param, pl-4_prm_1 }}; and"},{"id":"pl-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Requires individuals who have signed a previous version of the rules of behavior to read and re-sign when the rules of behavior are revised\/updated."}]},{"id":"pl-4_gdn","name":"guidance","prose":"This control enhancement applies to organizational users. Organizations consider rules of behavior based on individual user roles and responsibilities, differentiating, for example, between rules that apply to privileged users and rules that apply to general users. Establishing rules of behavior for some types of non-organizational users including, for example, individuals who simply receive data\/information from federal information systems, is often not feasible given the large number of such users and the limited nature of their interactions with the systems. Rules of behavior for both organizational and non-organizational users can also be established in AC-8, System Use Notification. PL-4 b. (the signed acknowledgment portion of this control) may be satisfied by the security awareness training and role-based security training programs conducted by organizations if such training includes rules of behavior. Organizations can use electronic signatures for acknowledging rules of behavior.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-8","rel":"related"},{"href":"#ac-9","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#mp-7","rel":"related"},{"href":"#ps-6","rel":"related"},{"href":"#ps-8","rel":"related"},{"href":"#sa-5","rel":"related"}]},{"id":"pl-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-4.a_obj","name":"objective","props":[{"name":"label","value":"PL-4(a)"}],"parts":[{"id":"pl-4.a_obj.1","name":"objective","props":[{"name":"label","value":"PL-4(a)[1]"}],"prose":"establishes, for individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;"},{"id":"pl-4.a_obj.2","name":"objective","props":[{"name":"label","value":"PL-4(a)[2]"}],"prose":"makes readily available to individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;"}]},{"id":"pl-4.b_obj","name":"objective","props":[{"name":"label","value":"PL-4(b)"}],"prose":"receives a signed acknowledgement from such individuals, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the information system;"},{"id":"pl-4.c_obj","name":"objective","props":[{"name":"label","value":"PL-4(c)"}],"parts":[{"id":"pl-4.c_obj.1","name":"objective","props":[{"name":"label","value":"PL-4(c)[1]"}],"prose":"defines the frequency to review and update the rules of behavior;"},{"id":"pl-4.c_obj.2","name":"objective","props":[{"name":"label","value":"PL-4(c)[2]"}],"prose":"reviews and updates the rules of behavior with the organization-defined frequency; and"}]},{"id":"pl-4.d_obj","name":"objective","props":[{"name":"label","value":"PL-4(d)"}],"prose":"requires individuals who have signed a previous version of the rules of behavior to read and resign when the rules of behavior are revised\/updated."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\nprocedures addressing rules of behavior for information system users\n\nrules of behavior\n\nsigned acknowledgements\n\nrecords for rules of behavior reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for establishing, reviewing, and updating rules of behavior\n\norganizational personnel who are authorized users of the information system and have signed and resigned rules of behavior\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for establishing, reviewing, disseminating, and updating rules of behavior\n\nautomated mechanisms supporting and\/or implementing the establishment, review, dissemination, and update of rules of behavior"}]}],"controls":[{"id":"pl-4.1","class":"SP800-53-enhancement","title":"Social Media and Networking Restrictions","props":[{"name":"label","value":"PL-4(1)"},{"name":"sort-id","value":"pl-04.01"}],"parts":[{"id":"pl-4.1_smt","name":"statement","prose":"The organization includes in the rules of behavior, explicit restrictions on the use of social media\/networking sites and posting organizational information on public websites."},{"id":"pl-4.1_gdn","name":"guidance","prose":"This control enhancement addresses rules of behavior related to the use of social media\/networking sites: (i) when organizational personnel are using such sites for official duties or in the conduct of official business; (ii) when organizational information is involved in social media\/networking transactions; and (iii) when personnel are accessing social media\/networking sites from organizational information systems. Organizations also address specific rules that prevent unauthorized entities from obtaining and\/or inferring non-public organizational information (e.g., system account information, personally identifiable information) from social media\/networking sites."},{"id":"pl-4.1_obj","name":"objective","prose":"Determine if the organization includes the following in the rules of behavior:","parts":[{"id":"pl-4.1_obj.1","name":"objective","props":[{"name":"label","value":"PL-4(1)[1]"}],"prose":"explicit restrictions on the use of social media\/networking sites; and"},{"id":"pl-4.1_obj.2","name":"objective","props":[{"name":"label","value":"PL-4(1)[2]"}],"prose":"posting organizational information on public websites."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\nprocedures addressing rules of behavior for information system users\n\nrules of behavior\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for establishing, reviewing, and updating rules of behavior\n\norganizational personnel who are authorized users of the information system and have signed rules of behavior\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for establishing rules of behavior\n\nautomated mechanisms supporting and\/or implementing the establishment of rules of behavior"}]}]}]},{"id":"pl-8","class":"SP800-53","title":"Information Security Architecture","params":[{"id":"pl-8_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PL-8"},{"name":"sort-id","value":"pl-08"}],"parts":[{"id":"pl-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops an information security architecture for the information system that:","parts":[{"id":"pl-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Describes the overall philosophy, requirements, and approach to be taken with regard to protecting the confidentiality, integrity, and availability of organizational information;"},{"id":"pl-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Describes how the information security architecture is integrated into and supports the enterprise architecture; and"},{"id":"pl-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Describes any information security assumptions about, and dependencies on, external services;"}]},{"id":"pl-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the information security architecture {{ insert: param, pl-8_prm_1 }} to reflect updates in the enterprise architecture; and"},{"id":"pl-8_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensures that planned information security architecture changes are reflected in the security plan, the security Concept of Operations (CONOPS), and organizational procurements\/acquisitions."}]},{"id":"pl-8_gdn","name":"guidance","prose":"This control addresses actions taken by organizations in the design and development of information systems. The information security architecture at the individual information system level is consistent with and complements the more global, organization-wide information security architecture described in PM-7 that is integral to and developed as part of the enterprise architecture. The information security architecture includes an architectural description, the placement\/allocation of security functionality (including security controls), security-related information for external interfaces, information being exchanged across the interfaces, and the protection mechanisms associated with each interface. In addition, the security architecture can include other important security-related information, for example, user roles and access privileges assigned to each role, unique security requirements, the types of information processed, stored, and transmitted by the information system, restoration priorities of information and information system services, and any other specific protection needs. In today’s modern architecture, it is becoming less common for organizations to control all information resources. There are going to be key dependencies on external information services and service providers. Describing such dependencies in the information security architecture is important to developing a comprehensive mission\/business protection strategy. Establishing, developing, documenting, and maintaining under configuration control, a baseline configuration for organizational information systems is critical to implementing and maintaining an effective information security architecture. The development of the information security architecture is coordinated with the Senior Agency Official for Privacy (SAOP)\/Chief Privacy Officer (CPO) to ensure that security controls needed to support privacy requirements are identified and effectively implemented. PL-8 is primarily directed at organizations (i.e., internally focused) to help ensure that organizations develop an information security architecture for the information system, and that the security architecture is integrated with or tightly coupled to the enterprise architecture through the organization-wide information security architecture. In contrast, SA-17 is primarily directed at external information technology product\/system developers and integrators (although SA-17 could be used internally within organizations for in-house system development). SA-17, which is complementary to PL-8, is selected when organizations outsource the development of information systems or information system components to external entities, and there is a need to demonstrate\/show consistency with the organization’s enterprise architecture and information security architecture.","links":[{"href":"#cm-2","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#pm-7","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-17","rel":"related"},{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-53r4","rel":"related"}]},{"id":"pl-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-8.a_obj","name":"objective","props":[{"name":"label","value":"PL-8(a)"}],"prose":"develops an information security architecture for the information system that describes:","parts":[{"id":"pl-8.a.1_obj","name":"objective","props":[{"name":"label","value":"PL-8(a)(1)"}],"prose":"the overall philosophy, requirements, and approach to be taken with regard to protecting the confidentiality, integrity, and availability of organizational information;"},{"id":"pl-8.a.2_obj","name":"objective","props":[{"name":"label","value":"PL-8(a)(2)"}],"prose":"how the information security architecture is integrated into and supports the enterprise architecture;"},{"id":"pl-8.a.3_obj","name":"objective","props":[{"name":"label","value":"PL-8(a)(3)"}],"prose":"any information security assumptions about, and dependencies on, external services;"}]},{"id":"pl-8.b_obj","name":"objective","props":[{"name":"label","value":"PL-8(b)"}],"parts":[{"id":"pl-8.b_obj.1","name":"objective","props":[{"name":"label","value":"PL-8(b)[1]"}],"prose":"defines the frequency to review and update the information security architecture;"},{"id":"pl-8.b_obj.2","name":"objective","props":[{"name":"label","value":"PL-8(b)[2]"}],"prose":"reviews and updates the information security architecture with the organization-defined frequency to reflect updates in the enterprise architecture;"}]},{"id":"pl-8.c_obj","name":"objective","props":[{"name":"label","value":"PL-8(c)"}],"prose":"ensures that planned information security architecture changes are reflected in:","parts":[{"id":"pl-8.c_obj.1","name":"objective","props":[{"name":"label","value":"PL-8(c)[1]"}],"prose":"the security plan;"},{"id":"pl-8.c_obj.2","name":"objective","props":[{"name":"label","value":"PL-8(c)[2]"}],"prose":"the security Concept of Operations (CONOPS); and"},{"id":"pl-8.c_obj.3","name":"objective","props":[{"name":"label","value":"PL-8(c)[3]"}],"prose":"the organizational procurements\/acquisitions."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\nprocedures addressing information security architecture development\n\nprocedures addressing information security architecture reviews and updates\n\nenterprise architecture documentation\n\ninformation security architecture documentation\n\nsecurity plan for the information system\n\nsecurity CONOPS for the information system\n\nrecords of information security architecture reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security planning and plan implementation responsibilities\n\norganizational personnel with information security architecture development responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for developing, reviewing, and updating the information security architecture\n\nautomated mechanisms supporting and\/or implementing the development, review, and update of the information security architecture"}]}]}]},{"id":"ps","class":"family","title":"Personnel Security","controls":[{"id":"ps-1","class":"SP800-53","title":"Personnel Security Policy and Procedures","params":[{"id":"ps-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ps-1_prm_2","label":"organization-defined frequency"},{"id":"ps-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-1"},{"name":"sort-id","value":"ps-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ps-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ps-1_prm_1 }}:","parts":[{"id":"ps-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A personnel security policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ps-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the personnel security policy and associated personnel security controls; and"}]},{"id":"ps-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ps-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Personnel security policy {{ insert: param, ps-1_prm_2 }}; and"},{"id":"ps-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Personnel security procedures {{ insert: param, ps-1_prm_3 }}."}]}]},{"id":"ps-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the PS family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ps-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-1.a_obj","name":"objective","props":[{"name":"label","value":"PS-1(a)"}],"parts":[{"id":"ps-1.a.1_obj","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)"}],"parts":[{"id":"ps-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1]"}],"prose":"develops and documents an personnel security policy that addresses:","parts":[{"id":"ps-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ps-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ps-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ps-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ps-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ps-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ps-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ps-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the personnel security policy is to be disseminated;"},{"id":"ps-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[3]"}],"prose":"disseminates the personnel security policy to organization-defined personnel or roles;"}]},{"id":"ps-1.a.2_obj","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)"}],"parts":[{"id":"ps-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the personnel security policy and associated personnel security controls;"},{"id":"ps-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ps-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ps-1.b_obj","name":"objective","props":[{"name":"label","value":"PS-1(b)"}],"parts":[{"id":"ps-1.b.1_obj","name":"objective","props":[{"name":"label","value":"PS-1(b)(1)"}],"parts":[{"id":"ps-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current personnel security policy;"},{"id":"ps-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(b)(1)[2]"}],"prose":"reviews and updates the current personnel security policy with the organization-defined frequency;"}]},{"id":"ps-1.b.2_obj","name":"objective","props":[{"name":"label","value":"PS-1(b)(2)"}],"parts":[{"id":"ps-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current personnel security procedures; and"},{"id":"ps-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(b)(2)[2]"}],"prose":"reviews and updates the current personnel security procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access control responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ps-2","class":"SP800-53","title":"Position Risk Designation","params":[{"id":"ps-2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-2"},{"name":"sort-id","value":"ps-02"}],"links":[{"href":"#0c97e60b-325a-4efa-ba2b-90f20ccd5abc","rel":"reference"}],"parts":[{"id":"ps-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Assigns a risk designation to all organizational positions;"},{"id":"ps-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishes screening criteria for individuals filling those positions; and"},{"id":"ps-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews and updates position risk designations {{ insert: param, ps-2_prm_1 }}."}]},{"id":"ps-2_gdn","name":"guidance","prose":"Position risk designations reflect Office of Personnel Management policy and guidance. Risk designations can guide and inform the types of authorizations individuals receive when accessing organizational information and information systems. Position screening criteria include explicit information security role appointment requirements (e.g., training, security clearances).","links":[{"href":"#at-3","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#ps-3","rel":"related"}]},{"id":"ps-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-2.a_obj","name":"objective","props":[{"name":"label","value":"PS-2(a)"}],"prose":"assigns a risk designation to all organizational positions;"},{"id":"ps-2.b_obj","name":"objective","props":[{"name":"label","value":"PS-2(b)"}],"prose":"establishes screening criteria for individuals filling those positions;"},{"id":"ps-2.c_obj","name":"objective","props":[{"name":"label","value":"PS-2(c)"}],"parts":[{"id":"ps-2.c_obj.1","name":"objective","props":[{"name":"label","value":"PS-2(c)[1]"}],"prose":"defines the frequency to review and update position risk designations; and"},{"id":"ps-2.c_obj.2","name":"objective","props":[{"name":"label","value":"PS-2(c)[2]"}],"prose":"reviews and updates position risk designations with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing position categorization\n\nappropriate codes of federal regulations\n\nlist of risk designations for organizational positions\n\nsecurity plan\n\nrecords of position risk designation reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for assigning, reviewing, and updating position risk designations\n\norganizational processes for establishing screening criteria"}]}]},{"id":"ps-3","class":"SP800-53","title":"Personnel Screening","params":[{"id":"ps-3_prm_1","label":"organization-defined conditions requiring rescreening and, where rescreening is so indicated, the frequency of such rescreening"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-3"},{"name":"sort-id","value":"ps-03"}],"links":[{"href":"#0c97e60b-325a-4efa-ba2b-90f20ccd5abc","rel":"reference"},{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#6caa237b-531b-43ac-9711-d8f6b97b0377","rel":"reference"}],"parts":[{"id":"ps-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Screens individuals prior to authorizing access to the information system; and"},{"id":"ps-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Rescreens individuals according to {{ insert: param, ps-3_prm_1 }}."}]},{"id":"ps-3_gdn","name":"guidance","prose":"Personnel screening and rescreening activities reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, guidance, and specific criteria established for the risk designations of assigned positions. Organizations may define different rescreening conditions and frequencies for personnel accessing information systems based on types of information processed, stored, or transmitted by the systems.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#ps-2","rel":"related"}]},{"id":"ps-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-3.a_obj","name":"objective","props":[{"name":"label","value":"PS-3(a)"}],"prose":"screens individuals prior to authorizing access to the information system;"},{"id":"ps-3.b_obj","name":"objective","props":[{"name":"label","value":"PS-3(b)"}],"parts":[{"id":"ps-3.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-3(b)[1]"}],"prose":"defines conditions requiring re-screening;"},{"id":"ps-3.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-3(b)[2]"}],"prose":"defines the frequency of re-screening where it is so indicated; and"},{"id":"ps-3.b_obj.3","name":"objective","props":[{"name":"label","value":"PS-3(b)[3]"}],"prose":"re-screens individuals in accordance with organization-defined conditions requiring re-screening and, where re-screening is so indicated, with the organization-defined frequency of such re-screening."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel screening\n\nrecords of screened personnel\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for personnel screening"}]}]},{"id":"ps-4","class":"SP800-53","title":"Personnel Termination","params":[{"id":"ps-4_prm_1","label":"organization-defined time period"},{"id":"ps-4_prm_2","label":"organization-defined information security topics"},{"id":"ps-4_prm_3","label":"organization-defined personnel or roles"},{"id":"ps-4_prm_4","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-4"},{"name":"sort-id","value":"ps-04"}],"parts":[{"id":"ps-4_smt","name":"statement","prose":"The organization, upon termination of individual employment:","parts":[{"id":"ps-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Disables information system access within {{ insert: param, ps-4_prm_1 }};"},{"id":"ps-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Terminates\/revokes any authenticators\/credentials associated with the individual;"},{"id":"ps-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Conducts exit interviews that include a discussion of {{ insert: param, ps-4_prm_2 }};"},{"id":"ps-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Retrieves all security-related organizational information system-related property;"},{"id":"ps-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Retains access to organizational information and information systems formerly controlled by terminated individual; and"},{"id":"ps-4_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Notifies {{ insert: param, ps-4_prm_3 }} within {{ insert: param, ps-4_prm_4 }}."}]},{"id":"ps-4_gdn","name":"guidance","prose":"Information system-related property includes, for example, hardware authentication tokens, system administration technical manuals, keys, identification cards, and building passes. Exit interviews ensure that terminated individuals understand the security constraints imposed by being former employees and that proper accountability is achieved for information system-related property. Security topics of interest at exit interviews can include, for example, reminding terminated individuals of nondisclosure agreements and potential limitations on future employment. Exit interviews may not be possible for some terminated individuals, for example, in cases related to job abandonment, illnesses, and nonavailability of supervisors. Exit interviews are important for individuals with security clearances. Timely execution of termination actions is essential for individuals terminated for cause. In certain situations, organizations consider disabling the information system accounts of individuals that are being terminated prior to the individuals being notified.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#ps-5","rel":"related"},{"href":"#ps-6","rel":"related"}]},{"id":"ps-4_obj","name":"objective","prose":"Determine if the organization, upon termination of individual employment,:","parts":[{"id":"ps-4.a_obj","name":"objective","props":[{"name":"label","value":"PS-4(a)"}],"parts":[{"id":"ps-4.a_obj.1","name":"objective","props":[{"name":"label","value":"PS-4(a)[1]"}],"prose":"defines a time period within which to disable information system access;"},{"id":"ps-4.a_obj.2","name":"objective","props":[{"name":"label","value":"PS-4(a)[2]"}],"prose":"disables information system access within the organization-defined time period;"}]},{"id":"ps-4.b_obj","name":"objective","props":[{"name":"label","value":"PS-4(b)"}],"prose":"terminates\/revokes any authenticators\/credentials associated with the individual;"},{"id":"ps-4.c_obj","name":"objective","props":[{"name":"label","value":"PS-4(c)"}],"parts":[{"id":"ps-4.c_obj.1","name":"objective","props":[{"name":"label","value":"PS-4(c)[1]"}],"prose":"defines information security topics to be discussed when conducting exit interviews;"},{"id":"ps-4.c_obj.2","name":"objective","props":[{"name":"label","value":"PS-4(c)[2]"}],"prose":"conducts exit interviews that include a discussion of organization-defined information security topics;"}]},{"id":"ps-4.d_obj","name":"objective","props":[{"name":"label","value":"PS-4(d)"}],"prose":"retrieves all security-related organizational information system-related property;"},{"id":"ps-4.e_obj","name":"objective","props":[{"name":"label","value":"PS-4(e)"}],"prose":"retains access to organizational information and information systems formerly controlled by the terminated individual;"},{"id":"ps-4.f_obj","name":"objective","props":[{"name":"label","value":"PS-4(f)"}],"parts":[{"id":"ps-4.f_obj.1","name":"objective","props":[{"name":"label","value":"PS-4(f)[1]"}],"prose":"defines personnel or roles to be notified of the termination;"},{"id":"ps-4.f_obj.2","name":"objective","props":[{"name":"label","value":"PS-4(f)[2]"}],"prose":"defines the time period within which to notify organization-defined personnel or roles; and"},{"id":"ps-4.f_obj.3","name":"objective","props":[{"name":"label","value":"PS-4(f)[3]"}],"prose":"notifies organization-defined personnel or roles within the organization-defined time period."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel termination\n\nrecords of personnel termination actions\n\nlist of information system accounts\n\nrecords of terminated or revoked authenticators\/credentials\n\nrecords of exit interviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for personnel termination\n\nautomated mechanisms supporting and\/or implementing personnel termination notifications\n\nautomated mechanisms for disabling information system access\/revoking authenticators"}]}],"controls":[{"id":"ps-4.2","class":"SP800-53-enhancement","title":"Automated Notification","params":[{"id":"ps-4.2_prm_1","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"PS-4(2)"},{"name":"sort-id","value":"ps-04.02"}],"parts":[{"id":"ps-4.2_smt","name":"statement","prose":"The organization employs automated mechanisms to notify {{ insert: param, ps-4.2_prm_1 }} upon termination of an individual."},{"id":"ps-4.2_gdn","name":"guidance","prose":"In organizations with a large number of employees, not all personnel who need to know about termination actions receive the appropriate notifications—or, if such notifications are received, they may not occur in a timely manner. Automated mechanisms can be used to send automatic alerts or notifications to specific organizational personnel or roles (e.g., management personnel, supervisors, personnel security officers, information security officers, systems administrators, or information technology administrators) when individuals are terminated. Such automatic alerts or notifications can be conveyed in a variety of ways, including, for example, telephonically, via electronic mail, via text message, or via websites."},{"id":"ps-4.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-4.2_obj.1","name":"objective","props":[{"name":"label","value":"PS-4(2)[1]"}],"prose":"defines personnel or roles to be notified upon termination of an individual; and"},{"id":"ps-4.2_obj.2","name":"objective","props":[{"name":"label","value":"PS-4(2)[2]"}],"prose":"employs automated mechanisms to notify organization-defined personnel or roles upon termination of an individual."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel termination\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nrecords of personnel termination actions\n\nautomated notifications of employee terminations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for personnel termination\n\nautomated mechanisms supporting and\/or implementing personnel termination notifications"}]}]}]},{"id":"ps-5","class":"SP800-53","title":"Personnel Transfer","params":[{"id":"ps-5_prm_1","label":"organization-defined transfer or reassignment actions"},{"id":"ps-5_prm_2","label":"organization-defined time period following the formal transfer action"},{"id":"ps-5_prm_3","label":"organization-defined personnel or roles"},{"id":"ps-5_prm_4","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PS-5"},{"name":"sort-id","value":"ps-05"}],"parts":[{"id":"ps-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Reviews and confirms ongoing operational need for current logical and physical access authorizations to information systems\/facilities when individuals are reassigned or transferred to other positions within the organization;"},{"id":"ps-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Initiates {{ insert: param, ps-5_prm_1 }} within {{ insert: param, ps-5_prm_2 }};"},{"id":"ps-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Modifies access authorization as needed to correspond with any changes in operational need due to reassignment or transfer; and"},{"id":"ps-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Notifies {{ insert: param, ps-5_prm_3 }} within {{ insert: param, ps-5_prm_4 }}."}]},{"id":"ps-5_gdn","name":"guidance","prose":"This control applies when reassignments or transfers of individuals are permanent or of such extended durations as to make the actions warranted. Organizations define actions appropriate for the types of reassignments or transfers, whether permanent or extended. Actions that may be required for personnel transfers or reassignments to other positions within organizations include, for example: (i) returning old and issuing new keys, identification cards, and building passes; (ii) closing information system accounts and establishing new accounts; (iii) changing information system access authorizations (i.e., privileges); and (iv) providing for access to official records to which individuals had access at previous work locations and in previous information system accounts.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#ps-4","rel":"related"}]},{"id":"ps-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-5.a_obj","name":"objective","props":[{"name":"label","value":"PS-5(a)"}],"prose":"when individuals are reassigned or transferred to other positions within the organization, reviews and confirms ongoing operational need for current:","parts":[{"id":"ps-5.a_obj.1","name":"objective","props":[{"name":"label","value":"PS-5(a)[1]"}],"prose":"logical access authorizations to information systems;"},{"id":"ps-5.a_obj.2","name":"objective","props":[{"name":"label","value":"PS-5(a)[2]"}],"prose":"physical access authorizations to information systems and facilities;"}]},{"id":"ps-5.b_obj","name":"objective","props":[{"name":"label","value":"PS-5(b)"}],"parts":[{"id":"ps-5.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-5(b)[1]"}],"prose":"defines transfer or reassignment actions to be initiated following transfer or reassignment;"},{"id":"ps-5.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-5(b)[2]"}],"prose":"defines the time period within which transfer or reassignment actions must occur following transfer or reassignment;"},{"id":"ps-5.b_obj.3","name":"objective","props":[{"name":"label","value":"PS-5(b)[3]"}],"prose":"initiates organization-defined transfer or reassignment actions within the organization-defined time period following transfer or reassignment;"}]},{"id":"ps-5.c_obj","name":"objective","props":[{"name":"label","value":"PS-5(c)"}],"prose":"modifies access authorization as needed to correspond with any changes in operational need due to reassignment or transfer;"},{"id":"ps-5.d_obj","name":"objective","props":[{"name":"label","value":"PS-5(d)"}],"parts":[{"id":"ps-5.d_obj.1","name":"objective","props":[{"name":"label","value":"PS-5(d)[1]"}],"prose":"defines personnel or roles to be notified when individuals are reassigned or transferred to other positions within the organization;"},{"id":"ps-5.d_obj.2","name":"objective","props":[{"name":"label","value":"PS-5(d)[2]"}],"prose":"defines the time period within which to notify organization-defined personnel or roles when individuals are reassigned or transferred to other positions within the organization; and"},{"id":"ps-5.d_obj.3","name":"objective","props":[{"name":"label","value":"PS-5(d)[3]"}],"prose":"notifies organization-defined personnel or roles within the organization-defined time period when individuals are reassigned or transferred to other positions within the organization."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel transfer\n\nsecurity plan\n\nrecords of personnel transfer actions\n\nlist of information system and facility access authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for personnel transfer\n\nautomated mechanisms supporting and\/or implementing personnel transfer notifications\n\nautomated mechanisms for disabling information system access\/revoking authenticators"}]}]},{"id":"ps-6","class":"SP800-53","title":"Access Agreements","params":[{"id":"ps-6_prm_1","label":"organization-defined frequency"},{"id":"ps-6_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"PS-6"},{"name":"sort-id","value":"ps-06"}],"parts":[{"id":"ps-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops and documents access agreements for organizational information systems;"},{"id":"ps-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the access agreements {{ insert: param, ps-6_prm_1 }}; and"},{"id":"ps-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensures that individuals requiring access to organizational information and information systems:","parts":[{"id":"ps-6_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Sign appropriate access agreements prior to being granted access; and"},{"id":"ps-6_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Re-sign access agreements to maintain access to organizational information systems when access agreements have been updated or {{ insert: param, ps-6_prm_2 }}."}]}]},{"id":"ps-6_gdn","name":"guidance","prose":"Access agreements include, for example, nondisclosure agreements, acceptable use agreements, rules of behavior, and conflict-of-interest agreements. Signed access agreements include an acknowledgement that individuals have read, understand, and agree to abide by the constraints associated with organizational information systems to which access is authorized. Organizations can use electronic signatures to acknowledge access agreements unless specifically prohibited by organizational policy.","links":[{"href":"#pl-4","rel":"related"},{"href":"#ps-2","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ps-4","rel":"related"},{"href":"#ps-8","rel":"related"}]},{"id":"ps-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-6.a_obj","name":"objective","props":[{"name":"label","value":"PS-6(a)"}],"prose":"develops and documents access agreements for organizational information systems;"},{"id":"ps-6.b_obj","name":"objective","props":[{"name":"label","value":"PS-6(b)"}],"parts":[{"id":"ps-6.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-6(b)[1]"}],"prose":"defines the frequency to review and update the access agreements;"},{"id":"ps-6.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-6(b)[2]"}],"prose":"reviews and updates the access agreements with the organization-defined frequency;"}]},{"id":"ps-6.c_obj","name":"objective","props":[{"name":"label","value":"PS-6(c)"}],"parts":[{"id":"ps-6.c.1_obj","name":"objective","props":[{"name":"label","value":"PS-6(c)(1)"}],"prose":"ensures that individuals requiring access to organizational information and information systems sign appropriate access agreements prior to being granted access;"},{"id":"ps-6.c.2_obj","name":"objective","props":[{"name":"label","value":"PS-6(c)(2)"}],"parts":[{"id":"ps-6.c.2_obj.1","name":"objective","props":[{"name":"label","value":"PS-6(c)(2)[1]"}],"prose":"defines the frequency to re-sign access agreements to maintain access to organizational information systems when access agreements have been updated;"},{"id":"ps-6.c.2_obj.2","name":"objective","props":[{"name":"label","value":"PS-6(c)(2)[2]"}],"prose":"ensures that individuals requiring access to organizational information and information systems re-sign access agreements to maintain access to organizational information systems when access agreements have been updated or with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing access agreements for organizational information and information systems\n\nsecurity plan\n\naccess agreements\n\nrecords of access agreement reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel who have signed\/resigned access agreements\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for access agreements\n\nautomated mechanisms supporting access agreements"}]}]},{"id":"ps-7","class":"SP800-53","title":"Third-party Personnel Security","params":[{"id":"ps-7_prm_1","label":"organization-defined personnel or roles"},{"id":"ps-7_prm_2","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-7"},{"name":"sort-id","value":"ps-07"}],"links":[{"href":"#0c775bc3-bfc3-42c7-a382-88949f503171","rel":"reference"}],"parts":[{"id":"ps-7_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes personnel security requirements including security roles and responsibilities for third-party providers;"},{"id":"ps-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Requires third-party providers to comply with personnel security policies and procedures established by the organization;"},{"id":"ps-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Documents personnel security requirements;"},{"id":"ps-7_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Requires third-party providers to notify {{ insert: param, ps-7_prm_1 }} of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges within {{ insert: param, ps-7_prm_2 }}; and"},{"id":"ps-7_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Monitors provider compliance."}]},{"id":"ps-7_gdn","name":"guidance","prose":"Third-party providers include, for example, service bureaus, contractors, and other organizations providing information system development, information technology services, outsourced applications, and network and security management. Organizations explicitly include personnel security requirements in acquisition-related documents. Third-party providers may have personnel working at organizational facilities with credentials, badges, or information system privileges issued by organizations. Notifications of third-party personnel changes ensure appropriate termination of privileges and credentials. Organizations define the transfers and terminations deemed reportable by security-related characteristics that include, for example, functions, roles, and nature of credentials\/privileges associated with individuals transferred or terminated.","links":[{"href":"#ps-2","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ps-4","rel":"related"},{"href":"#ps-5","rel":"related"},{"href":"#ps-6","rel":"related"},{"href":"#sa-9","rel":"related"},{"href":"#sa-21","rel":"related"}]},{"id":"ps-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-7.a_obj","name":"objective","props":[{"name":"label","value":"PS-7(a)"}],"prose":"establishes personnel security requirements, including security roles and responsibilities, for third-party providers;"},{"id":"ps-7.b_obj","name":"objective","props":[{"name":"label","value":"PS-7(b)"}],"prose":"requires third-party providers to comply with personnel security policies and procedures established by the organization;"},{"id":"ps-7.c_obj","name":"objective","props":[{"name":"label","value":"PS-7(c)"}],"prose":"documents personnel security requirements;"},{"id":"ps-7.d_obj","name":"objective","props":[{"name":"label","value":"PS-7(d)"}],"parts":[{"id":"ps-7.d_obj.1","name":"objective","props":[{"name":"label","value":"PS-7(d)[1]"}],"prose":"defines personnel or roles to be notified of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges;"},{"id":"ps-7.d_obj.2","name":"objective","props":[{"name":"label","value":"PS-7(d)[2]"}],"prose":"defines the time period within which third-party providers are required to notify organization-defined personnel or roles of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges;"},{"id":"ps-7.d_obj.3","name":"objective","props":[{"name":"label","value":"PS-7(d)[3]"}],"prose":"requires third-party providers to notify organization-defined personnel or roles within the organization-defined time period of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges; and"}]},{"id":"ps-7.e_obj","name":"objective","props":[{"name":"label","value":"PS-7(e)"}],"prose":"monitors provider compliance."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing third-party personnel security\n\nlist of personnel security requirements\n\nacquisition documents\n\nservice-level agreements\n\ncompliance monitoring process\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\nthird-party providers\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing and monitoring third-party personnel security\n\nautomated mechanisms supporting and\/or implementing monitoring of provider compliance"}]}]},{"id":"ps-8","class":"SP800-53","title":"Personnel Sanctions","params":[{"id":"ps-8_prm_1","label":"organization-defined personnel or roles"},{"id":"ps-8_prm_2","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"PS-8"},{"name":"sort-id","value":"ps-08"}],"parts":[{"id":"ps-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Employs a formal sanctions process for individuals failing to comply with established information security policies and procedures; and"},{"id":"ps-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Notifies {{ insert: param, ps-8_prm_1 }} within {{ insert: param, ps-8_prm_2 }} when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction."}]},{"id":"ps-8_gdn","name":"guidance","prose":"Organizational sanctions processes reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Sanctions processes are described in access agreements and can be included as part of general personnel policies and procedures for organizations. Organizations consult with the Office of the General Counsel regarding matters of employee sanctions.","links":[{"href":"#pl-4","rel":"related"},{"href":"#ps-6","rel":"related"}]},{"id":"ps-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-8.a_obj","name":"objective","props":[{"name":"label","value":"PS-8(a)"}],"prose":"employs a formal sanctions process for individuals failing to comply with established information security policies and procedures;"},{"id":"ps-8.b_obj","name":"objective","props":[{"name":"label","value":"PS-8(b)"}],"parts":[{"id":"ps-8.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-8(b)[1]"}],"prose":"defines personnel or roles to be notified when a formal employee sanctions process is initiated;"},{"id":"ps-8.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-8(b)[2]"}],"prose":"defines the time period within which organization-defined personnel or roles must be notified when a formal employee sanctions process is initiated; and"},{"id":"ps-8.b_obj.3","name":"objective","props":[{"name":"label","value":"PS-8(b)[3]"}],"prose":"notifies organization-defined personnel or roles within the organization-defined time period when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel sanctions\n\nrules of behavior\n\nrecords of formal sanctions\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing personnel sanctions\n\nautomated mechanisms supporting and\/or implementing notifications"}]}]}]},{"id":"ra","class":"family","title":"Risk Assessment","controls":[{"id":"ra-1","class":"SP800-53","title":"Risk Assessment Policy and Procedures","params":[{"id":"ra-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ra-1_prm_2","label":"organization-defined frequency"},{"id":"ra-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-1"},{"name":"sort-id","value":"ra-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ra-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ra-1_prm_1 }}:","parts":[{"id":"ra-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ra-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls; and"}]},{"id":"ra-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ra-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Risk assessment policy {{ insert: param, ra-1_prm_2 }}; and"},{"id":"ra-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Risk assessment procedures {{ insert: param, ra-1_prm_3 }}."}]}]},{"id":"ra-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the RA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ra-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-1.a_obj","name":"objective","props":[{"name":"label","value":"RA-1(a)"}],"parts":[{"id":"ra-1.a.1_obj","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)"}],"parts":[{"id":"ra-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1]"}],"prose":"develops and documents a risk assessment policy that addresses:","parts":[{"id":"ra-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ra-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ra-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ra-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ra-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ra-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ra-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ra-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the risk assessment policy is to be disseminated;"},{"id":"ra-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[3]"}],"prose":"disseminates the risk assessment policy to organization-defined personnel or roles;"}]},{"id":"ra-1.a.2_obj","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)"}],"parts":[{"id":"ra-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls;"},{"id":"ra-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ra-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ra-1.b_obj","name":"objective","props":[{"name":"label","value":"RA-1(b)"}],"parts":[{"id":"ra-1.b.1_obj","name":"objective","props":[{"name":"label","value":"RA-1(b)(1)"}],"parts":[{"id":"ra-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current risk assessment policy;"},{"id":"ra-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(b)(1)[2]"}],"prose":"reviews and updates the current risk assessment policy with the organization-defined frequency;"}]},{"id":"ra-1.b.2_obj","name":"objective","props":[{"name":"label","value":"RA-1(b)(2)"}],"parts":[{"id":"ra-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current risk assessment procedures; and"},{"id":"ra-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(b)(2)[2]"}],"prose":"reviews and updates the current risk assessment procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"risk assessment policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with risk assessment responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ra-2","class":"SP800-53","title":"Security Categorization","props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-2"},{"name":"sort-id","value":"ra-02"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"}],"parts":[{"id":"ra-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Categorizes information and the information system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"},{"id":"ra-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents the security categorization results (including supporting rationale) in the security plan for the information system; and"},{"id":"ra-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensures that the authorizing official or authorizing official designated representative reviews and approves the security categorization decision."}]},{"id":"ra-2_gdn","name":"guidance","prose":"Clearly defined authorization boundaries are a prerequisite for effective security categorization decisions. Security categories describe the potential adverse impacts to organizational operations, organizational assets, and individuals if organizational information and information systems are comprised through a loss of confidentiality, integrity, or availability. Organizations conduct the security categorization process as an organization-wide activity with the involvement of chief information officers, senior information security officers, information system owners, mission\/business owners, and information owners\/stewards. Organizations also consider the potential adverse impacts to other organizations and, in accordance with the USA PATRIOT Act of 2001 and Homeland Security Presidential Directives, potential national-level adverse impacts. Security categorization processes carried out by organizations facilitate the development of inventories of information assets, and along with CM-8, mappings to specific information system components where information is processed, stored, or transmitted.","links":[{"href":"#cm-8","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"ra-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-2.a_obj","name":"objective","props":[{"name":"label","value":"RA-2(a)"}],"prose":"categorizes information and the information system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"},{"id":"ra-2.b_obj","name":"objective","props":[{"name":"label","value":"RA-2(b)"}],"prose":"documents the security categorization results (including supporting rationale) in the security plan for the information system; and"},{"id":"ra-2.c_obj","name":"objective","props":[{"name":"label","value":"RA-2(c)"}],"prose":"ensures the authorizing official or authorizing official designated representative reviews and approves the security categorization decision."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nsecurity planning policy and procedures\n\nprocedures addressing security categorization of organizational information and information systems\n\nsecurity plan\n\nsecurity categorization documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security categorization and risk assessment responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security categorization"}]}]},{"id":"ra-3","class":"SP800-53","title":"Risk Assessment","params":[{"id":"ra-3_prm_1","select":{"choice":["security plan","risk assessment report"," {{ insert: param, ra-3_prm_2 }} "]}},{"id":"ra-3_prm_2","depends-on":"ra-3_prm_1","label":"organization-defined document"},{"id":"ra-3_prm_3","label":"organization-defined frequency"},{"id":"ra-3_prm_4","label":"organization-defined personnel or roles"},{"id":"ra-3_prm_5","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-3"},{"name":"sort-id","value":"ra-03"}],"links":[{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ra-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Conducts an assessment of risk, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, disruption, modification, or destruction of the information system and the information it processes, stores, or transmits;"},{"id":"ra-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents risk assessment results in {{ insert: param, ra-3_prm_1 }};"},{"id":"ra-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews risk assessment results {{ insert: param, ra-3_prm_3 }};"},{"id":"ra-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Disseminates risk assessment results to {{ insert: param, ra-3_prm_4 }}; and"},{"id":"ra-3_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Updates the risk assessment {{ insert: param, ra-3_prm_5 }} or whenever there are significant changes to the information system or environment of operation (including the identification of new threats and vulnerabilities), or other conditions that may impact the security state of the system."}]},{"id":"ra-3_gdn","name":"guidance","prose":"Clearly defined authorization boundaries are a prerequisite for effective risk assessments. Risk assessments take into account threats, vulnerabilities, likelihood, and impact to organizational operations and assets, individuals, other organizations, and the Nation based on the operation and use of information systems. Risk assessments also take into account risk from external parties (e.g., service providers, contractors operating information systems on behalf of the organization, individuals accessing organizational information systems, outsourcing entities). In accordance with OMB policy and related E-authentication initiatives, authentication of public users accessing federal information systems may also be required to protect nonpublic or privacy-related information. As such, organizational assessments of risk also address public access to federal information systems. Risk assessments (either formal or informal) can be conducted at all three tiers in the risk management hierarchy (i.e., organization level, mission\/business process level, or information system level) and at any phase in the system development life cycle. Risk assessments can also be conducted at various steps in the Risk Management Framework, including categorization, security control selection, security control implementation, security control assessment, information system authorization, and security control monitoring. RA-3 is noteworthy in that the control must be partially implemented prior to the implementation of other controls in order to complete the first two steps in the Risk Management Framework. Risk assessments can play an important role in security control selection processes, particularly during the application of tailoring guidance, which includes security control supplementation.","links":[{"href":"#ra-2","rel":"related"},{"href":"#pm-9","rel":"related"}]},{"id":"ra-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-3.a_obj","name":"objective","props":[{"name":"label","value":"RA-3(a)"}],"prose":"conducts an assessment of risk, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, disruption, modification, or destruction of:","parts":[{"id":"ra-3.a_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(a)[1]"}],"prose":"the information system;"},{"id":"ra-3.a_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(a)[2]"}],"prose":"the information the system processes, stores, or transmits;"}]},{"id":"ra-3.b_obj","name":"objective","props":[{"name":"label","value":"RA-3(b)"}],"parts":[{"id":"ra-3.b_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(b)[1]"}],"prose":"defines a document in which risk assessment results are to be documented (if not documented in the security plan or risk assessment report);"},{"id":"ra-3.b_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(b)[2]"}],"prose":"documents risk assessment results in one of the following:","parts":[{"id":"ra-3.b_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-3(b)[2][a]"}],"prose":"the security plan;"},{"id":"ra-3.b_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-3(b)[2][b]"}],"prose":"the risk assessment report; or"},{"id":"ra-3.b_obj.2.c","name":"objective","props":[{"name":"label","value":"RA-3(b)[2][c]"}],"prose":"the organization-defined document;"}]}]},{"id":"ra-3.c_obj","name":"objective","props":[{"name":"label","value":"RA-3(c)"}],"parts":[{"id":"ra-3.c_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(c)[1]"}],"prose":"defines the frequency to review risk assessment results;"},{"id":"ra-3.c_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(c)[2]"}],"prose":"reviews risk assessment results with the organization-defined frequency;"}]},{"id":"ra-3.d_obj","name":"objective","props":[{"name":"label","value":"RA-3(d)"}],"parts":[{"id":"ra-3.d_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(d)[1]"}],"prose":"defines personnel or roles to whom risk assessment results are to be disseminated;"},{"id":"ra-3.d_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(d)[2]"}],"prose":"disseminates risk assessment results to organization-defined personnel or roles;"}]},{"id":"ra-3.e_obj","name":"objective","props":[{"name":"label","value":"RA-3(e)"}],"parts":[{"id":"ra-3.e_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(e)[1]"}],"prose":"defines the frequency to update the risk assessment;"},{"id":"ra-3.e_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(e)[2]"}],"prose":"updates the risk assessment:","parts":[{"id":"ra-3.e_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-3(e)[2][a]"}],"prose":"with the organization-defined frequency;"},{"id":"ra-3.e_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-3(e)[2][b]"}],"prose":"whenever there are significant changes to the information system or environment of operation (including the identification of new threats and vulnerabilities); and"},{"id":"ra-3.e_obj.2.c","name":"objective","props":[{"name":"label","value":"RA-3(e)[2][c]"}],"prose":"whenever there are other conditions that may impact the security state of the system."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nsecurity planning policy and procedures\n\nprocedures addressing organizational assessments of risk\n\nsecurity plan\n\nrisk assessment\n\nrisk assessment results\n\nrisk assessment reviews\n\nrisk assessment updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with risk assessment responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for risk assessment\n\nautomated mechanisms supporting and\/or for conducting, documenting, reviewing, disseminating, and updating the risk assessment"}]}]},{"id":"ra-5","class":"SP800-53","title":"Vulnerability Scanning","params":[{"id":"ra-5_prm_1","label":"organization-defined frequency and\/or randomly in accordance with organization-defined process"},{"id":"ra-5_prm_2","label":"organization-defined response times"},{"id":"ra-5_prm_3","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-5"},{"name":"sort-id","value":"ra-05"}],"links":[{"href":"#bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","rel":"reference"},{"href":"#84a37532-6db6-477b-9ea8-f9085ebca0fc","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"},{"href":"#15522e92-9192-463d-9646-6a01982db8ca","rel":"reference"},{"href":"#275cc052-0f7f-423c-bdb6-ed503dc36228","rel":"reference"}],"parts":[{"id":"ra-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Scans for vulnerabilities in the information system and hosted applications {{ insert: param, ra-5_prm_1 }} and when new vulnerabilities potentially affecting the system\/applications are identified and reported;"},{"id":"ra-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for:","parts":[{"id":"ra-5_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Enumerating platforms, software flaws, and improper configurations;"},{"id":"ra-5_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Formatting checklists and test procedures; and"},{"id":"ra-5_smt.b.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Measuring vulnerability impact;"}]},{"id":"ra-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Analyzes vulnerability scan reports and results from security control assessments;"},{"id":"ra-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Remediates legitimate vulnerabilities {{ insert: param, ra-5_prm_2 }} in accordance with an organizational assessment of risk; and"},{"id":"ra-5_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Shares information obtained from the vulnerability scanning process and security control assessments with {{ insert: param, ra-5_prm_3 }} to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies)."}]},{"id":"ra-5_gdn","name":"guidance","prose":"Security categorization of information systems guides the frequency and comprehensiveness of vulnerability scans. Organizations determine the required vulnerability scanning for all information system components, ensuring that potential sources of vulnerabilities such as networked printers, scanners, and copiers are not overlooked. Vulnerability analyses for custom software applications may require additional approaches such as static analysis, dynamic analysis, binary analysis, or a hybrid of the three approaches. Organizations can employ these analysis approaches in a variety of tools (e.g., web-based application scanners, static analysis tools, binary analyzers) and in source code reviews. Vulnerability scanning includes, for example: (i) scanning for patch levels; (ii) scanning for functions, ports, protocols, and services that should not be accessible to users or devices; and (iii) scanning for improperly configured or incorrectly operating information flow control mechanisms. Organizations consider using tools that express vulnerabilities in the Common Vulnerabilities and Exposures (CVE) naming convention and that use the Open Vulnerability Assessment Language (OVAL) to determine\/test for the presence of vulnerabilities. Suggested sources for vulnerability information include the Common Weakness Enumeration (CWE) listing and the National Vulnerability Database (NVD). In addition, security control assessments such as red team exercises provide other sources of potential vulnerabilities for which to scan. Organizations also consider using tools that express vulnerability impact by the Common Vulnerability Scoring System (CVSS).","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#ra-2","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"ra-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-5.a_obj","name":"objective","props":[{"name":"label","value":"RA-5(a)"}],"parts":[{"id":"ra-5.a_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(a)[1]"}],"parts":[{"id":"ra-5.a_obj.1.a","name":"objective","props":[{"name":"label","value":"RA-5(a)[1][a]"}],"prose":"defines the frequency for conducting vulnerability scans on the information system and hosted applications; and\/or"},{"id":"ra-5.a_obj.1.b","name":"objective","props":[{"name":"label","value":"RA-5(a)[1][b]"}],"prose":"defines the process for conducting random vulnerability scans on the information system and hosted applications;"}]},{"id":"ra-5.a_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(a)[2]"}],"prose":"in accordance with the organization-defined frequency and\/or organization-defined process for conducting random scans, scans for vulnerabilities in:","parts":[{"id":"ra-5.a_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-5(a)[2][a]"}],"prose":"the information system;"},{"id":"ra-5.a_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-5(a)[2][b]"}],"prose":"hosted applications;"}]},{"id":"ra-5.a_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(a)[3]"}],"prose":"when new vulnerabilities potentially affecting the system\/applications are identified and reported, scans for vulnerabilities in:","parts":[{"id":"ra-5.a_obj.3.a","name":"objective","props":[{"name":"label","value":"RA-5(a)[3][a]"}],"prose":"the information system;"},{"id":"ra-5.a_obj.3.b","name":"objective","props":[{"name":"label","value":"RA-5(a)[3][b]"}],"prose":"hosted applications;"}]}]},{"id":"ra-5.b_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)"}],"prose":"employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for:","parts":[{"id":"ra-5.b.1_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)"}],"parts":[{"id":"ra-5.b.1_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)[1]"}],"prose":"enumerating platforms;"},{"id":"ra-5.b.1_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)[2]"}],"prose":"enumerating software flaws;"},{"id":"ra-5.b.1_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)[3]"}],"prose":"enumerating improper configurations;"}]},{"id":"ra-5.b.2_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)(2)"}],"parts":[{"id":"ra-5.b.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(b)(2)[1]"}],"prose":"formatting checklists;"},{"id":"ra-5.b.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(b)(2)[2]"}],"prose":"formatting test procedures;"}]},{"id":"ra-5.b.3_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)(3)"}],"prose":"measuring vulnerability impact;"}]},{"id":"ra-5.c_obj","name":"objective","props":[{"name":"label","value":"RA-5(c)"}],"parts":[{"id":"ra-5.c_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(c)[1]"}],"prose":"analyzes vulnerability scan reports;"},{"id":"ra-5.c_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(c)[2]"}],"prose":"analyzes results from security control assessments;"}]},{"id":"ra-5.d_obj","name":"objective","props":[{"name":"label","value":"RA-5(d)"}],"parts":[{"id":"ra-5.d_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(d)[1]"}],"prose":"defines response times to remediate legitimate vulnerabilities in accordance with an organizational assessment of risk;"},{"id":"ra-5.d_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(d)[2]"}],"prose":"remediates legitimate vulnerabilities within the organization-defined response times in accordance with an organizational assessment of risk;"}]},{"id":"ra-5.e_obj","name":"objective","props":[{"name":"label","value":"RA-5(e)"}],"parts":[{"id":"ra-5.e_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(e)[1]"}],"prose":"defines personnel or roles with whom information obtained from the vulnerability scanning process and security control assessments is to be shared;"},{"id":"ra-5.e_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(e)[2]"}],"prose":"shares information obtained from the vulnerability scanning process with organization-defined personnel or roles to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies); and"},{"id":"ra-5.e_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(e)[3]"}],"prose":"shares information obtained from security control assessments with organization-defined personnel or roles to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies)."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nprocedures addressing vulnerability scanning\n\nrisk assessment\n\nsecurity plan\n\nsecurity assessment report\n\nvulnerability scanning tools and associated configuration documentation\n\nvulnerability scanning results\n\npatch and vulnerability management records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with risk assessment, security control assessment and vulnerability scanning responsibilities\n\norganizational personnel with vulnerability scan analysis responsibilities\n\norganizational personnel with vulnerability remediation responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for vulnerability scanning, analysis, remediation, and information sharing\n\nautomated mechanisms supporting and\/or implementing vulnerability scanning, analysis, remediation, and information sharing"}]}],"controls":[{"id":"ra-5.1","class":"SP800-53-enhancement","title":"Update Tool Capability","props":[{"name":"label","value":"RA-5(1)"},{"name":"sort-id","value":"ra-05.01"}],"parts":[{"id":"ra-5.1_smt","name":"statement","prose":"The organization employs vulnerability scanning tools that include the capability to readily update the information system vulnerabilities to be scanned."},{"id":"ra-5.1_gdn","name":"guidance","prose":"The vulnerabilities to be scanned need to be readily updated as new vulnerabilities are discovered, announced, and scanning methods developed. This updating process helps to ensure that potential vulnerabilities in the information system are identified and addressed as quickly as possible.","links":[{"href":"#si-3","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"ra-5.1_obj","name":"objective","prose":"Determine if the organization employs vulnerability scanning tools that include the capability to readily update the information system vulnerabilities to be scanned."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Procedures addressing vulnerability scanning\n\nsecurity plan\n\nsecurity assessment report\n\nvulnerability scanning tools and associated configuration documentation\n\nvulnerability scanning results\n\npatch and vulnerability management records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with vulnerability scanning responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for vulnerability scanning\n\nautomated mechanisms\/tools supporting and\/or implementing vulnerability scanning"}]}]},{"id":"ra-5.2","class":"SP800-53-enhancement","title":"Update by Frequency \/ Prior to New Scan \/ When Identified","params":[{"id":"ra-5.2_prm_1","select":{"how-many":"one-or-more","choice":[" {{ insert: param, ra-5.2_prm_2 }} ","prior to a new scan","when new vulnerabilities are identified and reported"]}},{"id":"ra-5.2_prm_2","depends-on":"ra-5.2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"RA-5(2)"},{"name":"sort-id","value":"ra-05.02"}],"parts":[{"id":"ra-5.2_smt","name":"statement","prose":"The organization updates the information system vulnerabilities scanned {{ insert: param, ra-5.2_prm_1 }}."},{"id":"ra-5.2_gdn","name":"guidance","links":[{"href":"#si-3","rel":"related"},{"href":"#si-5","rel":"related"}]},{"id":"ra-5.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-5.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(2)[1]"}],"prose":"defines the frequency to update the information system vulnerabilities scanned;"},{"id":"ra-5.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(2)[2]"}],"prose":"updates the information system vulnerabilities scanned one or more of the following:","parts":[{"id":"ra-5.2_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-5(2)[2][a]"}],"prose":"with the organization-defined frequency;"},{"id":"ra-5.2_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-5(2)[2][b]"}],"prose":"prior to a new scan; and\/or"},{"id":"ra-5.2_obj.2.c","name":"objective","props":[{"name":"label","value":"RA-5(2)[2][c]"}],"prose":"when new vulnerabilities are identified and reported."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Procedures addressing vulnerability scanning\n\nsecurity plan\n\nsecurity assessment report\n\nvulnerability scanning tools and associated configuration documentation\n\nvulnerability scanning results\n\npatch and vulnerability management records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with vulnerability scanning responsibilities\n\norganizational personnel with vulnerability scan analysis responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for vulnerability scanning\n\nautomated mechanisms\/tools supporting and\/or implementing vulnerability scanning"}]}]},{"id":"ra-5.4","class":"SP800-53-enhancement","title":"Discoverable Information","params":[{"id":"ra-5.4_prm_1","label":"organization-defined corrective actions"}],"props":[{"name":"label","value":"RA-5(4)"},{"name":"sort-id","value":"ra-05.04"}],"parts":[{"id":"ra-5.4_smt","name":"statement","prose":"The organization determines what information about the information system is discoverable by adversaries and subsequently takes {{ insert: param, ra-5.4_prm_1 }}."},{"id":"ra-5.4_gdn","name":"guidance","prose":"Discoverable information includes information that adversaries could obtain without directly compromising or breaching the information system, for example, by collecting information the system is exposing or by conducting extensive searches of the web. Corrective actions can include, for example, notifying appropriate organizational personnel, removing designated information, or changing the information system to make designated information less relevant or attractive to adversaries.","links":[{"href":"#au-13","rel":"related"}]},{"id":"ra-5.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-5.4_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(4)[1]"}],"prose":"defines corrective actions to be taken if information about the information system is discoverable by adversaries;"},{"id":"ra-5.4_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(4)[2]"}],"prose":"determines what information about the information system is discoverable by adversaries; and"},{"id":"ra-5.4_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(4)[3]"}],"prose":"subsequently takes organization-defined corrective actions."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Procedures addressing vulnerability scanning\n\nsecurity assessment report\n\npenetration test results\n\nvulnerability scanning results\n\nrisk assessment report\n\nrecords of corrective actions taken\n\nincident response records\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with vulnerability scanning and\/or penetration testing responsibilities\n\norganizational personnel with vulnerability scan analysis responsibilities\n\norganizational personnel responsible for risk response\n\norganizational personnel responsible for incident management and response\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for vulnerability scanning\n\norganizational processes for risk response\n\norganizational processes for incident management and response\n\nautomated mechanisms\/tools supporting and\/or implementing vulnerability scanning\n\nautomated mechanisms supporting and\/or implementing risk response\n\nautomated mechanisms supporting and\/or implementing incident management and response"}]}]},{"id":"ra-5.5","class":"SP800-53-enhancement","title":"Privileged Access","params":[{"id":"ra-5.5_prm_1","label":"organization-identified information system components"},{"id":"ra-5.5_prm_2","label":"organization-defined vulnerability scanning activities"}],"props":[{"name":"label","value":"RA-5(5)"},{"name":"sort-id","value":"ra-05.05"}],"parts":[{"id":"ra-5.5_smt","name":"statement","prose":"The information system implements privileged access authorization to {{ insert: param, ra-5.5_prm_1 }} for selected {{ insert: param, ra-5.5_prm_2 }}."},{"id":"ra-5.5_gdn","name":"guidance","prose":"In certain situations, the nature of the vulnerability scanning may be more intrusive or the information system component that is the subject of the scanning may contain highly sensitive information. Privileged access authorization to selected system components facilitates more thorough vulnerability scanning and also protects the sensitive nature of such scanning."},{"id":"ra-5.5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ra-5.5_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(5)[1]"}],"prose":"the organization defines information system components to which privileged access is authorized for selected vulnerability scanning activities;"},{"id":"ra-5.5_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(5)[2]"}],"prose":"the organization defines vulnerability scanning activities selected for privileged access authorization to organization-defined information system components; and"},{"id":"ra-5.5_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(5)[3]"}],"prose":"the information system implements privileged access authorization to organization-defined information system components for selected organization-defined vulnerability scanning activities."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nprocedures addressing vulnerability scanning\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of information system components for vulnerability scanning\n\npersonnel access authorization list\n\nauthorization credentials\n\naccess authorization records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with vulnerability scanning responsibilities\n\nsystem\/network administrators\n\norganizational personnel responsible for access control to the information system\n\norganizational personnel responsible for configuration management of the information system\n\nsystem developers\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for vulnerability scanning\n\norganizational processes for access control\n\nautomated mechanisms supporting and\/or implementing access control\n\nautomated mechanisms\/tools supporting and\/or implementing vulnerability scanning"}]}]}]}]},{"id":"sa","class":"family","title":"System and Services Acquisition","controls":[{"id":"sa-1","class":"SP800-53","title":"System and Services Acquisition Policy and Procedures","params":[{"id":"sa-1_prm_1","label":"organization-defined personnel or roles"},{"id":"sa-1_prm_2","label":"organization-defined frequency"},{"id":"sa-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-1"},{"name":"sort-id","value":"sa-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"sa-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, sa-1_prm_1 }}:","parts":[{"id":"sa-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system and services acquisition policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"sa-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls; and"}]},{"id":"sa-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"sa-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System and services acquisition policy {{ insert: param, sa-1_prm_2 }}; and"},{"id":"sa-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System and services acquisition procedures {{ insert: param, sa-1_prm_3 }}."}]}]},{"id":"sa-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the SA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"sa-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-1.a_obj","name":"objective","props":[{"name":"label","value":"SA-1(a)"}],"parts":[{"id":"sa-1.a.1_obj","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)"}],"parts":[{"id":"sa-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1]"}],"prose":"develops and documents a system and services acquisition policy that addresses:","parts":[{"id":"sa-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"sa-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"sa-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"sa-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"sa-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"sa-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"sa-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"sa-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system and services acquisition policy is to be disseminated;"},{"id":"sa-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[3]"}],"prose":"disseminates the system and services acquisition policy to organization-defined personnel or roles;"}]},{"id":"sa-1.a.2_obj","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)"}],"parts":[{"id":"sa-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls;"},{"id":"sa-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"sa-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"sa-1.b_obj","name":"objective","props":[{"name":"label","value":"SA-1(b)"}],"parts":[{"id":"sa-1.b.1_obj","name":"objective","props":[{"name":"label","value":"SA-1(b)(1)"}],"parts":[{"id":"sa-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system and services acquisition policy;"},{"id":"sa-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(b)(1)[2]"}],"prose":"reviews and updates the current system and services acquisition policy with the organization-defined frequency;"}]},{"id":"sa-1.b.2_obj","name":"objective","props":[{"name":"label","value":"SA-1(b)(2)"}],"parts":[{"id":"sa-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system and services acquisition procedures; and"},{"id":"sa-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(b)(2)[2]"}],"prose":"reviews and updates the current system and services acquisition procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"sa-2","class":"SP800-53","title":"Allocation of Resources","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-2"},{"name":"sort-id","value":"sa-02"}],"links":[{"href":"#29fcfe59-33cd-494a-8756-5907ae3a8f92","rel":"reference"}],"parts":[{"id":"sa-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Determines information security requirements for the information system or information system service in mission\/business process planning;"},{"id":"sa-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Determines, documents, and allocates the resources required to protect the information system or information system service as part of its capital planning and investment control process; and"},{"id":"sa-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Establishes a discrete line item for information security in organizational programming and budgeting documentation."}]},{"id":"sa-2_gdn","name":"guidance","prose":"Resource allocation for information security includes funding for the initial information system or information system service acquisition and funding for the sustainment of the system\/service.","links":[{"href":"#pm-3","rel":"related"},{"href":"#pm-11","rel":"related"}]},{"id":"sa-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-2.a_obj","name":"objective","props":[{"name":"label","value":"SA-2(a)"}],"prose":"determines information security requirements for the information system or information system service in mission\/business process planning;"},{"id":"sa-2.b_obj","name":"objective","props":[{"name":"label","value":"SA-2(b)"}],"prose":"to protect the information system or information system service as part of its capital planning and investment control process:","parts":[{"id":"sa-2.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-2(b)[1]"}],"prose":"determines the resources required;"},{"id":"sa-2.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-2(b)[2]"}],"prose":"documents the resources required;"},{"id":"sa-2.b_obj.3","name":"objective","props":[{"name":"label","value":"SA-2(b)[3]"}],"prose":"allocates the resources required; and"}]},{"id":"sa-2.c_obj","name":"objective","props":[{"name":"label","value":"SA-2(c)"}],"prose":"establishes a discrete line item for information security in organizational programming and budgeting documentation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the allocation of resources to information security requirements\n\nprocedures addressing capital planning and investment control\n\norganizational programming and budgeting documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with capital planning, investment control, organizational programming and budgeting responsibilities\n\norganizational personnel responsible for determining information security requirements for information systems\/services\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for determining information security requirements\n\norganizational processes for capital planning, programming, and budgeting\n\nautomated mechanisms supporting and\/or implementing organizational capital planning, programming, and budgeting"}]}]},{"id":"sa-3","class":"SP800-53","title":"System Development Life Cycle","params":[{"id":"sa-3_prm_1","label":"organization-defined system development life cycle"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-3"},{"name":"sort-id","value":"sa-03"}],"links":[{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#abd950ae-092f-4b7a-b374-1c7c67fe9350","rel":"reference"}],"parts":[{"id":"sa-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Manages the information system using {{ insert: param, sa-3_prm_1 }} that incorporates information security considerations;"},{"id":"sa-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Defines and documents information security roles and responsibilities throughout the system development life cycle;"},{"id":"sa-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Identifies individuals having information security roles and responsibilities; and"},{"id":"sa-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Integrates the organizational information security risk management process into system development life cycle activities."}]},{"id":"sa-3_gdn","name":"guidance","prose":"A well-defined system development life cycle provides the foundation for the successful development, implementation, and operation of organizational information systems. To apply the required security controls within the system development life cycle requires a basic understanding of information security, threats, vulnerabilities, adverse impacts, and risk to critical missions\/business functions. The security engineering principles in SA-8 cannot be properly applied if individuals that design, code, and test information systems and system components (including information technology products) do not understand security. Therefore, organizations include qualified personnel, for example, chief information security officers, security architects, security engineers, and information system security officers in system development life cycle activities to ensure that security requirements are incorporated into organizational information systems. It is equally important that developers include individuals on the development team that possess the requisite security expertise and skills to ensure that needed security capabilities are effectively integrated into the information system. Security awareness and training programs can help ensure that individuals having key security roles and responsibilities have the appropriate experience, skills, and expertise to conduct assigned system development life cycle activities. The effective integration of security requirements into enterprise architecture also helps to ensure that important security considerations are addressed early in the system development life cycle and that those considerations are directly related to the organizational mission\/business processes. This process also facilitates the integration of the information security architecture into the enterprise architecture, consistent with organizational risk management and information security strategies.","links":[{"href":"#at-3","rel":"related"},{"href":"#pm-7","rel":"related"},{"href":"#sa-8","rel":"related"}]},{"id":"sa-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-3.a_obj","name":"objective","props":[{"name":"label","value":"SA-3(a)"}],"parts":[{"id":"sa-3.a_obj.1","name":"objective","props":[{"name":"label","value":"SA-3(a)[1]"}],"prose":"defines a system development life cycle that incorporates information security considerations to be used to manage the information system;"},{"id":"sa-3.a_obj.2","name":"objective","props":[{"name":"label","value":"SA-3(a)[2]"}],"prose":"manages the information system using the organization-defined system development life cycle;"}]},{"id":"sa-3.b_obj","name":"objective","props":[{"name":"label","value":"SA-3(b)"}],"prose":"defines and documents information security roles and responsibilities throughout the system development life cycle;"},{"id":"sa-3.c_obj","name":"objective","props":[{"name":"label","value":"SA-3(c)"}],"prose":"identifies individuals having information security roles and responsibilities; and"},{"id":"sa-3.d_obj","name":"objective","props":[{"name":"label","value":"SA-3(d)"}],"prose":"integrates the organizational information security risk management process into system development life cycle activities."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security into the system development life cycle process\n\ninformation system development life cycle documentation\n\ninformation security risk management strategy\/program documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security and system life cycle development responsibilities\n\norganizational personnel with information security risk management responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for defining and documenting the SDLC\n\norganizational processes for identifying SDLC roles and responsibilities\n\norganizational process for integrating information security risk management into the SDLC\n\nautomated mechanisms supporting and\/or implementing the SDLC"}]}]},{"id":"sa-4","class":"SP800-53","title":"Acquisition Process","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-4"},{"name":"sort-id","value":"sa-04"}],"links":[{"href":"#ad733a42-a7ed-4774-b988-4930c28852f3","rel":"reference"},{"href":"#1737a687-52fb-4008-b900-cbfa836f7b65","rel":"reference"},{"href":"#d715b234-9b5b-4e07-b1ed-99836727664d","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#0a5db899-f033-467f-8631-f5a8ba971475","rel":"reference"},{"href":"#0c775bc3-bfc3-42c7-a382-88949f503171","rel":"reference"},{"href":"#d818efd3-db31-4953-8afa-9e76afe83ce2","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#abd950ae-092f-4b7a-b374-1c7c67fe9350","rel":"reference"},{"href":"#84a37532-6db6-477b-9ea8-f9085ebca0fc","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"},{"href":"#56d671da-6b7b-4abf-8296-84b61980390a","rel":"reference"},{"href":"#c95a9986-3cd6-4a98-931b-ccfc56cb11e5","rel":"reference"},{"href":"#5ed1f4d5-1494-421b-97ed-39d3c88ab51f","rel":"reference"},{"href":"#bbd50dd1-54ce-4432-959d-63ea564b1bb4","rel":"reference"}],"parts":[{"id":"sa-4_smt","name":"statement","prose":"The organization includes the following requirements, descriptions, and criteria, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission\/business needs:","parts":[{"id":"sa-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Security functional requirements;"},{"id":"sa-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Security strength requirements;"},{"id":"sa-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Security assurance requirements;"},{"id":"sa-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Security-related documentation requirements;"},{"id":"sa-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Requirements for protecting security-related documentation;"},{"id":"sa-4_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Description of the information system development environment and environment in which the system is intended to operate; and"},{"id":"sa-4_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Acceptance criteria."}]},{"id":"sa-4_gdn","name":"guidance","prose":"Information system components are discrete, identifiable information technology assets (e.g., hardware, software, or firmware) that represent the building blocks of an information system. Information system components include commercial information technology products. Security functional requirements include security capabilities, security functions, and security mechanisms. Security strength requirements associated with such capabilities, functions, and mechanisms include degree of correctness, completeness, resistance to direct attack, and resistance to tampering or bypass. Security assurance requirements include: (i) development processes, procedures, practices, and methodologies; and (ii) evidence from development and assessment activities providing grounds for confidence that the required security functionality has been implemented and the required security strength has been achieved. Security documentation requirements address all phases of the system development life cycle. Security functionality, assurance, and documentation requirements are expressed in terms of security controls and control enhancements that have been selected through the tailoring process. The security control tailoring process includes, for example, the specification of parameter values through the use of assignment and selection statements and the specification of platform dependencies and implementation information. Security documentation provides user and administrator guidance regarding the implementation and operation of security controls. The level of detail required in security documentation is based on the security category or classification level of the information system and the degree to which organizations depend on the stated security capability, functions, or mechanisms to meet overall risk response expectations (as defined in the organizational risk management strategy). Security requirements can also include organizationally mandated configuration settings specifying allowed functions, ports, protocols, and services. Acceptance criteria for information systems, information system components, and information system services are defined in the same manner as such criteria for any organizational acquisition or procurement. The Federal Acquisition Regulation (FAR) Section 7.103 contains information security requirements from FISMA.","links":[{"href":"#cm-6","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#ps-7","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#sa-12","rel":"related"}]},{"id":"sa-4_obj","name":"objective","prose":"Determine if the organization includes the following requirements, descriptions, and criteria, explicitly or by reference, in the acquisition contracts for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission\/business needs:","parts":[{"id":"sa-4.a_obj","name":"objective","props":[{"name":"label","value":"SA-4(a)"}],"prose":"security functional requirements;"},{"id":"sa-4.b_obj","name":"objective","props":[{"name":"label","value":"SA-4(b)"}],"prose":"security strength requirements;"},{"id":"sa-4.c_obj","name":"objective","props":[{"name":"label","value":"SA-4(c)"}],"prose":"security assurance requirements;"},{"id":"sa-4.d_obj","name":"objective","props":[{"name":"label","value":"SA-4(d)"}],"prose":"security-related documentation requirements;"},{"id":"sa-4.e_obj","name":"objective","props":[{"name":"label","value":"SA-4(e)"}],"prose":"requirements for protecting security-related documentation;"},{"id":"sa-4.f_obj","name":"objective","props":[{"name":"label","value":"SA-4(f)"}],"prose":"description of:","parts":[{"id":"sa-4.f_obj.1","name":"objective","props":[{"name":"label","value":"SA-4(f)[1]"}],"prose":"the information system development environment;"},{"id":"sa-4.f_obj.2","name":"objective","props":[{"name":"label","value":"SA-4(f)[2]"}],"prose":"the environment in which the system is intended to operate; and"}]},{"id":"sa-4.g_obj","name":"objective","props":[{"name":"label","value":"SA-4(g)"}],"prose":"acceptance criteria."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\nacquisition contracts for the information system, system component, or information system service\n\ninformation system design documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security functional, strength, and assurance requirements\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for determining information system security functional, strength, and assurance requirements\n\norganizational processes for developing acquisition contracts\n\nautomated mechanisms supporting and\/or implementing acquisitions and inclusion of security requirements in contracts"}]}],"controls":[{"id":"sa-4.1","class":"SP800-53-enhancement","title":"Functional Properties of Security Controls","props":[{"name":"label","value":"SA-4(1)"},{"name":"sort-id","value":"sa-04.01"}],"parts":[{"id":"sa-4.1_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to provide a description of the functional properties of the security controls to be employed."},{"id":"sa-4.1_gdn","name":"guidance","prose":"Functional properties of security controls describe the functionality (i.e., security capability, functions, or mechanisms) visible at the interfaces of the controls and specifically exclude functionality and data structures internal to the operation of the controls.","links":[{"href":"#sa-5","rel":"related"}]},{"id":"sa-4.1_obj","name":"objective","prose":"Determine if the organization requires the developer of the information system, system component, or information system service to provide a description of the functional properties of the security controls to be employed."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\nsolicitation documents\n\nacquisition documentation\n\nacquisition contracts for the information system, system component, or information system services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security functional requirements\n\ninformation system developer or service provider\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for determining information system security functional, requirements\n\norganizational processes for developing acquisition contracts\n\nautomated mechanisms supporting and\/or implementing acquisitions and inclusion of security requirements in contracts"}]}]},{"id":"sa-4.2","class":"SP800-53-enhancement","title":"Design \/ Implementation Information for Security Controls","params":[{"id":"sa-4.2_prm_1","select":{"how-many":"one-or-more","choice":["security-relevant external system interfaces","high-level design","low-level design","source code or hardware schematics"," {{ insert: param, sa-4.2_prm_2 }} "]}},{"id":"sa-4.2_prm_2","depends-on":"sa-4.2_prm_1","label":"organization-defined design\/implementation information"},{"id":"sa-4.2_prm_3","label":"organization-defined level of detail"}],"props":[{"name":"label","value":"SA-4(2)"},{"name":"sort-id","value":"sa-04.02"}],"parts":[{"id":"sa-4.2_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to provide design and implementation information for the security controls to be employed that includes: {{ insert: param, sa-4.2_prm_1 }} at {{ insert: param, sa-4.2_prm_3 }}."},{"id":"sa-4.2_gdn","name":"guidance","prose":"Organizations may require different levels of detail in design and implementation documentation for security controls employed in organizational information systems, system components, or information system services based on mission\/business requirements, requirements for trustworthiness\/resiliency, and requirements for analysis and testing. Information systems can be partitioned into multiple subsystems. Each subsystem within the system can contain one or more modules. The high-level design for the system is expressed in terms of multiple subsystems and the interfaces between subsystems providing security-relevant functionality. The low-level design for the system is expressed in terms of modules with particular emphasis on software and firmware (but not excluding hardware) and the interfaces between modules providing security-relevant functionality. Source code and hardware schematics are typically referred to as the implementation representation of the information system.","links":[{"href":"#sa-5","rel":"related"}]},{"id":"sa-4.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-4.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-4(2)[1]"}],"prose":"defines level of detail that the developer is required to provide in design and implementation information for the security controls to be employed in the information system, system component, or information system service;"},{"id":"sa-4.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-4(2)[2]"}],"prose":"defines design\/implementation information that the developer is to provide for the security controls to be employed (if selected);"},{"id":"sa-4.2_obj.3","name":"objective","props":[{"name":"label","value":"SA-4(2)[3]"}],"prose":"requires the developer of the information system, system component, or information system service to provide design and implementation information for the security controls to be employed that includes, at the organization-defined level of detail, one or more of the following:","parts":[{"id":"sa-4.2_obj.3.a","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][a]"}],"prose":"security-relevant external system interfaces;"},{"id":"sa-4.2_obj.3.b","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][b]"}],"prose":"high-level design;"},{"id":"sa-4.2_obj.3.c","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][c]"}],"prose":"low-level design;"},{"id":"sa-4.2_obj.3.d","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][d]"}],"prose":"source code;"},{"id":"sa-4.2_obj.3.e","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][e]"}],"prose":"hardware schematics; and\/or"},{"id":"sa-4.2_obj.3.f","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][f]"}],"prose":"organization-defined design\/implementation information."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\nsolicitation documents\n\nacquisition documentation\n\nacquisition contracts for the information system, system components, or information system services\n\ndesign and implementation information for security controls employed in the information system, system component, or information system service\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\ninformation system developer or service provider\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for determining level of detail for system design and security controls\n\norganizational processes for developing acquisition contracts\n\nautomated mechanisms supporting and\/or implementing development of system design details"}]}]},{"id":"sa-4.9","class":"SP800-53-enhancement","title":"Functions \/ Ports \/ Protocols \/ Services in Use","props":[{"name":"label","value":"SA-4(9)"},{"name":"sort-id","value":"sa-04.09"}],"parts":[{"id":"sa-4.9_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to identify early in the system development life cycle, the functions, ports, protocols, and services intended for organizational use."},{"id":"sa-4.9_gdn","name":"guidance","prose":"The identification of functions, ports, protocols, and services early in the system development life cycle (e.g., during the initial requirements definition and design phases) allows organizations to influence the design of the information system, information system component, or information system service. This early involvement in the life cycle helps organizations to avoid or minimize the use of functions, ports, protocols, or services that pose unnecessarily high risks and understand the trade-offs involved in blocking specific ports, protocols, or services (or when requiring information system service providers to do so). Early identification of functions, ports, protocols, and services avoids costly retrofitting of security controls after the information system, system component, or information system service has been implemented. SA-9 describes requirements for external information system services with organizations identifying which functions, ports, protocols, and services are provided from external sources.","links":[{"href":"#cm-7","rel":"related"},{"href":"#sa-9","rel":"related"}]},{"id":"sa-4.9_obj","name":"objective","prose":"Determine if the organization requires the developer of the information system, system component, or information system service to identify early in the system development life cycle:","parts":[{"id":"sa-4.9_obj.1","name":"objective","props":[{"name":"label","value":"SA-4(9)[1]"}],"prose":"the functions intended for organizational use;"},{"id":"sa-4.9_obj.2","name":"objective","props":[{"name":"label","value":"SA-4(9)[2]"}],"prose":"the ports intended for organizational use;"},{"id":"sa-4.9_obj.3","name":"objective","props":[{"name":"label","value":"SA-4(9)[3]"}],"prose":"the protocols intended for organizational use; and"},{"id":"sa-4.9_obj.4","name":"objective","props":[{"name":"label","value":"SA-4(9)[4]"}],"prose":"the services intended for organizational use."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\ninformation system design documentation\n\ninformation system documentation including functions, ports, protocols, and services intended for organizational use\n\nacquisition contracts for information systems or services\n\nacquisition documentation\n\nsolicitation documentation\n\nservice-level agreements\n\norganizational security requirements, descriptions, and criteria for developers of information systems, system components, and information system services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\nsystem\/network administrators\n\norganizational personnel operating, using, and\/or maintaining the information system\n\ninformation system developers\n\norganizational personnel with information security responsibilities"}]}]},{"id":"sa-4.10","class":"SP800-53-enhancement","title":"Use of Approved PIV Products","props":[{"name":"label","value":"SA-4(10)"},{"name":"sort-id","value":"sa-04.10"}],"parts":[{"id":"sa-4.10_smt","name":"statement","prose":"The organization employs only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational information systems."},{"id":"sa-4.10_gdn","name":"guidance","links":[{"href":"#ia-2","rel":"related"},{"href":"#ia-8","rel":"related"}]},{"id":"sa-4.10_obj","name":"objective","prose":"Determine if the organization employs only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational information systems."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\nsolicitation documentation\n\nacquisition documentation\n\nacquisition contracts for the information system, system component, or information system service\n\nservice-level agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\norganizational personnel with responsibility for ensuring only FIPS 201-approved products are implemented\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for selecting and employing FIPS 201-approved products"}]}]}]},{"id":"sa-5","class":"SP800-53","title":"Information System Documentation","params":[{"id":"sa-5_prm_1","label":"organization-defined actions"},{"id":"sa-5_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"SA-5"},{"name":"sort-id","value":"sa-05"}],"parts":[{"id":"sa-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Obtains administrator documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Secure configuration, installation, and operation of the system, component, or service;"},{"id":"sa-5_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Effective use and maintenance of security functions\/mechanisms; and"},{"id":"sa-5_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Known vulnerabilities regarding configuration and use of administrative (i.e., privileged) functions;"}]},{"id":"sa-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Obtains user documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"User-accessible security functions\/mechanisms and how to effectively use those security functions\/mechanisms;"},{"id":"sa-5_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and"},{"id":"sa-5_smt.b.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"User responsibilities in maintaining the security of the system, component, or service;"}]},{"id":"sa-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent and takes {{ insert: param, sa-5_prm_1 }} in response;"},{"id":"sa-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects documentation as required, in accordance with the risk management strategy; and"},{"id":"sa-5_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Distributes documentation to {{ insert: param, sa-5_prm_2 }}."}]},{"id":"sa-5_gdn","name":"guidance","prose":"This control helps organizational personnel understand the implementation and operation of security controls associated with information systems, system components, and information system services. Organizations consider establishing specific measures to determine the quality\/completeness of the content provided. The inability to obtain needed documentation may occur, for example, due to the age of the information system\/component or lack of support from developers and contractors. In those situations, organizations may need to recreate selected documentation if such documentation is essential to the effective implementation or operation of security controls. The level of protection provided for selected information system, component, or service documentation is commensurate with the security category or classification of the system. For example, documentation associated with a key DoD weapons system or command and control system would typically require a higher level of protection than a routine administrative system. Documentation that addresses information system vulnerabilities may also require an increased level of protection. Secure operation of the information system, includes, for example, initially starting the system and resuming secure system operation after any lapse in system operation.","links":[{"href":"#cm-6","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#ps-2","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-4","rel":"related"}]},{"id":"sa-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-5.a_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)"}],"prose":"obtains administrator documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5.a.1_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)"}],"parts":[{"id":"sa-5.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)[1]"}],"prose":"secure configuration of the system, system component, or service;"},{"id":"sa-5.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)[2]"}],"prose":"secure installation of the system, system component, or service;"},{"id":"sa-5.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)[3]"}],"prose":"secure operation of the system, system component, or service;"}]},{"id":"sa-5.a.2_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)(2)"}],"parts":[{"id":"sa-5.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(a)(2)[1]"}],"prose":"effective use of the security features\/mechanisms;"},{"id":"sa-5.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(a)(2)[2]"}],"prose":"effective maintenance of the security features\/mechanisms;"}]},{"id":"sa-5.a.3_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)(3)"}],"prose":"known vulnerabilities regarding configuration and use of administrative (i.e., privileged) functions;"}]},{"id":"sa-5.b_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)"}],"prose":"obtains user documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5.b.1_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)(1)"}],"parts":[{"id":"sa-5.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(b)(1)[1]"}],"prose":"user-accessible security functions\/mechanisms;"},{"id":"sa-5.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(b)(1)[2]"}],"prose":"how to effectively use those functions\/mechanisms;"}]},{"id":"sa-5.b.2_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)(2)"}],"prose":"methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner;"},{"id":"sa-5.b.3_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)(3)"}],"prose":"user responsibilities in maintaining the security of the system, component, or service;"}]},{"id":"sa-5.c_obj","name":"objective","props":[{"name":"label","value":"SA-5(c)"}],"parts":[{"id":"sa-5.c_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(c)[1]"}],"prose":"defines actions to be taken after documented attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent;"},{"id":"sa-5.c_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(c)[2]"}],"prose":"documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent;"},{"id":"sa-5.c_obj.3","name":"objective","props":[{"name":"label","value":"SA-5(c)[3]"}],"prose":"takes organization-defined actions in response;"}]},{"id":"sa-5.d_obj","name":"objective","props":[{"name":"label","value":"SA-5(d)"}],"prose":"protects documentation as required, in accordance with the risk management strategy;"},{"id":"sa-5.e_obj","name":"objective","props":[{"name":"label","value":"SA-5(e)"}],"parts":[{"id":"sa-5.e_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(e)[1]"}],"prose":"defines personnel or roles to whom documentation is to be distributed; and"},{"id":"sa-5.e_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(e)[2]"}],"prose":"distributes documentation to organization-defined personnel or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing information system documentation\n\ninformation system documentation including administrator and user guides\n\nrecords documenting attempts to obtain unavailable or nonexistent information system documentation\n\nlist of actions to be taken in response to documented attempts to obtain information system, system component, or information system service documentation\n\nrisk management strategy documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\nsystem administrators\n\norganizational personnel operating, using, and\/or maintaining the information system\n\ninformation system developers\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for obtaining, protecting, and distributing information system administrator and user documentation"}]}]},{"id":"sa-8","class":"SP800-53","title":"Security Engineering Principles","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-8"},{"name":"sort-id","value":"sa-08"}],"links":[{"href":"#21b1ed35-56d2-40a8-bdfe-b461fffe322f","rel":"reference"}],"parts":[{"id":"sa-8_smt","name":"statement","prose":"The organization applies information system security engineering principles in the specification, design, development, implementation, and modification of the information system."},{"id":"sa-8_gdn","name":"guidance","prose":"Organizations apply security engineering principles primarily to new development information systems or systems undergoing major upgrades. For legacy systems, organizations apply security engineering principles to system upgrades and modifications to the extent feasible, given the current state of hardware, software, and firmware within those systems. Security engineering principles include, for example: (i) developing layered protections; (ii) establishing sound security policy, architecture, and controls as the foundation for design; (iii) incorporating security requirements into the system development life cycle; (iv) delineating physical and logical security boundaries; (v) ensuring that system developers are trained on how to build secure software; (vi) tailoring security controls to meet organizational and operational needs; (vii) performing threat modeling to identify use cases, threat agents, attack vectors, and attack patterns as well as compensating controls and design patterns needed to mitigate risk; and (viii) reducing risk to acceptable levels, thus enabling informed risk management decisions.","links":[{"href":"#pm-7","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-17","rel":"related"},{"href":"#sc-2","rel":"related"},{"href":"#sc-3","rel":"related"}]},{"id":"sa-8_obj","name":"objective","prose":"Determine if the organization applies information system security engineering principles in:","parts":[{"id":"sa-8_obj.1","name":"objective","props":[{"name":"label","value":"SA-8[1]"}],"prose":"the specification of the information system;"},{"id":"sa-8_obj.2","name":"objective","props":[{"name":"label","value":"SA-8[2]"}],"prose":"the design of the information system;"},{"id":"sa-8_obj.3","name":"objective","props":[{"name":"label","value":"SA-8[3]"}],"prose":"the development of the information system;"},{"id":"sa-8_obj.4","name":"objective","props":[{"name":"label","value":"SA-8[4]"}],"prose":"the implementation of the information system; and"},{"id":"sa-8_obj.5","name":"objective","props":[{"name":"label","value":"SA-8[5]"}],"prose":"the modification of the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing security engineering principles used in the specification, design, development, implementation, and modification of the information system\n\ninformation system design documentation\n\ninformation security requirements and specifications for the information system\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\norganizational personnel with information system specification, design, development, implementation, and modification responsibilities\n\ninformation system developers\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for applying security engineering principles in information system specification, design, development, implementation, and modification\n\nautomated mechanisms supporting the application of security engineering principles in information system specification, design, development, implementation, and modification"}]}]},{"id":"sa-9","class":"SP800-53","title":"External Information System Services","params":[{"id":"sa-9_prm_1","label":"organization-defined security controls"},{"id":"sa-9_prm_2","label":"organization-defined processes, methods, and techniques"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-9"},{"name":"sort-id","value":"sa-09"}],"links":[{"href":"#0c775bc3-bfc3-42c7-a382-88949f503171","rel":"reference"}],"parts":[{"id":"sa-9_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Requires that providers of external information system services comply with organizational information security requirements and employ {{ insert: param, sa-9_prm_1 }} in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"},{"id":"sa-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Defines and documents government oversight and user roles and responsibilities with regard to external information system services; and"},{"id":"sa-9_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Employs {{ insert: param, sa-9_prm_2 }} to monitor security control compliance by external service providers on an ongoing basis."}]},{"id":"sa-9_gdn","name":"guidance","prose":"External information system services are services that are implemented outside of the authorization boundaries of organizational information systems. This includes services that are used by, but not a part of, organizational information systems. FISMA and OMB policy require that organizations using external service providers that are processing, storing, or transmitting federal information or operating information systems on behalf of the federal government ensure that such providers meet the same security requirements that federal agencies are required to meet. Organizations establish relationships with external service providers in a variety of ways including, for example, through joint ventures, business partnerships, contracts, interagency agreements, lines of business arrangements, licensing agreements, and supply chain exchanges. The responsibility for managing risks from the use of external information system services remains with authorizing officials. For services external to organizations, a chain of trust requires that organizations establish and retain a level of confidence that each participating provider in the potentially complex consumer-provider relationship provides adequate protection for the services rendered. The extent and nature of this chain of trust varies based on the relationships between organizations and the external providers. Organizations document the basis for trust relationships so the relationships can be monitored over time. External information system services documentation includes government, service providers, end user security roles and responsibilities, and service-level agreements. Service-level agreements define expectations of performance for security controls, describe measurable outcomes, and identify remedies and response requirements for identified instances of noncompliance.","links":[{"href":"#ca-3","rel":"related"},{"href":"#ir-7","rel":"related"},{"href":"#ps-7","rel":"related"}]},{"id":"sa-9_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-9.a_obj","name":"objective","props":[{"name":"label","value":"SA-9(a)"}],"parts":[{"id":"sa-9.a_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(a)[1]"}],"prose":"defines security controls to be employed by providers of external information system services;"},{"id":"sa-9.a_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(a)[2]"}],"prose":"requires that providers of external information system services comply with organizational information security requirements;"},{"id":"sa-9.a_obj.3","name":"objective","props":[{"name":"label","value":"SA-9(a)[3]"}],"prose":"requires that providers of external information system services employ organization-defined security controls in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"}]},{"id":"sa-9.b_obj","name":"objective","props":[{"name":"label","value":"SA-9(b)"}],"parts":[{"id":"sa-9.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(b)[1]"}],"prose":"defines and documents government oversight with regard to external information system services;"},{"id":"sa-9.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(b)[2]"}],"prose":"defines and documents user roles and responsibilities with regard to external information system services;"}]},{"id":"sa-9.c_obj","name":"objective","props":[{"name":"label","value":"SA-9(c)"}],"parts":[{"id":"sa-9.c_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(c)[1]"}],"prose":"defines processes, methods, and techniques to be employed to monitor security control compliance by external service providers; and"},{"id":"sa-9.c_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(c)[2]"}],"prose":"employs organization-defined processes, methods, and techniques to monitor security control compliance by external service providers on an ongoing basis."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing external information system services\n\nprocedures addressing methods and techniques for monitoring security control compliance by external service providers of information system services\n\nacquisition contracts, service-level agreements\n\norganizational security requirements and security specifications for external provider services\n\nsecurity control assessment evidence from external providers of information system services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\nexternal providers of information system services\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring security control compliance by external service providers on an ongoing basis\n\nautomated mechanisms for monitoring security control compliance by external service providers on an ongoing basis"}]}],"controls":[{"id":"sa-9.2","class":"SP800-53-enhancement","title":"Identification of Functions \/ Ports \/ Protocols \/ Services","params":[{"id":"sa-9.2_prm_1","label":"organization-defined external information system services"}],"props":[{"name":"label","value":"SA-9(2)"},{"name":"sort-id","value":"sa-09.02"}],"parts":[{"id":"sa-9.2_smt","name":"statement","prose":"The organization requires providers of {{ insert: param, sa-9.2_prm_1 }} to identify the functions, ports, protocols, and other services required for the use of such services."},{"id":"sa-9.2_gdn","name":"guidance","prose":"Information from external service providers regarding the specific functions, ports, protocols, and services used in the provision of such services can be particularly useful when the need arises to understand the trade-offs involved in restricting certain functions\/services or blocking certain ports\/protocols.","links":[{"href":"#cm-7","rel":"related"}]},{"id":"sa-9.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-9.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(2)[1]"}],"prose":"defines external information system services for which providers of such services are to identify the functions, ports, protocols, and other services required for the use of such services;"},{"id":"sa-9.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(2)[2]"}],"prose":"requires providers of organization-defined external information system services to identify:","parts":[{"id":"sa-9.2_obj.2.a","name":"objective","props":[{"name":"label","value":"SA-9(2)[2][a]"}],"prose":"the functions required for the use of such services;"},{"id":"sa-9.2_obj.2.b","name":"objective","props":[{"name":"label","value":"SA-9(2)[2][b]"}],"prose":"the ports required for the use of such services;"},{"id":"sa-9.2_obj.2.c","name":"objective","props":[{"name":"label","value":"SA-9(2)[2][c]"}],"prose":"the protocols required for the use of such services; and"},{"id":"sa-9.2_obj.2.d","name":"objective","props":[{"name":"label","value":"SA-9(2)[2][d]"}],"prose":"the other services required for the use of such services."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing external information system services\n\nacquisition contracts for the information system, system component, or information system service\n\nacquisition documentation\n\nsolicitation documentation, service-level agreements\n\norganizational security requirements and security specifications for external service providers\n\nlist of required functions, ports, protocols, and other services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nexternal providers of information system services"}]}]}]},{"id":"sa-10","class":"SP800-53","title":"Developer Configuration Management","params":[{"id":"sa-10_prm_1","select":{"how-many":"one-or-more","choice":["design","development","implementation","operation"]}},{"id":"sa-10_prm_2","label":"organization-defined configuration items under configuration management"},{"id":"sa-10_prm_3","label":"organization-defined personnel"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-10"},{"name":"sort-id","value":"sa-10"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"sa-10_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to:","parts":[{"id":"sa-10_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Perform configuration management during system, component, or service {{ insert: param, sa-10_prm_1 }};"},{"id":"sa-10_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Document, manage, and control the integrity of changes to {{ insert: param, sa-10_prm_2 }};"},{"id":"sa-10_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Implement only organization-approved changes to the system, component, or service;"},{"id":"sa-10_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Document approved changes to the system, component, or service and the potential security impacts of such changes; and"},{"id":"sa-10_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Track security flaws and flaw resolution within the system, component, or service and report findings to {{ insert: param, sa-10_prm_3 }}."}]},{"id":"sa-10_gdn","name":"guidance","prose":"This control also applies to organizations conducting internal information systems development and integration. Organizations consider the quality and completeness of the configuration management activities conducted by developers as evidence of applying effective security safeguards. Safeguards include, for example, protecting from unauthorized modification or destruction, the master copies of all material used to generate security-relevant portions of the system hardware, software, and firmware. Maintaining the integrity of changes to the information system, information system component, or information system service requires configuration control throughout the system development life cycle to track authorized changes and prevent unauthorized changes. Configuration items that are placed under configuration management (if existence\/use is required by other security controls) include: the formal model; the functional, high-level, and low-level design specifications; other design data; implementation documentation; source code and hardware schematics; the running version of the object code; tools for comparing new versions of security-relevant hardware descriptions and software\/firmware source code with previous versions; and test fixtures and documentation. Depending on the mission\/business needs of organizations and the nature of the contractual relationships in place, developers may provide configuration management support during the operations and maintenance phases of the life cycle.","links":[{"href":"#cm-3","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"sa-10_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-10.a_obj","name":"objective","props":[{"name":"label","value":"SA-10(a)"}],"prose":"requires the developer of the information system, system component, or information system service to perform configuration management during one or more of the following:","parts":[{"id":"sa-10.a_obj.1","name":"objective","props":[{"name":"label","value":"SA-10(a)[1]"}],"prose":"system, component, or service design;"},{"id":"sa-10.a_obj.2","name":"objective","props":[{"name":"label","value":"SA-10(a)[2]"}],"prose":"system, component, or service development;"},{"id":"sa-10.a_obj.3","name":"objective","props":[{"name":"label","value":"SA-10(a)[3]"}],"prose":"system, component, or service implementation; and\/or"},{"id":"sa-10.a_obj.4","name":"objective","props":[{"name":"label","value":"SA-10(a)[4]"}],"prose":"system, component, or service operation;"}]},{"id":"sa-10.b_obj","name":"objective","props":[{"name":"label","value":"SA-10(b)"}],"parts":[{"id":"sa-10.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-10(b)[1]"}],"prose":"defines configuration items to be placed under configuration management;"},{"id":"sa-10.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-10(b)[2]"}],"prose":"requires the developer of the information system, system component, or information system service to:","parts":[{"id":"sa-10.b_obj.2.a","name":"objective","props":[{"name":"label","value":"SA-10(b)[2][a]"}],"prose":"document the integrity of changes to organization-defined items under configuration management;"},{"id":"sa-10.b_obj.2.b","name":"objective","props":[{"name":"label","value":"SA-10(b)[2][b]"}],"prose":"manage the integrity of changes to organization-defined items under configuration management;"},{"id":"sa-10.b_obj.2.c","name":"objective","props":[{"name":"label","value":"SA-10(b)[2][c]"}],"prose":"control the integrity of changes to organization-defined items under configuration management;"}]}]},{"id":"sa-10.c_obj","name":"objective","props":[{"name":"label","value":"SA-10(c)"}],"prose":"requires the developer of the information system, system component, or information system service to implement only organization-approved changes to the system, component, or service;"},{"id":"sa-10.d_obj","name":"objective","props":[{"name":"label","value":"SA-10(d)"}],"prose":"requires the developer of the information system, system component, or information system service to document:","parts":[{"id":"sa-10.d_obj.1","name":"objective","props":[{"name":"label","value":"SA-10(d)[1]"}],"prose":"approved changes to the system, component, or service;"},{"id":"sa-10.d_obj.2","name":"objective","props":[{"name":"label","value":"SA-10(d)[2]"}],"prose":"the potential security impacts of such changes;"}]},{"id":"sa-10.e_obj","name":"objective","props":[{"name":"label","value":"SA-10(e)"}],"parts":[{"id":"sa-10.e_obj.1","name":"objective","props":[{"name":"label","value":"SA-10(e)[1]"}],"prose":"defines personnel to whom findings, resulting from security flaws and flaw resolution tracked within the system, component, or service, are to be reported;"},{"id":"sa-10.e_obj.2","name":"objective","props":[{"name":"label","value":"SA-10(e)[2]"}],"prose":"requires the developer of the information system, system component, or information system service to:","parts":[{"id":"sa-10.e_obj.2.a","name":"objective","props":[{"name":"label","value":"SA-10(e)[2][a]"}],"prose":"track security flaws within the system, component, or service;"},{"id":"sa-10.e_obj.2.b","name":"objective","props":[{"name":"label","value":"SA-10(e)[2][b]"}],"prose":"track security flaw resolution within the system, component, or service; and"},{"id":"sa-10.e_obj.2.c","name":"objective","props":[{"name":"label","value":"SA-10(e)[2][c]"}],"prose":"report findings to organization-defined personnel."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing system developer configuration management\n\nsolicitation documentation\n\nacquisition documentation\n\nservice-level agreements\n\nacquisition contracts for the information system, system component, or information system service\n\nsystem developer configuration management plan\n\nsecurity flaw and flaw resolution tracking records\n\nsystem change authorization records\n\nchange control records\n\nconfiguration management records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with configuration management responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring developer configuration management\n\nautomated mechanisms supporting and\/or implementing the monitoring of developer configuration management"}]}]},{"id":"sa-11","class":"SP800-53","title":"Developer Security Testing and Evaluation","params":[{"id":"sa-11_prm_1","select":{"how-many":"one-or-more","choice":["unit","integration","system","regression"]}},{"id":"sa-11_prm_2","label":"organization-defined depth and coverage"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-11"},{"name":"sort-id","value":"sa-11"}],"links":[{"href":"#1737a687-52fb-4008-b900-cbfa836f7b65","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#275cc052-0f7f-423c-bdb6-ed503dc36228","rel":"reference"},{"href":"#15522e92-9192-463d-9646-6a01982db8ca","rel":"reference"},{"href":"#0931209f-00ae-4132-b92c-bc645847e8f9","rel":"reference"},{"href":"#4ef539ba-b767-4666-b0d3-168c53005fa3","rel":"reference"}],"parts":[{"id":"sa-11_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to:","parts":[{"id":"sa-11_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Create and implement a security assessment plan;"},{"id":"sa-11_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Perform {{ insert: param, sa-11_prm_1 }} testing\/evaluation at {{ insert: param, sa-11_prm_2 }};"},{"id":"sa-11_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Produce evidence of the execution of the security assessment plan and the results of the security testing\/evaluation;"},{"id":"sa-11_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Implement a verifiable flaw remediation process; and"},{"id":"sa-11_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Correct flaws identified during security testing\/evaluation."}]},{"id":"sa-11_gdn","name":"guidance","prose":"Developmental security testing\/evaluation occurs at all post-design phases of the system development life cycle. Such testing\/evaluation confirms that the required security controls are implemented correctly, operating as intended, enforcing the desired security policy, and meeting established security requirements. Security properties of information systems may be affected by the interconnection of system components or changes to those components. These interconnections or changes (e.g., upgrading or replacing applications and operating systems) may adversely affect previously implemented security controls. This control provides additional types of security testing\/evaluation that developers can conduct to reduce or eliminate potential flaws. Testing custom software applications may require approaches such as static analysis, dynamic analysis, binary analysis, or a hybrid of the three approaches. Developers can employ these analysis approaches in a variety of tools (e.g., web-based application scanners, static analysis tools, binary analyzers) and in source code reviews. Security assessment plans provide the specific activities that developers plan to carry out including the types of analyses, testing, evaluation, and reviews of software and firmware components, the degree of rigor to be applied, and the types of artifacts produced during those processes. The depth of security testing\/evaluation refers to the rigor and level of detail associated with the assessment process (e.g., black box, gray box, or white box testing). The coverage of security testing\/evaluation refers to the scope (i.e., number and type) of the artifacts included in the assessment process. Contracts specify the acceptance criteria for security assessment plans, flaw remediation processes, and the evidence that the plans\/processes have been diligently applied. Methods for reviewing and protecting assessment plans, evidence, and documentation are commensurate with the security category or classification level of the information system. Contracts may specify documentation protection requirements.","links":[{"href":"#ca-2","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"sa-11_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-11.a_obj","name":"objective","props":[{"name":"label","value":"SA-11(a)"}],"prose":"requires the developer of the information system, system component, or information system service to create and implement a security plan;"},{"id":"sa-11.b_obj","name":"objective","props":[{"name":"label","value":"SA-11(b)"}],"parts":[{"id":"sa-11.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-11(b)[1]"}],"prose":"defines the depth of testing\/evaluation to be performed by the developer of the information system, system component, or information system service;"},{"id":"sa-11.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-11(b)[2]"}],"prose":"defines the coverage of testing\/evaluation to be performed by the developer of the information system, system component, or information system service;"},{"id":"sa-11.b_obj.3","name":"objective","props":[{"name":"label","value":"SA-11(b)[3]"}],"prose":"requires the developer of the information system, system component, or information system service to perform one or more of the following testing\/evaluation at the organization-defined depth and coverage:","parts":[{"id":"sa-11.b_obj.3.a","name":"objective","props":[{"name":"label","value":"SA-11(b)[3][a]"}],"prose":"unit testing\/evaluation;"},{"id":"sa-11.b_obj.3.b","name":"objective","props":[{"name":"label","value":"SA-11(b)[3][b]"}],"prose":"integration testing\/evaluation;"},{"id":"sa-11.b_obj.3.c","name":"objective","props":[{"name":"label","value":"SA-11(b)[3][c]"}],"prose":"system testing\/evaluation; and\/or"},{"id":"sa-11.b_obj.3.d","name":"objective","props":[{"name":"label","value":"SA-11(b)[3][d]"}],"prose":"regression testing\/evaluation;"}]}]},{"id":"sa-11.c_obj","name":"objective","props":[{"name":"label","value":"SA-11(c)"}],"prose":"requires the developer of the information system, system component, or information system service to produce evidence of:","parts":[{"id":"sa-11.c_obj.1","name":"objective","props":[{"name":"label","value":"SA-11(c)[1]"}],"prose":"the execution of the security assessment plan;"},{"id":"sa-11.c_obj.2","name":"objective","props":[{"name":"label","value":"SA-11(c)[2]"}],"prose":"the results of the security testing\/evaluation;"}]},{"id":"sa-11.d_obj","name":"objective","props":[{"name":"label","value":"SA-11(d)"}],"prose":"requires the developer of the information system, system component, or information system service to implement a verifiable flaw remediation process; and"},{"id":"sa-11.e_obj","name":"objective","props":[{"name":"label","value":"SA-11(e)"}],"prose":"requires the developer of the information system, system component, or information system service to correct flaws identified during security testing\/evaluation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing system developer security testing\n\nprocedures addressing flaw remediation\n\nsolicitation documentation\n\nacquisition documentation\n\nservice-level agreements\n\nacquisition contracts for the information system, system component, or information system service\n\nsystem developer security test plans\n\nrecords of developer security testing results for the information system, system component, or information system service\n\nsecurity flaw and remediation tracking records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with developer security testing responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring developer security testing and evaluation\n\nautomated mechanisms supporting and\/or implementing the monitoring of developer security testing and evaluation"}]}]},{"id":"sa-12","class":"SP800-53","title":"Supply Chain Protection","params":[{"id":"sa-12_prm_1","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-12"},{"name":"sort-id","value":"sa-12"}],"links":[{"href":"#8ab6bcdc-339b-4068-b45e-994814a6e187","rel":"reference"},{"href":"#bdd2f49e-edf7-491f-a178-4487898228f3","rel":"reference"}],"parts":[{"id":"sa-12_smt","name":"statement","prose":"The organization protects against supply chain threats to the information system, system component, or information system service by employing {{ insert: param, sa-12_prm_1 }} as part of a comprehensive, defense-in-breadth information security strategy."},{"id":"sa-12_gdn","name":"guidance","prose":"Information systems (including system components that compose those systems) need to be protected throughout the system development life cycle (i.e., during design, development, manufacturing, packaging, assembly, distribution, system integration, operations, maintenance, and retirement). Protection of organizational information systems is accomplished through threat awareness, by the identification, management, and reduction of vulnerabilities at each phase of the life cycle and the use of complementary, mutually reinforcing strategies to respond to risk. Organizations consider implementing a standardized process to address supply chain risk with respect to information systems and system components, and to educate the acquisition workforce on threats, risk, and required security controls. Organizations use the acquisition\/procurement processes to require supply chain entities to implement necessary security safeguards to: (i) reduce the likelihood of unauthorized modifications at each stage in the supply chain; and (ii) protect information systems and information system components, prior to taking delivery of such systems\/components. This control also applies to information system services. Security safeguards include, for example: (i) security controls for development systems, development facilities, and external connections to development systems; (ii) vetting development personnel; and (iii) use of tamper-evident packaging during shipping\/warehousing. Methods for reviewing and protecting development plans, evidence, and documentation are commensurate with the security category or classification level of the information system. Contracts may specify documentation protection requirements.","links":[{"href":"#at-3","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#pe-16","rel":"related"},{"href":"#pl-8","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#sa-14","rel":"related"},{"href":"#sa-15","rel":"related"},{"href":"#sa-18","rel":"related"},{"href":"#sa-19","rel":"related"},{"href":"#sc-29","rel":"related"},{"href":"#sc-30","rel":"related"},{"href":"#sc-38","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"sa-12_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-12_obj.1","name":"objective","props":[{"name":"label","value":"SA-12[1]"}],"prose":"defines security safeguards to be employed to protect against supply chain threats to the information system, system component, or information system service; and"},{"id":"sa-12_obj.2","name":"objective","props":[{"name":"label","value":"SA-12[2]"}],"prose":"protects against supply chain threats to the information system, system component, or information system service by employing organization-defined security safeguards as part of a comprehensive, defense-in-breadth information security strategy."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing supply chain protection\n\nprocedures addressing the integration of information security requirements into the acquisition process\n\nsolicitation documentation\n\nacquisition documentation\n\nservice-level agreements\n\nacquisition contracts for the information system, system component, or information system service\n\nlist of supply chain threats\n\nlist of security safeguards to be taken against supply chain threats\n\nsystem development life cycle documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with supply chain protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for defining safeguards for and protecting against supply chain threats\n\nautomated mechanisms supporting and\/or implementing safeguards for supply chain threats"}]}]},{"id":"sa-15","class":"SP800-53","title":"Development Process, Standards, and Tools","params":[{"id":"sa-15_prm_1","label":"organization-defined frequency"},{"id":"sa-15_prm_2","label":"organization-defined security requirements"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"SA-15"},{"name":"sort-id","value":"sa-15"}],"parts":[{"id":"sa-15_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-15_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Requires the developer of the information system, system component, or information system service to follow a documented development process that:","parts":[{"id":"sa-15_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Explicitly addresses security requirements;"},{"id":"sa-15_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Identifies the standards and tools used in the development process;"},{"id":"sa-15_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Documents the specific tool options and tool configurations used in the development process; and"},{"id":"sa-15_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Documents, manages, and ensures the integrity of changes to the process and\/or tools used in development; and"}]},{"id":"sa-15_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews the development process, standards, tools, and tool options\/configurations {{ insert: param, sa-15_prm_1 }} to determine if the process, standards, tools, and tool options\/configurations selected and employed can satisfy {{ insert: param, sa-15_prm_2 }}."}]},{"id":"sa-15_gdn","name":"guidance","prose":"Development tools include, for example, programming languages and computer-aided design (CAD) systems. Reviews of development processes can include, for example, the use of maturity models to determine the potential effectiveness of such processes. Maintaining the integrity of changes to tools and processes enables accurate supply chain risk assessment and mitigation, and requires robust configuration control throughout the life cycle (including design, development, transport, delivery, integration, and maintenance) to track authorized changes and prevent unauthorized changes.","links":[{"href":"#sa-3","rel":"related"},{"href":"#sa-8","rel":"related"}]},{"id":"sa-15_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-15.a_obj","name":"objective","props":[{"name":"label","value":"SA-15(a)"}],"prose":"requires the developer of the information system, system component, or information system service to follow a documented development process that:","parts":[{"id":"sa-15.a.1_obj","name":"objective","props":[{"name":"label","value":"SA-15(a)(1)"}],"prose":"explicitly addresses security requirements;"},{"id":"sa-15.a.2_obj","name":"objective","props":[{"name":"label","value":"SA-15(a)(2)"}],"prose":"identifies the standards and tools used in the development process;"},{"id":"sa-15.a.3_obj","name":"objective","props":[{"name":"label","value":"SA-15(a)(3)"}],"parts":[{"id":"sa-15.a.3_obj.1","name":"objective","props":[{"name":"label","value":"SA-15(a)(3)[1]"}],"prose":"documents the specific tool options used in the development process;"},{"id":"sa-15.a.3_obj.2","name":"objective","props":[{"name":"label","value":"SA-15(a)(3)[2]"}],"prose":"documents the specific tool configurations used in the development process;"}]},{"id":"sa-15.a.4_obj","name":"objective","props":[{"name":"label","value":"SA-15(a)(4)"}],"parts":[{"id":"sa-15.a.4_obj.1","name":"objective","props":[{"name":"label","value":"SA-15(a)(4)[1]"}],"prose":"documents changes to the process and\/or tools used in the development;"},{"id":"sa-15.a.4_obj.2","name":"objective","props":[{"name":"label","value":"SA-15(a)(4)[2]"}],"prose":"manages changes to the process and\/or tools used in the development;"},{"id":"sa-15.a.4_obj.3","name":"objective","props":[{"name":"label","value":"SA-15(a)(4)[3]"}],"prose":"ensures the integrity of changes to the process and\/or tools used in the development;"}]}]},{"id":"sa-15.b_obj","name":"objective","props":[{"name":"label","value":"SA-15(b)"}],"parts":[{"id":"sa-15.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-15(b)[1]"}],"prose":"defines a frequency to review the development process, standards, tools, and tool options\/configurations;"},{"id":"sa-15.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-15(b)[2]"}],"prose":"defines security requirements to be satisfied by the process, standards, tools, and tool option\/configurations selected and employed; and"},{"id":"sa-15.b_obj.3","name":"objective","props":[{"name":"label","value":"SA-15(b)[3]"}],"parts":[{"id":"sa-15.b_obj.3.a","name":"objective","props":[{"name":"label","value":"SA-15(b)[3][a]"}],"prose":"reviews the development process with the organization-defined frequency to determine if the process selected and employed can satisfy organization-defined security requirements;"},{"id":"sa-15.b_obj.3.b","name":"objective","props":[{"name":"label","value":"SA-15(b)[3][b]"}],"prose":"reviews the development standards with the organization-defined frequency to determine if the standards selected and employed can satisfy organization-defined security requirements;"},{"id":"sa-15.b_obj.3.c","name":"objective","props":[{"name":"label","value":"SA-15(b)[3][c]"}],"prose":"reviews the development tools with the organization-defined frequency to determine if the tools selected and employed can satisfy organization-defined security requirements; and"},{"id":"sa-15.b_obj.3.d","name":"objective","props":[{"name":"label","value":"SA-15(b)[3][d]"}],"prose":"reviews the development tool options\/configurations with the organization-defined frequency to determine if the tool options\/configurations selected and employed can satisfy organization-defined security requirements."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing development process, standards, and tools\n\nprocedures addressing the integration of security requirements during the development process\n\nsolicitation documentation\n\nacquisition documentation\n\nservice-level agreements\n\nacquisition contracts for the information system, system component, or information system service\n\nsystem developer documentation listing tool options\/configuration guides, configuration management records\n\nchange control records\n\nconfiguration control records\n\ndocumented reviews of development process, standards, tools, and tool options\/configurations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]}]},{"id":"sa-16","class":"SP800-53","title":"Developer-provided Training","params":[{"id":"sa-16_prm_1","label":"organization-defined training"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"SA-16"},{"name":"sort-id","value":"sa-16"}],"parts":[{"id":"sa-16_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to provide {{ insert: param, sa-16_prm_1 }} on the correct use and operation of the implemented security functions, controls, and\/or mechanisms."},{"id":"sa-16_gdn","name":"guidance","prose":"This control applies to external and internal (in-house) developers. Training of personnel is an essential element to ensure the effectiveness of security controls implemented within organizational information systems. Training options include, for example, classroom-style training, web-based\/computer-based training, and hands-on training. Organizations can also request sufficient training materials from developers to conduct in-house training or offer self-training to organizational personnel. Organizations determine the type of training necessary and may require different types of training for different security functions, controls, or mechanisms.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#sa-5","rel":"related"}]},{"id":"sa-16_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-16_obj.1","name":"objective","props":[{"name":"label","value":"SA-16[1]"}],"prose":"defines training to be provided by the developer of the information system, system component, or information system service; and"},{"id":"sa-16_obj.2","name":"objective","props":[{"name":"label","value":"SA-16[2]"}],"prose":"requires the developer of the information system, system component, or information system service to provide organization-defined training on the correct use and operation of the implemented security functions, controls, and\/or mechanisms."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing developer-provided training\n\nsolicitation documentation\n\nacquisition documentation\n\nservice-level agreements\n\nacquisition contracts for the information system, system component, or information system service\n\ndeveloper-provided training materials\n\ntraining records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information system security responsibilities\n\nsystem developer\n\norganizational or third-party developers with training responsibilities for the information system, system component, or information system service"}]}]},{"id":"sa-17","class":"SP800-53","title":"Developer Security Architecture and Design","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-17"},{"name":"sort-id","value":"sa-17"}],"parts":[{"id":"sa-17_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to produce a design specification and security architecture that:","parts":[{"id":"sa-17_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Is consistent with and supportive of the organization’s security architecture which is established within and is an integrated part of the organization’s enterprise architecture;"},{"id":"sa-17_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Accurately and completely describes the required security functionality, and the allocation of security controls among physical and logical components; and"},{"id":"sa-17_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Expresses how individual security functions, mechanisms, and services work together to provide required security capabilities and a unified approach to protection."}]},{"id":"sa-17_gdn","name":"guidance","prose":"This control is primarily directed at external developers, although it could also be used for internal (in-house) development. In contrast, PL-8 is primarily directed at internal developers to help ensure that organizations develop an information security architecture and such security architecture is integrated or tightly coupled to the enterprise architecture. This distinction is important if\/when organizations outsource the development of information systems, information system components, or information system services to external entities, and there is a requirement to demonstrate consistency with the organization’s enterprise architecture and information security architecture.","links":[{"href":"#pl-8","rel":"related"},{"href":"#pm-7","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-8","rel":"related"}]},{"id":"sa-17_obj","name":"objective","prose":"Determine if the organization requires the developer of the information system, system component, or information system service to produce a design specification and security architecture that:","parts":[{"id":"sa-17.a_obj","name":"objective","props":[{"name":"label","value":"SA-17(a)"}],"prose":"is consistent with and supportive of the organization’s security architecture which is established within and is an integrated part of the organization’s enterprise architecture;"},{"id":"sa-17.b_obj","name":"objective","props":[{"name":"label","value":"SA-17(b)"}],"prose":"accurately and completely describes:","parts":[{"id":"sa-17.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-17(b)[1]"}],"prose":"the required security functionality;"},{"id":"sa-17.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-17(b)[2]"}],"prose":"the allocation of security controls among physical and logical components; and"}]},{"id":"sa-17.c_obj","name":"objective","props":[{"name":"label","value":"SA-17(c)"}],"prose":"expresses how individual security functions, mechanisms, and services work together to provide required security capabilities and a unified approach to protection."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nenterprise architecture policy\n\nprocedures addressing developer security architecture and design specification for the information system\n\nsolicitation documentation\n\nacquisition documentation\n\nservice-level agreements\n\nacquisition contracts for the information system, system component, or information system service\n\ndesign specification and security architecture documentation for the system\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with security architecture and design responsibilities"}]}]}]},{"id":"sc","class":"family","title":"System and Communications Protection","controls":[{"id":"sc-1","class":"SP800-53","title":"System and Communications Protection Policy and Procedures","params":[{"id":"sc-1_prm_1","label":"organization-defined personnel or roles"},{"id":"sc-1_prm_2","label":"organization-defined frequency"},{"id":"sc-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-1"},{"name":"sort-id","value":"sc-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"sc-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"sc-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, sc-1_prm_1 }}:","parts":[{"id":"sc-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"sc-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls; and"}]},{"id":"sc-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"sc-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System and communications protection policy {{ insert: param, sc-1_prm_2 }}; and"},{"id":"sc-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System and communications protection procedures {{ insert: param, sc-1_prm_3 }}."}]}]},{"id":"sc-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the SC family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"sc-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-1.a_obj","name":"objective","props":[{"name":"label","value":"SC-1(a)"}],"parts":[{"id":"sc-1.a.1_obj","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)"}],"parts":[{"id":"sc-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1]"}],"prose":"develops and documents a system and communications protection policy that addresses:","parts":[{"id":"sc-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"sc-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"sc-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"sc-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"sc-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"sc-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"sc-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"sc-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system and communications protection policy is to be disseminated;"},{"id":"sc-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[3]"}],"prose":"disseminates the system and communications protection policy to organization-defined personnel or roles;"}]},{"id":"sc-1.a.2_obj","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)"}],"parts":[{"id":"sc-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls;"},{"id":"sc-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"sc-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"sc-1.b_obj","name":"objective","props":[{"name":"label","value":"SC-1(b)"}],"parts":[{"id":"sc-1.b.1_obj","name":"objective","props":[{"name":"label","value":"SC-1(b)(1)"}],"parts":[{"id":"sc-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system and communications protection policy;"},{"id":"sc-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(b)(1)[2]"}],"prose":"reviews and updates the current system and communications protection policy with the organization-defined frequency;"}]},{"id":"sc-1.b.2_obj","name":"objective","props":[{"name":"label","value":"SC-1(b)(2)"}],"parts":[{"id":"sc-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system and communications protection procedures; and"},{"id":"sc-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(b)(2)[2]"}],"prose":"reviews and updates the current system and communications protection procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and communications protection responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"sc-2","class":"SP800-53","title":"Application Partitioning","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-2"},{"name":"sort-id","value":"sc-02"}],"parts":[{"id":"sc-2_smt","name":"statement","prose":"The information system separates user functionality (including user interface services) from information system management functionality."},{"id":"sc-2_gdn","name":"guidance","prose":"Information system management functionality includes, for example, functions necessary to administer databases, network components, workstations, or servers, and typically requires privileged user access. The separation of user functionality from information system management functionality is either physical or logical. Organizations implement separation of system management-related functionality from user functionality by using different computers, different central processing units, different instances of operating systems, different network addresses, virtualization techniques, or combinations of these or other methods, as appropriate. This type of separation includes, for example, web administrative interfaces that use separate authentication methods for users of any other information system resources. Separation of system and user functionality may include isolating administrative interfaces on different domains and with additional access controls.","links":[{"href":"#sa-4","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sc-3","rel":"related"}]},{"id":"sc-2_obj","name":"objective","prose":"Determine if the information system separates user functionality (including user interface services) from information system management functionality."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing application partitioning\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Separation of user functionality from information system management functionality"}]}]},{"id":"sc-3","class":"SP800-53","title":"Security Function Isolation","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-3"},{"name":"sort-id","value":"sc-03"}],"parts":[{"id":"sc-3_smt","name":"statement","prose":"The information system isolates security functions from nonsecurity functions."},{"id":"sc-3_gdn","name":"guidance","prose":"The information system isolates security functions from nonsecurity functions by means of an isolation boundary (implemented via partitions and domains). Such isolation controls access to and protects the integrity of the hardware, software, and firmware that perform those security functions. Information systems implement code separation (i.e., separation of security functions from nonsecurity functions) in a number of ways, including, for example, through the provision of security kernels via processor rings or processor modes. For non-kernel code, security function isolation is often achieved through file system protections that serve to protect the code on disk, and address space protections that protect executing code. Information systems restrict access to security functions through the use of access control mechanisms and by implementing least privilege capabilities. While the ideal is for all of the code within the security function isolation boundary to only contain security-relevant code, it is sometimes necessary to include nonsecurity functions within the isolation boundary as an exception.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sa-13","rel":"related"},{"href":"#sc-2","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-39","rel":"related"}]},{"id":"sc-3_obj","name":"objective","prose":"Determine if the information system isolates security functions from nonsecurity functions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing security function isolation\n\nlist of security functions to be isolated from nonsecurity functions\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Separation of security functions from nonsecurity functions within the information system"}]}]},{"id":"sc-4","class":"SP800-53","title":"Information in Shared Resources","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-4"},{"name":"sort-id","value":"sc-04"}],"parts":[{"id":"sc-4_smt","name":"statement","prose":"The information system prevents unauthorized and unintended information transfer via shared system resources."},{"id":"sc-4_gdn","name":"guidance","prose":"This control prevents information, including encrypted representations of information, produced by the actions of prior users\/roles (or the actions of processes acting on behalf of prior users\/roles) from being available to any current users\/roles (or current processes) that obtain access to shared system resources (e.g., registers, main memory, hard disks) after those resources have been released back to information systems. The control of information in shared resources is also commonly referred to as object reuse and residual information protection. This control does not address: (i) information remanence which refers to residual representation of data that has been nominally erased or removed; (ii) covert channels (including storage and\/or timing channels) where shared resources are manipulated to violate information flow restrictions; or (iii) components within information systems for which there are only single users\/roles.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#mp-6","rel":"related"}]},{"id":"sc-4_obj","name":"objective","prose":"Determine if the information system prevents unauthorized and unintended information transfer via shared system resources."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing information protection in shared system resources\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms preventing unauthorized and unintended transfer of information via shared system resources"}]}]},{"id":"sc-5","class":"SP800-53","title":"Denial of Service Protection","params":[{"id":"sc-5_prm_1","label":"organization-defined types of denial of service attacks or references to sources for such information"},{"id":"sc-5_prm_2","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-5"},{"name":"sort-id","value":"sc-05"}],"parts":[{"id":"sc-5_smt","name":"statement","prose":"The information system protects against or limits the effects of the following types of denial of service attacks: {{ insert: param, sc-5_prm_1 }} by employing {{ insert: param, sc-5_prm_2 }}."},{"id":"sc-5_gdn","name":"guidance","prose":"A variety of technologies exist to limit, or in some cases, eliminate the effects of denial of service attacks. For example, boundary protection devices can filter certain types of packets to protect information system components on internal organizational networks from being directly affected by denial of service attacks. Employing increased capacity and bandwidth combined with service redundancy may also reduce the susceptibility to denial of service attacks.","links":[{"href":"#sc-6","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"sc-5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-5_obj.1","name":"objective","props":[{"name":"label","value":"SC-5[1]"}],"prose":"the organization defines types of denial of service attacks or reference to source of such information for the information system to protect against or limit the effects;"},{"id":"sc-5_obj.2","name":"objective","props":[{"name":"label","value":"SC-5[2]"}],"prose":"the organization defines security safeguards to be employed by the information system to protect against or limit the effects of organization-defined types of denial of service attacks; and"},{"id":"sc-5_obj.3","name":"objective","props":[{"name":"label","value":"SC-5[3]"}],"prose":"the information system protects against or limits the effects of the organization-defined denial or service attacks (or reference to source for such information) by employing organization-defined security safeguards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing denial of service protection\n\ninformation system design documentation\n\nsecurity plan\n\nlist of denial of services attacks requiring employment of security safeguards to protect against or limit effects of such attacks\n\nlist of security safeguards protecting against or limiting the effects of denial of service attacks\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with incident response responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms protecting against or limiting the effects of denial of service attacks"}]}]},{"id":"sc-7","class":"SP800-53","title":"Boundary Protection","params":[{"id":"sc-7_prm_1","select":{"choice":["physically","logically"]}}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-7"},{"name":"sort-id","value":"sc-07"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#756a8e86-57d5-4701-8382-f7a40439665a","rel":"reference"},{"href":"#99f331f2-a9f0-46c2-9856-a3cbb9b89442","rel":"reference"}],"parts":[{"id":"sc-7_smt","name":"statement","prose":"The information system:","parts":[{"id":"sc-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Monitors and controls communications at the external boundary of the system and at key internal boundaries within the system;"},{"id":"sc-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Implements subnetworks for publicly accessible system components that are {{ insert: param, sc-7_prm_1 }} separated from internal organizational networks; and"},{"id":"sc-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture."}]},{"id":"sc-7_gdn","name":"guidance","prose":"Managed interfaces include, for example, gateways, routers, firewalls, guards, network-based malicious code analysis and virtualization systems, or encrypted tunnels implemented within a security architecture (e.g., routers protecting firewalls or application gateways residing on protected subnetworks). Subnetworks that are physically or logically separated from internal networks are referred to as demilitarized zones or DMZs. Restricting or prohibiting interfaces within organizational information systems includes, for example, restricting external web traffic to designated web servers within managed interfaces and prohibiting external traffic that appears to be spoofing internal addresses. Organizations consider the shared nature of commercial telecommunications services in the implementation of security controls associated with the use of such services. Commercial telecommunications services are commonly based on network components and consolidated management systems shared by all attached commercial customers, and may also include third party-provided access lines and other service elements. Such transmission services may represent sources of increased risk despite contract security provisions.","links":[{"href":"#ac-4","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#cp-8","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"sc-7_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"sc-7.a_obj","name":"objective","props":[{"name":"label","value":"SC-7(a)"}],"parts":[{"id":"sc-7.a_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(a)[1]"}],"prose":"monitors communications at the external boundary of the information system;"},{"id":"sc-7.a_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(a)[2]"}],"prose":"monitors communications at key internal boundaries within the system;"},{"id":"sc-7.a_obj.3","name":"objective","props":[{"name":"label","value":"SC-7(a)[3]"}],"prose":"controls communications at the external boundary of the information system;"},{"id":"sc-7.a_obj.4","name":"objective","props":[{"name":"label","value":"SC-7(a)[4]"}],"prose":"controls communications at key internal boundaries within the system;"}]},{"id":"sc-7.b_obj","name":"objective","props":[{"name":"label","value":"SC-7(b)"}],"prose":"implements subnetworks for publicly accessible system components that are either:","parts":[{"id":"sc-7.b_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(b)[1]"}],"prose":"physically separated from internal organizational networks; and\/or"},{"id":"sc-7.b_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(b)[2]"}],"prose":"logically separated from internal organizational networks; and"}]},{"id":"sc-7.c_obj","name":"objective","props":[{"name":"label","value":"SC-7(c)"}],"prose":"connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\nlist of key internal boundaries of the information system\n\ninformation system design documentation\n\nboundary protection hardware and software\n\ninformation system configuration settings and associated documentation\n\nenterprise security architecture documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing boundary protection capability"}]}],"controls":[{"id":"sc-7.3","class":"SP800-53-enhancement","title":"Access Points","props":[{"name":"label","value":"SC-7(3)"},{"name":"sort-id","value":"sc-07.03"}],"parts":[{"id":"sc-7.3_smt","name":"statement","prose":"The organization limits the number of external network connections to the information system."},{"id":"sc-7.3_gdn","name":"guidance","prose":"Limiting the number of external network connections facilitates more comprehensive monitoring of inbound and outbound communications traffic. The Trusted Internet Connection (TIC) initiative is an example of limiting the number of external network connections."},{"id":"sc-7.3_obj","name":"objective","prose":"Determine if the organization limits the number of external network connections to the information system."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\ninformation system design documentation\n\nboundary protection hardware and software\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\ncommunications and network traffic monitoring logs\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing boundary protection capability\n\nautomated mechanisms limiting the number of external network connections to the information system"}]}]},{"id":"sc-7.4","class":"SP800-53-enhancement","title":"External Telecommunications Services","params":[{"id":"sc-7.4_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"SC-7(4)"},{"name":"sort-id","value":"sc-07.04"}],"parts":[{"id":"sc-7.4_smt","name":"statement","prose":"The organization:","parts":[{"id":"sc-7.4_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Implements a managed interface for each external telecommunication service;"},{"id":"sc-7.4_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Establishes a traffic flow policy for each managed interface;"},{"id":"sc-7.4_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Protects the confidentiality and integrity of the information being transmitted across each interface;"},{"id":"sc-7.4_smt.d","name":"item","props":[{"name":"label","value":"(d)"}],"prose":"Documents each exception to the traffic flow policy with a supporting mission\/business need and duration of that need; and"},{"id":"sc-7.4_smt.e","name":"item","props":[{"name":"label","value":"(e)"}],"prose":"Reviews exceptions to the traffic flow policy {{ insert: param, sc-7.4_prm_1 }} and removes exceptions that are no longer supported by an explicit mission\/business need."}]},{"id":"sc-7.4_gdn","name":"guidance","links":[{"href":"#sc-8","rel":"related"}]},{"id":"sc-7.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-7.4.a_obj","name":"objective","props":[{"name":"label","value":"SC-7(4)(a)"}],"prose":"implements a managed interface for each external telecommunication service;","links":[{"href":"#sc-7.4_smt.a","rel":"corresp"}]},{"id":"sc-7.4.b_obj","name":"objective","props":[{"name":"label","value":"SC-7(4)(b)"}],"prose":"establishes a traffic flow policy for each managed interface;","links":[{"href":"#sc-7.4_smt.b","rel":"corresp"}]},{"id":"sc-7.4.c_obj","name":"objective","props":[{"name":"label","value":"SC-7(4)(c)"}],"prose":"protects the confidentiality and integrity of the information being transmitted across each interface;","links":[{"href":"#sc-7.4_smt.c","rel":"corresp"}]},{"id":"sc-7.4.d_obj","name":"objective","props":[{"name":"label","value":"SC-7(4)(d)"}],"prose":"documents each exception to the traffic flow policy with:","parts":[{"id":"sc-7.4.d_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(4)(d)[1]"}],"prose":"a supporting mission\/business need;"},{"id":"sc-7.4.d_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(4)(d)[2]"}],"prose":"duration of that need;"}],"links":[{"href":"#sc-7.4_smt.d","rel":"corresp"}]},{"id":"sc-7.4.e_obj","name":"objective","props":[{"name":"label","value":"SC-7(4)(e)"}],"parts":[{"id":"sc-7.4.e_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(4)(e)[1]"}],"prose":"defines a frequency to review exceptions to traffic flow policy;"},{"id":"sc-7.4.e_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(4)(e)[2]"}],"prose":"reviews exceptions to the traffic flow policy with the organization-defined frequency; and"},{"id":"sc-7.4.e_obj.3","name":"objective","props":[{"name":"label","value":"SC-7(4)(e)[3]"}],"prose":"removes traffic flow policy exceptions that are no longer supported by an explicit mission\/business need"}],"links":[{"href":"#sc-7.4_smt.e","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\ntraffic flow policy\n\ninformation flow control policy\n\nprocedures addressing boundary protection\n\ninformation system security architecture\n\ninformation system design documentation\n\nboundary protection hardware and software\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nrecords of traffic flow policy exceptions\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for documenting and reviewing exceptions to the traffic flow policy\n\norganizational processes for removing exceptions to the traffic flow policy\n\nautomated mechanisms implementing boundary protection capability\n\nmanaged interfaces implementing traffic flow policy"}]}]},{"id":"sc-7.5","class":"SP800-53-enhancement","title":"Deny by Default \/ Allow by Exception","props":[{"name":"label","value":"SC-7(5)"},{"name":"sort-id","value":"sc-07.05"}],"parts":[{"id":"sc-7.5_smt","name":"statement","prose":"The information system at managed interfaces denies network communications traffic by default and allows network communications traffic by exception (i.e., deny all, permit by exception)."},{"id":"sc-7.5_gdn","name":"guidance","prose":"This control enhancement applies to both inbound and outbound network communications traffic. A deny-all, permit-by-exception network communications traffic policy ensures that only those connections which are essential and approved are allowed."},{"id":"sc-7.5_obj","name":"objective","prose":"Determine if the information system, at managed interfaces:","parts":[{"id":"sc-7.5_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(5)[1]"}],"prose":"denies network traffic by default; and"},{"id":"sc-7.5_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(5)[2]"}],"prose":"allows network traffic by exception."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing traffic management at managed interfaces"}]}]},{"id":"sc-7.7","class":"SP800-53-enhancement","title":"Prevent Split Tunneling for Remote Devices","props":[{"name":"label","value":"SC-7(7)"},{"name":"sort-id","value":"sc-07.07"}],"parts":[{"id":"sc-7.7_smt","name":"statement","prose":"The information system, in conjunction with a remote device, prevents the device from simultaneously establishing non-remote connections with the system and communicating via some other connection to resources in external networks."},{"id":"sc-7.7_gdn","name":"guidance","prose":"This control enhancement is implemented within remote devices (e.g., notebook computers) through configuration settings to disable split tunneling in those devices, and by preventing those configuration settings from being readily configurable by users. This control enhancement is implemented within the information system by the detection of split tunneling (or of configuration settings that allow split tunneling) in the remote device, and by prohibiting the connection if the remote device is using split tunneling. Split tunneling might be desirable by remote users to communicate with local information system resources such as printers\/file servers. However, split tunneling would in effect allow unauthorized external connections, making the system more vulnerable to attack and to exfiltration of organizational information. The use of VPNs for remote connections, when adequately provisioned with appropriate security controls, may provide the organization with sufficient assurance that it can effectively treat such connections as non-remote connections from the confidentiality and integrity perspective. VPNs thus provide a means for allowing non-remote communications paths from remote devices. The use of an adequately provisioned VPN does not eliminate the need for preventing split tunneling."},{"id":"sc-7.7_obj","name":"objective","prose":"Determine if the information system, in conjunction with a remote device, prevents the device from simultaneously establishing non-remote connections with the system and communicating via some other connection to resources in external networks."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\ninformation system design documentation\n\ninformation system hardware and software\n\ninformation system architecture\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing boundary protection capability\n\nautomated mechanisms supporting\/restricting non-remote connections"}]}]},{"id":"sc-7.8","class":"SP800-53-enhancement","title":"Route Traffic to Authenticated Proxy Servers","params":[{"id":"sc-7.8_prm_1","label":"organization-defined internal communications traffic"},{"id":"sc-7.8_prm_2","label":"organization-defined external networks"}],"props":[{"name":"label","value":"SC-7(8)"},{"name":"sort-id","value":"sc-07.08"}],"parts":[{"id":"sc-7.8_smt","name":"statement","prose":"The information system routes {{ insert: param, sc-7.8_prm_1 }} to {{ insert: param, sc-7.8_prm_2 }} through authenticated proxy servers at managed interfaces."},{"id":"sc-7.8_gdn","name":"guidance","prose":"External networks are networks outside of organizational control. A proxy server is a server (i.e., information system or application) that acts as an intermediary for clients requesting information system resources (e.g., files, connections, web pages, or services) from other organizational servers. Client requests established through an initial connection to the proxy server are evaluated to manage complexity and to provide additional protection by limiting direct connectivity. Web content filtering devices are one of the most common proxy servers providing access to the Internet. Proxy servers support logging individual Transmission Control Protocol (TCP) sessions and blocking specific Uniform Resource Locators (URLs), domain names, and Internet Protocol (IP) addresses. Web proxies can be configured with organization-defined lists of authorized and unauthorized websites.","links":[{"href":"#ac-3","rel":"related"},{"href":"#au-2","rel":"related"}]},{"id":"sc-7.8_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-7.8_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(8)[1]"}],"prose":"the organization defines internal communications traffic to be routed to external networks;"},{"id":"sc-7.8_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(8)[2]"}],"prose":"the organization defines external networks to which organization-defined internal communications traffic is to be routed; and"},{"id":"sc-7.8_obj.3","name":"objective","props":[{"name":"label","value":"SC-7(8)[3]"}],"prose":"the information system routes organization-defined internal communications traffic to organization-defined external networks through authenticated proxy servers at managed interfaces."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\ninformation system design documentation\n\ninformation system hardware and software\n\ninformation system architecture\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing traffic management through authenticated proxy servers at managed interfaces"}]}]},{"id":"sc-7.18","class":"SP800-53-enhancement","title":"Fail Secure","props":[{"name":"label","value":"SC-7(18)"},{"name":"sort-id","value":"sc-07.18"}],"parts":[{"id":"sc-7.18_smt","name":"statement","prose":"The information system fails securely in the event of an operational failure of a boundary protection device."},{"id":"sc-7.18_gdn","name":"guidance","prose":"Fail secure is a condition achieved by employing information system mechanisms to ensure that in the event of operational failures of boundary protection devices at managed interfaces (e.g., routers, firewalls, guards, and application gateways residing on protected subnetworks commonly referred to as demilitarized zones), information systems do not enter into unsecure states where intended security properties no longer hold. Failures of boundary protection devices cannot lead to, or cause information external to the devices to enter the devices, nor can failures permit unauthorized information releases.","links":[{"href":"#cp-2","rel":"related"},{"href":"#sc-24","rel":"related"}]},{"id":"sc-7.18_obj","name":"objective","prose":"Determine if the information system fails securely in the event of an operational failure of a boundary protection device."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\ninformation system design documentation\n\ninformation system architecture\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing secure failure"}]}]},{"id":"sc-7.21","class":"SP800-53-enhancement","title":"Isolation of Information System Components","params":[{"id":"sc-7.21_prm_1","label":"organization-defined information system components"},{"id":"sc-7.21_prm_2","label":"organization-defined missions and\/or business functions"}],"props":[{"name":"label","value":"SC-7(21)"},{"name":"sort-id","value":"sc-07.21"}],"parts":[{"id":"sc-7.21_smt","name":"statement","prose":"The organization employs boundary protection mechanisms to separate {{ insert: param, sc-7.21_prm_1 }} supporting {{ insert: param, sc-7.21_prm_2 }}."},{"id":"sc-7.21_gdn","name":"guidance","prose":"Organizations can isolate information system components performing different missions and\/or business functions. Such isolation limits unauthorized information flows among system components and also provides the opportunity to deploy greater levels of protection for selected components. Separating system components with boundary protection mechanisms provides the capability for increased protection of individual components and to more effectively control information flows between those components. This type of enhanced protection limits the potential harm from cyber attacks and errors. The degree of separation provided varies depending upon the mechanisms chosen. Boundary protection mechanisms include, for example, routers, gateways, and firewalls separating system components into physically separate networks or subnetworks, cross-domain devices separating subnetworks, virtualization techniques, and encrypting information flows among system components using distinct encryption keys.","links":[{"href":"#ca-9","rel":"related"},{"href":"#sc-3","rel":"related"}]},{"id":"sc-7.21_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-7.21_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(21)[1]"}],"prose":"defines information system components to be separated by boundary protection mechanisms;"},{"id":"sc-7.21_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(21)[2]"}],"prose":"defines missions and\/or business functions to be supported by organization-defined information system components separated by boundary protection mechanisms; and"},{"id":"sc-7.21_obj.3","name":"objective","props":[{"name":"label","value":"SC-7(21)[3]"}],"prose":"employs boundary protection mechanisms to separate organization-defined information system components supporting organization-defined missions and\/or business functions."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\ninformation system design documentation\n\ninformation system hardware and software\n\nenterprise architecture documentation\n\ninformation system architecture\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing the capability to separate information system components supporting organizational missions and\/or business functions"}]}]}]},{"id":"sc-8","class":"SP800-53","title":"Transmission Confidentiality and Integrity","params":[{"id":"sc-8_prm_1","select":{"how-many":"one-or-more","choice":["confidentiality","integrity"]}}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-8"},{"name":"sort-id","value":"sc-08"}],"links":[{"href":"#d715b234-9b5b-4e07-b1ed-99836727664d","rel":"reference"},{"href":"#f2dbd4ec-c413-4714-b85b-6b7184d1c195","rel":"reference"},{"href":"#90c5bc98-f9c4-44c9-98b7-787422f0999c","rel":"reference"},{"href":"#99f331f2-a9f0-46c2-9856-a3cbb9b89442","rel":"reference"},{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"},{"href":"#349fe082-502d-464a-aa0c-1443c6a5cf40","rel":"reference"},{"href":"#a4aa9645-9a8a-4b51-90a9-e223250f9a75","rel":"reference"},{"href":"#06dff0ea-3848-4945-8d91-e955ee69f05d","rel":"reference"}],"parts":[{"id":"sc-8_smt","name":"statement","prose":"The information system protects the {{ insert: param, sc-8_prm_1 }} of transmitted information."},{"id":"sc-8_gdn","name":"guidance","prose":"This control applies to both internal and external networks and all types of information system components from which information can be transmitted (e.g., servers, mobile devices, notebook computers, printers, copiers, scanners, facsimile machines). Communication paths outside the physical protection of a controlled boundary are exposed to the possibility of interception and modification. Protecting the confidentiality and\/or integrity of organizational information can be accomplished by physical means (e.g., by employing protected distribution systems) or by logical means (e.g., employing encryption techniques). Organizations relying on commercial providers offering transmission services as commodity services rather than as fully dedicated services (i.e., services which can be highly specialized to individual customer needs), may find it difficult to obtain the necessary assurances regarding the implementation of needed security controls for transmission confidentiality\/integrity. In such situations, organizations determine what types of confidentiality\/integrity services are available in standard, commercial telecommunication service packages. If it is infeasible or impractical to obtain the necessary security controls and assurances of control effectiveness through appropriate contracting vehicles, organizations implement appropriate compensating security controls or explicitly accept the additional risk.","links":[{"href":"#ac-17","rel":"related"},{"href":"#pe-4","rel":"related"}]},{"id":"sc-8_obj","name":"objective","prose":"Determine if the information system protects one or more of the following:","parts":[{"id":"sc-8_obj.1","name":"objective","props":[{"name":"label","value":"SC-8[1]"}],"prose":"confidentiality of transmitted information; and\/or"},{"id":"sc-8_obj.2","name":"objective","props":[{"name":"label","value":"SC-8[2]"}],"prose":"integrity of transmitted information."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing transmission confidentiality and integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing transmission confidentiality and\/or integrity"}]}],"controls":[{"id":"sc-8.1","class":"SP800-53-enhancement","title":"Cryptographic or Alternate Physical Protection","params":[{"id":"sc-8.1_prm_1","select":{"how-many":"one-or-more","choice":["prevent unauthorized disclosure of information","detect changes to information"]}},{"id":"sc-8.1_prm_2","label":"organization-defined alternative physical safeguards"}],"props":[{"name":"label","value":"SC-8(1)"},{"name":"sort-id","value":"sc-08.01"}],"parts":[{"id":"sc-8.1_smt","name":"statement","prose":"The information system implements cryptographic mechanisms to {{ insert: param, sc-8.1_prm_1 }} during transmission unless otherwise protected by {{ insert: param, sc-8.1_prm_2 }}."},{"id":"sc-8.1_gdn","name":"guidance","prose":"Encrypting information for transmission protects information from unauthorized disclosure and modification. Cryptographic mechanisms implemented to protect information integrity include, for example, cryptographic hash functions which have common application in digital signatures, checksums, and message authentication codes. Alternative physical security safeguards include, for example, protected distribution systems.","links":[{"href":"#sc-13","rel":"related"}]},{"id":"sc-8.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-8.1_obj.1","name":"objective","props":[{"name":"label","value":"SC-8(1)[1]"}],"prose":"the organization defines physical safeguards to be implemented to protect information during transmission when cryptographic mechanisms are not implemented; and"},{"id":"sc-8.1_obj.2","name":"objective","props":[{"name":"label","value":"SC-8(1)[2]"}],"prose":"the information system implements cryptographic mechanisms to do one or more of the following during transmission unless otherwise protected by organization-defined alternative physical safeguards:","parts":[{"id":"sc-8.1_obj.2.a","name":"objective","props":[{"name":"label","value":"SC-8(1)[2][a]"}],"prose":"prevent unauthorized disclosure of information; and\/or"},{"id":"sc-8.1_obj.2.b","name":"objective","props":[{"name":"label","value":"SC-8(1)[2][b]"}],"prose":"detect changes to information."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing transmission confidentiality and integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Cryptographic mechanisms supporting and\/or implementing transmission confidentiality and\/or integrity\n\nautomated mechanisms supporting and\/or implementing alternative physical safeguards\n\norganizational processes for defining and implementing alternative physical safeguards"}]}]}]},{"id":"sc-10","class":"SP800-53","title":"Network Disconnect","params":[{"id":"sc-10_prm_1","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"SC-10"},{"name":"sort-id","value":"sc-10"}],"parts":[{"id":"sc-10_smt","name":"statement","prose":"The information system terminates the network connection associated with a communications session at the end of the session or after {{ insert: param, sc-10_prm_1 }} of inactivity."},{"id":"sc-10_gdn","name":"guidance","prose":"This control applies to both internal and external networks. Terminating network connections associated with communications sessions include, for example, de-allocating associated TCP\/IP address\/port pairs at the operating system level, or de-allocating networking assignments at the application level if multiple application sessions are using a single, operating system-level network connection. Time periods of inactivity may be established by organizations and include, for example, time periods by type of network access or for specific network accesses."},{"id":"sc-10_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-10_obj.1","name":"objective","props":[{"name":"label","value":"SC-10[1]"}],"prose":"the organization defines a time period of inactivity after which the information system terminates a network connection associated with a communications session; and"},{"id":"sc-10_obj.2","name":"objective","props":[{"name":"label","value":"SC-10[2]"}],"prose":"the information system terminates the network connection associated with a communication session at the end of the session or after the organization-defined time period of inactivity."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing network disconnect\n\ninformation system design documentation\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing network disconnect capability"}]}]},{"id":"sc-12","class":"SP800-53","title":"Cryptographic Key Establishment and Management","params":[{"id":"sc-12_prm_1","label":"organization-defined requirements for key generation, distribution, storage, access, and destruction"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-12"},{"name":"sort-id","value":"sc-12"}],"links":[{"href":"#81f09e01-d0b0-4ae2-aa6a-064ed9950070","rel":"reference"},{"href":"#a6c774c0-bf50-4590-9841-2a5c1c91ac6f","rel":"reference"}],"parts":[{"id":"sc-12_smt","name":"statement","prose":"The organization establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with {{ insert: param, sc-12_prm_1 }}."},{"id":"sc-12_gdn","name":"guidance","prose":"Cryptographic key management and establishment can be performed using manual procedures or automated mechanisms with supporting manual procedures. Organizations define key management requirements in accordance with applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance, specifying appropriate options, levels, and parameters. Organizations manage trust stores to ensure that only approved trust anchors are in such trust stores. This includes certificates with visibility external to organizational information systems and certificates related to the internal operations of systems.","links":[{"href":"#sc-13","rel":"related"},{"href":"#sc-17","rel":"related"}]},{"id":"sc-12_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-12_obj.1","name":"objective","props":[{"name":"label","value":"SC-12[1]"}],"prose":"defines requirements for cryptographic key:","parts":[{"id":"sc-12_obj.1.a","name":"objective","props":[{"name":"label","value":"SC-12[1][a]"}],"prose":"generation;"},{"id":"sc-12_obj.1.b","name":"objective","props":[{"name":"label","value":"SC-12[1][b]"}],"prose":"distribution;"},{"id":"sc-12_obj.1.c","name":"objective","props":[{"name":"label","value":"SC-12[1][c]"}],"prose":"storage;"},{"id":"sc-12_obj.1.d","name":"objective","props":[{"name":"label","value":"SC-12[1][d]"}],"prose":"access;"},{"id":"sc-12_obj.1.e","name":"objective","props":[{"name":"label","value":"SC-12[1][e]"}],"prose":"destruction; and"}]},{"id":"sc-12_obj.2","name":"objective","props":[{"name":"label","value":"SC-12[2]"}],"prose":"establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key generation, distribution, storage, access, and destruction."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing cryptographic key establishment and management\n\ninformation system design documentation\n\ncryptographic mechanisms\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for cryptographic key establishment and\/or management"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing cryptographic key establishment and management"}]}],"controls":[{"id":"sc-12.1","class":"SP800-53-enhancement","title":"Availability","props":[{"name":"label","value":"SC-12(1)"},{"name":"sort-id","value":"sc-12.01"}],"parts":[{"id":"sc-12.1_smt","name":"statement","prose":"The organization maintains availability of information in the event of the loss of cryptographic keys by users."},{"id":"sc-12.1_gdn","name":"guidance","prose":"Escrowing of encryption keys is a common practice for ensuring availability in the event of loss of keys (e.g., due to forgotten passphrase)."},{"id":"sc-12.1_obj","name":"objective","prose":"Determine if the organization maintains availability of information in the event of the loss of cryptographic keys by users."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing cryptographic key establishment, management, and recovery\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for cryptographic key establishment or management"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing cryptographic key establishment and management"}]}]}]},{"id":"sc-13","class":"SP800-53","title":"Cryptographic Protection","params":[{"id":"sc-13_prm_1","label":"organization-defined cryptographic uses and type of cryptography required for each use"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-13"},{"name":"sort-id","value":"sc-13"}],"links":[{"href":"#39f9087d-7687-46d2-8eda-b6f4b7a4d8a9","rel":"reference"},{"href":"#6a1041fc-054e-4230-946b-2e6f4f3731bb","rel":"reference"},{"href":"#9b97ed27-3dd6-4f9a-ade5-1b43e9669794","rel":"reference"}],"parts":[{"id":"sc-13_smt","name":"statement","prose":"The information system implements {{ insert: param, sc-13_prm_1 }} in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards."},{"id":"sc-13_gdn","name":"guidance","prose":"Cryptography can be employed to support a variety of security solutions including, for example, the protection of classified and Controlled Unclassified Information, the provision of digital signatures, and the enforcement of information separation when authorized individuals have the necessary clearances for such information but lack the necessary formal access approvals. Cryptography can also be used to support random number generation and hash generation. Generally applicable cryptographic standards include FIPS-validated cryptography and NSA-approved cryptography. This control does not impose any requirements on organizations to use cryptography. However, if cryptography is required based on the selection of other security controls, organizations define each type of cryptographic use and the type of cryptography required (e.g., protection of classified information: NSA-approved cryptography; provision of digital signatures: FIPS-validated cryptography).","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-7","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#au-10","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-7","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-28","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"sc-13_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-13_obj.1","name":"objective","props":[{"name":"label","value":"SC-13[1]"}],"prose":"the organization defines cryptographic uses; and"},{"id":"sc-13_obj.2","name":"objective","props":[{"name":"label","value":"SC-13[2]"}],"prose":"the organization defines the type of cryptography required for each use; and"},{"id":"sc-13_obj.3","name":"objective","props":[{"name":"label","value":"SC-13[3]"}],"prose":"the information system implements the organization-defined cryptographic uses and type of cryptography required for each use in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing cryptographic protection\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ncryptographic module validation certificates\n\nlist of FIPS validated cryptographic modules\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with responsibilities for cryptographic protection"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing cryptographic protection"}]}]},{"id":"sc-15","class":"SP800-53","title":"Collaborative Computing Devices","params":[{"id":"sc-15_prm_1","label":"organization-defined exceptions where remote activation is to be allowed"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-15"},{"name":"sort-id","value":"sc-15"}],"parts":[{"id":"sc-15_smt","name":"statement","prose":"The information system:","parts":[{"id":"sc-15_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Prohibits remote activation of collaborative computing devices with the following exceptions: {{ insert: param, sc-15_prm_1 }}; and"},{"id":"sc-15_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Provides an explicit indication of use to users physically present at the devices."}]},{"id":"sc-15_gdn","name":"guidance","prose":"Collaborative computing devices include, for example, networked white boards, cameras, and microphones. Explicit indication of use includes, for example, signals to users when collaborative computing devices are activated.","links":[{"href":"#ac-21","rel":"related"}]},{"id":"sc-15_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-15.a_obj","name":"objective","props":[{"name":"label","value":"SC-15(a)"}],"parts":[{"id":"sc-15.a_obj.1","name":"objective","props":[{"name":"label","value":"SC-15(a)[1]"}],"prose":"the organization defines exceptions where remote activation of collaborative computing devices is to be allowed;"},{"id":"sc-15.a_obj.2","name":"objective","props":[{"name":"label","value":"SC-15(a)[2]"}],"prose":"the information system prohibits remote activation of collaborative computing devices, except for organization-defined exceptions where remote activation is to be allowed; and"}]},{"id":"sc-15.b_obj","name":"objective","props":[{"name":"label","value":"SC-15(b)"}],"prose":"the information system provides an explicit indication of use to users physically present at the devices."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing collaborative computing\n\naccess control policy and procedures\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with responsibilities for managing collaborative computing devices"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing management of remote activation of collaborative computing devices\n\nautomated mechanisms providing an indication of use of collaborative computing devices"}]}]},{"id":"sc-17","class":"SP800-53","title":"Public Key Infrastructure Certificates","params":[{"id":"sc-17_prm_1","label":"organization-defined certificate policy"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-17"},{"name":"sort-id","value":"sc-17"}],"links":[{"href":"#58ad6f27-af99-429f-86a8-8bb767b014b9","rel":"reference"},{"href":"#8f174e91-844e-4cf1-a72a-45c119a3a8dd","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"}],"parts":[{"id":"sc-17_smt","name":"statement","prose":"The organization issues public key certificates under an {{ insert: param, sc-17_prm_1 }} or obtains public key certificates from an approved service provider."},{"id":"sc-17_gdn","name":"guidance","prose":"For all certificates, organizations manage information system trust stores to ensure only approved trust anchors are in the trust stores. This control addresses both certificates with visibility external to organizational information systems and certificates related to the internal operations of systems, for example, application-specific time services.","links":[{"href":"#sc-12","rel":"related"}]},{"id":"sc-17_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-17_obj.1","name":"objective","props":[{"name":"label","value":"SC-17[1]"}],"prose":"defines a certificate policy for issuing public key certificates;"},{"id":"sc-17_obj.2","name":"objective","props":[{"name":"label","value":"SC-17[2]"}],"prose":"issues public key certificates:","parts":[{"id":"sc-17_obj.2.a","name":"objective","props":[{"name":"label","value":"SC-17[2][a]"}],"prose":"under an organization-defined certificate policy: or"},{"id":"sc-17_obj.2.b","name":"objective","props":[{"name":"label","value":"SC-17[2][b]"}],"prose":"obtains public key certificates from an approved service provider."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing public key infrastructure certificates\n\npublic key certificate policy or policies\n\npublic key issuing process\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for issuing public key certificates\n\nservice providers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing the management of public key infrastructure certificates"}]}]},{"id":"sc-18","class":"SP800-53","title":"Mobile Code","props":[{"name":"priority","value":"P2"},{"name":"label","value":"SC-18"},{"name":"sort-id","value":"sc-18"}],"links":[{"href":"#e716cd51-d1d5-4c6a-967a-22e9fbbc42f1","rel":"reference"},{"href":"#e6522953-6714-435d-a0d3-140df554c186","rel":"reference"}],"parts":[{"id":"sc-18_smt","name":"statement","prose":"The organization:","parts":[{"id":"sc-18_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Defines acceptable and unacceptable mobile code and mobile code technologies;"},{"id":"sc-18_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishes usage restrictions and implementation guidance for acceptable mobile code and mobile code technologies; and"},{"id":"sc-18_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Authorizes, monitors, and controls the use of mobile code within the information system."}]},{"id":"sc-18_gdn","name":"guidance","prose":"Decisions regarding the employment of mobile code within organizational information systems are based on the potential for the code to cause damage to the systems if used maliciously. Mobile code technologies include, for example, Java, JavaScript, ActiveX, Postscript, PDF, Shockwave movies, Flash animations, and VBScript. Usage restrictions and implementation guidance apply to both the selection and use of mobile code installed on servers and mobile code downloaded and executed on individual workstations and devices (e.g., smart phones). Mobile code policy and procedures address preventing the development, acquisition, or introduction of unacceptable mobile code within organizational information systems.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#si-3","rel":"related"}]},{"id":"sc-18_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-18.a_obj","name":"objective","props":[{"name":"label","value":"SC-18(a)"}],"prose":"defines acceptable and unacceptable mobile code and mobile code technologies;"},{"id":"sc-18.b_obj","name":"objective","props":[{"name":"label","value":"SC-18(b)"}],"parts":[{"id":"sc-18.b_obj.1","name":"objective","props":[{"name":"label","value":"SC-18(b)[1]"}],"prose":"establishes usage restrictions for acceptable mobile code and mobile code technologies;"},{"id":"sc-18.b_obj.2","name":"objective","props":[{"name":"label","value":"SC-18(b)[2]"}],"prose":"establishes implementation guidance for acceptable mobile code and mobile code technologies;"}]},{"id":"sc-18.c_obj","name":"objective","props":[{"name":"label","value":"SC-18(c)"}],"parts":[{"id":"sc-18.c_obj.1","name":"objective","props":[{"name":"label","value":"SC-18(c)[1]"}],"prose":"authorizes the use of mobile code within the information system;"},{"id":"sc-18.c_obj.2","name":"objective","props":[{"name":"label","value":"SC-18(c)[2]"}],"prose":"monitors the use of mobile code within the information system; and"},{"id":"sc-18.c_obj.3","name":"objective","props":[{"name":"label","value":"SC-18(c)[3]"}],"prose":"controls the use of mobile code within the information system."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing mobile code\n\nmobile code usage restrictions, mobile code implementation policy and procedures\n\nlist of acceptable mobile code and mobile code technologies\n\nlist of unacceptable mobile code and mobile technologies\n\nauthorization records\n\ninformation system monitoring records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing mobile code"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for controlling, authorizing, monitoring, and restricting mobile code\n\nautomated mechanisms supporting and\/or implementing the management of mobile code\n\nautomated mechanisms supporting and\/or implementing the monitoring of mobile code"}]}]},{"id":"sc-19","class":"SP800-53","title":"Voice Over Internet Protocol","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-19"},{"name":"sort-id","value":"sc-19"}],"links":[{"href":"#7783f3e7-09b3-478b-9aa2-4a76dfd0ea90","rel":"reference"}],"parts":[{"id":"sc-19_smt","name":"statement","prose":"The organization:","parts":[{"id":"sc-19_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously; and"},{"id":"sc-19_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes, monitors, and controls the use of VoIP within the information system."}]},{"id":"sc-19_gdn","name":"guidance","links":[{"href":"#cm-6","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-15","rel":"related"}]},{"id":"sc-19_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-19.a_obj","name":"objective","props":[{"name":"label","value":"SC-19(a)"}],"parts":[{"id":"sc-19.a_obj.1","name":"objective","props":[{"name":"label","value":"SC-19(a)[1]"}],"prose":"establishes usage restrictions for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously;"},{"id":"sc-19.a_obj.2","name":"objective","props":[{"name":"label","value":"SC-19(a)[2]"}],"prose":"establishes implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously;"}]},{"id":"sc-19.b_obj","name":"objective","props":[{"name":"label","value":"SC-19(b)"}],"parts":[{"id":"sc-19.b_obj.1","name":"objective","props":[{"name":"label","value":"SC-19(b)[1]"}],"prose":"authorizes the use of VoIP within the information system;"},{"id":"sc-19.b_obj.2","name":"objective","props":[{"name":"label","value":"SC-19(b)[2]"}],"prose":"monitors the use of VoIP within the information system; and"},{"id":"sc-19.b_obj.3","name":"objective","props":[{"name":"label","value":"SC-19(b)[3]"}],"prose":"controls the use of VoIP within the information system."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing VoIP\n\nVoIP usage restrictions\n\nVoIP implementation guidance\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system monitoring records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing VoIP"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for authorizing, monitoring, and controlling VoIP\n\nautomated mechanisms supporting and\/or implementing authorizing, monitoring, and controlling VoIP"}]}]},{"id":"sc-20","class":"SP800-53","title":"Secure Name \/ Address Resolution Service (authoritative Source)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-20"},{"name":"sort-id","value":"sc-20"}],"links":[{"href":"#28115a56-da6b-4d44-b1df-51dd7f048a3e","rel":"reference"},{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"}],"parts":[{"id":"sc-20_smt","name":"statement","prose":"The information system:","parts":[{"id":"sc-20_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Provides additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name\/address resolution queries; and"},{"id":"sc-20_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Provides the means to indicate the security status of child zones and (if the child supports secure resolution services) to enable verification of a chain of trust among parent and child domains, when operating as part of a distributed, hierarchical namespace."}]},{"id":"sc-20_gdn","name":"guidance","prose":"This control enables external clients including, for example, remote Internet clients, to obtain origin authentication and integrity verification assurances for the host\/service name to network address resolution information obtained through the service. Information systems that provide name and address resolution services include, for example, domain name system (DNS) servers. Additional artifacts include, for example, DNS Security (DNSSEC) digital signatures and cryptographic keys. DNS resource records are examples of authoritative data. The means to indicate the security status of child zones includes, for example, the use of delegation signer resource records in the DNS. The DNS security controls reflect (and are referenced from) OMB Memorandum 08-23. Information systems that use technologies other than the DNS to map between host\/service names and network addresses provide other means to assure the authenticity and integrity of response data.","links":[{"href":"#au-10","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-21","rel":"related"},{"href":"#sc-22","rel":"related"}]},{"id":"sc-20_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"sc-20.a_obj","name":"objective","props":[{"name":"label","value":"SC-20(a)"}],"prose":"provides additional data origin and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name\/address resolution queries;"},{"id":"sc-20.b_obj","name":"objective","props":[{"name":"label","value":"SC-20(b)"}],"prose":"provides the means to, when operating as part of a distributed, hierarchical namespace:","parts":[{"id":"sc-20.b_obj.1","name":"objective","props":[{"name":"label","value":"SC-20(b)[1]"}],"prose":"indicate the security status of child zones; and"},{"id":"sc-20.b_obj.2","name":"objective","props":[{"name":"label","value":"SC-20(b)[2]"}],"prose":"enable verification of a chain of trust among parent and child domains (if the child supports secure resolution services)."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing secure name\/address resolution service (authoritative source)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing DNS"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing secure name\/address resolution service"}]}]},{"id":"sc-21","class":"SP800-53","title":"Secure Name \/ Address Resolution Service (recursive or Caching Resolver)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-21"},{"name":"sort-id","value":"sc-21"}],"links":[{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"}],"parts":[{"id":"sc-21_smt","name":"statement","prose":"The information system requests and performs data origin authentication and data integrity verification on the name\/address resolution responses the system receives from authoritative sources."},{"id":"sc-21_gdn","name":"guidance","prose":"Each client of name resolution services either performs this validation on its own, or has authenticated channels to trusted validation providers. Information systems that provide name and address resolution services for local clients include, for example, recursive resolving or caching domain name system (DNS) servers. DNS client resolvers either perform validation of DNSSEC signatures, or clients use authenticated channels to recursive resolvers that perform such validations. Information systems that use technologies other than the DNS to map between host\/service names and network addresses provide other means to enable clients to verify the authenticity and integrity of response data.","links":[{"href":"#sc-20","rel":"related"},{"href":"#sc-22","rel":"related"}]},{"id":"sc-21_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"sc-21_obj.1","name":"objective","props":[{"name":"label","value":"SC-21[1]"}],"prose":"requests data origin authentication on the name\/address resolution responses the system receives from authoritative sources;"},{"id":"sc-21_obj.2","name":"objective","props":[{"name":"label","value":"SC-21[2]"}],"prose":"requests data integrity verification on the name\/address resolution responses the system receives from authoritative sources;"},{"id":"sc-21_obj.3","name":"objective","props":[{"name":"label","value":"SC-21[3]"}],"prose":"performs data origin authentication on the name\/address resolution responses the system receives from authoritative sources; and"},{"id":"sc-21_obj.4","name":"objective","props":[{"name":"label","value":"SC-21[4]"}],"prose":"performs data integrity verification on the name\/address resolution responses the system receives from authoritative sources."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing secure name\/address resolution service (recursive or caching resolver)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing DNS"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing data origin authentication and data integrity verification for name\/address resolution services"}]}]},{"id":"sc-22","class":"SP800-53","title":"Architecture and Provisioning for Name \/ Address Resolution Service","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-22"},{"name":"sort-id","value":"sc-22"}],"links":[{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"}],"parts":[{"id":"sc-22_smt","name":"statement","prose":"The information systems that collectively provide name\/address resolution service for an organization are fault-tolerant and implement internal\/external role separation."},{"id":"sc-22_gdn","name":"guidance","prose":"Information systems that provide name and address resolution services include, for example, domain name system (DNS) servers. To eliminate single points of failure and to enhance redundancy, organizations employ at least two authoritative domain name system servers, one configured as the primary server and the other configured as the secondary server. Additionally, organizations typically deploy the servers in two geographically separated network subnetworks (i.e., not located in the same physical facility). For role separation, DNS servers with internal roles only process name and address resolution requests from within organizations (i.e., from internal clients). DNS servers with external roles only process name and address resolution information requests from clients external to organizations (i.e., on external networks including the Internet). Organizations specify clients that can access authoritative DNS servers in particular roles (e.g., by address ranges, explicit lists).","links":[{"href":"#sc-2","rel":"related"},{"href":"#sc-20","rel":"related"},{"href":"#sc-21","rel":"related"},{"href":"#sc-24","rel":"related"}]},{"id":"sc-22_obj","name":"objective","prose":"Determine if the information systems that collectively provide name\/address resolution service for an organization:","parts":[{"id":"sc-22_obj.1","name":"objective","props":[{"name":"label","value":"SC-22[1]"}],"prose":"are fault tolerant; and"},{"id":"sc-22_obj.2","name":"objective","props":[{"name":"label","value":"SC-22[2]"}],"prose":"implement internal\/external role separation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing architecture and provisioning for name\/address resolution service\n\naccess control policy and procedures\n\ninformation system design documentation\n\nassessment results from independent, testing organizations\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing DNS"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing name\/address resolution service for fault tolerance and role separation"}]}]},{"id":"sc-23","class":"SP800-53","title":"Session Authenticity","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-23"},{"name":"sort-id","value":"sc-23"}],"links":[{"href":"#90c5bc98-f9c4-44c9-98b7-787422f0999c","rel":"reference"},{"href":"#99f331f2-a9f0-46c2-9856-a3cbb9b89442","rel":"reference"},{"href":"#1ebdf782-d95d-4a7b-8ec7-ee860951eced","rel":"reference"}],"parts":[{"id":"sc-23_smt","name":"statement","prose":"The information system protects the authenticity of communications sessions."},{"id":"sc-23_gdn","name":"guidance","prose":"This control addresses communications protection at the session, versus packet level (e.g., sessions in service-oriented architectures providing web-based services) and establishes grounds for confidence at both ends of communications sessions in ongoing identities of other parties and in the validity of information transmitted. Authenticity protection includes, for example, protecting against man-in-the-middle attacks\/session hijacking and the insertion of false information into sessions.","links":[{"href":"#sc-8","rel":"related"},{"href":"#sc-10","rel":"related"},{"href":"#sc-11","rel":"related"}]},{"id":"sc-23_obj","name":"objective","prose":"Determine if the information system protects the authenticity of communications sessions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing session authenticity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing session authenticity"}]}]},{"id":"sc-24","class":"SP800-53","title":"Fail in Known State","params":[{"id":"sc-24_prm_1","label":"organization-defined known-state"},{"id":"sc-24_prm_2","label":"organization-defined types of failures"},{"id":"sc-24_prm_3","label":"organization-defined system state information"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-24"},{"name":"sort-id","value":"sc-24"}],"parts":[{"id":"sc-24_smt","name":"statement","prose":"The information system fails to a {{ insert: param, sc-24_prm_1 }} for {{ insert: param, sc-24_prm_2 }} preserving {{ insert: param, sc-24_prm_3 }} in failure."},{"id":"sc-24_gdn","name":"guidance","prose":"Failure in a known state addresses security concerns in accordance with the mission\/business needs of organizations. Failure in a known secure state helps to prevent the loss of confidentiality, integrity, or availability of information in the event of failures of organizational information systems or system components. Failure in a known safe state helps to prevent systems from failing to a state that may cause injury to individuals or destruction to property. Preserving information system state information facilitates system restart and return to the operational mode of organizations with less disruption of mission\/business processes.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-10","rel":"related"},{"href":"#cp-12","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-22","rel":"related"}]},{"id":"sc-24_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-24_obj.1","name":"objective","props":[{"name":"label","value":"SC-24[1]"}],"prose":"the organization defines a known-state to which the information system is to fail in the event of a system failure;"},{"id":"sc-24_obj.2","name":"objective","props":[{"name":"label","value":"SC-24[2]"}],"prose":"the organization defines types of failures for which the information system is to fail to an organization-defined known-state;"},{"id":"sc-24_obj.3","name":"objective","props":[{"name":"label","value":"SC-24[3]"}],"prose":"the organization defines system state information to be preserved in the event of a system failure;"},{"id":"sc-24_obj.4","name":"objective","props":[{"name":"label","value":"SC-24[4]"}],"prose":"the information system fails to the organization-defined known-state for organization-defined types of failures; and"},{"id":"sc-24_obj.5","name":"objective","props":[{"name":"label","value":"SC-24[5]"}],"prose":"the information system preserves the organization-defined system state information in the event of a system failure."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing information system failure to known state\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of failures requiring information system to fail in a known state\n\nstate information to be preserved in system failure\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing fail-in-known state capability\n\nautomated mechanisms preserving system state information in the event of a system failure"}]}]},{"id":"sc-28","class":"SP800-53","title":"Protection of Information at Rest","params":[{"id":"sc-28_prm_1","select":{"how-many":"one-or-more","choice":["confidentiality","integrity"]}},{"id":"sc-28_prm_2","label":"organization-defined information at rest"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-28"},{"name":"sort-id","value":"sc-28"}],"links":[{"href":"#81f09e01-d0b0-4ae2-aa6a-064ed9950070","rel":"reference"},{"href":"#a6c774c0-bf50-4590-9841-2a5c1c91ac6f","rel":"reference"},{"href":"#3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","rel":"reference"}],"parts":[{"id":"sc-28_smt","name":"statement","prose":"The information system protects the {{ insert: param, sc-28_prm_1 }} of {{ insert: param, sc-28_prm_2 }}."},{"id":"sc-28_gdn","name":"guidance","prose":"This control addresses the confidentiality and integrity of information at rest and covers user information and system information. Information at rest refers to the state of information when it is located on storage devices as specific components of information systems. System-related information requiring protection includes, for example, configurations or rule sets for firewalls, gateways, intrusion detection\/prevention systems, filtering routers, and authenticator content. Organizations may employ different mechanisms to achieve confidentiality and integrity protections, including the use of cryptographic mechanisms and file share scanning. Integrity protection can be achieved, for example, by implementing Write-Once-Read-Many (WORM) technologies. Organizations may also employ other security controls including, for example, secure off-line storage in lieu of online storage when adequate protection of information at rest cannot otherwise be achieved and\/or continuous monitoring to identify malicious code at rest.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"sc-28_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-28_obj.1","name":"objective","props":[{"name":"label","value":"SC-28[1]"}],"prose":"the organization defines information at rest requiring one or more of the following:","parts":[{"id":"sc-28_obj.1.a","name":"objective","props":[{"name":"label","value":"SC-28[1][a]"}],"prose":"confidentiality protection; and\/or"},{"id":"sc-28_obj.1.b","name":"objective","props":[{"name":"label","value":"SC-28[1][b]"}],"prose":"integrity protection;"}]},{"id":"sc-28_obj.2","name":"objective","props":[{"name":"label","value":"SC-28[2]"}],"prose":"the information system protects:","parts":[{"id":"sc-28_obj.2.a","name":"objective","props":[{"name":"label","value":"SC-28[2][a]"}],"prose":"the confidentiality of organization-defined information at rest; and\/or"},{"id":"sc-28_obj.2.b","name":"objective","props":[{"name":"label","value":"SC-28[2][b]"}],"prose":"the integrity of organization-defined information at rest."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing protection of information at rest\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ncryptographic mechanisms and associated configuration documentation\n\nlist of information at rest requiring confidentiality and integrity protections\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing confidentiality and integrity protections for information at rest"}]}]},{"id":"sc-39","class":"SP800-53","title":"Process Isolation","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-39"},{"name":"sort-id","value":"sc-39"}],"parts":[{"id":"sc-39_smt","name":"statement","prose":"The information system maintains a separate execution domain for each executing process."},{"id":"sc-39_gdn","name":"guidance","prose":"Information systems can maintain separate execution domains for each executing process by assigning each process a separate address space. Each information system process has a distinct address space so that communication between processes is performed in a manner controlled through the security functions, and one process cannot modify the executing code of another process. Maintaining separate execution domains for executing processes can be achieved, for example, by implementing separate address spaces. This capability is available in most commercial operating systems that employ multi-state processor technologies.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sc-2","rel":"related"},{"href":"#sc-3","rel":"related"}]},{"id":"sc-39_obj","name":"objective","prose":"Determine if the information system maintains a separate execution domain for each executing process."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system design documentation\n\ninformation system architecture\n\nindependent verification and validation documentation\n\ntesting and evaluation documentation, other relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Information system developers\/integrators\n\ninformation system security architect"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing separate execution domains for each executing process"}]}]}]},{"id":"si","class":"family","title":"System and Information Integrity","controls":[{"id":"si-1","class":"SP800-53","title":"System and Information Integrity Policy and Procedures","params":[{"id":"si-1_prm_1","label":"organization-defined personnel or roles"},{"id":"si-1_prm_2","label":"organization-defined frequency"},{"id":"si-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-1"},{"name":"sort-id","value":"si-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"si-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, si-1_prm_1 }}:","parts":[{"id":"si-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system and information integrity policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"si-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system and information integrity policy and associated system and information integrity controls; and"}]},{"id":"si-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"si-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System and information integrity policy {{ insert: param, si-1_prm_2 }}; and"},{"id":"si-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System and information integrity procedures {{ insert: param, si-1_prm_3 }}."}]}]},{"id":"si-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the SI family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"si-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-1.a_obj","name":"objective","props":[{"name":"label","value":"SI-1(a)"}],"parts":[{"id":"si-1.a.1_obj","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)"}],"parts":[{"id":"si-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1]"}],"prose":"develops and documents a system and information integrity policy that addresses:","parts":[{"id":"si-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"si-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"si-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"si-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"si-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"si-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"si-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"si-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system and information integrity policy is to be disseminated;"},{"id":"si-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[3]"}],"prose":"disseminates the system and information integrity policy to organization-defined personnel or roles;"}]},{"id":"si-1.a.2_obj","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)"}],"parts":[{"id":"si-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the system and information integrity policy and associated system and information integrity controls;"},{"id":"si-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"si-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"si-1.b_obj","name":"objective","props":[{"name":"label","value":"SI-1(b)"}],"parts":[{"id":"si-1.b.1_obj","name":"objective","props":[{"name":"label","value":"SI-1(b)(1)"}],"parts":[{"id":"si-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system and information integrity policy;"},{"id":"si-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(b)(1)[2]"}],"prose":"reviews and updates the current system and information integrity policy with the organization-defined frequency;"}]},{"id":"si-1.b.2_obj","name":"objective","props":[{"name":"label","value":"SI-1(b)(2)"}],"parts":[{"id":"si-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system and information integrity procedures; and"},{"id":"si-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(b)(2)[2]"}],"prose":"reviews and updates the current system and information integrity procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and information integrity responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"si-2","class":"SP800-53","title":"Flaw Remediation","params":[{"id":"si-2_prm_1","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-2"},{"name":"sort-id","value":"si-02"}],"links":[{"href":"#bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","rel":"reference"},{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"si-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Identifies, reports, and corrects information system flaws;"},{"id":"si-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Tests software and firmware updates related to flaw remediation for effectiveness and potential side effects before installation;"},{"id":"si-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Installs security-relevant software and firmware updates within {{ insert: param, si-2_prm_1 }} of the release of the updates; and"},{"id":"si-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Incorporates flaw remediation into the organizational configuration management process."}]},{"id":"si-2_gdn","name":"guidance","prose":"Organizations identify information systems affected by announced software flaws including potential vulnerabilities resulting from those flaws, and report this information to designated organizational personnel with information security responsibilities. Security-relevant software updates include, for example, patches, service packs, hot fixes, and anti-virus signatures. Organizations also address flaws discovered during security assessments, continuous monitoring, incident response activities, and system error handling. Organizations take advantage of available resources such as the Common Weakness Enumeration (CWE) or Common Vulnerabilities and Exposures (CVE) databases in remediating flaws discovered in organizational information systems. By incorporating flaw remediation into ongoing configuration management processes, required\/anticipated remediation actions can be tracked and verified. Flaw remediation actions that can be tracked and verified include, for example, determining whether organizations follow US-CERT guidance and Information Assurance Vulnerability Alerts. Organization-defined time periods for updating security-relevant software and firmware may vary based on a variety of factors including, for example, the security category of the information system or the criticality of the update (i.e., severity of the vulnerability related to the discovered flaw). Some types of flaw remediation may require more testing than other types. Organizations determine the degree and type of testing needed for the specific type of flaw remediation activity under consideration and also the types of changes that are to be configuration-managed. In some situations, organizations may determine that the testing of software and\/or firmware updates is not necessary or practical, for example, when implementing simple anti-virus signature updates. Organizations may also consider in testing decisions, whether security-relevant software or firmware updates are obtained from authorized sources with appropriate digital signatures.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#ma-2","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#si-11","rel":"related"}]},{"id":"si-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-2.a_obj","name":"objective","props":[{"name":"label","value":"SI-2(a)"}],"parts":[{"id":"si-2.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(a)[1]"}],"prose":"identifies information system flaws;"},{"id":"si-2.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(a)[2]"}],"prose":"reports information system flaws;"},{"id":"si-2.a_obj.3","name":"objective","props":[{"name":"label","value":"SI-2(a)[3]"}],"prose":"corrects information system flaws;"}]},{"id":"si-2.b_obj","name":"objective","props":[{"name":"label","value":"SI-2(b)"}],"parts":[{"id":"si-2.b_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(b)[1]"}],"prose":"tests software updates related to flaw remediation for effectiveness and potential side effects before installation;"},{"id":"si-2.b_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(b)[2]"}],"prose":"tests firmware updates related to flaw remediation for effectiveness and potential side effects before installation;"}]},{"id":"si-2.c_obj","name":"objective","props":[{"name":"label","value":"SI-2(c)"}],"parts":[{"id":"si-2.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(c)[1]"}],"prose":"defines the time period within which to install security-relevant software updates after the release of the updates;"},{"id":"si-2.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(c)[2]"}],"prose":"defines the time period within which to install security-relevant firmware updates after the release of the updates;"},{"id":"si-2.c_obj.3","name":"objective","props":[{"name":"label","value":"SI-2(c)[3]"}],"prose":"installs software updates within the organization-defined time period of the release of the updates;"},{"id":"si-2.c_obj.4","name":"objective","props":[{"name":"label","value":"SI-2(c)[4]"}],"prose":"installs firmware updates within the organization-defined time period of the release of the updates; and"}]},{"id":"si-2.d_obj","name":"objective","props":[{"name":"label","value":"SI-2(d)"}],"prose":"incorporates flaw remediation into the organizational configuration management process."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing flaw remediation\n\nprocedures addressing configuration management\n\nlist of flaws and vulnerabilities potentially affecting the information system\n\nlist of recent security flaw remediation actions performed on the information system (e.g., list of installed patches, service packs, hot fixes, and other software updates to correct information system flaws)\n\ntest results from the installation of software and firmware updates to correct information system flaws\n\ninstallation\/change control records for security-relevant software and firmware updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for flaw remediation\n\norganizational personnel with configuration management responsibility"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for identifying, reporting, and correcting information system flaws\n\norganizational process for installing software and firmware updates\n\nautomated mechanisms supporting and\/or implementing reporting, and correcting information system flaws\n\nautomated mechanisms supporting and\/or implementing testing software and firmware updates"}]}],"controls":[{"id":"si-2.1","class":"SP800-53-enhancement","title":"Central Management","props":[{"name":"label","value":"SI-2(1)"},{"name":"sort-id","value":"si-02.01"}],"parts":[{"id":"si-2.1_smt","name":"statement","prose":"The organization centrally manages the flaw remediation process."},{"id":"si-2.1_gdn","name":"guidance","prose":"Central management is the organization-wide management and implementation of flaw remediation processes. Central management includes planning, implementing, assessing, authorizing, and monitoring the organization-defined, centrally managed flaw remediation security controls."},{"id":"si-2.1_obj","name":"objective","prose":"Determine if the organization centrally manages the flaw remediation process."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing flaw remediation\n\nautomated mechanisms supporting centralized management of flaw remediation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for flaw remediation"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for central management of the flaw remediation process\n\nautomated mechanisms supporting and\/or implementing central management of the flaw remediation process"}]}]},{"id":"si-2.2","class":"SP800-53-enhancement","title":"Automated Flaw Remediation Status","params":[{"id":"si-2.2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"SI-2(2)"},{"name":"sort-id","value":"si-02.02"}],"parts":[{"id":"si-2.2_smt","name":"statement","prose":"The organization employs automated mechanisms {{ insert: param, si-2.2_prm_1 }} to determine the state of information system components with regard to flaw remediation."},{"id":"si-2.2_gdn","name":"guidance","links":[{"href":"#cm-6","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"si-2.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-2.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(2)[1]"}],"prose":"defines a frequency to employ automated mechanisms to determine the state of information system components with regard to flaw remediation; and"},{"id":"si-2.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(2)[2]"}],"prose":"employs automated mechanisms with the organization-defined frequency to determine the state of information system components with regard to flaw remediation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing flaw remediation\n\nautomated mechanisms supporting centralized management of flaw remediation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for flaw remediation"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms used to determine the state of information system components with regard to flaw remediation"}]}]}]},{"id":"si-3","class":"SP800-53","title":"Malicious Code Protection","params":[{"id":"si-3_prm_1","label":"organization-defined frequency"},{"id":"si-3_prm_2","select":{"how-many":"one-or-more","choice":["endpoint","network entry\/exit points"]}},{"id":"si-3_prm_3","select":{"how-many":"one-or-more","choice":["block malicious code","quarantine malicious code","send alert to administrator"," {{ insert: param, si-3_prm_4 }} "]}},{"id":"si-3_prm_4","depends-on":"si-3_prm_3","label":"organization-defined action"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-3"},{"name":"sort-id","value":"si-03"}],"links":[{"href":"#6d431fee-658f-4a0e-9f2e-a38b5d398fab","rel":"reference"}],"parts":[{"id":"si-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code;"},{"id":"si-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures;"},{"id":"si-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Configures malicious code protection mechanisms to:","parts":[{"id":"si-3_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Perform periodic scans of the information system {{ insert: param, si-3_prm_1 }} and real-time scans of files from external sources at {{ insert: param, si-3_prm_2 }} as the files are downloaded, opened, or executed in accordance with organizational security policy; and"},{"id":"si-3_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":" {{ insert: param, si-3_prm_3 }} in response to malicious code detection; and"}]},{"id":"si-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Addresses the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the information system."}]},{"id":"si-3_gdn","name":"guidance","prose":"Information system entry and exit points include, for example, firewalls, electronic mail servers, web servers, proxy servers, remote-access servers, workstations, notebook computers, and mobile devices. Malicious code includes, for example, viruses, worms, Trojan horses, and spyware. Malicious code can also be encoded in various formats (e.g., UUENCODE, Unicode), contained within compressed or hidden files, or hidden in files using steganography. Malicious code can be transported by different means including, for example, web accesses, electronic mail, electronic mail attachments, and portable storage devices. Malicious code insertions occur through the exploitation of information system vulnerabilities. Malicious code protection mechanisms include, for example, anti-virus signature definitions and reputation-based technologies. A variety of technologies and methods exist to limit or eliminate the effects of malicious code. Pervasive configuration management and comprehensive software integrity controls may be effective in preventing execution of unauthorized code. In addition to commercial off-the-shelf software, malicious code may also be present in custom-built software. This could include, for example, logic bombs, back doors, and other types of cyber attacks that could affect organizational missions\/business functions. Traditional malicious code protection mechanisms cannot always detect such code. In these situations, organizations rely instead on other safeguards including, for example, secure coding practices, configuration management and control, trusted procurement processes, and monitoring practices to help ensure that software does not perform functions other than the functions intended. Organizations may determine that in response to the detection of malicious code, different actions may be warranted. For example, organizations can define actions in response to malicious code detection during periodic scans, actions in response to detection of malicious downloads, and\/or actions in response to detection of maliciousness when attempting to open or execute files.","links":[{"href":"#cm-3","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#sa-13","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-26","rel":"related"},{"href":"#sc-44","rel":"related"},{"href":"#si-2","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"si-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-3.a_obj","name":"objective","props":[{"name":"label","value":"SI-3(a)"}],"prose":"employs malicious code protection mechanisms to detect and eradicate malicious code at information system:","parts":[{"id":"si-3.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-3(a)[1]"}],"prose":"entry points;"},{"id":"si-3.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-3(a)[2]"}],"prose":"exit points;"}]},{"id":"si-3.b_obj","name":"objective","props":[{"name":"label","value":"SI-3(b)"}],"prose":"updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures (as identified in CM-1);"},{"id":"si-3.c_obj","name":"objective","props":[{"name":"label","value":"SI-3(c)"}],"parts":[{"id":"si-3.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-3(c)[1]"}],"prose":"defines a frequency for malicious code protection mechanisms to perform periodic scans of the information system;"},{"id":"si-3.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-3(c)[2]"}],"prose":"defines action to be initiated by malicious protection mechanisms in response to malicious code detection;"},{"id":"si-3.c_obj.3","name":"objective","props":[{"name":"label","value":"SI-3(c)[3]"}],"parts":[{"id":"si-3.c.1_obj.3","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](1)"}],"prose":"configures malicious code protection mechanisms to:","parts":[{"id":"si-3.c.1_obj.3.a","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](1)[a]"}],"prose":"perform periodic scans of the information system with the organization-defined frequency;"},{"id":"si-3.c.1_obj.3.b","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](1)[b]"}],"prose":"perform real-time scans of files from external sources at endpoint and\/or network entry\/exit points as the files are downloaded, opened, or executed in accordance with organizational security policy;"}]},{"id":"si-3.c.2_obj.3","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)"}],"prose":"configures malicious code protection mechanisms to do one or more of the following:","parts":[{"id":"si-3.c.2_obj.3.a","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[a]"}],"prose":"block malicious code in response to malicious code detection;"},{"id":"si-3.c.2_obj.3.b","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[b]"}],"prose":"quarantine malicious code in response to malicious code detection;"},{"id":"si-3.c.2_obj.3.c","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[c]"}],"prose":"send alert to administrator in response to malicious code detection; and\/or"},{"id":"si-3.c.2_obj.3.d","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[d]"}],"prose":"initiate organization-defined action in response to malicious code detection;"}]}]}]},{"id":"si-3.d_obj","name":"objective","props":[{"name":"label","value":"SI-3(d)"}],"parts":[{"id":"si-3.d_obj.1","name":"objective","props":[{"name":"label","value":"SI-3(d)[1]"}],"prose":"addresses the receipt of false positives during malicious code detection and eradication; and"},{"id":"si-3.d_obj.2","name":"objective","props":[{"name":"label","value":"SI-3(d)[2]"}],"prose":"addresses the resulting potential impact on the availability of the information system."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nconfiguration management policy and procedures\n\nprocedures addressing malicious code protection\n\nmalicious code protection mechanisms\n\nrecords of malicious code protection updates\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nscan results from malicious code protection mechanisms\n\nrecord of actions initiated by malicious code protection mechanisms in response to malicious code detection\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for malicious code protection\n\norganizational personnel with configuration management responsibility"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for employing, updating, and configuring malicious code protection mechanisms\n\norganizational process for addressing false positives and resulting potential impact\n\nautomated mechanisms supporting and\/or implementing employing, updating, and configuring malicious code protection mechanisms\n\nautomated mechanisms supporting and\/or implementing malicious code scanning and subsequent actions"}]}],"controls":[{"id":"si-3.1","class":"SP800-53-enhancement","title":"Central Management","props":[{"name":"label","value":"SI-3(1)"},{"name":"sort-id","value":"si-03.01"}],"parts":[{"id":"si-3.1_smt","name":"statement","prose":"The organization centrally manages malicious code protection mechanisms."},{"id":"si-3.1_gdn","name":"guidance","prose":"Central management is the organization-wide management and implementation of malicious code protection mechanisms. Central management includes planning, implementing, assessing, authorizing, and monitoring the organization-defined, centrally managed flaw malicious code protection security controls.","links":[{"href":"#au-2","rel":"related"},{"href":"#si-8","rel":"related"}]},{"id":"si-3.1_obj","name":"objective","prose":"Determine if the organization centrally manages malicious code protection mechanisms."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing malicious code protection\n\nautomated mechanisms supporting centralized management of malicious code protection mechanisms\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for malicious code protection"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for central management of malicious code protection mechanisms\n\nautomated mechanisms supporting and\/or implementing central management of malicious code protection mechanisms"}]}]},{"id":"si-3.2","class":"SP800-53-enhancement","title":"Automatic Updates","props":[{"name":"label","value":"SI-3(2)"},{"name":"sort-id","value":"si-03.02"}],"parts":[{"id":"si-3.2_smt","name":"statement","prose":"The information system automatically updates malicious code protection mechanisms."},{"id":"si-3.2_gdn","name":"guidance","prose":"Malicious code protection mechanisms include, for example, signature definitions. Due to information system integrity and availability concerns, organizations give careful consideration to the methodology used to carry out automatic updates.","links":[{"href":"#si-8","rel":"related"}]},{"id":"si-3.2_obj","name":"objective","prose":"Determine if the information system automatically updates malicious code protection mechanisms."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing malicious code protection\n\nautomated mechanisms supporting centralized management of malicious code protection mechanisms\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for malicious code protection"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing automatic updates to malicious code protection capability"}]}]}]},{"id":"si-4","class":"SP800-53","title":"Information System Monitoring","params":[{"id":"si-4_prm_1","label":"organization-defined monitoring objectives"},{"id":"si-4_prm_2","label":"organization-defined techniques and methods"},{"id":"si-4_prm_3","label":"organization-defined information system monitoring information"},{"id":"si-4_prm_4","label":"organization-defined personnel or roles"},{"id":"si-4_prm_5","select":{"how-many":"one-or-more","choice":["as needed"," {{ insert: param, si-4_prm_6 }} "]}},{"id":"si-4_prm_6","depends-on":"si-4_prm_5","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-4"},{"name":"sort-id","value":"si-04"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"},{"href":"#6d431fee-658f-4a0e-9f2e-a38b5d398fab","rel":"reference"},{"href":"#672fd561-b92b-4713-b9cf-6c9d9456728b","rel":"reference"},{"href":"#d1b1d689-0f66-4474-9924-c81119758dc1","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"}],"parts":[{"id":"si-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Monitors the information system to detect:","parts":[{"id":"si-4_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Attacks and indicators of potential attacks in accordance with {{ insert: param, si-4_prm_1 }}; and"},{"id":"si-4_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Unauthorized local, network, and remote connections;"}]},{"id":"si-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Identifies unauthorized use of the information system through {{ insert: param, si-4_prm_2 }};"},{"id":"si-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Deploys monitoring devices:","parts":[{"id":"si-4_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Strategically within the information system to collect organization-determined essential information; and"},{"id":"si-4_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"At ad hoc locations within the system to track specific types of transactions of interest to the organization;"}]},{"id":"si-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects information obtained from intrusion-monitoring tools from unauthorized access, modification, and deletion;"},{"id":"si-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information;"},{"id":"si-4_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations; and"},{"id":"si-4_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Provides {{ insert: param, si-4_prm_3 }} to {{ insert: param, si-4_prm_4 }} {{ insert: param, si-4_prm_5 }}."}]},{"id":"si-4_gdn","name":"guidance","prose":"Information system monitoring includes external and internal monitoring. External monitoring includes the observation of events occurring at the information system boundary (i.e., part of perimeter defense and boundary protection). Internal monitoring includes the observation of events occurring within the information system. Organizations can monitor information systems, for example, by observing audit activities in real time or by observing other system aspects such as access patterns, characteristics of access, and other actions. The monitoring objectives may guide determination of the events. Information system monitoring capability is achieved through a variety of tools and techniques (e.g., intrusion detection systems, intrusion prevention systems, malicious code protection software, scanning tools, audit record monitoring software, network monitoring software). Strategic locations for monitoring devices include, for example, selected perimeter locations and near server farms supporting critical applications, with such devices typically being employed at the managed interfaces associated with controls SC-7 and AC-17. Einstein network monitoring devices from the Department of Homeland Security can also be included as monitoring devices. The granularity of monitoring information collected is based on organizational monitoring objectives and the capability of information systems to support such objectives. Specific types of transactions of interest include, for example, Hyper Text Transfer Protocol (HTTP) traffic that bypasses HTTP proxies. Information system monitoring is an integral part of organizational continuous monitoring and incident response programs. Output from system monitoring serves as input to continuous monitoring and incident response programs. A network connection is any connection with a device that communicates through a network (e.g., local area network, Internet). A remote connection is any connection with a device communicating through an external network (e.g., the Internet). Local, network, and remote connections can be either wired or wireless.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-8","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-26","rel":"related"},{"href":"#sc-35","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"si-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-4.a_obj","name":"objective","props":[{"name":"label","value":"SI-4(a)"}],"parts":[{"id":"si-4.a.1_obj","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)"}],"parts":[{"id":"si-4.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[1]"}],"prose":"defines monitoring objectives to detect attacks and indicators of potential attacks on the information system;"},{"id":"si-4.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[2]"}],"prose":"monitors the information system to detect, in accordance with organization-defined monitoring objectives,:","parts":[{"id":"si-4.a.1_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[2][a]"}],"prose":"attacks;"},{"id":"si-4.a.1_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[2][b]"}],"prose":"indicators of potential attacks;"}]}]},{"id":"si-4.a.2_obj","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)"}],"prose":"monitors the information system to detect unauthorized:","parts":[{"id":"si-4.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)[1]"}],"prose":"local connections;"},{"id":"si-4.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)[2]"}],"prose":"network connections;"},{"id":"si-4.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)[3]"}],"prose":"remote connections;"}]}]},{"id":"si-4.b_obj","name":"objective","props":[{"name":"label","value":"SI-4(b)"}],"parts":[{"id":"si-4.b.1_obj","name":"objective","props":[{"name":"label","value":"SI-4(b)(1)"}],"prose":"defines techniques and methods to identify unauthorized use of the information system;"},{"id":"si-4.b.2_obj","name":"objective","props":[{"name":"label","value":"SI-4(b)(2)"}],"prose":"identifies unauthorized use of the information system through organization-defined techniques and methods;"}]},{"id":"si-4.c_obj","name":"objective","props":[{"name":"label","value":"SI-4(c)"}],"prose":"deploys monitoring devices:","parts":[{"id":"si-4.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(c)[1]"}],"prose":"strategically within the information system to collect organization-determined essential information;"},{"id":"si-4.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(c)[2]"}],"prose":"at ad hoc locations within the system to track specific types of transactions of interest to the organization;"}]},{"id":"si-4.d_obj","name":"objective","props":[{"name":"label","value":"SI-4(d)"}],"prose":"protects information obtained from intrusion-monitoring tools from unauthorized:","parts":[{"id":"si-4.d_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(d)[1]"}],"prose":"access;"},{"id":"si-4.d_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(d)[2]"}],"prose":"modification;"},{"id":"si-4.d_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(d)[3]"}],"prose":"deletion;"}]},{"id":"si-4.e_obj","name":"objective","props":[{"name":"label","value":"SI-4(e)"}],"prose":"heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information;"},{"id":"si-4.f_obj","name":"objective","props":[{"name":"label","value":"SI-4(f)"}],"prose":"obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations;"},{"id":"si-4.g_obj","name":"objective","props":[{"name":"label","value":"SI-4(g)"}],"parts":[{"id":"si-4.g_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(g)[1]"}],"prose":"defines personnel or roles to whom information system monitoring information is to be provided;"},{"id":"si-4.g_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(g)[2]"}],"prose":"defines information system monitoring information to be provided to organization-defined personnel or roles;"},{"id":"si-4.g_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(g)[3]"}],"prose":"defines a frequency to provide organization-defined information system monitoring to organization-defined personnel or roles;"},{"id":"si-4.g_obj.4","name":"objective","props":[{"name":"label","value":"SI-4(g)[4]"}],"prose":"provides organization-defined information system monitoring information to organization-defined personnel or roles one or more of the following:","parts":[{"id":"si-4.g_obj.4.a","name":"objective","props":[{"name":"label","value":"SI-4(g)[4][a]"}],"prose":"as needed; and\/or"},{"id":"si-4.g_obj.4.b","name":"objective","props":[{"name":"label","value":"SI-4(g)[4][b]"}],"prose":"with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Continuous monitoring strategy\n\nsystem and information integrity policy\n\nprocedures addressing information system monitoring tools and techniques\n\nfacility diagram\/layout\n\ninformation system design documentation\n\ninformation system monitoring tools and techniques documentation\n\nlocations within information system where monitoring devices are deployed\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility monitoring the information system"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for information system monitoring\n\nautomated mechanisms supporting and\/or implementing information system monitoring capability"}]}],"controls":[{"id":"si-4.2","class":"SP800-53-enhancement","title":"Automated Tools for Real-time Analysis","props":[{"name":"label","value":"SI-4(2)"},{"name":"sort-id","value":"si-04.02"}],"parts":[{"id":"si-4.2_smt","name":"statement","prose":"The organization employs automated tools to support near real-time analysis of events."},{"id":"si-4.2_gdn","name":"guidance","prose":"Automated tools include, for example, host-based, network-based, transport-based, or storage-based event monitoring tools or Security Information and Event Management (SIEM) technologies that provide real time analysis of alerts and\/or notifications generated by organizational information systems."},{"id":"si-4.2_obj","name":"objective","prose":"Determine if the organization employs automated tools to support near real-time analysis of events."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing information system monitoring tools and techniques\n\ninformation system design documentation\n\ninformation system monitoring tools and techniques documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for monitoring the information system\n\norganizational personnel with responsibility for incident response\/management"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for near real-time analysis of events\n\norganizational processes for information system monitoring\n\nautomated mechanisms supporting and\/or implementing information system monitoring\n\nautomated mechanisms\/tools supporting and\/or implementing analysis of events"}]}]},{"id":"si-4.4","class":"SP800-53-enhancement","title":"Inbound and Outbound Communications Traffic","params":[{"id":"si-4.4_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"SI-4(4)"},{"name":"sort-id","value":"si-04.04"}],"parts":[{"id":"si-4.4_smt","name":"statement","prose":"The information system monitors inbound and outbound communications traffic {{ insert: param, si-4.4_prm_1 }} for unusual or unauthorized activities or conditions."},{"id":"si-4.4_gdn","name":"guidance","prose":"Unusual\/unauthorized activities or conditions related to information system inbound and outbound communications traffic include, for example, internal traffic that indicates the presence of malicious code within organizational information systems or propagating among system components, the unauthorized exporting of information, or signaling to external information systems. Evidence of malicious code is used to identify potentially compromised information systems or information system components."},{"id":"si-4.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-4.4_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(4)[1]"}],"prose":"defines a frequency to monitor:","parts":[{"id":"si-4.4_obj.1.a","name":"objective","props":[{"name":"label","value":"SI-4(4)[1][a]"}],"prose":"inbound communications traffic for unusual or unauthorized activities or conditions;"},{"id":"si-4.4_obj.1.b","name":"objective","props":[{"name":"label","value":"SI-4(4)[1][b]"}],"prose":"outbound communications traffic for unusual or unauthorized activities or conditions;"}]},{"id":"si-4.4_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(4)[2]"}],"prose":"monitors, with the organization-defined frequency:","parts":[{"id":"si-4.4_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-4(4)[2][a]"}],"prose":"inbound communications traffic for unusual or unauthorized activities or conditions; and"},{"id":"si-4.4_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-4(4)[2][b]"}],"prose":"outbound communications traffic for unusual or unauthorized activities or conditions."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing information system monitoring tools and techniques\n\ninformation system design documentation\n\ninformation system monitoring tools and techniques documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system protocols\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for monitoring the information system\n\norganizational personnel with responsibility for the intrusion detection system"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for intrusion detection\/information system monitoring\n\nautomated mechanisms supporting and\/or implementing intrusion detection capability\/information system monitoring\n\nautomated mechanisms supporting and\/or implementing monitoring of inbound\/outbound communications traffic"}]}]},{"id":"si-4.5","class":"SP800-53-enhancement","title":"System-generated Alerts","params":[{"id":"si-4.5_prm_1","label":"organization-defined personnel or roles"},{"id":"si-4.5_prm_2","label":"organization-defined compromise indicators"}],"props":[{"name":"label","value":"SI-4(5)"},{"name":"sort-id","value":"si-04.05"}],"parts":[{"id":"si-4.5_smt","name":"statement","prose":"The information system alerts {{ insert: param, si-4.5_prm_1 }} when the following indications of compromise or potential compromise occur: {{ insert: param, si-4.5_prm_2 }}."},{"id":"si-4.5_gdn","name":"guidance","prose":"Alerts may be generated from a variety of sources, including, for example, audit records or inputs from malicious code protection mechanisms, intrusion detection or prevention mechanisms, or boundary protection devices such as firewalls, gateways, and routers. Alerts can be transmitted, for example, telephonically, by electronic mail messages, or by text messaging. Organizational personnel on the notification list can include, for example, system administrators, mission\/business owners, system owners, or information system security officers.","links":[{"href":"#au-5","rel":"related"},{"href":"#pe-6","rel":"related"}]},{"id":"si-4.5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-4.5_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(5)[1]"}],"prose":"the organization defines compromise indicators for the information system;"},{"id":"si-4.5_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(5)[2]"}],"prose":"the organization defines personnel or roles to be alerted when indications of compromise or potential compromise occur; and"},{"id":"si-4.5_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(5)[3]"}],"prose":"the information system alerts organization-defined personnel or roles when organization-defined compromise indicators occur."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing information system monitoring tools and techniques\n\ninformation system monitoring tools and techniques documentation\n\ninformation system configuration settings and associated documentation\n\nalerts\/notifications generated based on compromise indicators\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for monitoring the information system\n\norganizational personnel with responsibility for the intrusion detection system"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for intrusion detection\/information system monitoring\n\nautomated mechanisms supporting and\/or implementing intrusion detection\/information system monitoring capability\n\nautomated mechanisms supporting and\/or implementing alerts for compromise indicators"}]}]}]},{"id":"si-5","class":"SP800-53","title":"Security Alerts, Advisories, and Directives","params":[{"id":"si-5_prm_1","label":"organization-defined external organizations"},{"id":"si-5_prm_2","select":{"how-many":"one-or-more","choice":[" {{ insert: param, si-5_prm_3 }} "," {{ insert: param, si-5_prm_4 }} "," {{ insert: param, si-5_prm_5 }} "]}},{"id":"si-5_prm_3","depends-on":"si-5_prm_2","label":"organization-defined personnel or roles"},{"id":"si-5_prm_4","depends-on":"si-5_prm_2","label":"organization-defined elements within the organization"},{"id":"si-5_prm_5","depends-on":"si-5_prm_2","label":"organization-defined external organizations"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-5"},{"name":"sort-id","value":"si-05"}],"links":[{"href":"#bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","rel":"reference"}],"parts":[{"id":"si-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Receives information system security alerts, advisories, and directives from {{ insert: param, si-5_prm_1 }} on an ongoing basis;"},{"id":"si-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Generates internal security alerts, advisories, and directives as deemed necessary;"},{"id":"si-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Disseminates security alerts, advisories, and directives to: {{ insert: param, si-5_prm_2 }}; and"},{"id":"si-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Implements security directives in accordance with established time frames, or notifies the issuing organization of the degree of noncompliance."}]},{"id":"si-5_gdn","name":"guidance","prose":"The United States Computer Emergency Readiness Team (US-CERT) generates security alerts and advisories to maintain situational awareness across the federal government. Security directives are issued by OMB or other designated organizations with the responsibility and authority to issue such directives. Compliance to security directives is essential due to the critical nature of many of these directives and the potential immediate adverse effects on organizational operations and assets, individuals, other organizations, and the Nation should the directives not be implemented in a timely manner. External organizations include, for example, external mission\/business partners, supply chain partners, external service providers, and other peer\/supporting organizations.","links":[{"href":"#si-2","rel":"related"}]},{"id":"si-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-5.a_obj","name":"objective","props":[{"name":"label","value":"SI-5(a)"}],"parts":[{"id":"si-5.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-5(a)[1]"}],"prose":"defines external organizations from whom information system security alerts, advisories and directives are to be received;"},{"id":"si-5.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-5(a)[2]"}],"prose":"receives information system security alerts, advisories, and directives from organization-defined external organizations on an ongoing basis;"}]},{"id":"si-5.b_obj","name":"objective","props":[{"name":"label","value":"SI-5(b)"}],"prose":"generates internal security alerts, advisories, and directives as deemed necessary;"},{"id":"si-5.c_obj","name":"objective","props":[{"name":"label","value":"SI-5(c)"}],"parts":[{"id":"si-5.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-5(c)[1]"}],"prose":"defines personnel or roles to whom security alerts, advisories, and directives are to be provided;"},{"id":"si-5.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-5(c)[2]"}],"prose":"defines elements within the organization to whom security alerts, advisories, and directives are to be provided;"},{"id":"si-5.c_obj.3","name":"objective","props":[{"name":"label","value":"SI-5(c)[3]"}],"prose":"defines external organizations to whom security alerts, advisories, and directives are to be provided;"},{"id":"si-5.c_obj.4","name":"objective","props":[{"name":"label","value":"SI-5(c)[4]"}],"prose":"disseminates security alerts, advisories, and directives to one or more of the following:","parts":[{"id":"si-5.c_obj.4.a","name":"objective","props":[{"name":"label","value":"SI-5(c)[4][a]"}],"prose":"organization-defined personnel or roles;"},{"id":"si-5.c_obj.4.b","name":"objective","props":[{"name":"label","value":"SI-5(c)[4][b]"}],"prose":"organization-defined elements within the organization; and\/or"},{"id":"si-5.c_obj.4.c","name":"objective","props":[{"name":"label","value":"SI-5(c)[4][c]"}],"prose":"organization-defined external organizations; and"}]}]},{"id":"si-5.d_obj","name":"objective","props":[{"name":"label","value":"SI-5(d)"}],"parts":[{"id":"si-5.d_obj.1","name":"objective","props":[{"name":"label","value":"SI-5(d)[1]"}],"prose":"implements security directives in accordance with established time frames; or"},{"id":"si-5.d_obj.2","name":"objective","props":[{"name":"label","value":"SI-5(d)[2]"}],"prose":"notifies the issuing organization of the degree of noncompliance."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing security alerts, advisories, and directives\n\nrecords of security alerts and advisories\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security alert and advisory responsibilities\n\norganizational personnel implementing, operating, maintaining, and using the information system\n\norganizational personnel, organizational elements, and\/or external organizations to whom alerts, advisories, and directives are to be disseminated\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for defining, receiving, generating, disseminating, and complying with security alerts, advisories, and directives\n\nautomated mechanisms supporting and\/or implementing definition, receipt, generation, and dissemination of security alerts, advisories, and directives\n\nautomated mechanisms supporting and\/or implementing security directives"}]}],"controls":[{"id":"si-5.1","class":"SP800-53-enhancement","title":"Automated Alerts and Advisories","props":[{"name":"label","value":"SI-5(1)"},{"name":"sort-id","value":"si-05.01"}],"parts":[{"id":"si-5.1_smt","name":"statement","prose":"The organization employs automated mechanisms to make security alert and advisory information available throughout the organization."},{"id":"si-5.1_gdn","name":"guidance","prose":"The significant number of changes to organizational information systems and the environments in which those systems operate requires the dissemination of security-related information to a variety of organizational entities that have a direct interest in the success of organizational missions and business functions. Based on the information provided by the security alerts and advisories, changes may be required at one or more of the three tiers related to the management of information security risk including the governance level, mission\/business process\/enterprise architecture level, and the information system level."},{"id":"si-5.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to make security alert and advisory information available throughout the organization."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing security alerts, advisories, and directives\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nautomated mechanisms supporting the distribution of security alert and advisory information\n\nrecords of security alerts and advisories\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security alert and advisory responsibilities\n\norganizational personnel implementing, operating, maintaining, and using the information system\n\norganizational personnel, organizational elements, and\/or external organizations to whom alerts and advisories are to be disseminated\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for defining, receiving, generating, and disseminating security alerts and advisories\n\nautomated mechanisms supporting and\/or implementing dissemination of security alerts and advisories"}]}]}]},{"id":"si-6","class":"SP800-53","title":"Security Function Verification","params":[{"id":"si-6_prm_1","label":"organization-defined security functions"},{"id":"si-6_prm_2","select":{"how-many":"one-or-more","choice":[" {{ insert: param, si-6_prm_3 }} ","upon command by user with appropriate privilege"," {{ insert: param, si-6_prm_4 }} "]}},{"id":"si-6_prm_3","depends-on":"si-6_prm_2","label":"organization-defined system transitional states"},{"id":"si-6_prm_4","depends-on":"si-6_prm_2","label":"organization-defined frequency"},{"id":"si-6_prm_5","label":"organization-defined personnel or roles"},{"id":"si-6_prm_6","select":{"how-many":"one-or-more","choice":["shuts the information system down","restarts the information system"," {{ insert: param, si-6_prm_7 }} "]}},{"id":"si-6_prm_7","depends-on":"si-6_prm_6","label":"organization-defined alternative action(s)"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-6"},{"name":"sort-id","value":"si-06"}],"parts":[{"id":"si-6_smt","name":"statement","prose":"The information system:","parts":[{"id":"si-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Verifies the correct operation of {{ insert: param, si-6_prm_1 }};"},{"id":"si-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Performs this verification {{ insert: param, si-6_prm_2 }};"},{"id":"si-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Notifies {{ insert: param, si-6_prm_5 }} of failed security verification tests; and"},{"id":"si-6_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":" {{ insert: param, si-6_prm_6 }} when anomalies are discovered."}]},{"id":"si-6_gdn","name":"guidance","prose":"Transitional states for information systems include, for example, system startup, restart, shutdown, and abort. Notifications provided by information systems include, for example, electronic alerts to system administrators, messages to local computer consoles, and\/or hardware indications such as lights.","links":[{"href":"#ca-7","rel":"related"},{"href":"#cm-6","rel":"related"}]},{"id":"si-6_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-6.a_obj","name":"objective","props":[{"name":"label","value":"SI-6(a)"}],"parts":[{"id":"si-6.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-6(a)[1]"}],"prose":"the organization defines security functions to be verified for correct operation;"},{"id":"si-6.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-6(a)[2]"}],"prose":"the information system verifies the correct operation of organization-defined security functions;"}]},{"id":"si-6.b_obj","name":"objective","props":[{"name":"label","value":"SI-6(b)"}],"parts":[{"id":"si-6.b_obj.1","name":"objective","props":[{"name":"label","value":"SI-6(b)[1]"}],"prose":"the organization defines system transitional states requiring verification of organization-defined security functions;"},{"id":"si-6.b_obj.2","name":"objective","props":[{"name":"label","value":"SI-6(b)[2]"}],"prose":"the organization defines a frequency to verify the correct operation of organization-defined security functions;"},{"id":"si-6.b_obj.3","name":"objective","props":[{"name":"label","value":"SI-6(b)[3]"}],"prose":"the information system performs this verification one or more of the following:","parts":[{"id":"si-6.b_obj.3.a","name":"objective","props":[{"name":"label","value":"SI-6(b)[3][a]"}],"prose":"at organization-defined system transitional states;"},{"id":"si-6.b_obj.3.b","name":"objective","props":[{"name":"label","value":"SI-6(b)[3][b]"}],"prose":"upon command by user with appropriate privilege; and\/or"},{"id":"si-6.b_obj.3.c","name":"objective","props":[{"name":"label","value":"SI-6(b)[3][c]"}],"prose":"with the organization-defined frequency;"}]}]},{"id":"si-6.c_obj","name":"objective","props":[{"name":"label","value":"SI-6(c)"}],"parts":[{"id":"si-6.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-6(c)[1]"}],"prose":"the organization defines personnel or roles to be notified of failed security verification tests;"},{"id":"si-6.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-6(c)[2]"}],"prose":"the information system notifies organization-defined personnel or roles of failed security verification tests;"}]},{"id":"si-6.d_obj","name":"objective","props":[{"name":"label","value":"SI-6(d)"}],"parts":[{"id":"si-6.d_obj.1","name":"objective","props":[{"name":"label","value":"SI-6(d)[1]"}],"prose":"the organization defines alternative action(s) to be performed when anomalies are discovered;"},{"id":"si-6.d_obj.2","name":"objective","props":[{"name":"label","value":"SI-6(d)[2]"}],"prose":"the information system performs one or more of the following actions when anomalies are discovered:","parts":[{"id":"si-6.d_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-6(d)[2][a]"}],"prose":"shuts the information system down;"},{"id":"si-6.d_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-6(d)[2][b]"}],"prose":"restarts the information system; and\/or"},{"id":"si-6.d_obj.2.c","name":"objective","props":[{"name":"label","value":"SI-6(d)[2][c]"}],"prose":"performs organization-defined alternative action(s)."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing security function verification\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nalerts\/notifications of failed security verification tests\n\nlist of system transition states requiring security functionality verification\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security function verification responsibilities\n\norganizational personnel implementing, operating, and maintaining the information system\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security function verification\n\nautomated mechanisms supporting and\/or implementing security function verification capability"}]}]},{"id":"si-7","class":"SP800-53","title":"Software, Firmware, and Information Integrity","params":[{"id":"si-7_prm_1","label":"organization-defined software, firmware, and information"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-7"},{"name":"sort-id","value":"si-07"}],"links":[{"href":"#6bf8d24a-78dc-4727-a2ac-0e64d71c495c","rel":"reference"},{"href":"#3878cc04-144a-483e-af62-8fe6f4ad6c7a","rel":"reference"}],"parts":[{"id":"si-7_smt","name":"statement","prose":"The organization employs integrity verification tools to detect unauthorized changes to {{ insert: param, si-7_prm_1 }}."},{"id":"si-7_gdn","name":"guidance","prose":"Unauthorized changes to software, firmware, and information can occur due to errors or malicious activity (e.g., tampering). Software includes, for example, operating systems (with key internal components such as kernels, drivers), middleware, and applications. Firmware includes, for example, the Basic Input Output System (BIOS). Information includes metadata such as security attributes associated with information. State-of-the-practice integrity-checking mechanisms (e.g., parity checks, cyclical redundancy checks, cryptographic hashes) and associated tools can automatically monitor the integrity of information systems and hosted applications.","links":[{"href":"#sa-12","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#si-3","rel":"related"}]},{"id":"si-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-7_obj.1","name":"objective","props":[{"name":"label","value":"SI-7[1]"}],"parts":[{"id":"si-7_obj.1.a","name":"objective","props":[{"name":"label","value":"SI-7[1][a]"}],"prose":"defines software requiring integrity verification tools to be employed to detect unauthorized changes;"},{"id":"si-7_obj.1.b","name":"objective","props":[{"name":"label","value":"SI-7[1][b]"}],"prose":"defines firmware requiring integrity verification tools to be employed to detect unauthorized changes;"},{"id":"si-7_obj.1.c","name":"objective","props":[{"name":"label","value":"SI-7[1][c]"}],"prose":"defines information requiring integrity verification tools to be employed to detect unauthorized changes;"}]},{"id":"si-7_obj.2","name":"objective","props":[{"name":"label","value":"SI-7[2]"}],"prose":"employs integrity verification tools to detect unauthorized changes to organization-defined:","parts":[{"id":"si-7_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-7[2][a]"}],"prose":"software;"},{"id":"si-7_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-7[2][b]"}],"prose":"firmware; and"},{"id":"si-7_obj.2.c","name":"objective","props":[{"name":"label","value":"SI-7[2][c]"}],"prose":"information."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing software, firmware, and information integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nintegrity verification tools and associated documentation\n\nrecords generated\/triggered from integrity verification tools regarding unauthorized software, firmware, and information changes\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for software, firmware, and\/or information integrity\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Software, firmware, and information integrity verification tools"}]}],"controls":[{"id":"si-7.1","class":"SP800-53-enhancement","title":"Integrity Checks","params":[{"id":"si-7.1_prm_1","label":"organization-defined software, firmware, and information"},{"id":"si-7.1_prm_2","select":{"how-many":"one-or-more","choice":["at startup","at {{ insert: param, si-7.1_prm_3 }} "," {{ insert: param, si-7.1_prm_4 }} "]}},{"id":"si-7.1_prm_3","depends-on":"si-7.1_prm_2","label":"organization-defined transitional states or security-relevant events"},{"id":"si-7.1_prm_4","depends-on":"si-7.1_prm_2","label":"organization-defined frequency"}],"props":[{"name":"label","value":"SI-7(1)"},{"name":"sort-id","value":"si-07.01"}],"parts":[{"id":"si-7.1_smt","name":"statement","prose":"The information system performs an integrity check of {{ insert: param, si-7.1_prm_1 }} {{ insert: param, si-7.1_prm_2 }}."},{"id":"si-7.1_gdn","name":"guidance","prose":"Security-relevant events include, for example, the identification of a new threat to which organizational information systems are susceptible, and the installation of new hardware, software, or firmware. Transitional states include, for example, system startup, restart, shutdown, and abort."},{"id":"si-7.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-7.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-7(1)[1]"}],"prose":"the organization defines:","parts":[{"id":"si-7.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SI-7(1)[1][a]"}],"prose":"software requiring integrity checks to be performed;"},{"id":"si-7.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SI-7(1)[1][b]"}],"prose":"firmware requiring integrity checks to be performed;"},{"id":"si-7.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SI-7(1)[1][c]"}],"prose":"information requiring integrity checks to be performed;"}]},{"id":"si-7.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-7(1)[2]"}],"prose":"the organization defines transitional states or security-relevant events requiring integrity checks of organization-defined:","parts":[{"id":"si-7.1_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-7(1)[2][a]"}],"prose":"software;"},{"id":"si-7.1_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-7(1)[2][b]"}],"prose":"firmware;"},{"id":"si-7.1_obj.2.c","name":"objective","props":[{"name":"label","value":"SI-7(1)[2][c]"}],"prose":"information;"}]},{"id":"si-7.1_obj.3","name":"objective","props":[{"name":"label","value":"SI-7(1)[3]"}],"prose":"the organization defines a frequency with which to perform an integrity check of organization-defined:","parts":[{"id":"si-7.1_obj.3.a","name":"objective","props":[{"name":"label","value":"SI-7(1)[3][a]"}],"prose":"software;"},{"id":"si-7.1_obj.3.b","name":"objective","props":[{"name":"label","value":"SI-7(1)[3][b]"}],"prose":"firmware;"},{"id":"si-7.1_obj.3.c","name":"objective","props":[{"name":"label","value":"SI-7(1)[3][c]"}],"prose":"information;"}]},{"id":"si-7.1_obj.4","name":"objective","props":[{"name":"label","value":"SI-7(1)[4]"}],"prose":"the information system performs an integrity check of organization-defined software, firmware, and information one or more of the following:","parts":[{"id":"si-7.1_obj.4.a","name":"objective","props":[{"name":"label","value":"SI-7(1)[4][a]"}],"prose":"at startup;"},{"id":"si-7.1_obj.4.b","name":"objective","props":[{"name":"label","value":"SI-7(1)[4][b]"}],"prose":"at organization-defined transitional states or security-relevant events; and\/or"},{"id":"si-7.1_obj.4.c","name":"objective","props":[{"name":"label","value":"SI-7(1)[4][c]"}],"prose":"with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing software, firmware, and information integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nintegrity verification tools and associated documentation\n\nrecords of integrity scans\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for software, firmware, and\/or information integrity\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Software, firmware, and information integrity verification tools"}]}]},{"id":"si-7.2","class":"SP800-53-enhancement","title":"Automated Notifications of Integrity Violations","params":[{"id":"si-7.2_prm_1","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"SI-7(2)"},{"name":"sort-id","value":"si-07.02"}],"parts":[{"id":"si-7.2_smt","name":"statement","prose":"The organization employs automated tools that provide notification to {{ insert: param, si-7.2_prm_1 }} upon discovering discrepancies during integrity verification."},{"id":"si-7.2_gdn","name":"guidance","prose":"The use of automated tools to report integrity violations and to notify organizational personnel in a timely matter is an essential precursor to effective risk response. Personnel having an interest in integrity violations include, for example, mission\/business owners, information system owners, systems administrators, software developers, systems integrators, and information security officers."},{"id":"si-7.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-7.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-7(2)[1]"}],"prose":"defines personnel or roles to whom notification is to be provided upon discovering discrepancies during integrity verification; and"},{"id":"si-7.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-7(2)[2]"}],"prose":"employs automated tools that provide notification to organization-defined personnel or roles upon discovering discrepancies during integrity verification."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing software, firmware, and information integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nintegrity verification tools and associated documentation\n\nrecords of integrity scans\n\nautomated tools supporting alerts and notifications for integrity discrepancies\n\nalerts\/notifications provided upon discovering discrepancies during integrity verifications\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for software, firmware, and\/or information integrity\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Software, firmware, and information integrity verification tools\n\nautomated mechanisms providing integrity discrepancy notifications"}]}]},{"id":"si-7.5","class":"SP800-53-enhancement","title":"Automated Response to Integrity Violations","params":[{"id":"si-7.5_prm_1","select":{"how-many":"one-or-more","choice":["shuts the information system down","restarts the information system","implements {{ insert: param, si-7.5_prm_2 }} "]}},{"id":"si-7.5_prm_2","depends-on":"si-7.5_prm_1","label":"organization-defined security safeguards"}],"props":[{"name":"label","value":"SI-7(5)"},{"name":"sort-id","value":"si-07.05"}],"parts":[{"id":"si-7.5_smt","name":"statement","prose":"The information system automatically {{ insert: param, si-7.5_prm_1 }} when integrity violations are discovered."},{"id":"si-7.5_gdn","name":"guidance","prose":"Organizations may define different integrity checking and anomaly responses: (i) by type of information (e.g., firmware, software, user data); (ii) by specific information (e.g., boot firmware, boot firmware for a specific types of machines); or (iii) a combination of both. Automatic implementation of specific safeguards within organizational information systems includes, for example, reversing the changes, halting the information system, or triggering audit alerts when unauthorized modifications to critical security files occur."},{"id":"si-7.5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-7.5_obj.1","name":"objective","props":[{"name":"label","value":"SI-7(5)[1]"}],"prose":"the organization defines security safeguards to be implemented when integrity violations are discovered;"},{"id":"si-7.5_obj.2","name":"objective","props":[{"name":"label","value":"SI-7(5)[2]"}],"prose":"the information system automatically performs one or more of the following actions when integrity violations are discovered:","parts":[{"id":"si-7.5_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-7(5)[2][a]"}],"prose":"shuts the information system down;"},{"id":"si-7.5_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-7(5)[2][b]"}],"prose":"restarts the information system; and\/or"},{"id":"si-7.5_obj.2.c","name":"objective","props":[{"name":"label","value":"SI-7(5)[2][c]"}],"prose":"implements the organization-defined security safeguards."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing software, firmware, and information integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nintegrity verification tools and associated documentation\n\nrecords of integrity scans\n\nrecords of integrity checks and responses to integrity violations\n\ninformation audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for software, firmware, and\/or information integrity\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Software, firmware, and information integrity verification tools\n\nautomated mechanisms providing an automated response to integrity violations\n\nautomated mechanisms supporting and\/or implementing security safeguards to be implemented when integrity violations are discovered"}]}]},{"id":"si-7.7","class":"SP800-53-enhancement","title":"Integration of Detection and Response","params":[{"id":"si-7.7_prm_1","label":"organization-defined security-relevant changes to the information system"}],"props":[{"name":"label","value":"SI-7(7)"},{"name":"sort-id","value":"si-07.07"}],"parts":[{"id":"si-7.7_smt","name":"statement","prose":"The organization incorporates the detection of unauthorized {{ insert: param, si-7.7_prm_1 }} into the organizational incident response capability."},{"id":"si-7.7_gdn","name":"guidance","prose":"This control enhancement helps to ensure that detected events are tracked, monitored, corrected, and available for historical purposes. Maintaining historical records is important both for being able to identify and discern adversary actions over an extended period of time and for possible legal actions. Security-relevant changes include, for example, unauthorized changes to established configuration settings or unauthorized elevation of information system privileges.","links":[{"href":"#ir-4","rel":"related"},{"href":"#ir-5","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"si-7.7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-7.7_obj.1","name":"objective","props":[{"name":"label","value":"SI-7(7)[1]"}],"prose":"defines unauthorized security-relevant changes to the information system; and"},{"id":"si-7.7_obj.2","name":"objective","props":[{"name":"label","value":"SI-7(7)[2]"}],"prose":"incorporates the detection of unauthorized organization-defined security-relevant changes to the information system into the organizational incident response capability."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing software, firmware, and information integrity\n\nprocedures addressing incident response\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nincident response records\n\ninformation audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for software, firmware, and\/or information integrity\n\norganizational personnel with information security responsibilities\n\norganizational personnel with incident response responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incorporating detection of unauthorized security-relevant changes into the incident response capability\n\nsoftware, firmware, and information integrity verification tools\n\nautomated mechanisms supporting and\/or implementing incorporation of detection of unauthorized security-relevant changes into the incident response capability"}]}]},{"id":"si-7.14","class":"SP800-53-enhancement","title":"Binary or Machine Executable Code","props":[{"name":"label","value":"SI-7(14)"},{"name":"sort-id","value":"si-07.14"}],"parts":[{"id":"si-7.14_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-7.14_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Prohibits the use of binary or machine-executable code from sources with limited or no warranty and without the provision of source code; and"},{"id":"si-7.14_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Provides exceptions to the source code requirement only for compelling mission\/operational requirements and with the approval of the authorizing official."}]},{"id":"si-7.14_gdn","name":"guidance","prose":"This control enhancement applies to all sources of binary or machine-executable code including, for example, commercial software\/firmware and open source software. Organizations assess software products without accompanying source code from sources with limited or no warranty for potential security impacts. The assessments address the fact that these types of software products may be very difficult to review, repair, or extend, given that organizations, in most cases, do not have access to the original source code, and there may be no owners who could make such repairs on behalf of organizations.","links":[{"href":"#sa-5","rel":"related"}]},{"id":"si-7.14_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-7.14.a_obj","name":"objective","props":[{"name":"label","value":"SI-7(14)(a)"}],"parts":[{"id":"si-7.14.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-7(14)(a)[1]"}],"prose":"prohibits the use of binary or machine-executable code from sources with limited or no warranty;"},{"id":"si-7.14.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-7(14)(a)[2]"}],"prose":"prohibits the use of binary or machine-executable code without the provision of source code;"}],"links":[{"href":"#si-7.14_smt.a","rel":"corresp"}]},{"id":"si-7.14.b_obj","name":"objective","props":[{"name":"label","value":"SI-7(14)(b)"}],"parts":[{"id":"si-7.14.b_obj.1","name":"objective","props":[{"name":"label","value":"SI-7(14)(b)[1]"}],"prose":"provides exceptions to the source code requirement only for compelling mission\/operational requirements; and"},{"id":"si-7.14.b_obj.2","name":"objective","props":[{"name":"label","value":"SI-7(14)(b)[2]"}],"prose":"provides exceptions to the source code requirement only with the approval of the authorizing official."}],"links":[{"href":"#si-7.14_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing software, firmware, and information integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\napproval records for execution of binary and machine-executable code\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for software, firmware, and\/or information integrity\n\norganizational personnel with information security responsibilities\n\nauthorizing official\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing prohibition of the execution of binary or machine-executable code"}]}]}]},{"id":"si-8","class":"SP800-53","title":"Spam Protection","props":[{"name":"priority","value":"P2"},{"name":"label","value":"SI-8"},{"name":"sort-id","value":"si-08"}],"links":[{"href":"#c6e95ca0-5828-420e-b095-00895b72b5e8","rel":"reference"}],"parts":[{"id":"si-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Employs spam protection mechanisms at information system entry and exit points to detect and take action on unsolicited messages; and"},{"id":"si-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Updates spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures."}]},{"id":"si-8_gdn","name":"guidance","prose":"Information system entry and exit points include, for example, firewalls, electronic mail servers, web servers, proxy servers, remote-access servers, workstations, mobile devices, and notebook\/laptop computers. Spam can be transported by different means including, for example, electronic mail, electronic mail attachments, and web accesses. Spam protection mechanisms include, for example, signature definitions.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-3","rel":"related"}]},{"id":"si-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-8.a_obj","name":"objective","props":[{"name":"label","value":"SI-8(a)"}],"prose":"employs spam protection mechanisms:","parts":[{"id":"si-8.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-8(a)[1]"}],"prose":"at information system entry points to detect unsolicited messages;"},{"id":"si-8.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-8(a)[2]"}],"prose":"at information system entry points to take action on unsolicited messages;"},{"id":"si-8.a_obj.3","name":"objective","props":[{"name":"label","value":"SI-8(a)[3]"}],"prose":"at information system exit points to detect unsolicited messages;"},{"id":"si-8.a_obj.4","name":"objective","props":[{"name":"label","value":"SI-8(a)[4]"}],"prose":"at information system exit points to take action on unsolicited messages; and"}]},{"id":"si-8.b_obj","name":"objective","props":[{"name":"label","value":"SI-8(b)"}],"prose":"updates spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nconfiguration management policy and procedures (CM-1)\n\nprocedures addressing spam protection\n\nspam protection mechanisms\n\nrecords of spam protection updates\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for spam protection\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for implementing spam protection\n\nautomated mechanisms supporting and\/or implementing spam protection"}]}],"controls":[{"id":"si-8.1","class":"SP800-53-enhancement","title":"Central Management","props":[{"name":"label","value":"SI-8(1)"},{"name":"sort-id","value":"si-08.01"}],"parts":[{"id":"si-8.1_smt","name":"statement","prose":"The organization centrally manages spam protection mechanisms."},{"id":"si-8.1_gdn","name":"guidance","prose":"Central management is the organization-wide management and implementation of spam protection mechanisms. Central management includes planning, implementing, assessing, authorizing, and monitoring the organization-defined, centrally managed spam protection security controls.","links":[{"href":"#au-3","rel":"related"},{"href":"#si-2","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"si-8.1_obj","name":"objective","prose":"Determine if the organization centrally manages spam protection mechanisms."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing spam protection\n\nspam protection mechanisms\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for spam protection\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for central management of spam protection\n\nautomated mechanisms supporting and\/or implementing central management of spam protection"}]}]},{"id":"si-8.2","class":"SP800-53-enhancement","title":"Automatic Updates","props":[{"name":"label","value":"SI-8(2)"},{"name":"sort-id","value":"si-08.02"}],"parts":[{"id":"si-8.2_smt","name":"statement","prose":"The information system automatically updates spam protection mechanisms."},{"id":"si-8.2_obj","name":"objective","prose":"Determine if the information system automatically updates spam protection mechanisms."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing spam protection\n\nspam protection mechanisms\n\nrecords of spam protection updates\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for spam protection\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for spam protection\n\nautomated mechanisms supporting and\/or implementing automatic updates to spam protection mechanisms"}]}]}]},{"id":"si-10","class":"SP800-53","title":"Information Input Validation","params":[{"id":"si-10_prm_1","label":"organization-defined information inputs"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-10"},{"name":"sort-id","value":"si-10"}],"parts":[{"id":"si-10_smt","name":"statement","prose":"The information system checks the validity of {{ insert: param, si-10_prm_1 }}."},{"id":"si-10_gdn","name":"guidance","prose":"Checking the valid syntax and semantics of information system inputs (e.g., character set, length, numerical range, and acceptable values) verifies that inputs match specified definitions for format and content. Software applications typically follow well-defined protocols that use structured messages (i.e., commands or queries) to communicate between software modules or system components. Structured messages can contain raw or unstructured data interspersed with metadata or control information. If software applications use attacker-supplied inputs to construct structured messages without properly encoding such messages, then the attacker could insert malicious commands or special characters that can cause the data to be interpreted as control information or metadata. Consequently, the module or component that receives the tainted output will perform the wrong operations or otherwise interpret the data incorrectly. Prescreening inputs prior to passing to interpreters prevents the content from being unintentionally interpreted as commands. Input validation helps to ensure accurate and correct inputs and prevent attacks such as cross-site scripting and a variety of injection attacks."},{"id":"si-10_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-10_obj.1","name":"objective","props":[{"name":"label","value":"SI-10[1]"}],"prose":"the organization defines information inputs requiring validity checks; and"},{"id":"si-10_obj.2","name":"objective","props":[{"name":"label","value":"SI-10[2]"}],"prose":"the information system checks the validity of organization-defined information inputs."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\naccess control policy and procedures\n\nseparation of duties policy and procedures\n\nprocedures addressing information input validation\n\ndocumentation for automated tools and applications to verify validity of information\n\nlist of information inputs requiring validity checks\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for information input validation\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing validity checks on information inputs"}]}]},{"id":"si-11","class":"SP800-53","title":"Error Handling","params":[{"id":"si-11_prm_1","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"SI-11"},{"name":"sort-id","value":"si-11"}],"parts":[{"id":"si-11_smt","name":"statement","prose":"The information system:","parts":[{"id":"si-11_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Generates error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries; and"},{"id":"si-11_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reveals error messages only to {{ insert: param, si-11_prm_1 }}."}]},{"id":"si-11_gdn","name":"guidance","prose":"Organizations carefully consider the structure\/content of error messages. The extent to which information systems are able to identify and handle error conditions is guided by organizational policy and operational requirements. Information that could be exploited by adversaries includes, for example, erroneous logon attempts with passwords entered by mistake as the username, mission\/business information that can be derived from (if not stated explicitly by) information recorded, and personal information such as account numbers, social security numbers, and credit card numbers. In addition, error messages may provide a covert channel for transmitting information.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#sc-31","rel":"related"}]},{"id":"si-11_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-11.a_obj","name":"objective","props":[{"name":"label","value":"SI-11(a)"}],"prose":"the information system generates error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries;"},{"id":"si-11.b_obj","name":"objective","props":[{"name":"label","value":"SI-11(b)"}],"parts":[{"id":"si-11.b_obj.1","name":"objective","props":[{"name":"label","value":"SI-11(b)[1]"}],"prose":"the organization defines personnel or roles to whom error messages are to be revealed; and"},{"id":"si-11.b_obj.2","name":"objective","props":[{"name":"label","value":"SI-11(b)[2]"}],"prose":"the information system reveals error messages only to organization-defined personnel or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing information system error handling\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ndocumentation providing structure\/content of error messages\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for information input validation\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for error handling\n\nautomated mechanisms supporting and\/or implementing error handling\n\nautomated mechanisms supporting and\/or implementing management of error messages"}]}]},{"id":"si-12","class":"SP800-53","title":"Information Handling and Retention","props":[{"name":"priority","value":"P2"},{"name":"label","value":"SI-12"},{"name":"sort-id","value":"si-12"}],"parts":[{"id":"si-12_smt","name":"statement","prose":"The organization handles and retains information within the information system and information output from the system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements."},{"id":"si-12_gdn","name":"guidance","prose":"Information handling and retention requirements cover the full life cycle of information, in some cases extending beyond the disposal of information systems. The National Archives and Records Administration provides guidance on records retention.","links":[{"href":"#ac-16","rel":"related"},{"href":"#au-5","rel":"related"},{"href":"#au-11","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"}]},{"id":"si-12_obj","name":"objective","prose":"Determine if the organization, in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements:","parts":[{"id":"si-12_obj.1","name":"objective","props":[{"name":"label","value":"SI-12[1]"}],"prose":"handles information within the information system;"},{"id":"si-12_obj.2","name":"objective","props":[{"name":"label","value":"SI-12[2]"}],"prose":"handles output from the information system;"},{"id":"si-12_obj.3","name":"objective","props":[{"name":"label","value":"SI-12[3]"}],"prose":"retains information within the information system; and"},{"id":"si-12_obj.4","name":"objective","props":[{"name":"label","value":"SI-12[4]"}],"prose":"retains output from the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nfederal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements applicable to information handling and retention\n\nmedia protection policy and procedures\n\nprocedures addressing information system output handling and retention\n\ninformation retention records, other relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for information handling and retention\n\norganizational personnel with information security responsibilities\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for information handling and retention\n\nautomated mechanisms supporting and\/or implementing information handling and retention"}]}]},{"id":"si-16","class":"SP800-53","title":"Memory Protection","params":[{"id":"si-16_prm_1","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-16"},{"name":"sort-id","value":"si-16"}],"parts":[{"id":"si-16_smt","name":"statement","prose":"The information system implements {{ insert: param, si-16_prm_1 }} to protect its memory from unauthorized code execution."},{"id":"si-16_gdn","name":"guidance","prose":"Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory include, for example, data execution prevention and address space layout randomization. Data execution prevention safeguards can either be hardware-enforced or software-enforced with hardware providing the greater strength of mechanism.","links":[{"href":"#ac-25","rel":"related"},{"href":"#sc-3","rel":"related"}]},{"id":"si-16_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-16_obj.1","name":"objective","props":[{"name":"label","value":"SI-16[1]"}],"prose":"the organization defines security safeguards to be implemented to protect information system memory from unauthorized code execution; and"},{"id":"si-16_obj.2","name":"objective","props":[{"name":"label","value":"SI-16[2]"}],"prose":"the information system implements organization-defined security safeguards to protect its memory from unauthorized code execution."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing memory protection for the information system\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of security safeguards protecting information system memory from unauthorized code execution\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for memory protection\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing safeguards to protect information system memory from unauthorized code execution"}]}]}]}],"back-matter":{"resources":[{"uuid":"0c97e60b-325a-4efa-ba2b-90f20ccd5abc","title":"5 C.F.R. 731.106","citation":{"text":"Code of Federal Regulations, Title 5, Administrative Personnel, Section 731.106, Designation of Public Trust Positions and Investigative Requirements (5 C.F.R. 731.106)."},"rlinks":[{"href":"http:\/\/www.gpo.gov\/fdsys\/granule\/CFR-2012-title5-vol2\/CFR-2012-title5-vol2-sec731-106\/content-detail.html"}]},{"uuid":"bb61234b-46c3-4211-8c2b-9869222a720d","title":"C.F.R. Part 5 Subpart C (5 C.F.R. 930.301)","citation":{"text":"C.F.R. Part 5 Subpart C (5 C.F.R. 930.301)"},"rlinks":[{"href":"http:\/\/www.gpo.gov\/fdsys\/granule\/CFR-2009-title5-vol2\/CFR-2009-title5-vol2-sec930-301\/content-detail.html"}]},{"uuid":"a4aa9645-9a8a-4b51-90a9-e223250f9a75","title":"CNSS Policy 15","citation":{"text":"CNSS Policy 15"},"rlinks":[{"href":"https:\/\/www.cnss.gov\/policies.html"}]},{"uuid":"2d8b14e9-c8b5-4d3d-8bdc-155078f3281b","title":"DoD Information Assurance Vulnerability Alerts","citation":{"text":"DoD Information Assurance Vulnerability Alerts"}},{"uuid":"61081e7f-041d-4033-96a7-44a439071683","title":"DoD Instruction 5200.39","citation":{"text":"DoD Instruction 5200.39"},"rlinks":[{"href":"http:\/\/www.dtic.mil\/whs\/directives\/corres\/ins1.html"}]},{"uuid":"e42b2099-3e1c-415b-952c-61c96533c12e","title":"DoD Instruction 8551.01","citation":{"text":"DoD Instruction 8551.01"},"rlinks":[{"href":"http:\/\/www.dtic.mil\/whs\/directives\/corres\/ins1.html"}]},{"uuid":"e6522953-6714-435d-a0d3-140df554c186","title":"DoD Instruction 8552.01","citation":{"text":"DoD Instruction 8552.01"},"rlinks":[{"href":"http:\/\/www.dtic.mil\/whs\/directives\/corres\/ins1.html"}]},{"uuid":"c5034e0c-eba6-4ecd-a541-79f0678f4ba4","title":"Executive Order 13587","citation":{"text":"Executive Order 13587"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/the-press-office\/2011\/10\/07\/executive-order-13587-structural-reforms-improve-security-classified-net"}]},{"uuid":"56d671da-6b7b-4abf-8296-84b61980390a","title":"Federal Acquisition Regulation","citation":{"text":"Federal Acquisition Regulation"},"rlinks":[{"href":"https:\/\/acquisition.gov\/far"}]},{"uuid":"023104bc-6f75-4cd5-b7d0-fc92326f8007","title":"Federal Continuity Directive 1","citation":{"text":"Federal Continuity Directive 1"},"rlinks":[{"href":"http:\/\/www.fema.gov\/pdf\/about\/offices\/fcd1.pdf"}]},{"uuid":"ba557c91-ba3e-4792-adc6-a4ae479b39ff","title":"FICAM Roadmap and Implementation Guidance","citation":{"text":"FICAM Roadmap and Implementation Guidance"},"rlinks":[{"href":"http:\/\/www.idmanagement.gov\/documents\/ficam-roadmap-and-implementation-guidance"}]},{"uuid":"39f9087d-7687-46d2-8eda-b6f4b7a4d8a9","title":"FIPS Publication 140","citation":{"text":"FIPS Publication 140"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html"}]},{"uuid":"d715b234-9b5b-4e07-b1ed-99836727664d","title":"FIPS Publication 140-2","citation":{"text":"FIPS Publication 140-2"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#140-2"}]},{"uuid":"f2dbd4ec-c413-4714-b85b-6b7184d1c195","title":"FIPS Publication 197","citation":{"text":"FIPS Publication 197"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#197"}]},{"uuid":"e85cdb3f-7f0a-4083-8639-f13f70d3760b","title":"FIPS Publication 199","citation":{"text":"FIPS Publication 199"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#199"}]},{"uuid":"c80c10b3-1294-4984-a4cc-d1733ca432b9","title":"FIPS Publication 201","citation":{"text":"FIPS Publication 201"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#201"}]},{"uuid":"ad733a42-a7ed-4774-b988-4930c28852f3","title":"HSPD-12","citation":{"text":"HSPD-12"},"rlinks":[{"href":"http:\/\/www.dhs.gov\/homeland-security-presidential-directive-12"}]},{"uuid":"4ef539ba-b767-4666-b0d3-168c53005fa3","title":"http:\/\/capec.mitre.org","citation":{"text":"http:\/\/capec.mitre.org"},"rlinks":[{"href":"http:\/\/capec.mitre.org"}]},{"uuid":"e95dd121-2733-413e-bf1e-f1eb49f20a98","title":"http:\/\/checklists.nist.gov","citation":{"text":"http:\/\/checklists.nist.gov"},"rlinks":[{"href":"http:\/\/checklists.nist.gov"}]},{"uuid":"6a1041fc-054e-4230-946b-2e6f4f3731bb","title":"http:\/\/csrc.nist.gov\/cryptval","citation":{"text":"http:\/\/csrc.nist.gov\/cryptval"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/cryptval"}]},{"uuid":"b09d1a31-d3c9-4138-a4f4-4c63816afd7d","title":"http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/index.html","citation":{"text":"http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/index.html"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/index.html"}]},{"uuid":"0931209f-00ae-4132-b92c-bc645847e8f9","title":"http:\/\/cve.mitre.org","citation":{"text":"http:\/\/cve.mitre.org"},"rlinks":[{"href":"http:\/\/cve.mitre.org"}]},{"uuid":"15522e92-9192-463d-9646-6a01982db8ca","title":"http:\/\/cwe.mitre.org","citation":{"text":"http:\/\/cwe.mitre.org"},"rlinks":[{"href":"http:\/\/cwe.mitre.org"}]},{"uuid":"5ed1f4d5-1494-421b-97ed-39d3c88ab51f","title":"http:\/\/fips201ep.cio.gov","citation":{"text":"http:\/\/fips201ep.cio.gov"},"rlinks":[{"href":"http:\/\/fips201ep.cio.gov"}]},{"uuid":"85280698-0417-489d-b214-12bb935fb939","title":"http:\/\/idmanagement.gov","citation":{"text":"http:\/\/idmanagement.gov"},"rlinks":[{"href":"http:\/\/idmanagement.gov"}]},{"uuid":"275cc052-0f7f-423c-bdb6-ed503dc36228","title":"http:\/\/nvd.nist.gov","citation":{"text":"http:\/\/nvd.nist.gov"},"rlinks":[{"href":"http:\/\/nvd.nist.gov"}]},{"uuid":"bbd50dd1-54ce-4432-959d-63ea564b1bb4","title":"http:\/\/www.acquisition.gov\/far","citation":{"text":"http:\/\/www.acquisition.gov\/far"},"rlinks":[{"href":"http:\/\/www.acquisition.gov\/far"}]},{"uuid":"9b97ed27-3dd6-4f9a-ade5-1b43e9669794","title":"http:\/\/www.cnss.gov","citation":{"text":"http:\/\/www.cnss.gov"},"rlinks":[{"href":"http:\/\/www.cnss.gov"}]},{"uuid":"3ac12e79-f54f-4a63-9f4b-ee4bcd4df604","title":"http:\/\/www.dhs.gov\/telecommunications-service-priority-tsp","citation":{"text":"http:\/\/www.dhs.gov\/telecommunications-service-priority-tsp"},"rlinks":[{"href":"http:\/\/www.dhs.gov\/telecommunications-service-priority-tsp"}]},{"uuid":"c95a9986-3cd6-4a98-931b-ccfc56cb11e5","title":"http:\/\/www.niap-ccevs.org","citation":{"text":"http:\/\/www.niap-ccevs.org"},"rlinks":[{"href":"http:\/\/www.niap-ccevs.org"}]},{"uuid":"647b6de3-81d0-4d22-bec1-5f1333e34380","title":"http:\/\/www.nsa.gov","citation":{"text":"http:\/\/www.nsa.gov"},"rlinks":[{"href":"http:\/\/www.nsa.gov"}]},{"uuid":"a47466c4-c837-4f06-a39f-e68412a5f73d","title":"http:\/\/www.nsa.gov\/ia\/mitigation_guidance\/media_destruction_guidance\/index.shtml","citation":{"text":"http:\/\/www.nsa.gov\/ia\/mitigation_guidance\/media_destruction_guidance\/index.shtml"},"rlinks":[{"href":"http:\/\/www.nsa.gov\/ia\/mitigation_guidance\/media_destruction_guidance\/index.shtml"}]},{"uuid":"02631467-668b-4233-989b-3dfded2fd184","title":"http:\/\/www.us-cert.gov","citation":{"text":"http:\/\/www.us-cert.gov"},"rlinks":[{"href":"http:\/\/www.us-cert.gov"}]},{"uuid":"6caa237b-531b-43ac-9711-d8f6b97b0377","title":"ICD 704","citation":{"text":"ICD 704"},"rlinks":[{"href":"http:\/\/www.dni.gov\/index.php\/intelligence-community\/ic-policies-reports\/intelligence-community-directives"}]},{"uuid":"398e33fd-f404-4e5c-b90e-2d50d3181244","title":"ICD 705","citation":{"text":"ICD 705"},"rlinks":[{"href":"http:\/\/www.dni.gov\/index.php\/intelligence-community\/ic-policies-reports\/intelligence-community-directives"}]},{"uuid":"1737a687-52fb-4008-b900-cbfa836f7b65","title":"ISO\/IEC 15408","citation":{"text":"ISO\/IEC 15408"},"rlinks":[{"href":"http:\/\/www.iso.org\/iso\/iso_catalog\/catalog_tc\/catalog_detail.htm?csnumber=50341"}]},{"uuid":"fb5844de-ff96-47c0-b258-4f52bcc2f30d","title":"National Communications Systems Directive 3-10","citation":{"text":"National Communications Systems Directive 3-10"}},{"uuid":"654f21e2-f3bc-43b2-abdc-60ab8d09744b","title":"National Strategy for Trusted Identities in Cyberspace","citation":{"text":"National Strategy for Trusted Identities in Cyberspace"},"rlinks":[{"href":"http:\/\/www.nist.gov\/nstic"}]},{"uuid":"bdd2f49e-edf7-491f-a178-4487898228f3","title":"NIST Interagency Report 7622","citation":{"text":"NIST Interagency Report 7622"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsNISTIRs.html#NIST-IR-7622"}]},{"uuid":"9cb3d8fe-2127-48ba-821e-cdd2d7aee921","title":"NIST Special Publication 800-100","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-100"}],"citation":{"text":"NIST Special Publication 800-100"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-100"}]},{"uuid":"3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","title":"NIST Special Publication 800-111","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-111"}],"citation":{"text":"NIST Special Publication 800-111"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-111"}]},{"uuid":"349fe082-502d-464a-aa0c-1443c6a5cf40","title":"NIST Special Publication 800-113","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-113"}],"citation":{"text":"NIST Special Publication 800-113"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-113"}]},{"uuid":"1201fcf3-afb1-4675-915a-fb4ae0435717","title":"NIST Special Publication 800-114 Rev. 1","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-114r1"}],"citation":{"text":"NIST Special Publication 800-114 Rev. 1"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-114r1"}]},{"uuid":"c4691b88-57d1-463b-9053-2d0087913f31","title":"NIST Special Publication 800-115","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-115"}],"citation":{"text":"NIST Special Publication 800-115"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-115"}]},{"uuid":"2157bb7e-192c-4eaa-877f-93ef6b0a3292","title":"NIST Special Publication 800-116 Rev. 1","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-116r1"}],"citation":{"text":"NIST Special Publication 800-116 Rev. 1"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-116r1"}]},{"uuid":"5c201b63-0768-417b-ac22-3f014e3941b2","title":"NIST Special Publication 800-12 Rev. 1","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-12r1"}],"citation":{"text":"NIST Special Publication 800-12 Rev. 1"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-12r1"}]},{"uuid":"d1a4e2a9-e512-4132-8795-5357aba29254","title":"NIST Special Publication 800-121","citation":{"text":"NIST Special Publication 800-121"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-121"}]},{"uuid":"0293a393-fbe8-4ed1-b0b4-f6fbd3ae1589","title":"NIST Special Publication 800-124","citation":{"text":"NIST Special Publication 800-124"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-124"}]},{"uuid":"080f8068-5e3e-435e-9790-d22ba4722693","title":"NIST Special Publication 800-128","citation":{"text":"NIST Special Publication 800-128"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-128"}]},{"uuid":"cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","title":"NIST Special Publication 800-137","citation":{"text":"NIST Special Publication 800-137"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-137"}]},{"uuid":"6bf8d24a-78dc-4727-a2ac-0e64d71c495c","title":"NIST Special Publication 800-147","citation":{"text":"NIST Special Publication 800-147"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-147"}]},{"uuid":"3878cc04-144a-483e-af62-8fe6f4ad6c7a","title":"NIST Special Publication 800-155","citation":{"text":"NIST Special Publication 800-155"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-155"}]},{"uuid":"825438c3-248d-4e30-a51e-246473ce6ada","title":"NIST Special Publication 800-16","citation":{"text":"NIST Special Publication 800-16"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-16"}]},{"uuid":"8ab6bcdc-339b-4068-b45e-994814a6e187","title":"NIST Special Publication 800-161","citation":{"text":"NIST Special Publication 800-161"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-161"}]},{"uuid":"6513e480-fada-4876-abba-1397084dfb26","title":"NIST Special Publication 800-164","citation":{"text":"NIST Special Publication 800-164"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-164"}]},{"uuid":"9c5c9e8c-dc81-4f55-a11c-d71d7487790f","title":"NIST Special Publication 800-18","citation":{"text":"NIST Special Publication 800-18"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-18"}]},{"uuid":"0a5db899-f033-467f-8631-f5a8ba971475","title":"NIST Special Publication 800-23","citation":{"text":"NIST Special Publication 800-23"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-23"}]},{"uuid":"21b1ed35-56d2-40a8-bdfe-b461fffe322f","title":"NIST Special Publication 800-27","citation":{"text":"NIST Special Publication 800-27"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-27"}]},{"uuid":"e716cd51-d1d5-4c6a-967a-22e9fbbc42f1","title":"NIST Special Publication 800-28","citation":{"text":"NIST Special Publication 800-28"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-28"}]},{"uuid":"a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","title":"NIST Special Publication 800-30","citation":{"text":"NIST Special Publication 800-30"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-30"}]},{"uuid":"8f174e91-844e-4cf1-a72a-45c119a3a8dd","title":"NIST Special Publication 800-32","citation":{"text":"NIST Special Publication 800-32"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-32"}]},{"uuid":"748a81b9-9cad-463f-abde-8b368167e70d","title":"NIST Special Publication 800-34","citation":{"text":"NIST Special Publication 800-34"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-34"}]},{"uuid":"0c775bc3-bfc3-42c7-a382-88949f503171","title":"NIST Special Publication 800-35","citation":{"text":"NIST Special Publication 800-35"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-35"}]},{"uuid":"d818efd3-db31-4953-8afa-9e76afe83ce2","title":"NIST Special Publication 800-36","citation":{"text":"NIST Special Publication 800-36"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-36"}]},{"uuid":"0a0c26b6-fd44-4274-8b36-93442d49d998","title":"NIST Special Publication 800-37","citation":{"text":"NIST Special Publication 800-37"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-37"}]},{"uuid":"d480aa6a-7a88-424e-a10c-ad1c7870354b","title":"NIST Special Publication 800-39","citation":{"text":"NIST Special Publication 800-39"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-39"}]},{"uuid":"bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","title":"NIST Special Publication 800-40","citation":{"text":"NIST Special Publication 800-40"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-40"}]},{"uuid":"756a8e86-57d5-4701-8382-f7a40439665a","title":"NIST Special Publication 800-41","citation":{"text":"NIST Special Publication 800-41"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-41"}]},{"uuid":"c6e95ca0-5828-420e-b095-00895b72b5e8","title":"NIST Special Publication 800-45","citation":{"text":"NIST Special Publication 800-45"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-45"}]},{"uuid":"5309d4d0-46f8-4213-a749-e7584164e5e8","title":"NIST Special Publication 800-46","citation":{"text":"NIST Special Publication 800-46"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-46"}]},{"uuid":"2711f068-734e-4afd-94ba-0b22247fbc88","title":"NIST Special Publication 800-47","citation":{"text":"NIST Special Publication 800-47"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-47"}]},{"uuid":"238ed479-eccb-49f6-82ec-ab74a7a428cf","title":"NIST Special Publication 800-48","citation":{"text":"NIST Special Publication 800-48"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-48"}]},{"uuid":"e12b5738-de74-4fb3-8317-a3995a8a1898","title":"NIST Special Publication 800-50","citation":{"text":"NIST Special Publication 800-50"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-50"}]},{"uuid":"90c5bc98-f9c4-44c9-98b7-787422f0999c","title":"NIST Special Publication 800-52","citation":{"text":"NIST Special Publication 800-52"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-52"}]},{"uuid":"cd4cf751-3312-4a55-b1a9-fad2f1db9119","title":"NIST Special Publication 800-53A","citation":{"text":"NIST Special Publication 800-53A"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-53A"}]},{"uuid":"81f09e01-d0b0-4ae2-aa6a-064ed9950070","title":"NIST Special Publication 800-56","citation":{"text":"NIST Special Publication 800-56"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-56"}]},{"uuid":"a6c774c0-bf50-4590-9841-2a5c1c91ac6f","title":"NIST Special Publication 800-57","citation":{"text":"NIST Special Publication 800-57"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-57"}]},{"uuid":"7783f3e7-09b3-478b-9aa2-4a76dfd0ea90","title":"NIST Special Publication 800-58","citation":{"text":"NIST Special Publication 800-58"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-58"}]},{"uuid":"f152844f-b1ef-4836-8729-6277078ebee1","title":"NIST Special Publication 800-60","citation":{"text":"NIST Special Publication 800-60"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-60"}]},{"uuid":"be95fb85-a53f-4624-bdbb-140075500aa3","title":"NIST Special Publication 800-61","citation":{"text":"NIST Special Publication 800-61"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-61"}]},{"uuid":"644f44a9-a2de-4494-9c04-cd37fba45471","title":"NIST Special Publication 800-63","citation":{"text":"NIST Special Publication 800-63"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-63"}]},{"uuid":"abd950ae-092f-4b7a-b374-1c7c67fe9350","title":"NIST Special Publication 800-64","citation":{"text":"NIST Special Publication 800-64"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-64"}]},{"uuid":"29fcfe59-33cd-494a-8756-5907ae3a8f92","title":"NIST Special Publication 800-65","citation":{"text":"NIST Special Publication 800-65"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-65"}]},{"uuid":"84a37532-6db6-477b-9ea8-f9085ebca0fc","title":"NIST Special Publication 800-70","citation":{"text":"NIST Special Publication 800-70"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-70"}]},{"uuid":"ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","title":"NIST Special Publication 800-73","citation":{"text":"NIST Special Publication 800-73"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-73"}]},{"uuid":"2a71298a-ee90-490e-80ff-48c967173a47","title":"NIST Special Publication 800-76","citation":{"text":"NIST Special Publication 800-76"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-76"}]},{"uuid":"99f331f2-a9f0-46c2-9856-a3cbb9b89442","title":"NIST Special Publication 800-77","citation":{"text":"NIST Special Publication 800-77"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-77"}]},{"uuid":"2042d97b-f7f6-4c74-84f8-981867684659","title":"NIST Special Publication 800-78","citation":{"text":"NIST Special Publication 800-78"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-78"}]},{"uuid":"6af1e841-672c-46c4-b121-96f603d04be3","title":"NIST Special Publication 800-81","citation":{"text":"NIST Special Publication 800-81"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-81"}]},{"uuid":"6d431fee-658f-4a0e-9f2e-a38b5d398fab","title":"NIST Special Publication 800-83","citation":{"text":"NIST Special Publication 800-83"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-83"}]},{"uuid":"0243a05a-e8a3-4d51-9364-4a9d20b0dcdf","title":"NIST Special Publication 800-84","citation":{"text":"NIST Special Publication 800-84"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-84"}]},{"uuid":"263823e0-a971-4b00-959d-315b26278b22","title":"NIST Special Publication 800-88","citation":{"text":"NIST Special Publication 800-88"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-88"}]},{"uuid":"672fd561-b92b-4713-b9cf-6c9d9456728b","title":"NIST Special Publication 800-92","citation":{"text":"NIST Special Publication 800-92"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-92"}]},{"uuid":"d1b1d689-0f66-4474-9924-c81119758dc1","title":"NIST Special Publication 800-94","citation":{"text":"NIST Special Publication 800-94"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-94"}]},{"uuid":"1ebdf782-d95d-4a7b-8ec7-ee860951eced","title":"NIST Special Publication 800-95","citation":{"text":"NIST Special Publication 800-95"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-95"}]},{"uuid":"6f336ecd-f2a0-4c84-9699-0491d81b6e0d","title":"NIST Special Publication 800-97","citation":{"text":"NIST Special Publication 800-97"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-97"}]},{"uuid":"06dff0ea-3848-4945-8d91-e955ee69f05d","title":"NSTISSI No. 7003","citation":{"text":"NSTISSI No. 7003"},"rlinks":[{"href":"http:\/\/www.cnss.gov\/Assets\/pdf\/nstissi_7003.pdf"}]},{"uuid":"9f77f845-e3ea-4ca4-b2c0-aa9eedc214ab","title":"OMB Circular A-130","citation":{"text":"OMB Circular A-130"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/omb\/circulars_a130_a130trans4"}]},{"uuid":"2c5884cd-7b96-425c-862a-99877e1cf909","title":"OMB Memorandum 02-01","citation":{"text":"OMB Memorandum 02-01"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/omb\/memoranda_m02-01"}]},{"uuid":"ff3bfb02-79b2-411f-8735-98dfe5af2ab0","title":"OMB Memorandum 04-04","citation":{"text":"OMB Memorandum 04-04"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy04\/m04-04.pdf"}]},{"uuid":"58ad6f27-af99-429f-86a8-8bb767b014b9","title":"OMB Memorandum 05-24","citation":{"text":"OMB Memorandum 05-24"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2005\/m05-24.pdf"}]},{"uuid":"4da24a96-6cf8-435d-9d1f-c73247cad109","title":"OMB Memorandum 06-16","citation":{"text":"OMB Memorandum 06-16"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2006\/m06-16.pdf"}]},{"uuid":"990268bf-f4a9-4c81-91ae-dc7d3115f4b1","title":"OMB Memorandum 07-11","citation":{"text":"OMB Memorandum 07-11"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2007\/m07-11.pdf"}]},{"uuid":"0b3d8ba9-051f-498d-81ea-97f0f018c612","title":"OMB Memorandum 07-18","citation":{"text":"OMB Memorandum 07-18"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2007\/m07-18.pdf"}]},{"uuid":"0916ef02-3618-411b-a525-565c088849a6","title":"OMB Memorandum 08-22","citation":{"text":"OMB Memorandum 08-22"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2008\/m08-22.pdf"}]},{"uuid":"28115a56-da6b-4d44-b1df-51dd7f048a3e","title":"OMB Memorandum 08-23","citation":{"text":"OMB Memorandum 08-23"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2008\/m08-23.pdf"}]},{"uuid":"599fe9ba-4750-4450-9eeb-b95bd19a5e8f","title":"OMB Memorandum 10-06-2011","citation":{"text":"OMB Memorandum 10-06-2011"}},{"uuid":"74e740a4-c45d-49f3-a86e-eb747c549e01","title":"OMB Memorandum 11-11","citation":{"text":"OMB Memorandum 11-11"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/memoranda\/2011\/m11-11.pdf"}]},{"uuid":"bedb15b7-ec5c-4a68-807f-385125751fcd","title":"OMB Memorandum 11-33","citation":{"text":"OMB Memorandum 11-33"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/memoranda\/2011\/m11-33.pdf"}]},{"uuid":"dd2f5acd-08f1-435a-9837-f8203088dc1a","title":"Personal Identity Verification (PIV) in Enterprise Physical Access Control System (E-PACS)","citation":{"text":"Personal Identity Verification (PIV) in Enterprise Physical Access Control System (E-PACS)"}},{"uuid":"8ade2fbe-e468-4ca8-9a40-54d7f23c32bb","title":"US-CERT Technical Cyber Security Alerts","citation":{"text":"US-CERT Technical Cyber Security Alerts"},"rlinks":[{"href":"http:\/\/www.us-cert.gov\/ncas\/alerts"}]}]}}} \ No newline at end of file +{"catalog":{"uuid":"d3d0fe20-8c66-4ead-a7bf-10455eada4ac","metadata":{"title":"NIST Special Publication 800-53 Revision 4 HIGH IMPACT BASELINE","last-modified":"2023-12-05T21:54:41.390821Z","version":"2015-01-22","oscal-version":"1.1.1","props":[{"name":"resolution-tool","value":"OSCAL Profile Resolver XSLT Pipeline OPRXP"}],"links":[{"href":"NIST_SP-800-53_rev4_HIGH-baseline_profile.xml","rel":"source-profile"}],"roles":[{"id":"creator","title":"Document Creator"},{"id":"contact","title":"Contact"}],"parties":[{"uuid":"71c97c27-4f09-4d06-a6a4-065a54c19a1f","type":"organization","name":"Joint Task Force, Transformation Initiative","email-addresses":["sec-cert@nist.gov"],"addresses":[{"addr-lines":["National Institute of Standards and Technology","Attn: Computer Security Division","Information Technology Laboratory","100 Bureau Drive (Mail Stop 8930)"],"city":"Gaithersburg","state":"MD","postal-code":"20899-8930"}]}],"responsible-parties":[{"role-id":"creator","party-uuids":["31a5dd8f-978a-4558-8ade-846211607d40"]},{"role-id":"contact","party-uuids":["31a5dd8f-978a-4558-8ade-846211607d40"]}]},"groups":[{"id":"ac","class":"family","title":"Access Control","controls":[{"id":"ac-1","class":"SP800-53","title":"Access Control Policy and Procedures","params":[{"id":"ac-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ac-1_prm_2","label":"organization-defined frequency"},{"id":"ac-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-1"},{"name":"sort-id","value":"ac-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ac-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ac-1_prm_1 }}:","parts":[{"id":"ac-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ac-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the access control policy and associated access controls; and"}]},{"id":"ac-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ac-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Access control policy {{ insert: param, ac-1_prm_2 }}; and"},{"id":"ac-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Access control procedures {{ insert: param, ac-1_prm_3 }}."}]}]},{"id":"ac-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the AC family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ac-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-1.a_obj","name":"objective","props":[{"name":"label","value":"AC-1(a)"}],"parts":[{"id":"ac-1.a.1_obj","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)"}],"parts":[{"id":"ac-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1]"}],"prose":"develops and documents an access control policy that addresses:","parts":[{"id":"ac-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ac-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ac-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ac-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ac-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ac-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ac-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ac-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the access control policy are to be disseminated;"},{"id":"ac-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[3]"}],"prose":"disseminates the access control policy to organization-defined personnel or roles;"}]},{"id":"ac-1.a.2_obj","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)"}],"parts":[{"id":"ac-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the access control policy and associated access control controls;"},{"id":"ac-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ac-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ac-1.b_obj","name":"objective","props":[{"name":"label","value":"AC-1(b)"}],"parts":[{"id":"ac-1.b.1_obj","name":"objective","props":[{"name":"label","value":"AC-1(b)(1)"}],"parts":[{"id":"ac-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current access control policy;"},{"id":"ac-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(b)(1)[2]"}],"prose":"reviews and updates the current access control policy with the organization-defined frequency;"}]},{"id":"ac-1.b.2_obj","name":"objective","props":[{"name":"label","value":"AC-1(b)(2)"}],"parts":[{"id":"ac-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current access control procedures; and"},{"id":"ac-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(b)(2)[2]"}],"prose":"reviews and updates the current access control procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access control responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ac-2","class":"SP800-53","title":"Account Management","params":[{"id":"ac-2_prm_1","label":"organization-defined information system account types"},{"id":"ac-2_prm_2","label":"organization-defined personnel or roles"},{"id":"ac-2_prm_3","label":"organization-defined procedures or conditions"},{"id":"ac-2_prm_4","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-2"},{"name":"sort-id","value":"ac-02"}],"parts":[{"id":"ac-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Identifies and selects the following types of information system accounts to support organizational missions\/business functions: {{ insert: param, ac-2_prm_1 }};"},{"id":"ac-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Assigns account managers for information system accounts;"},{"id":"ac-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Establishes conditions for group and role membership;"},{"id":"ac-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Specifies authorized users of the information system, group and role membership, and access authorizations (i.e., privileges) and other attributes (as required) for each account;"},{"id":"ac-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Requires approvals by {{ insert: param, ac-2_prm_2 }} for requests to create information system accounts;"},{"id":"ac-2_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Creates, enables, modifies, disables, and removes information system accounts in accordance with {{ insert: param, ac-2_prm_3 }};"},{"id":"ac-2_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Monitors the use of information system accounts;"},{"id":"ac-2_smt.h","name":"item","props":[{"name":"label","value":"h."}],"prose":"Notifies account managers:","parts":[{"id":"ac-2_smt.h.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"When accounts are no longer required;"},{"id":"ac-2_smt.h.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"When users are terminated or transferred; and"},{"id":"ac-2_smt.h.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"When individual information system usage or need-to-know changes;"}]},{"id":"ac-2_smt.i","name":"item","props":[{"name":"label","value":"i."}],"prose":"Authorizes access to the information system based on:","parts":[{"id":"ac-2_smt.i.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A valid access authorization;"},{"id":"ac-2_smt.i.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Intended system usage; and"},{"id":"ac-2_smt.i.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Other attributes as required by the organization or associated missions\/business functions;"}]},{"id":"ac-2_smt.j","name":"item","props":[{"name":"label","value":"j."}],"prose":"Reviews accounts for compliance with account management requirements {{ insert: param, ac-2_prm_4 }}; and"},{"id":"ac-2_smt.k","name":"item","props":[{"name":"label","value":"k."}],"prose":"Establishes a process for reissuing shared\/group account credentials (if deployed) when individuals are removed from the group."}]},{"id":"ac-2_gdn","name":"guidance","prose":"Information system account types include, for example, individual, shared, group, system, guest\/anonymous, emergency, developer\/manufacturer\/vendor, temporary, and service. Some of the account management requirements listed above can be implemented by organizational information systems. The identification of authorized users of the information system and the specification of access privileges reflects the requirements in other security controls in the security plan. Users requiring administrative privileges on information system accounts receive additional scrutiny by appropriate organizational personnel (e.g., system owner, mission\/business owner, or chief information security officer) responsible for approving such accounts and privileged access. Organizations may choose to define access privileges or other attributes by account, by type of account, or a combination of both. Other attributes required for authorizing access include, for example, restrictions on time-of-day, day-of-week, and point-of-origin. In defining other account attributes, organizations consider system-related requirements (e.g., scheduled maintenance, system upgrades) and mission\/business requirements, (e.g., time zone differences, customer requirements, remote access to support travel requirements). Failure to consider these factors could affect information system availability. Temporary and emergency accounts are accounts intended for short-term use. Organizations establish temporary accounts as a part of normal account activation procedures when there is a need for short-term accounts without the demand for immediacy in account activation. Organizations establish emergency accounts in response to crisis situations and with the need for rapid account activation. Therefore, emergency account activation may bypass normal account authorization processes. Emergency and temporary accounts are not to be confused with infrequently used accounts (e.g., local logon accounts used for special tasks defined by organizations or when network resources are unavailable). Such accounts remain available and are not subject to automatic disabling or removal dates. Conditions for disabling or deactivating accounts include, for example: (i) when shared\/group, emergency, or temporary accounts are no longer required; or (ii) when individuals are transferred or terminated. Some types of information system accounts may require specialized training.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-5","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-10","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ma-3","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"ac-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-2.a_obj","name":"objective","props":[{"name":"label","value":"AC-2(a)"}],"parts":[{"id":"ac-2.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(a)[1]"}],"prose":"defines information system account types to be identified and selected to support organizational missions\/business functions;"},{"id":"ac-2.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(a)[2]"}],"prose":"identifies and selects organization-defined information system account types to support organizational missions\/business functions;"}]},{"id":"ac-2.b_obj","name":"objective","props":[{"name":"label","value":"AC-2(b)"}],"prose":"assigns account managers for information system accounts;"},{"id":"ac-2.c_obj","name":"objective","props":[{"name":"label","value":"AC-2(c)"}],"prose":"establishes conditions for group and role membership;"},{"id":"ac-2.d_obj","name":"objective","props":[{"name":"label","value":"AC-2(d)"}],"prose":"specifies for each account (as required):","parts":[{"id":"ac-2.d_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(d)[1]"}],"prose":"authorized users of the information system;"},{"id":"ac-2.d_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(d)[2]"}],"prose":"group and role membership;"},{"id":"ac-2.d_obj.3","name":"objective","props":[{"name":"label","value":"AC-2(d)[3]"}],"prose":"access authorizations (i.e., privileges);"},{"id":"ac-2.d_obj.4","name":"objective","props":[{"name":"label","value":"AC-2(d)[4]"}],"prose":"other attributes;"}]},{"id":"ac-2.e_obj","name":"objective","props":[{"name":"label","value":"AC-2(e)"}],"parts":[{"id":"ac-2.e_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(e)[1]"}],"prose":"defines personnel or roles required to approve requests to create information system accounts;"},{"id":"ac-2.e_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(e)[2]"}],"prose":"requires approvals by organization-defined personnel or roles for requests to create information system accounts;"}]},{"id":"ac-2.f_obj","name":"objective","props":[{"name":"label","value":"AC-2(f)"}],"parts":[{"id":"ac-2.f_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(f)[1]"}],"prose":"defines procedures or conditions to:","parts":[{"id":"ac-2.f_obj.1.a","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][a]"}],"prose":"create information system accounts;"},{"id":"ac-2.f_obj.1.b","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][b]"}],"prose":"enable information system accounts;"},{"id":"ac-2.f_obj.1.c","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][c]"}],"prose":"modify information system accounts;"},{"id":"ac-2.f_obj.1.d","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][d]"}],"prose":"disable information system accounts;"},{"id":"ac-2.f_obj.1.e","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][e]"}],"prose":"remove information system accounts;"}]},{"id":"ac-2.f_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(f)[2]"}],"prose":"in accordance with organization-defined procedures or conditions:","parts":[{"id":"ac-2.f_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][a]"}],"prose":"creates information system accounts;"},{"id":"ac-2.f_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][b]"}],"prose":"enables information system accounts;"},{"id":"ac-2.f_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][c]"}],"prose":"modifies information system accounts;"},{"id":"ac-2.f_obj.2.d","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][d]"}],"prose":"disables information system accounts;"},{"id":"ac-2.f_obj.2.e","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][e]"}],"prose":"removes information system accounts;"}]}]},{"id":"ac-2.g_obj","name":"objective","props":[{"name":"label","value":"AC-2(g)"}],"prose":"monitors the use of information system accounts;"},{"id":"ac-2.h_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)"}],"prose":"notifies account managers:","parts":[{"id":"ac-2.h.1_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)(1)"}],"prose":"when accounts are no longer required;"},{"id":"ac-2.h.2_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)(2)"}],"prose":"when users are terminated or transferred;"},{"id":"ac-2.h.3_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)(3)"}],"prose":"when individual information system usage or need to know changes;"}]},{"id":"ac-2.i_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)"}],"prose":"authorizes access to the information system based on;","parts":[{"id":"ac-2.i.1_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)(1)"}],"prose":"a valid access authorization;"},{"id":"ac-2.i.2_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)(2)"}],"prose":"intended system usage;"},{"id":"ac-2.i.3_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)(3)"}],"prose":"other attributes as required by the organization or associated missions\/business functions;"}]},{"id":"ac-2.j_obj","name":"objective","props":[{"name":"label","value":"AC-2(j)"}],"parts":[{"id":"ac-2.j_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(j)[1]"}],"prose":"defines the frequency to review accounts for compliance with account management requirements;"},{"id":"ac-2.j_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(j)[2]"}],"prose":"reviews accounts for compliance with account management requirements with the organization-defined frequency; and"}]},{"id":"ac-2.k_obj","name":"objective","props":[{"name":"label","value":"AC-2(k)"}],"prose":"establishes a process for reissuing shared\/group account credentials (if deployed) when individuals are removed from the group."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of active system accounts along with the name of the individual associated with each account\n\nlist of conditions for group and role membership\n\nnotifications or records of recently transferred, separated, or terminated employees\n\nlist of recently disabled information system accounts along with the name of the individual associated with each account\n\naccess authorization records\n\naccount management compliance reviews\n\ninformation system monitoring records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes account management on the information system\n\nautomated mechanisms for implementing account management"}]}],"controls":[{"id":"ac-2.1","class":"SP800-53-enhancement","title":"Automated System Account Management","props":[{"name":"label","value":"AC-2(1)"},{"name":"sort-id","value":"ac-02.01"}],"parts":[{"id":"ac-2.1_smt","name":"statement","prose":"The organization employs automated mechanisms to support the management of information system accounts."},{"id":"ac-2.1_gdn","name":"guidance","prose":"The use of automated mechanisms can include, for example: using email or text messaging to automatically notify account managers when users are terminated or transferred; using the information system to monitor account usage; and using telephonic notification to report atypical system account usage."},{"id":"ac-2.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to support the management of information system accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]},{"id":"ac-2.2","class":"SP800-53-enhancement","title":"Removal of Temporary \/ Emergency Accounts","params":[{"id":"ac-2.2_prm_1","select":{"choice":["removes","disables"]}},{"id":"ac-2.2_prm_2","label":"organization-defined time period for each type of account"}],"props":[{"name":"label","value":"AC-2(2)"},{"name":"sort-id","value":"ac-02.02"}],"parts":[{"id":"ac-2.2_smt","name":"statement","prose":"The information system automatically {{ insert: param, ac-2.2_prm_1 }} temporary and emergency accounts after {{ insert: param, ac-2.2_prm_2 }}."},{"id":"ac-2.2_gdn","name":"guidance","prose":"This control enhancement requires the removal of both temporary and emergency accounts automatically after a predefined period of time has elapsed, rather than at the convenience of the systems administrator."},{"id":"ac-2.2_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-2.2_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(2)[1]"}],"prose":"the organization defines the time period after which the information system automatically removes or disables temporary and emergency accounts; and"},{"id":"ac-2.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(2)[2]"}],"prose":"the information system automatically removes or disables temporary and emergency accounts after the organization-defined time period for each type of account."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system-generated list of temporary accounts removed and\/or disabled\n\ninformation system-generated list of emergency accounts removed and\/or disabled\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]},{"id":"ac-2.3","class":"SP800-53-enhancement","title":"Disable Inactive Accounts","params":[{"id":"ac-2.3_prm_1","label":"organization-defined time period"}],"props":[{"name":"label","value":"AC-2(3)"},{"name":"sort-id","value":"ac-02.03"}],"parts":[{"id":"ac-2.3_smt","name":"statement","prose":"The information system automatically disables inactive accounts after {{ insert: param, ac-2.3_prm_1 }}."},{"id":"ac-2.3_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-2.3_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(3)[1]"}],"prose":"the organization defines the time period after which the information system automatically disables inactive accounts; and"},{"id":"ac-2.3_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(3)[2]"}],"prose":"the information system automatically disables inactive accounts after the organization-defined time period."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system-generated list of temporary accounts removed and\/or disabled\n\ninformation system-generated list of emergency accounts removed and\/or disabled\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]},{"id":"ac-2.4","class":"SP800-53-enhancement","title":"Automated Audit Actions","params":[{"id":"ac-2.4_prm_1","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"AC-2(4)"},{"name":"sort-id","value":"ac-02.04"}],"parts":[{"id":"ac-2.4_smt","name":"statement","prose":"The information system automatically audits account creation, modification, enabling, disabling, and removal actions, and notifies {{ insert: param, ac-2.4_prm_1 }}."},{"id":"ac-2.4_gdn","name":"guidance","links":[{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"}]},{"id":"ac-2.4_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-2.4_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(4)[1]"}],"prose":"the information system automatically audits the following account actions:","parts":[{"id":"ac-2.4_obj.1.a","name":"objective","props":[{"name":"label","value":"AC-2(4)[1][a]"}],"prose":"creation;"},{"id":"ac-2.4_obj.1.b","name":"objective","props":[{"name":"label","value":"AC-2(4)[1][b]"}],"prose":"modification;"},{"id":"ac-2.4_obj.1.c","name":"objective","props":[{"name":"label","value":"AC-2(4)[1][c]"}],"prose":"enabling;"},{"id":"ac-2.4_obj.1.d","name":"objective","props":[{"name":"label","value":"AC-2(4)[1][d]"}],"prose":"disabling;"},{"id":"ac-2.4_obj.1.e","name":"objective","props":[{"name":"label","value":"AC-2(4)[1][e]"}],"prose":"removal;"}]},{"id":"ac-2.4_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(4)[2]"}],"prose":"the organization defines personnel or roles to be notified of the following account actions:","parts":[{"id":"ac-2.4_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-2(4)[2][a]"}],"prose":"creation;"},{"id":"ac-2.4_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-2(4)[2][b]"}],"prose":"modification;"},{"id":"ac-2.4_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-2(4)[2][c]"}],"prose":"enabling;"},{"id":"ac-2.4_obj.2.d","name":"objective","props":[{"name":"label","value":"AC-2(4)[2][d]"}],"prose":"disabling;"},{"id":"ac-2.4_obj.2.e","name":"objective","props":[{"name":"label","value":"AC-2(4)[2][e]"}],"prose":"removal;"}]},{"id":"ac-2.4_obj.3","name":"objective","props":[{"name":"label","value":"AC-2(4)[3]"}],"prose":"the information system notifies organization-defined personnel or roles of the following account actions:","parts":[{"id":"ac-2.4_obj.3.a","name":"objective","props":[{"name":"label","value":"AC-2(4)[3][a]"}],"prose":"creation;"},{"id":"ac-2.4_obj.3.b","name":"objective","props":[{"name":"label","value":"AC-2(4)[3][b]"}],"prose":"modification;"},{"id":"ac-2.4_obj.3.c","name":"objective","props":[{"name":"label","value":"AC-2(4)[3][c]"}],"prose":"enabling;"},{"id":"ac-2.4_obj.3.d","name":"objective","props":[{"name":"label","value":"AC-2(4)[3][d]"}],"prose":"disabling; and"},{"id":"ac-2.4_obj.3.e","name":"objective","props":[{"name":"label","value":"AC-2(4)[3][e]"}],"prose":"removal."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nnotifications\/alerts of account creation, modification, enabling, disabling, and removal actions\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]},{"id":"ac-2.5","class":"SP800-53-enhancement","title":"Inactivity Logout","params":[{"id":"ac-2.5_prm_1","label":"organization-defined time-period of expected inactivity or description of when to log out"}],"props":[{"name":"label","value":"AC-2(5)"},{"name":"sort-id","value":"ac-02.05"}],"parts":[{"id":"ac-2.5_smt","name":"statement","prose":"The organization requires that users log out when {{ insert: param, ac-2.5_prm_1 }}."},{"id":"ac-2.5_gdn","name":"guidance","links":[{"href":"#sc-23","rel":"related"}]},{"id":"ac-2.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-2.5_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(5)[1]"}],"prose":"defines either the time period of expected inactivity that requires users to log out or the description of when users are required to log out; and"},{"id":"ac-2.5_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(5)[2]"}],"prose":"requires that users log out when the organization-defined time period of inactivity is reached or in accordance with organization-defined description of when to log out."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity violation reports\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nusers that must comply with inactivity logout policy"}]}]},{"id":"ac-2.11","class":"SP800-53-enhancement","title":"Usage Conditions","params":[{"id":"ac-2.11_prm_1","label":"organization-defined circumstances and\/or usage conditions"},{"id":"ac-2.11_prm_2","label":"organization-defined information system accounts"}],"props":[{"name":"label","value":"AC-2(11)"},{"name":"sort-id","value":"ac-02.11"}],"parts":[{"id":"ac-2.11_smt","name":"statement","prose":"The information system enforces {{ insert: param, ac-2.11_prm_1 }} for {{ insert: param, ac-2.11_prm_2 }}."},{"id":"ac-2.11_gdn","name":"guidance","prose":"Organizations can describe the specific conditions or circumstances under which information system accounts can be used, for example, by restricting usage to certain days of the week, time of day, or specific durations of time."},{"id":"ac-2.11_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-2.11_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(11)[1]"}],"prose":"the organization defines circumstances and\/or usage conditions to be enforced for information system accounts;"},{"id":"ac-2.11_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(11)[2]"}],"prose":"the organization defines information system accounts for which organization-defined circumstances and\/or usage conditions are to be enforced; and"},{"id":"ac-2.11_obj.3","name":"objective","props":[{"name":"label","value":"AC-2(11)[3]"}],"prose":"the information system enforces organization-defined circumstances and\/or usage conditions for organization-defined information system accounts."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsystem-generated list of information system accounts and associated assignments of usage circumstances and\/or usage conditions\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]},{"id":"ac-2.12","class":"SP800-53-enhancement","title":"Account Monitoring \/ Atypical Usage","params":[{"id":"ac-2.12_prm_1","label":"organization-defined atypical usage"},{"id":"ac-2.12_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"AC-2(12)"},{"name":"sort-id","value":"ac-02.12"}],"parts":[{"id":"ac-2.12_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-2.12_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Monitors information system accounts for {{ insert: param, ac-2.12_prm_1 }}; and"},{"id":"ac-2.12_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Reports atypical usage of information system accounts to {{ insert: param, ac-2.12_prm_2 }}."}]},{"id":"ac-2.12_gdn","name":"guidance","prose":"Atypical usage includes, for example, accessing information systems at certain times of the day and from locations that are not consistent with the normal usage patterns of individuals working in organizations.","links":[{"href":"#ca-7","rel":"related"}]},{"id":"ac-2.12_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-2.12.a_obj","name":"objective","props":[{"name":"label","value":"AC-2(12)(a)"}],"parts":[{"id":"ac-2.12.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(12)(a)[1]"}],"prose":"defines atypical usage to be monitored for information system accounts;"},{"id":"ac-2.12.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(12)(a)[2]"}],"prose":"monitors information system accounts for organization-defined atypical usage;"}],"links":[{"href":"#ac-2.12_smt.a","rel":"corresp"}]},{"id":"ac-2.12.b_obj","name":"objective","props":[{"name":"label","value":"AC-2(12)(b)"}],"parts":[{"id":"ac-2.12.b_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(12)(b)[1]"}],"prose":"defines personnel or roles to whom atypical usage of information system accounts are to be reported; and"},{"id":"ac-2.12.b_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(12)(b)[2]"}],"prose":"reports atypical usage of information system accounts to organization-defined personnel or roles."}],"links":[{"href":"#ac-2.12_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system monitoring records\n\ninformation system audit records\n\naudit tracking and monitoring reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]},{"id":"ac-2.13","class":"SP800-53-enhancement","title":"Disable Accounts for High-risk Individuals","params":[{"id":"ac-2.13_prm_1","label":"organization-defined time period"}],"props":[{"name":"label","value":"AC-2(13)"},{"name":"sort-id","value":"ac-02.13"}],"parts":[{"id":"ac-2.13_smt","name":"statement","prose":"The organization disables accounts of users posing a significant risk within {{ insert: param, ac-2.13_prm_1 }} of discovery of the risk."},{"id":"ac-2.13_gdn","name":"guidance","prose":"Users posing a significant risk to organizations include individuals for whom reliable evidence or intelligence indicates either the intention to use authorized access to information systems to cause harm or through whom adversaries will cause harm. Harm includes potential adverse impacts to organizational operations and assets, individuals, other organizations, or the Nation. Close coordination between authorizing officials, information system administrators, and human resource managers is essential in order for timely execution of this control enhancement.","links":[{"href":"#ps-4","rel":"related"}]},{"id":"ac-2.13_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-2.13_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(13)[1]"}],"prose":"defines the time period within which accounts are disabled upon discovery of a significant risk posed by users of such accounts; and"},{"id":"ac-2.13_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(13)[2]"}],"prose":"disables accounts of users posing a significant risk within the organization-defined time period of discovery of the risk."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsystem-generated list of disabled accounts\n\nlist of user activities posing significant organizational risk\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]}]},{"id":"ac-3","class":"SP800-53","title":"Access Enforcement","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-3"},{"name":"sort-id","value":"ac-03"}],"parts":[{"id":"ac-3_smt","name":"statement","prose":"The information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies."},{"id":"ac-3_gdn","name":"guidance","prose":"Access control policies (e.g., identity-based policies, role-based policies, control matrices, cryptography) control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (e.g., devices, files, records, domains) in information systems. In addition to enforcing authorized access at the information system level and recognizing that information systems can host many applications and services in support of organizational missions and business operations, access enforcement mechanisms can also be employed at the application and service level to provide increased information security.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-5","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-16","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ac-21","rel":"related"},{"href":"#ac-22","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ma-3","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#pe-3","rel":"related"}]},{"id":"ac-3_obj","name":"objective","prose":"Determine if the information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing access enforcement\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of approved authorizations (user privileges)\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access enforcement responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing access control policy"}]}]},{"id":"ac-4","class":"SP800-53","title":"Information Flow Enforcement","params":[{"id":"ac-4_prm_1","label":"organization-defined information flow control policies"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-4"},{"name":"sort-id","value":"ac-04"}],"parts":[{"id":"ac-4_smt","name":"statement","prose":"The information system enforces approved authorizations for controlling the flow of information within the system and between interconnected systems based on {{ insert: param, ac-4_prm_1 }}."},{"id":"ac-4_gdn","name":"guidance","prose":"Information flow control regulates where information is allowed to travel within an information system and between information systems (as opposed to who is allowed to access the information) and without explicit regard to subsequent accesses to that information. Flow control restrictions include, for example, keeping export-controlled information from being transmitted in the clear to the Internet, blocking outside traffic that claims to be from within the organization, restricting web requests to the Internet that are not from the internal web proxy server, and limiting information transfers between organizations based on data structures and content. Transferring information between information systems representing different security domains with different security policies introduces risk that such transfers violate one or more domain security policies. In such situations, information owners\/stewards provide guidance at designated policy enforcement points between interconnected systems. Organizations consider mandating specific architectural solutions when required to enforce specific security policies. Enforcement includes, for example: (i) prohibiting information transfers between interconnected systems (i.e., allowing access only); (ii) employing hardware mechanisms to enforce one-way information flows; and (iii) implementing trustworthy regrading mechanisms to reassign security attributes and security labels. Organizations commonly employ information flow control policies and enforcement mechanisms to control the flow of information between designated sources and destinations (e.g., networks, individuals, and devices) within information systems and between interconnected systems. Flow control is based on the characteristics of the information and\/or the information path. Enforcement occurs, for example, in boundary protection devices (e.g., gateways, routers, guards, encrypted tunnels, firewalls) that employ rule sets or establish configuration settings that restrict information system services, provide a packet-filtering capability based on header information, or message-filtering capability based on message content (e.g., implementing key word searches or using document characteristics). Organizations also consider the trustworthiness of filtering\/inspection mechanisms (i.e., hardware, firmware, and software components) that are critical to information flow enforcement. Control enhancements 3 through 22 primarily address cross-domain solution needs which focus on more advanced filtering techniques, in-depth analysis, and stronger flow enforcement mechanisms implemented in cross-domain products, for example, high-assurance guards. Such capabilities are generally not available in commercial off-the-shelf information technology products.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-21","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sc-2","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-18","rel":"related"}]},{"id":"ac-4_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-4_obj.1","name":"objective","props":[{"name":"label","value":"AC-4[1]"}],"prose":"the organization defines information flow control policies to control the flow of information within the system and between interconnected systems; and"},{"id":"ac-4_obj.2","name":"objective","props":[{"name":"label","value":"AC-4[2]"}],"prose":"the information system enforces approved authorizations for controlling the flow of information within the system and between interconnected systems based on organization-defined information flow control policies."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\ninformation flow control policies\n\nprocedures addressing information flow enforcement\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system baseline configuration\n\nlist of information flow authorizations\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information flow enforcement policy"}]}]},{"id":"ac-5","class":"SP800-53","title":"Separation of Duties","params":[{"id":"ac-5_prm_1","label":"organization-defined duties of individuals"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-5"},{"name":"sort-id","value":"ac-05"}],"parts":[{"id":"ac-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Separates {{ insert: param, ac-5_prm_1 }};"},{"id":"ac-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents separation of duties of individuals; and"},{"id":"ac-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Defines information system access authorizations to support separation of duties."}]},{"id":"ac-5_gdn","name":"guidance","prose":"Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes, for example: (i) dividing mission functions and information system support functions among different individuals and\/or roles; (ii) conducting information system support functions with different individuals (e.g., system management, programming, configuration management, quality assurance and testing, and network security); and (iii) ensuring security personnel administering access control functions do not also administer audit functions.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#ps-2","rel":"related"}]},{"id":"ac-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-5.a_obj","name":"objective","props":[{"name":"label","value":"AC-5(a)"}],"parts":[{"id":"ac-5.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-5(a)[1]"}],"prose":"defines duties of individuals to be separated;"},{"id":"ac-5.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-5(a)[2]"}],"prose":"separates organization-defined duties of individuals;"}]},{"id":"ac-5.b_obj","name":"objective","props":[{"name":"label","value":"AC-5(b)"}],"prose":"documents separation of duties; and"},{"id":"ac-5.c_obj","name":"objective","props":[{"name":"label","value":"AC-5(c)"}],"prose":"defines information system access authorizations to support separation of duties."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing divisions of responsibility and separation of duties\n\ninformation system configuration settings and associated documentation\n\nlist of divisions of responsibility and separation of duties\n\ninformation system access authorizations\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining appropriate divisions of responsibility and separation of duties\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing separation of duties policy"}]}]},{"id":"ac-6","class":"SP800-53","title":"Least Privilege","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-6"},{"name":"sort-id","value":"ac-06"}],"parts":[{"id":"ac-6_smt","name":"statement","prose":"The organization employs the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions."},{"id":"ac-6_gdn","name":"guidance","prose":"Organizations employ least privilege for specific duties and information systems. The principle of least privilege is also applied to information system processes, ensuring that the processes operate at privilege levels no higher than necessary to accomplish required organizational missions\/business functions. Organizations consider the creation of additional processes, roles, and information system accounts as necessary, to achieve least privilege. Organizations also apply least privilege to the development, implementation, and operation of organizational information systems.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#pl-2","rel":"related"}]},{"id":"ac-6_obj","name":"objective","prose":"Determine if the organization employs the principle of least privilege, allowing only authorized access for users (and processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\nlist of assigned access authorizations (user privileges)\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions"}]}],"controls":[{"id":"ac-6.1","class":"SP800-53-enhancement","title":"Authorize Access to Security Functions","params":[{"id":"ac-6.1_prm_1","label":"organization-defined security functions (deployed in hardware, software, and firmware) and security-relevant information"}],"props":[{"name":"label","value":"AC-6(1)"},{"name":"sort-id","value":"ac-06.01"}],"parts":[{"id":"ac-6.1_smt","name":"statement","prose":"The organization explicitly authorizes access to {{ insert: param, ac-6.1_prm_1 }}."},{"id":"ac-6.1_gdn","name":"guidance","prose":"Security functions include, for example, establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters. Security-relevant information includes, for example, filtering rules for routers\/firewalls, cryptographic key management information, configuration parameters for security services, and access control lists. Explicitly authorized personnel include, for example, security administrators, system and network administrators, system security officers, system maintenance personnel, system programmers, and other privileged users.","links":[{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"}]},{"id":"ac-6.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-6.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-6(1)[1]"}],"prose":"defines security-relevant information for which access must be explicitly authorized;"},{"id":"ac-6.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-6(1)[2]"}],"prose":"defines security functions deployed in:","parts":[{"id":"ac-6.1_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-6(1)[2][a]"}],"prose":"hardware;"},{"id":"ac-6.1_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-6(1)[2][b]"}],"prose":"software;"},{"id":"ac-6.1_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-6(1)[2][c]"}],"prose":"firmware;"}]},{"id":"ac-6.1_obj.3","name":"objective","props":[{"name":"label","value":"AC-6(1)[3]"}],"prose":"explicitly authorizes access to:","parts":[{"id":"ac-6.1_obj.3.a","name":"objective","props":[{"name":"label","value":"AC-6(1)[3][a]"}],"prose":"organization-defined security functions; and"},{"id":"ac-6.1_obj.3.b","name":"objective","props":[{"name":"label","value":"AC-6(1)[3][b]"}],"prose":"security-relevant information."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\nlist of security functions (deployed in hardware, software, and firmware) and security-relevant information for which access must be explicitly authorized\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions"}]}]},{"id":"ac-6.2","class":"SP800-53-enhancement","title":"Non-privileged Access for Nonsecurity Functions","params":[{"id":"ac-6.2_prm_1","label":"organization-defined security functions or security-relevant information"}],"props":[{"name":"label","value":"AC-6(2)"},{"name":"sort-id","value":"ac-06.02"}],"parts":[{"id":"ac-6.2_smt","name":"statement","prose":"The organization requires that users of information system accounts, or roles, with access to {{ insert: param, ac-6.2_prm_1 }}, use non-privileged accounts or roles, when accessing nonsecurity functions."},{"id":"ac-6.2_gdn","name":"guidance","prose":"This control enhancement limits exposure when operating from within privileged accounts or roles. The inclusion of roles addresses situations where organizations implement access control policies such as role-based access control and where a change of role provides the same degree of assurance in the change of access authorizations for both the user and all processes acting on behalf of the user as would be provided by a change between a privileged and non-privileged account.","links":[{"href":"#pl-4","rel":"related"}]},{"id":"ac-6.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-6.2_obj.1","name":"objective","props":[{"name":"label","value":"AC-6(2)[1]"}],"prose":"defines security functions or security-relevant information to which users of information system accounts, or roles, have access; and"},{"id":"ac-6.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-6(2)[2]"}],"prose":"requires that users of information system accounts, or roles, with access to organization-defined security functions or security-relevant information, use non-privileged accounts, or roles, when accessing nonsecurity functions."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\nlist of system-generated security functions or security-relevant information assigned to information system accounts or roles\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions"}]}]},{"id":"ac-6.3","class":"SP800-53-enhancement","title":"Network Access to Privileged Commands","params":[{"id":"ac-6.3_prm_1","label":"organization-defined privileged commands"},{"id":"ac-6.3_prm_2","label":"organization-defined compelling operational needs"}],"props":[{"name":"label","value":"AC-6(3)"},{"name":"sort-id","value":"ac-06.03"}],"parts":[{"id":"ac-6.3_smt","name":"statement","prose":"The organization authorizes network access to {{ insert: param, ac-6.3_prm_1 }} only for {{ insert: param, ac-6.3_prm_2 }} and documents the rationale for such access in the security plan for the information system."},{"id":"ac-6.3_gdn","name":"guidance","prose":"Network access is any access across a network connection in lieu of local access (i.e., user being physically present at the device).","links":[{"href":"#ac-17","rel":"related"}]},{"id":"ac-6.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-6.3_obj.1","name":"objective","props":[{"name":"label","value":"AC-6(3)[1]"}],"prose":"defines privileged commands to which network access is to be authorized only for compelling operational needs;"},{"id":"ac-6.3_obj.2","name":"objective","props":[{"name":"label","value":"AC-6(3)[2]"}],"prose":"defines compelling operational needs for which network access to organization-defined privileged commands are to be solely authorized;"},{"id":"ac-6.3_obj.3","name":"objective","props":[{"name":"label","value":"AC-6(3)[3]"}],"prose":"authorizes network access to organization-defined privileged commands only for organization-defined compelling operational needs; and"},{"id":"ac-6.3_obj.4","name":"objective","props":[{"name":"label","value":"AC-6(3)[4]"}],"prose":"documents the rationale for authorized network access to organization-defined privileged commands in the security plan for the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of operational needs for authorizing network access to privileged commands\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions"}]}]},{"id":"ac-6.5","class":"SP800-53-enhancement","title":"Privileged Accounts","params":[{"id":"ac-6.5_prm_1","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"AC-6(5)"},{"name":"sort-id","value":"ac-06.05"}],"parts":[{"id":"ac-6.5_smt","name":"statement","prose":"The organization restricts privileged accounts on the information system to {{ insert: param, ac-6.5_prm_1 }}."},{"id":"ac-6.5_gdn","name":"guidance","prose":"Privileged accounts, including super user accounts, are typically described as system administrator for various types of commercial off-the-shelf operating systems. Restricting privileged accounts to specific personnel or roles prevents day-to-day users from having access to privileged information\/functions. Organizations may differentiate in the application of this control enhancement between allowed privileges for local accounts and for domain accounts provided organizations retain the ability to control information system configurations for key security parameters and as otherwise necessary to sufficiently mitigate risk.","links":[{"href":"#cm-6","rel":"related"}]},{"id":"ac-6.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-6.5_obj.1","name":"objective","props":[{"name":"label","value":"AC-6(5)[1]"}],"prose":"defines personnel or roles for which privileged accounts on the information system are to be restricted; and"},{"id":"ac-6.5_obj.2","name":"objective","props":[{"name":"label","value":"AC-6(5)[2]"}],"prose":"restricts privileged accounts on the information system to organization-defined personnel or roles."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\nlist of system-generated privileged accounts\n\nlist of system administration personnel\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions"}]}]},{"id":"ac-6.9","class":"SP800-53-enhancement","title":"Auditing Use of Privileged Functions","props":[{"name":"label","value":"AC-6(9)"},{"name":"sort-id","value":"ac-06.09"}],"parts":[{"id":"ac-6.9_smt","name":"statement","prose":"The information system audits the execution of privileged functions."},{"id":"ac-6.9_gdn","name":"guidance","prose":"Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and ongoing concern and can have significant adverse impacts on organizations. Auditing the use of privileged functions is one way to detect such misuse, and in doing so, help mitigate the risk from insider threats and the advanced persistent threat (APT).","links":[{"href":"#au-2","rel":"related"}]},{"id":"ac-6.9_obj","name":"objective","prose":"Determine if the information system audits the execution of privileged functions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of privileged functions to be audited\n\nlist of audited events\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for reviewing least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms auditing the execution of least privilege functions"}]}]},{"id":"ac-6.10","class":"SP800-53-enhancement","title":"Prohibit Non-privileged Users from Executing Privileged Functions","props":[{"name":"label","value":"AC-6(10)"},{"name":"sort-id","value":"ac-06.10"}],"parts":[{"id":"ac-6.10_smt","name":"statement","prose":"The information system prevents non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards\/countermeasures."},{"id":"ac-6.10_gdn","name":"guidance","prose":"Privileged functions include, for example, establishing information system accounts, performing system integrity checks, or administering cryptographic key management activities. Non-privileged users are individuals that do not possess appropriate authorizations. Circumventing intrusion detection and prevention mechanisms or malicious code protection mechanisms are examples of privileged functions that require protection from non-privileged users."},{"id":"ac-6.10_obj","name":"objective","prose":"Determine if the information system prevents non-privileged users from executing privileged functions to include:","parts":[{"id":"ac-6.10_obj.1","name":"objective","props":[{"name":"label","value":"AC-6(10)[1]"}],"prose":"disabling implemented security safeguards\/countermeasures;"},{"id":"ac-6.10_obj.2","name":"objective","props":[{"name":"label","value":"AC-6(10)[2]"}],"prose":"circumventing security safeguards\/countermeasures; or"},{"id":"ac-6.10_obj.3","name":"objective","props":[{"name":"label","value":"AC-6(10)[3]"}],"prose":"altering implemented security safeguards\/countermeasures."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of privileged functions and associated user account assignments\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions for non-privileged users"}]}]}]},{"id":"ac-7","class":"SP800-53","title":"Unsuccessful Logon Attempts","params":[{"id":"ac-7_prm_1","label":"organization-defined number"},{"id":"ac-7_prm_2","label":"organization-defined time period"},{"id":"ac-7_prm_3","select":{"choice":["locks the account\/node for an {{ insert: param, ac-7_prm_4 }} ","locks the account\/node until released by an administrator","delays next logon prompt according to {{ insert: param, ac-7_prm_5 }} "]}},{"id":"ac-7_prm_4","depends-on":"ac-7_prm_3","label":"organization-defined time period"},{"id":"ac-7_prm_5","depends-on":"ac-7_prm_3","label":"organization-defined delay algorithm"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"AC-7"},{"name":"sort-id","value":"ac-07"}],"parts":[{"id":"ac-7_smt","name":"statement","prose":"The information system:","parts":[{"id":"ac-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Enforces a limit of {{ insert: param, ac-7_prm_1 }} consecutive invalid logon attempts by a user during a {{ insert: param, ac-7_prm_2 }}; and"},{"id":"ac-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Automatically {{ insert: param, ac-7_prm_3 }} when the maximum number of unsuccessful attempts is exceeded."}]},{"id":"ac-7_gdn","name":"guidance","prose":"This control applies regardless of whether the logon occurs via a local or network connection. Due to the potential for denial of service, automatic lockouts initiated by information systems are usually temporary and automatically release after a predetermined time period established by organizations. If a delay algorithm is selected, organizations may choose to employ different algorithms for different information system components based on the capabilities of those components. Responses to unsuccessful logon attempts may be implemented at both the operating system and the application levels.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-9","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ia-5","rel":"related"}]},{"id":"ac-7_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-7.a_obj","name":"objective","props":[{"name":"label","value":"AC-7(a)"}],"parts":[{"id":"ac-7.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-7(a)[1]"}],"prose":"the organization defines the number of consecutive invalid logon attempts allowed to the information system by a user during an organization-defined time period;"},{"id":"ac-7.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-7(a)[2]"}],"prose":"the organization defines the time period allowed by a user of the information system for an organization-defined number of consecutive invalid logon attempts;"},{"id":"ac-7.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-7(a)[3]"}],"prose":"the information system enforces a limit of organization-defined number of consecutive invalid logon attempts by a user during an organization-defined time period;"}]},{"id":"ac-7.b_obj","name":"objective","props":[{"name":"label","value":"AC-7(b)"}],"parts":[{"id":"ac-7.b_obj.1","name":"objective","props":[{"name":"label","value":"AC-7(b)[1]"}],"prose":"the organization defines account\/node lockout time period or logon delay algorithm to be automatically enforced by the information system when the maximum number of unsuccessful logon attempts is exceeded;"},{"id":"ac-7.b_obj.2","name":"objective","props":[{"name":"label","value":"AC-7(b)[2]"}],"prose":"the information system, when the maximum number of unsuccessful logon attempts is exceeded, automatically:","parts":[{"id":"ac-7.b_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-7(b)[2][a]"}],"prose":"locks the account\/node for the organization-defined time period;"},{"id":"ac-7.b_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-7(b)[2][b]"}],"prose":"locks the account\/node until released by an administrator; or"},{"id":"ac-7.b_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-7(b)[2][c]"}],"prose":"delays next logon prompt according to the organization-defined delay algorithm."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing unsuccessful logon attempts\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem developers\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing access control policy for unsuccessful logon attempts"}]}]},{"id":"ac-8","class":"SP800-53","title":"System Use Notification","params":[{"id":"ac-8_prm_1","label":"organization-defined system use notification message or banner"},{"id":"ac-8_prm_2","label":"organization-defined conditions"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-8"},{"name":"sort-id","value":"ac-08"}],"parts":[{"id":"ac-8_smt","name":"statement","prose":"The information system:","parts":[{"id":"ac-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Displays to users {{ insert: param, ac-8_prm_1 }} before granting access to the system that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance and states that:","parts":[{"id":"ac-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Users are accessing a U.S. Government information system;"},{"id":"ac-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Information system usage may be monitored, recorded, and subject to audit;"},{"id":"ac-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Unauthorized use of the information system is prohibited and subject to criminal and civil penalties; and"},{"id":"ac-8_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Use of the information system indicates consent to monitoring and recording;"}]},{"id":"ac-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Retains the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the information system; and"},{"id":"ac-8_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"For publicly accessible systems:","parts":[{"id":"ac-8_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Displays system use information {{ insert: param, ac-8_prm_2 }}, before granting further access;"},{"id":"ac-8_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Displays references, if any, to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities; and"},{"id":"ac-8_smt.c.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Includes a description of the authorized uses of the system."}]}]},{"id":"ac-8_gdn","name":"guidance","prose":"System use notifications can be implemented using messages or warning banners displayed before individuals log in to information systems. System use notifications are used only for access via logon interfaces with human users and are not required when such human interfaces do not exist. Organizations consider system use notification messages\/banners displayed in multiple languages based on specific organizational needs and the demographics of information system users. Organizations also consult with the Office of the General Counsel for legal review and approval of warning banner content."},{"id":"ac-8_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-8.a_obj","name":"objective","props":[{"name":"label","value":"AC-8(a)"}],"parts":[{"id":"ac-8.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-8(a)[1]"}],"prose":"the organization defines a system use notification message or banner to be displayed by the information system to users before granting access to the system;"},{"id":"ac-8.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2]"}],"prose":"the information system displays to users the organization-defined system use notification message or banner before granting access to the information system that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance, and states that:","parts":[{"id":"ac-8.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](1)"}],"prose":"users are accessing a U.S. Government information system;"},{"id":"ac-8.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](2)"}],"prose":"information system usage may be monitored, recorded, and subject to audit;"},{"id":"ac-8.a.3_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](3)"}],"prose":"unauthorized use of the information system is prohibited and subject to criminal and civil penalties;"},{"id":"ac-8.a.4_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](4)"}],"prose":"use of the information system indicates consent to monitoring and recording;"}]}]},{"id":"ac-8.b_obj","name":"objective","props":[{"name":"label","value":"AC-8(b)"}],"prose":"the information system retains the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the information system;"},{"id":"ac-8.c_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)"}],"prose":"for publicly accessible systems:","parts":[{"id":"ac-8.c.1_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)(1)"}],"parts":[{"id":"ac-8.c.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-8(c)(1)[1]"}],"prose":"the organization defines conditions for system use to be displayed by the information system before granting further access;"},{"id":"ac-8.c.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(c)(1)[2]"}],"prose":"the information system displays organization-defined conditions before granting further access;"}]},{"id":"ac-8.c.2_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)(2)"}],"prose":"the information system displays references, if any, to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities; and"},{"id":"ac-8.c.3_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)(3)"}],"prose":"the information system includes a description of the authorized uses of the system."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprivacy and security policies, procedures addressing system use notification\n\ndocumented approval of information system use notification messages or banners\n\ninformation system audit records\n\nuser acknowledgements of notification message or banner\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system use notification messages\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibility for providing legal advice\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing system use notification"}]}]},{"id":"ac-10","class":"SP800-53","title":"Concurrent Session Control","params":[{"id":"ac-10_prm_1","label":"organization-defined account and\/or account type"},{"id":"ac-10_prm_2","label":"organization-defined number"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AC-10"},{"name":"sort-id","value":"ac-10"}],"parts":[{"id":"ac-10_smt","name":"statement","prose":"The information system limits the number of concurrent sessions for each {{ insert: param, ac-10_prm_1 }} to {{ insert: param, ac-10_prm_2 }}."},{"id":"ac-10_gdn","name":"guidance","prose":"Organizations may define the maximum number of concurrent sessions for information system accounts globally, by account type (e.g., privileged user, non-privileged user, domain, specific application), by account, or a combination. For example, organizations may limit the number of concurrent sessions for system administrators or individuals working in particularly sensitive domains or mission-critical applications. This control addresses concurrent sessions for information system accounts and does not address concurrent sessions by single users via multiple system accounts."},{"id":"ac-10_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-10_obj.1","name":"objective","props":[{"name":"label","value":"AC-10[1]"}],"prose":"the organization defines account and\/or account types for the information system;"},{"id":"ac-10_obj.2","name":"objective","props":[{"name":"label","value":"AC-10[2]"}],"prose":"the organization defines the number of concurrent sessions to be allowed for each organization-defined account and\/or account type; and"},{"id":"ac-10_obj.3","name":"objective","props":[{"name":"label","value":"AC-10[3]"}],"prose":"the information system limits the number of concurrent sessions for each organization-defined account and\/or account type to the organization-defined number of concurrent sessions allowed."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing concurrent session control\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing access control policy for concurrent session control"}]}]},{"id":"ac-11","class":"SP800-53","title":"Session Lock","params":[{"id":"ac-11_prm_1","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AC-11"},{"name":"sort-id","value":"ac-11"}],"links":[{"href":"#4da24a96-6cf8-435d-9d1f-c73247cad109","rel":"reference"}],"parts":[{"id":"ac-11_smt","name":"statement","prose":"The information system:","parts":[{"id":"ac-11_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Prevents further access to the system by initiating a session lock after {{ insert: param, ac-11_prm_1 }} of inactivity or upon receiving a request from a user; and"},{"id":"ac-11_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Retains the session lock until the user reestablishes access using established identification and authentication procedures."}]},{"id":"ac-11_gdn","name":"guidance","prose":"Session locks are temporary actions taken when users stop work and move away from the immediate vicinity of information systems but do not want to log out because of the temporary nature of their absences. Session locks are implemented where session activities can be determined. This is typically at the operating system level, but can also be at the application level. Session locks are not an acceptable substitute for logging out of information systems, for example, if organizations require users to log out at the end of workdays.","links":[{"href":"#ac-7","rel":"related"}]},{"id":"ac-11_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-11.a_obj","name":"objective","props":[{"name":"label","value":"AC-11(a)"}],"parts":[{"id":"ac-11.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-11(a)[1]"}],"prose":"the organization defines the time period of user inactivity after which the information system initiates a session lock;"},{"id":"ac-11.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-11(a)[2]"}],"prose":"the information system prevents further access to the system by initiating a session lock after organization-defined time period of user inactivity or upon receiving a request from a user; and"}]},{"id":"ac-11.b_obj","name":"objective","props":[{"name":"label","value":"AC-11(b)"}],"prose":"the information system retains the session lock until the user reestablishes access using established identification and authentication procedures."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing session lock\n\nprocedures addressing identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing access control policy for session lock"}]}],"controls":[{"id":"ac-11.1","class":"SP800-53-enhancement","title":"Pattern-hiding Displays","props":[{"name":"label","value":"AC-11(1)"},{"name":"sort-id","value":"ac-11.01"}],"parts":[{"id":"ac-11.1_smt","name":"statement","prose":"The information system conceals, via the session lock, information previously visible on the display with a publicly viewable image."},{"id":"ac-11.1_gdn","name":"guidance","prose":"Publicly viewable images can include static or dynamic images, for example, patterns used with screen savers, photographic images, solid colors, clock, battery life indicator, or a blank screen, with the additional caveat that none of the images convey sensitive information."},{"id":"ac-11.1_obj","name":"objective","prose":"Determine if the information system conceals, via the session lock, information previously visible on the display with a publicly viewable image."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing session lock\n\ndisplay screen with session lock activated\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Information system session lock mechanisms"}]}]}]},{"id":"ac-12","class":"SP800-53","title":"Session Termination","params":[{"id":"ac-12_prm_1","label":"organization-defined conditions or trigger events requiring session disconnect"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"AC-12"},{"name":"sort-id","value":"ac-12"}],"parts":[{"id":"ac-12_smt","name":"statement","prose":"The information system automatically terminates a user session after {{ insert: param, ac-12_prm_1 }}."},{"id":"ac-12_gdn","name":"guidance","prose":"This control addresses the termination of user-initiated logical sessions in contrast to SC-10 which addresses the termination of network connections that are associated with communications sessions (i.e., network disconnect). A logical session (for local, network, and remote access) is initiated whenever a user (or process acting on behalf of a user) accesses an organizational information system. Such user sessions can be terminated (and thus terminate user access) without terminating network sessions. Session termination terminates all processes associated with a user’s logical session except those processes that are specifically created by the user (i.e., session owner) to continue after the session is terminated. Conditions or trigger events requiring automatic session termination can include, for example, organization-defined periods of user inactivity, targeted responses to certain types of incidents, time-of-day restrictions on information system use.","links":[{"href":"#sc-10","rel":"related"},{"href":"#sc-23","rel":"related"}]},{"id":"ac-12_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-12_obj.1","name":"objective","props":[{"name":"label","value":"AC-12[1]"}],"prose":"the organization defines conditions or trigger events requiring session disconnect; and"},{"id":"ac-12_obj.2","name":"objective","props":[{"name":"label","value":"AC-12[2]"}],"prose":"the information system automatically terminates a user session after organization-defined conditions or trigger events requiring session disconnect occurs."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing session termination\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of conditions or trigger events requiring session disconnect\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing user session termination"}]}]},{"id":"ac-14","class":"SP800-53","title":"Permitted Actions Without Identification or Authentication","params":[{"id":"ac-14_prm_1","label":"organization-defined user actions"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AC-14"},{"name":"sort-id","value":"ac-14"}],"parts":[{"id":"ac-14_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-14_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Identifies {{ insert: param, ac-14_prm_1 }} that can be performed on the information system without identification or authentication consistent with organizational missions\/business functions; and"},{"id":"ac-14_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents and provides supporting rationale in the security plan for the information system, user actions not requiring identification or authentication."}]},{"id":"ac-14_gdn","name":"guidance","prose":"This control addresses situations in which organizations determine that no identification or authentication is required in organizational information systems. Organizations may allow a limited number of user actions without identification or authentication including, for example, when individuals access public websites or other publicly accessible federal information systems, when individuals use mobile phones to receive calls, or when facsimiles are received. Organizations also identify actions that normally require identification or authentication but may under certain circumstances (e.g., emergencies), allow identification or authentication mechanisms to be bypassed. Such bypasses may occur, for example, via a software-readable physical switch that commands bypass of the logon functionality and is protected from accidental or unmonitored use. This control does not apply to situations where identification and authentication have already occurred and are not repeated, but rather to situations where identification and authentication have not yet occurred. Organizations may decide that there are no user actions that can be performed on organizational information systems without identification and authentication and thus, the values for assignment statements can be none.","links":[{"href":"#cp-2","rel":"related"},{"href":"#ia-2","rel":"related"}]},{"id":"ac-14_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-14.a_obj","name":"objective","props":[{"name":"label","value":"AC-14(a)"}],"parts":[{"id":"ac-14.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-14(a)[1]"}],"prose":"defines user actions that can be performed on the information system without identification or authentication consistent with organizational missions\/business functions;"},{"id":"ac-14.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-14(a)[2]"}],"prose":"identifies organization-defined user actions that can be performed on the information system without identification or authentication consistent with organizational missions\/business functions; and"}]},{"id":"ac-14.b_obj","name":"objective","props":[{"name":"label","value":"AC-14(b)"}],"prose":"documents and provides supporting rationale in the security plan for the information system, user actions not requiring identification or authentication."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing permitted actions without identification or authentication\n\ninformation system configuration settings and associated documentation\n\nsecurity plan\n\nlist of user actions that can be performed without identification or authentication\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ac-17","class":"SP800-53","title":"Remote Access","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-17"},{"name":"sort-id","value":"ac-17"}],"links":[{"href":"#5309d4d0-46f8-4213-a749-e7584164e5e8","rel":"reference"},{"href":"#99f331f2-a9f0-46c2-9856-a3cbb9b89442","rel":"reference"},{"href":"#349fe082-502d-464a-aa0c-1443c6a5cf40","rel":"reference"},{"href":"#1201fcf3-afb1-4675-915a-fb4ae0435717","rel":"reference"},{"href":"#d1a4e2a9-e512-4132-8795-5357aba29254","rel":"reference"}],"parts":[{"id":"ac-17_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-17_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes and documents usage restrictions, configuration\/connection requirements, and implementation guidance for each type of remote access allowed; and"},{"id":"ac-17_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes remote access to the information system prior to allowing such connections."}]},{"id":"ac-17_gdn","name":"guidance","prose":"Remote access is access to organizational information systems by users (or processes acting on behalf of users) communicating through external networks (e.g., the Internet). Remote access methods include, for example, dial-up, broadband, and wireless. Organizations often employ encrypted virtual private networks (VPNs) to enhance confidentiality and integrity over remote connections. The use of encrypted VPNs does not make the access non-remote; however, the use of VPNs, when adequately provisioned with appropriate security controls (e.g., employing appropriate encryption techniques for confidentiality and integrity protection) may provide sufficient assurance to the organization that it can effectively treat such connections as internal networks. Still, VPN connections traverse external networks, and the encrypted VPN does not enhance the availability of remote connections. Also, VPNs with encrypted tunnels can affect the organizational capability to adequately monitor network communications traffic for malicious code. Remote access controls apply to information systems other than public web servers or systems designed for public access. This control addresses authorization prior to allowing remote access without specifying the formats for such authorization. While organizations may use interconnection security agreements to authorize remote access connections, such agreements are not required by this control. Enforcing access restrictions for remote connections is addressed in AC-3.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#pe-17","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sc-10","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ac-17_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-17.a_obj","name":"objective","props":[{"name":"label","value":"AC-17(a)"}],"parts":[{"id":"ac-17.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-17(a)[1]"}],"prose":"identifies the types of remote access allowed to the information system;"},{"id":"ac-17.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-17(a)[2]"}],"prose":"establishes for each type of remote access allowed:","parts":[{"id":"ac-17.a_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-17(a)[2][a]"}],"prose":"usage restrictions;"},{"id":"ac-17.a_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-17(a)[2][b]"}],"prose":"configuration\/connection requirements;"},{"id":"ac-17.a_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-17(a)[2][c]"}],"prose":"implementation guidance;"}]},{"id":"ac-17.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-17(a)[3]"}],"prose":"documents for each type of remote access allowed:","parts":[{"id":"ac-17.a_obj.3.a","name":"objective","props":[{"name":"label","value":"AC-17(a)[3][a]"}],"prose":"usage restrictions;"},{"id":"ac-17.a_obj.3.b","name":"objective","props":[{"name":"label","value":"AC-17(a)[3][b]"}],"prose":"configuration\/connection requirements;"},{"id":"ac-17.a_obj.3.c","name":"objective","props":[{"name":"label","value":"AC-17(a)[3][c]"}],"prose":"implementation guidance; and"}]}]},{"id":"ac-17.b_obj","name":"objective","props":[{"name":"label","value":"AC-17(b)"}],"prose":"authorizes remote access to the information system prior to allowing such connections."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access implementation and usage (including restrictions)\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\nremote access authorizations\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing remote access connections\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Remote access management capability for the information system"}]}],"controls":[{"id":"ac-17.1","class":"SP800-53-enhancement","title":"Automated Monitoring \/ Control","props":[{"name":"label","value":"AC-17(1)"},{"name":"sort-id","value":"ac-17.01"}],"parts":[{"id":"ac-17.1_smt","name":"statement","prose":"The information system monitors and controls remote access methods."},{"id":"ac-17.1_gdn","name":"guidance","prose":"Automated monitoring and control of remote access sessions allows organizations to detect cyber attacks and also ensure ongoing compliance with remote access policies by auditing connection activities of remote users on a variety of information system components (e.g., servers, workstations, notebook computers, smart phones, and tablets).","links":[{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"}]},{"id":"ac-17.1_obj","name":"objective","prose":"Determine if the information system monitors and controls remote access methods."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access to the information system\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\ninformation system monitoring records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms monitoring and controlling remote access methods"}]}]},{"id":"ac-17.2","class":"SP800-53-enhancement","title":"Protection of Confidentiality \/ Integrity Using Encryption","props":[{"name":"label","value":"AC-17(2)"},{"name":"sort-id","value":"ac-17.02"}],"parts":[{"id":"ac-17.2_smt","name":"statement","prose":"The information system implements cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions."},{"id":"ac-17.2_gdn","name":"guidance","prose":"The encryption strength of mechanism is selected based on the security categorization of the information.","links":[{"href":"#sc-8","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"ac-17.2_obj","name":"objective","prose":"Determine if the information system implements cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access to the information system\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ncryptographic mechanisms and associated configuration documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Cryptographic mechanisms protecting confidentiality and integrity of remote access sessions"}]}]},{"id":"ac-17.3","class":"SP800-53-enhancement","title":"Managed Access Control Points","params":[{"id":"ac-17.3_prm_1","label":"organization-defined number"}],"props":[{"name":"label","value":"AC-17(3)"},{"name":"sort-id","value":"ac-17.03"}],"parts":[{"id":"ac-17.3_smt","name":"statement","prose":"The information system routes all remote accesses through {{ insert: param, ac-17.3_prm_1 }} managed network access control points."},{"id":"ac-17.3_gdn","name":"guidance","prose":"Limiting the number of access control points for remote accesses reduces the attack surface for organizations. Organizations consider the Trusted Internet Connections (TIC) initiative requirements for external network connections.","links":[{"href":"#sc-7","rel":"related"}]},{"id":"ac-17.3_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-17.3_obj.1","name":"objective","props":[{"name":"label","value":"AC-17(3)[1]"}],"prose":"the organization defines the number of managed network access control points through which all remote accesses are to be routed; and"},{"id":"ac-17.3_obj.2","name":"objective","props":[{"name":"label","value":"AC-17(3)[2]"}],"prose":"the information system routes all remote accesses through the organization-defined number of managed network access control points."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access to the information system\n\ninformation system design documentation\n\nlist of all managed network access control points\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms routing all remote accesses through managed network access control points"}]}]},{"id":"ac-17.4","class":"SP800-53-enhancement","title":"Privileged Commands \/ Access","params":[{"id":"ac-17.4_prm_1","label":"organization-defined needs"}],"props":[{"name":"label","value":"AC-17(4)"},{"name":"sort-id","value":"ac-17.04"}],"parts":[{"id":"ac-17.4_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-17.4_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Authorizes the execution of privileged commands and access to security-relevant information via remote access only for {{ insert: param, ac-17.4_prm_1 }}; and"},{"id":"ac-17.4_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Documents the rationale for such access in the security plan for the information system."}]},{"id":"ac-17.4_gdn","name":"guidance","links":[{"href":"#ac-6","rel":"related"}]},{"id":"ac-17.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-17.4.a_obj","name":"objective","props":[{"name":"label","value":"AC-17(4)(a)"}],"parts":[{"id":"ac-17.4.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-17(4)(a)[1]"}],"prose":"defines needs to authorize the execution of privileged commands and access to security-relevant information via remote access;"},{"id":"ac-17.4.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-17(4)(a)[2]"}],"prose":"authorizes the execution of privileged commands and access to security-relevant information via remote access only for organization-defined needs; and"}],"links":[{"href":"#ac-17.4_smt.a","rel":"corresp"}]},{"id":"ac-17.4.b_obj","name":"objective","props":[{"name":"label","value":"AC-17(4)(b)"}],"prose":"documents the rationale for such access in the information system security plan.","links":[{"href":"#ac-17.4_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access to the information system\n\ninformation system configuration settings and associated documentation\n\nsecurity plan\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing remote access management"}]}]}]},{"id":"ac-18","class":"SP800-53","title":"Wireless Access","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-18"},{"name":"sort-id","value":"ac-18"}],"links":[{"href":"#238ed479-eccb-49f6-82ec-ab74a7a428cf","rel":"reference"},{"href":"#d1b1d689-0f66-4474-9924-c81119758dc1","rel":"reference"},{"href":"#6f336ecd-f2a0-4c84-9699-0491d81b6e0d","rel":"reference"}],"parts":[{"id":"ac-18_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-18_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes usage restrictions, configuration\/connection requirements, and implementation guidance for wireless access; and"},{"id":"ac-18_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes wireless access to the information system prior to allowing such connections."}]},{"id":"ac-18_gdn","name":"guidance","prose":"Wireless technologies include, for example, microwave, packet radio (UHF\/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP\/TLS, PEAP), which provide credential protection and mutual authentication.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ac-18_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-18.a_obj","name":"objective","props":[{"name":"label","value":"AC-18(a)"}],"prose":"establishes for wireless access:","parts":[{"id":"ac-18.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-18(a)[1]"}],"prose":"usage restrictions;"},{"id":"ac-18.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-18(a)[2]"}],"prose":"configuration\/connection requirement;"},{"id":"ac-18.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-18(a)[3]"}],"prose":"implementation guidance; and"}]},{"id":"ac-18.b_obj","name":"objective","props":[{"name":"label","value":"AC-18(b)"}],"prose":"authorizes wireless access to the information system prior to allowing such connections."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing wireless access implementation and usage (including restrictions)\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nwireless access authorizations\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing wireless access connections\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Wireless access management capability for the information system"}]}],"controls":[{"id":"ac-18.1","class":"SP800-53-enhancement","title":"Authentication and Encryption","params":[{"id":"ac-18.1_prm_1","select":{"how-many":"one-or-more","choice":["users","devices"]}}],"props":[{"name":"label","value":"AC-18(1)"},{"name":"sort-id","value":"ac-18.01"}],"parts":[{"id":"ac-18.1_smt","name":"statement","prose":"The information system protects wireless access to the system using authentication of {{ insert: param, ac-18.1_prm_1 }} and encryption."},{"id":"ac-18.1_gdn","name":"guidance","links":[{"href":"#sc-8","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"ac-18.1_obj","name":"objective","prose":"Determine if the information system protects wireless access to the system using encryption and one or more of the following:","parts":[{"id":"ac-18.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-18(1)[1]"}],"prose":"authentication of users; and\/or"},{"id":"ac-18.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-18(1)[2]"}],"prose":"authentication of devices."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing wireless implementation and usage (including restrictions)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing wireless access protections to the information system"}]}]},{"id":"ac-18.4","class":"SP800-53-enhancement","title":"Restrict Configurations by Users","props":[{"name":"label","value":"AC-18(4)"},{"name":"sort-id","value":"ac-18.04"}],"parts":[{"id":"ac-18.4_smt","name":"statement","prose":"The organization identifies and explicitly authorizes users allowed to independently configure wireless networking capabilities."},{"id":"ac-18.4_gdn","name":"guidance","prose":"Organizational authorizations to allow selected users to configure wireless networking capability are enforced in part, by the access enforcement mechanisms employed within organizational information systems.","links":[{"href":"#ac-3","rel":"related"},{"href":"#sc-15","rel":"related"}]},{"id":"ac-18.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-18.4_obj.1","name":"objective","props":[{"name":"label","value":"AC-18(4)[1]"}],"prose":"identifies users allowed to independently configure wireless networking capabilities; and"},{"id":"ac-18.4_obj.2","name":"objective","props":[{"name":"label","value":"AC-18(4)[2]"}],"prose":"explicitly authorizes the identified users allowed to independently configure wireless networking capabilities."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing wireless implementation and usage (including restrictions)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms authorizing independent user configuration of wireless networking capabilities"}]}]},{"id":"ac-18.5","class":"SP800-53-enhancement","title":"Antennas \/ Transmission Power Levels","props":[{"name":"label","value":"AC-18(5)"},{"name":"sort-id","value":"ac-18.05"}],"parts":[{"id":"ac-18.5_smt","name":"statement","prose":"The organization selects radio antennas and calibrates transmission power levels to reduce the probability that usable signals can be received outside of organization-controlled boundaries."},{"id":"ac-18.5_gdn","name":"guidance","prose":"Actions that may be taken by organizations to limit unauthorized use of wireless communications outside of organization-controlled boundaries include, for example: (i) reducing the power of wireless transmissions so that the transmissions are less likely to emit a signal that can be used by adversaries outside of the physical perimeters of organizations; (ii) employing measures such as TEMPEST to control wireless emanations; and (iii) using directional\/beam forming antennas that reduce the likelihood that unintended receivers will be able to intercept signals. Prior to taking such actions, organizations can conduct periodic wireless surveys to understand the radio frequency profile of organizational information systems as well as other systems that may be operating in the area.","links":[{"href":"#pe-19","rel":"related"}]},{"id":"ac-18.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-18.5_obj.1","name":"objective","props":[{"name":"label","value":"AC-18(5)[1]"}],"prose":"selects radio antennas to reduce the probability that usable signals can be received outside of organization-controlled boundaries; and"},{"id":"ac-18.5_obj.2","name":"objective","props":[{"name":"label","value":"AC-18(5)[2]"}],"prose":"calibrates transmission power levels to reduce the probability that usable signals can be received outside of organization-controlled boundaries."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing wireless implementation and usage (including restrictions)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Wireless access capability protecting usable signals from unauthorized access outside organization-controlled boundaries"}]}]}]},{"id":"ac-19","class":"SP800-53","title":"Access Control for Mobile Devices","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-19"},{"name":"sort-id","value":"ac-19"}],"links":[{"href":"#4da24a96-6cf8-435d-9d1f-c73247cad109","rel":"reference"},{"href":"#1201fcf3-afb1-4675-915a-fb4ae0435717","rel":"reference"},{"href":"#0293a393-fbe8-4ed1-b0b4-f6fbd3ae1589","rel":"reference"},{"href":"#6513e480-fada-4876-abba-1397084dfb26","rel":"reference"}],"parts":[{"id":"ac-19_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-19_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes usage restrictions, configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices; and"},{"id":"ac-19_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes the connection of mobile devices to organizational information systems."}]},{"id":"ac-19_gdn","name":"guidance","prose":"A mobile device is a computing device that: (i) has a small form factor such that it can easily be carried by a single individual; (ii) is designed to operate without a physical connection (e.g., wirelessly transmit or receive information); (iii) possesses local, non-removable or removable data storage; and (iv) includes a self-contained power source. Mobile devices may also include voice communication capabilities, on-board sensors that allow the device to capture information, and\/or built-in features for synchronizing local data with remote locations. Examples include smart phones, E-readers, and tablets. Mobile devices are typically associated with a single individual and the device is usually in close proximity to the individual; however, the degree of proximity can vary depending upon on the form factor and size of the device. The processing, storage, and transmission capability of the mobile device may be comparable to or merely a subset of desktop systems, depending upon the nature and intended purpose of the device. Due to the large variety of mobile devices with different technical characteristics and capabilities, organizational restrictions may vary for the different classes\/types of such devices. Usage restrictions and specific implementation guidance for mobile devices include, for example, configuration management, device identification and authentication, implementation of mandatory protective software (e.g., malicious code detection, firewall), scanning devices for malicious code, updating virus protection software, scanning for critical software updates and patches, conducting primary operating system (and possibly other resident software) integrity checks, and disabling unnecessary hardware (e.g., wireless, infrared). Organizations are cautioned that the need to provide adequate security for mobile devices goes beyond the requirements in this control. Many safeguards and countermeasures for mobile devices are reflected in other security controls in the catalog allocated in the initial control baselines as starting points for the development of security plans and overlays using the tailoring process. There may also be some degree of overlap in the requirements articulated by the security controls within the different families of controls. AC-20 addresses mobile devices that are not organization-controlled.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-7","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ca-9","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-43","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ac-19_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-19.a_obj","name":"objective","props":[{"name":"label","value":"AC-19(a)"}],"prose":"establishes for organization-controlled mobile devices:","parts":[{"id":"ac-19.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-19(a)[1]"}],"prose":"usage restrictions;"},{"id":"ac-19.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-19(a)[2]"}],"prose":"configuration\/connection requirement;"},{"id":"ac-19.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-19(a)[3]"}],"prose":"implementation guidance; and"}]},{"id":"ac-19.b_obj","name":"objective","props":[{"name":"label","value":"AC-19(b)"}],"prose":"authorizes the connection of mobile devices to organizational information systems."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing access control for mobile device usage (including restrictions)\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nauthorizations for mobile device connections to organizational information systems\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel using mobile devices to access organizational information systems\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Access control capability authorizing mobile device connections to organizational information systems"}]}],"controls":[{"id":"ac-19.5","class":"SP800-53-enhancement","title":"Full Device \/ Container-based Encryption","params":[{"id":"ac-19.5_prm_1","select":{"choice":["full-device encryption","container encryption"]}},{"id":"ac-19.5_prm_2","label":"organization-defined mobile devices"}],"props":[{"name":"label","value":"AC-19(5)"},{"name":"sort-id","value":"ac-19.05"}],"parts":[{"id":"ac-19.5_smt","name":"statement","prose":"The organization employs {{ insert: param, ac-19.5_prm_1 }} to protect the confidentiality and integrity of information on {{ insert: param, ac-19.5_prm_2 }}."},{"id":"ac-19.5_gdn","name":"guidance","prose":"Container-based encryption provides a more fine-grained approach to the encryption of data\/information on mobile devices, including for example, encrypting selected data structures such as files, records, or fields.","links":[{"href":"#mp-5","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-28","rel":"related"}]},{"id":"ac-19.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-19.5_obj.1","name":"objective","props":[{"name":"label","value":"AC-19(5)[1]"}],"prose":"defines mobile devices for which full-device encryption or container encryption is required to protect the confidentiality and integrity of information on such devices; and"},{"id":"ac-19.5_obj.2","name":"objective","props":[{"name":"label","value":"AC-19(5)[2]"}],"prose":"employs full-device encryption or container encryption to protect the confidentiality and integrity of information on organization-defined mobile devices."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing access control for mobile devices\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nencryption mechanism s and associated configuration documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access control responsibilities for mobile devices\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Encryption mechanisms protecting confidentiality and integrity of information on mobile devices"}]}]}]},{"id":"ac-20","class":"SP800-53","title":"Use of External Information Systems","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-20"},{"name":"sort-id","value":"ac-20"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"}],"parts":[{"id":"ac-20_smt","name":"statement","prose":"The organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and\/or maintaining external information systems, allowing authorized individuals to:","parts":[{"id":"ac-20_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Access the information system from external information systems; and"},{"id":"ac-20_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Process, store, or transmit organization-controlled information using external information systems."}]},{"id":"ac-20_gdn","name":"guidance","prose":"External information systems are information systems or components of information systems that are outside of the authorization boundary established by organizations and for which organizations typically have no direct supervision and authority over the application of required security controls or the assessment of control effectiveness. External information systems include, for example: (i) personally owned information systems\/devices (e.g., notebook computers, smart phones, tablets, personal digital assistants); (ii) privately owned computing and communications devices resident in commercial or public facilities (e.g., hotels, train stations, convention centers, shopping malls, or airports); (iii) information systems owned or controlled by nonfederal governmental organizations; and (iv) federal information systems that are not owned by, operated by, or under the direct supervision and authority of organizations. This control also addresses the use of external information systems for the processing, storage, or transmission of organizational information, including, for example, accessing cloud services (e.g., infrastructure as a service, platform as a service, or software as a service) from organizational information systems. For some external information systems (i.e., information systems operated by other federal agencies, including organizations subordinate to those agencies), the trust relationships that have been established between those organizations and the originating organization may be such, that no explicit terms and conditions are required. Information systems within these organizations would not be considered external. These situations occur when, for example, there are pre-existing sharing\/trust agreements (either implicit or explicit) established between federal agencies or organizations subordinate to those agencies, or when such trust agreements are specified by applicable laws, Executive Orders, directives, or policies. Authorized individuals include, for example, organizational personnel, contractors, or other individuals with authorized access to organizational information systems and over which organizations have the authority to impose rules of behavior with regard to system access. Restrictions that organizations impose on authorized individuals need not be uniform, as those restrictions may vary depending upon the trust relationships between organizations. Therefore, organizations may choose to impose different security restrictions on contractors than on state, local, or tribal governments. This control does not apply to the use of external information systems to access public interfaces to organizational information systems (e.g., individuals accessing federal information through www.usa.gov). Organizations establish terms and conditions for the use of external information systems in accordance with organizational security policies and procedures. Terms and conditions address as a minimum: types of applications that can be accessed on organizational information systems from external information systems; and the highest security category of information that can be processed, stored, or transmitted on external information systems. If terms and conditions with the owners of external information systems cannot be established, organizations may impose restrictions on organizational personnel using those external systems.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sa-9","rel":"related"}]},{"id":"ac-20_obj","name":"objective","prose":"Determine if the organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and\/or maintaining external information systems, allowing authorized individuals to:","parts":[{"id":"ac-20.a_obj","name":"objective","props":[{"name":"label","value":"AC-20(a)"}],"prose":"access the information system from the external information systems; and"},{"id":"ac-20.b_obj","name":"objective","props":[{"name":"label","value":"AC-20(b)"}],"prose":"process, store, or transmit organization-controlled information using external information systems."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing the use of external information systems\n\nexternal information systems terms and conditions\n\nlist of types of applications accessible from external information systems\n\nmaximum security categorization for information processed, stored, or transmitted on external information systems\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining terms and conditions for use of external information systems to access organizational systems\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing terms and conditions on use of external information systems"}]}],"controls":[{"id":"ac-20.1","class":"SP800-53-enhancement","title":"Limits On Authorized Use","props":[{"name":"label","value":"AC-20(1)"},{"name":"sort-id","value":"ac-20.01"}],"parts":[{"id":"ac-20.1_smt","name":"statement","prose":"The organization permits authorized individuals to use an external information system to access the information system or to process, store, or transmit organization-controlled information only when the organization:","parts":[{"id":"ac-20.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Verifies the implementation of required security controls on the external system as specified in the organization’s information security policy and security plan; or"},{"id":"ac-20.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Retains approved information system connection or processing agreements with the organizational entity hosting the external information system."}]},{"id":"ac-20.1_gdn","name":"guidance","prose":"This control enhancement recognizes that there are circumstances where individuals using external information systems (e.g., contractors, coalition partners) need to access organizational information systems. In those situations, organizations need confidence that the external information systems contain the necessary security safeguards (i.e., security controls), so as not to compromise, damage, or otherwise harm organizational information systems. Verification that the required security controls have been implemented can be achieved, for example, by third-party, independent assessments, attestations, or other means, depending on the confidence level required by organizations.","links":[{"href":"#ca-2","rel":"related"}]},{"id":"ac-20.1_obj","name":"objective","prose":"Determine if the organization permits authorized individuals to use an external information system to access the information system or to process, store, or transmit organization-controlled information only when the organization:","parts":[{"id":"ac-20.1.a_obj","name":"objective","props":[{"name":"label","value":"AC-20(1)(a)"}],"prose":"verifies the implementation of required security controls on the external system as specified in the organization’s information security policy and security plan; or","links":[{"href":"#ac-20.1_smt.a","rel":"corresp"}]},{"id":"ac-20.1.b_obj","name":"objective","props":[{"name":"label","value":"AC-20(1)(b)"}],"prose":"retains approved information system connection or processing agreements with the organizational entity hosting the external information system.","links":[{"href":"#ac-20.1_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing the use of external information systems\n\nsecurity plan\n\ninformation system connection or processing agreements\n\naccount management documents\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing limits on use of external information systems"}]}]},{"id":"ac-20.2","class":"SP800-53-enhancement","title":"Portable Storage Devices","params":[{"id":"ac-20.2_prm_1","select":{"choice":["restricts","prohibits"]}}],"props":[{"name":"label","value":"AC-20(2)"},{"name":"sort-id","value":"ac-20.02"}],"parts":[{"id":"ac-20.2_smt","name":"statement","prose":"The organization {{ insert: param, ac-20.2_prm_1 }} the use of organization-controlled portable storage devices by authorized individuals on external information systems."},{"id":"ac-20.2_gdn","name":"guidance","prose":"Limits on the use of organization-controlled portable storage devices in external information systems include, for example, complete prohibition of the use of such devices or restrictions on how the devices may be used and under what conditions the devices may be used."},{"id":"ac-20.2_obj","name":"objective","prose":"Determine if the organization restricts or prohibits the use of organization-controlled portable storage devices by authorized individuals on external information systems."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing the use of external information systems\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\ninformation system connection or processing agreements\n\naccount management documents\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for restricting or prohibiting use of organization-controlled storage devices on external information systems\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing restrictions on use of portable storage devices"}]}]}]},{"id":"ac-21","class":"SP800-53","title":"Information Sharing","params":[{"id":"ac-21_prm_1","label":"organization-defined information sharing circumstances where user discretion is required"},{"id":"ac-21_prm_2","label":"organization-defined automated mechanisms or manual processes"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"AC-21"},{"name":"sort-id","value":"ac-21"}],"parts":[{"id":"ac-21_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-21_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Facilitates information sharing by enabling authorized users to determine whether access authorizations assigned to the sharing partner match the access restrictions on the information for {{ insert: param, ac-21_prm_1 }}; and"},{"id":"ac-21_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Employs {{ insert: param, ac-21_prm_2 }} to assist users in making information sharing\/collaboration decisions."}]},{"id":"ac-21_gdn","name":"guidance","prose":"This control applies to information that may be restricted in some manner (e.g., privileged medical information, contract-sensitive information, proprietary information, personally identifiable information, classified information related to special access programs or compartments) based on some formal or administrative determination. Depending on the particular information-sharing circumstances, sharing partners may be defined at the individual, group, or organizational level. Information may be defined by content, type, security category, or special access program\/compartment.","links":[{"href":"#ac-3","rel":"related"}]},{"id":"ac-21_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-21.a_obj","name":"objective","props":[{"name":"label","value":"AC-21(a)"}],"parts":[{"id":"ac-21.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-21(a)[1]"}],"prose":"defines information sharing circumstances where user discretion is required;"},{"id":"ac-21.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-21(a)[2]"}],"prose":"facilitates information sharing by enabling authorized users to determine whether access authorizations assigned to the sharing partner match the access restrictions on the information for organization-defined information sharing circumstances;"}]},{"id":"ac-21.b_obj","name":"objective","props":[{"name":"label","value":"AC-21(b)"}],"parts":[{"id":"ac-21.b_obj.1","name":"objective","props":[{"name":"label","value":"AC-21(b)[1]"}],"prose":"defines automated mechanisms or manual processes to be employed to assist users in making information sharing\/collaboration decisions; and"},{"id":"ac-21.b_obj.2","name":"objective","props":[{"name":"label","value":"AC-21(b)[2]"}],"prose":"employs organization-defined automated mechanisms or manual processes to assist users in making information sharing\/collaboration decisions."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing user-based collaboration and information sharing (including restrictions)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of users authorized to make information sharing\/collaboration decisions\n\nlist of information sharing circumstances requiring user discretion\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel responsible for making information sharing\/collaboration decisions\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms or manual process implementing access authorizations supporting information sharing\/user collaboration decisions"}]}]},{"id":"ac-22","class":"SP800-53","title":"Publicly Accessible Content","params":[{"id":"ac-22_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AC-22"},{"name":"sort-id","value":"ac-22"}],"parts":[{"id":"ac-22_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-22_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Designates individuals authorized to post information onto a publicly accessible information system;"},{"id":"ac-22_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Trains authorized individuals to ensure that publicly accessible information does not contain nonpublic information;"},{"id":"ac-22_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included; and"},{"id":"ac-22_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Reviews the content on the publicly accessible information system for nonpublic information {{ insert: param, ac-22_prm_1 }} and removes such information, if discovered."}]},{"id":"ac-22_gdn","name":"guidance","prose":"In accordance with federal laws, Executive Orders, directives, policies, regulations, standards, and\/or guidance, the general public is not authorized access to nonpublic information (e.g., information protected under the Privacy Act and proprietary information). This control addresses information systems that are controlled by the organization and accessible to the general public, typically without identification or authentication. The posting of information on non-organization information systems is covered by organizational policy.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#au-13","rel":"related"}]},{"id":"ac-22_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-22.a_obj","name":"objective","props":[{"name":"label","value":"AC-22(a)"}],"prose":"designates individuals authorized to post information onto a publicly accessible information system;"},{"id":"ac-22.b_obj","name":"objective","props":[{"name":"label","value":"AC-22(b)"}],"prose":"trains authorized individuals to ensure that publicly accessible information does not contain nonpublic information;"},{"id":"ac-22.c_obj","name":"objective","props":[{"name":"label","value":"AC-22(c)"}],"prose":"reviews the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included;"},{"id":"ac-22.d_obj","name":"objective","props":[{"name":"label","value":"AC-22(d)"}],"parts":[{"id":"ac-22.d_obj.1","name":"objective","props":[{"name":"label","value":"AC-22(d)[1]"}],"prose":"defines the frequency to review the content on the publicly accessible information system for nonpublic information;"},{"id":"ac-22.d_obj.2","name":"objective","props":[{"name":"label","value":"AC-22(d)[2]"}],"prose":"reviews the content on the publicly accessible information system for nonpublic information with the organization-defined frequency; and"},{"id":"ac-22.d_obj.3","name":"objective","props":[{"name":"label","value":"AC-22(d)[3]"}],"prose":"removes nonpublic information from the publicly accessible information system, if discovered."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing publicly accessible content\n\nlist of users authorized to post publicly accessible content on organizational information systems\n\ntraining materials and\/or records\n\nrecords of publicly accessible information reviews\n\nrecords of response to nonpublic information on public websites\n\nsystem audit logs\n\nsecurity awareness training records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing publicly accessible information posted on organizational information systems\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing management of publicly accessible content"}]}]}]},{"id":"at","class":"family","title":"Awareness and Training","controls":[{"id":"at-1","class":"SP800-53","title":"Security Awareness and Training Policy and Procedures","params":[{"id":"at-1_prm_1","label":"organization-defined personnel or roles"},{"id":"at-1_prm_2","label":"organization-defined frequency"},{"id":"at-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AT-1"},{"name":"sort-id","value":"at-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"at-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"at-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, at-1_prm_1 }}:","parts":[{"id":"at-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A security awareness and training policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"at-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the security awareness and training policy and associated security awareness and training controls; and"}]},{"id":"at-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"at-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security awareness and training policy {{ insert: param, at-1_prm_2 }}; and"},{"id":"at-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Security awareness and training procedures {{ insert: param, at-1_prm_3 }}."}]}]},{"id":"at-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the AT family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"at-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-1.a_obj","name":"objective","props":[{"name":"label","value":"AT-1(a)"}],"parts":[{"id":"at-1.a.1_obj","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)"}],"parts":[{"id":"at-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1]"}],"prose":"develops and documents an security awareness and training policy that addresses:","parts":[{"id":"at-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"at-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"at-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"at-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"at-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"at-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"at-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"at-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the security awareness and training policy are to be disseminated;"},{"id":"at-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[3]"}],"prose":"disseminates the security awareness and training policy to organization-defined personnel or roles;"}]},{"id":"at-1.a.2_obj","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)"}],"parts":[{"id":"at-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the security awareness and training policy and associated awareness and training controls;"},{"id":"at-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"at-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"at-1.b_obj","name":"objective","props":[{"name":"label","value":"AT-1(b)"}],"parts":[{"id":"at-1.b.1_obj","name":"objective","props":[{"name":"label","value":"AT-1(b)(1)"}],"parts":[{"id":"at-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current security awareness and training policy;"},{"id":"at-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(b)(1)[2]"}],"prose":"reviews and updates the current security awareness and training policy with the organization-defined frequency;"}]},{"id":"at-1.b.2_obj","name":"objective","props":[{"name":"label","value":"AT-1(b)(2)"}],"parts":[{"id":"at-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current security awareness and training procedures; and"},{"id":"at-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(b)(2)[2]"}],"prose":"reviews and updates the current security awareness and training procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security awareness and training responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"at-2","class":"SP800-53","title":"Security Awareness Training","params":[{"id":"at-2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AT-2"},{"name":"sort-id","value":"at-02"}],"links":[{"href":"#bb61234b-46c3-4211-8c2b-9869222a720d","rel":"reference"},{"href":"#c5034e0c-eba6-4ecd-a541-79f0678f4ba4","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"at-2_smt","name":"statement","prose":"The organization provides basic security awareness training to information system users (including managers, senior executives, and contractors):","parts":[{"id":"at-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"As part of initial training for new users;"},{"id":"at-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"at-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, at-2_prm_1 }} thereafter."}]},{"id":"at-2_gdn","name":"guidance","prose":"Organizations determine the appropriate content of security awareness training and security awareness techniques based on the specific organizational requirements and the information systems to which personnel have authorized access. The content includes a basic understanding of the need for information security and user actions to maintain security and to respond to suspected security incidents. The content also addresses awareness of the need for operations security. Security awareness techniques can include, for example, displaying posters, offering supplies inscribed with security reminders, generating email advisories\/notices from senior organizational officials, displaying logon screen messages, and conducting information security awareness events.","links":[{"href":"#at-3","rel":"related"},{"href":"#at-4","rel":"related"},{"href":"#pl-4","rel":"related"}]},{"id":"at-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-2.a_obj","name":"objective","props":[{"name":"label","value":"AT-2(a)"}],"prose":"provides basic security awareness training to information system users (including managers, senior executives, and contractors) as part of initial training for new users;"},{"id":"at-2.b_obj","name":"objective","props":[{"name":"label","value":"AT-2(b)"}],"prose":"provides basic security awareness training to information system users (including managers, senior executives, and contractors) when required by information system changes; and"},{"id":"at-2.c_obj","name":"objective","props":[{"name":"label","value":"AT-2(c)"}],"parts":[{"id":"at-2.c_obj.1","name":"objective","props":[{"name":"label","value":"AT-2(c)[1]"}],"prose":"defines the frequency to provide refresher security awareness training thereafter to information system users (including managers, senior executives, and contractors); and"},{"id":"at-2.c_obj.2","name":"objective","props":[{"name":"label","value":"AT-2(c)[2]"}],"prose":"provides refresher security awareness training to information users (including managers, senior executives, and contractors) with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security awareness training implementation\n\nappropriate codes of federal regulations\n\nsecurity awareness training curriculum\n\nsecurity awareness training materials\n\nsecurity plan\n\ntraining records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for security awareness training\n\norganizational personnel with information security responsibilities\n\norganizational personnel comprising the general information system user community"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms managing security awareness training"}]}],"controls":[{"id":"at-2.2","class":"SP800-53-enhancement","title":"Insider Threat","props":[{"name":"label","value":"AT-2(2)"},{"name":"sort-id","value":"at-02.02"}],"parts":[{"id":"at-2.2_smt","name":"statement","prose":"The organization includes security awareness training on recognizing and reporting potential indicators of insider threat."},{"id":"at-2.2_gdn","name":"guidance","prose":"Potential indicators and possible precursors of insider threat can include behaviors such as inordinate, long-term job dissatisfaction, attempts to gain access to information not required for job performance, unexplained access to financial resources, bullying or sexual harassment of fellow employees, workplace violence, and other serious violations of organizational policies, procedures, directives, rules, or practices. Security awareness training includes how to communicate employee and management concerns regarding potential indicators of insider threat through appropriate organizational channels in accordance with established organizational policies and procedures.","links":[{"href":"#pl-4","rel":"related"},{"href":"#pm-12","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ps-6","rel":"related"}]},{"id":"at-2.2_obj","name":"objective","prose":"Determine if the organization includes security awareness training on recognizing and reporting potential indicators of insider threat."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security awareness training implementation\n\nsecurity awareness training curriculum\n\nsecurity awareness training materials\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel that participate in security awareness training\n\norganizational personnel with responsibilities for basic security awareness training\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"at-3","class":"SP800-53","title":"Role-based Security Training","params":[{"id":"at-3_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AT-3"},{"name":"sort-id","value":"at-03"}],"links":[{"href":"#bb61234b-46c3-4211-8c2b-9869222a720d","rel":"reference"},{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"at-3_smt","name":"statement","prose":"The organization provides role-based security training to personnel with assigned security roles and responsibilities:","parts":[{"id":"at-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Before authorizing access to the information system or performing assigned duties;"},{"id":"at-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"at-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, at-3_prm_1 }} thereafter."}]},{"id":"at-3_gdn","name":"guidance","prose":"Organizations determine the appropriate content of security training based on the assigned roles and responsibilities of individuals and the specific security requirements of organizations and the information systems to which personnel have authorized access. In addition, organizations provide enterprise architects, information system developers, software developers, acquisition\/procurement officials, information system managers, system\/network administrators, personnel conducting configuration management and auditing activities, personnel performing independent verification and validation activities, security control assessors, and other personnel having access to system-level software, adequate security-related technical training specifically tailored for their assigned duties. Comprehensive role-based training addresses management, operational, and technical roles and responsibilities covering physical, personnel, and technical safeguards and countermeasures. Such training can include for example, policies, procedures, tools, and artifacts for the organizational security roles defined. Organizations also provide the training necessary for individuals to carry out their responsibilities related to operations and supply chain security within the context of organizational information security programs. Role-based security training also applies to contractors providing services to federal agencies.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-4","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#ps-7","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#sa-16","rel":"related"}]},{"id":"at-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-3.a_obj","name":"objective","props":[{"name":"label","value":"AT-3(a)"}],"prose":"provides role-based security training to personnel with assigned security roles and responsibilities before authorizing access to the information system or performing assigned duties;"},{"id":"at-3.b_obj","name":"objective","props":[{"name":"label","value":"AT-3(b)"}],"prose":"provides role-based security training to personnel with assigned security roles and responsibilities when required by information system changes; and"},{"id":"at-3.c_obj","name":"objective","props":[{"name":"label","value":"AT-3(c)"}],"parts":[{"id":"at-3.c_obj.1","name":"objective","props":[{"name":"label","value":"AT-3(c)[1]"}],"prose":"defines the frequency to provide refresher role-based security training thereafter to personnel with assigned security roles and responsibilities; and"},{"id":"at-3.c_obj.2","name":"objective","props":[{"name":"label","value":"AT-3(c)[2]"}],"prose":"provides refresher role-based security training to personnel with assigned security roles and responsibilities with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security training implementation\n\ncodes of federal regulations\n\nsecurity training curriculum\n\nsecurity training materials\n\nsecurity plan\n\ntraining records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for role-based security training\n\norganizational personnel with assigned information system security roles and responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms managing role-based security training"}]}]},{"id":"at-4","class":"SP800-53","title":"Security Training Records","params":[{"id":"at-4_prm_1","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AT-4"},{"name":"sort-id","value":"at-04"}],"parts":[{"id":"at-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"at-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Documents and monitors individual information system security training activities including basic security awareness training and specific information system security training; and"},{"id":"at-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Retains individual training records for {{ insert: param, at-4_prm_1 }}."}]},{"id":"at-4_gdn","name":"guidance","prose":"Documentation for specialized training may be maintained by individual supervisors at the option of the organization.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#pm-14","rel":"related"}]},{"id":"at-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-4.a_obj","name":"objective","props":[{"name":"label","value":"AT-4(a)"}],"parts":[{"id":"at-4.a_obj.1","name":"objective","props":[{"name":"label","value":"AT-4(a)[1]"}],"prose":"documents individual information system security training activities including:","parts":[{"id":"at-4.a_obj.1.a","name":"objective","props":[{"name":"label","value":"AT-4(a)[1][a]"}],"prose":"basic security awareness training;"},{"id":"at-4.a_obj.1.b","name":"objective","props":[{"name":"label","value":"AT-4(a)[1][b]"}],"prose":"specific role-based information system security training;"}]},{"id":"at-4.a_obj.2","name":"objective","props":[{"name":"label","value":"AT-4(a)[2]"}],"prose":"monitors individual information system security training activities including:","parts":[{"id":"at-4.a_obj.2.a","name":"objective","props":[{"name":"label","value":"AT-4(a)[2][a]"}],"prose":"basic security awareness training;"},{"id":"at-4.a_obj.2.b","name":"objective","props":[{"name":"label","value":"AT-4(a)[2][b]"}],"prose":"specific role-based information system security training;"}]}]},{"id":"at-4.b_obj","name":"objective","props":[{"name":"label","value":"AT-4(b)"}],"parts":[{"id":"at-4.b_obj.1","name":"objective","props":[{"name":"label","value":"AT-4(b)[1]"}],"prose":"defines a time period to retain individual training records; and"},{"id":"at-4.b_obj.2","name":"objective","props":[{"name":"label","value":"AT-4(b)[2]"}],"prose":"retains individual training records for the organization-defined time period."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security training records\n\nsecurity awareness and training records\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security training record retention responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting management of security training records"}]}]}]},{"id":"au","class":"family","title":"Audit and Accountability","controls":[{"id":"au-1","class":"SP800-53","title":"Audit and Accountability Policy and Procedures","params":[{"id":"au-1_prm_1","label":"organization-defined personnel or roles"},{"id":"au-1_prm_2","label":"organization-defined frequency"},{"id":"au-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-1"},{"name":"sort-id","value":"au-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"au-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"au-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, au-1_prm_1 }}:","parts":[{"id":"au-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An audit and accountability policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"au-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls; and"}]},{"id":"au-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"au-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Audit and accountability policy {{ insert: param, au-1_prm_2 }}; and"},{"id":"au-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Audit and accountability procedures {{ insert: param, au-1_prm_3 }}."}]}]},{"id":"au-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the AU family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"au-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-1.a_obj","name":"objective","props":[{"name":"label","value":"AU-1(a)"}],"parts":[{"id":"au-1.a.1_obj","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)"}],"parts":[{"id":"au-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1]"}],"prose":"develops and documents an audit and accountability policy that addresses:","parts":[{"id":"au-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"au-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"au-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"au-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"au-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"au-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"au-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"au-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the audit and accountability policy are to be disseminated;"},{"id":"au-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[3]"}],"prose":"disseminates the audit and accountability policy to organization-defined personnel or roles;"}]},{"id":"au-1.a.2_obj","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)"}],"parts":[{"id":"au-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls;"},{"id":"au-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"au-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"au-1.b_obj","name":"objective","props":[{"name":"label","value":"AU-1(b)"}],"parts":[{"id":"au-1.b.1_obj","name":"objective","props":[{"name":"label","value":"AU-1(b)(1)"}],"parts":[{"id":"au-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current audit and accountability policy;"},{"id":"au-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(b)(1)[2]"}],"prose":"reviews and updates the current audit and accountability policy with the organization-defined frequency;"}]},{"id":"au-1.b.2_obj","name":"objective","props":[{"name":"label","value":"AU-1(b)(2)"}],"parts":[{"id":"au-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current audit and accountability procedures; and"},{"id":"au-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(b)(2)[2]"}],"prose":"reviews and updates the current audit and accountability procedures in accordance with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"au-2","class":"SP800-53","title":"Audit Events","params":[{"id":"au-2_prm_1","label":"organization-defined auditable events"},{"id":"au-2_prm_2","label":"organization-defined audited events (the subset of the auditable events defined in AU-2 a.) along with the frequency of (or situation requiring) auditing for each identified event"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-2"},{"name":"sort-id","value":"au-02"}],"links":[{"href":"#672fd561-b92b-4713-b9cf-6c9d9456728b","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"au-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"au-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Determines that the information system is capable of auditing the following events: {{ insert: param, au-2_prm_1 }};"},{"id":"au-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events;"},{"id":"au-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Provides a rationale for why the auditable events are deemed to be adequate to support after-the-fact investigations of security incidents; and"},{"id":"au-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Determines that the following events are to be audited within the information system: {{ insert: param, au-2_prm_2 }}."}]},{"id":"au-2_gdn","name":"guidance","prose":"An event is any observable occurrence in an organizational information system. Organizations identify audit events as those events which are significant and relevant to the security of information systems and the environments in which those systems operate in order to meet specific and ongoing audit needs. Audit events can include, for example, password changes, failed logons, or failed accesses related to information systems, administrative privilege usage, PIV credential usage, or third-party credential usage. In determining the set of auditable events, organizations consider the auditing appropriate for each of the security controls to be implemented. To balance auditing requirements with other information system needs, this control also requires identifying that subset of auditable events that are audited at a given point in time. For example, organizations may determine that information systems must have the capability to log every file access both successful and unsuccessful, but not activate that capability except for specific circumstances due to the potential burden on system performance. Auditing requirements, including the need for auditable events, may be referenced in other security controls and control enhancements. Organizations also include auditable events that are required by applicable federal laws, Executive Orders, directives, policies, regulations, and standards. Audit records can be generated at various levels of abstraction, including at the packet level as information traverses the network. Selecting the appropriate level of abstraction is a critical aspect of an audit capability and can facilitate the identification of root causes to problems. Organizations consider in the definition of auditable events, the auditing necessary to cover related events such as the steps in distributed, transaction-based processes (e.g., processes that are distributed across multiple organizations) and actions that occur in service-oriented architectures.","links":[{"href":"#ac-6","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"au-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-2.a_obj","name":"objective","props":[{"name":"label","value":"AU-2(a)"}],"parts":[{"id":"au-2.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-2(a)[1]"}],"prose":"defines the auditable events that the information system must be capable of auditing;"},{"id":"au-2.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-2(a)[2]"}],"prose":"determines that the information system is capable of auditing organization-defined auditable events;"}]},{"id":"au-2.b_obj","name":"objective","props":[{"name":"label","value":"AU-2(b)"}],"prose":"coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events;"},{"id":"au-2.c_obj","name":"objective","props":[{"name":"label","value":"AU-2(c)"}],"prose":"provides a rationale for why the auditable events are deemed to be adequate to support after-the-fact investigations of security incidents;"},{"id":"au-2.d_obj","name":"objective","props":[{"name":"label","value":"AU-2(d)"}],"parts":[{"id":"au-2.d_obj.1","name":"objective","props":[{"name":"label","value":"AU-2(d)[1]"}],"prose":"defines the subset of auditable events defined in AU-2a that are to be audited within the information system;"},{"id":"au-2.d_obj.2","name":"objective","props":[{"name":"label","value":"AU-2(d)[2]"}],"prose":"determines that the subset of auditable events defined in AU-2a are to be audited within the information system; and"},{"id":"au-2.d_obj.3","name":"objective","props":[{"name":"label","value":"AU-2(d)[3]"}],"prose":"determines the frequency of (or situation requiring) auditing for each identified event."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing auditable events\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\ninformation system auditable events\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information system auditing"}]}],"controls":[{"id":"au-2.3","class":"SP800-53-enhancement","title":"Reviews and Updates","params":[{"id":"au-2.3_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"AU-2(3)"},{"name":"sort-id","value":"au-02.03"}],"parts":[{"id":"au-2.3_smt","name":"statement","prose":"The organization reviews and updates the audited events {{ insert: param, au-2.3_prm_1 }}."},{"id":"au-2.3_gdn","name":"guidance","prose":"Over time, the events that organizations believe should be audited may change. Reviewing and updating the set of audited events periodically is necessary to ensure that the current set is still necessary and sufficient."},{"id":"au-2.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-2.3_obj.1","name":"objective","props":[{"name":"label","value":"AU-2(3)[1]"}],"prose":"defines the frequency to review and update the audited events; and"},{"id":"au-2.3_obj.2","name":"objective","props":[{"name":"label","value":"AU-2(3)[2]"}],"prose":"reviews and updates the auditable events with organization-defined frequency."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing auditable events\n\nsecurity plan\n\nlist of organization-defined auditable events\n\nauditable events review and update records\n\ninformation system audit records\n\ninformation system incident reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting review and update of auditable events"}]}]}]},{"id":"au-3","class":"SP800-53","title":"Content of Audit Records","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-3"},{"name":"sort-id","value":"au-03"}],"parts":[{"id":"au-3_smt","name":"statement","prose":"The information system generates audit records containing information that establishes what type of event occurred, when the event occurred, where the event occurred, the source of the event, the outcome of the event, and the identity of any individuals or subjects associated with the event."},{"id":"au-3_gdn","name":"guidance","prose":"Audit record content that may be necessary to satisfy the requirement of this control, includes, for example, time stamps, source and destination addresses, user\/process identifiers, event descriptions, success\/fail indications, filenames involved, and access control or flow control rules invoked. Event outcomes can include indicators of event success or failure and event-specific results (e.g., the security state of the information system after the event occurred).","links":[{"href":"#au-2","rel":"related"},{"href":"#au-8","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#si-11","rel":"related"}]},{"id":"au-3_obj","name":"objective","prose":"Determine if the information system generates audit records containing information that establishes:","parts":[{"id":"au-3_obj.1","name":"objective","props":[{"name":"label","value":"AU-3[1]"}],"prose":"what type of event occurred;"},{"id":"au-3_obj.2","name":"objective","props":[{"name":"label","value":"AU-3[2]"}],"prose":"when the event occurred;"},{"id":"au-3_obj.3","name":"objective","props":[{"name":"label","value":"AU-3[3]"}],"prose":"where the event occurred;"},{"id":"au-3_obj.4","name":"objective","props":[{"name":"label","value":"AU-3[4]"}],"prose":"the source of the event;"},{"id":"au-3_obj.5","name":"objective","props":[{"name":"label","value":"AU-3[5]"}],"prose":"the outcome of the event; and"},{"id":"au-3_obj.6","name":"objective","props":[{"name":"label","value":"AU-3[6]"}],"prose":"the identity of any individuals or subjects associated with the event."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing content of audit records\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of organization-defined auditable events\n\ninformation system audit records\n\ninformation system incident reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information system auditing of auditable events"}]}],"controls":[{"id":"au-3.1","class":"SP800-53-enhancement","title":"Additional Audit Information","params":[{"id":"au-3.1_prm_1","label":"organization-defined additional, more detailed information"}],"props":[{"name":"label","value":"AU-3(1)"},{"name":"sort-id","value":"au-03.01"}],"parts":[{"id":"au-3.1_smt","name":"statement","prose":"The information system generates audit records containing the following additional information: {{ insert: param, au-3.1_prm_1 }}."},{"id":"au-3.1_gdn","name":"guidance","prose":"Detailed information that organizations may consider in audit records includes, for example, full text recording of privileged commands or the individual identities of group account users. Organizations consider limiting the additional audit information to only that information explicitly needed for specific audit requirements. This facilitates the use of audit trails and audit logs by not including information that could potentially be misleading or could make it more difficult to locate information of interest."},{"id":"au-3.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-3.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-3(1)[1]"}],"prose":"the organization defines additional, more detailed information to be contained in audit records that the information system generates; and"},{"id":"au-3.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-3(1)[2]"}],"prose":"the information system generates audit records containing the organization-defined additional, more detailed information."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing content of audit records\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of organization-defined auditable events\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Information system audit capability"}]}]},{"id":"au-3.2","class":"SP800-53-enhancement","title":"Centralized Management of Planned Audit Record Content","params":[{"id":"au-3.2_prm_1","label":"organization-defined information system components"}],"props":[{"name":"label","value":"AU-3(2)"},{"name":"sort-id","value":"au-03.02"}],"parts":[{"id":"au-3.2_smt","name":"statement","prose":"The information system provides centralized management and configuration of the content to be captured in audit records generated by {{ insert: param, au-3.2_prm_1 }}."},{"id":"au-3.2_gdn","name":"guidance","prose":"This control enhancement requires that the content to be captured in audit records be configured from a central location (necessitating automation). Organizations coordinate the selection of required audit content to support the centralized management and configuration capability provided by the information system.","links":[{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"}]},{"id":"au-3.2_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-3.2_obj.1","name":"objective","props":[{"name":"label","value":"AU-3(2)[1]"}],"prose":"the organization defines information system components that generate audit records whose content is to be centrally managed and configured by the information system; and"},{"id":"au-3.2_obj.2","name":"objective","props":[{"name":"label","value":"AU-3(2)[2]"}],"prose":"the information system provides centralized management and configuration of the content to be captured in audit records generated by the organization-defined information system components."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing content of audit records\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of organization-defined auditable events\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Information system capability implementing centralized management and configuration of audit record content"}]}]}]},{"id":"au-4","class":"SP800-53","title":"Audit Storage Capacity","params":[{"id":"au-4_prm_1","label":"organization-defined audit record storage requirements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-4"},{"name":"sort-id","value":"au-04"}],"parts":[{"id":"au-4_smt","name":"statement","prose":"The organization allocates audit record storage capacity in accordance with {{ insert: param, au-4_prm_1 }}."},{"id":"au-4_gdn","name":"guidance","prose":"Organizations consider the types of auditing to be performed and the audit processing requirements when allocating audit storage capacity. Allocating sufficient audit storage capacity reduces the likelihood of such capacity being exceeded and resulting in the potential loss or reduction of auditing capability.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-5","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"},{"href":"#au-11","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"au-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-4_obj.1","name":"objective","props":[{"name":"label","value":"AU-4[1]"}],"prose":"defines audit record storage requirements; and"},{"id":"au-4_obj.2","name":"objective","props":[{"name":"label","value":"AU-4[2]"}],"prose":"allocates audit record storage capacity in accordance with the organization-defined audit record storage requirements."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit storage capacity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit record storage requirements\n\naudit record storage capability for information system components\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Audit record storage capacity and related configuration settings"}]}]},{"id":"au-5","class":"SP800-53","title":"Response to Audit Processing Failures","params":[{"id":"au-5_prm_1","label":"organization-defined personnel or roles"},{"id":"au-5_prm_2","label":"organization-defined actions to be taken (e.g., shut down information system, overwrite oldest audit records, stop generating audit records)"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-5"},{"name":"sort-id","value":"au-05"}],"parts":[{"id":"au-5_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Alerts {{ insert: param, au-5_prm_1 }} in the event of an audit processing failure; and"},{"id":"au-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Takes the following additional actions: {{ insert: param, au-5_prm_2 }}."}]},{"id":"au-5_gdn","name":"guidance","prose":"Audit processing failures include, for example, software\/hardware errors, failures in the audit capturing mechanisms, and audit storage capacity being reached or exceeded. Organizations may choose to define additional actions for different audit processing failures (e.g., by type, by location, by severity, or a combination of such factors). This control applies to each audit data storage repository (i.e., distinct information system component where audit records are stored), the total audit storage capacity of organizations (i.e., all audit data storage repositories combined), or both.","links":[{"href":"#au-4","rel":"related"},{"href":"#si-12","rel":"related"}]},{"id":"au-5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-5.a_obj","name":"objective","props":[{"name":"label","value":"AU-5(a)"}],"parts":[{"id":"au-5.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-5(a)[1]"}],"prose":"the organization defines the personnel or roles to be alerted in the event of an audit processing failure;"},{"id":"au-5.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-5(a)[2]"}],"prose":"the information system alerts the organization-defined personnel or roles in the event of an audit processing failure;"}]},{"id":"au-5.b_obj","name":"objective","props":[{"name":"label","value":"AU-5(b)"}],"parts":[{"id":"au-5.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-5(b)[1]"}],"prose":"the organization defines additional actions to be taken (e.g., shutdown information system, overwrite oldest audit records, stop generating audit records) in the event of an audit processing failure; and"},{"id":"au-5.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-5(b)[2]"}],"prose":"the information system takes the additional organization-defined actions in the event of an audit processing failure."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing response to audit processing failures\n\ninformation system design documentation\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\nlist of personnel to be notified in case of an audit processing failure\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information system response to audit processing failures"}]}],"controls":[{"id":"au-5.1","class":"SP800-53-enhancement","title":"Audit Storage Capacity","params":[{"id":"au-5.1_prm_1","label":"organization-defined personnel, roles, and\/or locations"},{"id":"au-5.1_prm_2","label":"organization-defined time period"},{"id":"au-5.1_prm_3","label":"organization-defined percentage"}],"props":[{"name":"label","value":"AU-5(1)"},{"name":"sort-id","value":"au-05.01"}],"parts":[{"id":"au-5.1_smt","name":"statement","prose":"The information system provides a warning to {{ insert: param, au-5.1_prm_1 }} within {{ insert: param, au-5.1_prm_2 }} when allocated audit record storage volume reaches {{ insert: param, au-5.1_prm_3 }} of repository maximum audit record storage capacity."},{"id":"au-5.1_gdn","name":"guidance","prose":"Organizations may have multiple audit data storage repositories distributed across multiple information system components, with each repository having different storage volume capacities."},{"id":"au-5.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-5.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-5(1)[1]"}],"prose":"the organization defines:","parts":[{"id":"au-5.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AU-5(1)[1][a]"}],"prose":"personnel to be warned when allocated audit record storage volume reaches organization-defined percentage of repository maximum audit record storage capacity;"},{"id":"au-5.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AU-5(1)[1][b]"}],"prose":"roles to be warned when allocated audit record storage volume reaches organization-defined percentage of repository maximum audit record storage capacity; and\/or"},{"id":"au-5.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AU-5(1)[1][c]"}],"prose":"locations to be warned when allocated audit record storage volume reaches organization-defined percentage of repository maximum audit record storage capacity;"}]},{"id":"au-5.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-5(1)[2]"}],"prose":"the organization defines the time period within which the information system is to provide a warning to the organization-defined personnel, roles, and\/or locations when allocated audit record storage volume reaches the organization-defined percentage of repository maximum audit record storage capacity;"},{"id":"au-5.1_obj.3","name":"objective","props":[{"name":"label","value":"AU-5(1)[3]"}],"prose":"the organization defines the percentage of repository maximum audit record storage capacity that, if reached, requires a warning to be provided; and"},{"id":"au-5.1_obj.4","name":"objective","props":[{"name":"label","value":"AU-5(1)[4]"}],"prose":"the information system provides a warning to the organization-defined personnel, roles, and\/or locations within the organization-defined time period when allocated audit record storage volume reaches the organization-defined percentage of repository maximum audit record storage capacity."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing response to audit processing failures\n\ninformation system design documentation\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing audit storage limit warnings"}]}]},{"id":"au-5.2","class":"SP800-53-enhancement","title":"Real-time Alerts","params":[{"id":"au-5.2_prm_1","label":"organization-defined real-time period"},{"id":"au-5.2_prm_2","label":"organization-defined personnel, roles, and\/or locations"},{"id":"au-5.2_prm_3","label":"organization-defined audit failure events requiring real-time alerts"}],"props":[{"name":"label","value":"AU-5(2)"},{"name":"sort-id","value":"au-05.02"}],"parts":[{"id":"au-5.2_smt","name":"statement","prose":"The information system provides an alert in {{ insert: param, au-5.2_prm_1 }} to {{ insert: param, au-5.2_prm_2 }} when the following audit failure events occur: {{ insert: param, au-5.2_prm_3 }}."},{"id":"au-5.2_gdn","name":"guidance","prose":"Alerts provide organizations with urgent messages. Real-time alerts provide these messages at information technology speed (i.e., the time from event detection to alert occurs in seconds or less)."},{"id":"au-5.2_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-5.2_obj.1","name":"objective","props":[{"name":"label","value":"AU-5(2)[1]"}],"prose":"the organization defines audit failure events requiring real-time alerts;"},{"id":"au-5.2_obj.2","name":"objective","props":[{"name":"label","value":"AU-5(2)[2]"}],"prose":"the organization defines:","parts":[{"id":"au-5.2_obj.2.a","name":"objective","props":[{"name":"label","value":"AU-5(2)[2][a]"}],"prose":"personnel to be alerted when organization-defined audit failure events requiring real-time alerts occur;"},{"id":"au-5.2_obj.2.b","name":"objective","props":[{"name":"label","value":"AU-5(2)[2][b]"}],"prose":"roles to be alerted when organization-defined audit failure events requiring real-time alerts occur; and\/or"},{"id":"au-5.2_obj.2.c","name":"objective","props":[{"name":"label","value":"AU-5(2)[2][c]"}],"prose":"locations to be alerted when organization-defined audit failure events requiring real-time alerts occur;"}]},{"id":"au-5.2_obj.3","name":"objective","props":[{"name":"label","value":"AU-5(2)[3]"}],"prose":"the organization defines the real-time period within which the information system is to provide an alert to the organization-defined personnel, roles, and\/or locations when the organization-defined audit failure events requiring real-time alerts occur; and"},{"id":"au-5.2_obj.4","name":"objective","props":[{"name":"label","value":"AU-5(2)[4]"}],"prose":"the information system provides an alert within the organization-defined real-time period to the organization-defined personnel, roles, and\/or locations when organization-defined audit failure events requiring real-time alerts occur."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing response to audit processing failures\n\ninformation system design documentation\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\nrecords of notifications or real-time alerts when audit processing failures occur\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing real-time audit alerts when organization-defined audit failure events occur"}]}]}]},{"id":"au-6","class":"SP800-53","title":"Audit Review, Analysis, and Reporting","params":[{"id":"au-6_prm_1","label":"organization-defined frequency"},{"id":"au-6_prm_2","label":"organization-defined inappropriate or unusual activity"},{"id":"au-6_prm_3","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-6"},{"name":"sort-id","value":"au-06"}],"parts":[{"id":"au-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"au-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Reviews and analyzes information system audit records {{ insert: param, au-6_prm_1 }} for indications of {{ insert: param, au-6_prm_2 }}; and"},{"id":"au-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reports findings to {{ insert: param, au-6_prm_3 }}."}]},{"id":"au-6_gdn","name":"guidance","prose":"Audit review, analysis, and reporting covers information security-related auditing performed by organizations including, for example, auditing that results from monitoring of account usage, remote access, wireless connectivity, mobile device connection, configuration settings, system component inventory, use of maintenance tools and nonlocal maintenance, physical access, temperature and humidity, equipment delivery and removal, communications at the information system boundaries, use of mobile code, and use of VoIP. Findings can be reported to organizational entities that include, for example, incident response team, help desk, information security group\/department. If organizations are prohibited from reviewing and analyzing audit information or unable to conduct such activities (e.g., in certain national security applications or systems), the review\/analysis may be carried out by other organizations granted such authority.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#au-7","rel":"related"},{"href":"#au-16","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-10","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ir-5","rel":"related"},{"href":"#ir-6","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-6","rel":"related"},{"href":"#pe-14","rel":"related"},{"href":"#pe-16","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-18","rel":"related"},{"href":"#sc-19","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"au-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-6.a_obj","name":"objective","props":[{"name":"label","value":"AU-6(a)"}],"parts":[{"id":"au-6.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-6(a)[1]"}],"prose":"defines the types of inappropriate or unusual activity to look for when information system audit records are reviewed and analyzed;"},{"id":"au-6.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-6(a)[2]"}],"prose":"defines the frequency to review and analyze information system audit records for indications of organization-defined inappropriate or unusual activity;"},{"id":"au-6.a_obj.3","name":"objective","props":[{"name":"label","value":"AU-6(a)[3]"}],"prose":"reviews and analyzes information system audit records for indications of organization-defined inappropriate or unusual activity with the organization-defined frequency;"}]},{"id":"au-6.b_obj","name":"objective","props":[{"name":"label","value":"AU-6(b)"}],"parts":[{"id":"au-6.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-6(b)[1]"}],"prose":"defines personnel or roles to whom findings resulting from reviews and analysis of information system audit records are to be reported; and"},{"id":"au-6.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-6(b)[2]"}],"prose":"reports findings to organization-defined personnel or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit review, analysis, and reporting\n\nreports of audit findings\n\nrecords of actions taken in response to reviews\/analyses of audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit review, analysis, and reporting responsibilities\n\norganizational personnel with information security responsibilities"}]}],"controls":[{"id":"au-6.1","class":"SP800-53-enhancement","title":"Process Integration","props":[{"name":"label","value":"AU-6(1)"},{"name":"sort-id","value":"au-06.01"}],"parts":[{"id":"au-6.1_smt","name":"statement","prose":"The organization employs automated mechanisms to integrate audit review, analysis, and reporting processes to support organizational processes for investigation and response to suspicious activities."},{"id":"au-6.1_gdn","name":"guidance","prose":"Organizational processes benefiting from integrated audit review, analysis, and reporting include, for example, incident response, continuous monitoring, contingency planning, and Inspector General audits.","links":[{"href":"#au-12","rel":"related"},{"href":"#pm-7","rel":"related"}]},{"id":"au-6.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-6.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-6(1)[1]"}],"prose":"employs automated mechanisms to integrate:","parts":[{"id":"au-6.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AU-6(1)[1][a]"}],"prose":"audit review;"},{"id":"au-6.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AU-6(1)[1][b]"}],"prose":"analysis;"},{"id":"au-6.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AU-6(1)[1][c]"}],"prose":"reporting processes;"}]},{"id":"au-6.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-6(1)[2]"}],"prose":"uses integrated audit review, analysis and reporting processes to support organizational processes for:","parts":[{"id":"au-6.1_obj.2.a","name":"objective","props":[{"name":"label","value":"AU-6(1)[2][a]"}],"prose":"investigation of suspicious activities; and"},{"id":"au-6.1_obj.2.b","name":"objective","props":[{"name":"label","value":"AU-6(1)[2][b]"}],"prose":"response to suspicious activities."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit review, analysis, and reporting\n\nprocedures addressing investigation and response to suspicious activities\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit review, analysis, and reporting responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms integrating audit review, analysis, and reporting processes"}]}]},{"id":"au-6.3","class":"SP800-53-enhancement","title":"Correlate Audit Repositories","props":[{"name":"label","value":"AU-6(3)"},{"name":"sort-id","value":"au-06.03"}],"parts":[{"id":"au-6.3_smt","name":"statement","prose":"The organization analyzes and correlates audit records across different repositories to gain organization-wide situational awareness."},{"id":"au-6.3_gdn","name":"guidance","prose":"Organization-wide situational awareness includes awareness across all three tiers of risk management (i.e., organizational, mission\/business process, and information system) and supports cross-organization awareness.","links":[{"href":"#au-12","rel":"related"},{"href":"#ir-4","rel":"related"}]},{"id":"au-6.3_obj","name":"objective","prose":"Determine if the organization analyzes and correlates audit records across different repositories to gain organization-wide situational awareness."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit review, analysis, and reporting\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records across different repositories\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit review, analysis, and reporting responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting analysis and correlation of audit records"}]}]},{"id":"au-6.5","class":"SP800-53-enhancement","title":"Integration \/ Scanning and Monitoring Capabilities","params":[{"id":"au-6.5_prm_1","select":{"how-many":"one-or-more","choice":["vulnerability scanning information","performance data","information system monitoring information"," {{ insert: param, au-6.5_prm_2 }} "]}},{"id":"au-6.5_prm_2","depends-on":"au-6.5_prm_1","label":"organization-defined data\/information collected from other sources"}],"props":[{"name":"label","value":"AU-6(5)"},{"name":"sort-id","value":"au-06.05"}],"parts":[{"id":"au-6.5_smt","name":"statement","prose":"The organization integrates analysis of audit records with analysis of {{ insert: param, au-6.5_prm_1 }} to further enhance the ability to identify inappropriate or unusual activity."},{"id":"au-6.5_gdn","name":"guidance","prose":"This control enhancement does not require vulnerability scanning, the generation of performance data, or information system monitoring. Rather, the enhancement requires that the analysis of information being otherwise produced in these areas is integrated with the analysis of audit information. Security Event and Information Management System tools can facilitate audit record aggregation\/consolidation from multiple information system components as well as audit record correlation and analysis. The use of standardized audit record analysis scripts developed by organizations (with localized script adjustments, as necessary) provides more cost-effective approaches for analyzing audit record information collected. The correlation of audit record information with vulnerability scanning information is important in determining the veracity of vulnerability scans and correlating attack detection events with scanning results. Correlation with performance data can help uncover denial of service attacks or cyber attacks resulting in unauthorized use of resources. Correlation with system monitoring information can assist in uncovering attacks and in better relating audit information to operational situations.","links":[{"href":"#au-12","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ra-5","rel":"related"}]},{"id":"au-6.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-6.5_obj.1","name":"objective","props":[{"name":"label","value":"AU-6(5)[1]"}],"prose":"defines data\/information to be collected from other sources;"},{"id":"au-6.5_obj.2","name":"objective","props":[{"name":"label","value":"AU-6(5)[2]"}],"prose":"selects sources of data\/information to be analyzed and integrated with the analysis of audit records from one or more of the following:","parts":[{"id":"au-6.5_obj.2.a","name":"objective","props":[{"name":"label","value":"AU-6(5)[2][a]"}],"prose":"vulnerability scanning information;"},{"id":"au-6.5_obj.2.b","name":"objective","props":[{"name":"label","value":"AU-6(5)[2][b]"}],"prose":"performance data;"},{"id":"au-6.5_obj.2.c","name":"objective","props":[{"name":"label","value":"AU-6(5)[2][c]"}],"prose":"information system monitoring information; and\/or"},{"id":"au-6.5_obj.2.d","name":"objective","props":[{"name":"label","value":"AU-6(5)[2][d]"}],"prose":"organization-defined data\/information collected from other sources; and"}]},{"id":"au-6.5_obj.3","name":"objective","props":[{"name":"label","value":"AU-6(5)[3]"}],"prose":"integrates the analysis of audit records with the analysis of selected data\/information to further enhance the ability to identify inappropriate or unusual activity."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit review, analysis, and reporting\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nintegrated analysis of audit records, vulnerability scanning information, performance data, network monitoring information and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit review, analysis, and reporting responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing capability to integrate analysis of audit records with analysis of data\/information sources"}]}]},{"id":"au-6.6","class":"SP800-53-enhancement","title":"Correlation with Physical Monitoring","props":[{"name":"label","value":"AU-6(6)"},{"name":"sort-id","value":"au-06.06"}],"parts":[{"id":"au-6.6_smt","name":"statement","prose":"The organization correlates information from audit records with information obtained from monitoring physical access to further enhance the ability to identify suspicious, inappropriate, unusual, or malevolent activity."},{"id":"au-6.6_gdn","name":"guidance","prose":"The correlation of physical audit information and audit logs from information systems may assist organizations in identifying examples of suspicious behavior or supporting evidence of such behavior. For example, the correlation of an individual’s identity for logical access to certain information systems with the additional physical security information that the individual was actually present at the facility when the logical access occurred, may prove to be useful in investigations."},{"id":"au-6.6_obj","name":"objective","prose":"Determine if the organization correlates information from audit records with information obtained from monitoring physical access to enhance the ability to identify suspicious, inappropriate, unusual, or malevolent activity."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit review, analysis, and reporting\n\nprocedures addressing physical access monitoring\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ndocumentation providing evidence of correlated information obtained from audit records and physical access monitoring records\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit review, analysis, and reporting responsibilities\n\norganizational personnel with physical access monitoring responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing capability to correlate information from audit records with information from monitoring physical access"}]}]}]},{"id":"au-7","class":"SP800-53","title":"Audit Reduction and Report Generation","props":[{"name":"priority","value":"P2"},{"name":"label","value":"AU-7"},{"name":"sort-id","value":"au-07"}],"parts":[{"id":"au-7_smt","name":"statement","prose":"The information system provides an audit reduction and report generation capability that:","parts":[{"id":"au-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Supports on-demand audit review, analysis, and reporting requirements and after-the-fact investigations of security incidents; and"},{"id":"au-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Does not alter the original content or time ordering of audit records."}]},{"id":"au-7_gdn","name":"guidance","prose":"Audit reduction is a process that manipulates collected audit information and organizes such information in a summary format that is more meaningful to analysts. Audit reduction and report generation capabilities do not always emanate from the same information system or from the same organizational entities conducting auditing activities. Audit reduction capability can include, for example, modern data mining techniques with advanced data filters to identify anomalous behavior in audit records. The report generation capability provided by the information system can generate customizable reports. Time ordering of audit records can be a significant issue if the granularity of the timestamp in the record is insufficient.","links":[{"href":"#au-6","rel":"related"}]},{"id":"au-7_obj","name":"objective","prose":"Determine if the information system provides an audit reduction and report generation capability that supports:","parts":[{"id":"au-7.a_obj","name":"objective","props":[{"name":"label","value":"AU-7(a)"}],"parts":[{"id":"au-7.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-7(a)[1]"}],"prose":"on-demand audit review;"},{"id":"au-7.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-7(a)[2]"}],"prose":"analysis;"},{"id":"au-7.a_obj.3","name":"objective","props":[{"name":"label","value":"AU-7(a)[3]"}],"prose":"reporting requirements;"},{"id":"au-7.a_obj.4","name":"objective","props":[{"name":"label","value":"AU-7(a)[4]"}],"prose":"after-the-fact investigations of security incidents; and"}]},{"id":"au-7.b_obj","name":"objective","props":[{"name":"label","value":"AU-7(b)"}],"prose":"does not alter the original content or time ordering of audit records."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit reduction and report generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit reduction, review, analysis, and reporting tools\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit reduction and report generation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Audit reduction and report generation capability"}]}],"controls":[{"id":"au-7.1","class":"SP800-53-enhancement","title":"Automatic Processing","params":[{"id":"au-7.1_prm_1","label":"organization-defined audit fields within audit records"}],"props":[{"name":"label","value":"AU-7(1)"},{"name":"sort-id","value":"au-07.01"}],"parts":[{"id":"au-7.1_smt","name":"statement","prose":"The information system provides the capability to process audit records for events of interest based on {{ insert: param, au-7.1_prm_1 }}."},{"id":"au-7.1_gdn","name":"guidance","prose":"Events of interest can be identified by the content of specific audit record fields including, for example, identities of individuals, event types, event locations, event times, event dates, system resources involved, IP addresses involved, or information objects accessed. Organizations may define audit event criteria to any degree of granularity required, for example, locations selectable by general networking location (e.g., by network or subnetwork) or selectable by specific information system component.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"}]},{"id":"au-7.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-7.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-7(1)[1]"}],"prose":"the organization defines audit fields within audit records in order to process audit records for events of interest; and"},{"id":"au-7.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-7(1)[2]"}],"prose":"the information system provides the capability to process audit records for events of interest based on the organization-defined audit fields within audit records."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit reduction and report generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit reduction, review, analysis, and reporting tools\n\naudit record criteria (fields) establishing events of interest\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit reduction and report generation responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Audit reduction and report generation capability"}]}]}]},{"id":"au-8","class":"SP800-53","title":"Time Stamps","params":[{"id":"au-8_prm_1","label":"organization-defined granularity of time measurement"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-8"},{"name":"sort-id","value":"au-08"}],"parts":[{"id":"au-8_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Uses internal system clocks to generate time stamps for audit records; and"},{"id":"au-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT) and meets {{ insert: param, au-8_prm_1 }}."}]},{"id":"au-8_gdn","name":"guidance","prose":"Time stamps generated by the information system include date and time. Time is commonly expressed in Coordinated Universal Time (UTC), a modern continuation of Greenwich Mean Time (GMT), or local time with an offset from UTC. Granularity of time measurements refers to the degree of synchronization between information system clocks and reference clocks, for example, clocks synchronizing within hundreds of milliseconds or within tens of milliseconds. Organizations may define different time granularities for different system components. Time service can also be critical to other security capabilities such as access control and identification and authentication, depending on the nature of the mechanisms used to support those capabilities.","links":[{"href":"#au-3","rel":"related"},{"href":"#au-12","rel":"related"}]},{"id":"au-8_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-8.a_obj","name":"objective","props":[{"name":"label","value":"AU-8(a)"}],"prose":"the information system uses internal system clocks to generate time stamps for audit records;"},{"id":"au-8.b_obj","name":"objective","props":[{"name":"label","value":"AU-8(b)"}],"parts":[{"id":"au-8.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-8(b)[1]"}],"prose":"the information system records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT);"},{"id":"au-8.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-8(b)[2]"}],"prose":"the organization defines the granularity of time measurement to be met when recording time stamps for audit records; and"},{"id":"au-8.b_obj.3","name":"objective","props":[{"name":"label","value":"AU-8(b)[3]"}],"prose":"the organization records time stamps for audit records that meet the organization-defined granularity of time measurement."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing time stamp generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing time stamp generation"}]}],"controls":[{"id":"au-8.1","class":"SP800-53-enhancement","title":"Synchronization with Authoritative Time Source","params":[{"id":"au-8.1_prm_1","label":"organization-defined frequency"},{"id":"au-8.1_prm_2","label":"organization-defined authoritative time source"},{"id":"au-8.1_prm_3","label":"organization-defined time period"}],"props":[{"name":"label","value":"AU-8(1)"},{"name":"sort-id","value":"au-08.01"}],"parts":[{"id":"au-8.1_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-8.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Compares the internal information system clocks {{ insert: param, au-8.1_prm_1 }} with {{ insert: param, au-8.1_prm_2 }}; and"},{"id":"au-8.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Synchronizes the internal system clocks to the authoritative time source when the time difference is greater than {{ insert: param, au-8.1_prm_3 }}."}]},{"id":"au-8.1_gdn","name":"guidance","prose":"This control enhancement provides uniformity of time stamps for information systems with multiple system clocks and systems connected over a network."},{"id":"au-8.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-8.1.a_obj","name":"objective","props":[{"name":"label","value":"AU-8(1)(a)"}],"parts":[{"id":"au-8.1.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-8(1)(a)[1]"}],"prose":"the organization defines the authoritative time source to which internal information system clocks are to be compared;"},{"id":"au-8.1.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-8(1)(a)[2]"}],"prose":"the organization defines the frequency to compare the internal information system clocks with the organization-defined authoritative time source; and"},{"id":"au-8.1.a_obj.3","name":"objective","props":[{"name":"label","value":"AU-8(1)(a)[3]"}],"prose":"the information system compares the internal information system clocks with the organization-defined authoritative time source with organization-defined frequency; and"}],"links":[{"href":"#au-8.1_smt.a","rel":"corresp"}]},{"id":"au-8.1.b_obj","name":"objective","props":[{"name":"label","value":"AU-8(1)(b)"}],"parts":[{"id":"au-8.1.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-8(1)(b)[1]"}],"prose":"the organization defines the time period that, if exceeded by the time difference between the internal system clocks and the authoritative time source, will result in the internal system clocks being synchronized to the authoritative time source; and"},{"id":"au-8.1.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-8(1)(b)[2]"}],"prose":"the information system synchronizes the internal information system clocks to the authoritative time source when the time difference is greater than the organization-defined time period."}],"links":[{"href":"#au-8.1_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing time stamp generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing internal information system clock synchronization"}]}]}]},{"id":"au-9","class":"SP800-53","title":"Protection of Audit Information","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-9"},{"name":"sort-id","value":"au-09"}],"parts":[{"id":"au-9_smt","name":"statement","prose":"The information system protects audit information and audit tools from unauthorized access, modification, and deletion."},{"id":"au-9_gdn","name":"guidance","prose":"Audit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully audit information system activity. This control focuses on technical protection of audit information. Physical protection of audit information is addressed by media protection controls and physical and environmental protection controls.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-6","rel":"related"}]},{"id":"au-9_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-9_obj.1","name":"objective","props":[{"name":"label","value":"AU-9[1]"}],"prose":"the information system protects audit information from unauthorized:","parts":[{"id":"au-9_obj.1.a","name":"objective","props":[{"name":"label","value":"AU-9[1][a]"}],"prose":"access;"},{"id":"au-9_obj.1.b","name":"objective","props":[{"name":"label","value":"AU-9[1][b]"}],"prose":"modification;"},{"id":"au-9_obj.1.c","name":"objective","props":[{"name":"label","value":"AU-9[1][c]"}],"prose":"deletion;"}]},{"id":"au-9_obj.2","name":"objective","props":[{"name":"label","value":"AU-9[2]"}],"prose":"the information system protects audit tools from unauthorized:","parts":[{"id":"au-9_obj.2.a","name":"objective","props":[{"name":"label","value":"AU-9[2][a]"}],"prose":"access;"},{"id":"au-9_obj.2.b","name":"objective","props":[{"name":"label","value":"AU-9[2][b]"}],"prose":"modification; and"},{"id":"au-9_obj.2.c","name":"objective","props":[{"name":"label","value":"AU-9[2][c]"}],"prose":"deletion."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\naccess control policy and procedures\n\nprocedures addressing protection of audit information\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation, information system audit records\n\naudit tools\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing audit information protection"}]}],"controls":[{"id":"au-9.2","class":"SP800-53-enhancement","title":"Audit Backup On Separate Physical Systems \/ Components","params":[{"id":"au-9.2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"AU-9(2)"},{"name":"sort-id","value":"au-09.02"}],"parts":[{"id":"au-9.2_smt","name":"statement","prose":"The information system backs up audit records {{ insert: param, au-9.2_prm_1 }} onto a physically different system or system component than the system or component being audited."},{"id":"au-9.2_gdn","name":"guidance","prose":"This control enhancement helps to ensure that a compromise of the information system being audited does not also result in a compromise of the audit records.","links":[{"href":"#au-4","rel":"related"},{"href":"#au-5","rel":"related"},{"href":"#au-11","rel":"related"}]},{"id":"au-9.2_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-9.2_obj.1","name":"objective","props":[{"name":"label","value":"AU-9(2)[1]"}],"prose":"the organization defines the frequency to back up audit records onto a physically different system or system component than the system or component being audited; and"},{"id":"au-9.2_obj.2","name":"objective","props":[{"name":"label","value":"AU-9(2)[2]"}],"prose":"the information system backs up audit records with the organization-defined frequency, onto a physically different system or system component than the system or component being audited."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing protection of audit information\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation, system or media storing backups of information system audit records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing the backing up of audit records"}]}]},{"id":"au-9.3","class":"SP800-53-enhancement","title":"Cryptographic Protection","props":[{"name":"label","value":"AU-9(3)"},{"name":"sort-id","value":"au-09.03"}],"parts":[{"id":"au-9.3_smt","name":"statement","prose":"The information system implements cryptographic mechanisms to protect the integrity of audit information and audit tools."},{"id":"au-9.3_gdn","name":"guidance","prose":"Cryptographic mechanisms used for protecting the integrity of audit information include, for example, signed hash functions using asymmetric cryptography enabling distribution of the public key to verify the hash information while maintaining the confidentiality of the secret key used to generate the hash.","links":[{"href":"#au-10","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"au-9.3_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"au-9.3_obj.1","name":"objective","props":[{"name":"label","value":"AU-9(3)[1]"}],"prose":"uses cryptographic mechanisms to protect the integrity of audit information; and"},{"id":"au-9.3_obj.2","name":"objective","props":[{"name":"label","value":"AU-9(3)[2]"}],"prose":"uses cryptographic mechanisms to protect the integrity of audit tools."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\naccess control policy and procedures\n\nprocedures addressing protection of audit information\n\ninformation system design documentation\n\ninformation system hardware settings\n\ninformation system configuration settings and associated documentation, information system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Cryptographic mechanisms protecting integrity of audit information and tools"}]}]},{"id":"au-9.4","class":"SP800-53-enhancement","title":"Access by Subset of Privileged Users","params":[{"id":"au-9.4_prm_1","label":"organization-defined subset of privileged users"}],"props":[{"name":"label","value":"AU-9(4)"},{"name":"sort-id","value":"au-09.04"}],"parts":[{"id":"au-9.4_smt","name":"statement","prose":"The organization authorizes access to management of audit functionality to only {{ insert: param, au-9.4_prm_1 }}."},{"id":"au-9.4_gdn","name":"guidance","prose":"Individuals with privileged access to an information system and who are also the subject of an audit by that system, may affect the reliability of audit information by inhibiting audit activities or modifying audit records. This control enhancement requires that privileged access be further defined between audit-related privileges and other privileges, thus limiting the users with audit-related privileges.","links":[{"href":"#ac-5","rel":"related"}]},{"id":"au-9.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-9.4_obj.1","name":"objective","props":[{"name":"label","value":"AU-9(4)[1]"}],"prose":"defines a subset of privileged users to be authorized access to management of audit functionality; and"},{"id":"au-9.4_obj.2","name":"objective","props":[{"name":"label","value":"AU-9(4)[2]"}],"prose":"authorizes access to management of audit functionality to only the organization-defined subset of privileged users."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\naccess control policy and procedures\n\nprocedures addressing protection of audit information\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation, system-generated list of privileged users with access to management of audit functionality\n\naccess authorizations\n\naccess control list\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms managing access to audit functionality"}]}]}]},{"id":"au-10","class":"SP800-53","title":"Non-repudiation","params":[{"id":"au-10_prm_1","label":"organization-defined actions to be covered by non-repudiation"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"AU-10"},{"name":"sort-id","value":"au-10"}],"parts":[{"id":"au-10_smt","name":"statement","prose":"The information system protects against an individual (or process acting on behalf of an individual) falsely denying having performed {{ insert: param, au-10_prm_1 }}."},{"id":"au-10_gdn","name":"guidance","prose":"Types of individual actions covered by non-repudiation include, for example, creating information, sending and receiving messages, approving information (e.g., indicating concurrence or signing a contract). Non-repudiation protects individuals against later claims by: (i) authors of not having authored particular documents; (ii) senders of not having transmitted messages; (iii) receivers of not having received messages; or (iv) signatories of not having signed documents. Non-repudiation services can be used to determine if information originated from a particular individual, or if an individual took specific actions (e.g., sending an email, signing a contract, approving a procurement request) or received specific information. Organizations obtain non-repudiation services by employing various techniques or mechanisms (e.g., digital signatures, digital message receipts).","links":[{"href":"#sc-12","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-16","rel":"related"},{"href":"#sc-17","rel":"related"},{"href":"#sc-23","rel":"related"}]},{"id":"au-10_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-10_obj.1","name":"objective","props":[{"name":"label","value":"AU-10[1]"}],"prose":"the organization defines actions to be covered by non-repudiation; and"},{"id":"au-10_obj.2","name":"objective","props":[{"name":"label","value":"AU-10[2]"}],"prose":"the information system protects against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing non-repudiation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing non-repudiation capability"}]}]},{"id":"au-11","class":"SP800-53","title":"Audit Record Retention","params":[{"id":"au-11_prm_1","label":"organization-defined time period consistent with records retention policy"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AU-11"},{"name":"sort-id","value":"au-11"}],"parts":[{"id":"au-11_smt","name":"statement","prose":"The organization retains audit records for {{ insert: param, au-11_prm_1 }} to provide support for after-the-fact investigations of security incidents and to meet regulatory and organizational information retention requirements."},{"id":"au-11_gdn","name":"guidance","prose":"Organizations retain audit records until it is determined that they are no longer needed for administrative, legal, audit, or other operational purposes. This includes, for example, retention and availability of audit records relative to Freedom of Information Act (FOIA) requests, subpoenas, and law enforcement actions. Organizations develop standard categories of audit records relative to such types of actions and standard response processes for each type of action. The National Archives and Records Administration (NARA) General Records Schedules provide federal policy on record retention.","links":[{"href":"#au-4","rel":"related"},{"href":"#au-5","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#mp-6","rel":"related"}]},{"id":"au-11_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-11_obj.1","name":"objective","props":[{"name":"label","value":"AU-11[1]"}],"prose":"defines a time period to retain audit records that is consistent with records retention policy;"},{"id":"au-11_obj.2","name":"objective","props":[{"name":"label","value":"AU-11[2]"}],"prose":"retains audit records for the organization-defined time period consistent with records retention policy to:","parts":[{"id":"au-11_obj.2.a","name":"objective","props":[{"name":"label","value":"AU-11[2][a]"}],"prose":"provide support for after-the-fact investigations of security incidents; and"},{"id":"au-11_obj.2.b","name":"objective","props":[{"name":"label","value":"AU-11[2][b]"}],"prose":"meet regulatory and organizational information retention requirements."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\naudit record retention policy and procedures\n\nsecurity plan\n\norganization-defined retention period for audit records\n\naudit record archives\n\naudit logs\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit record retention responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]}]},{"id":"au-12","class":"SP800-53","title":"Audit Generation","params":[{"id":"au-12_prm_1","label":"organization-defined information system components"},{"id":"au-12_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-12"},{"name":"sort-id","value":"au-12"}],"parts":[{"id":"au-12_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-12_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Provides audit record generation capability for the auditable events defined in AU-2 a. at {{ insert: param, au-12_prm_1 }};"},{"id":"au-12_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Allows {{ insert: param, au-12_prm_2 }} to select which auditable events are to be audited by specific components of the information system; and"},{"id":"au-12_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Generates audit records for the events defined in AU-2 d. with the content defined in AU-3."}]},{"id":"au-12_gdn","name":"guidance","prose":"Audit records can be generated from many different information system components. The list of audited events is the set of events for which audits are to be generated. These events are typically a subset of all events for which the information system is capable of generating audit records.","links":[{"href":"#ac-3","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"}]},{"id":"au-12_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-12.a_obj","name":"objective","props":[{"name":"label","value":"AU-12(a)"}],"parts":[{"id":"au-12.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-12(a)[1]"}],"prose":"the organization defines the information system components which are to provide audit record generation capability for the auditable events defined in AU-2a;"},{"id":"au-12.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-12(a)[2]"}],"prose":"the information system provides audit record generation capability, for the auditable events defined in AU-2a, at organization-defined information system components;"}]},{"id":"au-12.b_obj","name":"objective","props":[{"name":"label","value":"AU-12(b)"}],"parts":[{"id":"au-12.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-12(b)[1]"}],"prose":"the organization defines the personnel or roles allowed to select which auditable events are to be audited by specific components of the information system;"},{"id":"au-12.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-12(b)[2]"}],"prose":"the information system allows the organization-defined personnel or roles to select which auditable events are to be audited by specific components of the system; and"}]},{"id":"au-12.c_obj","name":"objective","props":[{"name":"label","value":"AU-12(c)"}],"prose":"the information system generates audit records for the events defined in AU-2d with the content in defined in AU-3."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit record generation\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of auditable events\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit record generation responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing audit record generation capability"}]}],"controls":[{"id":"au-12.1","class":"SP800-53-enhancement","title":"System-wide \/ Time-correlated Audit Trail","params":[{"id":"au-12.1_prm_1","label":"organization-defined information system components"},{"id":"au-12.1_prm_2","label":"organization-defined level of tolerance for the relationship between time stamps of individual records in the audit trail"}],"props":[{"name":"label","value":"AU-12(1)"},{"name":"sort-id","value":"au-12.01"}],"parts":[{"id":"au-12.1_smt","name":"statement","prose":"The information system compiles audit records from {{ insert: param, au-12.1_prm_1 }} into a system-wide (logical or physical) audit trail that is time-correlated to within {{ insert: param, au-12.1_prm_2 }}."},{"id":"au-12.1_gdn","name":"guidance","prose":"Audit trails are time-correlated if the time stamps in the individual audit records can be reliably related to the time stamps in other audit records to achieve a time ordering of the records within organizational tolerances.","links":[{"href":"#au-8","rel":"related"},{"href":"#au-12","rel":"related"}]},{"id":"au-12.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-12.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-12(1)[1]"}],"prose":"the organization defines the information system components from which audit records are to be compiled into a system-wide (logical or physical) audit trail;"},{"id":"au-12.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-12(1)[2]"}],"prose":"the organization defines the level of tolerance for the relationship between time stamps of individual records in the audit trail; and"},{"id":"au-12.1_obj.3","name":"objective","props":[{"name":"label","value":"AU-12(1)[3]"}],"prose":"the information system compiles audit records from organization-defined information system components into a system-wide (logical or physical) audit trail that is time-correlated to within the organization-defined level of tolerance for the relationship between time stamps of individual records in the audit trail."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit record generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsystem-wide audit trail (logical or physical)\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit record generation responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing audit record generation capability"}]}]},{"id":"au-12.3","class":"SP800-53-enhancement","title":"Changes by Authorized Individuals","params":[{"id":"au-12.3_prm_1","label":"organization-defined individuals or roles"},{"id":"au-12.3_prm_2","label":"organization-defined information system components"},{"id":"au-12.3_prm_3","label":"organization-defined selectable event criteria"},{"id":"au-12.3_prm_4","label":"organization-defined time thresholds"}],"props":[{"name":"label","value":"AU-12(3)"},{"name":"sort-id","value":"au-12.03"}],"parts":[{"id":"au-12.3_smt","name":"statement","prose":"The information system provides the capability for {{ insert: param, au-12.3_prm_1 }} to change the auditing to be performed on {{ insert: param, au-12.3_prm_2 }} based on {{ insert: param, au-12.3_prm_3 }} within {{ insert: param, au-12.3_prm_4 }}."},{"id":"au-12.3_gdn","name":"guidance","prose":"This control enhancement enables organizations to extend or limit auditing as necessary to meet organizational requirements. Auditing that is limited to conserve information system resources may be extended to address certain threat situations. In addition, auditing may be limited to a specific set of events to facilitate audit reduction, analysis, and reporting. Organizations can establish time thresholds in which audit actions are changed, for example, near real-time, within minutes, or within hours.","links":[{"href":"#au-7","rel":"related"}]},{"id":"au-12.3_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-12.3_obj.1","name":"objective","props":[{"name":"label","value":"AU-12(3)[1]"}],"prose":"the organization defines information system components on which auditing is to be performed;"},{"id":"au-12.3_obj.2","name":"objective","props":[{"name":"label","value":"AU-12(3)[2]"}],"prose":"the organization defines individuals or roles authorized to change the auditing to be performed on organization-defined information system components;"},{"id":"au-12.3_obj.3","name":"objective","props":[{"name":"label","value":"AU-12(3)[3]"}],"prose":"the organization defines time thresholds within which organization-defined individuals or roles can change the auditing to be performed on organization-defined information system components;"},{"id":"au-12.3_obj.4","name":"objective","props":[{"name":"label","value":"AU-12(3)[4]"}],"prose":"the organization defines selectable event criteria that support the capability for organization-defined individuals or roles to change the auditing to be performed on organization-defined information system components; and"},{"id":"au-12.3_obj.5","name":"objective","props":[{"name":"label","value":"AU-12(3)[5]"}],"prose":"the information system provides the capability for organization-defined individuals or roles to change the auditing to be performed on organization-defined information system components based on organization-defined selectable event criteria within organization-defined time thresholds."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit record generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsystem-generated list of individuals or roles authorized to change auditing to be performed\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit record generation responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing audit record generation capability"}]}]}]}]},{"id":"ca","class":"family","title":"Security Assessment and Authorization","controls":[{"id":"ca-1","class":"SP800-53","title":"Security Assessment and Authorization Policy and Procedures","params":[{"id":"ca-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ca-1_prm_2","label":"organization-defined frequency"},{"id":"ca-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CA-1"},{"name":"sort-id","value":"ca-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ca-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ca-1_prm_1 }}:","parts":[{"id":"ca-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ca-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the security assessment and authorization policy and associated security assessment and authorization controls; and"}]},{"id":"ca-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ca-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security assessment and authorization policy {{ insert: param, ca-1_prm_2 }}; and"},{"id":"ca-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Security assessment and authorization procedures {{ insert: param, ca-1_prm_3 }}."}]}]},{"id":"ca-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the CA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ca-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-1.a_obj","name":"objective","props":[{"name":"label","value":"CA-1(a)"}],"parts":[{"id":"ca-1.a.1_obj","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)"}],"parts":[{"id":"ca-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1]"}],"prose":"develops and documents a security assessment and authorization policy that addresses:","parts":[{"id":"ca-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ca-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ca-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ca-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ca-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ca-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ca-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ca-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the security assessment and authorization policy is to be disseminated;"},{"id":"ca-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[3]"}],"prose":"disseminates the security assessment and authorization policy to organization-defined personnel or roles;"}]},{"id":"ca-1.a.2_obj","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)"}],"parts":[{"id":"ca-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the security assessment and authorization policy and associated assessment and authorization controls;"},{"id":"ca-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ca-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ca-1.b_obj","name":"objective","props":[{"name":"label","value":"CA-1(b)"}],"parts":[{"id":"ca-1.b.1_obj","name":"objective","props":[{"name":"label","value":"CA-1(b)(1)"}],"parts":[{"id":"ca-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current security assessment and authorization policy;"},{"id":"ca-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(b)(1)[2]"}],"prose":"reviews and updates the current security assessment and authorization policy with the organization-defined frequency;"}]},{"id":"ca-1.b.2_obj","name":"objective","props":[{"name":"label","value":"CA-1(b)(2)"}],"parts":[{"id":"ca-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current security assessment and authorization procedures; and"},{"id":"ca-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(b)(2)[2]"}],"prose":"reviews and updates the current security assessment and authorization procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security assessment and authorization responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ca-2","class":"SP800-53","title":"Security Assessments","params":[{"id":"ca-2_prm_1","label":"organization-defined frequency"},{"id":"ca-2_prm_2","label":"organization-defined individuals or roles"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-2"},{"name":"sort-id","value":"ca-02"}],"links":[{"href":"#c5034e0c-eba6-4ecd-a541-79f0678f4ba4","rel":"reference"},{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"}],"parts":[{"id":"ca-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a security assessment plan that describes the scope of the assessment including:","parts":[{"id":"ca-2_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security controls and control enhancements under assessment;"},{"id":"ca-2_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Assessment procedures to be used to determine security control effectiveness; and"},{"id":"ca-2_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Assessment environment, assessment team, and assessment roles and responsibilities;"}]},{"id":"ca-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Assesses the security controls in the information system and its environment of operation {{ insert: param, ca-2_prm_1 }} to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;"},{"id":"ca-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Produces a security assessment report that documents the results of the assessment; and"},{"id":"ca-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Provides the results of the security control assessment to {{ insert: param, ca-2_prm_2 }}."}]},{"id":"ca-2_gdn","name":"guidance","prose":"Organizations assess security controls in organizational information systems and the environments in which those systems operate as part of: (i) initial and ongoing security authorizations; (ii) FISMA annual assessments; (iii) continuous monitoring; and (iv) system development life cycle activities. Security assessments: (i) ensure that information security is built into organizational information systems; (ii) identify weaknesses and deficiencies early in the development process; (iii) provide essential information needed to make risk-based decisions as part of security authorization processes; and (iv) ensure compliance to vulnerability mitigation procedures. Assessments are conducted on the implemented security controls from Appendix F (main catalog) and Appendix G (Program Management controls) as documented in System Security Plans and Information Security Program Plans. Organizations can use other types of assessment activities such as vulnerability scanning and system monitoring to maintain the security posture of information systems during the entire life cycle. Security assessment reports document assessment results in sufficient detail as deemed necessary by organizations, to determine the accuracy and completeness of the reports and whether the security controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting security requirements. The FISMA requirement for assessing security controls at least annually does not require additional assessment activities to those activities already in place in organizational security authorization processes. Security assessment results are provided to the individuals or roles appropriate for the types of assessments being conducted. For example, assessments conducted in support of security authorization decisions are provided to authorizing officials or authorizing official designated representatives. To satisfy annual assessment requirements, organizations can use assessment results from the following sources: (i) initial or ongoing information system authorizations; (ii) continuous monitoring; or (iii) system development life cycle activities. Organizations ensure that security assessment results are current, relevant to the determination of security control effectiveness, and obtained with the appropriate level of assessor independence. Existing security control assessment results can be reused to the extent that the results are still valid and can also be supplemented with additional assessments as needed. Subsequent to initial authorizations and in accordance with OMB policy, organizations assess security controls during continuous monitoring. Organizations establish the frequency for ongoing security control assessments in accordance with organizational continuous monitoring strategies. Information Assurance Vulnerability Alerts provide useful examples of vulnerability mitigation procedures. External audits (e.g., audits by external entities such as regulatory agencies) are outside the scope of this control.","links":[{"href":"#ca-5","rel":"related"},{"href":"#ca-6","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-2.a_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)"}],"prose":"develops a security assessment plan that describes the scope of the assessment including:","parts":[{"id":"ca-2.a.1_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)(1)"}],"prose":"security controls and control enhancements under assessment;"},{"id":"ca-2.a.2_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)(2)"}],"prose":"assessment procedures to be used to determine security control effectiveness;"},{"id":"ca-2.a.3_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)"}],"parts":[{"id":"ca-2.a.3_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)[1]"}],"prose":"assessment environment;"},{"id":"ca-2.a.3_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)[2]"}],"prose":"assessment team;"},{"id":"ca-2.a.3_obj.3","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)[3]"}],"prose":"assessment roles and responsibilities;"}]}]},{"id":"ca-2.b_obj","name":"objective","props":[{"name":"label","value":"CA-2(b)"}],"parts":[{"id":"ca-2.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(b)[1]"}],"prose":"defines the frequency to assess the security controls in the information system and its environment of operation;"},{"id":"ca-2.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(b)[2]"}],"prose":"assesses the security controls in the information system with the organization-defined frequency to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;"}]},{"id":"ca-2.c_obj","name":"objective","props":[{"name":"label","value":"CA-2(c)"}],"prose":"produces a security assessment report that documents the results of the assessment;"},{"id":"ca-2.d_obj","name":"objective","props":[{"name":"label","value":"CA-2(d)"}],"parts":[{"id":"ca-2.d_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(d)[1]"}],"prose":"defines individuals or roles to whom the results of the security control assessment are to be provided; and"},{"id":"ca-2.d_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(d)[2]"}],"prose":"provides the results of the security control assessment to organization-defined individuals or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing security assessment planning\n\nprocedures addressing security assessments\n\nsecurity assessment plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security assessment responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting security assessment, security assessment plan development, and\/or security assessment reporting"}]}],"controls":[{"id":"ca-2.1","class":"SP800-53-enhancement","title":"Independent Assessors","params":[{"id":"ca-2.1_prm_1","label":"organization-defined level of independence"}],"props":[{"name":"label","value":"CA-2(1)"},{"name":"sort-id","value":"ca-02.01"}],"parts":[{"id":"ca-2.1_smt","name":"statement","prose":"The organization employs assessors or assessment teams with {{ insert: param, ca-2.1_prm_1 }} to conduct security control assessments."},{"id":"ca-2.1_gdn","name":"guidance","prose":"Independent assessors or assessment teams are individuals or groups who conduct impartial assessments of organizational information systems. Impartiality implies that assessors are free from any perceived or actual conflicts of interest with regard to the development, operation, or management of the organizational information systems under assessment or to the determination of security control effectiveness. To achieve impartiality, assessors should not: (i) create a mutual or conflicting interest with the organizations where the assessments are being conducted; (ii) assess their own work; (iii) act as management or employees of the organizations they are serving; or (iv) place themselves in positions of advocacy for the organizations acquiring their services. Independent assessments can be obtained from elements within organizations or can be contracted to public or private sector entities outside of organizations. Authorizing officials determine the required level of independence based on the security categories of information systems and\/or the ultimate risk to organizational operations, organizational assets, or individuals. Authorizing officials also determine if the level of assessor independence provides sufficient assurance that the results are sound and can be used to make credible, risk-based decisions. This includes determining whether contracted security assessment services have sufficient independence, for example, when information system owners are not directly involved in contracting processes or cannot unduly influence the impartiality of assessors conducting assessments. In special situations, for example, when organizations that own the information systems are small or organizational structures require that assessments are conducted by individuals that are in the developmental, operational, or management chain of system owners, independence in assessment processes can be achieved by ensuring that assessment results are carefully reviewed and analyzed by independent teams of experts to validate the completeness, accuracy, integrity, and reliability of the results. Organizations recognize that assessments performed for purposes other than direct support to authorization decisions are, when performed by assessors with sufficient independence, more likely to be useable for such decisions, thereby reducing the need to repeat assessments."},{"id":"ca-2.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-2.1_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(1)[1]"}],"prose":"defines the level of independence to be employed to conduct security control assessments; and"},{"id":"ca-2.1_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(1)[2]"}],"prose":"employs assessors or assessment teams with the organization-defined level of independence to conduct security control assessments."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing security assessments\n\nsecurity authorization package (including security plan, security assessment plan, security assessment report, plan of action and milestones, authorization statement)\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security assessment responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ca-2.2","class":"SP800-53-enhancement","title":"Specialized Assessments","params":[{"id":"ca-2.2_prm_1","label":"organization-defined frequency"},{"id":"ca-2.2_prm_2","select":{"choice":["announced","unannounced"]}},{"id":"ca-2.2_prm_3","select":{"how-many":"one-or-more","choice":["in-depth monitoring","vulnerability scanning","malicious user testing","insider threat assessment","performance\/load testing"," {{ insert: param, ca-2.2_prm_4 }} "]}},{"id":"ca-2.2_prm_4","depends-on":"ca-2.2_prm_3","label":"organization-defined other forms of security assessment"}],"props":[{"name":"label","value":"CA-2(2)"},{"name":"sort-id","value":"ca-02.02"}],"parts":[{"id":"ca-2.2_smt","name":"statement","prose":"The organization includes as part of security control assessments, {{ insert: param, ca-2.2_prm_1 }}, {{ insert: param, ca-2.2_prm_2 }}, {{ insert: param, ca-2.2_prm_3 }}."},{"id":"ca-2.2_gdn","name":"guidance","prose":"Organizations can employ information system monitoring, insider threat assessments, malicious user testing, and other forms of testing (e.g., verification and validation) to improve readiness by exercising organizational capabilities and indicating current performance levels as a means of focusing actions to improve security. Organizations conduct assessment activities in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. Authorizing officials approve the assessment methods in coordination with the organizational risk executive function. Organizations can incorporate vulnerabilities uncovered during assessments into vulnerability remediation processes.","links":[{"href":"#pe-3","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"ca-2.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-2.2_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(2)[1]"}],"prose":"selects one or more of the following forms of specialized security assessment to be included as part of security control assessments:","parts":[{"id":"ca-2.2_obj.1.a","name":"objective","props":[{"name":"label","value":"CA-2(2)[1][a]"}],"prose":"in-depth monitoring;"},{"id":"ca-2.2_obj.1.b","name":"objective","props":[{"name":"label","value":"CA-2(2)[1][b]"}],"prose":"vulnerability scanning;"},{"id":"ca-2.2_obj.1.c","name":"objective","props":[{"name":"label","value":"CA-2(2)[1][c]"}],"prose":"malicious user testing;"},{"id":"ca-2.2_obj.1.d","name":"objective","props":[{"name":"label","value":"CA-2(2)[1][d]"}],"prose":"insider threat assessment;"},{"id":"ca-2.2_obj.1.e","name":"objective","props":[{"name":"label","value":"CA-2(2)[1][e]"}],"prose":"performance\/load testing; and\/or"},{"id":"ca-2.2_obj.1.f","name":"objective","props":[{"name":"label","value":"CA-2(2)[1][f]"}],"prose":"other forms of organization-defined specialized security assessment;"}]},{"id":"ca-2.2_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(2)[2]"}],"prose":"defines the frequency for conducting the selected form(s) of specialized security assessment;"},{"id":"ca-2.2_obj.3","name":"objective","props":[{"name":"label","value":"CA-2(2)[3]"}],"prose":"defines whether the specialized security assessment will be announced or unannounced; and"},{"id":"ca-2.2_obj.4","name":"objective","props":[{"name":"label","value":"CA-2(2)[4]"}],"prose":"conducts announced or unannounced organization-defined forms of specialized security assessments with the organization-defined frequency as part of security control assessments."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing security assessments\n\nsecurity plan\n\nsecurity assessment plan\n\nsecurity assessment report\n\nsecurity assessment evidence\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security assessment responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting security control assessment"}]}]}]},{"id":"ca-3","class":"SP800-53","title":"System Interconnections","params":[{"id":"ca-3_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CA-3"},{"name":"sort-id","value":"ca-03"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#2711f068-734e-4afd-94ba-0b22247fbc88","rel":"reference"}],"parts":[{"id":"ca-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;"},{"id":"ca-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents, for each interconnection, the interface characteristics, security requirements, and the nature of the information communicated; and"},{"id":"ca-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews and updates Interconnection Security Agreements {{ insert: param, ca-3_prm_1 }}."}]},{"id":"ca-3_gdn","name":"guidance","prose":"This control applies to dedicated connections between information systems (i.e., system interconnections) and does not apply to transitory, user-controlled connections such as email and website browsing. Organizations carefully consider the risks that may be introduced when information systems are connected to other systems with different security requirements and security controls, both within organizations and external to organizations. Authorizing officials determine the risk associated with information system connections and the appropriate controls employed. If interconnecting systems have the same authorizing official, organizations do not need to develop Interconnection Security Agreements. Instead, organizations can describe the interface characteristics between those interconnecting systems in their respective security plans. If interconnecting systems have different authorizing officials within the same organization, organizations can either develop Interconnection Security Agreements or describe the interface characteristics between systems in the security plans for the respective systems. Organizations may also incorporate Interconnection Security Agreement information into formal contracts, especially for interconnections established between federal agencies and nonfederal (i.e., private sector) organizations. Risk considerations also include information systems sharing the same networks. For certain technologies (e.g., space, unmanned aerial vehicles, and medical devices), there may be specialized connections in place during preoperational testing. Such connections may require Interconnection Security Agreements and be subject to additional security controls.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#au-16","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#sa-9","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-3.a_obj","name":"objective","props":[{"name":"label","value":"CA-3(a)"}],"prose":"authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;"},{"id":"ca-3.b_obj","name":"objective","props":[{"name":"label","value":"CA-3(b)"}],"prose":"documents, for each interconnection:","parts":[{"id":"ca-3.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-3(b)[1]"}],"prose":"the interface characteristics;"},{"id":"ca-3.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-3(b)[2]"}],"prose":"the security requirements;"},{"id":"ca-3.b_obj.3","name":"objective","props":[{"name":"label","value":"CA-3(b)[3]"}],"prose":"the nature of the information communicated;"}]},{"id":"ca-3.c_obj","name":"objective","props":[{"name":"label","value":"CA-3(c)"}],"parts":[{"id":"ca-3.c_obj.1","name":"objective","props":[{"name":"label","value":"CA-3(c)[1]"}],"prose":"defines the frequency to review and update Interconnection Security Agreements; and"},{"id":"ca-3.c_obj.2","name":"objective","props":[{"name":"label","value":"CA-3(c)[2]"}],"prose":"reviews and updates Interconnection Security Agreements with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing information system connections\n\nsystem and communications protection policy\n\ninformation system Interconnection Security Agreements\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for developing, implementing, or approving information system interconnection agreements\n\norganizational personnel with information security responsibilities\n\npersonnel managing the system(s) to which the Interconnection Security Agreement applies"}]}],"controls":[{"id":"ca-3.5","class":"SP800-53-enhancement","title":"Restrictions On External System Connections","params":[{"id":"ca-3.5_prm_1","select":{"choice":["allow-all, deny-by-exception","deny-all, permit-by-exception"]}},{"id":"ca-3.5_prm_2","label":"organization-defined information systems"}],"props":[{"name":"label","value":"CA-3(5)"},{"name":"sort-id","value":"ca-03.05"}],"parts":[{"id":"ca-3.5_smt","name":"statement","prose":"The organization employs {{ insert: param, ca-3.5_prm_1 }} policy for allowing {{ insert: param, ca-3.5_prm_2 }} to connect to external information systems."},{"id":"ca-3.5_gdn","name":"guidance","prose":"Organizations can constrain information system connectivity to external domains (e.g., websites) by employing one of two policies with regard to such connectivity: (i) allow-all, deny by exception, also known as blacklisting (the weaker of the two policies); or (ii) deny-all, allow by exception, also known as whitelisting (the stronger of the two policies). For either policy, organizations determine what exceptions, if any, are acceptable.","links":[{"href":"#cm-7","rel":"related"}]},{"id":"ca-3.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-3.5_obj.1","name":"objective","props":[{"name":"label","value":"CA-3(5)[1]"}],"prose":"defines information systems to be allowed to connect to external information systems;"},{"id":"ca-3.5_obj.2","name":"objective","props":[{"name":"label","value":"CA-3(5)[2]"}],"prose":"employs one of the following policies for allowing organization-defined information systems to connect to external information systems:","parts":[{"id":"ca-3.5_obj.2.a","name":"objective","props":[{"name":"label","value":"CA-3(5)[2][a]"}],"prose":"allow-all policy;"},{"id":"ca-3.5_obj.2.b","name":"objective","props":[{"name":"label","value":"CA-3(5)[2][b]"}],"prose":"deny-by-exception policy;"},{"id":"ca-3.5_obj.2.c","name":"objective","props":[{"name":"label","value":"CA-3(5)[2][c]"}],"prose":"deny-all policy; or"},{"id":"ca-3.5_obj.2.d","name":"objective","props":[{"name":"label","value":"CA-3(5)[2][d]"}],"prose":"permit-by-exception policy."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing information system connections\n\nsystem and communications protection policy\n\ninformation system interconnection agreements\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity assessment report\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for managing connections to external information systems\n\nnetwork administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing restrictions on external system connections"}]}]}]},{"id":"ca-5","class":"SP800-53","title":"Plan of Action and Milestones","params":[{"id":"ca-5_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"CA-5"},{"name":"sort-id","value":"ca-05"}],"links":[{"href":"#2c5884cd-7b96-425c-862a-99877e1cf909","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"}],"parts":[{"id":"ca-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a plan of action and milestones for the information system to document the organization’s planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls and to reduce or eliminate known vulnerabilities in the system; and"},{"id":"ca-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Updates existing plan of action and milestones {{ insert: param, ca-5_prm_1 }} based on the findings from security controls assessments, security impact analyses, and continuous monitoring activities."}]},{"id":"ca-5_gdn","name":"guidance","prose":"Plans of action and milestones are key documents in security authorization packages and are subject to federal reporting requirements established by OMB.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#pm-4","rel":"related"}]},{"id":"ca-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-5.a_obj","name":"objective","props":[{"name":"label","value":"CA-5(a)"}],"prose":"develops a plan of action and milestones for the information system to:","parts":[{"id":"ca-5.a_obj.1","name":"objective","props":[{"name":"label","value":"CA-5(a)[1]"}],"prose":"document the organization’s planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls;"},{"id":"ca-5.a_obj.2","name":"objective","props":[{"name":"label","value":"CA-5(a)[2]"}],"prose":"reduce or eliminate known vulnerabilities in the system;"}]},{"id":"ca-5.b_obj","name":"objective","props":[{"name":"label","value":"CA-5(b)"}],"parts":[{"id":"ca-5.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-5(b)[1]"}],"prose":"defines the frequency to update the existing plan of action and milestones;"},{"id":"ca-5.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-5(b)[2]"}],"prose":"updates the existing plan of action and milestones with the organization-defined frequency based on the findings from:","parts":[{"id":"ca-5.b_obj.2.a","name":"objective","props":[{"name":"label","value":"CA-5(b)[2][a]"}],"prose":"security controls assessments;"},{"id":"ca-5.b_obj.2.b","name":"objective","props":[{"name":"label","value":"CA-5(b)[2][b]"}],"prose":"security impact analyses; and"},{"id":"ca-5.b_obj.2.c","name":"objective","props":[{"name":"label","value":"CA-5(b)[2][c]"}],"prose":"continuous monitoring activities."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing plan of action and milestones\n\nsecurity plan\n\nsecurity assessment plan\n\nsecurity assessment report\n\nsecurity assessment evidence\n\nplan of action and milestones\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with plan of action and milestones development and implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms for developing, implementing, and maintaining plan of action and milestones"}]}]},{"id":"ca-6","class":"SP800-53","title":"Security Authorization","params":[{"id":"ca-6_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-6"},{"name":"sort-id","value":"ca-06"}],"links":[{"href":"#9f77f845-e3ea-4ca4-b2c0-aa9eedc214ab","rel":"reference"},{"href":"#bedb15b7-ec5c-4a68-807f-385125751fcd","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"}],"parts":[{"id":"ca-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Assigns a senior-level executive or manager as the authorizing official for the information system;"},{"id":"ca-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Ensures that the authorizing official authorizes the information system for processing before commencing operations; and"},{"id":"ca-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Updates the security authorization {{ insert: param, ca-6_prm_1 }}."}]},{"id":"ca-6_gdn","name":"guidance","prose":"Security authorizations are official management decisions, conveyed through authorization decision documents, by senior organizational officials or executives (i.e., authorizing officials) to authorize operation of information systems and to explicitly accept the risk to organizational operations and assets, individuals, other organizations, and the Nation based on the implementation of agreed-upon security controls. Authorizing officials provide budgetary oversight for organizational information systems or assume responsibility for the mission\/business operations supported by those systems. The security authorization process is an inherently federal responsibility and therefore, authorizing officials must be federal employees. Through the security authorization process, authorizing officials assume responsibility and are accountable for security risks associated with the operation and use of organizational information systems. Accordingly, authorizing officials are in positions with levels of authority commensurate with understanding and accepting such information security-related risks. OMB policy requires that organizations conduct ongoing authorizations of information systems by implementing continuous monitoring programs. Continuous monitoring programs can satisfy three-year reauthorization requirements, so separate reauthorization processes are not necessary. Through the employment of comprehensive continuous monitoring processes, critical information contained in authorization packages (i.e., security plans, security assessment reports, and plans of action and milestones) is updated on an ongoing basis, providing authorizing officials and information system owners with an up-to-date status of the security state of organizational information systems and environments of operation. To reduce the administrative cost of security reauthorization, authorizing officials use the results of continuous monitoring processes to the maximum extent possible as the basis for rendering reauthorization decisions.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#pm-10","rel":"related"}]},{"id":"ca-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-6.a_obj","name":"objective","props":[{"name":"label","value":"CA-6(a)"}],"prose":"assigns a senior-level executive or manager as the authorizing official for the information system;"},{"id":"ca-6.b_obj","name":"objective","props":[{"name":"label","value":"CA-6(b)"}],"prose":"ensures that the authorizing official authorizes the information system for processing before commencing operations;"},{"id":"ca-6.c_obj","name":"objective","props":[{"name":"label","value":"CA-6(c)"}],"parts":[{"id":"ca-6.c_obj.1","name":"objective","props":[{"name":"label","value":"CA-6(c)[1]"}],"prose":"defines the frequency to update the security authorization; and"},{"id":"ca-6.c_obj.2","name":"objective","props":[{"name":"label","value":"CA-6(c)[2]"}],"prose":"updates the security authorization with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing security authorization\n\nsecurity authorization package (including security plan\n\nsecurity assessment report\n\nplan of action and milestones\n\nauthorization statement)\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security authorization responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms that facilitate security authorizations and updates"}]}]},{"id":"ca-7","class":"SP800-53","title":"Continuous Monitoring","params":[{"id":"ca-7_prm_1","label":"organization-defined metrics"},{"id":"ca-7_prm_2","label":"organization-defined frequencies"},{"id":"ca-7_prm_3","label":"organization-defined frequencies"},{"id":"ca-7_prm_4","label":"organization-defined personnel or roles"},{"id":"ca-7_prm_5","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-7"},{"name":"sort-id","value":"ca-07"}],"links":[{"href":"#bedb15b7-ec5c-4a68-807f-385125751fcd","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"},{"href":"#8ade2fbe-e468-4ca8-9a40-54d7f23c32bb","rel":"reference"},{"href":"#2d8b14e9-c8b5-4d3d-8bdc-155078f3281b","rel":"reference"}],"parts":[{"id":"ca-7_smt","name":"statement","prose":"The organization develops a continuous monitoring strategy and implements a continuous monitoring program that includes:","parts":[{"id":"ca-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishment of {{ insert: param, ca-7_prm_1 }} to be monitored;"},{"id":"ca-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishment of {{ insert: param, ca-7_prm_2 }} for monitoring and {{ insert: param, ca-7_prm_3 }} for assessments supporting such monitoring;"},{"id":"ca-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ongoing security control assessments in accordance with the organizational continuous monitoring strategy;"},{"id":"ca-7_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;"},{"id":"ca-7_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Correlation and analysis of security-related information generated by assessments and monitoring;"},{"id":"ca-7_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Response actions to address results of the analysis of security-related information; and"},{"id":"ca-7_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Reporting the security status of organization and the information system to {{ insert: param, ca-7_prm_4 }} {{ insert: param, ca-7_prm_5 }}."}]},{"id":"ca-7_gdn","name":"guidance","prose":"Continuous monitoring programs facilitate ongoing awareness of threats, vulnerabilities, and information security to support organizational risk management decisions. The terms continuous and ongoing imply that organizations assess\/analyze security controls and information security-related risks at a frequency sufficient to support organizational risk-based decisions. The results of continuous monitoring programs generate appropriate risk response actions by organizations. Continuous monitoring programs also allow organizations to maintain the security authorizations of information systems and common controls over time in highly dynamic environments of operation with changing mission\/business needs, threats, vulnerabilities, and technologies. Having access to security-related information on a continuing basis through reports\/dashboards gives organizational officials the capability to make more effective and timely risk management decisions, including ongoing security authorization decisions. Automation supports more frequent updates to security authorization packages, hardware\/software\/firmware inventories, and other system information. Effectiveness is further enhanced when continuous monitoring outputs are formatted to provide information that is specific, measurable, actionable, relevant, and timely. Continuous monitoring activities are scaled in accordance with the security categories of information systems.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-5","rel":"related"},{"href":"#ca-6","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#pm-6","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-2","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-7.a_obj","name":"objective","props":[{"name":"label","value":"CA-7(a)"}],"parts":[{"id":"ca-7.a_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(a)[1]"}],"prose":"develops a continuous monitoring strategy that defines metrics to be monitored;"},{"id":"ca-7.a_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(a)[2]"}],"prose":"develops a continuous monitoring strategy that includes monitoring of organization-defined metrics;"},{"id":"ca-7.a_obj.3","name":"objective","props":[{"name":"label","value":"CA-7(a)[3]"}],"prose":"implements a continuous monitoring program that includes monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.b_obj","name":"objective","props":[{"name":"label","value":"CA-7(b)"}],"parts":[{"id":"ca-7.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(b)[1]"}],"prose":"develops a continuous monitoring strategy that defines frequencies for monitoring;"},{"id":"ca-7.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(b)[2]"}],"prose":"defines frequencies for assessments supporting monitoring;"},{"id":"ca-7.b_obj.3","name":"objective","props":[{"name":"label","value":"CA-7(b)[3]"}],"prose":"develops a continuous monitoring strategy that includes establishment of the organization-defined frequencies for monitoring and for assessments supporting monitoring;"},{"id":"ca-7.b_obj.4","name":"objective","props":[{"name":"label","value":"CA-7(b)[4]"}],"prose":"implements a continuous monitoring program that includes establishment of organization-defined frequencies for monitoring and for assessments supporting such monitoring in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.c_obj","name":"objective","props":[{"name":"label","value":"CA-7(c)"}],"parts":[{"id":"ca-7.c_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(c)[1]"}],"prose":"develops a continuous monitoring strategy that includes ongoing security control assessments;"},{"id":"ca-7.c_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(c)[2]"}],"prose":"implements a continuous monitoring program that includes ongoing security control assessments in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.d_obj","name":"objective","props":[{"name":"label","value":"CA-7(d)"}],"parts":[{"id":"ca-7.d_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(d)[1]"}],"prose":"develops a continuous monitoring strategy that includes ongoing security status monitoring of organization-defined metrics;"},{"id":"ca-7.d_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(d)[2]"}],"prose":"implements a continuous monitoring program that includes ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.e_obj","name":"objective","props":[{"name":"label","value":"CA-7(e)"}],"parts":[{"id":"ca-7.e_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(e)[1]"}],"prose":"develops a continuous monitoring strategy that includes correlation and analysis of security-related information generated by assessments and monitoring;"},{"id":"ca-7.e_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(e)[2]"}],"prose":"implements a continuous monitoring program that includes correlation and analysis of security-related information generated by assessments and monitoring in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.f_obj","name":"objective","props":[{"name":"label","value":"CA-7(f)"}],"parts":[{"id":"ca-7.f_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(f)[1]"}],"prose":"develops a continuous monitoring strategy that includes response actions to address results of the analysis of security-related information;"},{"id":"ca-7.f_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(f)[2]"}],"prose":"implements a continuous monitoring program that includes response actions to address results of the analysis of security-related information in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.g_obj","name":"objective","props":[{"name":"label","value":"CA-7(g)"}],"parts":[{"id":"ca-7.g_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(g)[1]"}],"prose":"develops a continuous monitoring strategy that defines the personnel or roles to whom the security status of the organization and information system are to be reported;"},{"id":"ca-7.g_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(g)[2]"}],"prose":"develops a continuous monitoring strategy that defines the frequency to report the security status of the organization and information system to organization-defined personnel or roles;"},{"id":"ca-7.g_obj.3","name":"objective","props":[{"name":"label","value":"CA-7(g)[3]"}],"prose":"develops a continuous monitoring strategy that includes reporting the security status of the organization or information system to organizational-defined personnel or roles with the organization-defined frequency; and"},{"id":"ca-7.g_obj.4","name":"objective","props":[{"name":"label","value":"CA-7(g)[4]"}],"prose":"implements a continuous monitoring program that includes reporting the security status of the organization and information system to organization-defined personnel or roles with the organization-defined frequency in accordance with the organizational continuous monitoring strategy."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing continuous monitoring of information system security controls\n\nprocedures addressing configuration management\n\nsecurity plan\n\nsecurity assessment report\n\nplan of action and milestones\n\ninformation system monitoring records\n\nconfiguration management records, security impact analyses\n\nstatus reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with continuous monitoring responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Mechanisms implementing continuous monitoring"}]}],"controls":[{"id":"ca-7.1","class":"SP800-53-enhancement","title":"Independent Assessment","params":[{"id":"ca-7.1_prm_1","label":"organization-defined level of independence"}],"props":[{"name":"label","value":"CA-7(1)"},{"name":"sort-id","value":"ca-07.01"}],"parts":[{"id":"ca-7.1_smt","name":"statement","prose":"The organization employs assessors or assessment teams with {{ insert: param, ca-7.1_prm_1 }} to monitor the security controls in the information system on an ongoing basis."},{"id":"ca-7.1_gdn","name":"guidance","prose":"Organizations can maximize the value of assessments of security controls during the continuous monitoring process by requiring that such assessments be conducted by assessors or assessment teams with appropriate levels of independence based on continuous monitoring strategies. Assessor independence provides a degree of impartiality to the monitoring process. To achieve such impartiality, assessors should not: (i) create a mutual or conflicting interest with the organizations where the assessments are being conducted; (ii) assess their own work; (iii) act as management or employees of the organizations they are serving; or (iv) place themselves in advocacy positions for the organizations acquiring their services."},{"id":"ca-7.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-7.1_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(1)[1]"}],"prose":"defines a level of independence to be employed to monitor the security controls in the information system on an ongoing basis; and"},{"id":"ca-7.1_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(1)[2]"}],"prose":"employs assessors or assessment teams with the organization-defined level of independence to monitor the security controls in the information system on an ongoing basis."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing continuous monitoring of information system security controls\n\nsecurity plan\n\nsecurity assessment report\n\nplan of action and milestones\n\ninformation system monitoring records\n\nsecurity impact analyses\n\nstatus reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with continuous monitoring responsibilities\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"ca-8","class":"SP800-53","title":"Penetration Testing","params":[{"id":"ca-8_prm_1","label":"organization-defined frequency"},{"id":"ca-8_prm_2","label":"organization-defined information systems or system components"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-8"},{"name":"sort-id","value":"ca-08"}],"parts":[{"id":"ca-8_smt","name":"statement","prose":"The organization conducts penetration testing {{ insert: param, ca-8_prm_1 }} on {{ insert: param, ca-8_prm_2 }}."},{"id":"ca-8_gdn","name":"guidance","prose":"Penetration testing is a specialized type of assessment conducted on information systems or individual system components to identify vulnerabilities that could be exploited by adversaries. Such testing can be used to either validate vulnerabilities or determine the degree of resistance organizational information systems have to adversaries within a set of specified constraints (e.g., time, resources, and\/or skills). Penetration testing attempts to duplicate the actions of adversaries in carrying out hostile cyber attacks against organizations and provides a more in-depth analysis of security-related weaknesses\/deficiencies. Organizations can also use the results of vulnerability analyses to support penetration testing activities. Penetration testing can be conducted on the hardware, software, or firmware components of an information system and can exercise both physical and technical security controls. A standard method for penetration testing includes, for example: (i) pretest analysis based on full knowledge of the target system; (ii) pretest identification of potential vulnerabilities based on pretest analysis; and (iii) testing designed to determine exploitability of identified vulnerabilities. All parties agree to the rules of engagement before the commencement of penetration testing scenarios. Organizations correlate the penetration testing rules of engagement with the tools, techniques, and procedures that are anticipated to be employed by adversaries carrying out attacks. Organizational risk assessments guide decisions on the level of independence required for personnel conducting penetration testing.","links":[{"href":"#sa-12","rel":"related"}]},{"id":"ca-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-8_obj.1","name":"objective","props":[{"name":"label","value":"CA-8[1]"}],"prose":"defines information systems or system components on which penetration testing is to be conducted;"},{"id":"ca-8_obj.2","name":"objective","props":[{"name":"label","value":"CA-8[2]"}],"prose":"defines the frequency to conduct penetration testing on organization-defined information systems or system components; and"},{"id":"ca-8_obj.3","name":"objective","props":[{"name":"label","value":"CA-8[3]"}],"prose":"conducts penetration testing on organization-defined information systems or system components with the organization-defined frequency."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing penetration testing\n\nsecurity plan\n\nsecurity assessment plan\n\npenetration test report\n\nsecurity assessment report\n\nsecurity assessment evidence\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security assessment responsibilities\n\norganizational personnel with information security responsibilities, system\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting penetration testing"}]}]},{"id":"ca-9","class":"SP800-53","title":"Internal System Connections","params":[{"id":"ca-9_prm_1","label":"organization-defined information system components or classes of components"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-9"},{"name":"sort-id","value":"ca-09"}],"parts":[{"id":"ca-9_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Authorizes internal connections of {{ insert: param, ca-9_prm_1 }} to the information system; and"},{"id":"ca-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents, for each internal connection, the interface characteristics, security requirements, and the nature of the information communicated."}]},{"id":"ca-9_gdn","name":"guidance","prose":"This control applies to connections between organizational information systems and (separate) constituent system components (i.e., intra-system connections) including, for example, system connections with mobile devices, notebook\/desktop computers, printers, copiers, facsimile machines, scanners, sensors, and servers. Instead of authorizing each individual internal connection, organizations can authorize internal connections for a class of components with common characteristics and\/or configurations, for example, all digital printers, scanners, and copiers with a specified processing, storage, and transmission capability or all smart phones with a specific baseline configuration.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-9_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-9.a_obj","name":"objective","props":[{"name":"label","value":"CA-9(a)"}],"parts":[{"id":"ca-9.a_obj.1","name":"objective","props":[{"name":"label","value":"CA-9(a)[1]"}],"prose":"defines information system components or classes of components to be authorized as internal connections to the information system;"},{"id":"ca-9.a_obj.2","name":"objective","props":[{"name":"label","value":"CA-9(a)[2]"}],"prose":"authorizes internal connections of organization-defined information system components or classes of components to the information system;"}]},{"id":"ca-9.b_obj","name":"objective","props":[{"name":"label","value":"CA-9(b)"}],"prose":"documents, for each internal connection:","parts":[{"id":"ca-9.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-9(b)[1]"}],"prose":"the interface characteristics;"},{"id":"ca-9.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-9(b)[2]"}],"prose":"the security requirements; and"},{"id":"ca-9.b_obj.3","name":"objective","props":[{"name":"label","value":"CA-9(b)[3]"}],"prose":"the nature of the information communicated."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing information system connections\n\nsystem and communications protection policy\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of components or classes of components authorized as internal system connections\n\nsecurity assessment report\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for developing, implementing, or authorizing internal system connections\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"cm","class":"family","title":"Configuration Management","controls":[{"id":"cm-1","class":"SP800-53","title":"Configuration Management Policy and Procedures","params":[{"id":"cm-1_prm_1","label":"organization-defined personnel or roles"},{"id":"cm-1_prm_2","label":"organization-defined frequency"},{"id":"cm-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-1"},{"name":"sort-id","value":"cm-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"cm-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, cm-1_prm_1 }}:","parts":[{"id":"cm-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"cm-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the configuration management policy and associated configuration management controls; and"}]},{"id":"cm-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"cm-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Configuration management policy {{ insert: param, cm-1_prm_2 }}; and"},{"id":"cm-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Configuration management procedures {{ insert: param, cm-1_prm_3 }}."}]}]},{"id":"cm-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the CM family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"cm-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-1.a_obj","name":"objective","props":[{"name":"label","value":"CM-1(a)"}],"parts":[{"id":"cm-1.a.1_obj","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)"}],"parts":[{"id":"cm-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1]"}],"prose":"develops and documents a configuration management policy that addresses:","parts":[{"id":"cm-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"cm-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"cm-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"cm-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"cm-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"cm-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"cm-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"cm-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the configuration management policy is to be disseminated;"},{"id":"cm-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[3]"}],"prose":"disseminates the configuration management policy to organization-defined personnel or roles;"}]},{"id":"cm-1.a.2_obj","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)"}],"parts":[{"id":"cm-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the configuration management policy and associated configuration management controls;"},{"id":"cm-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"cm-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"cm-1.b_obj","name":"objective","props":[{"name":"label","value":"CM-1(b)"}],"parts":[{"id":"cm-1.b.1_obj","name":"objective","props":[{"name":"label","value":"CM-1(b)(1)"}],"parts":[{"id":"cm-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current configuration management policy;"},{"id":"cm-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(b)(1)[2]"}],"prose":"reviews and updates the current configuration management policy with the organization-defined frequency;"}]},{"id":"cm-1.b.2_obj","name":"objective","props":[{"name":"label","value":"CM-1(b)(2)"}],"parts":[{"id":"cm-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current configuration management procedures; and"},{"id":"cm-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(b)(2)[2]"}],"prose":"reviews and updates the current configuration management procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]}]},{"id":"cm-2","class":"SP800-53","title":"Baseline Configuration","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-2"},{"name":"sort-id","value":"cm-02"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-2_smt","name":"statement","prose":"The organization develops, documents, and maintains under configuration control, a current baseline configuration of the information system."},{"id":"cm-2_gdn","name":"guidance","prose":"This control establishes baseline configurations for information systems and system components including communications and connectivity-related aspects of systems. Baseline configurations are documented, formally reviewed and agreed-upon sets of specifications for information systems or configuration items within those systems. Baseline configurations serve as a basis for future builds, releases, and\/or changes to information systems. Baseline configurations include information about information system components (e.g., standard software packages installed on workstations, notebook computers, servers, network components, or mobile devices; current version numbers and patch information on operating systems and applications; and configuration settings\/parameters), network topology, and the logical placement of those components within the system architecture. Maintaining baseline configurations requires creating new baselines as organizational information systems change over time. Baseline configurations of information systems reflect the current enterprise architecture.","links":[{"href":"#cm-3","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#pm-5","rel":"related"},{"href":"#pm-7","rel":"related"}]},{"id":"cm-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-2_obj.1","name":"objective","props":[{"name":"label","value":"CM-2[1]"}],"prose":"develops and documents a current baseline configuration of the information system; and"},{"id":"cm-2_obj.2","name":"objective","props":[{"name":"label","value":"CM-2[2]"}],"prose":"maintains, under configuration control, a current baseline configuration of the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing the baseline configuration of the information system\n\nconfiguration management plan\n\nenterprise architecture documentation\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nchange control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing baseline configurations\n\nautomated mechanisms supporting configuration control of the baseline configuration"}]}],"controls":[{"id":"cm-2.1","class":"SP800-53-enhancement","title":"Reviews and Updates","params":[{"id":"cm-2.1_prm_1","label":"organization-defined frequency"},{"id":"cm-2.1_prm_2","label":"Assignment organization-defined circumstances"}],"props":[{"name":"label","value":"CM-2(1)"},{"name":"sort-id","value":"cm-02.01"}],"parts":[{"id":"cm-2.1_smt","name":"statement","prose":"The organization reviews and updates the baseline configuration of the information system:","parts":[{"id":"cm-2.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":" {{ insert: param, cm-2.1_prm_1 }};"},{"id":"cm-2.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"When required due to {{ insert: param, cm-2.1_prm_2 }}; and"},{"id":"cm-2.1_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"As an integral part of information system component installations and upgrades."}]},{"id":"cm-2.1_gdn","name":"guidance","links":[{"href":"#cm-5","rel":"related"}]},{"id":"cm-2.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-2.1.a_obj","name":"objective","props":[{"name":"label","value":"CM-2(1)(a)"}],"parts":[{"id":"cm-2.1.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(1)(a)[1]"}],"prose":"defines the frequency to review and update the baseline configuration of the information system;"},{"id":"cm-2.1.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(1)(a)[2]"}],"prose":"reviews and updates the baseline configuration of the information system with the organization-defined frequency;"}],"links":[{"href":"#cm-2.1_smt.a","rel":"corresp"}]},{"id":"cm-2.1.b_obj","name":"objective","props":[{"name":"label","value":"CM-2(1)(b)"}],"parts":[{"id":"cm-2.1.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(1)(b)[1]"}],"prose":"defines circumstances that require the baseline configuration of the information system to be reviewed and updated;"},{"id":"cm-2.1.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(1)(b)[2]"}],"prose":"reviews and updates the baseline configuration of the information system when required due to organization-defined circumstances; and"}],"links":[{"href":"#cm-2.1_smt.b","rel":"corresp"}]},{"id":"cm-2.1.c_obj","name":"objective","props":[{"name":"label","value":"CM-2(1)(c)"}],"prose":"reviews and updates the baseline configuration of the information system as an integral part of information system component installations and upgrades.","links":[{"href":"#cm-2.1_smt.c","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nconfiguration management plan\n\nprocedures addressing the baseline configuration of the information system\n\nprocedures addressing information system component installations and upgrades\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nrecords of information system baseline configuration reviews and updates\n\ninformation system component installations\/upgrades and associated records\n\nchange control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing baseline configurations\n\nautomated mechanisms supporting review and update of the baseline configuration"}]}]},{"id":"cm-2.2","class":"SP800-53-enhancement","title":"Automation Support for Accuracy \/ Currency","props":[{"name":"label","value":"CM-2(2)"},{"name":"sort-id","value":"cm-02.02"}],"parts":[{"id":"cm-2.2_smt","name":"statement","prose":"The organization employs automated mechanisms to maintain an up-to-date, complete, accurate, and readily available baseline configuration of the information system."},{"id":"cm-2.2_gdn","name":"guidance","prose":"Automated mechanisms that help organizations maintain consistent baseline configurations for information systems include, for example, hardware and software inventory tools, configuration management tools, and network management tools. Such tools can be deployed and\/or allocated as common controls, at the information system level, or at the operating system or component level (e.g., on workstations, servers, notebook computers, network components, or mobile devices). Tools can be used, for example, to track version numbers on operating system applications, types of software installed, and current patch levels. This control enhancement can be satisfied by the implementation of CM-8 (2) for organizations that choose to combine information system component inventory and baseline configuration activities.","links":[{"href":"#cm-7","rel":"related"},{"href":"#ra-5","rel":"related"}]},{"id":"cm-2.2_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to maintain:","parts":[{"id":"cm-2.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(2)[1]"}],"prose":"an up-to-date baseline configuration of the information system;"},{"id":"cm-2.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(2)[2]"}],"prose":"a complete baseline configuration of the information system;"},{"id":"cm-2.2_obj.3","name":"objective","props":[{"name":"label","value":"CM-2(2)[3]"}],"prose":"an accurate baseline configuration of the information system; and"},{"id":"cm-2.2_obj.4","name":"objective","props":[{"name":"label","value":"CM-2(2)[4]"}],"prose":"a readily available baseline configuration of the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing the baseline configuration of the information system\n\nconfiguration management plan\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nconfiguration change control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing baseline configurations\n\nautomated mechanisms implementing baseline configuration maintenance"}]}]},{"id":"cm-2.3","class":"SP800-53-enhancement","title":"Retention of Previous Configurations","params":[{"id":"cm-2.3_prm_1","label":"organization-defined previous versions of baseline configurations of the information system"}],"props":[{"name":"label","value":"CM-2(3)"},{"name":"sort-id","value":"cm-02.03"}],"parts":[{"id":"cm-2.3_smt","name":"statement","prose":"The organization retains {{ insert: param, cm-2.3_prm_1 }} to support rollback."},{"id":"cm-2.3_gdn","name":"guidance","prose":"Retaining previous versions of baseline configurations to support rollback may include, for example, hardware, software, firmware, configuration files, and configuration records."},{"id":"cm-2.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-2.3_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(3)[1]"}],"prose":"defines previous versions of baseline configurations of the information system to be retained to support rollback; and"},{"id":"cm-2.3_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(3)[2]"}],"prose":"retains organization-defined previous versions of baseline configurations of the information system to support rollback."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing the baseline configuration of the information system\n\nconfiguration management plan\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\ncopies of previous baseline configuration versions\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing baseline configurations"}]}]},{"id":"cm-2.7","class":"SP800-53-enhancement","title":"Configure Systems, Components, or Devices for High-risk Areas","params":[{"id":"cm-2.7_prm_1","label":"organization-defined information systems, system components, or devices"},{"id":"cm-2.7_prm_2","label":"organization-defined configurations"},{"id":"cm-2.7_prm_3","label":"organization-defined security safeguards"}],"props":[{"name":"label","value":"CM-2(7)"},{"name":"sort-id","value":"cm-02.07"}],"parts":[{"id":"cm-2.7_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-2.7_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Issues {{ insert: param, cm-2.7_prm_1 }} with {{ insert: param, cm-2.7_prm_2 }} to individuals traveling to locations that the organization deems to be of significant risk; and"},{"id":"cm-2.7_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Applies {{ insert: param, cm-2.7_prm_3 }} to the devices when the individuals return."}]},{"id":"cm-2.7_gdn","name":"guidance","prose":"When it is known that information systems, system components, or devices (e.g., notebook computers, mobile devices) will be located in high-risk areas, additional security controls may be implemented to counter the greater threat in such areas coupled with the lack of physical security relative to organizational-controlled areas. For example, organizational policies and procedures for notebook computers used by individuals departing on and returning from travel include, for example, determining which locations are of concern, defining required configurations for the devices, ensuring that the devices are configured as intended before travel is initiated, and applying specific safeguards to the device after travel is completed. Specially configured notebook computers include, for example, computers with sanitized hard drives, limited applications, and additional hardening (e.g., more stringent configuration settings). Specified safeguards applied to mobile devices upon return from travel include, for example, examining the device for signs of physical tampering and purging\/reimaging the hard disk drive. Protecting information residing on mobile devices is covered in the media protection family."},{"id":"cm-2.7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-2.7.a_obj","name":"objective","props":[{"name":"label","value":"CM-2(7)(a)"}],"parts":[{"id":"cm-2.7.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(7)(a)[1]"}],"prose":"defines information systems, system components, or devices to be issued to individuals traveling to locations that the organization deems to be of significant risk;"},{"id":"cm-2.7.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(7)(a)[2]"}],"prose":"defines configurations to be employed on organization-defined information systems, system components, or devices issued to individuals traveling to such locations;"},{"id":"cm-2.7.a_obj.3","name":"objective","props":[{"name":"label","value":"CM-2(7)(a)[3]"}],"prose":"issues organization-defined information systems, system components, or devices with organization-defined configurations to individuals traveling to locations that the organization deems to be of significant risk;"}],"links":[{"href":"#cm-2.7_smt.a","rel":"corresp"}]},{"id":"cm-2.7.b_obj","name":"objective","props":[{"name":"label","value":"CM-2(7)(b)"}],"parts":[{"id":"cm-2.7.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(7)(b)[1]"}],"prose":"defines security safeguards to be applied to the devices when the individuals return; and"},{"id":"cm-2.7.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(7)(b)[2]"}],"prose":"applies organization-defined safeguards to the devices when the individuals return."}],"links":[{"href":"#cm-2.7_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nconfiguration management plan\n\nprocedures addressing the baseline configuration of the information system\n\nprocedures addressing information system component installations and upgrades\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nrecords of information system baseline configuration reviews and updates\n\ninformation system component installations\/upgrades and associated records\n\nchange control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing baseline configurations"}]}]}]},{"id":"cm-3","class":"SP800-53","title":"Configuration Change Control","params":[{"id":"cm-3_prm_1","label":"organization-defined time period"},{"id":"cm-3_prm_2","label":"organization-defined configuration change control element (e.g., committee, board)"},{"id":"cm-3_prm_3","select":{"how-many":"one-or-more","choice":[" {{ insert: param, cm-3_prm_4 }} "," {{ insert: param, cm-3_prm_5 }} "]}},{"id":"cm-3_prm_4","depends-on":"cm-3_prm_3","label":"organization-defined frequency"},{"id":"cm-3_prm_5","depends-on":"cm-3_prm_3","label":"organization-defined configuration change conditions"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-3"},{"name":"sort-id","value":"cm-03"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Determines the types of changes to the information system that are configuration-controlled;"},{"id":"cm-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews proposed configuration-controlled changes to the information system and approves or disapproves such changes with explicit consideration for security impact analyses;"},{"id":"cm-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Documents configuration change decisions associated with the information system;"},{"id":"cm-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Implements approved configuration-controlled changes to the information system;"},{"id":"cm-3_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Retains records of configuration-controlled changes to the information system for {{ insert: param, cm-3_prm_1 }};"},{"id":"cm-3_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Audits and reviews activities associated with configuration-controlled changes to the information system; and"},{"id":"cm-3_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Coordinates and provides oversight for configuration change control activities through {{ insert: param, cm-3_prm_2 }} that convenes {{ insert: param, cm-3_prm_3 }}."}]},{"id":"cm-3_gdn","name":"guidance","prose":"Configuration change controls for organizational information systems involve the systematic proposal, justification, implementation, testing, review, and disposition of changes to the systems, including system upgrades and modifications. Configuration change control includes changes to baseline configurations for components and configuration items of information systems, changes to configuration settings for information technology products (e.g., operating systems, applications, firewalls, routers, and mobile devices), unscheduled\/unauthorized changes, and changes to remediate vulnerabilities. Typical processes for managing configuration changes to information systems include, for example, Configuration Control Boards that approve proposed changes to systems. For new development information systems or systems undergoing major upgrades, organizations consider including representatives from development organizations on the Configuration Control Boards. Auditing of changes includes activities before and after changes are made to organizational information systems and the auditing activities required to implement such changes.","links":[{"href":"#ca-7","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#si-2","rel":"related"},{"href":"#si-12","rel":"related"}]},{"id":"cm-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-3.a_obj","name":"objective","props":[{"name":"label","value":"CM-3(a)"}],"prose":"determines the type of changes to the information system that must be configuration-controlled;"},{"id":"cm-3.b_obj","name":"objective","props":[{"name":"label","value":"CM-3(b)"}],"prose":"reviews proposed configuration-controlled changes to the information system and approves or disapproves such changes with explicit consideration for security impact analyses;"},{"id":"cm-3.c_obj","name":"objective","props":[{"name":"label","value":"CM-3(c)"}],"prose":"documents configuration change decisions associated with the information system;"},{"id":"cm-3.d_obj","name":"objective","props":[{"name":"label","value":"CM-3(d)"}],"prose":"implements approved configuration-controlled changes to the information system;"},{"id":"cm-3.e_obj","name":"objective","props":[{"name":"label","value":"CM-3(e)"}],"parts":[{"id":"cm-3.e_obj.1","name":"objective","props":[{"name":"label","value":"CM-3(e)[1]"}],"prose":"defines a time period to retain records of configuration-controlled changes to the information system;"},{"id":"cm-3.e_obj.2","name":"objective","props":[{"name":"label","value":"CM-3(e)[2]"}],"prose":"retains records of configuration-controlled changes to the information system for the organization-defined time period;"}]},{"id":"cm-3.f_obj","name":"objective","props":[{"name":"label","value":"CM-3(f)"}],"prose":"audits and reviews activities associated with configuration-controlled changes to the information system;"},{"id":"cm-3.g_obj","name":"objective","props":[{"name":"label","value":"CM-3(g)"}],"parts":[{"id":"cm-3.g_obj.1","name":"objective","props":[{"name":"label","value":"CM-3(g)[1]"}],"prose":"defines a configuration change control element (e.g., committee, board) responsible for coordinating and providing oversight for configuration change control activities;"},{"id":"cm-3.g_obj.2","name":"objective","props":[{"name":"label","value":"CM-3(g)[2]"}],"prose":"defines the frequency with which the configuration change control element must convene; and\/or"},{"id":"cm-3.g_obj.3","name":"objective","props":[{"name":"label","value":"CM-3(g)[3]"}],"prose":"defines configuration change conditions that prompt the configuration change control element to convene; and"},{"id":"cm-3.g_obj.4","name":"objective","props":[{"name":"label","value":"CM-3(g)[4]"}],"prose":"coordinates and provides oversight for configuration change control activities through organization-defined configuration change control element that convenes at organization-defined frequency and\/or for any organization-defined configuration change conditions."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system configuration change control\n\nconfiguration management plan\n\ninformation system architecture and configuration documentation\n\nsecurity plan\n\nchange control records\n\ninformation system audit records\n\nchange control audit and review reports\n\nagenda \/minutes from configuration change control oversight meetings\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration change control responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nmembers of change control board or similar"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for configuration change control\n\nautomated mechanisms that implement configuration change control"}]}],"controls":[{"id":"cm-3.1","class":"SP800-53-enhancement","title":"Automated Document \/ Notification \/ Prohibition of Changes","params":[{"id":"cm-3.1_prm_1","label":"organized-defined approval authorities"},{"id":"cm-3.1_prm_2","label":"organization-defined time period"},{"id":"cm-3.1_prm_3","label":"organization-defined personnel"}],"props":[{"name":"label","value":"CM-3(1)"},{"name":"sort-id","value":"cm-03.01"}],"parts":[{"id":"cm-3.1_smt","name":"statement","prose":"The organization employs automated mechanisms to:","parts":[{"id":"cm-3.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Document proposed changes to the information system;"},{"id":"cm-3.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Notify {{ insert: param, cm-3.1_prm_1 }} of proposed changes to the information system and request change approval;"},{"id":"cm-3.1_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Highlight proposed changes to the information system that have not been approved or disapproved by {{ insert: param, cm-3.1_prm_2 }};"},{"id":"cm-3.1_smt.d","name":"item","props":[{"name":"label","value":"(d)"}],"prose":"Prohibit changes to the information system until designated approvals are received;"},{"id":"cm-3.1_smt.e","name":"item","props":[{"name":"label","value":"(e)"}],"prose":"Document all changes to the information system; and"},{"id":"cm-3.1_smt.f","name":"item","props":[{"name":"label","value":"(f)"}],"prose":"Notify {{ insert: param, cm-3.1_prm_3 }} when approved changes to the information system are completed."}]},{"id":"cm-3.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-3.1.a_obj","name":"objective","props":[{"name":"label","value":"CM-3(1)(a)"}],"prose":"employs automated mechanisms to document proposed changes to the information system;","links":[{"href":"#cm-3.1_smt.a","rel":"corresp"}]},{"id":"cm-3.1.b_obj","name":"objective","props":[{"name":"label","value":"CM-3(1)(b)"}],"parts":[{"id":"cm-3.1.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-3(1)(b)[1]"}],"prose":"defines approval authorities to be notified of proposed changes to the information system and request change approval;"},{"id":"cm-3.1.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-3(1)(b)[2]"}],"prose":"employs automated mechanisms to notify organization-defined approval authorities of proposed changes to the information system and request change approval;"}],"links":[{"href":"#cm-3.1_smt.b","rel":"corresp"}]},{"id":"cm-3.1.c_obj","name":"objective","props":[{"name":"label","value":"CM-3(1)(c)"}],"parts":[{"id":"cm-3.1.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-3(1)(c)[1]"}],"prose":"defines the time period within which proposed changes to the information system that have not been approved or disapproved must be highlighted;"},{"id":"cm-3.1.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-3(1)(c)[2]"}],"prose":"employs automated mechanisms to highlight proposed changes to the information system that have not been approved or disapproved by organization-defined time period;"}],"links":[{"href":"#cm-3.1_smt.c","rel":"corresp"}]},{"id":"cm-3.1.d_obj","name":"objective","props":[{"name":"label","value":"CM-3(1)(d)"}],"prose":"employs automated mechanisms to prohibit changes to the information system until designated approvals are received;","links":[{"href":"#cm-3.1_smt.d","rel":"corresp"}]},{"id":"cm-3.1.e_obj","name":"objective","props":[{"name":"label","value":"CM-3(1)(e)"}],"prose":"employs automated mechanisms to document all changes to the information system;","links":[{"href":"#cm-3.1_smt.e","rel":"corresp"}]},{"id":"cm-3.1.f_obj","name":"objective","props":[{"name":"label","value":"CM-3(1)(f)"}],"parts":[{"id":"cm-3.1.f_obj.1","name":"objective","props":[{"name":"label","value":"CM-3(1)(f)[1]"}],"prose":"defines personnel to be notified when approved changes to the information system are completed; and"},{"id":"cm-3.1.f_obj.2","name":"objective","props":[{"name":"label","value":"CM-3(1)(f)[2]"}],"prose":"employs automated mechanisms to notify organization-defined personnel when approved changes to the information system are completed."}],"links":[{"href":"#cm-3.1_smt.f","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system configuration change control\n\nconfiguration management plan\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\nautomated configuration control mechanisms\n\ninformation system configuration settings and associated documentation\n\nchange control records\n\ninformation system audit records\n\nchange approval requests\n\nchange approvals\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration change control responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for configuration change control\n\nautomated mechanisms implementing configuration change control activities"}]}]},{"id":"cm-3.2","class":"SP800-53-enhancement","title":"Test \/ Validate \/ Document Changes","props":[{"name":"label","value":"CM-3(2)"},{"name":"sort-id","value":"cm-03.02"}],"parts":[{"id":"cm-3.2_smt","name":"statement","prose":"The organization tests, validates, and documents changes to the information system before implementing the changes on the operational system."},{"id":"cm-3.2_gdn","name":"guidance","prose":"Changes to information systems include modifications to hardware, software, or firmware components and configuration settings defined in CM-6. Organizations ensure that testing does not interfere with information system operations. Individuals\/groups conducting tests understand organizational security policies and procedures, information system security policies and procedures, and the specific health, safety, and environmental risks associated with particular facilities\/processes. Operational systems may need to be taken off-line, or replicated to the extent feasible, before testing can be conducted. If information systems must be taken off-line for testing, the tests are scheduled to occur during planned system outages whenever possible. If testing cannot be conducted on operational systems, organizations employ compensating controls (e.g., testing on replicated systems)."},{"id":"cm-3.2_obj","name":"objective","prose":"Determine if the organization, before implementing changes on the operational system:","parts":[{"id":"cm-3.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-3(2)[1]"}],"prose":"tests changes to the information system;"},{"id":"cm-3.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-3(2)[2]"}],"prose":"validates changes to the information system; and"},{"id":"cm-3.2_obj.3","name":"objective","props":[{"name":"label","value":"CM-3(2)[3]"}],"prose":"documents changes to the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nconfiguration management plan\n\nprocedures addressing information system configuration change control\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\ntest records\n\nvalidation records\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration change control responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for configuration change control\n\nautomated mechanisms supporting and\/or implementing testing, validating, and documenting information system changes"}]}]}]},{"id":"cm-4","class":"SP800-53","title":"Security Impact Analysis","props":[{"name":"priority","value":"P2"},{"name":"label","value":"CM-4"},{"name":"sort-id","value":"cm-04"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-4_smt","name":"statement","prose":"The organization analyzes changes to the information system to determine potential security impacts prior to change implementation."},{"id":"cm-4_gdn","name":"guidance","prose":"Organizational personnel with information security responsibilities (e.g., Information System Administrators, Information System Security Officers, Information System Security Managers, and Information System Security Engineers) conduct security impact analyses. Individuals conducting security impact analyses possess the necessary skills\/technical expertise to analyze the changes to information systems and the associated security ramifications. Security impact analysis may include, for example, reviewing security plans to understand security control requirements and reviewing system design documentation to understand control implementation and how specific changes might affect the controls. Security impact analyses may also include assessments of risk to better understand the impact of the changes and to determine if additional security controls are required. Security impact analyses are scaled in accordance with the security categories of the information systems.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"cm-4_obj","name":"objective","prose":"Determine if the organization analyzes changes to the information system to determine potential security impacts prior to change implementation."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing security impact analysis for changes to the information system\n\nconfiguration management plan\n\nsecurity impact analysis documentation\n\nanalysis tools and associated outputs\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for conducting security impact analysis\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security impact analysis"}]}],"controls":[{"id":"cm-4.1","class":"SP800-53-enhancement","title":"Separate Test Environments","props":[{"name":"label","value":"CM-4(1)"},{"name":"sort-id","value":"cm-04.01"}],"parts":[{"id":"cm-4.1_smt","name":"statement","prose":"The organization analyzes changes to the information system in a separate test environment before implementation in an operational environment, looking for security impacts due to flaws, weaknesses, incompatibility, or intentional malice."},{"id":"cm-4.1_gdn","name":"guidance","prose":"Separate test environment in this context means an environment that is physically or logically isolated and distinct from the operational environment. The separation is sufficient to ensure that activities in the test environment do not impact activities in the operational environment, and information in the operational environment is not inadvertently transmitted to the test environment. Separate environments can be achieved by physical or logical means. If physically separate test environments are not used, organizations determine the strength of mechanism required when implementing logical separation (e.g., separation achieved through virtual machines).","links":[{"href":"#sa-11","rel":"related"},{"href":"#sc-3","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"cm-4.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-4.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-4(1)[1]"}],"prose":"analyzes changes to the information system in a separate test environment before implementation in an operational environment;"},{"id":"cm-4.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-4(1)[2]"}],"prose":"when analyzing changes to the information system in a separate test environment, looks for security impacts due to:","parts":[{"id":"cm-4.1_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-4(1)[2][a]"}],"prose":"flaws;"},{"id":"cm-4.1_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-4(1)[2][b]"}],"prose":"weaknesses;"},{"id":"cm-4.1_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-4(1)[2][c]"}],"prose":"incompatibility; and"},{"id":"cm-4.1_obj.2.d","name":"objective","props":[{"name":"label","value":"CM-4(1)[2][d]"}],"prose":"intentional malice."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing security impact analysis for changes to the information system\n\nconfiguration management plan\n\nsecurity impact analysis documentation\n\nanalysis tools and associated outputs information system design documentation\n\ninformation system architecture and configuration documentation\n\nchange control records\n\ninformation system audit records\n\ndocumentation evidence of separate test and operational environments\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for conducting security impact analysis\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security impact analysis\n\nautomated mechanisms supporting and\/or implementing security impact analysis of changes"}]}]}]},{"id":"cm-5","class":"SP800-53","title":"Access Restrictions for Change","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-5"},{"name":"sort-id","value":"cm-05"}],"parts":[{"id":"cm-5_smt","name":"statement","prose":"The organization defines, documents, approves, and enforces physical and logical access restrictions associated with changes to the information system."},{"id":"cm-5_gdn","name":"guidance","prose":"Any changes to the hardware, software, and\/or firmware components of information systems can potentially have significant effects on the overall security of the systems. Therefore, organizations permit only qualified and authorized individuals to access information systems for purposes of initiating changes, including upgrades and modifications. Organizations maintain records of access to ensure that configuration change control is implemented and to support after-the-fact actions should organizations discover any unauthorized changes. Access restrictions for change also include software libraries. Access restrictions include, for example, physical and logical access controls (see AC-3 and PE-3), workflow automation, media libraries, abstract layers (e.g., changes implemented into third-party interfaces rather than directly into information systems), and change windows (e.g., changes occur only during specified times, making unauthorized changes easy to discover).","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#pe-3","rel":"related"}]},{"id":"cm-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-5_obj.1","name":"objective","props":[{"name":"label","value":"CM-5[1]"}],"prose":"defines physical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.2","name":"objective","props":[{"name":"label","value":"CM-5[2]"}],"prose":"documents physical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.3","name":"objective","props":[{"name":"label","value":"CM-5[3]"}],"prose":"approves physical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.4","name":"objective","props":[{"name":"label","value":"CM-5[4]"}],"prose":"enforces physical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.5","name":"objective","props":[{"name":"label","value":"CM-5[5]"}],"prose":"defines logical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.6","name":"objective","props":[{"name":"label","value":"CM-5[6]"}],"prose":"documents logical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.7","name":"objective","props":[{"name":"label","value":"CM-5[7]"}],"prose":"approves logical access restrictions associated with changes to the information system; and"},{"id":"cm-5_obj.8","name":"objective","props":[{"name":"label","value":"CM-5[8]"}],"prose":"enforces logical access restrictions associated with changes to the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing access restrictions for changes to the information system\n\nconfiguration management plan\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nlogical access approvals\n\nphysical access approvals\n\naccess credentials\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with logical access control responsibilities\n\norganizational personnel with physical access control responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing access restrictions to change\n\nautomated mechanisms supporting\/implementing\/enforcing access restrictions associated with changes to the information system"}]}],"controls":[{"id":"cm-5.1","class":"SP800-53-enhancement","title":"Automated Access Enforcement \/ Auditing","props":[{"name":"label","value":"CM-5(1)"},{"name":"sort-id","value":"cm-05.01"}],"parts":[{"id":"cm-5.1_smt","name":"statement","prose":"The information system enforces access restrictions and supports auditing of the enforcement actions."},{"id":"cm-5.1_gdn","name":"guidance","links":[{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-6","rel":"related"}]},{"id":"cm-5.1_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"cm-5.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-5(1)[1]"}],"prose":"enforces access restrictions for change; and"},{"id":"cm-5.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-5(1)[2]"}],"prose":"supports auditing of the enforcement actions."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing access restrictions for changes to the information system\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing access restrictions to change\n\nautomated mechanisms implementing enforcement of access restrictions for changes to the information system\n\nautomated mechanisms supporting auditing of enforcement actions"}]}]},{"id":"cm-5.2","class":"SP800-53-enhancement","title":"Review System Changes","params":[{"id":"cm-5.2_prm_1","label":"organization-defined frequency"},{"id":"cm-5.2_prm_2","label":"organization-defined circumstances"}],"props":[{"name":"label","value":"CM-5(2)"},{"name":"sort-id","value":"cm-05.02"}],"parts":[{"id":"cm-5.2_smt","name":"statement","prose":"The organization reviews information system changes {{ insert: param, cm-5.2_prm_1 }} and {{ insert: param, cm-5.2_prm_2 }} to determine whether unauthorized changes have occurred."},{"id":"cm-5.2_gdn","name":"guidance","prose":"Indications that warrant review of information system changes and the specific circumstances justifying such reviews may be obtained from activities carried out by organizations during the configuration change process.","links":[{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#pe-6","rel":"related"},{"href":"#pe-8","rel":"related"}]},{"id":"cm-5.2_obj","name":"objective","prose":"Determine if the organization, in an effort to ascertain whether unauthorized changes have occurred:","parts":[{"id":"cm-5.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-5(2)[1]"}],"prose":"defines the frequency to review information system changes;"},{"id":"cm-5.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-5(2)[2]"}],"prose":"defines circumstances that warrant review of information system changes;"},{"id":"cm-5.2_obj.3","name":"objective","props":[{"name":"label","value":"CM-5(2)[3]"}],"prose":"reviews information system changes with the organization-defined frequency; and"},{"id":"cm-5.2_obj.4","name":"objective","props":[{"name":"label","value":"CM-5(2)[4]"}],"prose":"reviews information system changes with the organization-defined circumstances."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing access restrictions for changes to the information system\n\nconfiguration management plan\n\nsecurity plan\n\nreviews of information system changes\n\naudit and review reports\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing access restrictions to change\n\nautomated mechanisms supporting\/implementing information system reviews to determine whether unauthorized changes have occurred"}]}]},{"id":"cm-5.3","class":"SP800-53-enhancement","title":"Signed Components","params":[{"id":"cm-5.3_prm_1","label":"organization-defined software and firmware components"}],"props":[{"name":"label","value":"CM-5(3)"},{"name":"sort-id","value":"cm-05.03"}],"parts":[{"id":"cm-5.3_smt","name":"statement","prose":"The information system prevents the installation of {{ insert: param, cm-5.3_prm_1 }} without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization."},{"id":"cm-5.3_gdn","name":"guidance","prose":"Software and firmware components prevented from installation unless signed with recognized and approved certificates include, for example, software and firmware version updates, patches, service packs, device drivers, and basic input output system (BIOS) updates. Organizations can identify applicable software and firmware components by type, by specific items, or a combination of both. Digital signatures and organizational verification of such signatures, is a method of code authentication.","links":[{"href":"#cm-7","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"cm-5.3_obj","name":"objective","prose":"Determine if:","parts":[{"id":"cm-5.3_obj.1","name":"objective","props":[{"name":"label","value":"CM-5(3)[1]"}],"prose":"the organization defines software and firmware components that the information system will prevent from being installed without verification that such components have been digitally signed using a certificate that is recognized and approved by the organization; and"},{"id":"cm-5.3_obj.2","name":"objective","props":[{"name":"label","value":"CM-5(3)[2]"}],"prose":"the information system prevents the installation of organization-defined software and firmware components without verification that such components have been digitally signed using a certificate that is recognized and approved by the organization."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing access restrictions for changes to the information system\n\nconfiguration management plan\n\nsecurity plan\n\nlist of software and firmware components to be prohibited from installation without a recognized and approved certificate\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing access restrictions to change\n\nautomated mechanisms preventing installation of software and firmware components not signed with an organization-recognized and approved certificate"}]}]}]},{"id":"cm-6","class":"SP800-53","title":"Configuration Settings","params":[{"id":"cm-6_prm_1","label":"organization-defined security configuration checklists"},{"id":"cm-6_prm_2","label":"organization-defined information system components"},{"id":"cm-6_prm_3","label":"organization-defined operational requirements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-6"},{"name":"sort-id","value":"cm-06"}],"links":[{"href":"#990268bf-f4a9-4c81-91ae-dc7d3115f4b1","rel":"reference"},{"href":"#0b3d8ba9-051f-498d-81ea-97f0f018c612","rel":"reference"},{"href":"#0916ef02-3618-411b-a525-565c088849a6","rel":"reference"},{"href":"#84a37532-6db6-477b-9ea8-f9085ebca0fc","rel":"reference"},{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"},{"href":"#275cc052-0f7f-423c-bdb6-ed503dc36228","rel":"reference"},{"href":"#e95dd121-2733-413e-bf1e-f1eb49f20a98","rel":"reference"},{"href":"#647b6de3-81d0-4d22-bec1-5f1333e34380","rel":"reference"}],"parts":[{"id":"cm-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes and documents configuration settings for information technology products employed within the information system using {{ insert: param, cm-6_prm_1 }} that reflect the most restrictive mode consistent with operational requirements;"},{"id":"cm-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Implements the configuration settings;"},{"id":"cm-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Identifies, documents, and approves any deviations from established configuration settings for {{ insert: param, cm-6_prm_2 }} based on {{ insert: param, cm-6_prm_3 }}; and"},{"id":"cm-6_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Monitors and controls changes to the configuration settings in accordance with organizational policies and procedures."}]},{"id":"cm-6_gdn","name":"guidance","prose":"Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the information system that affect the security posture and\/or functionality of the system. Information technology products for which security-related configuration settings can be defined include, for example, mainframe computers, servers (e.g., database, electronic mail, authentication, web, proxy, file, domain name), workstations, input\/output devices (e.g., scanners, copiers, and printers), network components (e.g., firewalls, routers, gateways, voice and data switches, wireless access points, network appliances, sensors), operating systems, middleware, and applications. Security-related parameters are those parameters impacting the security state of information systems including the parameters required to satisfy other security control requirements. Security-related parameters include, for example: (i) registry settings; (ii) account, file, directory permission settings; and (iii) settings for functions, ports, protocols, services, and remote connections. Organizations establish organization-wide configuration settings and subsequently derive specific settings for information systems. The established settings become part of the systems configuration baseline. Common secure configurations (also referred to as security configuration checklists, lockdown and hardening guides, security reference guides, security technical implementation guides) provide recognized, standardized, and established benchmarks that stipulate secure configuration settings for specific information technology platforms\/products and instructions for configuring those information system components to meet operational requirements. Common secure configurations can be developed by a variety of organizations including, for example, information technology product developers, manufacturers, vendors, consortia, academia, industry, federal agencies, and other organizations in the public and private sectors. Common secure configurations include the United States Government Configuration Baseline (USGCB) which affects the implementation of CM-6 and other controls such as AC-19 and CM-7. The Security Content Automation Protocol (SCAP) and the defined standards within the protocol (e.g., Common Configuration Enumeration) provide an effective method to uniquely identify, track, and control configuration settings. OMB establishes federal policy on configuration requirements for federal information systems.","links":[{"href":"#ac-19","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"cm-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-6.a_obj","name":"objective","props":[{"name":"label","value":"CM-6(a)"}],"parts":[{"id":"cm-6.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(a)[1]"}],"prose":"defines security configuration checklists to be used to establish and document configuration settings for the information technology products employed;"},{"id":"cm-6.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(a)[2]"}],"prose":"ensures the defined security configuration checklists reflect the most restrictive mode consistent with operational requirements;"},{"id":"cm-6.a_obj.3","name":"objective","props":[{"name":"label","value":"CM-6(a)[3]"}],"prose":"establishes and documents configuration settings for information technology products employed within the information system using organization-defined security configuration checklists;"}]},{"id":"cm-6.b_obj","name":"objective","props":[{"name":"label","value":"CM-6(b)"}],"prose":"implements the configuration settings established\/documented in CM-6(a);;"},{"id":"cm-6.c_obj","name":"objective","props":[{"name":"label","value":"CM-6(c)"}],"parts":[{"id":"cm-6.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(c)[1]"}],"prose":"defines information system components for which any deviations from established configuration settings must be:","parts":[{"id":"cm-6.c_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-6(c)[1][a]"}],"prose":"identified;"},{"id":"cm-6.c_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-6(c)[1][b]"}],"prose":"documented;"},{"id":"cm-6.c_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-6(c)[1][c]"}],"prose":"approved;"}]},{"id":"cm-6.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(c)[2]"}],"prose":"defines operational requirements to support:","parts":[{"id":"cm-6.c_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-6(c)[2][a]"}],"prose":"the identification of any deviations from established configuration settings;"},{"id":"cm-6.c_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-6(c)[2][b]"}],"prose":"the documentation of any deviations from established configuration settings;"},{"id":"cm-6.c_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-6(c)[2][c]"}],"prose":"the approval of any deviations from established configuration settings;"}]},{"id":"cm-6.c_obj.3","name":"objective","props":[{"name":"label","value":"CM-6(c)[3]"}],"prose":"identifies any deviations from established configuration settings for organization-defined information system components based on organizational-defined operational requirements;"},{"id":"cm-6.c_obj.4","name":"objective","props":[{"name":"label","value":"CM-6(c)[4]"}],"prose":"documents any deviations from established configuration settings for organization-defined information system components based on organizational-defined operational requirements;"},{"id":"cm-6.c_obj.5","name":"objective","props":[{"name":"label","value":"CM-6(c)[5]"}],"prose":"approves any deviations from established configuration settings for organization-defined information system components based on organizational-defined operational requirements;"}]},{"id":"cm-6.d_obj","name":"objective","props":[{"name":"label","value":"CM-6(d)"}],"parts":[{"id":"cm-6.d_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(d)[1]"}],"prose":"monitors changes to the configuration settings in accordance with organizational policies and procedures; and"},{"id":"cm-6.d_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(d)[2]"}],"prose":"controls changes to the configuration settings in accordance with organizational policies and procedures."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing configuration settings for the information system\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity configuration checklists\n\nevidence supporting approved deviations from established configuration settings\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing configuration settings\n\nautomated mechanisms that implement, monitor, and\/or control information system configuration settings\n\nautomated mechanisms that identify and\/or document deviations from established configuration settings"}]}],"controls":[{"id":"cm-6.1","class":"SP800-53-enhancement","title":"Automated Central Management \/ Application \/ Verification","params":[{"id":"cm-6.1_prm_1","label":"organization-defined information system components"}],"props":[{"name":"label","value":"CM-6(1)"},{"name":"sort-id","value":"cm-06.01"}],"parts":[{"id":"cm-6.1_smt","name":"statement","prose":"The organization employs automated mechanisms to centrally manage, apply, and verify configuration settings for {{ insert: param, cm-6.1_prm_1 }}."},{"id":"cm-6.1_gdn","name":"guidance","links":[{"href":"#ca-7","rel":"related"},{"href":"#cm-4","rel":"related"}]},{"id":"cm-6.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-6.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(1)[1]"}],"prose":"defines information system components for which automated mechanisms are to be employed to:","parts":[{"id":"cm-6.1_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-6(1)[1][a]"}],"prose":"centrally manage configuration settings of such components;"},{"id":"cm-6.1_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-6(1)[1][b]"}],"prose":"apply configuration settings of such components;"},{"id":"cm-6.1_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-6(1)[1][c]"}],"prose":"verify configuration settings of such components;"}]},{"id":"cm-6.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(1)[2]"}],"prose":"employs automated mechanisms to:","parts":[{"id":"cm-6.1_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-6(1)[2][a]"}],"prose":"centrally manage configuration settings for organization-defined information system components;"},{"id":"cm-6.1_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-6(1)[2][b]"}],"prose":"apply configuration settings for organization-defined information system components; and"},{"id":"cm-6.1_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-6(1)[2][c]"}],"prose":"verify configuration settings for organization-defined information system components."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing configuration settings for the information system\n\nconfiguration management plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity configuration checklists\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing configuration settings\n\nautomated mechanisms implemented to centrally manage, apply, and verify information system configuration settings"}]}]},{"id":"cm-6.2","class":"SP800-53-enhancement","title":"Respond to Unauthorized Changes","params":[{"id":"cm-6.2_prm_1","label":"organization-defined security safeguards"},{"id":"cm-6.2_prm_2","label":"organization-defined configuration settings"}],"props":[{"name":"label","value":"CM-6(2)"},{"name":"sort-id","value":"cm-06.02"}],"parts":[{"id":"cm-6.2_smt","name":"statement","prose":"The organization employs {{ insert: param, cm-6.2_prm_1 }} to respond to unauthorized changes to {{ insert: param, cm-6.2_prm_2 }}."},{"id":"cm-6.2_gdn","name":"guidance","prose":"Responses to unauthorized changes to configuration settings can include, for example, alerting designated organizational personnel, restoring established configuration settings, or in extreme cases, halting affected information system processing.","links":[{"href":"#ir-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"cm-6.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-6.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(2)[1]"}],"prose":"defines configuration settings that, if modified by unauthorized changes, result in organizational security safeguards being employed to respond to such changes;"},{"id":"cm-6.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(2)[2]"}],"prose":"defines security safeguards to be employed to respond to unauthorized changes to organization-defined configuration settings; and"},{"id":"cm-6.2_obj.3","name":"objective","props":[{"name":"label","value":"CM-6(2)[3]"}],"prose":"employs organization-defined security safeguards to respond to unauthorized changes to organization-defined configuration settings."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing configuration settings for the information system\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nalerts\/notifications of unauthorized changes to information system configuration settings\n\ndocumented responses to unauthorized changes to information system configuration settings\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for responding to unauthorized changes to information system configuration settings\n\nautomated mechanisms supporting and\/or implementing security safeguards for response to unauthorized changes"}]}]}]},{"id":"cm-7","class":"SP800-53","title":"Least Functionality","params":[{"id":"cm-7_prm_1","label":"organization-defined prohibited or restricted functions, ports, protocols, and\/or services"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-7"},{"name":"sort-id","value":"cm-07"}],"links":[{"href":"#e42b2099-3e1c-415b-952c-61c96533c12e","rel":"reference"}],"parts":[{"id":"cm-7_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Configures the information system to provide only essential capabilities; and"},{"id":"cm-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Prohibits or restricts the use of the following functions, ports, protocols, and\/or services: {{ insert: param, cm-7_prm_1 }}."}]},{"id":"cm-7_gdn","name":"guidance","prose":"Information systems can provide a wide variety of functions and services. Some of the functions and services, provided by default, may not be necessary to support essential organizational operations (e.g., key missions, functions). Additionally, it is sometimes convenient to provide multiple services from single information system components, but doing so increases risk over limiting the services provided by any one component. Where feasible, organizations limit component functionality to a single function per device (e.g., email servers or web servers, but not both). Organizations review functions and services provided by information systems or individual components of information systems, to determine which functions and services are candidates for elimination (e.g., Voice Over Internet Protocol, Instant Messaging, auto-execute, and file sharing). Organizations consider disabling unused or unnecessary physical and logical ports\/protocols (e.g., Universal Serial Bus, File Transfer Protocol, and Hyper Text Transfer Protocol) on information systems to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling. Organizations can utilize network scanning tools, intrusion detection and prevention systems, and end-point protections such as firewalls and host-based intrusion detection systems to identify and prevent the use of prohibited functions, ports, protocols, and services.","links":[{"href":"#ac-6","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"cm-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-7.a_obj","name":"objective","props":[{"name":"label","value":"CM-7(a)"}],"prose":"configures the information system to provide only essential capabilities;"},{"id":"cm-7.b_obj","name":"objective","props":[{"name":"label","value":"CM-7(b)"}],"parts":[{"id":"cm-7.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(b)[1]"}],"prose":"defines prohibited or restricted:","parts":[{"id":"cm-7.b_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][a]"}],"prose":"functions;"},{"id":"cm-7.b_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][b]"}],"prose":"ports;"},{"id":"cm-7.b_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.b_obj.1.d","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][d]"}],"prose":"services;"}]},{"id":"cm-7.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(b)[2]"}],"prose":"prohibits or restricts the use of organization-defined:","parts":[{"id":"cm-7.b_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][a]"}],"prose":"functions;"},{"id":"cm-7.b_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][b]"}],"prose":"ports;"},{"id":"cm-7.b_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.b_obj.2.d","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][d]"}],"prose":"services."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nconfiguration management plan\n\nprocedures addressing least functionality in the information system\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity configuration checklists\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes prohibiting or restricting functions, ports, protocols, and\/or services\n\nautomated mechanisms implementing restrictions or prohibition of functions, ports, protocols, and\/or services"}]}],"controls":[{"id":"cm-7.1","class":"SP800-53-enhancement","title":"Periodic Review","params":[{"id":"cm-7.1_prm_1","label":"organization-defined frequency"},{"id":"cm-7.1_prm_2","label":"organization-defined functions, ports, protocols, and services within the information system deemed to be unnecessary and\/or nonsecure"}],"props":[{"name":"label","value":"CM-7(1)"},{"name":"sort-id","value":"cm-07.01"}],"parts":[{"id":"cm-7.1_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-7.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Reviews the information system {{ insert: param, cm-7.1_prm_1 }} to identify unnecessary and\/or nonsecure functions, ports, protocols, and services; and"},{"id":"cm-7.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Disables {{ insert: param, cm-7.1_prm_2 }}."}]},{"id":"cm-7.1_gdn","name":"guidance","prose":"The organization can either make a determination of the relative security of the function, port, protocol, and\/or service or base the security decision on the assessment of other entities. Bluetooth, FTP, and peer-to-peer networking are examples of less than secure protocols.","links":[{"href":"#ac-18","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#ia-2","rel":"related"}]},{"id":"cm-7.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-7.1.a_obj","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)"}],"parts":[{"id":"cm-7.1.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[1]"}],"prose":"defines the frequency to review the information system to identify unnecessary and\/or nonsecure:","parts":[{"id":"cm-7.1.a_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[1][a]"}],"prose":"functions;"},{"id":"cm-7.1.a_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[1][b]"}],"prose":"ports;"},{"id":"cm-7.1.a_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[1][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.1.a_obj.1.d","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[1][d]"}],"prose":"services;"}]},{"id":"cm-7.1.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[2]"}],"prose":"reviews the information system with the organization-defined frequency to identify unnecessary and\/or nonsecure:","parts":[{"id":"cm-7.1.a_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[2][a]"}],"prose":"functions;"},{"id":"cm-7.1.a_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[2][b]"}],"prose":"ports;"},{"id":"cm-7.1.a_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[2][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.1.a_obj.2.d","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[2][d]"}],"prose":"services;"}]}],"links":[{"href":"#cm-7.1_smt.a","rel":"corresp"}]},{"id":"cm-7.1.b_obj","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)"}],"parts":[{"id":"cm-7.1.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[1]"}],"prose":"defines, within the information system, unnecessary and\/or nonsecure:","parts":[{"id":"cm-7.1.b_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[1][a]"}],"prose":"functions;"},{"id":"cm-7.1.b_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[1][b]"}],"prose":"ports;"},{"id":"cm-7.1.b_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[1][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.1.b_obj.1.d","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[1][d]"}],"prose":"services;"}]},{"id":"cm-7.1.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[2]"}],"prose":"disables organization-defined unnecessary and\/or nonsecure:","parts":[{"id":"cm-7.1.b_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[2][a]"}],"prose":"functions;"},{"id":"cm-7.1.b_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[2][b]"}],"prose":"ports;"},{"id":"cm-7.1.b_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[2][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.1.b_obj.2.d","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[2][d]"}],"prose":"services."}]}],"links":[{"href":"#cm-7.1_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing least functionality in the information system\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity configuration checklists\n\ndocumented reviews of functions, ports, protocols, and\/or services\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for reviewing functions, ports, protocols, and services on the information system\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for reviewing\/disabling nonsecure functions, ports, protocols, and\/or services\n\nautomated mechanisms implementing review and disabling of nonsecure functions, ports, protocols, and\/or services"}]}]},{"id":"cm-7.2","class":"SP800-53-enhancement","title":"Prevent Program Execution","params":[{"id":"cm-7.2_prm_1","select":{"how-many":"one-or-more","choice":[" {{ insert: param, cm-7.2_prm_2 }} ","rules authorizing the terms and conditions of software program usage"]}},{"id":"cm-7.2_prm_2","depends-on":"cm-7.2_prm_1","label":"organization-defined policies regarding software program usage and restrictions"}],"props":[{"name":"label","value":"CM-7(2)"},{"name":"sort-id","value":"cm-07.02"}],"parts":[{"id":"cm-7.2_smt","name":"statement","prose":"The information system prevents program execution in accordance with {{ insert: param, cm-7.2_prm_1 }}."},{"id":"cm-7.2_gdn","name":"guidance","links":[{"href":"#cm-8","rel":"related"},{"href":"#pm-5","rel":"related"}]},{"id":"cm-7.2_obj","name":"objective","prose":"Determine if:","parts":[{"id":"cm-7.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(2)[1]"}],"prose":"the organization defines policies regarding software program usage and restrictions;"},{"id":"cm-7.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(2)[2]"}],"prose":"the information system prevents program execution in accordance with one or more of the following:","parts":[{"id":"cm-7.2_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-7(2)[2][a]"}],"prose":"organization-defined policies regarding program usage and restrictions; and\/or"},{"id":"cm-7.2_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-7(2)[2][b]"}],"prose":"rules authorizing the terms and conditions of software program usage."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing least functionality in the information system\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\nspecifications for preventing software program execution\n\ninformation system configuration settings and associated documentation\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes preventing program execution on the information system\n\norganizational processes for software program usage and restrictions\n\nautomated mechanisms preventing program execution on the information system\n\nautomated mechanisms supporting and\/or implementing software program usage and restrictions"}]}]},{"id":"cm-7.5","class":"SP800-53-enhancement","title":"Authorized Software \/ Whitelisting","params":[{"id":"cm-7.5_prm_1","label":"organization-defined software programs authorized to execute on the information system"},{"id":"cm-7.5_prm_2","label":"organization-defined frequency"}],"props":[{"name":"label","value":"CM-7(5)"},{"name":"sort-id","value":"cm-07.05"}],"parts":[{"id":"cm-7.5_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-7.5_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Identifies {{ insert: param, cm-7.5_prm_1 }};"},{"id":"cm-7.5_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Employs a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the information system; and"},{"id":"cm-7.5_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Reviews and updates the list of authorized software programs {{ insert: param, cm-7.5_prm_2 }}."}]},{"id":"cm-7.5_gdn","name":"guidance","prose":"The process used to identify software programs that are authorized to execute on organizational information systems is commonly referred to as whitelisting. In addition to whitelisting, organizations consider verifying the integrity of white-listed software programs using, for example, cryptographic checksums, digital signatures, or hash functions. Verification of white-listed software can occur either prior to execution or at system startup.","links":[{"href":"#cm-2","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#pm-5","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#sc-34","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"cm-7.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-7.5.a_obj","name":"objective","props":[{"name":"label","value":"CM-7(5)(a)"}],"prose":"Identifies\/defines software programs authorized to execute on the information system;","links":[{"href":"#cm-7.5_smt.a","rel":"corresp"}]},{"id":"cm-7.5.b_obj","name":"objective","props":[{"name":"label","value":"CM-7(5)(b)"}],"prose":"employs a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the information system;","links":[{"href":"#cm-7.5_smt.b","rel":"corresp"}]},{"id":"cm-7.5.c_obj","name":"objective","props":[{"name":"label","value":"CM-7(5)(c)"}],"parts":[{"id":"cm-7.5.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(5)(c)[1]"}],"prose":"defines the frequency to review and update the list of authorized software programs on the information system; and"},{"id":"cm-7.5.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(5)(c)[2]"}],"prose":"reviews and updates the list of authorized software programs with the organization-defined frequency."}],"links":[{"href":"#cm-7.5_smt.c","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing least functionality in the information system\n\nconfiguration management plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of software programs authorized to execute on the information system\n\nsecurity configuration checklists\n\nreview and update records associated with list of authorized software programs\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for identifying software authorized to execute on the information system\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for identifying, reviewing, and updating programs authorized to execute on the information system\n\norganizational process for implementing whitelisting\n\nautomated mechanisms implementing whitelisting"}]}]}]},{"id":"cm-8","class":"SP800-53","title":"Information System Component Inventory","params":[{"id":"cm-8_prm_1","label":"organization-defined information deemed necessary to achieve effective information system component accountability"},{"id":"cm-8_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-8"},{"name":"sort-id","value":"cm-08"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops and documents an inventory of information system components that:","parts":[{"id":"cm-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Accurately reflects the current information system;"},{"id":"cm-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Includes all components within the authorization boundary of the information system;"},{"id":"cm-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Is at the level of granularity deemed necessary for tracking and reporting; and"},{"id":"cm-8_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Includes {{ insert: param, cm-8_prm_1 }}; and"}]},{"id":"cm-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the information system component inventory {{ insert: param, cm-8_prm_2 }}."}]},{"id":"cm-8_gdn","name":"guidance","prose":"Organizations may choose to implement centralized information system component inventories that include components from all organizational information systems. In such situations, organizations ensure that the resulting inventories include system-specific information required for proper component accountability (e.g., information system association, information system owner). Information deemed necessary for effective accountability of information system components includes, for example, hardware inventory specifications, software license information, software version numbers, component owners, and for networked components or devices, machine names and network addresses. Inventory specifications include, for example, manufacturer, device type, model, serial number, and physical location.","links":[{"href":"#cm-2","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#pm-5","rel":"related"}]},{"id":"cm-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-8.a_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)"}],"parts":[{"id":"cm-8.a.1_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(1)"}],"prose":"develops and documents an inventory of information system components that accurately reflects the current information system;"},{"id":"cm-8.a.2_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(2)"}],"prose":"develops and documents an inventory of information system components that includes all components within the authorization boundary of the information system;"},{"id":"cm-8.a.3_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(3)"}],"prose":"develops and documents an inventory of information system components that is at the level of granularity deemed necessary for tracking and reporting;"},{"id":"cm-8.a.4_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(4)"}],"parts":[{"id":"cm-8.a.4_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(a)(4)[1]"}],"prose":"defines the information deemed necessary to achieve effective information system component accountability;"},{"id":"cm-8.a.4_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(a)(4)[2]"}],"prose":"develops and documents an inventory of information system components that includes organization-defined information deemed necessary to achieve effective information system component accountability;"}]}]},{"id":"cm-8.b_obj","name":"objective","props":[{"name":"label","value":"CM-8(b)"}],"parts":[{"id":"cm-8.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(b)[1]"}],"prose":"defines the frequency to review and update the information system component inventory; and"},{"id":"cm-8.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(b)[2]"}],"prose":"reviews and updates the information system component inventory with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system component inventory\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system inventory records\n\ninventory reviews and update records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for information system component inventory\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for developing and documenting an inventory of information system components\n\nautomated mechanisms supporting and\/or implementing the information system component inventory"}]}],"controls":[{"id":"cm-8.1","class":"SP800-53-enhancement","title":"Updates During Installations \/ Removals","props":[{"name":"label","value":"CM-8(1)"},{"name":"sort-id","value":"cm-08.01"}],"parts":[{"id":"cm-8.1_smt","name":"statement","prose":"The organization updates the inventory of information system components as an integral part of component installations, removals, and information system updates."},{"id":"cm-8.1_obj","name":"objective","prose":"Determine if the organization updates the inventory of information system components as an integral part of:","parts":[{"id":"cm-8.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(1)[1]"}],"prose":"component installations;"},{"id":"cm-8.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(1)[2]"}],"prose":"component removals; and"},{"id":"cm-8.1_obj.3","name":"objective","props":[{"name":"label","value":"CM-8(1)[3]"}],"prose":"information system updates."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system component inventory\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system inventory records\n\ninventory reviews and update records\n\ncomponent installation records\n\ncomponent removal records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for updating the information system component inventory\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for updating inventory of information system components\n\nautomated mechanisms implementing updating of the information system component inventory"}]}]},{"id":"cm-8.2","class":"SP800-53-enhancement","title":"Automated Maintenance","props":[{"name":"label","value":"CM-8(2)"},{"name":"sort-id","value":"cm-08.02"}],"parts":[{"id":"cm-8.2_smt","name":"statement","prose":"The organization employs automated mechanisms to help maintain an up-to-date, complete, accurate, and readily available inventory of information system components."},{"id":"cm-8.2_gdn","name":"guidance","prose":"Organizations maintain information system inventories to the extent feasible. Virtual machines, for example, can be difficult to monitor because such machines are not visible to the network when not in use. In such cases, organizations maintain as up-to-date, complete, and accurate an inventory as is deemed reasonable. This control enhancement can be satisfied by the implementation of CM-2 (2) for organizations that choose to combine information system component inventory and baseline configuration activities.","links":[{"href":"#si-7","rel":"related"}]},{"id":"cm-8.2_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to maintain an inventory of information system components that is:","parts":[{"id":"cm-8.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(2)[1]"}],"prose":"up-to-date;"},{"id":"cm-8.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(2)[2]"}],"prose":"complete;"},{"id":"cm-8.2_obj.3","name":"objective","props":[{"name":"label","value":"CM-8(2)[3]"}],"prose":"accurate; and"},{"id":"cm-8.2_obj.4","name":"objective","props":[{"name":"label","value":"CM-8(2)[4]"}],"prose":"readily available."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nconfiguration management plan\n\nprocedures addressing information system component inventory\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system inventory records\n\nchange control records\n\ninformation system maintenance records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing the automated mechanisms implementing the information system component inventory\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for maintaining the inventory of information system components\n\nautomated mechanisms implementing the information system component inventory"}]}]},{"id":"cm-8.3","class":"SP800-53-enhancement","title":"Automated Unauthorized Component Detection","params":[{"id":"cm-8.3_prm_1","label":"organization-defined frequency"},{"id":"cm-8.3_prm_2","select":{"how-many":"one-or-more","choice":["disables network access by such components","isolates the components","notifies {{ insert: param, cm-8.3_prm_3 }} "]}},{"id":"cm-8.3_prm_3","depends-on":"cm-8.3_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"CM-8(3)"},{"name":"sort-id","value":"cm-08.03"}],"parts":[{"id":"cm-8.3_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-8.3_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Employs automated mechanisms {{ insert: param, cm-8.3_prm_1 }} to detect the presence of unauthorized hardware, software, and firmware components within the information system; and"},{"id":"cm-8.3_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Takes the following actions when unauthorized components are detected: {{ insert: param, cm-8.3_prm_2 }}."}]},{"id":"cm-8.3_gdn","name":"guidance","prose":"This control enhancement is applied in addition to the monitoring for unauthorized remote connections and mobile devices. Monitoring for unauthorized system components may be accomplished on an ongoing basis or by the periodic scanning of systems for that purpose. Automated mechanisms can be implemented within information systems or in other separate devices. Isolation can be achieved, for example, by placing unauthorized information system components in separate domains or subnets or otherwise quarantining such components. This type of component isolation is commonly referred to as sandboxing.","links":[{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"},{"href":"#ra-5","rel":"related"}]},{"id":"cm-8.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-8.3.a_obj","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)"}],"parts":[{"id":"cm-8.3.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[1]"}],"prose":"defines the frequency to employ automated mechanisms to detect the presence of unauthorized:","parts":[{"id":"cm-8.3.a_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[1][a]"}],"prose":"hardware components within the information system;"},{"id":"cm-8.3.a_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[1][b]"}],"prose":"software components within the information system;"},{"id":"cm-8.3.a_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[1][c]"}],"prose":"firmware components within the information system;"}]},{"id":"cm-8.3.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[2]"}],"prose":"employs automated mechanisms with the organization-defined frequency to detect the presence of unauthorized:","parts":[{"id":"cm-8.3.a_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[2][a]"}],"prose":"hardware components within the information system;"},{"id":"cm-8.3.a_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[2][b]"}],"prose":"software components within the information system;"},{"id":"cm-8.3.a_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[2][c]"}],"prose":"firmware components within the information system;"}]}],"links":[{"href":"#cm-8.3_smt.a","rel":"corresp"}]},{"id":"cm-8.3.b_obj","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)"}],"parts":[{"id":"cm-8.3.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)[1]"}],"prose":"defines personnel or roles to be notified when unauthorized components are detected;"},{"id":"cm-8.3.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)[2]"}],"prose":"takes one or more of the following actions when unauthorized components are detected:","parts":[{"id":"cm-8.3.b_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)[2][a]"}],"prose":"disables network access by such components;"},{"id":"cm-8.3.b_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)[2][b]"}],"prose":"isolates the components; and\/or"},{"id":"cm-8.3.b_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)[2][c]"}],"prose":"notifies organization-defined personnel or roles."}]}],"links":[{"href":"#cm-8.3_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system component inventory\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system inventory records\n\nalerts\/notifications of unauthorized components within the information system\n\ninformation system monitoring records\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing the automated mechanisms implementing unauthorized information system component detection\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for detection of unauthorized information system components\n\nautomated mechanisms implementing the detection of unauthorized information system components"}]}]},{"id":"cm-8.4","class":"SP800-53-enhancement","title":"Accountability Information","params":[{"id":"cm-8.4_prm_1","select":{"how-many":"one-or-more","choice":["name","position","role"]}}],"props":[{"name":"label","value":"CM-8(4)"},{"name":"sort-id","value":"cm-08.04"}],"parts":[{"id":"cm-8.4_smt","name":"statement","prose":"The organization includes in the information system component inventory information, a means for identifying by {{ insert: param, cm-8.4_prm_1 }}, individuals responsible\/accountable for administering those components."},{"id":"cm-8.4_gdn","name":"guidance","prose":"Identifying individuals who are both responsible and accountable for administering information system components helps to ensure that the assigned components are properly administered and organizations can contact those individuals if some action is required (e.g., component is determined to be the source of a breach\/compromise, component needs to be recalled\/replaced, or component needs to be relocated)."},{"id":"cm-8.4_obj","name":"objective","prose":"Determine if the organization includes in the information system component inventory for information system components, a means for identifying the individuals responsible and accountable for administering those components by one or more of the following:","parts":[{"id":"cm-8.4_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(4)[1]"}],"prose":"name;"},{"id":"cm-8.4_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(4)[2]"}],"prose":"position; and\/or"},{"id":"cm-8.4_obj.3","name":"objective","props":[{"name":"label","value":"CM-8(4)[3]"}],"prose":"role."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system component inventory\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system inventory records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing the information system component inventory\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for maintaining the inventory of information system components\n\nautomated mechanisms implementing the information system component inventory"}]}]},{"id":"cm-8.5","class":"SP800-53-enhancement","title":"No Duplicate Accounting of Components","props":[{"name":"label","value":"CM-8(5)"},{"name":"sort-id","value":"cm-08.05"}],"parts":[{"id":"cm-8.5_smt","name":"statement","prose":"The organization verifies that all components within the authorization boundary of the information system are not duplicated in other information system component inventories."},{"id":"cm-8.5_gdn","name":"guidance","prose":"This control enhancement addresses the potential problem of duplicate accounting of information system components in large or complex interconnected systems."},{"id":"cm-8.5_obj","name":"objective","prose":"Determine if the organization verifies that all components within the authorization boundary of the information system are not duplicated in other information system inventories."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system component inventory\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system inventory records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system inventory responsibilities\n\norganizational personnel with responsibilities for defining information system components within the authorization boundary of the system\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for maintaining the inventory of information system components\n\nautomated mechanisms implementing the information system component inventory"}]}]}]},{"id":"cm-9","class":"SP800-53","title":"Configuration Management Plan","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-9"},{"name":"sort-id","value":"cm-09"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-9_smt","name":"statement","prose":"The organization develops, documents, and implements a configuration management plan for the information system that:","parts":[{"id":"cm-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Addresses roles, responsibilities, and configuration management processes and procedures;"},{"id":"cm-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishes a process for identifying configuration items throughout the system development life cycle and for managing the configuration of the configuration items;"},{"id":"cm-9_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Defines the configuration items for the information system and places the configuration items under configuration management; and"},{"id":"cm-9_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects the configuration management plan from unauthorized disclosure and modification."}]},{"id":"cm-9_gdn","name":"guidance","prose":"Configuration management plans satisfy the requirements in configuration management policies while being tailored to individual information systems. Such plans define detailed processes and procedures for how configuration management is used to support system development life cycle activities at the information system level. Configuration management plans are typically developed during the development\/acquisition phase of the system development life cycle. The plans describe how to move changes through change management processes, how to update configuration settings and baselines, how to maintain information system component inventories, how to control development, test, and operational environments, and how to develop, release, and update key documents. Organizations can employ templates to help ensure consistent and timely development and implementation of configuration management plans. Such templates can represent a master configuration management plan for the organization at large with subsets of the plan implemented on a system by system basis. Configuration management approval processes include designation of key management stakeholders responsible for reviewing and approving proposed changes to information systems, and personnel that conduct security impact analyses prior to the implementation of changes to the systems. Configuration items are the information system items (hardware, software, firmware, and documentation) to be configuration-managed. As information systems continue through the system development life cycle, new configuration items may be identified and some existing configuration items may no longer need to be under configuration control.","links":[{"href":"#cm-2","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#sa-10","rel":"related"}]},{"id":"cm-9_obj","name":"objective","prose":"Determine if the organization develops, documents, and implements a configuration management plan for the information system that:","parts":[{"id":"cm-9.a_obj","name":"objective","props":[{"name":"label","value":"CM-9(a)"}],"parts":[{"id":"cm-9.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-9(a)[1]"}],"prose":"addresses roles;"},{"id":"cm-9.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-9(a)[2]"}],"prose":"addresses responsibilities;"},{"id":"cm-9.a_obj.3","name":"objective","props":[{"name":"label","value":"CM-9(a)[3]"}],"prose":"addresses configuration management processes and procedures;"}]},{"id":"cm-9.b_obj","name":"objective","props":[{"name":"label","value":"CM-9(b)"}],"prose":"establishes a process for:","parts":[{"id":"cm-9.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-9(b)[1]"}],"prose":"identifying configuration items throughout the SDLC;"},{"id":"cm-9.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-9(b)[2]"}],"prose":"managing the configuration of the configuration items;"}]},{"id":"cm-9.c_obj","name":"objective","props":[{"name":"label","value":"CM-9(c)"}],"parts":[{"id":"cm-9.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-9(c)[1]"}],"prose":"defines the configuration items for the information system;"},{"id":"cm-9.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-9(c)[2]"}],"prose":"places the configuration items under configuration management;"}]},{"id":"cm-9.d_obj","name":"objective","props":[{"name":"label","value":"CM-9(d)"}],"prose":"protects the configuration management plan from unauthorized:","parts":[{"id":"cm-9.d_obj.1","name":"objective","props":[{"name":"label","value":"CM-9(d)[1]"}],"prose":"disclosure; and"},{"id":"cm-9.d_obj.2","name":"objective","props":[{"name":"label","value":"CM-9(d)[2]"}],"prose":"modification."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing configuration management planning\n\nconfiguration management plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for developing the configuration management plan\n\norganizational personnel with responsibilities for implementing and managing processes defined in the configuration management plan\n\norganizational personnel with responsibilities for protecting the configuration management plan\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for developing and documenting the configuration management plan\n\norganizational processes for identifying and managing configuration items\n\norganizational processes for protecting the configuration management plan\n\nautomated mechanisms implementing the configuration management plan\n\nautomated mechanisms for managing configuration items\n\nautomated mechanisms for protecting the configuration management plan"}]}]},{"id":"cm-10","class":"SP800-53","title":"Software Usage Restrictions","props":[{"name":"priority","value":"P2"},{"name":"label","value":"CM-10"},{"name":"sort-id","value":"cm-10"}],"parts":[{"id":"cm-10_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-10_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Uses software and associated documentation in accordance with contract agreements and copyright laws;"},{"id":"cm-10_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Tracks the use of software and associated documentation protected by quantity licenses to control copying and distribution; and"},{"id":"cm-10_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Controls and documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work."}]},{"id":"cm-10_gdn","name":"guidance","prose":"Software license tracking can be accomplished by manual methods (e.g., simple spreadsheets) or automated methods (e.g., specialized tracking applications) depending on organizational needs.","links":[{"href":"#ac-17","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"cm-10_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-10.a_obj","name":"objective","props":[{"name":"label","value":"CM-10(a)"}],"prose":"uses software and associated documentation in accordance with contract agreements and copyright laws;"},{"id":"cm-10.b_obj","name":"objective","props":[{"name":"label","value":"CM-10(b)"}],"prose":"tracks the use of software and associated documentation protected by quantity licenses to control copying and distribution; and"},{"id":"cm-10.c_obj","name":"objective","props":[{"name":"label","value":"CM-10(c)"}],"prose":"controls and documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing software usage restrictions\n\nconfiguration management plan\n\nsecurity plan\n\nsoftware contract agreements and copyright laws\n\nsite license documentation\n\nlist of software usage restrictions\n\nsoftware license tracking reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\norganizational personnel operating, using, and\/or maintaining the information system\n\norganizational personnel with software license management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for tracking the use of software protected by quantity licenses\n\norganization process for controlling\/documenting the use of peer-to-peer file sharing technology\n\nautomated mechanisms implementing software license tracking\n\nautomated mechanisms implementing and controlling the use of peer-to-peer files sharing technology"}]}]},{"id":"cm-11","class":"SP800-53","title":"User-installed Software","params":[{"id":"cm-11_prm_1","label":"organization-defined policies"},{"id":"cm-11_prm_2","label":"organization-defined methods"},{"id":"cm-11_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-11"},{"name":"sort-id","value":"cm-11"}],"parts":[{"id":"cm-11_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-11_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes {{ insert: param, cm-11_prm_1 }} governing the installation of software by users;"},{"id":"cm-11_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Enforces software installation policies through {{ insert: param, cm-11_prm_2 }}; and"},{"id":"cm-11_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Monitors policy compliance at {{ insert: param, cm-11_prm_3 }}."}]},{"id":"cm-11_gdn","name":"guidance","prose":"If provided the necessary privileges, users have the ability to install software in organizational information systems. To maintain control over the types of software installed, organizations identify permitted and prohibited actions regarding software installation. Permitted software installations may include, for example, updates and security patches to existing software and downloading applications from organization-approved “app stores” Prohibited software installations may include, for example, software with unknown or suspect pedigrees or software that organizations consider potentially malicious. The policies organizations select governing user-installed software may be organization-developed or provided by some external entity. Policy enforcement methods include procedural methods (e.g., periodic examination of user accounts), automated methods (e.g., configuration settings implemented on organizational information systems), or both.","links":[{"href":"#ac-3","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#pl-4","rel":"related"}]},{"id":"cm-11_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-11.a_obj","name":"objective","props":[{"name":"label","value":"CM-11(a)"}],"parts":[{"id":"cm-11.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-11(a)[1]"}],"prose":"defines policies to govern the installation of software by users;"},{"id":"cm-11.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-11(a)[2]"}],"prose":"establishes organization-defined policies governing the installation of software by users;"}]},{"id":"cm-11.b_obj","name":"objective","props":[{"name":"label","value":"CM-11(b)"}],"parts":[{"id":"cm-11.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-11(b)[1]"}],"prose":"defines methods to enforce software installation policies;"},{"id":"cm-11.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-11(b)[2]"}],"prose":"enforces software installation policies through organization-defined methods;"}]},{"id":"cm-11.c_obj","name":"objective","props":[{"name":"label","value":"CM-11(c)"}],"parts":[{"id":"cm-11.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-11(c)[1]"}],"prose":"defines frequency to monitor policy compliance; and"},{"id":"cm-11.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-11(c)[2]"}],"prose":"monitors policy compliance at organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing user installed software\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of rules governing user installed software\n\ninformation system monitoring records\n\ninformation system audit records\n\nother relevant documents or records\n\ncontinuous monitoring strategy"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for governing user-installed software\n\norganizational personnel operating, using, and\/or maintaining the information system\n\norganizational personnel monitoring compliance with user-installed software policy\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes governing user-installed software on the information system\n\nautomated mechanisms enforcing rules\/methods for governing the installation of software by users\n\nautomated mechanisms monitoring policy compliance"}]}]}]},{"id":"cp","class":"family","title":"Contingency Planning","controls":[{"id":"cp-1","class":"SP800-53","title":"Contingency Planning Policy and Procedures","params":[{"id":"cp-1_prm_1","label":"organization-defined personnel or roles"},{"id":"cp-1_prm_2","label":"organization-defined frequency"},{"id":"cp-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-1"},{"name":"sort-id","value":"cp-01"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"cp-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, cp-1_prm_1 }}:","parts":[{"id":"cp-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A contingency planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"cp-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls; and"}]},{"id":"cp-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"cp-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Contingency planning policy {{ insert: param, cp-1_prm_2 }}; and"},{"id":"cp-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Contingency planning procedures {{ insert: param, cp-1_prm_3 }}."}]}]},{"id":"cp-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the CP family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"cp-1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"cp-1.a_obj","name":"objective","props":[{"name":"label","value":"CP-1(a)"}],"parts":[{"id":"cp-1.a.1_obj","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)"}],"parts":[{"id":"cp-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1]"}],"prose":"the organization develops and documents a contingency planning policy that addresses:","parts":[{"id":"cp-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"cp-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"cp-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"cp-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"cp-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"cp-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"cp-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"cp-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[2]"}],"prose":"the organization defines personnel or roles to whom the contingency planning policy is to be disseminated;"},{"id":"cp-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[3]"}],"prose":"the organization disseminates the contingency planning policy to organization-defined personnel or roles;"}]},{"id":"cp-1.a.2_obj","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)"}],"parts":[{"id":"cp-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)[1]"}],"prose":"the organization develops and documents procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls;"},{"id":"cp-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)[2]"}],"prose":"the organization defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"cp-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)[3]"}],"prose":"the organization disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"cp-1.b_obj","name":"objective","props":[{"name":"label","value":"CP-1(b)"}],"parts":[{"id":"cp-1.b.1_obj","name":"objective","props":[{"name":"label","value":"CP-1(b)(1)"}],"parts":[{"id":"cp-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(b)(1)[1]"}],"prose":"the organization defines the frequency to review and update the current contingency planning policy;"},{"id":"cp-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(b)(1)[2]"}],"prose":"the organization reviews and updates the current contingency planning with the organization-defined frequency;"}]},{"id":"cp-1.b.2_obj","name":"objective","props":[{"name":"label","value":"CP-1(b)(2)"}],"parts":[{"id":"cp-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(b)(2)[1]"}],"prose":"the organization defines the frequency to review and update the current contingency planning procedures; and"},{"id":"cp-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(b)(2)[2]"}],"prose":"the organization reviews and updates the current contingency planning procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-2","class":"SP800-53","title":"Contingency Plan","params":[{"id":"cp-2_prm_1","label":"organization-defined personnel or roles"},{"id":"cp-2_prm_2","label":"organization-defined key contingency personnel (identified by name and\/or by role) and organizational elements"},{"id":"cp-2_prm_3","label":"organization-defined frequency"},{"id":"cp-2_prm_4","label":"organization-defined key contingency personnel (identified by name and\/or by role) and organizational elements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-2"},{"name":"sort-id","value":"cp-02"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a contingency plan for the information system that:","parts":[{"id":"cp-2_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Identifies essential missions and business functions and associated contingency requirements;"},{"id":"cp-2_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Provides recovery objectives, restoration priorities, and metrics;"},{"id":"cp-2_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Addresses contingency roles, responsibilities, assigned individuals with contact information;"},{"id":"cp-2_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Addresses maintaining essential missions and business functions despite an information system disruption, compromise, or failure;"},{"id":"cp-2_smt.a.5","name":"item","props":[{"name":"label","value":"5."}],"prose":"Addresses eventual, full information system restoration without deterioration of the security safeguards originally planned and implemented; and"},{"id":"cp-2_smt.a.6","name":"item","props":[{"name":"label","value":"6."}],"prose":"Is reviewed and approved by {{ insert: param, cp-2_prm_1 }};"}]},{"id":"cp-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Distributes copies of the contingency plan to {{ insert: param, cp-2_prm_2 }};"},{"id":"cp-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Coordinates contingency planning activities with incident handling activities;"},{"id":"cp-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Reviews the contingency plan for the information system {{ insert: param, cp-2_prm_3 }};"},{"id":"cp-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Updates the contingency plan to address changes to the organization, information system, or environment of operation and problems encountered during contingency plan implementation, execution, or testing;"},{"id":"cp-2_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Communicates contingency plan changes to {{ insert: param, cp-2_prm_4 }}; and"},{"id":"cp-2_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Protects the contingency plan from unauthorized disclosure and modification."}]},{"id":"cp-2_gdn","name":"guidance","prose":"Contingency planning for information systems is part of an overall organizational program for achieving continuity of operations for mission\/business functions. Contingency planning addresses both information system restoration and implementation of alternative mission\/business processes when systems are compromised. The effectiveness of contingency planning is maximized by considering such planning throughout the phases of the system development life cycle. Performing contingency planning on hardware, software, and firmware development can be an effective means of achieving information system resiliency. Contingency plans reflect the degree of restoration required for organizational information systems since not all systems may need to fully recover to achieve the level of continuity of operations desired. Information system recovery objectives reflect applicable laws, Executive Orders, directives, policies, standards, regulations, and guidelines. In addition to information system availability, contingency plans also address other security-related events resulting in a reduction in mission and\/or business effectiveness, such as malicious attacks compromising the confidentiality or integrity of information systems. Actions addressed in contingency plans include, for example, orderly\/graceful degradation, information system shutdown, fallback to a manual mode, alternate information flows, and operating in modes reserved for when systems are under attack. By closely coordinating contingency planning with incident handling activities, organizations can ensure that the necessary contingency planning activities are in place and activated in the event of a security incident.","links":[{"href":"#ac-14","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#cp-7","rel":"related"},{"href":"#cp-8","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#cp-10","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#pm-8","rel":"related"},{"href":"#pm-11","rel":"related"}]},{"id":"cp-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-2.a_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)"}],"prose":"develops and documents a contingency plan for the information system that:","parts":[{"id":"cp-2.a.1_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(1)"}],"prose":"identifies essential missions and business functions and associated contingency requirements;"},{"id":"cp-2.a.2_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)"}],"parts":[{"id":"cp-2.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)[1]"}],"prose":"provides recovery objectives;"},{"id":"cp-2.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)[2]"}],"prose":"provides restoration priorities;"},{"id":"cp-2.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)[3]"}],"prose":"provides metrics;"}]},{"id":"cp-2.a.3_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)"}],"parts":[{"id":"cp-2.a.3_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)[1]"}],"prose":"addresses contingency roles;"},{"id":"cp-2.a.3_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)[2]"}],"prose":"addresses contingency responsibilities;"},{"id":"cp-2.a.3_obj.3","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)[3]"}],"prose":"addresses assigned individuals with contact information;"}]},{"id":"cp-2.a.4_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(4)"}],"prose":"addresses maintaining essential missions and business functions despite an information system disruption, compromise, or failure;"},{"id":"cp-2.a.5_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(5)"}],"prose":"addresses eventual, full information system restoration without deterioration of the security safeguards originally planned and implemented;"},{"id":"cp-2.a.6_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(6)"}],"parts":[{"id":"cp-2.a.6_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(a)(6)[1]"}],"prose":"defines personnel or roles to review and approve the contingency plan for the information system;"},{"id":"cp-2.a.6_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(a)(6)[2]"}],"prose":"is reviewed and approved by organization-defined personnel or roles;"}]}]},{"id":"cp-2.b_obj","name":"objective","props":[{"name":"label","value":"CP-2(b)"}],"parts":[{"id":"cp-2.b_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(b)[1]"}],"prose":"defines key contingency personnel (identified by name and\/or by role) and organizational elements to whom copies of the contingency plan are to be distributed;"},{"id":"cp-2.b_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(b)[2]"}],"prose":"distributes copies of the contingency plan to organization-defined key contingency personnel and organizational elements;"}]},{"id":"cp-2.c_obj","name":"objective","props":[{"name":"label","value":"CP-2(c)"}],"prose":"coordinates contingency planning activities with incident handling activities;"},{"id":"cp-2.d_obj","name":"objective","props":[{"name":"label","value":"CP-2(d)"}],"parts":[{"id":"cp-2.d_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(d)[1]"}],"prose":"defines a frequency to review the contingency plan for the information system;"},{"id":"cp-2.d_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(d)[2]"}],"prose":"reviews the contingency plan with the organization-defined frequency;"}]},{"id":"cp-2.e_obj","name":"objective","props":[{"name":"label","value":"CP-2(e)"}],"prose":"updates the contingency plan to address:","parts":[{"id":"cp-2.e_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(e)[1]"}],"prose":"changes to the organization, information system, or environment of operation;"},{"id":"cp-2.e_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(e)[2]"}],"prose":"problems encountered during plan implementation, execution, and testing;"}]},{"id":"cp-2.f_obj","name":"objective","props":[{"name":"label","value":"CP-2(f)"}],"parts":[{"id":"cp-2.f_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(f)[1]"}],"prose":"defines key contingency personnel (identified by name and\/or by role) and organizational elements to whom contingency plan changes are to be communicated;"},{"id":"cp-2.f_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(f)[2]"}],"prose":"communicates contingency plan changes to organization-defined key contingency personnel and organizational elements; and"}]},{"id":"cp-2.g_obj","name":"objective","props":[{"name":"label","value":"CP-2(g)"}],"prose":"protects the contingency plan from unauthorized disclosure and modification."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nsecurity plan\n\nevidence of contingency plan reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with incident handling responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency plan development, review, update, and protection\n\nautomated mechanisms for developing, reviewing, updating and\/or protecting the contingency plan"}]}],"controls":[{"id":"cp-2.1","class":"SP800-53-enhancement","title":"Coordinate with Related Plans","props":[{"name":"label","value":"CP-2(1)"},{"name":"sort-id","value":"cp-02.01"}],"parts":[{"id":"cp-2.1_smt","name":"statement","prose":"The organization coordinates contingency plan development with organizational elements responsible for related plans."},{"id":"cp-2.1_gdn","name":"guidance","prose":"Plans related to contingency plans for organizational information systems include, for example, Business Continuity Plans, Disaster Recovery Plans, Continuity of Operations Plans, Crisis Communications Plans, Critical Infrastructure Plans, Cyber Incident Response Plans, Insider Threat Implementation Plan, and Occupant Emergency Plans."},{"id":"cp-2.1_obj","name":"objective","prose":"Determine if the organization coordinates contingency plan development with organizational elements responsible for related plans."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nbusiness contingency plans\n\ndisaster recovery plans\n\ncontinuity of operations plans\n\ncrisis communications plans\n\ncritical infrastructure plans\n\ncyber incident response plan\n\ninsider threat implementation plans\n\noccupant emergency plans\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities\n\npersonnel with responsibility for related plans"}]}]},{"id":"cp-2.2","class":"SP800-53-enhancement","title":"Capacity Planning","props":[{"name":"label","value":"CP-2(2)"},{"name":"sort-id","value":"cp-02.02"}],"parts":[{"id":"cp-2.2_smt","name":"statement","prose":"The organization conducts capacity planning so that necessary capacity for information processing, telecommunications, and environmental support exists during contingency operations."},{"id":"cp-2.2_gdn","name":"guidance","prose":"Capacity planning is needed because different types of threats (e.g., natural disasters, targeted cyber attacks) can result in a reduction of the available processing, telecommunications, and support services originally intended to support the organizational missions\/business functions. Organizations may need to anticipate degraded operations during contingency operations and factor such degradation into capacity planning."},{"id":"cp-2.2_obj","name":"objective","prose":"Determine if the organization conducts capacity planning so that necessary capacity exists during contingency operations for:","parts":[{"id":"cp-2.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(2)[1]"}],"prose":"information processing;"},{"id":"cp-2.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(2)[2]"}],"prose":"telecommunications; and"},{"id":"cp-2.2_obj.3","name":"objective","props":[{"name":"label","value":"CP-2(2)[3]"}],"prose":"environmental support."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\ncapacity planning documents\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-2.3","class":"SP800-53-enhancement","title":"Resume Essential Missions \/ Business Functions","params":[{"id":"cp-2.3_prm_1","label":"organization-defined time period"}],"props":[{"name":"label","value":"CP-2(3)"},{"name":"sort-id","value":"cp-02.03"}],"parts":[{"id":"cp-2.3_smt","name":"statement","prose":"The organization plans for the resumption of essential missions and business functions within {{ insert: param, cp-2.3_prm_1 }} of contingency plan activation."},{"id":"cp-2.3_gdn","name":"guidance","prose":"Organizations may choose to carry out the contingency planning activities in this control enhancement as part of organizational business continuity planning including, for example, as part of business impact analyses. The time period for resumption of essential missions\/business functions may be dependent on the severity\/extent of disruptions to the information system and its supporting infrastructure.","links":[{"href":"#pe-12","rel":"related"}]},{"id":"cp-2.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-2.3_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(3)[1]"}],"prose":"defines the time period to plan for the resumption of essential missions and business functions as a result of contingency plan activation; and"},{"id":"cp-2.3_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(3)[2]"}],"prose":"plans for the resumption of essential missions and business functions within organization-defined time period of contingency plan activation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nsecurity plan\n\nbusiness impact assessment\n\nother related plans\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for resumption of missions and business functions"}]}]},{"id":"cp-2.4","class":"SP800-53-enhancement","title":"Resume All Missions \/ Business Functions","params":[{"id":"cp-2.4_prm_1","label":"organization-defined time period"}],"props":[{"name":"label","value":"CP-2(4)"},{"name":"sort-id","value":"cp-02.04"}],"parts":[{"id":"cp-2.4_smt","name":"statement","prose":"The organization plans for the resumption of all missions and business functions within {{ insert: param, cp-2.4_prm_1 }} of contingency plan activation."},{"id":"cp-2.4_gdn","name":"guidance","prose":"Organizations may choose to carry out the contingency planning activities in this control enhancement as part of organizational business continuity planning including, for example, as part of business impact analyses. The time period for resumption of all missions\/business functions may be dependent on the severity\/extent of disruptions to the information system and its supporting infrastructure.","links":[{"href":"#pe-12","rel":"related"}]},{"id":"cp-2.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-2.4_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(4)[1]"}],"prose":"defines the time period to plan for the resumption of all missions and business functions as a result of contingency plan activation; and"},{"id":"cp-2.4_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(4)[2]"}],"prose":"plans for the resumption of all missions and business functions within organization-defined time period of contingency plan activation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nsecurity plan\n\nbusiness impact assessment\n\nother related plans\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for resumption of missions and business functions"}]}]},{"id":"cp-2.5","class":"SP800-53-enhancement","title":"Continue Essential Missions \/ Business Functions","props":[{"name":"label","value":"CP-2(5)"},{"name":"sort-id","value":"cp-02.05"}],"parts":[{"id":"cp-2.5_smt","name":"statement","prose":"The organization plans for the continuance of essential missions and business functions with little or no loss of operational continuity and sustains that continuity until full information system restoration at primary processing and\/or storage sites."},{"id":"cp-2.5_gdn","name":"guidance","prose":"Organizations may choose to carry out the contingency planning activities in this control enhancement as part of organizational business continuity planning including, for example, as part of business impact analyses. Primary processing and\/or storage sites defined by organizations as part of contingency planning may change depending on the circumstances associated with the contingency (e.g., backup sites may become primary sites).","links":[{"href":"#pe-12","rel":"related"}]},{"id":"cp-2.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-2.5_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(5)[1]"}],"prose":"plans for the continuance of essential missions and business functions with little or no loss of operational continuity; and"},{"id":"cp-2.5_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(5)[2]"}],"prose":"sustains that operational continuity until full information system restoration at primary processing and\/or storage sites."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nbusiness impact assessment\n\nprimary processing site agreements\n\nprimary storage site agreements\n\nalternate processing site agreements\n\nalternate storage site agreements\n\ncontingency plan test documentation\n\ncontingency plan test results\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for continuing missions and business functions"}]}]},{"id":"cp-2.8","class":"SP800-53-enhancement","title":"Identify Critical Assets","props":[{"name":"label","value":"CP-2(8)"},{"name":"sort-id","value":"cp-02.08"}],"parts":[{"id":"cp-2.8_smt","name":"statement","prose":"The organization identifies critical information system assets supporting essential missions and business functions."},{"id":"cp-2.8_gdn","name":"guidance","prose":"Organizations may choose to carry out the contingency planning activities in this control enhancement as part of organizational business continuity planning including, for example, as part of business impact analyses. Organizations identify critical information system assets so that additional safeguards and countermeasures can be employed (above and beyond those safeguards and countermeasures routinely implemented) to help ensure that organizational missions\/business functions can continue to be conducted during contingency operations. In addition, the identification of critical information assets facilitates the prioritization of organizational resources. Critical information system assets include technical and operational aspects. Technical aspects include, for example, information technology services, information system components, information technology products, and mechanisms. Operational aspects include, for example, procedures (manually executed operations) and personnel (individuals operating technical safeguards and\/or executing manual procedures). Organizational program protection plans can provide assistance in identifying critical assets.","links":[{"href":"#sa-14","rel":"related"},{"href":"#sa-15","rel":"related"}]},{"id":"cp-2.8_obj","name":"objective","prose":"Determine if the organization identifies critical information system assets supporting essential missions and business functions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nbusiness impact assessment\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"cp-3","class":"SP800-53","title":"Contingency Training","params":[{"id":"cp-3_prm_1","label":"organization-defined time period"},{"id":"cp-3_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CP-3"},{"name":"sort-id","value":"cp-03"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"cp-3_smt","name":"statement","prose":"The organization provides contingency training to information system users consistent with assigned roles and responsibilities:","parts":[{"id":"cp-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Within {{ insert: param, cp-3_prm_1 }} of assuming a contingency role or responsibility;"},{"id":"cp-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"cp-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, cp-3_prm_2 }} thereafter."}]},{"id":"cp-3_gdn","name":"guidance","prose":"Contingency training provided by organizations is linked to the assigned roles and responsibilities of organizational personnel to ensure that the appropriate content and level of detail is included in such training. For example, regular users may only need to know when and where to report for duty during contingency operations and if normal duties are affected; system administrators may require additional training on how to set up information systems at alternate processing and storage sites; and managers\/senior leaders may receive more specific training on how to conduct mission-essential functions in designated off-site locations and how to establish communications with other governmental entities for purposes of coordination on contingency-related activities. Training for contingency roles\/responsibilities reflects the specific continuity requirements in the contingency plan.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#ir-2","rel":"related"}]},{"id":"cp-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-3.a_obj","name":"objective","props":[{"name":"label","value":"CP-3(a)"}],"parts":[{"id":"cp-3.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-3(a)[1]"}],"prose":"defines a time period within which contingency training is to be provided to information system users assuming a contingency role or responsibility;"},{"id":"cp-3.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-3(a)[2]"}],"prose":"provides contingency training to information system users consistent with assigned roles and responsibilities within the organization-defined time period of assuming a contingency role or responsibility;"}]},{"id":"cp-3.b_obj","name":"objective","props":[{"name":"label","value":"CP-3(b)"}],"prose":"provides contingency training to information system users consistent with assigned roles and responsibilities when required by information system changes;"},{"id":"cp-3.c_obj","name":"objective","props":[{"name":"label","value":"CP-3(c)"}],"parts":[{"id":"cp-3.c_obj.1","name":"objective","props":[{"name":"label","value":"CP-3(c)[1]"}],"prose":"defines the frequency for contingency training thereafter; and"},{"id":"cp-3.c_obj.2","name":"objective","props":[{"name":"label","value":"CP-3(c)[2]"}],"prose":"provides contingency training to information system users consistent with assigned roles and responsibilities with the organization-defined frequency thereafter."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency training\n\ncontingency plan\n\ncontingency training curriculum\n\ncontingency training material\n\nsecurity plan\n\ncontingency training records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning, plan implementation, and training responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency training"}]}],"controls":[{"id":"cp-3.1","class":"SP800-53-enhancement","title":"Simulated Events","props":[{"name":"label","value":"CP-3(1)"},{"name":"sort-id","value":"cp-03.01"}],"parts":[{"id":"cp-3.1_smt","name":"statement","prose":"The organization incorporates simulated events into contingency training to facilitate effective response by personnel in crisis situations."},{"id":"cp-3.1_obj","name":"objective","prose":"Determine if the organization incorporates simulated events into contingency training to facilitate effective response by personnel in crisis situations."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency training\n\ncontingency plan\n\ncontingency training curriculum\n\ncontingency training material\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning, plan implementation, and training responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency training\n\nautomated mechanisms for simulating contingency events"}]}]}]},{"id":"cp-4","class":"SP800-53","title":"Contingency Plan Testing","params":[{"id":"cp-4_prm_1","label":"organization-defined frequency"},{"id":"cp-4_prm_2","label":"organization-defined tests"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CP-4"},{"name":"sort-id","value":"cp-04"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"},{"href":"#0243a05a-e8a3-4d51-9364-4a9d20b0dcdf","rel":"reference"}],"parts":[{"id":"cp-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Tests the contingency plan for the information system {{ insert: param, cp-4_prm_1 }} using {{ insert: param, cp-4_prm_2 }} to determine the effectiveness of the plan and the organizational readiness to execute the plan;"},{"id":"cp-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews the contingency plan test results; and"},{"id":"cp-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Initiates corrective actions, if needed."}]},{"id":"cp-4_gdn","name":"guidance","prose":"Methods for testing contingency plans to determine the effectiveness of the plans and to identify potential weaknesses in the plans include, for example, walk-through and tabletop exercises, checklists, simulations (parallel, full interrupt), and comprehensive exercises. Organizations conduct testing based on the continuity requirements in contingency plans and include a determination of the effects on organizational operations, assets, and individuals arising due to contingency operations. Organizations have flexibility and discretion in the breadth, depth, and timelines of corrective actions.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-3","rel":"related"},{"href":"#ir-3","rel":"related"}]},{"id":"cp-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-4.a_obj","name":"objective","props":[{"name":"label","value":"CP-4(a)"}],"parts":[{"id":"cp-4.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-4(a)[1]"}],"prose":"defines tests to determine the effectiveness of the contingency plan and the organizational readiness to execute the plan;"},{"id":"cp-4.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-4(a)[2]"}],"prose":"defines a frequency to test the contingency plan for the information system;"},{"id":"cp-4.a_obj.3","name":"objective","props":[{"name":"label","value":"CP-4(a)[3]"}],"prose":"tests the contingency plan for the information system with the organization-defined frequency, using organization-defined tests to determine the effectiveness of the plan and the organizational readiness to execute the plan;"}]},{"id":"cp-4.b_obj","name":"objective","props":[{"name":"label","value":"CP-4(b)"}],"prose":"reviews the contingency plan test results; and"},{"id":"cp-4.c_obj","name":"objective","props":[{"name":"label","value":"CP-4(c)"}],"prose":"initiates corrective actions, if needed."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency plan testing\n\ncontingency plan\n\nsecurity plan\n\ncontingency plan test documentation\n\ncontingency plan test results\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for contingency plan testing, reviewing or responding to contingency plan tests\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency plan testing\n\nautomated mechanisms supporting the contingency plan and\/or contingency plan testing"}]}],"controls":[{"id":"cp-4.1","class":"SP800-53-enhancement","title":"Coordinate with Related Plans","props":[{"name":"label","value":"CP-4(1)"},{"name":"sort-id","value":"cp-04.01"}],"parts":[{"id":"cp-4.1_smt","name":"statement","prose":"The organization coordinates contingency plan testing with organizational elements responsible for related plans."},{"id":"cp-4.1_gdn","name":"guidance","prose":"Plans related to contingency plans for organizational information systems include, for example, Business Continuity Plans, Disaster Recovery Plans, Continuity of Operations Plans, Crisis Communications Plans, Critical Infrastructure Plans, Cyber Incident Response Plans, and Occupant Emergency Plans. This control enhancement does not require organizations to create organizational elements to handle related plans or to align such elements with specific plans. It does require, however, that if such organizational elements are responsible for related plans, organizations should coordinate with those elements.","links":[{"href":"#ir-8","rel":"related"},{"href":"#pm-8","rel":"related"}]},{"id":"cp-4.1_obj","name":"objective","prose":"Determine if the organization coordinates contingency plan testing with organizational elements responsible for related plans."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nincident response policy\n\nprocedures addressing contingency plan testing\n\ncontingency plan testing documentation\n\ncontingency plan\n\nbusiness continuity plans\n\ndisaster recovery plans\n\ncontinuity of operations plans\n\ncrisis communications plans\n\ncritical infrastructure plans\n\ncyber incident response plans\n\noccupant emergency plans\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan testing responsibilities\n\norganizational personnel\n\npersonnel with responsibilities for related plans\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-4.2","class":"SP800-53-enhancement","title":"Alternate Processing Site","props":[{"name":"label","value":"CP-4(2)"},{"name":"sort-id","value":"cp-04.02"}],"parts":[{"id":"cp-4.2_smt","name":"statement","prose":"The organization tests the contingency plan at the alternate processing site:","parts":[{"id":"cp-4.2_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"To familiarize contingency personnel with the facility and available resources; and"},{"id":"cp-4.2_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"To evaluate the capabilities of the alternate processing site to support contingency operations."}]},{"id":"cp-4.2_gdn","name":"guidance","links":[{"href":"#cp-7","rel":"related"}]},{"id":"cp-4.2_obj","name":"objective","prose":"Determine if the organization tests the contingency plan at the alternate processing site to:","parts":[{"id":"cp-4.2.a_obj","name":"objective","props":[{"name":"label","value":"CP-4(2)(a)"}],"prose":"familiarize contingency personnel with the facility and available resources; and","links":[{"href":"#cp-4.2_smt.a","rel":"corresp"}]},{"id":"cp-4.2.b_obj","name":"objective","props":[{"name":"label","value":"CP-4(2)(b)"}],"prose":"evaluate the capabilities of the alternate processing site to support contingency operations.","links":[{"href":"#cp-4.2_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency plan testing\n\ncontingency plan\n\ncontingency plan test documentation\n\ncontingency plan test results\n\nalternate processing site agreements\n\nservice-level agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency plan testing\n\nautomated mechanisms supporting the contingency plan and\/or contingency plan testing"}]}]}]},{"id":"cp-6","class":"SP800-53","title":"Alternate Storage Site","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-6"},{"name":"sort-id","value":"cp-06"}],"links":[{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes an alternate storage site including necessary agreements to permit the storage and retrieval of information system backup information; and"},{"id":"cp-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Ensures that the alternate storage site provides information security safeguards equivalent to that of the primary site."}]},{"id":"cp-6_gdn","name":"guidance","prose":"Alternate storage sites are sites that are geographically distinct from primary storage sites. An alternate storage site maintains duplicate copies of information and data in the event that the primary storage site is not available. Items covered by alternate storage site agreements include, for example, environmental conditions at alternate sites, access rules, physical and environmental protection requirements, and coordination of delivery\/retrieval of backup media. Alternate storage sites reflect the requirements in contingency plans so that organizations can maintain essential missions\/business functions despite disruption, compromise, or failure in organizational information systems.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-7","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#cp-10","rel":"related"},{"href":"#mp-4","rel":"related"}]},{"id":"cp-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-6_obj.1","name":"objective","props":[{"name":"label","value":"CP-6[1]"}],"prose":"establishes an alternate storage site including necessary agreements to permit the storage and retrieval of information system backup information; and"},{"id":"cp-6_obj.2","name":"objective","props":[{"name":"label","value":"CP-6[2]"}],"prose":"ensures that the alternate storage site provides information security safeguards equivalent to that of the primary site."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate storage sites\n\ncontingency plan\n\nalternate storage site agreements\n\nprimary storage site agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate storage site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for storing and retrieving information system backup information at the alternate storage site\n\nautomated mechanisms supporting and\/or implementing storage and retrieval of information system backup information at the alternate storage site"}]}],"controls":[{"id":"cp-6.1","class":"SP800-53-enhancement","title":"Separation from Primary Site","props":[{"name":"label","value":"CP-6(1)"},{"name":"sort-id","value":"cp-06.01"}],"parts":[{"id":"cp-6.1_smt","name":"statement","prose":"The organization identifies an alternate storage site that is separated from the primary storage site to reduce susceptibility to the same threats."},{"id":"cp-6.1_gdn","name":"guidance","prose":"Threats that affect alternate storage sites are typically defined in organizational assessments of risk and include, for example, natural disasters, structural failures, hostile cyber attacks, and errors of omission\/commission. Organizations determine what is considered a sufficient degree of separation between primary and alternate storage sites based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber attack), the degree of separation between sites is less relevant.","links":[{"href":"#ra-3","rel":"related"}]},{"id":"cp-6.1_obj","name":"objective","prose":"Determine if the organization identifies an alternate storage site that is separated from the primary storage site to reduce susceptibility to the same threats."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate storage sites\n\ncontingency plan\n\nalternate storage site\n\nalternate storage site agreements\n\nprimary storage site agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate storage site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-6.2","class":"SP800-53-enhancement","title":"Recovery Time \/ Point Objectives","props":[{"name":"label","value":"CP-6(2)"},{"name":"sort-id","value":"cp-06.02"}],"parts":[{"id":"cp-6.2_smt","name":"statement","prose":"The organization configures the alternate storage site to facilitate recovery operations in accordance with recovery time and recovery point objectives."},{"id":"cp-6.2_obj","name":"objective","prose":"Determine if the organization configures the alternate storage site to facilitate recovery operations in accordance with recovery time objectives and recovery point objectives (as specified in the information system contingency plan)."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate storage sites\n\ncontingency plan\n\nalternate storage site\n\nalternate storage site agreements\n\nalternate storage site configurations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan testing responsibilities\n\norganizational personnel with responsibilities for testing related plans\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency plan testing\n\nautomated mechanisms supporting recovery time\/point objectives"}]}]},{"id":"cp-6.3","class":"SP800-53-enhancement","title":"Accessibility","props":[{"name":"label","value":"CP-6(3)"},{"name":"sort-id","value":"cp-06.03"}],"parts":[{"id":"cp-6.3_smt","name":"statement","prose":"The organization identifies potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions."},{"id":"cp-6.3_gdn","name":"guidance","prose":"Area-wide disruptions refer to those types of disruptions that are broad in geographic scope (e.g., hurricane, regional power outage) with such determinations made by organizations based on organizational assessments of risk. Explicit mitigation actions include, for example: (i) duplicating backup information at other alternate storage sites if access problems occur at originally designated alternate sites; or (ii) planning for physical access to retrieve backup information if electronic accessibility to the alternate site is disrupted.","links":[{"href":"#ra-3","rel":"related"}]},{"id":"cp-6.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-6.3_obj.1","name":"objective","props":[{"name":"label","value":"CP-6(3)[1]"}],"prose":"identifies potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster; and"},{"id":"cp-6.3_obj.2","name":"objective","props":[{"name":"label","value":"CP-6(3)[2]"}],"prose":"outlines explicit mitigation actions for such potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate storage sites\n\ncontingency plan\n\nalternate storage site\n\nlist of potential accessibility problems to alternate storage site\n\nmitigation actions for accessibility problems to alternate storage site\n\norganizational risk assessments\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate storage site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"cp-7","class":"SP800-53","title":"Alternate Processing Site","params":[{"id":"cp-7_prm_1","label":"organization-defined information system operations"},{"id":"cp-7_prm_2","label":"organization-defined time period consistent with recovery time and recovery point objectives"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-7"},{"name":"sort-id","value":"cp-07"}],"links":[{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-7_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes an alternate processing site including necessary agreements to permit the transfer and resumption of {{ insert: param, cp-7_prm_1 }} for essential missions\/business functions within {{ insert: param, cp-7_prm_2 }} when the primary processing capabilities are unavailable;"},{"id":"cp-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Ensures that equipment and supplies required to transfer and resume operations are available at the alternate processing site or contracts are in place to support delivery to the site within the organization-defined time period for transfer\/resumption; and"},{"id":"cp-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensures that the alternate processing site provides information security safeguards equivalent to those of the primary site."}]},{"id":"cp-7_gdn","name":"guidance","prose":"Alternate processing sites are sites that are geographically distinct from primary processing sites. An alternate processing site provides processing capability in the event that the primary processing site is not available. Items covered by alternate processing site agreements include, for example, environmental conditions at alternate sites, access rules, physical and environmental protection requirements, and coordination for the transfer\/assignment of personnel. Requirements are specifically allocated to alternate processing sites that reflect the requirements in contingency plans to maintain essential missions\/business functions despite disruption, compromise, or failure in organizational information systems.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#cp-8","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#cp-10","rel":"related"},{"href":"#ma-6","rel":"related"}]},{"id":"cp-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-7.a_obj","name":"objective","props":[{"name":"label","value":"CP-7(a)"}],"parts":[{"id":"cp-7.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-7(a)[1]"}],"prose":"defines information system operations requiring an alternate processing site to be established to permit the transfer and resumption of such operations;"},{"id":"cp-7.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-7(a)[2]"}],"prose":"defines the time period consistent with recovery time objectives and recovery point objectives (as specified in the information system contingency plan) for transfer\/resumption of organization-defined information system operations for essential missions\/business functions;"},{"id":"cp-7.a_obj.3","name":"objective","props":[{"name":"label","value":"CP-7(a)[3]"}],"prose":"establishes an alternate processing site including necessary agreements to permit the transfer and resumption of organization-defined information system operations for essential missions\/business functions, within the organization-defined time period, when the primary processing capabilities are unavailable;"}]},{"id":"cp-7.b_obj","name":"objective","props":[{"name":"label","value":"CP-7(b)"}],"parts":[{"id":"cp-7.b_obj.1","name":"objective","props":[{"name":"label","value":"CP-7(b)[1]"}],"prose":"ensures that equipment and supplies required to transfer and resume operations are available at the alternate processing site; or"},{"id":"cp-7.b_obj.2","name":"objective","props":[{"name":"label","value":"CP-7(b)[2]"}],"prose":"ensures that contracts are in place to support delivery to the site within the organization-defined time period for transfer\/resumption; and"}]},{"id":"cp-7.c_obj","name":"objective","props":[{"name":"label","value":"CP-7(c)"}],"prose":"ensures that the alternate processing site provides information security safeguards equivalent to those of the primary site."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate processing sites\n\ncontingency plan\n\nalternate processing site agreements\n\nprimary processing site agreements\n\nspare equipment and supplies inventory at alternate processing site\n\nequipment and supply contracts\n\nservice-level agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for contingency planning and\/or alternate site arrangements\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for recovery at the alternate site\n\nautomated mechanisms supporting and\/or implementing recovery at the alternate processing site"}]}],"controls":[{"id":"cp-7.1","class":"SP800-53-enhancement","title":"Separation from Primary Site","props":[{"name":"label","value":"CP-7(1)"},{"name":"sort-id","value":"cp-07.01"}],"parts":[{"id":"cp-7.1_smt","name":"statement","prose":"The organization identifies an alternate processing site that is separated from the primary processing site to reduce susceptibility to the same threats."},{"id":"cp-7.1_gdn","name":"guidance","prose":"Threats that affect alternate processing sites are typically defined in organizational assessments of risk and include, for example, natural disasters, structural failures, hostile cyber attacks, and errors of omission\/commission. Organizations determine what is considered a sufficient degree of separation between primary and alternate processing sites based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber attack), the degree of separation between sites is less relevant.","links":[{"href":"#ra-3","rel":"related"}]},{"id":"cp-7.1_obj","name":"objective","prose":"Determine if the organization identifies an alternate processing site that is separated from the primary storage site to reduce susceptibility to the same threats."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate processing sites\n\ncontingency plan\n\nalternate processing site\n\nalternate processing site agreements\n\nprimary processing site agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate processing site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-7.2","class":"SP800-53-enhancement","title":"Accessibility","props":[{"name":"label","value":"CP-7(2)"},{"name":"sort-id","value":"cp-07.02"}],"parts":[{"id":"cp-7.2_smt","name":"statement","prose":"The organization identifies potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions."},{"id":"cp-7.2_gdn","name":"guidance","prose":"Area-wide disruptions refer to those types of disruptions that are broad in geographic scope (e.g., hurricane, regional power outage) with such determinations made by organizations based on organizational assessments of risk.","links":[{"href":"#ra-3","rel":"related"}]},{"id":"cp-7.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-7.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-7(2)[1]"}],"prose":"identifies potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster; and"},{"id":"cp-7.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-7(2)[2]"}],"prose":"outlines explicit mitigation actions for such potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate processing sites\n\ncontingency plan\n\nalternate processing site\n\nalternate processing site agreements\n\nprimary processing site agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate processing site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-7.3","class":"SP800-53-enhancement","title":"Priority of Service","props":[{"name":"label","value":"CP-7(3)"},{"name":"sort-id","value":"cp-07.03"}],"parts":[{"id":"cp-7.3_smt","name":"statement","prose":"The organization develops alternate processing site agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives)."},{"id":"cp-7.3_gdn","name":"guidance","prose":"Priority-of-service agreements refer to negotiated agreements with service providers that ensure that organizations receive priority treatment consistent with their availability requirements and the availability of information resources at the alternate processing site."},{"id":"cp-7.3_obj","name":"objective","prose":"Determine if the organization develops alternate processing site agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives as specified in the information system contingency plan)."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate processing sites\n\ncontingency plan\n\nalternate processing site agreements\n\nservice-level agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate processing site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibility for acquisitions\/contractual agreements"}]}]},{"id":"cp-7.4","class":"SP800-53-enhancement","title":"Preparation for Use","props":[{"name":"label","value":"CP-7(4)"},{"name":"sort-id","value":"cp-07.04"}],"parts":[{"id":"cp-7.4_smt","name":"statement","prose":"The organization prepares the alternate processing site so that the site is ready to be used as the operational site supporting essential missions and business functions."},{"id":"cp-7.4_gdn","name":"guidance","prose":"Site preparation includes, for example, establishing configuration settings for information system components at the alternate processing site consistent with the requirements for such settings at the primary site and ensuring that essential supplies and other logistical considerations are in place.","links":[{"href":"#cm-2","rel":"related"},{"href":"#cm-6","rel":"related"}]},{"id":"cp-7.4_obj","name":"objective","prose":"Determine if the organization prepares the alternate processing site so that the site is ready to be used as the operational site supporting essential missions and business functions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate processing sites\n\ncontingency plan\n\nalternate processing site\n\nalternate processing site agreements\n\nalternate processing site configurations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate processing site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing recovery at the alternate processing site"}]}]}]},{"id":"cp-8","class":"SP800-53","title":"Telecommunications Services","params":[{"id":"cp-8_prm_1","label":"organization-defined information system operations"},{"id":"cp-8_prm_2","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-8"},{"name":"sort-id","value":"cp-08"}],"links":[{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"},{"href":"#fb5844de-ff96-47c0-b258-4f52bcc2f30d","rel":"reference"},{"href":"#3ac12e79-f54f-4a63-9f4b-ee4bcd4df604","rel":"reference"}],"parts":[{"id":"cp-8_smt","name":"statement","prose":"The organization establishes alternate telecommunications services including necessary agreements to permit the resumption of {{ insert: param, cp-8_prm_1 }} for essential missions and business functions within {{ insert: param, cp-8_prm_2 }} when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites."},{"id":"cp-8_gdn","name":"guidance","prose":"This control applies to telecommunications services (data and voice) for primary and alternate processing and storage sites. Alternate telecommunications services reflect the continuity requirements in contingency plans to maintain essential missions\/business functions despite the loss of primary telecommunications services. Organizations may specify different time periods for primary\/alternate sites. Alternate telecommunications services include, for example, additional organizational or commercial ground-based circuits\/lines or satellites in lieu of ground-based communications. Organizations consider factors such as availability, quality of service, and access when entering into alternate telecommunications agreements.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#cp-7","rel":"related"}]},{"id":"cp-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-8_obj.1","name":"objective","props":[{"name":"label","value":"CP-8[1]"}],"prose":"defines information system operations requiring alternate telecommunications services to be established to permit the resumption of such operations;"},{"id":"cp-8_obj.2","name":"objective","props":[{"name":"label","value":"CP-8[2]"}],"prose":"defines the time period to permit resumption of organization-defined information system operations for essential missions and business functions; and"},{"id":"cp-8_obj.3","name":"objective","props":[{"name":"label","value":"CP-8[3]"}],"prose":"establishes alternate telecommunications services including necessary agreements to permit the resumption of organization-defined information system operations for essential missions and business functions, within the organization-defined time period, when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate telecommunications services\n\ncontingency plan\n\nprimary and alternate telecommunications service agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan telecommunications responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibility for acquisitions\/contractual agreements"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting telecommunications"}]}],"controls":[{"id":"cp-8.1","class":"SP800-53-enhancement","title":"Priority of Service Provisions","props":[{"name":"label","value":"CP-8(1)"},{"name":"sort-id","value":"cp-08.01"}],"parts":[{"id":"cp-8.1_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-8.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Develops primary and alternate telecommunications service agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives); and"},{"id":"cp-8.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Requests Telecommunications Service Priority for all telecommunications services used for national security emergency preparedness in the event that the primary and\/or alternate telecommunications services are provided by a common carrier."}]},{"id":"cp-8.1_gdn","name":"guidance","prose":"Organizations consider the potential mission\/business impact in situations where telecommunications service providers are servicing other organizations with similar priority-of-service provisions."},{"id":"cp-8.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-8.1_obj.1","name":"objective","props":[{"name":"label","value":"CP-8(1)[1]"}],"prose":"develops primary and alternate telecommunications service agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives as specified in the information system contingency plan); and"},{"id":"cp-8.1_obj.2","name":"objective","props":[{"name":"label","value":"CP-8(1)[2]"}],"prose":"requests Telecommunications Service Priority for all telecommunications services used for national security emergency preparedness in the event that the primary and\/or alternate telecommunications services are provided by a common carrier."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing primary and alternate telecommunications services\n\ncontingency plan\n\nprimary and alternate telecommunications service agreements\n\nTelecommunications Service Priority documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan telecommunications responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibility for acquisitions\/contractual agreements"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting telecommunications"}]}]},{"id":"cp-8.2","class":"SP800-53-enhancement","title":"Single Points of Failure","props":[{"name":"label","value":"CP-8(2)"},{"name":"sort-id","value":"cp-08.02"}],"parts":[{"id":"cp-8.2_smt","name":"statement","prose":"The organization obtains alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services."},{"id":"cp-8.2_obj","name":"objective","prose":"Determine if the organization obtains alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing primary and alternate telecommunications services\n\ncontingency plan\n\nprimary and alternate telecommunications service agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan telecommunications responsibilities\n\norganizational personnel with information system recovery responsibilities\n\nprimary and alternate telecommunications service providers\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-8.3","class":"SP800-53-enhancement","title":"Separation of Primary \/ Alternate Providers","props":[{"name":"label","value":"CP-8(3)"},{"name":"sort-id","value":"cp-08.03"}],"parts":[{"id":"cp-8.3_smt","name":"statement","prose":"The organization obtains alternate telecommunications services from providers that are separated from primary service providers to reduce susceptibility to the same threats."},{"id":"cp-8.3_gdn","name":"guidance","prose":"Threats that affect telecommunications services are typically defined in organizational assessments of risk and include, for example, natural disasters, structural failures, hostile cyber\/physical attacks, and errors of omission\/commission. Organizations seek to reduce common susceptibilities by, for example, minimizing shared infrastructure among telecommunications service providers and achieving sufficient geographic separation between services. Organizations may consider using a single service provider in situations where the service provider can provide alternate telecommunications services meeting the separation needs addressed in the risk assessment."},{"id":"cp-8.3_obj","name":"objective","prose":"Determine if the organization obtains alternate telecommunications services from providers that are separated from primary service providers to reduce susceptibility to the same threats."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing primary and alternate telecommunications services\n\ncontingency plan\n\nprimary and alternate telecommunications service agreements\n\nalternate telecommunications service provider site\n\nprimary telecommunications service provider site\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan telecommunications responsibilities\n\norganizational personnel with information system recovery responsibilities\n\nprimary and alternate telecommunications service providers\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-8.4","class":"SP800-53-enhancement","title":"Provider Contingency Plan","params":[{"id":"cp-8.4_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"CP-8(4)"},{"name":"sort-id","value":"cp-08.04"}],"parts":[{"id":"cp-8.4_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-8.4_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Requires primary and alternate telecommunications service providers to have contingency plans;"},{"id":"cp-8.4_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Reviews provider contingency plans to ensure that the plans meet organizational contingency requirements; and"},{"id":"cp-8.4_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Obtains evidence of contingency testing\/training by providers {{ insert: param, cp-8.4_prm_1 }}."}]},{"id":"cp-8.4_gdn","name":"guidance","prose":"Reviews of provider contingency plans consider the proprietary nature of such plans. In some situations, a summary of provider contingency plans may be sufficient evidence for organizations to satisfy the review requirement. Telecommunications service providers may also participate in ongoing disaster recovery exercises in coordination with the Department of Homeland Security, state, and local governments. Organizations may use these types of activities to satisfy evidentiary requirements related to service provider contingency plan reviews, testing, and training."},{"id":"cp-8.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-8.4.a_obj","name":"objective","props":[{"name":"label","value":"CP-8(4)(a)"}],"parts":[{"id":"cp-8.4.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-8(4)(a)[1]"}],"prose":"requires primary telecommunications service provider to have contingency plans;"},{"id":"cp-8.4.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-8(4)(a)[2]"}],"prose":"requires alternate telecommunications service provider(s) to have contingency plans;"}],"links":[{"href":"#cp-8.4_smt.a","rel":"corresp"}]},{"id":"cp-8.4.b_obj","name":"objective","props":[{"name":"label","value":"CP-8(4)(b)"}],"prose":"reviews provider contingency plans to ensure that the plans meet organizational contingency requirements;","links":[{"href":"#cp-8.4_smt.b","rel":"corresp"}]},{"id":"cp-8.4.c_obj","name":"objective","props":[{"name":"label","value":"CP-8(4)(c)"}],"parts":[{"id":"cp-8.4.c_obj.1","name":"objective","props":[{"name":"label","value":"CP-8(4)(c)[1]"}],"prose":"defines the frequency to obtain evidence of contingency testing\/training by providers; and"},{"id":"cp-8.4.c_obj.2","name":"objective","props":[{"name":"label","value":"CP-8(4)(c)[2]"}],"prose":"obtains evidence of contingency testing\/training by providers with the organization-defined frequency."}],"links":[{"href":"#cp-8.4_smt.c","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing primary and alternate telecommunications services\n\ncontingency plan\n\nprovider contingency plans\n\nevidence of contingency testing\/training by providers\n\nprimary and alternate telecommunications service agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning, plan implementation, and testing responsibilities\n\nprimary and alternate telecommunications service providers\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibility for acquisitions\/contractual agreements"}]}]}]},{"id":"cp-9","class":"SP800-53","title":"Information System Backup","params":[{"id":"cp-9_prm_1","label":"organization-defined frequency consistent with recovery time and recovery point objectives"},{"id":"cp-9_prm_2","label":"organization-defined frequency consistent with recovery time and recovery point objectives"},{"id":"cp-9_prm_3","label":"organization-defined frequency consistent with recovery time and recovery point objectives"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-9"},{"name":"sort-id","value":"cp-09"}],"links":[{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-9_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Conducts backups of user-level information contained in the information system {{ insert: param, cp-9_prm_1 }};"},{"id":"cp-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Conducts backups of system-level information contained in the information system {{ insert: param, cp-9_prm_2 }};"},{"id":"cp-9_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Conducts backups of information system documentation including security-related documentation {{ insert: param, cp-9_prm_3 }}; and"},{"id":"cp-9_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects the confidentiality, integrity, and availability of backup information at storage locations."}]},{"id":"cp-9_gdn","name":"guidance","prose":"System-level information includes, for example, system-state information, operating system and application software, and licenses. User-level information includes any information other than system-level information. Mechanisms employed by organizations to protect the integrity of information system backups include, for example, digital signatures and cryptographic hashes. Protection of system backup information while in transit is beyond the scope of this control. Information system backups reflect the requirements in contingency plans as well as other organizational requirements for backing up information.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"cp-9_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-9.a_obj","name":"objective","props":[{"name":"label","value":"CP-9(a)"}],"parts":[{"id":"cp-9.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(a)[1]"}],"prose":"defines a frequency, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to conduct backups of user-level information contained in the information system;"},{"id":"cp-9.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(a)[2]"}],"prose":"conducts backups of user-level information contained in the information system with the organization-defined frequency;"}]},{"id":"cp-9.b_obj","name":"objective","props":[{"name":"label","value":"CP-9(b)"}],"parts":[{"id":"cp-9.b_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(b)[1]"}],"prose":"defines a frequency, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to conduct backups of system-level information contained in the information system;"},{"id":"cp-9.b_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(b)[2]"}],"prose":"conducts backups of system-level information contained in the information system with the organization-defined frequency;"}]},{"id":"cp-9.c_obj","name":"objective","props":[{"name":"label","value":"CP-9(c)"}],"parts":[{"id":"cp-9.c_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(c)[1]"}],"prose":"defines a frequency, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to conduct backups of information system documentation including security-related documentation;"},{"id":"cp-9.c_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(c)[2]"}],"prose":"conducts backups of information system documentation, including security-related documentation, with the organization-defined frequency; and"}]},{"id":"cp-9.d_obj","name":"objective","props":[{"name":"label","value":"CP-9(d)"}],"prose":"protects the confidentiality, integrity, and availability of backup information at storage locations."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\nbackup storage location(s)\n\ninformation system backup logs or records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system backup responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for conducting information system backups\n\nautomated mechanisms supporting and\/or implementing information system backups"}]}],"controls":[{"id":"cp-9.1","class":"SP800-53-enhancement","title":"Testing for Reliability \/ Integrity","params":[{"id":"cp-9.1_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"CP-9(1)"},{"name":"sort-id","value":"cp-09.01"}],"parts":[{"id":"cp-9.1_smt","name":"statement","prose":"The organization tests backup information {{ insert: param, cp-9.1_prm_1 }} to verify media reliability and information integrity."},{"id":"cp-9.1_gdn","name":"guidance","links":[{"href":"#cp-4","rel":"related"}]},{"id":"cp-9.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-9.1_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(1)[1]"}],"prose":"defines the frequency to test backup information to verify media reliability and information integrity; and"},{"id":"cp-9.1_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(1)[2]"}],"prose":"tests backup information with the organization-defined frequency to verify media reliability and information integrity."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\ninformation system backup test results\n\ncontingency plan test documentation\n\ncontingency plan test results\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system backup responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for conducting information system backups\n\nautomated mechanisms supporting and\/or implementing information system backups"}]}]},{"id":"cp-9.2","class":"SP800-53-enhancement","title":"Test Restoration Using Sampling","props":[{"name":"label","value":"CP-9(2)"},{"name":"sort-id","value":"cp-09.02"}],"parts":[{"id":"cp-9.2_smt","name":"statement","prose":"The organization uses a sample of backup information in the restoration of selected information system functions as part of contingency plan testing."},{"id":"cp-9.2_gdn","name":"guidance","links":[{"href":"#cp-4","rel":"related"}]},{"id":"cp-9.2_obj","name":"objective","prose":"Determine if the organization uses a sample of backup information in the restoration of selected information system functions as part of contingency plan testing."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\ninformation system backup test results\n\ncontingency plan test documentation\n\ncontingency plan test results\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system backup responsibilities\n\norganizational personnel with contingency planning\/contingency plan testing responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for conducting information system backups\n\nautomated mechanisms supporting and\/or implementing information system backups"}]}]},{"id":"cp-9.3","class":"SP800-53-enhancement","title":"Separate Storage for Critical Information","params":[{"id":"cp-9.3_prm_1","label":"organization-defined critical information system software and other security-related information"}],"props":[{"name":"label","value":"CP-9(3)"},{"name":"sort-id","value":"cp-09.03"}],"parts":[{"id":"cp-9.3_smt","name":"statement","prose":"The organization stores backup copies of {{ insert: param, cp-9.3_prm_1 }} in a separate facility or in a fire-rated container that is not collocated with the operational system."},{"id":"cp-9.3_gdn","name":"guidance","prose":"Critical information system software includes, for example, operating systems, cryptographic key management systems, and intrusion detection\/prevention systems. Security-related information includes, for example, organizational inventories of hardware, software, and firmware components. Alternate storage sites typically serve as separate storage facilities for organizations.","links":[{"href":"#cm-2","rel":"related"},{"href":"#cm-8","rel":"related"}]},{"id":"cp-9.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-9.3_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(3)[1]"}],"parts":[{"id":"cp-9.3_obj.1.a","name":"objective","props":[{"name":"label","value":"CP-9(3)[1][a]"}],"prose":"defines critical information system software and other security-related information requiring backup copies to be stored in a separate facility; or"},{"id":"cp-9.3_obj.1.b","name":"objective","props":[{"name":"label","value":"CP-9(3)[1][b]"}],"prose":"defines critical information system software and other security-related information requiring backup copies to be stored in a fire-rated container that is not collocated with the operational system; and"}]},{"id":"cp-9.3_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(3)[2]"}],"prose":"stores backup copies of organization-defined critical information system software and other security-related information in a separate facility or in a fire-rated container that is not collocated with the operational system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\nbackup storage location(s)\n\ninformation system backup configurations and associated documentation\n\ninformation system backup logs or records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information system backup responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-9.5","class":"SP800-53-enhancement","title":"Transfer to Alternate Storage Site","params":[{"id":"cp-9.5_prm_1","label":"organization-defined time period and transfer rate consistent with the recovery time and recovery point objectives"}],"props":[{"name":"label","value":"CP-9(5)"},{"name":"sort-id","value":"cp-09.05"}],"parts":[{"id":"cp-9.5_smt","name":"statement","prose":"The organization transfers information system backup information to the alternate storage site {{ insert: param, cp-9.5_prm_1 }}."},{"id":"cp-9.5_gdn","name":"guidance","prose":"Information system backup information can be transferred to alternate storage sites either electronically or by physical shipment of storage media."},{"id":"cp-9.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-9.5_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(5)[1]"}],"prose":"defines a time period, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to transfer information system backup information to the alternate storage site;"},{"id":"cp-9.5_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(5)[2]"}],"prose":"defines a transfer rate, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to transfer information system backup information to the alternate storage site; and"},{"id":"cp-9.5_obj.3","name":"objective","props":[{"name":"label","value":"CP-9(5)[3]"}],"prose":"transfers information system backup information to the alternate storage site with the organization-defined time period and transfer rate."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\ninformation system backup logs or records\n\nevidence of system backup information transferred to alternate storage site\n\nalternate storage site agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system backup responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for transferring information system backups to the alternate storage site\n\nautomated mechanisms supporting and\/or implementing information system backups\n\nautomated mechanisms supporting and\/or implementing information transfer to the alternate storage site"}]}]}]},{"id":"cp-10","class":"SP800-53","title":"Information System Recovery and Reconstitution","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-10"},{"name":"sort-id","value":"cp-10"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-10_smt","name":"statement","prose":"The organization provides for the recovery and reconstitution of the information system to a known state after a disruption, compromise, or failure."},{"id":"cp-10_gdn","name":"guidance","prose":"Recovery is executing information system contingency plan activities to restore organizational missions\/business functions. Reconstitution takes place following recovery and includes activities for returning organizational information systems to fully operational states. Recovery and reconstitution operations reflect mission and business priorities, recovery point\/time and reconstitution objectives, and established organizational metrics consistent with contingency plan requirements. Reconstitution includes the deactivation of any interim information system capabilities that may have been needed during recovery operations. Reconstitution also includes assessments of fully restored information system capabilities, reestablishment of continuous monitoring activities, potential information system reauthorizations, and activities to prepare the systems against future disruptions, compromises, or failures. Recovery\/reconstitution capabilities employed by organizations can include both automated mechanisms and manual procedures.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-6","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#cp-7","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#sc-24","rel":"related"}]},{"id":"cp-10_obj","name":"objective","prose":"Determine if the organization provides for:","parts":[{"id":"cp-10_obj.1","name":"objective","props":[{"name":"label","value":"CP-10[1]"}],"prose":"the recovery of the information system to a known state after:","parts":[{"id":"cp-10_obj.1.a","name":"objective","props":[{"name":"label","value":"CP-10[1][a]"}],"prose":"a disruption;"},{"id":"cp-10_obj.1.b","name":"objective","props":[{"name":"label","value":"CP-10[1][b]"}],"prose":"a compromise; or"},{"id":"cp-10_obj.1.c","name":"objective","props":[{"name":"label","value":"CP-10[1][c]"}],"prose":"a failure;"}]},{"id":"cp-10_obj.2","name":"objective","props":[{"name":"label","value":"CP-10[2]"}],"prose":"the reconstitution of the information system to a known state after:","parts":[{"id":"cp-10_obj.2.a","name":"objective","props":[{"name":"label","value":"CP-10[2][a]"}],"prose":"a disruption;"},{"id":"cp-10_obj.2.b","name":"objective","props":[{"name":"label","value":"CP-10[2][b]"}],"prose":"a compromise; or"},{"id":"cp-10_obj.2.c","name":"objective","props":[{"name":"label","value":"CP-10[2][c]"}],"prose":"a failure."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\ninformation system backup test results\n\ncontingency plan test results\n\ncontingency plan test documentation\n\nredundant secondary system for information system backups\n\nlocation(s) of redundant secondary backup system(s)\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning, recovery, and\/or reconstitution responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes implementing information system recovery and reconstitution operations\n\nautomated mechanisms supporting and\/or implementing information system recovery and reconstitution operations"}]}],"controls":[{"id":"cp-10.2","class":"SP800-53-enhancement","title":"Transaction Recovery","props":[{"name":"label","value":"CP-10(2)"},{"name":"sort-id","value":"cp-10.02"}],"parts":[{"id":"cp-10.2_smt","name":"statement","prose":"The information system implements transaction recovery for systems that are transaction-based."},{"id":"cp-10.2_gdn","name":"guidance","prose":"Transaction-based information systems include, for example, database management systems and transaction processing systems. Mechanisms supporting transaction recovery include, for example, transaction rollback and transaction journaling."},{"id":"cp-10.2_obj","name":"objective","prose":"Determine if the information system implements transaction recovery for systems that are transaction-based."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system recovery and reconstitution\n\ncontingency plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ncontingency plan test documentation\n\ncontingency plan test results\n\ninformation system transaction recovery records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for transaction recovery\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing transaction recovery capability"}]}]},{"id":"cp-10.4","class":"SP800-53-enhancement","title":"Restore Within Time Period","params":[{"id":"cp-10.4_prm_1","label":"organization-defined restoration time-periods"}],"props":[{"name":"label","value":"CP-10(4)"},{"name":"sort-id","value":"cp-10.04"}],"parts":[{"id":"cp-10.4_smt","name":"statement","prose":"The organization provides the capability to restore information system components within {{ insert: param, cp-10.4_prm_1 }} from configuration-controlled and integrity-protected information representing a known, operational state for the components."},{"id":"cp-10.4_gdn","name":"guidance","prose":"Restoration of information system components includes, for example, reimaging which restores components to known, operational states.","links":[{"href":"#cm-2","rel":"related"}]},{"id":"cp-10.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-10.4_obj.1","name":"objective","props":[{"name":"label","value":"CP-10(4)[1]"}],"prose":"defines a time period to restore information system components from configuration-controlled and integrity-protected information representing a known, operational state for the components; and"},{"id":"cp-10.4_obj.2","name":"objective","props":[{"name":"label","value":"CP-10(4)[2]"}],"prose":"provides the capability to restore information system components within the organization-defined time period from configuration-controlled and integrity-protected information representing a known, operational state for the components."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system recovery and reconstitution\n\ncontingency plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ncontingency plan test documentation\n\ncontingency plan test results\n\nevidence of information system recovery and reconstitution operations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system recovery and reconstitution responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing recovery\/reconstitution of information system information"}]}]}]}]},{"id":"ia","class":"family","title":"Identification and Authentication","controls":[{"id":"ia-1","class":"SP800-53","title":"Identification and Authentication Policy and Procedures","params":[{"id":"ia-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ia-1_prm_2","label":"organization-defined frequency"},{"id":"ia-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-1"},{"name":"sort-id","value":"ia-01"}],"links":[{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ia-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ia-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ia-1_prm_1 }}:","parts":[{"id":"ia-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ia-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls; and"}]},{"id":"ia-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ia-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Identification and authentication policy {{ insert: param, ia-1_prm_2 }}; and"},{"id":"ia-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Identification and authentication procedures {{ insert: param, ia-1_prm_3 }}."}]}]},{"id":"ia-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the IA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ia-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ia-1.a_obj","name":"objective","props":[{"name":"label","value":"IA-1(a)"}],"parts":[{"id":"ia-1.a.1_obj","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)"}],"parts":[{"id":"ia-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1]"}],"prose":"develops and documents an identification and authentication policy that addresses:","parts":[{"id":"ia-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ia-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ia-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ia-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ia-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ia-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ia-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ia-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the identification and authentication policy is to be disseminated; and"},{"id":"ia-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[3]"}],"prose":"disseminates the identification and authentication policy to organization-defined personnel or roles;"}]},{"id":"ia-1.a.2_obj","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)"}],"parts":[{"id":"ia-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls;"},{"id":"ia-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ia-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ia-1.b_obj","name":"objective","props":[{"name":"label","value":"IA-1(b)"}],"parts":[{"id":"ia-1.b.1_obj","name":"objective","props":[{"name":"label","value":"IA-1(b)(1)"}],"parts":[{"id":"ia-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current identification and authentication policy;"},{"id":"ia-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(b)(1)[2]"}],"prose":"reviews and updates the current identification and authentication policy with the organization-defined frequency; and"}]},{"id":"ia-1.b.2_obj","name":"objective","props":[{"name":"label","value":"IA-1(b)(2)"}],"parts":[{"id":"ia-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current identification and authentication procedures; and"},{"id":"ia-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(b)(2)[2]"}],"prose":"reviews and updates the current identification and authentication procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with identification and authentication responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ia-2","class":"SP800-53","title":"Identification and Authentication (organizational Users)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-2"},{"name":"sort-id","value":"ia-02"}],"links":[{"href":"#ad733a42-a7ed-4774-b988-4930c28852f3","rel":"reference"},{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#4da24a96-6cf8-435d-9d1f-c73247cad109","rel":"reference"},{"href":"#74e740a4-c45d-49f3-a86e-eb747c549e01","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#ba557c91-ba3e-4792-adc6-a4ae479b39ff","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ia-2_smt","name":"statement","prose":"The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users)."},{"id":"ia-2_gdn","name":"guidance","prose":"Organizational users include employees or individuals that organizations deem to have equivalent status of employees (e.g., contractors, guest researchers). This control applies to all accesses other than: (i) accesses that are explicitly identified and documented in AC-14; and (ii) accesses that occur through authorized use of group authenticators without individual authentication. Organizations may require unique identification of individuals in group accounts (e.g., shared privilege accounts) or for detailed accountability of individual activity. Organizations employ passwords, tokens, or biometrics to authenticate user identities, or in the case multifactor authentication, or some combination thereof. Access to organizational information systems is defined as either local access or network access. Local access is any access to organizational information systems by users (or processes acting on behalf of users) where such access is obtained by direct connections without the use of networks. Network access is access to organizational information systems by users (or processes acting on behalf of users) where such access is obtained through network connections (i.e., nonlocal accesses). Remote access is a type of network access that involves communication through external networks (e.g., the Internet). Internal networks include local area networks and wide area networks. In addition, the use of encrypted virtual private networks (VPNs) for network connections between organization-controlled endpoints and non-organization controlled endpoints may be treated as internal networks from the perspective of protecting the confidentiality and integrity of information traversing the network. Organizations can satisfy the identification and authentication requirements in this control by complying with the requirements in Homeland Security Presidential Directive 12 consistent with the specific organizational implementation plans. Multifactor authentication requires the use of two or more different factors to achieve authentication. The factors are defined as: (i) something you know (e.g., password, personal identification number [PIN]); (ii) something you have (e.g., cryptographic identification device, token); or (iii) something you are (e.g., biometric). Multifactor solutions that require devices separate from information systems gaining access include, for example, hardware tokens providing time-based or challenge-response authenticators and smart cards such as the U.S. Government Personal Identity Verification card and the DoD common access card. In addition to identifying and authenticating users at the information system level (i.e., at logon), organizations also employ identification and authentication mechanisms at the application level, when necessary, to provide increased information security. Identification and authentication requirements for other than organizational users are described in IA-8.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"}]},{"id":"ia-2_obj","name":"objective","prose":"Determine if the information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users)."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for uniquely identifying and authenticating users\n\nautomated mechanisms supporting and\/or implementing identification and authentication capability"}]}],"controls":[{"id":"ia-2.1","class":"SP800-53-enhancement","title":"Network Access to Privileged Accounts","props":[{"name":"label","value":"IA-2(1)"},{"name":"sort-id","value":"ia-02.01"}],"parts":[{"id":"ia-2.1_smt","name":"statement","prose":"The information system implements multifactor authentication for network access to privileged accounts."},{"id":"ia-2.1_gdn","name":"guidance","links":[{"href":"#ac-6","rel":"related"}]},{"id":"ia-2.1_obj","name":"objective","prose":"Determine if the information system implements multifactor authentication for network access to privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing multifactor authentication capability"}]}]},{"id":"ia-2.2","class":"SP800-53-enhancement","title":"Network Access to Non-privileged Accounts","props":[{"name":"label","value":"IA-2(2)"},{"name":"sort-id","value":"ia-02.02"}],"parts":[{"id":"ia-2.2_smt","name":"statement","prose":"The information system implements multifactor authentication for network access to non-privileged accounts."},{"id":"ia-2.2_obj","name":"objective","prose":"Determine if the information system implements multifactor authentication for network access to non-privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing multifactor authentication capability"}]}]},{"id":"ia-2.3","class":"SP800-53-enhancement","title":"Local Access to Privileged Accounts","props":[{"name":"label","value":"IA-2(3)"},{"name":"sort-id","value":"ia-02.03"}],"parts":[{"id":"ia-2.3_smt","name":"statement","prose":"The information system implements multifactor authentication for local access to privileged accounts."},{"id":"ia-2.3_gdn","name":"guidance","links":[{"href":"#ac-6","rel":"related"}]},{"id":"ia-2.3_obj","name":"objective","prose":"Determine if the information system implements multifactor authentication for local access to privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing multifactor authentication capability"}]}]},{"id":"ia-2.4","class":"SP800-53-enhancement","title":"Local Access to Non-privileged Accounts","props":[{"name":"label","value":"IA-2(4)"},{"name":"sort-id","value":"ia-02.04"}],"parts":[{"id":"ia-2.4_smt","name":"statement","prose":"The information system implements multifactor authentication for local access to non-privileged accounts."},{"id":"ia-2.4_obj","name":"objective","prose":"Determine if the information system implements multifactor authentication for local access to non-privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing multifactor authentication capability"}]}]},{"id":"ia-2.8","class":"SP800-53-enhancement","title":"Network Access to Privileged Accounts - Replay Resistant","props":[{"name":"label","value":"IA-2(8)"},{"name":"sort-id","value":"ia-02.08"}],"parts":[{"id":"ia-2.8_smt","name":"statement","prose":"The information system implements replay-resistant authentication mechanisms for network access to privileged accounts."},{"id":"ia-2.8_gdn","name":"guidance","prose":"Authentication processes resist replay attacks if it is impractical to achieve successful authentications by replaying previous authentication messages. Replay-resistant techniques include, for example, protocols that use nonces or challenges such as Transport Layer Security (TLS) and time synchronous or challenge-response one-time authenticators."},{"id":"ia-2.8_obj","name":"objective","prose":"Determine if the information system implements replay-resistant authentication mechanisms for network access to privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of privileged information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms supporting and\/or implementing replay resistant authentication mechanisms"}]}]},{"id":"ia-2.9","class":"SP800-53-enhancement","title":"Network Access to Non-privileged Accounts - Replay Resistant","props":[{"name":"label","value":"IA-2(9)"},{"name":"sort-id","value":"ia-02.09"}],"parts":[{"id":"ia-2.9_smt","name":"statement","prose":"The information system implements replay-resistant authentication mechanisms for network access to non-privileged accounts."},{"id":"ia-2.9_gdn","name":"guidance","prose":"Authentication processes resist replay attacks if it is impractical to achieve successful authentications by recording\/replaying previous authentication messages. Replay-resistant techniques include, for example, protocols that use nonces or challenges such as Transport Layer Security (TLS) and time synchronous or challenge-response one-time authenticators."},{"id":"ia-2.9_obj","name":"objective","prose":"Determine if the information system implements replay-resistant authentication mechanisms for network access to non-privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of non-privileged information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms supporting and\/or implementing replay resistant authentication mechanisms"}]}]},{"id":"ia-2.11","class":"SP800-53-enhancement","title":"Remote Access - Separate Device","params":[{"id":"ia-2.11_prm_1","label":"organization-defined strength of mechanism requirements"}],"props":[{"name":"label","value":"IA-2(11)"},{"name":"sort-id","value":"ia-02.11"}],"parts":[{"id":"ia-2.11_smt","name":"statement","prose":"The information system implements multifactor authentication for remote access to privileged and non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets {{ insert: param, ia-2.11_prm_1 }}."},{"id":"ia-2.11_gdn","name":"guidance","prose":"For remote access to privileged\/non-privileged accounts, the purpose of requiring a device that is separate from the information system gaining access for one of the factors during multifactor authentication is to reduce the likelihood of compromising authentication credentials stored on the system. For example, adversaries deploying malicious code on organizational information systems can potentially compromise such credentials resident on the system and subsequently impersonate authorized users.","links":[{"href":"#ac-6","rel":"related"}]},{"id":"ia-2.11_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ia-2.11_obj.1","name":"objective","props":[{"name":"label","value":"IA-2(11)[1]"}],"prose":"the information system implements multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access;"},{"id":"ia-2.11_obj.2","name":"objective","props":[{"name":"label","value":"IA-2(11)[2]"}],"prose":"the information system implements multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access;"},{"id":"ia-2.11_obj.3","name":"objective","props":[{"name":"label","value":"IA-2(11)[3]"}],"prose":"the organization defines strength of mechanism requirements to be enforced by a device separate from the system gaining remote access to privileged accounts;"},{"id":"ia-2.11_obj.4","name":"objective","props":[{"name":"label","value":"IA-2(11)[4]"}],"prose":"the organization defines strength of mechanism requirements to be enforced by a device separate from the system gaining remote access to non-privileged accounts;"},{"id":"ia-2.11_obj.5","name":"objective","props":[{"name":"label","value":"IA-2(11)[5]"}],"prose":"the information system implements multifactor authentication for remote access to privileged accounts such that a device, separate from the system gaining access, meets organization-defined strength of mechanism requirements; and"},{"id":"ia-2.11_obj.6","name":"objective","props":[{"name":"label","value":"IA-2(11)[6]"}],"prose":"the information system implements multifactor authentication for remote access to non-privileged accounts such that a device, separate from the system gaining access, meets organization-defined strength of mechanism requirements."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of privileged and non-privileged information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability"}]}]},{"id":"ia-2.12","class":"SP800-53-enhancement","title":"Acceptance of PIV Credentials","props":[{"name":"label","value":"IA-2(12)"},{"name":"sort-id","value":"ia-02.12"}],"parts":[{"id":"ia-2.12_smt","name":"statement","prose":"The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials."},{"id":"ia-2.12_gdn","name":"guidance","prose":"This control enhancement applies to organizations implementing logical access control systems (LACS) and physical access control systems (PACS). Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11 requires federal agencies to continue implementing the requirements specified in HSPD-12 to enable agency-wide use of PIV credentials.","links":[{"href":"#au-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#sa-4","rel":"related"}]},{"id":"ia-2.12_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"ia-2.12_obj.1","name":"objective","props":[{"name":"label","value":"IA-2(12)[1]"}],"prose":"accepts Personal Identity Verification (PIV) credentials; and"},{"id":"ia-2.12_obj.2","name":"objective","props":[{"name":"label","value":"IA-2(12)[2]"}],"prose":"electronically verifies Personal Identity Verification (PIV) credentials."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nPIV verification records\n\nevidence of PIV credentials\n\nPIV credential authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing acceptance and verification of PIV credentials"}]}]}]},{"id":"ia-3","class":"SP800-53","title":"Device Identification and Authentication","params":[{"id":"ia-3_prm_1","label":"organization-defined specific and\/or types of devices"},{"id":"ia-3_prm_2","select":{"how-many":"one-or-more","choice":["local","remote","network"]}}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-3"},{"name":"sort-id","value":"ia-03"}],"parts":[{"id":"ia-3_smt","name":"statement","prose":"The information system uniquely identifies and authenticates {{ insert: param, ia-3_prm_1 }} before establishing a {{ insert: param, ia-3_prm_2 }} connection."},{"id":"ia-3_gdn","name":"guidance","prose":"Organizational devices requiring unique device-to-device identification and authentication may be defined by type, by device, or by a combination of type\/device. Information systems typically use either shared known information (e.g., Media Access Control [MAC] or Transmission Control Protocol\/Internet Protocol [TCP\/IP] addresses) for device identification or organizational authentication solutions (e.g., IEEE 802.1x and Extensible Authentication Protocol [EAP], Radius server with EAP-Transport Layer Security [TLS] authentication, Kerberos) to identify\/authenticate devices on local and\/or wide area networks. Organizations determine the required strength of authentication mechanisms by the security categories of information systems. Because of the challenges of applying this control on large scale, organizations are encouraged to only apply the control to those limited number (and type) of devices that truly need to support this capability.","links":[{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"}]},{"id":"ia-3_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ia-3_obj.1","name":"objective","props":[{"name":"label","value":"IA-3[1]"}],"prose":"the organization defines specific and\/or types of devices that the information system uniquely identifies and authenticates before establishing one or more of the following:","parts":[{"id":"ia-3_obj.1.a","name":"objective","props":[{"name":"label","value":"IA-3[1][a]"}],"prose":"a local connection;"},{"id":"ia-3_obj.1.b","name":"objective","props":[{"name":"label","value":"IA-3[1][b]"}],"prose":"a remote connection; and\/or"},{"id":"ia-3_obj.1.c","name":"objective","props":[{"name":"label","value":"IA-3[1][c]"}],"prose":"a network connection; and"}]},{"id":"ia-3_obj.2","name":"objective","props":[{"name":"label","value":"IA-3[2]"}],"prose":"the information system uniquely identifies and authenticates organization-defined devices before establishing one or more of the following:","parts":[{"id":"ia-3_obj.2.a","name":"objective","props":[{"name":"label","value":"IA-3[2][a]"}],"prose":"a local connection;"},{"id":"ia-3_obj.2.b","name":"objective","props":[{"name":"label","value":"IA-3[2][b]"}],"prose":"a remote connection; and\/or"},{"id":"ia-3_obj.2.c","name":"objective","props":[{"name":"label","value":"IA-3[2][c]"}],"prose":"a network connection."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing device identification and authentication\n\ninformation system design documentation\n\nlist of devices requiring unique identification and authentication\n\ndevice connection reports\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with operational responsibilities for device identification and authentication\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing device identification and authentication capability"}]}]},{"id":"ia-4","class":"SP800-53","title":"Identifier Management","params":[{"id":"ia-4_prm_1","label":"organization-defined personnel or roles"},{"id":"ia-4_prm_2","label":"organization-defined time period"},{"id":"ia-4_prm_3","label":"organization-defined time period of inactivity"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-4"},{"name":"sort-id","value":"ia-04"}],"links":[{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"}],"parts":[{"id":"ia-4_smt","name":"statement","prose":"The organization manages information system identifiers by:","parts":[{"id":"ia-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Receiving authorization from {{ insert: param, ia-4_prm_1 }} to assign an individual, group, role, or device identifier;"},{"id":"ia-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Selecting an identifier that identifies an individual, group, role, or device;"},{"id":"ia-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Assigning the identifier to the intended individual, group, role, or device;"},{"id":"ia-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Preventing reuse of identifiers for {{ insert: param, ia-4_prm_2 }}; and"},{"id":"ia-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Disabling the identifier after {{ insert: param, ia-4_prm_3 }}."}]},{"id":"ia-4_gdn","name":"guidance","prose":"Common device identifiers include, for example, media access control (MAC), Internet protocol (IP) addresses, or device-unique token identifiers. Management of individual identifiers is not applicable to shared information system accounts (e.g., guest and anonymous accounts). Typically, individual identifiers are the user names of the information system accounts assigned to those individuals. In such instances, the account management activities of AC-2 use account names provided by IA-4. This control also addresses individual identifiers not necessarily associated with information system accounts (e.g., identifiers used in physical security control databases accessed by badge reader systems for access to information systems). Preventing reuse of identifiers implies preventing the assignment of previously used individual, group, role, or device identifiers to different individuals, groups, roles, or devices.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#sc-37","rel":"related"}]},{"id":"ia-4_obj","name":"objective","prose":"Determine if the organization manages information system identifiers by:","parts":[{"id":"ia-4.a_obj","name":"objective","props":[{"name":"label","value":"IA-4(a)"}],"parts":[{"id":"ia-4.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(a)[1]"}],"prose":"defining personnel or roles from whom authorization must be received to assign:","parts":[{"id":"ia-4.a_obj.1.a","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][a]"}],"prose":"an individual identifier;"},{"id":"ia-4.a_obj.1.b","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][b]"}],"prose":"a group identifier;"},{"id":"ia-4.a_obj.1.c","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][c]"}],"prose":"a role identifier; and\/or"},{"id":"ia-4.a_obj.1.d","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][d]"}],"prose":"a device identifier;"}]},{"id":"ia-4.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(a)[2]"}],"prose":"receiving authorization from organization-defined personnel or roles to assign:","parts":[{"id":"ia-4.a_obj.2.a","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][a]"}],"prose":"an individual identifier;"},{"id":"ia-4.a_obj.2.b","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][b]"}],"prose":"a group identifier;"},{"id":"ia-4.a_obj.2.c","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][c]"}],"prose":"a role identifier; and\/or"},{"id":"ia-4.a_obj.2.d","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][d]"}],"prose":"a device identifier;"}]}]},{"id":"ia-4.b_obj","name":"objective","props":[{"name":"label","value":"IA-4(b)"}],"prose":"selecting an identifier that identifies:","parts":[{"id":"ia-4.b_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(b)[1]"}],"prose":"an individual;"},{"id":"ia-4.b_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(b)[2]"}],"prose":"a group;"},{"id":"ia-4.b_obj.3","name":"objective","props":[{"name":"label","value":"IA-4(b)[3]"}],"prose":"a role; and\/or"},{"id":"ia-4.b_obj.4","name":"objective","props":[{"name":"label","value":"IA-4(b)[4]"}],"prose":"a device;"}]},{"id":"ia-4.c_obj","name":"objective","props":[{"name":"label","value":"IA-4(c)"}],"prose":"assigning the identifier to the intended:","parts":[{"id":"ia-4.c_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(c)[1]"}],"prose":"individual;"},{"id":"ia-4.c_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(c)[2]"}],"prose":"group;"},{"id":"ia-4.c_obj.3","name":"objective","props":[{"name":"label","value":"IA-4(c)[3]"}],"prose":"role; and\/or"},{"id":"ia-4.c_obj.4","name":"objective","props":[{"name":"label","value":"IA-4(c)[4]"}],"prose":"device;"}]},{"id":"ia-4.d_obj","name":"objective","props":[{"name":"label","value":"IA-4(d)"}],"parts":[{"id":"ia-4.d_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(d)[1]"}],"prose":"defining a time period for preventing reuse of identifiers;"},{"id":"ia-4.d_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(d)[2]"}],"prose":"preventing reuse of identifiers for the organization-defined time period;"}]},{"id":"ia-4.e_obj","name":"objective","props":[{"name":"label","value":"IA-4(e)"}],"parts":[{"id":"ia-4.e_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(e)[1]"}],"prose":"defining a time period of inactivity to disable the identifier; and"},{"id":"ia-4.e_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(e)[2]"}],"prose":"disabling the identifier after the organization-defined time period of inactivity."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing identifier management\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of information system accounts\n\nlist of identifiers generated from physical access control devices\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with identifier management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identifier management"}]}]},{"id":"ia-5","class":"SP800-53","title":"Authenticator Management","params":[{"id":"ia-5_prm_1","label":"organization-defined time period by authenticator type"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-5"},{"name":"sort-id","value":"ia-05"}],"links":[{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#74e740a4-c45d-49f3-a86e-eb747c549e01","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#ba557c91-ba3e-4792-adc6-a4ae479b39ff","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ia-5_smt","name":"statement","prose":"The organization manages information system authenticators by:","parts":[{"id":"ia-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, or device receiving the authenticator;"},{"id":"ia-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishing initial authenticator content for authenticators defined by the organization;"},{"id":"ia-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensuring that authenticators have sufficient strength of mechanism for their intended use;"},{"id":"ia-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Establishing and implementing administrative procedures for initial authenticator distribution, for lost\/compromised or damaged authenticators, and for revoking authenticators;"},{"id":"ia-5_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Changing default content of authenticators prior to information system installation;"},{"id":"ia-5_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Establishing minimum and maximum lifetime restrictions and reuse conditions for authenticators;"},{"id":"ia-5_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Changing\/refreshing authenticators {{ insert: param, ia-5_prm_1 }};"},{"id":"ia-5_smt.h","name":"item","props":[{"name":"label","value":"h."}],"prose":"Protecting authenticator content from unauthorized disclosure and modification;"},{"id":"ia-5_smt.i","name":"item","props":[{"name":"label","value":"i."}],"prose":"Requiring individuals to take, and having devices implement, specific security safeguards to protect authenticators; and"},{"id":"ia-5_smt.j","name":"item","props":[{"name":"label","value":"j."}],"prose":"Changing authenticators for group\/role accounts when membership to those accounts changes."}]},{"id":"ia-5_gdn","name":"guidance","prose":"Individual authenticators include, for example, passwords, tokens, biometrics, PKI certificates, and key cards. Initial authenticator content is the actual content (e.g., the initial password) as opposed to requirements about authenticator content (e.g., minimum password length). In many cases, developers ship information system components with factory default authentication credentials to allow for initial installation and configuration. Default authentication credentials are often well known, easily discoverable, and present a significant security risk. The requirement to protect individual authenticators may be implemented via control PL-4 or PS-6 for authenticators in the possession of individuals and by controls AC-3, AC-6, and SC-28 for authenticators stored within organizational information systems (e.g., passwords stored in hashed or encrypted formats, files containing encrypted or hashed passwords accessible with administrator privileges). Information systems support individual authenticator management by organization-defined settings and restrictions for various authenticator characteristics including, for example, minimum password length, password composition, validation time window for time synchronous one-time tokens, and number of allowed rejections during the verification stage of biometric authentication. Specific actions that can be taken to safeguard authenticators include, for example, maintaining possession of individual authenticators, not loaning or sharing individual authenticators with others, and reporting lost, stolen, or compromised authenticators immediately. Authenticator management includes issuing and revoking, when no longer needed, authenticators for temporary access such as that required for remote maintenance. Device authenticators include, for example, certificates and passwords.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#ps-5","rel":"related"},{"href":"#ps-6","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-17","rel":"related"},{"href":"#sc-28","rel":"related"}]},{"id":"ia-5_obj","name":"objective","prose":"Determine if the organization manages information system authenticators by:","parts":[{"id":"ia-5.a_obj","name":"objective","props":[{"name":"label","value":"IA-5(a)"}],"prose":"verifying, as part of the initial authenticator distribution, the identity of:","parts":[{"id":"ia-5.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(a)[1]"}],"prose":"the individual receiving the authenticator;"},{"id":"ia-5.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(a)[2]"}],"prose":"the group receiving the authenticator;"},{"id":"ia-5.a_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(a)[3]"}],"prose":"the role receiving the authenticator; and\/or"},{"id":"ia-5.a_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(a)[4]"}],"prose":"the device receiving the authenticator;"}]},{"id":"ia-5.b_obj","name":"objective","props":[{"name":"label","value":"IA-5(b)"}],"prose":"establishing initial authenticator content for authenticators defined by the organization;"},{"id":"ia-5.c_obj","name":"objective","props":[{"name":"label","value":"IA-5(c)"}],"prose":"ensuring that authenticators have sufficient strength of mechanism for their intended use;"},{"id":"ia-5.d_obj","name":"objective","props":[{"name":"label","value":"IA-5(d)"}],"parts":[{"id":"ia-5.d_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(d)[1]"}],"prose":"establishing and implementing administrative procedures for initial authenticator distribution;"},{"id":"ia-5.d_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(d)[2]"}],"prose":"establishing and implementing administrative procedures for lost\/compromised or damaged authenticators;"},{"id":"ia-5.d_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(d)[3]"}],"prose":"establishing and implementing administrative procedures for revoking authenticators;"}]},{"id":"ia-5.e_obj","name":"objective","props":[{"name":"label","value":"IA-5(e)"}],"prose":"changing default content of authenticators prior to information system installation;"},{"id":"ia-5.f_obj","name":"objective","props":[{"name":"label","value":"IA-5(f)"}],"parts":[{"id":"ia-5.f_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(f)[1]"}],"prose":"establishing minimum lifetime restrictions for authenticators;"},{"id":"ia-5.f_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(f)[2]"}],"prose":"establishing maximum lifetime restrictions for authenticators;"},{"id":"ia-5.f_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(f)[3]"}],"prose":"establishing reuse conditions for authenticators;"}]},{"id":"ia-5.g_obj","name":"objective","props":[{"name":"label","value":"IA-5(g)"}],"parts":[{"id":"ia-5.g_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(g)[1]"}],"prose":"defining a time period (by authenticator type) for changing\/refreshing authenticators;"},{"id":"ia-5.g_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(g)[2]"}],"prose":"changing\/refreshing authenticators with the organization-defined time period by authenticator type;"}]},{"id":"ia-5.h_obj","name":"objective","props":[{"name":"label","value":"IA-5(h)"}],"prose":"protecting authenticator content from unauthorized:","parts":[{"id":"ia-5.h_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(h)[1]"}],"prose":"disclosure;"},{"id":"ia-5.h_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(h)[2]"}],"prose":"modification;"}]},{"id":"ia-5.i_obj","name":"objective","props":[{"name":"label","value":"IA-5(i)"}],"parts":[{"id":"ia-5.i_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(i)[1]"}],"prose":"requiring individuals to take specific security safeguards to protect authenticators;"},{"id":"ia-5.i_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(i)[2]"}],"prose":"having devices implement specific security safeguards to protect authenticators; and"}]},{"id":"ia-5.j_obj","name":"objective","props":[{"name":"label","value":"IA-5(j)"}],"prose":"changing authenticators for group\/role accounts when membership to those accounts changes."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator management\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of information system authenticator types\n\nchange control records associated with managing information system authenticators\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing authenticator management capability"}]}],"controls":[{"id":"ia-5.1","class":"SP800-53-enhancement","title":"Password-based Authentication","params":[{"id":"ia-5.1_prm_1","label":"organization-defined requirements for case sensitivity, number of characters, mix of upper-case letters, lower-case letters, numbers, and special characters, including minimum requirements for each type"},{"id":"ia-5.1_prm_2","label":"organization-defined number"},{"id":"ia-5.1_prm_3","label":"organization-defined numbers for lifetime minimum, lifetime maximum"},{"id":"ia-5.1_prm_4","label":"organization-defined number"}],"props":[{"name":"label","value":"IA-5(1)"},{"name":"sort-id","value":"ia-05.01"}],"parts":[{"id":"ia-5.1_smt","name":"statement","prose":"The information system, for password-based authentication:","parts":[{"id":"ia-5.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Enforces minimum password complexity of {{ insert: param, ia-5.1_prm_1 }};"},{"id":"ia-5.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Enforces at least the following number of changed characters when new passwords are created: {{ insert: param, ia-5.1_prm_2 }};"},{"id":"ia-5.1_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Stores and transmits only cryptographically-protected passwords;"},{"id":"ia-5.1_smt.d","name":"item","props":[{"name":"label","value":"(d)"}],"prose":"Enforces password minimum and maximum lifetime restrictions of {{ insert: param, ia-5.1_prm_3 }};"},{"id":"ia-5.1_smt.e","name":"item","props":[{"name":"label","value":"(e)"}],"prose":"Prohibits password reuse for {{ insert: param, ia-5.1_prm_4 }} generations; and"},{"id":"ia-5.1_smt.f","name":"item","props":[{"name":"label","value":"(f)"}],"prose":"Allows the use of a temporary password for system logons with an immediate change to a permanent password."}]},{"id":"ia-5.1_gdn","name":"guidance","prose":"This control enhancement applies to single-factor authentication of individuals using passwords as individual or group authenticators, and in a similar manner, when passwords are part of multifactor authenticators. This control enhancement does not apply when passwords are used to unlock hardware authenticators (e.g., Personal Identity Verification cards). The implementation of such password mechanisms may not meet all of the requirements in the enhancement. Cryptographically-protected passwords include, for example, encrypted versions of passwords and one-way cryptographic hashes of passwords. The number of changed characters refers to the number of changes required with respect to the total number of positions in the current password. Password lifetime restrictions do not apply to temporary passwords. To mitigate certain brute force attacks against passwords, organizations may also consider salting passwords.","links":[{"href":"#ia-6","rel":"related"}]},{"id":"ia-5.1_obj","name":"objective","prose":"Determine if, for password-based authentication:","parts":[{"id":"ia-5.1.a_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)"}],"parts":[{"id":"ia-5.1.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[1]"}],"prose":"the organization defines requirements for case sensitivity;"},{"id":"ia-5.1.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[2]"}],"prose":"the organization defines requirements for number of characters;"},{"id":"ia-5.1.a_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[3]"}],"prose":"the organization defines requirements for the mix of upper-case letters, lower-case letters, numbers and special characters;"},{"id":"ia-5.1.a_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[4]"}],"prose":"the organization defines minimum requirements for each type of character;"},{"id":"ia-5.1.a_obj.5","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[5]"}],"prose":"the information system enforces minimum password complexity of organization-defined requirements for case sensitivity, number of characters, mix of upper-case letters, lower-case letters, numbers, and special characters, including minimum requirements for each type;"}],"links":[{"href":"#ia-5.1_smt.a","rel":"corresp"}]},{"id":"ia-5.1.b_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(b)"}],"parts":[{"id":"ia-5.1.b_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(b)[1]"}],"prose":"the organization defines a minimum number of changed characters to be enforced when new passwords are created;"},{"id":"ia-5.1.b_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(b)[2]"}],"prose":"the information system enforces at least the organization-defined minimum number of characters that must be changed when new passwords are created;"}],"links":[{"href":"#ia-5.1_smt.b","rel":"corresp"}]},{"id":"ia-5.1.c_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(c)"}],"prose":"the information system stores and transmits only encrypted representations of passwords;","links":[{"href":"#ia-5.1_smt.c","rel":"corresp"}]},{"id":"ia-5.1.d_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)"}],"parts":[{"id":"ia-5.1.d_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[1]"}],"prose":"the organization defines numbers for password minimum lifetime restrictions to be enforced for passwords;"},{"id":"ia-5.1.d_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[2]"}],"prose":"the organization defines numbers for password maximum lifetime restrictions to be enforced for passwords;"},{"id":"ia-5.1.d_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[3]"}],"prose":"the information system enforces password minimum lifetime restrictions of organization-defined numbers for lifetime minimum;"},{"id":"ia-5.1.d_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[4]"}],"prose":"the information system enforces password maximum lifetime restrictions of organization-defined numbers for lifetime maximum;"}],"links":[{"href":"#ia-5.1_smt.d","rel":"corresp"}]},{"id":"ia-5.1.e_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(e)"}],"parts":[{"id":"ia-5.1.e_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(e)[1]"}],"prose":"the organization defines the number of password generations to be prohibited from password reuse;"},{"id":"ia-5.1.e_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(e)[2]"}],"prose":"the information system prohibits password reuse for the organization-defined number of generations; and"}],"links":[{"href":"#ia-5.1_smt.e","rel":"corresp"}]},{"id":"ia-5.1.f_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(f)"}],"prose":"the information system allows the use of a temporary password for system logons with an immediate change to a permanent password.","links":[{"href":"#ia-5.1_smt.f","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\npassword policy\n\nprocedures addressing authenticator management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\npassword configurations and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing password-based authenticator management capability"}]}]},{"id":"ia-5.2","class":"SP800-53-enhancement","title":"Pki-based Authentication","props":[{"name":"label","value":"IA-5(2)"},{"name":"sort-id","value":"ia-05.02"}],"parts":[{"id":"ia-5.2_smt","name":"statement","prose":"The information system, for PKI-based authentication:","parts":[{"id":"ia-5.2_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Validates certifications by constructing and verifying a certification path to an accepted trust anchor including checking certificate status information;"},{"id":"ia-5.2_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Enforces authorized access to the corresponding private key;"},{"id":"ia-5.2_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Maps the authenticated identity to the account of the individual or group; and"},{"id":"ia-5.2_smt.d","name":"item","props":[{"name":"label","value":"(d)"}],"prose":"Implements a local cache of revocation data to support path discovery and validation in case of inability to access revocation information via the network."}]},{"id":"ia-5.2_gdn","name":"guidance","prose":"Status information for certification paths includes, for example, certificate revocation lists or certificate status protocol responses. For PIV cards, validation of certifications involves the construction and verification of a certification path to the Common Policy Root trust anchor including certificate policy processing.","links":[{"href":"#ia-6","rel":"related"}]},{"id":"ia-5.2_obj","name":"objective","prose":"Determine if the information system, for PKI-based authentication:","parts":[{"id":"ia-5.2.a_obj","name":"objective","props":[{"name":"label","value":"IA-5(2)(a)"}],"parts":[{"id":"ia-5.2.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(2)(a)[1]"}],"prose":"validates certifications by constructing a certification path to an accepted trust anchor;"},{"id":"ia-5.2.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(2)(a)[2]"}],"prose":"validates certifications by verifying a certification path to an accepted trust anchor;"},{"id":"ia-5.2.a_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(2)(a)[3]"}],"prose":"includes checking certificate status information when constructing and verifying the certification path;"}],"links":[{"href":"#ia-5.2_smt.a","rel":"corresp"}]},{"id":"ia-5.2.b_obj","name":"objective","props":[{"name":"label","value":"IA-5(2)(b)"}],"prose":"enforces authorized access to the corresponding private key;","links":[{"href":"#ia-5.2_smt.b","rel":"corresp"}]},{"id":"ia-5.2.c_obj","name":"objective","props":[{"name":"label","value":"IA-5(2)(c)"}],"prose":"maps the authenticated identity to the account of the individual or group; and","links":[{"href":"#ia-5.2_smt.c","rel":"corresp"}]},{"id":"ia-5.2.d_obj","name":"objective","props":[{"name":"label","value":"IA-5(2)(d)"}],"prose":"implements a local cache of revocation data to support path discovery and validation in case of inability to access revocation information via the network.","links":[{"href":"#ia-5.2_smt.d","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nPKI certification validation records\n\nPKI certification revocation lists\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with PKI-based, authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing PKI-based, authenticator management capability"}]}]},{"id":"ia-5.3","class":"SP800-53-enhancement","title":"In-person or Trusted Third-party Registration","params":[{"id":"ia-5.3_prm_1","label":"organization-defined types of and\/or specific authenticators"},{"id":"ia-5.3_prm_2","select":{"choice":["in person","by a trusted third party"]}},{"id":"ia-5.3_prm_3","label":"organization-defined registration authority"},{"id":"ia-5.3_prm_4","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"IA-5(3)"},{"name":"sort-id","value":"ia-05.03"}],"parts":[{"id":"ia-5.3_smt","name":"statement","prose":"The organization requires that the registration process to receive {{ insert: param, ia-5.3_prm_1 }} be conducted {{ insert: param, ia-5.3_prm_2 }} before {{ insert: param, ia-5.3_prm_3 }} with authorization by {{ insert: param, ia-5.3_prm_4 }}."},{"id":"ia-5.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ia-5.3_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(3)[1]"}],"prose":"defines types of and\/or specific authenticators to be received in person or by a trusted third party;"},{"id":"ia-5.3_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(3)[2]"}],"prose":"defines the registration authority with oversight of the registration process for receipt of organization-defined types of and\/or specific authenticators;"},{"id":"ia-5.3_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(3)[3]"}],"prose":"defines personnel or roles responsible for authorizing organization-defined registration authority;"},{"id":"ia-5.3_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(3)[4]"}],"prose":"defines if the registration process is to be conducted:","parts":[{"id":"ia-5.3_obj.4.a","name":"objective","props":[{"name":"label","value":"IA-5(3)[4][a]"}],"prose":"in person; or"},{"id":"ia-5.3_obj.4.b","name":"objective","props":[{"name":"label","value":"IA-5(3)[4][b]"}],"prose":"by a trusted third party; and"}]},{"id":"ia-5.3_obj.5","name":"objective","props":[{"name":"label","value":"IA-5(3)[5]"}],"prose":"requires that the registration process to receive organization-defined types of and\/or specific authenticators be conducted in person or by a trusted third party before organization-defined registration authority with authorization by organization-defined personnel or roles."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator management\n\nregistration process for receiving information system authenticators\n\nlist of authenticators requiring in-person registration\n\nlist of authenticators requiring trusted third party registration\n\nauthenticator registration documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\nregistration authority\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ia-5.11","class":"SP800-53-enhancement","title":"Hardware Token-based Authentication","params":[{"id":"ia-5.11_prm_1","label":"organization-defined token quality requirements"}],"props":[{"name":"label","value":"IA-5(11)"},{"name":"sort-id","value":"ia-05.11"}],"parts":[{"id":"ia-5.11_smt","name":"statement","prose":"The information system, for hardware token-based authentication, employs mechanisms that satisfy {{ insert: param, ia-5.11_prm_1 }}."},{"id":"ia-5.11_gdn","name":"guidance","prose":"Hardware token-based authentication typically refers to the use of PKI-based tokens, such as the U.S. Government Personal Identity Verification (PIV) card. Organizations define specific requirements for tokens, such as working with a particular PKI."},{"id":"ia-5.11_obj","name":"objective","prose":"Determine if, for hardware token-based authentication:","parts":[{"id":"ia-5.11_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(11)[1]"}],"prose":"the organization defines token quality requirements to be satisfied; and"},{"id":"ia-5.11_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(11)[2]"}],"prose":"the information system employs mechanisms that satisfy organization-defined token quality requirements."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator management\n\nsecurity plan\n\ninformation system design documentation\n\nautomated mechanisms employing hardware token-based authentication for the information system\n\nlist of token quality requirements\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing hardware token-based authenticator management capability"}]}]}]},{"id":"ia-6","class":"SP800-53","title":"Authenticator Feedback","props":[{"name":"priority","value":"P2"},{"name":"label","value":"IA-6"},{"name":"sort-id","value":"ia-06"}],"parts":[{"id":"ia-6_smt","name":"statement","prose":"The information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation\/use by unauthorized individuals."},{"id":"ia-6_gdn","name":"guidance","prose":"The feedback from information systems does not provide information that would allow unauthorized individuals to compromise authentication mechanisms. For some types of information systems or system components, for example, desktops\/notebooks with relatively large monitors, the threat (often referred to as shoulder surfing) may be significant. For other types of systems or components, for example, mobile devices with 2-4 inch screens, this threat may be less significant, and may need to be balanced against the increased likelihood of typographic input errors due to the small keyboards. Therefore, the means for obscuring the authenticator feedback is selected accordingly. Obscuring the feedback of authentication information includes, for example, displaying asterisks when users type passwords into input devices, or displaying feedback for a very limited time before fully obscuring it.","links":[{"href":"#pe-18","rel":"related"}]},{"id":"ia-6_obj","name":"objective","prose":"Determine if the information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation\/use by unauthorized individuals."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator feedback\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing the obscuring of feedback of authentication information during authentication"}]}]},{"id":"ia-7","class":"SP800-53","title":"Cryptographic Module Authentication","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-7"},{"name":"sort-id","value":"ia-07"}],"links":[{"href":"#39f9087d-7687-46d2-8eda-b6f4b7a4d8a9","rel":"reference"},{"href":"#b09d1a31-d3c9-4138-a4f4-4c63816afd7d","rel":"reference"}],"parts":[{"id":"ia-7_smt","name":"statement","prose":"The information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication."},{"id":"ia-7_gdn","name":"guidance","prose":"Authentication mechanisms may be required within a cryptographic module to authenticate an operator accessing the module and to verify that the operator is authorized to assume the requested role and perform services within that role.","links":[{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"ia-7_obj","name":"objective","prose":"Determine if the information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing cryptographic module authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for cryptographic module authentication\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing cryptographic module authentication"}]}]},{"id":"ia-8","class":"SP800-53","title":"Identification and Authentication (non-organizational Users)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-8"},{"name":"sort-id","value":"ia-08"}],"links":[{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#74e740a4-c45d-49f3-a86e-eb747c549e01","rel":"reference"},{"href":"#599fe9ba-4750-4450-9eeb-b95bd19a5e8f","rel":"reference"},{"href":"#ba557c91-ba3e-4792-adc6-a4ae479b39ff","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#2157bb7e-192c-4eaa-877f-93ef6b0a3292","rel":"reference"},{"href":"#654f21e2-f3bc-43b2-abdc-60ab8d09744b","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ia-8_smt","name":"statement","prose":"The information system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users)."},{"id":"ia-8_gdn","name":"guidance","prose":"Non-organizational users include information system users other than organizational users explicitly covered by IA-2. These individuals are uniquely identified and authenticated for accesses other than those accesses explicitly identified and documented in AC-14. In accordance with the E-Authentication E-Government initiative, authentication of non-organizational users accessing federal information systems may be required to protect federal, proprietary, or privacy-related information (with exceptions noted for national security systems). Organizations use risk assessments to determine authentication needs and consider scalability, practicality, and security in balancing the need to ensure ease of use for access to federal information and information systems with the need to protect and adequately mitigate risk. IA-2 addresses identification and authentication requirements for access to information systems by organizational users.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#sc-8","rel":"related"}]},{"id":"ia-8_obj","name":"objective","prose":"Determine if the information system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users)."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability"}]}],"controls":[{"id":"ia-8.1","class":"SP800-53-enhancement","title":"Acceptance of PIV Credentials from Other Agencies","props":[{"name":"label","value":"IA-8(1)"},{"name":"sort-id","value":"ia-08.01"}],"parts":[{"id":"ia-8.1_smt","name":"statement","prose":"The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials from other federal agencies."},{"id":"ia-8.1_gdn","name":"guidance","prose":"This control enhancement applies to logical access control systems (LACS) and physical access control systems (PACS). Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11 requires federal agencies to continue implementing the requirements specified in HSPD-12 to enable agency-wide use of PIV credentials.","links":[{"href":"#au-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#sa-4","rel":"related"}]},{"id":"ia-8.1_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"ia-8.1_obj.1","name":"objective","props":[{"name":"label","value":"IA-8(1)[1]"}],"prose":"accepts Personal Identity Verification (PIV) credentials from other agencies; and"},{"id":"ia-8.1_obj.2","name":"objective","props":[{"name":"label","value":"IA-8(1)[2]"}],"prose":"electronically verifies Personal Identity Verification (PIV) credentials from other agencies."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nPIV verification records\n\nevidence of PIV credentials\n\nPIV credential authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms that accept and verify PIV credentials"}]}]},{"id":"ia-8.2","class":"SP800-53-enhancement","title":"Acceptance of Third-party Credentials","props":[{"name":"label","value":"IA-8(2)"},{"name":"sort-id","value":"ia-08.02"}],"parts":[{"id":"ia-8.2_smt","name":"statement","prose":"The information system accepts only FICAM-approved third-party credentials."},{"id":"ia-8.2_gdn","name":"guidance","prose":"This control enhancement typically applies to organizational information systems that are accessible to the general public, for example, public-facing websites. Third-party credentials are those credentials issued by nonfederal government entities approved by the Federal Identity, Credential, and Access Management (FICAM) Trust Framework Solutions initiative. Approved third-party credentials meet or exceed the set of minimum federal government-wide technical, security, privacy, and organizational maturity requirements. This allows federal government relying parties to trust such credentials at their approved assurance levels.","links":[{"href":"#au-2","rel":"related"}]},{"id":"ia-8.2_obj","name":"objective","prose":"Determine if the information system accepts only FICAM-approved third-party credentials."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of FICAM-approved, third-party credentialing products, components, or services procured and implemented by organization\n\nthird-party credential verification records\n\nevidence of FICAM-approved third-party credentials\n\nthird-party credential authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms that accept FICAM-approved credentials"}]}]},{"id":"ia-8.3","class":"SP800-53-enhancement","title":"Use of Ficam-approved Products","params":[{"id":"ia-8.3_prm_1","label":"organization-defined information systems"}],"props":[{"name":"label","value":"IA-8(3)"},{"name":"sort-id","value":"ia-08.03"}],"parts":[{"id":"ia-8.3_smt","name":"statement","prose":"The organization employs only FICAM-approved information system components in {{ insert: param, ia-8.3_prm_1 }} to accept third-party credentials."},{"id":"ia-8.3_gdn","name":"guidance","prose":"This control enhancement typically applies to information systems that are accessible to the general public, for example, public-facing websites. FICAM-approved information system components include, for example, information technology products and software libraries that have been approved by the Federal Identity, Credential, and Access Management conformance program.","links":[{"href":"#sa-4","rel":"related"}]},{"id":"ia-8.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ia-8.3_obj.1","name":"objective","props":[{"name":"label","value":"IA-8(3)[1]"}],"prose":"defines information systems in which only FICAM-approved information system components are to be employed to accept third-party credentials; and"},{"id":"ia-8.3_obj.2","name":"objective","props":[{"name":"label","value":"IA-8(3)[2]"}],"prose":"employs only FICAM-approved information system components in organization-defined information systems to accept third-party credentials."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nsystem and services acquisition policy\n\nprocedures addressing user identification and authentication\n\nprocedures addressing the integration of security requirements into the acquisition process\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nthird-party credential validations\n\nthird-party credential authorizations\n\nthird-party credential records\n\nlist of FICAM-approved information system components procured and implemented by organization\n\nacquisition documentation\n\nacquisition contracts for information system procurements or services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information system security, acquisition, and contracting responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability"}]}]},{"id":"ia-8.4","class":"SP800-53-enhancement","title":"Use of Ficam-issued Profiles","props":[{"name":"label","value":"IA-8(4)"},{"name":"sort-id","value":"ia-08.04"}],"parts":[{"id":"ia-8.4_smt","name":"statement","prose":"The information system conforms to FICAM-issued profiles."},{"id":"ia-8.4_gdn","name":"guidance","prose":"This control enhancement addresses open identity management standards. To ensure that these standards are viable, robust, reliable, sustainable (e.g., available in commercial information technology products), and interoperable as documented, the United States Government assesses and scopes identity management standards and technology implementations against applicable federal legislation, directives, policies, and requirements. The result is FICAM-issued implementation profiles of approved protocols (e.g., FICAM authentication protocols such as SAML 2.0 and OpenID 2.0, as well as other protocols such as the FICAM Backend Attribute Exchange).","links":[{"href":"#sa-4","rel":"related"}]},{"id":"ia-8.4_obj","name":"objective","prose":"Determine if the information system conforms to FICAM-issued profiles."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nsystem and services acquisition policy\n\nprocedures addressing user identification and authentication\n\nprocedures addressing the integration of security requirements into the acquisition process\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of FICAM-issued profiles and associated, approved protocols\n\nacquisition documentation\n\nacquisition contracts for information system procurements or services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms supporting and\/or implementing conformance with FICAM-issued profiles"}]}]}]}]},{"id":"ir","class":"family","title":"Incident Response","controls":[{"id":"ir-1","class":"SP800-53","title":"Incident Response Policy and Procedures","params":[{"id":"ir-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ir-1_prm_2","label":"organization-defined frequency"},{"id":"ir-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-1"},{"name":"sort-id","value":"ir-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"},{"href":"#6d431fee-658f-4a0e-9f2e-a38b5d398fab","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ir-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ir-1_prm_1 }}:","parts":[{"id":"ir-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An incident response policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ir-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the incident response policy and associated incident response controls; and"}]},{"id":"ir-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ir-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Incident response policy {{ insert: param, ir-1_prm_2 }}; and"},{"id":"ir-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Incident response procedures {{ insert: param, ir-1_prm_3 }}."}]}]},{"id":"ir-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the IR family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ir-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-1.a_obj","name":"objective","props":[{"name":"label","value":"IR-1(a)"}],"parts":[{"id":"ir-1.a.1_obj","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)"}],"parts":[{"id":"ir-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1]"}],"prose":"develops and documents an incident response policy that addresses:","parts":[{"id":"ir-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ir-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ir-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ir-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ir-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ir-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ir-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ir-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the incident response policy is to be disseminated;"},{"id":"ir-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[3]"}],"prose":"disseminates the incident response policy to organization-defined personnel or roles;"}]},{"id":"ir-1.a.2_obj","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)"}],"parts":[{"id":"ir-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the incident response policy and associated incident response controls;"},{"id":"ir-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ir-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ir-1.b_obj","name":"objective","props":[{"name":"label","value":"IR-1(b)"}],"parts":[{"id":"ir-1.b.1_obj","name":"objective","props":[{"name":"label","value":"IR-1(b)(1)"}],"parts":[{"id":"ir-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current incident response policy;"},{"id":"ir-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(b)(1)[2]"}],"prose":"reviews and updates the current incident response policy with the organization-defined frequency;"}]},{"id":"ir-1.b.2_obj","name":"objective","props":[{"name":"label","value":"IR-1(b)(2)"}],"parts":[{"id":"ir-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current incident response procedures; and"},{"id":"ir-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(b)(2)[2]"}],"prose":"reviews and updates the current incident response procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ir-2","class":"SP800-53","title":"Incident Response Training","params":[{"id":"ir-2_prm_1","label":"organization-defined time period"},{"id":"ir-2_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"IR-2"},{"name":"sort-id","value":"ir-02"}],"links":[{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"ir-2_smt","name":"statement","prose":"The organization provides incident response training to information system users consistent with assigned roles and responsibilities:","parts":[{"id":"ir-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Within {{ insert: param, ir-2_prm_1 }} of assuming an incident response role or responsibility;"},{"id":"ir-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"ir-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, ir-2_prm_2 }} thereafter."}]},{"id":"ir-2_gdn","name":"guidance","prose":"Incident response training provided by organizations is linked to the assigned roles and responsibilities of organizational personnel to ensure the appropriate content and level of detail is included in such training. For example, regular users may only need to know who to call or how to recognize an incident on the information system; system administrators may require additional training on how to handle\/remediate incidents; and incident responders may receive more specific training on forensics, reporting, system recovery, and restoration. Incident response training includes user training in the identification and reporting of suspicious activities, both from external and internal sources.","links":[{"href":"#at-3","rel":"related"},{"href":"#cp-3","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"ir-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-2.a_obj","name":"objective","props":[{"name":"label","value":"IR-2(a)"}],"parts":[{"id":"ir-2.a_obj.1","name":"objective","props":[{"name":"label","value":"IR-2(a)[1]"}],"prose":"defines a time period within which incident response training is to be provided to information system users assuming an incident response role or responsibility;"},{"id":"ir-2.a_obj.2","name":"objective","props":[{"name":"label","value":"IR-2(a)[2]"}],"prose":"provides incident response training to information system users consistent with assigned roles and responsibilities within the organization-defined time period of assuming an incident response role or responsibility;"}]},{"id":"ir-2.b_obj","name":"objective","props":[{"name":"label","value":"IR-2(b)"}],"prose":"provides incident response training to information system users consistent with assigned roles and responsibilities when required by information system changes;"},{"id":"ir-2.c_obj","name":"objective","props":[{"name":"label","value":"IR-2(c)"}],"parts":[{"id":"ir-2.c_obj.1","name":"objective","props":[{"name":"label","value":"IR-2(c)[1]"}],"prose":"defines the frequency to provide refresher incident response training to information system users consistent with assigned roles or responsibilities; and"},{"id":"ir-2.c_obj.2","name":"objective","props":[{"name":"label","value":"IR-2(c)[2]"}],"prose":"after the initial incident response training, provides refresher incident response training to information system users consistent with assigned roles and responsibilities in accordance with the organization-defined frequency to provide refresher training."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response training\n\nincident response training curriculum\n\nincident response training materials\n\nsecurity plan\n\nincident response plan\n\nsecurity plan\n\nincident response training records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response training and operational responsibilities\n\norganizational personnel with information security responsibilities"}]}],"controls":[{"id":"ir-2.1","class":"SP800-53-enhancement","title":"Simulated Events","props":[{"name":"label","value":"IR-2(1)"},{"name":"sort-id","value":"ir-02.01"}],"parts":[{"id":"ir-2.1_smt","name":"statement","prose":"The organization incorporates simulated events into incident response training to facilitate effective response by personnel in crisis situations."},{"id":"ir-2.1_obj","name":"objective","prose":"Determine if the organization incorporates simulated events into incident response training to facilitate effective response by personnel in crisis situations."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response training\n\nincident response training curriculum\n\nincident response training materials\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response training and operational responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms that support and\/or implement simulated events for incident response training"}]}]},{"id":"ir-2.2","class":"SP800-53-enhancement","title":"Automated Training Environments","props":[{"name":"label","value":"IR-2(2)"},{"name":"sort-id","value":"ir-02.02"}],"parts":[{"id":"ir-2.2_smt","name":"statement","prose":"The organization employs automated mechanisms to provide a more thorough and realistic incident response training environment."},{"id":"ir-2.2_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to provide a more thorough and realistic incident response training environment."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response training\n\nincident response training curriculum\n\nincident response training materials\n\nautomated mechanisms supporting incident response training\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response training and operational responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms that provide a thorough and realistic incident response training environment"}]}]}]},{"id":"ir-3","class":"SP800-53","title":"Incident Response Testing","params":[{"id":"ir-3_prm_1","label":"organization-defined frequency"},{"id":"ir-3_prm_2","label":"organization-defined tests"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"IR-3"},{"name":"sort-id","value":"ir-03"}],"links":[{"href":"#0243a05a-e8a3-4d51-9364-4a9d20b0dcdf","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"}],"parts":[{"id":"ir-3_smt","name":"statement","prose":"The organization tests the incident response capability for the information system {{ insert: param, ir-3_prm_1 }} using {{ insert: param, ir-3_prm_2 }} to determine the incident response effectiveness and documents the results."},{"id":"ir-3_gdn","name":"guidance","prose":"Organizations test incident response capabilities to determine the overall effectiveness of the capabilities and to identify potential weaknesses or deficiencies. Incident response testing includes, for example, the use of checklists, walk-through or tabletop exercises, simulations (parallel\/full interrupt), and comprehensive exercises. Incident response testing can also include a determination of the effects on organizational operations (e.g., reduction in mission capabilities), organizational assets, and individuals due to incident response.","links":[{"href":"#cp-4","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"ir-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-3_obj.1","name":"objective","props":[{"name":"label","value":"IR-3[1]"}],"prose":"defines incident response tests to test the incident response capability for the information system;"},{"id":"ir-3_obj.2","name":"objective","props":[{"name":"label","value":"IR-3[2]"}],"prose":"defines the frequency to test the incident response capability for the information system; and"},{"id":"ir-3_obj.3","name":"objective","props":[{"name":"label","value":"IR-3[3]"}],"prose":"tests the incident response capability for the information system with the organization-defined frequency, using organization-defined tests to determine the incident response effectiveness and documents the results."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\ncontingency planning policy\n\nprocedures addressing incident response testing\n\nprocedures addressing contingency plan testing\n\nincident response testing material\n\nincident response test results\n\nincident response test plan\n\nincident response plan\n\ncontingency plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response testing responsibilities\n\norganizational personnel with information security responsibilities"}]}],"controls":[{"id":"ir-3.2","class":"SP800-53-enhancement","title":"Coordination with Related Plans","props":[{"name":"label","value":"IR-3(2)"},{"name":"sort-id","value":"ir-03.02"}],"parts":[{"id":"ir-3.2_smt","name":"statement","prose":"The organization coordinates incident response testing with organizational elements responsible for related plans."},{"id":"ir-3.2_gdn","name":"guidance","prose":"Organizational plans related to incident response testing include, for example, Business Continuity Plans, Contingency Plans, Disaster Recovery Plans, Continuity of Operations Plans, Crisis Communications Plans, Critical Infrastructure Plans, and Occupant Emergency Plans."},{"id":"ir-3.2_obj","name":"objective","prose":"Determine if the organization coordinates incident response testing with organizational elements responsible for related plans."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\ncontingency planning policy\n\nprocedures addressing incident response testing\n\nincident response testing documentation\n\nincident response plan\n\nbusiness continuity plans\n\ncontingency plans\n\ndisaster recovery plans\n\ncontinuity of operations plans\n\ncrisis communications plans\n\ncritical infrastructure plans\n\noccupant emergency plans\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response testing responsibilities\n\norganizational personnel with responsibilities for testing organizational plans related to incident response testing\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"ir-4","class":"SP800-53","title":"Incident Handling","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-4"},{"name":"sort-id","value":"ir-04"}],"links":[{"href":"#c5034e0c-eba6-4ecd-a541-79f0678f4ba4","rel":"reference"},{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"}],"parts":[{"id":"ir-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Implements an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery;"},{"id":"ir-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Coordinates incident handling activities with contingency planning activities; and"},{"id":"ir-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Incorporates lessons learned from ongoing incident handling activities into incident response procedures, training, and testing, and implements the resulting changes accordingly."}]},{"id":"ir-4_gdn","name":"guidance","prose":"Organizations recognize that incident response capability is dependent on the capabilities of organizational information systems and the mission\/business processes being supported by those systems. Therefore, organizations consider incident response as part of the definition, design, and development of mission\/business processes and information systems. Incident-related information can be obtained from a variety of sources including, for example, audit monitoring, network monitoring, physical access monitoring, user\/administrator reports, and reported supply chain events. Effective incident handling capability includes coordination among many organizational entities including, for example, mission\/business owners, information system owners, authorizing officials, human resources offices, physical and personnel security offices, legal departments, operations personnel, procurement offices, and the risk executive (function).","links":[{"href":"#au-6","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#cp-4","rel":"related"},{"href":"#ir-2","rel":"related"},{"href":"#ir-3","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#pe-6","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"ir-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-4.a_obj","name":"objective","props":[{"name":"label","value":"IR-4(a)"}],"prose":"implements an incident handling capability for security incidents that includes:","parts":[{"id":"ir-4.a_obj.1","name":"objective","props":[{"name":"label","value":"IR-4(a)[1]"}],"prose":"preparation;"},{"id":"ir-4.a_obj.2","name":"objective","props":[{"name":"label","value":"IR-4(a)[2]"}],"prose":"detection and analysis;"},{"id":"ir-4.a_obj.3","name":"objective","props":[{"name":"label","value":"IR-4(a)[3]"}],"prose":"containment;"},{"id":"ir-4.a_obj.4","name":"objective","props":[{"name":"label","value":"IR-4(a)[4]"}],"prose":"eradication;"},{"id":"ir-4.a_obj.5","name":"objective","props":[{"name":"label","value":"IR-4(a)[5]"}],"prose":"recovery;"}]},{"id":"ir-4.b_obj","name":"objective","props":[{"name":"label","value":"IR-4(b)"}],"prose":"coordinates incident handling activities with contingency planning activities;"},{"id":"ir-4.c_obj","name":"objective","props":[{"name":"label","value":"IR-4(c)"}],"parts":[{"id":"ir-4.c_obj.1","name":"objective","props":[{"name":"label","value":"IR-4(c)[1]"}],"prose":"incorporates lessons learned from ongoing incident handling activities into:","parts":[{"id":"ir-4.c_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-4(c)[1][a]"}],"prose":"incident response procedures;"},{"id":"ir-4.c_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-4(c)[1][b]"}],"prose":"training;"},{"id":"ir-4.c_obj.1.c","name":"objective","props":[{"name":"label","value":"IR-4(c)[1][c]"}],"prose":"testing\/exercises;"}]},{"id":"ir-4.c_obj.2","name":"objective","props":[{"name":"label","value":"IR-4(c)[2]"}],"prose":"implements the resulting changes accordingly to:","parts":[{"id":"ir-4.c_obj.2.a","name":"objective","props":[{"name":"label","value":"IR-4(c)[2][a]"}],"prose":"incident response procedures;"},{"id":"ir-4.c_obj.2.b","name":"objective","props":[{"name":"label","value":"IR-4(c)[2][b]"}],"prose":"training; and"},{"id":"ir-4.c_obj.2.c","name":"objective","props":[{"name":"label","value":"IR-4(c)[2][c]"}],"prose":"testing\/exercises."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\ncontingency planning policy\n\nprocedures addressing incident handling\n\nincident response plan\n\ncontingency plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident handling responsibilities\n\norganizational personnel with contingency planning responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Incident handling capability for the organization"}]}],"controls":[{"id":"ir-4.1","class":"SP800-53-enhancement","title":"Automated Incident Handling Processes","props":[{"name":"label","value":"IR-4(1)"},{"name":"sort-id","value":"ir-04.01"}],"parts":[{"id":"ir-4.1_smt","name":"statement","prose":"The organization employs automated mechanisms to support the incident handling process."},{"id":"ir-4.1_gdn","name":"guidance","prose":"Automated mechanisms supporting incident handling processes include, for example, online incident management systems."},{"id":"ir-4.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to support the incident handling process."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident handling\n\nautomated mechanisms supporting incident handling\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident handling responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms that support and\/or implement the incident handling process"}]}]},{"id":"ir-4.4","class":"SP800-53-enhancement","title":"Information Correlation","props":[{"name":"label","value":"IR-4(4)"},{"name":"sort-id","value":"ir-04.04"}],"parts":[{"id":"ir-4.4_smt","name":"statement","prose":"The organization correlates incident information and individual incident responses to achieve an organization-wide perspective on incident awareness and response."},{"id":"ir-4.4_gdn","name":"guidance","prose":"Sometimes the nature of a threat event, for example, a hostile cyber attack, is such that it can only be observed by bringing together information from different sources including various reports and reporting procedures established by organizations."},{"id":"ir-4.4_obj","name":"objective","prose":"Determine if the organization correlates incident information and individual incident responses to achieve an organization-wide perspective on incident awareness and response."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident handling\n\nincident response plan\n\nsecurity plan\n\nautomated mechanisms supporting incident and event correlation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nincident management correlation logs\n\nevent management correlation logs\n\nsecurity information and event management logs\n\nincident management correlation reports\n\nevent management correlation reports\n\nsecurity information and event management reports\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident handling responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with whom incident information and individual incident responses are to be correlated"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for correlating incident information and individual incident responses\n\nautomated mechanisms that support and or implement correlation of incident response information with individual incident responses"}]}]}]},{"id":"ir-5","class":"SP800-53","title":"Incident Monitoring","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-5"},{"name":"sort-id","value":"ir-05"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"}],"parts":[{"id":"ir-5_smt","name":"statement","prose":"The organization tracks and documents information system security incidents."},{"id":"ir-5_gdn","name":"guidance","prose":"Documenting information system security incidents includes, for example, maintaining records about each incident, the status of the incident, and other pertinent information necessary for forensics, evaluating incident details, trends, and handling. Incident information can be obtained from a variety of sources including, for example, incident reports, incident response teams, audit monitoring, network monitoring, physical access monitoring, and user\/administrator reports.","links":[{"href":"#au-6","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#pe-6","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"ir-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-5_obj.1","name":"objective","props":[{"name":"label","value":"IR-5[1]"}],"prose":"tracks information system security incidents; and"},{"id":"ir-5_obj.2","name":"objective","props":[{"name":"label","value":"IR-5[2]"}],"prose":"documents information system security incidents."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident monitoring\n\nincident response records and documentation\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident monitoring responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Incident monitoring capability for the organization\n\nautomated mechanisms supporting and\/or implementing tracking and documenting of system security incidents"}]}],"controls":[{"id":"ir-5.1","class":"SP800-53-enhancement","title":"Automated Tracking \/ Data Collection \/ Analysis","props":[{"name":"label","value":"IR-5(1)"},{"name":"sort-id","value":"ir-05.01"}],"parts":[{"id":"ir-5.1_smt","name":"statement","prose":"The organization employs automated mechanisms to assist in the tracking of security incidents and in the collection and analysis of incident information."},{"id":"ir-5.1_gdn","name":"guidance","prose":"Automated mechanisms for tracking security incidents and collecting\/analyzing incident information include, for example, the Einstein network monitoring device and monitoring online Computer Incident Response Centers (CIRCs) or other electronic databases of incidents.","links":[{"href":"#au-7","rel":"related"},{"href":"#ir-4","rel":"related"}]},{"id":"ir-5.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to assist in:","parts":[{"id":"ir-5.1_obj.1","name":"objective","props":[{"name":"label","value":"IR-5(1)[1]"}],"prose":"the tracking of security incidents;"},{"id":"ir-5.1_obj.2","name":"objective","props":[{"name":"label","value":"IR-5(1)[2]"}],"prose":"the collection of incident information; and"},{"id":"ir-5.1_obj.3","name":"objective","props":[{"name":"label","value":"IR-5(1)[3]"}],"prose":"the analysis of incident information."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident monitoring\n\nautomated mechanisms supporting incident monitoring\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nincident response plan\n\nsecurity plan\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident monitoring responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms assisting in tracking of security incidents and in the collection and analysis of incident information"}]}]}]},{"id":"ir-6","class":"SP800-53","title":"Incident Reporting","params":[{"id":"ir-6_prm_1","label":"organization-defined time period"},{"id":"ir-6_prm_2","label":"organization-defined authorities"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-6"},{"name":"sort-id","value":"ir-06"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"},{"href":"#02631467-668b-4233-989b-3dfded2fd184","rel":"reference"}],"parts":[{"id":"ir-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Requires personnel to report suspected security incidents to the organizational incident response capability within {{ insert: param, ir-6_prm_1 }}; and"},{"id":"ir-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reports security incident information to {{ insert: param, ir-6_prm_2 }}."}]},{"id":"ir-6_gdn","name":"guidance","prose":"The intent of this control is to address both specific incident reporting requirements within an organization and the formal incident reporting requirements for federal agencies and their subordinate organizations. Suspected security incidents include, for example, the receipt of suspicious email communications that can potentially contain malicious code. The types of security incidents reported, the content and timeliness of the reports, and the designated reporting authorities reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Current federal policy requires that all federal agencies (unless specifically exempted from such requirements) report security incidents to the United States Computer Emergency Readiness Team (US-CERT) within specified time frames designated in the US-CERT Concept of Operations for Federal Cyber Security Incident Handling.","links":[{"href":"#ir-4","rel":"related"},{"href":"#ir-5","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"ir-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-6.a_obj","name":"objective","props":[{"name":"label","value":"IR-6(a)"}],"parts":[{"id":"ir-6.a_obj.1","name":"objective","props":[{"name":"label","value":"IR-6(a)[1]"}],"prose":"defines the time period within which personnel report suspected security incidents to the organizational incident response capability;"},{"id":"ir-6.a_obj.2","name":"objective","props":[{"name":"label","value":"IR-6(a)[2]"}],"prose":"requires personnel to report suspected security incidents to the organizational incident response capability within the organization-defined time period;"}]},{"id":"ir-6.b_obj","name":"objective","props":[{"name":"label","value":"IR-6(b)"}],"parts":[{"id":"ir-6.b_obj.1","name":"objective","props":[{"name":"label","value":"IR-6(b)[1]"}],"prose":"defines authorities to whom security incident information is to be reported; and"},{"id":"ir-6.b_obj.2","name":"objective","props":[{"name":"label","value":"IR-6(b)[2]"}],"prose":"reports security incident information to organization-defined authorities."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident reporting\n\nincident reporting records and documentation\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident reporting responsibilities\n\norganizational personnel with information security responsibilities\n\npersonnel who have\/should have reported incidents\n\npersonnel (authorities) to whom incident information is to be reported"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incident reporting\n\nautomated mechanisms supporting and\/or implementing incident reporting"}]}],"controls":[{"id":"ir-6.1","class":"SP800-53-enhancement","title":"Automated Reporting","props":[{"name":"label","value":"IR-6(1)"},{"name":"sort-id","value":"ir-06.01"}],"parts":[{"id":"ir-6.1_smt","name":"statement","prose":"The organization employs automated mechanisms to assist in the reporting of security incidents."},{"id":"ir-6.1_gdn","name":"guidance","links":[{"href":"#ir-7","rel":"related"}]},{"id":"ir-6.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to assist in the reporting of security incidents."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident reporting\n\nautomated mechanisms supporting incident reporting\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident reporting responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incident reporting\n\nautomated mechanisms supporting and\/or implementing reporting of security incidents"}]}]}]},{"id":"ir-7","class":"SP800-53","title":"Incident Response Assistance","props":[{"name":"priority","value":"P2"},{"name":"label","value":"IR-7"},{"name":"sort-id","value":"ir-07"}],"parts":[{"id":"ir-7_smt","name":"statement","prose":"The organization provides an incident response support resource, integral to the organizational incident response capability that offers advice and assistance to users of the information system for the handling and reporting of security incidents."},{"id":"ir-7_gdn","name":"guidance","prose":"Incident response support resources provided by organizations include, for example, help desks, assistance groups, and access to forensics services, when required.","links":[{"href":"#at-2","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ir-6","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#sa-9","rel":"related"}]},{"id":"ir-7_obj","name":"objective","prose":"Determine if the organization provides an incident response support resource:","parts":[{"id":"ir-7_obj.1","name":"objective","props":[{"name":"label","value":"IR-7[1]"}],"prose":"that is integral to the organizational incident response capability; and"},{"id":"ir-7_obj.2","name":"objective","props":[{"name":"label","value":"IR-7[2]"}],"prose":"that offers advice and assistance to users of the information system for the handling and reporting of security incidents."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response assistance\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response assistance and support responsibilities\n\norganizational personnel with access to incident response support and assistance capability\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incident response assistance\n\nautomated mechanisms supporting and\/or implementing incident response assistance"}]}],"controls":[{"id":"ir-7.1","class":"SP800-53-enhancement","title":"Automation Support for Availability of Information \/ Support","props":[{"name":"label","value":"IR-7(1)"},{"name":"sort-id","value":"ir-07.01"}],"parts":[{"id":"ir-7.1_smt","name":"statement","prose":"The organization employs automated mechanisms to increase the availability of incident response-related information and support."},{"id":"ir-7.1_gdn","name":"guidance","prose":"Automated mechanisms can provide a push and\/or pull capability for users to obtain incident response assistance. For example, individuals might have access to a website to query the assistance capability, or conversely, the assistance capability may have the ability to proactively send information to users (general distribution or targeted) as part of increasing understanding of current response capabilities and support."},{"id":"ir-7.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to increase the availability of incident response-related information and support."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response assistance\n\nautomated mechanisms supporting incident response support and assistance\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response support and assistance responsibilities\n\norganizational personnel with access to incident response support and assistance capability\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incident response assistance\n\nautomated mechanisms supporting and\/or implementing an increase in the availability of incident response information and support"}]}]}]},{"id":"ir-8","class":"SP800-53","title":"Incident Response Plan","params":[{"id":"ir-8_prm_1","label":"organization-defined personnel or roles"},{"id":"ir-8_prm_2","label":"organization-defined incident response personnel (identified by name and\/or by role) and organizational elements"},{"id":"ir-8_prm_3","label":"organization-defined frequency"},{"id":"ir-8_prm_4","label":"organization-defined incident response personnel (identified by name and\/or by role) and organizational elements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-8"},{"name":"sort-id","value":"ir-08"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"}],"parts":[{"id":"ir-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops an incident response plan that:","parts":[{"id":"ir-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Provides the organization with a roadmap for implementing its incident response capability;"},{"id":"ir-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Describes the structure and organization of the incident response capability;"},{"id":"ir-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Provides a high-level approach for how the incident response capability fits into the overall organization;"},{"id":"ir-8_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Meets the unique requirements of the organization, which relate to mission, size, structure, and functions;"},{"id":"ir-8_smt.a.5","name":"item","props":[{"name":"label","value":"5."}],"prose":"Defines reportable incidents;"},{"id":"ir-8_smt.a.6","name":"item","props":[{"name":"label","value":"6."}],"prose":"Provides metrics for measuring the incident response capability within the organization;"},{"id":"ir-8_smt.a.7","name":"item","props":[{"name":"label","value":"7."}],"prose":"Defines the resources and management support needed to effectively maintain and mature an incident response capability; and"},{"id":"ir-8_smt.a.8","name":"item","props":[{"name":"label","value":"8."}],"prose":"Is reviewed and approved by {{ insert: param, ir-8_prm_1 }};"}]},{"id":"ir-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Distributes copies of the incident response plan to {{ insert: param, ir-8_prm_2 }};"},{"id":"ir-8_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the incident response plan {{ insert: param, ir-8_prm_3 }};"},{"id":"ir-8_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Updates the incident response plan to address system\/organizational changes or problems encountered during plan implementation, execution, or testing;"},{"id":"ir-8_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Communicates incident response plan changes to {{ insert: param, ir-8_prm_4 }}; and"},{"id":"ir-8_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Protects the incident response plan from unauthorized disclosure and modification."}]},{"id":"ir-8_gdn","name":"guidance","prose":"It is important that organizations develop and implement a coordinated approach to incident response. Organizational missions, business functions, strategies, goals, and objectives for incident response help to determine the structure of incident response capabilities. As part of a comprehensive incident response capability, organizations consider the coordination and sharing of information with external organizations, including, for example, external service providers and organizations involved in the supply chain for organizational information systems.","links":[{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"}]},{"id":"ir-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-8.a_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)"}],"prose":"develops an incident response plan that:","parts":[{"id":"ir-8.a.1_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(1)"}],"prose":"provides the organization with a roadmap for implementing its incident response capability;"},{"id":"ir-8.a.2_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(2)"}],"prose":"describes the structure and organization of the incident response capability;"},{"id":"ir-8.a.3_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(3)"}],"prose":"provides a high-level approach for how the incident response capability fits into the overall organization;"},{"id":"ir-8.a.4_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)"}],"prose":"meets the unique requirements of the organization, which relate to:","parts":[{"id":"ir-8.a.4_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[1]"}],"prose":"mission;"},{"id":"ir-8.a.4_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[2]"}],"prose":"size;"},{"id":"ir-8.a.4_obj.3","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[3]"}],"prose":"structure;"},{"id":"ir-8.a.4_obj.4","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[4]"}],"prose":"functions;"}]},{"id":"ir-8.a.5_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(5)"}],"prose":"defines reportable incidents;"},{"id":"ir-8.a.6_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(6)"}],"prose":"provides metrics for measuring the incident response capability within the organization;"},{"id":"ir-8.a.7_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(7)"}],"prose":"defines the resources and management support needed to effectively maintain and mature an incident response capability;"},{"id":"ir-8.a.8_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(8)"}],"parts":[{"id":"ir-8.a.8_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(a)(8)[1]"}],"prose":"defines personnel or roles to review and approve the incident response plan;"},{"id":"ir-8.a.8_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(a)(8)[2]"}],"prose":"is reviewed and approved by organization-defined personnel or roles;"}]}]},{"id":"ir-8.b_obj","name":"objective","props":[{"name":"label","value":"IR-8(b)"}],"parts":[{"id":"ir-8.b_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(b)[1]"}],"parts":[{"id":"ir-8.b_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-8(b)[1][a]"}],"prose":"defines incident response personnel (identified by name and\/or by role) to whom copies of the incident response plan are to be distributed;"},{"id":"ir-8.b_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-8(b)[1][b]"}],"prose":"defines organizational elements to whom copies of the incident response plan are to be distributed;"}]},{"id":"ir-8.b_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(b)[2]"}],"prose":"distributes copies of the incident response plan to organization-defined incident response personnel (identified by name and\/or by role) and organizational elements;"}]},{"id":"ir-8.c_obj","name":"objective","props":[{"name":"label","value":"IR-8(c)"}],"parts":[{"id":"ir-8.c_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(c)[1]"}],"prose":"defines the frequency to review the incident response plan;"},{"id":"ir-8.c_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(c)[2]"}],"prose":"reviews the incident response plan with the organization-defined frequency;"}]},{"id":"ir-8.d_obj","name":"objective","props":[{"name":"label","value":"IR-8(d)"}],"prose":"updates the incident response plan to address system\/organizational changes or problems encountered during plan:","parts":[{"id":"ir-8.d_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(d)[1]"}],"prose":"implementation;"},{"id":"ir-8.d_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(d)[2]"}],"prose":"execution; or"},{"id":"ir-8.d_obj.3","name":"objective","props":[{"name":"label","value":"IR-8(d)[3]"}],"prose":"testing;"}]},{"id":"ir-8.e_obj","name":"objective","props":[{"name":"label","value":"IR-8(e)"}],"parts":[{"id":"ir-8.e_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(e)[1]"}],"parts":[{"id":"ir-8.e_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-8(e)[1][a]"}],"prose":"defines incident response personnel (identified by name and\/or by role) to whom incident response plan changes are to be communicated;"},{"id":"ir-8.e_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-8(e)[1][b]"}],"prose":"defines organizational elements to whom incident response plan changes are to be communicated;"}]},{"id":"ir-8.e_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(e)[2]"}],"prose":"communicates incident response plan changes to organization-defined incident response personnel (identified by name and\/or by role) and organizational elements; and"}]},{"id":"ir-8.f_obj","name":"objective","props":[{"name":"label","value":"IR-8(f)"}],"prose":"protects the incident response plan from unauthorized disclosure and modification."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response planning\n\nincident response plan\n\nrecords of incident response plan reviews and approvals\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response planning responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational incident response plan and related organizational processes"}]}]}]},{"id":"ma","class":"family","title":"Maintenance","controls":[{"id":"ma-1","class":"SP800-53","title":"System Maintenance Policy and Procedures","params":[{"id":"ma-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ma-1_prm_2","label":"organization-defined frequency"},{"id":"ma-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MA-1"},{"name":"sort-id","value":"ma-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ma-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ma-1_prm_1 }}:","parts":[{"id":"ma-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system maintenance policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ma-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system maintenance policy and associated system maintenance controls; and"}]},{"id":"ma-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ma-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System maintenance policy {{ insert: param, ma-1_prm_2 }}; and"},{"id":"ma-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System maintenance procedures {{ insert: param, ma-1_prm_3 }}."}]}]},{"id":"ma-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the MA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ma-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-1.a_obj","name":"objective","props":[{"name":"label","value":"MA-1(a)"}],"parts":[{"id":"ma-1.a.1_obj","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)"}],"parts":[{"id":"ma-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1]"}],"prose":"develops and documents a system maintenance policy that addresses:","parts":[{"id":"ma-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ma-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ma-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ma-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ma-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ma-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ma-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ma-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system maintenance policy is to be disseminated;"},{"id":"ma-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[3]"}],"prose":"disseminates the system maintenance policy to organization-defined personnel or roles;"}]},{"id":"ma-1.a.2_obj","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)"}],"parts":[{"id":"ma-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the maintenance policy and associated system maintenance controls;"},{"id":"ma-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ma-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ma-1.b_obj","name":"objective","props":[{"name":"label","value":"MA-1(b)"}],"parts":[{"id":"ma-1.b.1_obj","name":"objective","props":[{"name":"label","value":"MA-1(b)(1)"}],"parts":[{"id":"ma-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system maintenance policy;"},{"id":"ma-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(b)(1)[2]"}],"prose":"reviews and updates the current system maintenance policy with the organization-defined frequency;"}]},{"id":"ma-1.b.2_obj","name":"objective","props":[{"name":"label","value":"MA-1(b)(2)"}],"parts":[{"id":"ma-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system maintenance procedures; and"},{"id":"ma-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(b)(2)[2]"}],"prose":"reviews and updates the current system maintenance procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Maintenance policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ma-2","class":"SP800-53","title":"Controlled Maintenance","params":[{"id":"ma-2_prm_1","label":"organization-defined personnel or roles"},{"id":"ma-2_prm_2","label":"organization-defined maintenance-related information"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-2"},{"name":"sort-id","value":"ma-02"}],"parts":[{"id":"ma-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Schedules, performs, documents, and reviews records of maintenance and repairs on information system components in accordance with manufacturer or vendor specifications and\/or organizational requirements;"},{"id":"ma-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Approves and monitors all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;"},{"id":"ma-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Requires that {{ insert: param, ma-2_prm_1 }} explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions; and"},{"id":"ma-2_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Includes {{ insert: param, ma-2_prm_2 }} in organizational maintenance records."}]},{"id":"ma-2_gdn","name":"guidance","prose":"This control addresses the information security aspects of the information system maintenance program and applies to all types of maintenance to any system component (including applications) conducted by any local or nonlocal entity (e.g., in-contract, warranty, in-house, software maintenance agreement). System maintenance also includes those components not directly associated with information processing and\/or data\/information retention such as scanners, copiers, and printers. Information necessary for creating effective maintenance records includes, for example: (i) date and time of maintenance; (ii) name of individuals or group performing the maintenance; (iii) name of escort, if necessary; (iv) a description of the maintenance performed; and (v) information system components\/equipment removed or replaced (including identification numbers, if applicable). The level of detail included in maintenance records can be informed by the security categories of organizational information systems. Organizations consider supply chain issues associated with replacement components for information systems.","links":[{"href":"#cm-3","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-6","rel":"related"},{"href":"#pe-16","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"ma-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-2.a_obj","name":"objective","props":[{"name":"label","value":"MA-2(a)"}],"parts":[{"id":"ma-2.a_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(a)[1]"}],"prose":"schedules maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.1.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[1][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.1.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[1][b]"}],"prose":"organizational requirements;"}]},{"id":"ma-2.a_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(a)[2]"}],"prose":"performs maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.2.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[2][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.2.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[2][b]"}],"prose":"organizational requirements;"}]},{"id":"ma-2.a_obj.3","name":"objective","props":[{"name":"label","value":"MA-2(a)[3]"}],"prose":"documents maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.3.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[3][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.3.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[3][b]"}],"prose":"organizational requirements;"}]},{"id":"ma-2.a_obj.4","name":"objective","props":[{"name":"label","value":"MA-2(a)[4]"}],"prose":"reviews records of maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.4.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[4][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.4.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[4][b]"}],"prose":"organizational requirements;"}]}]},{"id":"ma-2.b_obj","name":"objective","props":[{"name":"label","value":"MA-2(b)"}],"parts":[{"id":"ma-2.b_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(b)[1]"}],"prose":"approves all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;"},{"id":"ma-2.b_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(b)[2]"}],"prose":"monitors all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;"}]},{"id":"ma-2.c_obj","name":"objective","props":[{"name":"label","value":"MA-2(c)"}],"parts":[{"id":"ma-2.c_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(c)[1]"}],"prose":"defines personnel or roles required to explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2.c_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(c)[2]"}],"prose":"requires that organization-defined personnel or roles explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;"}]},{"id":"ma-2.d_obj","name":"objective","props":[{"name":"label","value":"MA-2(d)"}],"prose":"sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2.e_obj","name":"objective","props":[{"name":"label","value":"MA-2(e)"}],"prose":"checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions;"},{"id":"ma-2.f_obj","name":"objective","props":[{"name":"label","value":"MA-2(f)"}],"parts":[{"id":"ma-2.f_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(f)[1]"}],"prose":"defines maintenance-related information to be included in organizational maintenance records; and"},{"id":"ma-2.f_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(f)[2]"}],"prose":"includes organization-defined maintenance-related information in organizational maintenance records."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing controlled information system maintenance\n\nmaintenance records\n\nmanufacturer\/vendor maintenance specifications\n\nequipment sanitization records\n\nmedia sanitization records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel responsible for media sanitization\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for scheduling, performing, documenting, reviewing, approving, and monitoring maintenance and repairs for the information system\n\norganizational processes for sanitizing information system components\n\nautomated mechanisms supporting and\/or implementing controlled maintenance\n\nautomated mechanisms implementing sanitization of information system components"}]}],"controls":[{"id":"ma-2.2","class":"SP800-53-enhancement","title":"Automated Maintenance Activities","props":[{"name":"label","value":"MA-2(2)"},{"name":"sort-id","value":"ma-02.02"}],"parts":[{"id":"ma-2.2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-2.2_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Employs automated mechanisms to schedule, conduct, and document maintenance and repairs; and"},{"id":"ma-2.2_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Produces up-to date, accurate, and complete records of all maintenance and repair actions requested, scheduled, in process, and completed."}]},{"id":"ma-2.2_gdn","name":"guidance","links":[{"href":"#ca-7","rel":"related"},{"href":"#ma-3","rel":"related"}]},{"id":"ma-2.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-2.2.a_obj","name":"objective","props":[{"name":"label","value":"MA-2(2)(a)"}],"prose":"employs automated mechanisms to:","parts":[{"id":"ma-2.2.a_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(2)(a)[1]"}],"prose":"schedule maintenance and repairs;"},{"id":"ma-2.2.a_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(2)(a)[2]"}],"prose":"conduct maintenance and repairs;"},{"id":"ma-2.2.a_obj.3","name":"objective","props":[{"name":"label","value":"MA-2(2)(a)[3]"}],"prose":"document maintenance and repairs;"}],"links":[{"href":"#ma-2.2_smt.a","rel":"corresp"}]},{"id":"ma-2.2.b_obj","name":"objective","props":[{"name":"label","value":"MA-2(2)(b)"}],"prose":"produces up-to-date, accurate, and complete records of all maintenance and repair actions:","parts":[{"id":"ma-2.2.b_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(2)(b)[1]"}],"prose":"requested;"},{"id":"ma-2.2.b_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(2)(b)[2]"}],"prose":"scheduled;"},{"id":"ma-2.2.b_obj.3","name":"objective","props":[{"name":"label","value":"MA-2(2)(b)[3]"}],"prose":"in process; and"},{"id":"ma-2.2.b_obj.4","name":"objective","props":[{"name":"label","value":"MA-2(2)(b)[4]"}],"prose":"completed."}],"links":[{"href":"#ma-2.2_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing controlled information system maintenance\n\nautomated mechanisms supporting information system maintenance activities\n\ninformation system configuration settings and associated documentation\n\nmaintenance records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing controlled maintenance\n\nautomated mechanisms supporting and\/or implementing production of records of maintenance and repair actions"}]}]}]},{"id":"ma-3","class":"SP800-53","title":"Maintenance Tools","props":[{"name":"priority","value":"P3"},{"name":"label","value":"MA-3"},{"name":"sort-id","value":"ma-03"}],"links":[{"href":"#263823e0-a971-4b00-959d-315b26278b22","rel":"reference"}],"parts":[{"id":"ma-3_smt","name":"statement","prose":"The organization approves, controls, and monitors information system maintenance tools."},{"id":"ma-3_gdn","name":"guidance","prose":"This control addresses security-related issues associated with maintenance tools used specifically for diagnostic and repair actions on organizational information systems. Maintenance tools can include hardware, software, and firmware items. Maintenance tools are potential vehicles for transporting malicious code, either intentionally or unintentionally, into a facility and subsequently into organizational information systems. Maintenance tools can include, for example, hardware\/software diagnostic test equipment and hardware\/software packet sniffers. This control does not cover hardware\/software components that may support information system maintenance, yet are a part of the system, for example, the software implementing “ping,” “ls,” “ipconfig, or the hardware and software implementing the monitoring port of an Ethernet switch.","links":[{"href":"#ma-2","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#mp-6","rel":"related"}]},{"id":"ma-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-3_obj.1","name":"objective","props":[{"name":"label","value":"MA-3[1]"}],"prose":"approves information system maintenance tools;"},{"id":"ma-3_obj.2","name":"objective","props":[{"name":"label","value":"MA-3[2]"}],"prose":"controls information system maintenance tools; and"},{"id":"ma-3_obj.3","name":"objective","props":[{"name":"label","value":"MA-3[3]"}],"prose":"monitors information system maintenance tools."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing information system maintenance tools\n\ninformation system maintenance tools and associated documentation\n\nmaintenance records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for approving, controlling, and monitoring maintenance tools\n\nautomated mechanisms supporting and\/or implementing approval, control, and\/or monitoring of maintenance tools"}]}],"controls":[{"id":"ma-3.1","class":"SP800-53-enhancement","title":"Inspect Tools","props":[{"name":"label","value":"MA-3(1)"},{"name":"sort-id","value":"ma-03.01"}],"parts":[{"id":"ma-3.1_smt","name":"statement","prose":"The organization inspects the maintenance tools carried into a facility by maintenance personnel for improper or unauthorized modifications."},{"id":"ma-3.1_gdn","name":"guidance","prose":"If, upon inspection of maintenance tools, organizations determine that the tools have been modified in an improper\/unauthorized manner or contain malicious code, the incident is handled consistent with organizational policies and procedures for incident handling.","links":[{"href":"#si-7","rel":"related"}]},{"id":"ma-3.1_obj","name":"objective","prose":"Determine if the organization inspects the maintenance tools carried into a facility by maintenance personnel for improper or unauthorized modifications."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing information system maintenance tools\n\ninformation system maintenance tools and associated documentation\n\nmaintenance tool inspection records\n\nmaintenance records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for inspecting maintenance tools\n\nautomated mechanisms supporting and\/or implementing inspection of maintenance tools"}]}]},{"id":"ma-3.2","class":"SP800-53-enhancement","title":"Inspect Media","props":[{"name":"label","value":"MA-3(2)"},{"name":"sort-id","value":"ma-03.02"}],"parts":[{"id":"ma-3.2_smt","name":"statement","prose":"The organization checks media containing diagnostic and test programs for malicious code before the media are used in the information system."},{"id":"ma-3.2_gdn","name":"guidance","prose":"If, upon inspection of media containing maintenance diagnostic and test programs, organizations determine that the media contain malicious code, the incident is handled consistent with organizational incident handling policies and procedures.","links":[{"href":"#si-3","rel":"related"}]},{"id":"ma-3.2_obj","name":"objective","prose":"Determine if the organization checks media containing diagnostic and test programs for malicious code before the media are used in the information system."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing information system maintenance tools\n\ninformation system maintenance tools and associated documentation\n\nmaintenance records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for inspecting media for malicious code\n\nautomated mechanisms supporting and\/or implementing inspection of media used for maintenance"}]}]},{"id":"ma-3.3","class":"SP800-53-enhancement","title":"Prevent Unauthorized Removal","params":[{"id":"ma-3.3_prm_1","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"MA-3(3)"},{"name":"sort-id","value":"ma-03.03"}],"parts":[{"id":"ma-3.3_smt","name":"statement","prose":"The organization prevents the unauthorized removal of maintenance equipment containing organizational information by:","parts":[{"id":"ma-3.3_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Verifying that there is no organizational information contained on the equipment;"},{"id":"ma-3.3_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Sanitizing or destroying the equipment;"},{"id":"ma-3.3_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Retaining the equipment within the facility; or"},{"id":"ma-3.3_smt.d","name":"item","props":[{"name":"label","value":"(d)"}],"prose":"Obtaining an exemption from {{ insert: param, ma-3.3_prm_1 }} explicitly authorizing removal of the equipment from the facility."}]},{"id":"ma-3.3_gdn","name":"guidance","prose":"Organizational information includes all information specifically owned by organizations and information provided to organizations in which organizations serve as information stewards."},{"id":"ma-3.3_obj","name":"objective","prose":"Determine if the organization prevents the unauthorized removal of maintenance equipment containing organizational information by:","parts":[{"id":"ma-3.3.a_obj","name":"objective","props":[{"name":"label","value":"MA-3(3)(a)"}],"prose":"verifying that there is no organizational information contained on the equipment;","links":[{"href":"#ma-3.3_smt.a","rel":"corresp"}]},{"id":"ma-3.3.b_obj","name":"objective","props":[{"name":"label","value":"MA-3(3)(b)"}],"prose":"sanitizing or destroying the equipment;","links":[{"href":"#ma-3.3_smt.b","rel":"corresp"}]},{"id":"ma-3.3.c_obj","name":"objective","props":[{"name":"label","value":"MA-3(3)(c)"}],"prose":"retaining the equipment within the facility; or","links":[{"href":"#ma-3.3_smt.c","rel":"corresp"}]},{"id":"ma-3.3.d_obj","name":"objective","props":[{"name":"label","value":"MA-3(3)(d)"}],"parts":[{"id":"ma-3.3.d_obj.1","name":"objective","props":[{"name":"label","value":"MA-3(3)(d)[1]"}],"prose":"defining personnel or roles that can grant an exemption from explicitly authorizing removal of the equipment from the facility; and"},{"id":"ma-3.3.d_obj.2","name":"objective","props":[{"name":"label","value":"MA-3(3)(d)[2]"}],"prose":"obtaining an exemption from organization-defined personnel or roles explicitly authorizing removal of the equipment from the facility."}],"links":[{"href":"#ma-3.3_smt.d","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing information system maintenance tools\n\ninformation system maintenance tools and associated documentation\n\nmaintenance records\n\nequipment sanitization records\n\nmedia sanitization records\n\nexemptions for equipment removal\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel responsible for media sanitization"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for preventing unauthorized removal of information\n\nautomated mechanisms supporting media sanitization or destruction of equipment\n\nautomated mechanisms supporting verification of media sanitization"}]}]}]},{"id":"ma-4","class":"SP800-53","title":"Nonlocal Maintenance","props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-4"},{"name":"sort-id","value":"ma-04"}],"links":[{"href":"#d715b234-9b5b-4e07-b1ed-99836727664d","rel":"reference"},{"href":"#f2dbd4ec-c413-4714-b85b-6b7184d1c195","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#263823e0-a971-4b00-959d-315b26278b22","rel":"reference"},{"href":"#a4aa9645-9a8a-4b51-90a9-e223250f9a75","rel":"reference"}],"parts":[{"id":"ma-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Approves and monitors nonlocal maintenance and diagnostic activities;"},{"id":"ma-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Allows the use of nonlocal maintenance and diagnostic tools only as consistent with organizational policy and documented in the security plan for the information system;"},{"id":"ma-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions;"},{"id":"ma-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Maintains records for nonlocal maintenance and diagnostic activities; and"},{"id":"ma-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Terminates session and network connections when nonlocal maintenance is completed."}]},{"id":"ma-4_gdn","name":"guidance","prose":"Nonlocal maintenance and diagnostic activities are those activities conducted by individuals communicating through a network, either an external network (e.g., the Internet) or an internal network. Local maintenance and diagnostic activities are those activities carried out by individuals physically present at the information system or information system component and not communicating across a network connection. Authentication techniques used in the establishment of nonlocal maintenance and diagnostic sessions reflect the network access requirements in IA-2. Typically, strong authentication requires authenticators that are resistant to replay attacks and employ multifactor authentication. Strong authenticators include, for example, PKI where certificates are stored on a token protected by a password, passphrase, or biometric. Enforcing requirements in MA-4 is accomplished in part by other controls.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#ma-2","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#mp-6","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-10","rel":"related"},{"href":"#sc-17","rel":"related"}]},{"id":"ma-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-4.a_obj","name":"objective","props":[{"name":"label","value":"MA-4(a)"}],"parts":[{"id":"ma-4.a_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(a)[1]"}],"prose":"approves nonlocal maintenance and diagnostic activities;"},{"id":"ma-4.a_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(a)[2]"}],"prose":"monitors nonlocal maintenance and diagnostic activities;"}]},{"id":"ma-4.b_obj","name":"objective","props":[{"name":"label","value":"MA-4(b)"}],"prose":"allows the use of nonlocal maintenance and diagnostic tools only:","parts":[{"id":"ma-4.b_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(b)[1]"}],"prose":"as consistent with organizational policy;"},{"id":"ma-4.b_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(b)[2]"}],"prose":"as documented in the security plan for the information system;"}]},{"id":"ma-4.c_obj","name":"objective","props":[{"name":"label","value":"MA-4(c)"}],"prose":"employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions;"},{"id":"ma-4.d_obj","name":"objective","props":[{"name":"label","value":"MA-4(d)"}],"prose":"maintains records for nonlocal maintenance and diagnostic activities;"},{"id":"ma-4.e_obj","name":"objective","props":[{"name":"label","value":"MA-4(e)"}],"parts":[{"id":"ma-4.e_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(e)[1]"}],"prose":"terminates sessions when nonlocal maintenance or diagnostics is completed; and"},{"id":"ma-4.e_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(e)[2]"}],"prose":"terminates network connections when nonlocal maintenance or diagnostics is completed."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing nonlocal information system maintenance\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nmaintenance records\n\ndiagnostic records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing nonlocal maintenance\n\nautomated mechanisms implementing, supporting, and\/or managing nonlocal maintenance\n\nautomated mechanisms for strong authentication of nonlocal maintenance diagnostic sessions\n\nautomated mechanisms for terminating nonlocal maintenance sessions and network connections"}]}],"controls":[{"id":"ma-4.2","class":"SP800-53-enhancement","title":"Document Nonlocal Maintenance","props":[{"name":"label","value":"MA-4(2)"},{"name":"sort-id","value":"ma-04.02"}],"parts":[{"id":"ma-4.2_smt","name":"statement","prose":"The organization documents in the security plan for the information system, the policies and procedures for the establishment and use of nonlocal maintenance and diagnostic connections."},{"id":"ma-4.2_obj","name":"objective","prose":"Determine if the organization documents in the security plan for the information system:","parts":[{"id":"ma-4.2_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(2)[1]"}],"prose":"the policies for the establishment and use of nonlocal maintenance and diagnostic connections; and"},{"id":"ma-4.2_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(2)[2]"}],"prose":"the procedures for the establishment and use of nonlocal maintenance and diagnostic connections."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing non-local information system maintenance\n\nsecurity plan\n\nmaintenance records\n\ndiagnostic records\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ma-4.3","class":"SP800-53-enhancement","title":"Comparable Security \/ Sanitization","props":[{"name":"label","value":"MA-4(3)"},{"name":"sort-id","value":"ma-04.03"}],"parts":[{"id":"ma-4.3_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-4.3_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Requires that nonlocal maintenance and diagnostic services be performed from an information system that implements a security capability comparable to the capability implemented on the system being serviced; or"},{"id":"ma-4.3_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Removes the component to be serviced from the information system prior to nonlocal maintenance or diagnostic services, sanitizes the component (with regard to organizational information) before removal from organizational facilities, and after the service is performed, inspects and sanitizes the component (with regard to potentially malicious software) before reconnecting the component to the information system."}]},{"id":"ma-4.3_gdn","name":"guidance","prose":"Comparable security capability on information systems, diagnostic tools, and equipment providing maintenance services implies that the implemented security controls on those systems, tools, and equipment are at least as comprehensive as the controls on the information system being serviced.","links":[{"href":"#ma-3","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"ma-4.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-4.3.a_obj","name":"objective","props":[{"name":"label","value":"MA-4(3)(a)"}],"prose":"requires that nonlocal maintenance and diagnostic services be performed from an information system that implements a security capability comparable to the capability implemented on the system being serviced; or","links":[{"href":"#ma-4.3_smt.a","rel":"corresp"}]},{"id":"ma-4.3.b_obj","name":"objective","props":[{"name":"label","value":"MA-4(3)(b)"}],"parts":[{"id":"ma-4.3.b_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(3)(b)[1]"}],"prose":"removes the component to be serviced from the information system;"},{"id":"ma-4.3.b_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(3)(b)[2]"}],"prose":"sanitizes the component (with regard to organizational information) prior to nonlocal maintenance or diagnostic services and\/or before removal from organizational facilities; and"},{"id":"ma-4.3.b_obj.3","name":"objective","props":[{"name":"label","value":"MA-4(3)(b)[3]"}],"prose":"inspects and sanitizes the component (with regard to potentially malicious software) after service is performed on the component and before reconnecting the component to the information system."}],"links":[{"href":"#ma-4.3_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing nonlocal information system maintenance\n\nservice provider contracts and\/or service-level agreements\n\nmaintenance records\n\ninspection records\n\naudit records\n\nequipment sanitization records\n\nmedia sanitization records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\ninformation system maintenance provider\n\norganizational personnel with information security responsibilities\n\norganizational personnel responsible for media sanitization\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for comparable security and sanitization for nonlocal maintenance\n\norganizational processes for removal, sanitization, and inspection of components serviced via nonlocal maintenance\n\nautomated mechanisms supporting and\/or implementing component sanitization and inspection"}]}]}]},{"id":"ma-5","class":"SP800-53","title":"Maintenance Personnel","props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-5"},{"name":"sort-id","value":"ma-05"}],"parts":[{"id":"ma-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes a process for maintenance personnel authorization and maintains a list of authorized maintenance organizations or personnel;"},{"id":"ma-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and"},{"id":"ma-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations."}]},{"id":"ma-5_gdn","name":"guidance","prose":"This control applies to individuals performing hardware or software maintenance on organizational information systems, while PE-2 addresses physical access for individuals whose maintenance duties place them within the physical protection perimeter of the systems (e.g., custodial staff, physical plant maintenance personnel). Technical competence of supervising individuals relates to the maintenance performed on the information systems while having required access authorizations refers to maintenance on and near the systems. Individuals not previously identified as authorized maintenance personnel, such as information technology manufacturers, vendors, systems integrators, and consultants, may require privileged access to organizational information systems, for example, when required to conduct maintenance activities with little or no notice. Based on organizational assessments of risk, organizations may issue temporary credentials to these individuals. Temporary credentials may be for one-time use or for very limited time periods.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#ra-3","rel":"related"}]},{"id":"ma-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-5.a_obj","name":"objective","props":[{"name":"label","value":"MA-5(a)"}],"parts":[{"id":"ma-5.a_obj.1","name":"objective","props":[{"name":"label","value":"MA-5(a)[1]"}],"prose":"establishes a process for maintenance personnel authorization;"},{"id":"ma-5.a_obj.2","name":"objective","props":[{"name":"label","value":"MA-5(a)[2]"}],"prose":"maintains a list of authorized maintenance organizations or personnel;"}]},{"id":"ma-5.b_obj","name":"objective","props":[{"name":"label","value":"MA-5(b)"}],"prose":"ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and"},{"id":"ma-5.c_obj","name":"objective","props":[{"name":"label","value":"MA-5(c)"}],"prose":"designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing maintenance personnel\n\nservice provider contracts\n\nservice-level agreements\n\nlist of authorized personnel\n\nmaintenance records\n\naccess control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for authorizing and managing maintenance personnel\n\nautomated mechanisms supporting and\/or implementing authorization of maintenance personnel"}]}],"controls":[{"id":"ma-5.1","class":"SP800-53-enhancement","title":"Individuals Without Appropriate Access","props":[{"name":"label","value":"MA-5(1)"},{"name":"sort-id","value":"ma-05.01"}],"parts":[{"id":"ma-5.1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-5.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Implements procedures for the use of maintenance personnel that lack appropriate security clearances or are not U.S. citizens, that include the following requirements:","parts":[{"id":"ma-5.1_smt.a.1","name":"item","props":[{"name":"label","value":"(1)"}],"prose":"Maintenance personnel who do not have needed access authorizations, clearances, or formal access approvals are escorted and supervised during the performance of maintenance and diagnostic activities on the information system by approved organizational personnel who are fully cleared, have appropriate access authorizations, and are technically qualified;"},{"id":"ma-5.1_smt.a.2","name":"item","props":[{"name":"label","value":"(2)"}],"prose":"Prior to initiating maintenance or diagnostic activities by personnel who do not have needed access authorizations, clearances or formal access approvals, all volatile information storage components within the information system are sanitized and all nonvolatile storage media are removed or physically disconnected from the system and secured; and"}]},{"id":"ma-5.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Develops and implements alternate security safeguards in the event an information system component cannot be sanitized, removed, or disconnected from the system."}]},{"id":"ma-5.1_gdn","name":"guidance","prose":"This control enhancement denies individuals who lack appropriate security clearances (i.e., individuals who do not possess security clearances or possess security clearances at a lower level than required) or who are not U.S. citizens, visual and electronic access to any classified information, Controlled Unclassified Information (CUI), or any other sensitive information contained on organizational information systems. Procedures for the use of maintenance personnel can be documented in security plans for the information systems.","links":[{"href":"#mp-6","rel":"related"},{"href":"#pl-2","rel":"related"}]},{"id":"ma-5.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-5.1.a_obj","name":"objective","props":[{"name":"label","value":"MA-5(1)(a)"}],"prose":"implements procedures for the use of maintenance personnel that lack appropriate security clearances or are not U.S. citizens, that include the following requirements:","parts":[{"id":"ma-5.1.a.1_obj","name":"objective","props":[{"name":"label","value":"MA-5(1)(a)(1)"}],"prose":"maintenance personnel who do not have needed access authorizations, clearances, or formal access approvals are escorted and supervised during the performance of maintenance and diagnostic activities on the information system by approved organizational personnel who:","parts":[{"id":"ma-5.1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"MA-5(1)(a)(1)[1]"}],"prose":"are fully cleared;"},{"id":"ma-5.1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"MA-5(1)(a)(1)[2]"}],"prose":"have appropriate access authorizations;"},{"id":"ma-5.1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"MA-5(1)(a)(1)[3]"}],"prose":"are technically qualified;"}],"links":[{"href":"#ma-5.1_smt.a.1","rel":"corresp"}]},{"id":"ma-5.1.a.2_obj","name":"objective","props":[{"name":"label","value":"MA-5(1)(a)(2)"}],"prose":"prior to initiating maintenance or diagnostic activities by personnel who do not have needed access authorizations, clearances, or formal access approvals:","parts":[{"id":"ma-5.1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"MA-5(1)(a)(2)[1]"}],"prose":"all volatile information storage components within the information system are sanitized; and"},{"id":"ma-5.1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"MA-5(1)(a)(2)[2]"}],"prose":"all nonvolatile storage media are removed; or"},{"id":"ma-5.1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"MA-5(1)(a)(2)[3]"}],"prose":"all nonvolatile storage media are physically disconnected from the system and secured; and"}],"links":[{"href":"#ma-5.1_smt.a.2","rel":"corresp"}]}],"links":[{"href":"#ma-5.1_smt.a","rel":"corresp"}]},{"id":"ma-5.1.b_obj","name":"objective","props":[{"name":"label","value":"MA-5(1)(b)"}],"prose":"develops and implements alternative security safeguards in the event an information system component cannot be sanitized, removed, or disconnected from the system.","links":[{"href":"#ma-5.1_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing maintenance personnel\n\ninformation system media protection policy\n\nphysical and environmental protection policy\n\nsecurity plan\n\nlist of maintenance personnel requiring escort\/supervision\n\nmaintenance records\n\naccess control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with personnel security responsibilities\n\norganizational personnel with physical access control responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel responsible for media sanitization\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing maintenance personnel without appropriate access\n\nautomated mechanisms supporting and\/or implementing alternative security safeguards\n\nautomated mechanisms supporting and\/or implementing information storage component sanitization"}]}]}]},{"id":"ma-6","class":"SP800-53","title":"Timely Maintenance","params":[{"id":"ma-6_prm_1","label":"organization-defined information system components"},{"id":"ma-6_prm_2","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-6"},{"name":"sort-id","value":"ma-06"}],"parts":[{"id":"ma-6_smt","name":"statement","prose":"The organization obtains maintenance support and\/or spare parts for {{ insert: param, ma-6_prm_1 }} within {{ insert: param, ma-6_prm_2 }} of failure."},{"id":"ma-6_gdn","name":"guidance","prose":"Organizations specify the information system components that result in increased risk to organizational operations and assets, individuals, other organizations, or the Nation when the functionality provided by those components is not operational. Organizational actions to obtain maintenance support typically include having appropriate contracts in place.","links":[{"href":"#cm-8","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#cp-7","rel":"related"},{"href":"#sa-14","rel":"related"},{"href":"#sa-15","rel":"related"}]},{"id":"ma-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-6_obj.1","name":"objective","props":[{"name":"label","value":"MA-6[1]"}],"prose":"defines information system components for which maintenance support and\/or spare parts are to be obtained;"},{"id":"ma-6_obj.2","name":"objective","props":[{"name":"label","value":"MA-6[2]"}],"prose":"defines the time period within which maintenance support and\/or spare parts are to be obtained after a failure;"},{"id":"ma-6_obj.3","name":"objective","props":[{"name":"label","value":"MA-6[3]"}],"parts":[{"id":"ma-6_obj.3.a","name":"objective","props":[{"name":"label","value":"MA-6[3][a]"}],"prose":"obtains maintenance support for organization-defined information system components within the organization-defined time period of failure; and\/or"},{"id":"ma-6_obj.3.b","name":"objective","props":[{"name":"label","value":"MA-6[3][b]"}],"prose":"obtains spare parts for organization-defined information system components within the organization-defined time period of failure."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing information system maintenance\n\nservice provider contracts\n\nservice-level agreements\n\ninventory and availability of spare parts\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for ensuring timely maintenance"}]}]}]},{"id":"mp","class":"family","title":"Media Protection","controls":[{"id":"mp-1","class":"SP800-53","title":"Media Protection Policy and Procedures","params":[{"id":"mp-1_prm_1","label":"organization-defined personnel or roles"},{"id":"mp-1_prm_2","label":"organization-defined frequency"},{"id":"mp-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-1"},{"name":"sort-id","value":"mp-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"mp-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, mp-1_prm_1 }}:","parts":[{"id":"mp-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A media protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"mp-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the media protection policy and associated media protection controls; and"}]},{"id":"mp-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"mp-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Media protection policy {{ insert: param, mp-1_prm_2 }}; and"},{"id":"mp-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Media protection procedures {{ insert: param, mp-1_prm_3 }}."}]}]},{"id":"mp-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the MP family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"mp-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-1.a_obj","name":"objective","props":[{"name":"label","value":"MP-1(a)"}],"parts":[{"id":"mp-1.a.1_obj","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)"}],"parts":[{"id":"mp-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1]"}],"prose":"develops and documents a media protection policy that addresses:","parts":[{"id":"mp-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"mp-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"mp-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"mp-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"mp-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"mp-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"mp-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"mp-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the media protection policy is to be disseminated;"},{"id":"mp-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[3]"}],"prose":"disseminates the media protection policy to organization-defined personnel or roles;"}]},{"id":"mp-1.a.2_obj","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)"}],"parts":[{"id":"mp-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the media protection policy and associated media protection controls;"},{"id":"mp-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"mp-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"mp-1.b_obj","name":"objective","props":[{"name":"label","value":"MP-1(b)"}],"parts":[{"id":"mp-1.b.1_obj","name":"objective","props":[{"name":"label","value":"MP-1(b)(1)"}],"parts":[{"id":"mp-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current media protection policy;"},{"id":"mp-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(b)(1)[2]"}],"prose":"reviews and updates the current media protection policy with the organization-defined frequency;"}]},{"id":"mp-1.b.2_obj","name":"objective","props":[{"name":"label","value":"MP-1(b)(2)"}],"parts":[{"id":"mp-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current media protection procedures; and"},{"id":"mp-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(b)(2)[2]"}],"prose":"reviews and updates the current media protection procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Media protection policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with media protection responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"mp-2","class":"SP800-53","title":"Media Access","params":[{"id":"mp-2_prm_1","label":"organization-defined types of digital and\/or non-digital media"},{"id":"mp-2_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-2"},{"name":"sort-id","value":"mp-02"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","rel":"reference"}],"parts":[{"id":"mp-2_smt","name":"statement","prose":"The organization restricts access to {{ insert: param, mp-2_prm_1 }} to {{ insert: param, mp-2_prm_2 }}."},{"id":"mp-2_gdn","name":"guidance","prose":"Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. Restricting non-digital media access includes, for example, denying access to patient medical records in a community hospital unless the individuals seeking access to such records are authorized healthcare providers. Restricting access to digital media includes, for example, limiting access to design specifications stored on compact disks in the media library to the project leader and the individuals on the development team.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pl-2","rel":"related"}]},{"id":"mp-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-2_obj.1","name":"objective","props":[{"name":"label","value":"MP-2[1]"}],"prose":"defines types of digital and\/or non-digital media requiring restricted access;"},{"id":"mp-2_obj.2","name":"objective","props":[{"name":"label","value":"MP-2[2]"}],"prose":"defines personnel or roles authorized to access organization-defined types of digital and\/or non-digital media; and"},{"id":"mp-2_obj.3","name":"objective","props":[{"name":"label","value":"MP-2[3]"}],"prose":"restricts access to organization-defined types of digital and\/or non-digital media to organization-defined personnel or roles."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media access restrictions\n\naccess control policy and procedures\n\nphysical and environmental protection policy and procedures\n\nmedia storage facilities\n\naccess control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media protection responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for restricting information media\n\nautomated mechanisms supporting and\/or implementing media access restrictions"}]}]},{"id":"mp-3","class":"SP800-53","title":"Media Marking","params":[{"id":"mp-3_prm_1","label":"organization-defined types of information system media"},{"id":"mp-3_prm_2","label":"organization-defined controlled areas"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"MP-3"},{"name":"sort-id","value":"mp-03"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"}],"parts":[{"id":"mp-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Marks information system media indicating the distribution limitations, handling caveats, and applicable security markings (if any) of the information; and"},{"id":"mp-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Exempts {{ insert: param, mp-3_prm_1 }} from marking as long as the media remain within {{ insert: param, mp-3_prm_2 }}."}]},{"id":"mp-3_gdn","name":"guidance","prose":"The term security marking refers to the application\/use of human-readable security attributes. The term security labeling refers to the application\/use of security attributes with regard to internal data structures within information systems (see AC-16). Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. Security marking is generally not required for media containing information determined by organizations to be in the public domain or to be publicly releasable. However, some organizations may require markings for public information indicating that the information is publicly releasable. Marking of information system media reflects applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.","links":[{"href":"#ac-16","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#ra-3","rel":"related"}]},{"id":"mp-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-3.a_obj","name":"objective","props":[{"name":"label","value":"MP-3(a)"}],"prose":"marks information system media indicating the:","parts":[{"id":"mp-3.a_obj.1","name":"objective","props":[{"name":"label","value":"MP-3(a)[1]"}],"prose":"distribution limitations of the information;"},{"id":"mp-3.a_obj.2","name":"objective","props":[{"name":"label","value":"MP-3(a)[2]"}],"prose":"handling caveats of the information;"},{"id":"mp-3.a_obj.3","name":"objective","props":[{"name":"label","value":"MP-3(a)[3]"}],"prose":"applicable security markings (if any) of the information;"}]},{"id":"mp-3.b_obj","name":"objective","props":[{"name":"label","value":"MP-3(b)"}],"parts":[{"id":"mp-3.b_obj.1","name":"objective","props":[{"name":"label","value":"MP-3(b)[1]"}],"prose":"defines types of information system media to be exempted from marking as long as the media remain in designated controlled areas;"},{"id":"mp-3.b_obj.2","name":"objective","props":[{"name":"label","value":"MP-3(b)[2]"}],"prose":"defines controlled areas where organization-defined types of information system media exempt from marking are to be retained; and"},{"id":"mp-3.b_obj.3","name":"objective","props":[{"name":"label","value":"MP-3(b)[3]"}],"prose":"exempts organization-defined types of information system media from marking as long as the media remain within organization-defined controlled areas."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media marking\n\nphysical and environmental protection policy and procedures\n\nsecurity plan\n\nlist of information system media marking security attributes\n\ndesignated controlled areas\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media protection and marking responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for marking information media\n\nautomated mechanisms supporting and\/or implementing media marking"}]}]},{"id":"mp-4","class":"SP800-53","title":"Media Storage","params":[{"id":"mp-4_prm_1","label":"organization-defined types of digital and\/or non-digital media"},{"id":"mp-4_prm_2","label":"organization-defined controlled areas"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-4"},{"name":"sort-id","value":"mp-04"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#81f09e01-d0b0-4ae2-aa6a-064ed9950070","rel":"reference"},{"href":"#a6c774c0-bf50-4590-9841-2a5c1c91ac6f","rel":"reference"},{"href":"#3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","rel":"reference"}],"parts":[{"id":"mp-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Physically controls and securely stores {{ insert: param, mp-4_prm_1 }} within {{ insert: param, mp-4_prm_2 }}; and"},{"id":"mp-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Protects information system media until the media are destroyed or sanitized using approved equipment, techniques, and procedures."}]},{"id":"mp-4_gdn","name":"guidance","prose":"Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. Physically controlling information system media includes, for example, conducting inventories, ensuring procedures are in place to allow individuals to check out and return media to the media library, and maintaining accountability for all stored media. Secure storage includes, for example, a locked drawer, desk, or cabinet, or a controlled media library. The type of media storage is commensurate with the security category and\/or classification of the information residing on the media. Controlled areas are areas for which organizations provide sufficient physical and procedural safeguards to meet the requirements established for protecting information and\/or information systems. For media containing information determined by organizations to be in the public domain, to be publicly releasable, or to have limited or no adverse impact on organizations or individuals if accessed by other than authorized personnel, fewer safeguards may be needed. In these situations, physical access controls provide adequate protection.","links":[{"href":"#cp-6","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-7","rel":"related"},{"href":"#pe-3","rel":"related"}]},{"id":"mp-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-4.a_obj","name":"objective","props":[{"name":"label","value":"MP-4(a)"}],"parts":[{"id":"mp-4.a_obj.1","name":"objective","props":[{"name":"label","value":"MP-4(a)[1]"}],"prose":"defines types of digital and\/or non-digital media to be physically controlled and securely stored within designated controlled areas;"},{"id":"mp-4.a_obj.2","name":"objective","props":[{"name":"label","value":"MP-4(a)[2]"}],"prose":"defines controlled areas designated to physically control and securely store organization-defined types of digital and\/or non-digital media;"},{"id":"mp-4.a_obj.3","name":"objective","props":[{"name":"label","value":"MP-4(a)[3]"}],"prose":"physically controls organization-defined types of digital and\/or non-digital media within organization-defined controlled areas;"},{"id":"mp-4.a_obj.4","name":"objective","props":[{"name":"label","value":"MP-4(a)[4]"}],"prose":"securely stores organization-defined types of digital and\/or non-digital media within organization-defined controlled areas; and"}]},{"id":"mp-4.b_obj","name":"objective","props":[{"name":"label","value":"MP-4(b)"}],"prose":"protects information system media until the media are destroyed or sanitized using approved equipment, techniques, and procedures."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media storage\n\nphysical and environmental protection policy and procedures\n\naccess control policy and procedures\n\nsecurity plan\n\ninformation system media\n\ndesignated controlled areas\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media protection and storage responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for storing information media\n\nautomated mechanisms supporting and\/or implementing secure media storage\/media protection"}]}]},{"id":"mp-5","class":"SP800-53","title":"Media Transport","params":[{"id":"mp-5_prm_1","label":"organization-defined types of information system media"},{"id":"mp-5_prm_2","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-5"},{"name":"sort-id","value":"mp-05"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"}],"parts":[{"id":"mp-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Protects and controls {{ insert: param, mp-5_prm_1 }} during transport outside of controlled areas using {{ insert: param, mp-5_prm_2 }};"},{"id":"mp-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Maintains accountability for information system media during transport outside of controlled areas;"},{"id":"mp-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Documents activities associated with the transport of information system media; and"},{"id":"mp-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Restricts the activities associated with the transport of information system media to authorized personnel."}]},{"id":"mp-5_gdn","name":"guidance","prose":"Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. This control also applies to mobile devices with information storage capability (e.g., smart phones, tablets, E-readers), that are transported outside of controlled areas. Controlled areas are areas or spaces for which organizations provide sufficient physical and\/or procedural safeguards to meet the requirements established for protecting information and\/or information systems. Physical and technical safeguards for media are commensurate with the security category or classification of the information residing on the media. Safeguards to protect media during transport include, for example, locked containers and cryptography. Cryptographic mechanisms can provide confidentiality and integrity protections depending upon the mechanisms used. Activities associated with transport include the actual transport as well as those activities such as releasing media for transport and ensuring that media enters the appropriate transport processes. For the actual transport, authorized transport and courier personnel may include individuals from outside the organization (e.g., U.S. Postal Service or a commercial transport or delivery service). Maintaining accountability of media during transport includes, for example, restricting transport activities to authorized personnel, and tracking and\/or obtaining explicit records of transport activities as the media moves through the transportation system to prevent and detect loss, destruction, or tampering. Organizations establish documentation requirements for activities associated with the transport of information system media in accordance with organizational assessments of risk to include the flexibility to define different record-keeping methods for the different types of media transport as part of an overall system of transport-related records.","links":[{"href":"#ac-19","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#mp-3","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-28","rel":"related"}]},{"id":"mp-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-5.a_obj","name":"objective","props":[{"name":"label","value":"MP-5(a)"}],"parts":[{"id":"mp-5.a_obj.1","name":"objective","props":[{"name":"label","value":"MP-5(a)[1]"}],"prose":"defines types of information system media to be protected and controlled during transport outside of controlled areas;"},{"id":"mp-5.a_obj.2","name":"objective","props":[{"name":"label","value":"MP-5(a)[2]"}],"prose":"defines security safeguards to protect and control organization-defined information system media during transport outside of controlled areas;"},{"id":"mp-5.a_obj.3","name":"objective","props":[{"name":"label","value":"MP-5(a)[3]"}],"prose":"protects and controls organization-defined information system media during transport outside of controlled areas using organization-defined security safeguards;"}]},{"id":"mp-5.b_obj","name":"objective","props":[{"name":"label","value":"MP-5(b)"}],"prose":"maintains accountability for information system media during transport outside of controlled areas;"},{"id":"mp-5.c_obj","name":"objective","props":[{"name":"label","value":"MP-5(c)"}],"prose":"documents activities associated with the transport of information system media; and"},{"id":"mp-5.d_obj","name":"objective","props":[{"name":"label","value":"MP-5(d)"}],"prose":"restricts the activities associated with transport of information system media to authorized personnel."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media storage\n\nphysical and environmental protection policy and procedures\n\naccess control policy and procedures\n\nsecurity plan\n\ninformation system media\n\ndesignated controlled areas\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media protection and storage responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for storing information media\n\nautomated mechanisms supporting and\/or implementing media storage\/media protection"}]}],"controls":[{"id":"mp-5.4","class":"SP800-53-enhancement","title":"Cryptographic Protection","props":[{"name":"label","value":"MP-5(4)"},{"name":"sort-id","value":"mp-05.04"}],"parts":[{"id":"mp-5.4_smt","name":"statement","prose":"The information system implements cryptographic mechanisms to protect the confidentiality and integrity of information stored on digital media during transport outside of controlled areas."},{"id":"mp-5.4_gdn","name":"guidance","prose":"This control enhancement applies to both portable storage devices (e.g., USB memory sticks, compact disks, digital video disks, external\/removable hard disk drives) and mobile devices with storage capability (e.g., smart phones, tablets, E-readers).","links":[{"href":"#mp-2","rel":"related"}]},{"id":"mp-5.4_obj","name":"objective","prose":"Determine if the organization employs cryptographic mechanisms to protect the confidentiality and integrity of information stored on digital media during transport outside of controlled areas."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media transport\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system media transport records\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media transport responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Cryptographic mechanisms protecting information on digital media during transportation outside controlled areas"}]}]}]},{"id":"mp-6","class":"SP800-53","title":"Media Sanitization","params":[{"id":"mp-6_prm_1","label":"organization-defined information system media"},{"id":"mp-6_prm_2","label":"organization-defined sanitization techniques and procedures"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-6"},{"name":"sort-id","value":"mp-06"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"},{"href":"#263823e0-a971-4b00-959d-315b26278b22","rel":"reference"},{"href":"#a47466c4-c837-4f06-a39f-e68412a5f73d","rel":"reference"}],"parts":[{"id":"mp-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Sanitizes {{ insert: param, mp-6_prm_1 }} prior to disposal, release out of organizational control, or release for reuse using {{ insert: param, mp-6_prm_2 }} in accordance with applicable federal and organizational standards and policies; and"},{"id":"mp-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Employs sanitization mechanisms with the strength and integrity commensurate with the security category or classification of the information."}]},{"id":"mp-6_gdn","name":"guidance","prose":"This control applies to all information system media, both digital and non-digital, subject to disposal or reuse, whether or not the media is considered removable. Examples include media found in scanners, copiers, printers, notebook computers, workstations, network components, and mobile devices. The sanitization process removes information from the media such that the information cannot be retrieved or reconstructed. Sanitization techniques, including clearing, purging, cryptographic erase, and destruction, prevent the disclosure of information to unauthorized individuals when such media is reused or released for disposal. Organizations determine the appropriate sanitization methods recognizing that destruction is sometimes necessary when other methods cannot be applied to media requiring sanitization. Organizations use discretion on the employment of approved sanitization techniques and procedures for media containing information deemed to be in the public domain or publicly releasable, or deemed to have no adverse impact on organizations or individuals if released for reuse or disposal. Sanitization of non-digital media includes, for example, removing a classified appendix from an otherwise unclassified document, or redacting selected sections or words from a document by obscuring the redacted sections\/words in a manner equivalent in effectiveness to removing them from the document. NSA standards and policies control the sanitization process for media containing classified information.","links":[{"href":"#ma-2","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-4","rel":"related"}]},{"id":"mp-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-6.a_obj","name":"objective","props":[{"name":"label","value":"MP-6(a)"}],"parts":[{"id":"mp-6.a_obj.1","name":"objective","props":[{"name":"label","value":"MP-6(a)[1]"}],"prose":"defines information system media to be sanitized prior to:","parts":[{"id":"mp-6.a_obj.1.a","name":"objective","props":[{"name":"label","value":"MP-6(a)[1][a]"}],"prose":"disposal;"},{"id":"mp-6.a_obj.1.b","name":"objective","props":[{"name":"label","value":"MP-6(a)[1][b]"}],"prose":"release out of organizational control; or"},{"id":"mp-6.a_obj.1.c","name":"objective","props":[{"name":"label","value":"MP-6(a)[1][c]"}],"prose":"release for reuse;"}]},{"id":"mp-6.a_obj.2","name":"objective","props":[{"name":"label","value":"MP-6(a)[2]"}],"prose":"defines sanitization techniques or procedures to be used for sanitizing organization-defined information system media prior to:","parts":[{"id":"mp-6.a_obj.2.a","name":"objective","props":[{"name":"label","value":"MP-6(a)[2][a]"}],"prose":"disposal;"},{"id":"mp-6.a_obj.2.b","name":"objective","props":[{"name":"label","value":"MP-6(a)[2][b]"}],"prose":"release out of organizational control; or"},{"id":"mp-6.a_obj.2.c","name":"objective","props":[{"name":"label","value":"MP-6(a)[2][c]"}],"prose":"release for reuse;"}]},{"id":"mp-6.a_obj.3","name":"objective","props":[{"name":"label","value":"MP-6(a)[3]"}],"prose":"sanitizes organization-defined information system media prior to disposal, release out of organizational control, or release for reuse using organization-defined sanitization techniques or procedures in accordance with applicable federal and organizational standards and policies; and"}]},{"id":"mp-6.b_obj","name":"objective","props":[{"name":"label","value":"MP-6(b)"}],"prose":"employs sanitization mechanisms with strength and integrity commensurate with the security category or classification of the information."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media sanitization and disposal\n\napplicable federal standards and policies addressing media sanitization\n\nmedia sanitization records\n\naudit records\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with media sanitization responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media sanitization\n\nautomated mechanisms supporting and\/or implementing media sanitization"}]}],"controls":[{"id":"mp-6.1","class":"SP800-53-enhancement","title":"Review \/ Approve \/ Track \/ Document \/ Verify","props":[{"name":"label","value":"MP-6(1)"},{"name":"sort-id","value":"mp-06.01"}],"parts":[{"id":"mp-6.1_smt","name":"statement","prose":"The organization reviews, approves, tracks, documents, and verifies media sanitization and disposal actions."},{"id":"mp-6.1_gdn","name":"guidance","prose":"Organizations review and approve media to be sanitized to ensure compliance with records-retention policies. Tracking\/documenting actions include, for example, listing personnel who reviewed and approved sanitization and disposal actions, types of media sanitized, specific files stored on the media, sanitization methods used, date and time of the sanitization actions, personnel who performed the sanitization, verification actions taken, personnel who performed the verification, and disposal action taken. Organizations verify that the sanitization of the media was effective prior to disposal.","links":[{"href":"#si-12","rel":"related"}]},{"id":"mp-6.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-6.1_obj.1","name":"objective","props":[{"name":"label","value":"MP-6(1)[1]"}],"prose":"reviews media sanitization and disposal actions;"},{"id":"mp-6.1_obj.2","name":"objective","props":[{"name":"label","value":"MP-6(1)[2]"}],"prose":"approves media sanitization and disposal actions;"},{"id":"mp-6.1_obj.3","name":"objective","props":[{"name":"label","value":"MP-6(1)[3]"}],"prose":"tracks media sanitization and disposal actions;"},{"id":"mp-6.1_obj.4","name":"objective","props":[{"name":"label","value":"MP-6(1)[4]"}],"prose":"documents media sanitization and disposal actions; and"},{"id":"mp-6.1_obj.5","name":"objective","props":[{"name":"label","value":"MP-6(1)[5]"}],"prose":"verifies media sanitization and disposal actions."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media sanitization and disposal\n\nmedia sanitization and disposal records\n\nreview records for media sanitization and disposal actions\n\napprovals for media sanitization and disposal actions\n\ntracking records\n\nverification records\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media sanitization and disposal responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media sanitization\n\nautomated mechanisms supporting and\/or implementing media sanitization"}]}]},{"id":"mp-6.2","class":"SP800-53-enhancement","title":"Equipment Testing","params":[{"id":"mp-6.2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"MP-6(2)"},{"name":"sort-id","value":"mp-06.02"}],"parts":[{"id":"mp-6.2_smt","name":"statement","prose":"The organization tests sanitization equipment and procedures {{ insert: param, mp-6.2_prm_1 }} to verify that the intended sanitization is being achieved."},{"id":"mp-6.2_gdn","name":"guidance","prose":"Testing of sanitization equipment and procedures may be conducted by qualified and authorized external entities (e.g., other federal agencies or external service providers)."},{"id":"mp-6.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-6.2_obj.1","name":"objective","props":[{"name":"label","value":"MP-6(2)[1]"}],"prose":"defines the frequency for testing sanitization equipment and procedures to verify that the intended sanitization is being achieved; and"},{"id":"mp-6.2_obj.2","name":"objective","props":[{"name":"label","value":"MP-6(2)[2]"}],"prose":"tests sanitization equipment and procedures with the organization-defined frequency to verify that the intended sanitization is being achieved."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media sanitization and disposal\n\nprocedures addressing testing of media sanitization equipment\n\nresults of media sanitization equipment and procedures testing\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media sanitization responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media sanitization\n\nautomated mechanisms supporting and\/or implementing media sanitization"}]}]},{"id":"mp-6.3","class":"SP800-53-enhancement","title":"Nondestructive Techniques","params":[{"id":"mp-6.3_prm_1","label":"organization-defined circumstances requiring sanitization of portable storage devices"}],"props":[{"name":"label","value":"MP-6(3)"},{"name":"sort-id","value":"mp-06.03"}],"parts":[{"id":"mp-6.3_smt","name":"statement","prose":"The organization applies nondestructive sanitization techniques to portable storage devices prior to connecting such devices to the information system under the following circumstances: {{ insert: param, mp-6.3_prm_1 }}."},{"id":"mp-6.3_gdn","name":"guidance","prose":"This control enhancement applies to digital media containing classified information and Controlled Unclassified Information (CUI). Portable storage devices can be the source of malicious code insertions into organizational information systems. Many of these devices are obtained from unknown and potentially untrustworthy sources and may contain malicious code that can be readily transferred to information systems through USB ports or other entry portals. While scanning such storage devices is always recommended, sanitization provides additional assurance that the devices are free of malicious code to include code capable of initiating zero-day attacks. Organizations consider nondestructive sanitization of portable storage devices when such devices are first purchased from the manufacturer or vendor prior to initial use or when organizations lose a positive chain of custody for the devices.","links":[{"href":"#si-3","rel":"related"}]},{"id":"mp-6.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-6.3_obj.1","name":"objective","props":[{"name":"label","value":"MP-6(3)[1]"}],"prose":"defines circumstances requiring sanitization of portable storage devices; and"},{"id":"mp-6.3_obj.2","name":"objective","props":[{"name":"label","value":"MP-6(3)[2]"}],"prose":"applies nondestructive sanitization techniques to portable storage devices prior to connecting such devices to the information system under organization-defined circumstances requiring sanitization of portable storage devices."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media sanitization and disposal\n\nlist of circumstances requiring sanitization of portable storage devices\n\nmedia sanitization records\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media sanitization responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media sanitization of portable storage devices\n\nautomated mechanisms supporting and\/or implementing media sanitization"}]}]}]},{"id":"mp-7","class":"SP800-53","title":"Media Use","params":[{"id":"mp-7_prm_1","select":{"choice":["restricts","prohibits"]}},{"id":"mp-7_prm_2","label":"organization-defined types of information system media"},{"id":"mp-7_prm_3","label":"organization-defined information systems or system components"},{"id":"mp-7_prm_4","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-7"},{"name":"sort-id","value":"mp-07"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","rel":"reference"}],"parts":[{"id":"mp-7_smt","name":"statement","prose":"The organization {{ insert: param, mp-7_prm_1 }} the use of {{ insert: param, mp-7_prm_2 }} on {{ insert: param, mp-7_prm_3 }} using {{ insert: param, mp-7_prm_4 }}."},{"id":"mp-7_gdn","name":"guidance","prose":"Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. This control also applies to mobile devices with information storage capability (e.g., smart phones, tablets, E-readers). In contrast to MP-2, which restricts user access to media, this control restricts the use of certain types of media on information systems, for example, restricting\/prohibiting the use of flash drives or external hard disk drives. Organizations can employ technical and nontechnical safeguards (e.g., policies, procedures, rules of behavior) to restrict the use of information system media. Organizations may restrict the use of portable storage devices, for example, by using physical cages on workstations to prohibit access to certain external ports, or disabling\/removing the ability to insert, read or write to such devices. Organizations may also limit the use of portable storage devices to only approved devices including, for example, devices provided by the organization, devices provided by other approved organizations, and devices that are not personally owned. Finally, organizations may restrict the use of portable storage devices based on the type of device, for example, prohibiting the use of writeable, portable storage devices, and implementing this restriction by disabling or removing the capability to write to such devices.","links":[{"href":"#ac-19","rel":"related"},{"href":"#pl-4","rel":"related"}]},{"id":"mp-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-7_obj.1","name":"objective","props":[{"name":"label","value":"MP-7[1]"}],"prose":"defines types of information system media to be:","parts":[{"id":"mp-7_obj.1.a","name":"objective","props":[{"name":"label","value":"MP-7[1][a]"}],"prose":"restricted on information systems or system components; or"},{"id":"mp-7_obj.1.b","name":"objective","props":[{"name":"label","value":"MP-7[1][b]"}],"prose":"prohibited from use on information systems or system components;"}]},{"id":"mp-7_obj.2","name":"objective","props":[{"name":"label","value":"MP-7[2]"}],"prose":"defines information systems or system components on which the use of organization-defined types of information system media is to be one of the following:","parts":[{"id":"mp-7_obj.2.a","name":"objective","props":[{"name":"label","value":"MP-7[2][a]"}],"prose":"restricted; or"},{"id":"mp-7_obj.2.b","name":"objective","props":[{"name":"label","value":"MP-7[2][b]"}],"prose":"prohibited;"}]},{"id":"mp-7_obj.3","name":"objective","props":[{"name":"label","value":"MP-7[3]"}],"prose":"defines security safeguards to be employed to restrict or prohibit the use of organization-defined types of information system media on organization-defined information systems or system components; and"},{"id":"mp-7_obj.4","name":"objective","props":[{"name":"label","value":"MP-7[4]"}],"prose":"restricts or prohibits the use of organization-defined information system media on organization-defined information systems or system components using organization-defined security safeguards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nsystem use policy\n\nprocedures addressing media usage restrictions\n\nsecurity plan\n\nrules of behavior\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media use responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media use\n\nautomated mechanisms restricting or prohibiting use of information system media on information systems or system components"}]}],"controls":[{"id":"mp-7.1","class":"SP800-53-enhancement","title":"Prohibit Use Without Owner","props":[{"name":"label","value":"MP-7(1)"},{"name":"sort-id","value":"mp-07.01"}],"parts":[{"id":"mp-7.1_smt","name":"statement","prose":"The organization prohibits the use of portable storage devices in organizational information systems when such devices have no identifiable owner."},{"id":"mp-7.1_gdn","name":"guidance","prose":"Requiring identifiable owners (e.g., individuals, organizations, or projects) for portable storage devices reduces the risk of using such technologies by allowing organizations to assign responsibility and accountability for addressing known vulnerabilities in the devices (e.g., malicious code insertion).","links":[{"href":"#pl-4","rel":"related"}]},{"id":"mp-7.1_obj","name":"objective","prose":"Determine if the organization prohibits the use of portable storage devices in organizational information systems when such devices have no identifiable owner."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nsystem use policy\n\nprocedures addressing media usage restrictions\n\nsecurity plan\n\nrules of behavior\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media use responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media use\n\nautomated mechanisms prohibiting use of media on information systems or system components"}]}]}]}]},{"id":"pe","class":"family","title":"Physical and Environmental Protection","controls":[{"id":"pe-1","class":"SP800-53","title":"Physical and Environmental Protection Policy and Procedures","params":[{"id":"pe-1_prm_1","label":"organization-defined personnel or roles"},{"id":"pe-1_prm_2","label":"organization-defined frequency"},{"id":"pe-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-1"},{"name":"sort-id","value":"pe-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"pe-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, pe-1_prm_1 }}:","parts":[{"id":"pe-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A physical and environmental protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"pe-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls; and"}]},{"id":"pe-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"pe-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Physical and environmental protection policy {{ insert: param, pe-1_prm_2 }}; and"},{"id":"pe-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Physical and environmental protection procedures {{ insert: param, pe-1_prm_3 }}."}]}]},{"id":"pe-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the PE family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"pe-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-1.a_obj","name":"objective","props":[{"name":"label","value":"PE-1(a)"}],"parts":[{"id":"pe-1.a.1_obj","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)"}],"parts":[{"id":"pe-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1]"}],"prose":"develops and documents a physical and environmental protection policy that addresses:","parts":[{"id":"pe-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"pe-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"pe-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"pe-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"pe-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"pe-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"pe-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"pe-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the physical and environmental protection policy is to be disseminated;"},{"id":"pe-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[3]"}],"prose":"disseminates the physical and environmental protection policy to organization-defined personnel or roles;"}]},{"id":"pe-1.a.2_obj","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)"}],"parts":[{"id":"pe-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls;"},{"id":"pe-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"pe-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"pe-1.b_obj","name":"objective","props":[{"name":"label","value":"PE-1(b)"}],"parts":[{"id":"pe-1.b.1_obj","name":"objective","props":[{"name":"label","value":"PE-1(b)(1)"}],"parts":[{"id":"pe-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current physical and environmental protection policy;"},{"id":"pe-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(b)(1)[2]"}],"prose":"reviews and updates the current physical and environmental protection policy with the organization-defined frequency;"}]},{"id":"pe-1.b.2_obj","name":"objective","props":[{"name":"label","value":"PE-1(b)(2)"}],"parts":[{"id":"pe-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current physical and environmental protection procedures; and"},{"id":"pe-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(b)(2)[2]"}],"prose":"reviews and updates the current physical and environmental protection procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical and environmental protection responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"pe-2","class":"SP800-53","title":"Physical Access Authorizations","params":[{"id":"pe-2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-2"},{"name":"sort-id","value":"pe-02"}],"parts":[{"id":"pe-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, approves, and maintains a list of individuals with authorized access to the facility where the information system resides;"},{"id":"pe-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Issues authorization credentials for facility access;"},{"id":"pe-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the access list detailing authorized facility access by individuals {{ insert: param, pe-2_prm_1 }}; and"},{"id":"pe-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Removes individuals from the facility access list when access is no longer required."}]},{"id":"pe-2_gdn","name":"guidance","prose":"This control applies to organizational employees and visitors. Individuals (e.g., employees, contractors, and others) with permanent physical access authorization credentials are not considered visitors. Authorization credentials include, for example, badges, identification cards, and smart cards. Organizations determine the strength of authorization credentials needed (including level of forge-proof badges, smart cards, or identification cards) consistent with federal standards, policies, and procedures. This control only applies to areas within facilities that have not been designated as publicly accessible.","links":[{"href":"#pe-3","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#ps-3","rel":"related"}]},{"id":"pe-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-2.a_obj","name":"objective","props":[{"name":"label","value":"PE-2(a)"}],"parts":[{"id":"pe-2.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-2(a)[1]"}],"prose":"develops a list of individuals with authorized access to the facility where the information system resides;"},{"id":"pe-2.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-2(a)[2]"}],"prose":"approves a list of individuals with authorized access to the facility where the information system resides;"},{"id":"pe-2.a_obj.3","name":"objective","props":[{"name":"label","value":"PE-2(a)[3]"}],"prose":"maintains a list of individuals with authorized access to the facility where the information system resides;"}]},{"id":"pe-2.b_obj","name":"objective","props":[{"name":"label","value":"PE-2(b)"}],"prose":"issues authorization credentials for facility access;"},{"id":"pe-2.c_obj","name":"objective","props":[{"name":"label","value":"PE-2(c)"}],"parts":[{"id":"pe-2.c_obj.1","name":"objective","props":[{"name":"label","value":"PE-2(c)[1]"}],"prose":"defines the frequency to review the access list detailing authorized facility access by individuals;"},{"id":"pe-2.c_obj.2","name":"objective","props":[{"name":"label","value":"PE-2(c)[2]"}],"prose":"reviews the access list detailing authorized facility access by individuals with the organization-defined frequency; and"}]},{"id":"pe-2.d_obj","name":"objective","props":[{"name":"label","value":"PE-2(d)"}],"prose":"removes individuals from the facility access list when access is no longer required."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access authorizations\n\nsecurity plan\n\nauthorized personnel access list\n\nauthorization credentials\n\nphysical access list reviews\n\nphysical access termination records and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access authorization responsibilities\n\norganizational personnel with physical access to information system facility\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for physical access authorizations\n\nautomated mechanisms supporting and\/or implementing physical access authorizations"}]}]},{"id":"pe-3","class":"SP800-53","title":"Physical Access Control","params":[{"id":"pe-3_prm_1","label":"organization-defined entry\/exit points to the facility where the information system resides"},{"id":"pe-3_prm_2","select":{"how-many":"one-or-more","choice":[" {{ insert: param, pe-3_prm_3 }} ","guards"]}},{"id":"pe-3_prm_3","depends-on":"pe-3_prm_2","label":"organization-defined physical access control systems\/devices"},{"id":"pe-3_prm_4","label":"organization-defined entry\/exit points"},{"id":"pe-3_prm_5","label":"organization-defined security safeguards"},{"id":"pe-3_prm_6","label":"organization-defined circumstances requiring visitor escorts and monitoring"},{"id":"pe-3_prm_7","label":"organization-defined physical access devices"},{"id":"pe-3_prm_8","label":"organization-defined frequency"},{"id":"pe-3_prm_9","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-3"},{"name":"sort-id","value":"pe-03"}],"links":[{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#2157bb7e-192c-4eaa-877f-93ef6b0a3292","rel":"reference"},{"href":"#6caa237b-531b-43ac-9711-d8f6b97b0377","rel":"reference"},{"href":"#398e33fd-f404-4e5c-b90e-2d50d3181244","rel":"reference"},{"href":"#61081e7f-041d-4033-96a7-44a439071683","rel":"reference"},{"href":"#dd2f5acd-08f1-435a-9837-f8203088dc1a","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"},{"href":"#5ed1f4d5-1494-421b-97ed-39d3c88ab51f","rel":"reference"}],"parts":[{"id":"pe-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Enforces physical access authorizations at {{ insert: param, pe-3_prm_1 }} by;","parts":[{"id":"pe-3_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Verifying individual access authorizations before granting access to the facility; and"},{"id":"pe-3_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Controlling ingress\/egress to the facility using {{ insert: param, pe-3_prm_2 }};"}]},{"id":"pe-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Maintains physical access audit logs for {{ insert: param, pe-3_prm_4 }};"},{"id":"pe-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Provides {{ insert: param, pe-3_prm_5 }} to control access to areas within the facility officially designated as publicly accessible;"},{"id":"pe-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Escorts visitors and monitors visitor activity {{ insert: param, pe-3_prm_6 }};"},{"id":"pe-3_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Secures keys, combinations, and other physical access devices;"},{"id":"pe-3_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Inventories {{ insert: param, pe-3_prm_7 }} every {{ insert: param, pe-3_prm_8 }}; and"},{"id":"pe-3_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Changes combinations and keys {{ insert: param, pe-3_prm_9 }} and\/or when keys are lost, combinations are compromised, or individuals are transferred or terminated."}]},{"id":"pe-3_gdn","name":"guidance","prose":"This control applies to organizational employees and visitors. Individuals (e.g., employees, contractors, and others) with permanent physical access authorization credentials are not considered visitors. Organizations determine the types of facility guards needed including, for example, professional physical security staff or other personnel such as administrative staff or information system users. Physical access devices include, for example, keys, locks, combinations, and card readers. Safeguards for publicly accessible areas within organizational facilities include, for example, cameras, monitoring by guards, and isolating selected information systems and\/or system components in secured areas. Physical access control systems comply with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. The Federal Identity, Credential, and Access Management Program provides implementation guidance for identity, credential, and access management capabilities for physical access control systems. Organizations have flexibility in the types of audit logs employed. Audit logs can be procedural (e.g., a written log of individuals accessing the facility and when such access occurred), automated (e.g., capturing ID provided by a PIV card), or some combination thereof. Physical access points can include facility access points, interior access points to information systems and\/or components requiring supplemental access controls, or both. Components of organizational information systems (e.g., workstations, terminals) may be located in areas designated as publicly accessible with organizations safeguarding access to such devices.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#pe-5","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ra-3","rel":"related"}]},{"id":"pe-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-3.a_obj","name":"objective","props":[{"name":"label","value":"PE-3(a)"}],"parts":[{"id":"pe-3.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(a)[1]"}],"prose":"defines entry\/exit points to the facility where the information system resides;"},{"id":"pe-3.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2]"}],"prose":"enforces physical access authorizations at organization-defined entry\/exit points to the facility where the information system resides by:","parts":[{"id":"pe-3.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](1)"}],"prose":"verifying individual access authorizations before granting access to the facility;"},{"id":"pe-3.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)"}],"parts":[{"id":"pe-3.a.2_obj.2.a","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[a]"}],"prose":"defining physical access control systems\/devices to be employed to control ingress\/egress to the facility where the information system resides;"},{"id":"pe-3.a.2_obj.2.b","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[b]"}],"prose":"using one or more of the following ways to control ingress\/egress to the facility:","parts":[{"id":"pe-3.a.2_obj.2.b.1","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[b][1]"}],"prose":"organization-defined physical access control systems\/devices; and\/or"},{"id":"pe-3.a.2_obj.2.b.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[b][2]"}],"prose":"guards;"}]}]}]}]},{"id":"pe-3.b_obj","name":"objective","props":[{"name":"label","value":"PE-3(b)"}],"parts":[{"id":"pe-3.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(b)[1]"}],"prose":"defines entry\/exit points for which physical access audit logs are to be maintained;"},{"id":"pe-3.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(b)[2]"}],"prose":"maintains physical access audit logs for organization-defined entry\/exit points;"}]},{"id":"pe-3.c_obj","name":"objective","props":[{"name":"label","value":"PE-3(c)"}],"parts":[{"id":"pe-3.c_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(c)[1]"}],"prose":"defines security safeguards to be employed to control access to areas within the facility officially designated as publicly accessible;"},{"id":"pe-3.c_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(c)[2]"}],"prose":"provides organization-defined security safeguards to control access to areas within the facility officially designated as publicly accessible;"}]},{"id":"pe-3.d_obj","name":"objective","props":[{"name":"label","value":"PE-3(d)"}],"parts":[{"id":"pe-3.d_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(d)[1]"}],"prose":"defines circumstances requiring visitor:","parts":[{"id":"pe-3.d_obj.1.a","name":"objective","props":[{"name":"label","value":"PE-3(d)[1][a]"}],"prose":"escorts;"},{"id":"pe-3.d_obj.1.b","name":"objective","props":[{"name":"label","value":"PE-3(d)[1][b]"}],"prose":"monitoring;"}]},{"id":"pe-3.d_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(d)[2]"}],"prose":"in accordance with organization-defined circumstances requiring visitor escorts and monitoring:","parts":[{"id":"pe-3.d_obj.2.a","name":"objective","props":[{"name":"label","value":"PE-3(d)[2][a]"}],"prose":"escorts visitors;"},{"id":"pe-3.d_obj.2.b","name":"objective","props":[{"name":"label","value":"PE-3(d)[2][b]"}],"prose":"monitors visitor activities;"}]}]},{"id":"pe-3.e_obj","name":"objective","props":[{"name":"label","value":"PE-3(e)"}],"parts":[{"id":"pe-3.e_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(e)[1]"}],"prose":"secures keys;"},{"id":"pe-3.e_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(e)[2]"}],"prose":"secures combinations;"},{"id":"pe-3.e_obj.3","name":"objective","props":[{"name":"label","value":"PE-3(e)[3]"}],"prose":"secures other physical access devices;"}]},{"id":"pe-3.f_obj","name":"objective","props":[{"name":"label","value":"PE-3(f)"}],"parts":[{"id":"pe-3.f_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(f)[1]"}],"prose":"defines physical access devices to be inventoried;"},{"id":"pe-3.f_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(f)[2]"}],"prose":"defines the frequency to inventory organization-defined physical access devices;"},{"id":"pe-3.f_obj.3","name":"objective","props":[{"name":"label","value":"PE-3(f)[3]"}],"prose":"inventories the organization-defined physical access devices with the organization-defined frequency;"}]},{"id":"pe-3.g_obj","name":"objective","props":[{"name":"label","value":"PE-3(g)"}],"parts":[{"id":"pe-3.g_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(g)[1]"}],"prose":"defines the frequency to change combinations and keys; and"},{"id":"pe-3.g_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(g)[2]"}],"prose":"changes combinations and keys with the organization-defined frequency and\/or when:","parts":[{"id":"pe-3.g_obj.2.a","name":"objective","props":[{"name":"label","value":"PE-3(g)[2][a]"}],"prose":"keys are lost;"},{"id":"pe-3.g_obj.2.b","name":"objective","props":[{"name":"label","value":"PE-3(g)[2][b]"}],"prose":"combinations are compromised;"},{"id":"pe-3.g_obj.2.c","name":"objective","props":[{"name":"label","value":"PE-3(g)[2][c]"}],"prose":"individuals are transferred or terminated."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access control\n\nsecurity plan\n\nphysical access control logs or records\n\ninventory records of physical access control devices\n\ninformation system entry and exit points\n\nrecords of key and lock combination changes\n\nstorage locations for physical access control devices\n\nphysical access control devices\n\nlist of security safeguards controlling access to designated publicly accessible areas within facility\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access control responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for physical access control\n\nautomated mechanisms supporting and\/or implementing physical access control\n\nphysical access control devices"}]}],"controls":[{"id":"pe-3.1","class":"SP800-53-enhancement","title":"Information System Access","params":[{"id":"pe-3.1_prm_1","label":"organization-defined physical spaces containing one or more components of the information system"}],"props":[{"name":"label","value":"PE-3(1)"},{"name":"sort-id","value":"pe-03.01"}],"parts":[{"id":"pe-3.1_smt","name":"statement","prose":"The organization enforces physical access authorizations to the information system in addition to the physical access controls for the facility at {{ insert: param, pe-3.1_prm_1 }}."},{"id":"pe-3.1_gdn","name":"guidance","prose":"This control enhancement provides additional physical security for those areas within facilities where there is a concentration of information system components (e.g., server rooms, media storage areas, data and communications centers).","links":[{"href":"#ps-2","rel":"related"}]},{"id":"pe-3.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-3.1_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(1)[1]"}],"prose":"defines physical spaces containing one or more components of the information system; and"},{"id":"pe-3.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(1)[2]"}],"prose":"enforces physical access authorizations to the information system in addition to the physical access controls for the facility at organization-defined physical spaces containing one or more components of the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access control\n\nphysical access control logs or records\n\nphysical access control devices\n\naccess authorizations\n\naccess credentials\n\ninformation system entry and exit points\n\nlist of areas within the facility containing concentrations of information system components or information system components requiring additional physical protection\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access authorization responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for physical access control to the information system\/components\n\nautomated mechanisms supporting and\/or implementing physical access control for facility areas containing information system components"}]}]}]},{"id":"pe-4","class":"SP800-53","title":"Access Control for Transmission Medium","params":[{"id":"pe-4_prm_1","label":"organization-defined information system distribution and transmission lines"},{"id":"pe-4_prm_2","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-4"},{"name":"sort-id","value":"pe-04"}],"links":[{"href":"#06dff0ea-3848-4945-8d91-e955ee69f05d","rel":"reference"}],"parts":[{"id":"pe-4_smt","name":"statement","prose":"The organization controls physical access to {{ insert: param, pe-4_prm_1 }} within organizational facilities using {{ insert: param, pe-4_prm_2 }}."},{"id":"pe-4_gdn","name":"guidance","prose":"Physical security safeguards applied to information system distribution and transmission lines help to prevent accidental damage, disruption, and physical tampering. In addition, physical safeguards may be necessary to help prevent eavesdropping or in transit modification of unencrypted transmissions. Security safeguards to control physical access to system distribution and transmission lines include, for example: (i) locked wiring closets; (ii) disconnected or locked spare jacks; and\/or (iii) protection of cabling by conduit or cable trays.","links":[{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-8","rel":"related"}]},{"id":"pe-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-4_obj.1","name":"objective","props":[{"name":"label","value":"PE-4[1]"}],"prose":"defines information system distribution and transmission lines requiring physical access controls;"},{"id":"pe-4_obj.2","name":"objective","props":[{"name":"label","value":"PE-4[2]"}],"prose":"defines security safeguards to be employed to control physical access to organization-defined information system distribution and transmission lines within organizational facilities; and"},{"id":"pe-4_obj.3","name":"objective","props":[{"name":"label","value":"PE-4[3]"}],"prose":"controls physical access to organization-defined information system distribution and transmission lines within organizational facilities using organization-defined security safeguards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing access control for transmission medium\n\ninformation system design documentation\n\nfacility communications and wiring diagrams\n\nlist of physical security safeguards applied to information system distribution and transmission lines\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access control responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for access control to distribution and transmission lines\n\nautomated mechanisms\/security safeguards supporting and\/or implementing access control to distribution and transmission lines"}]}]},{"id":"pe-5","class":"SP800-53","title":"Access Control for Output Devices","props":[{"name":"priority","value":"P2"},{"name":"label","value":"PE-5"},{"name":"sort-id","value":"pe-05"}],"parts":[{"id":"pe-5_smt","name":"statement","prose":"The organization controls physical access to information system output devices to prevent unauthorized individuals from obtaining the output."},{"id":"pe-5_gdn","name":"guidance","prose":"Controlling physical access to output devices includes, for example, placing output devices in locked rooms or other secured areas and allowing access to authorized individuals only, and placing output devices in locations that can be monitored by organizational personnel. Monitors, printers, copiers, scanners, facsimile machines, and audio devices are examples of information system output devices.","links":[{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#pe-18","rel":"related"}]},{"id":"pe-5_obj","name":"objective","prose":"Determine if the organization controls physical access to information system output devices to prevent unauthorized individuals from obtaining the output."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing access control for display medium\n\nfacility layout of information system components\n\nactual displays from information system components\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access control responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for access control to output devices\n\nautomated mechanisms supporting and\/or implementing access control to output devices"}]}]},{"id":"pe-6","class":"SP800-53","title":"Monitoring Physical Access","params":[{"id":"pe-6_prm_1","label":"organization-defined frequency"},{"id":"pe-6_prm_2","label":"organization-defined events or potential indications of events"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-6"},{"name":"sort-id","value":"pe-06"}],"parts":[{"id":"pe-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Monitors physical access to the facility where the information system resides to detect and respond to physical security incidents;"},{"id":"pe-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews physical access logs {{ insert: param, pe-6_prm_1 }} and upon occurrence of {{ insert: param, pe-6_prm_2 }}; and"},{"id":"pe-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Coordinates results of reviews and investigations with the organizational incident response capability."}]},{"id":"pe-6_gdn","name":"guidance","prose":"Organizational incident response capabilities include investigations of and responses to detected physical security incidents. Security incidents include, for example, apparent security violations or suspicious physical access activities. Suspicious physical access activities include, for example: (i) accesses outside of normal work hours; (ii) repeated accesses to areas not normally accessed; (iii) accesses for unusual lengths of time; and (iv) out-of-sequence accesses.","links":[{"href":"#ca-7","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"pe-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-6.a_obj","name":"objective","props":[{"name":"label","value":"PE-6(a)"}],"prose":"monitors physical access to the facility where the information system resides to detect and respond to physical security incidents;"},{"id":"pe-6.b_obj","name":"objective","props":[{"name":"label","value":"PE-6(b)"}],"parts":[{"id":"pe-6.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-6(b)[1]"}],"prose":"defines the frequency to review physical access logs;"},{"id":"pe-6.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-6(b)[2]"}],"prose":"defines events or potential indication of events requiring physical access logs to be reviewed;"},{"id":"pe-6.b_obj.3","name":"objective","props":[{"name":"label","value":"PE-6(b)[3]"}],"prose":"reviews physical access logs with the organization-defined frequency and upon occurrence of organization-defined events or potential indications of events; and"}]},{"id":"pe-6.c_obj","name":"objective","props":[{"name":"label","value":"PE-6(c)"}],"prose":"coordinates results of reviews and investigations with the organizational incident response capability."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access monitoring\n\nsecurity plan\n\nphysical access logs or records\n\nphysical access monitoring records\n\nphysical access log reviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access monitoring responsibilities\n\norganizational personnel with incident response responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring physical access\n\nautomated mechanisms supporting and\/or implementing physical access monitoring\n\nautomated mechanisms supporting and\/or implementing reviewing of physical access logs"}]}],"controls":[{"id":"pe-6.1","class":"SP800-53-enhancement","title":"Intrusion Alarms \/ Surveillance Equipment","props":[{"name":"label","value":"PE-6(1)"},{"name":"sort-id","value":"pe-06.01"}],"parts":[{"id":"pe-6.1_smt","name":"statement","prose":"The organization monitors physical intrusion alarms and surveillance equipment."},{"id":"pe-6.1_obj","name":"objective","prose":"Determine if the organization monitors physical intrusion alarms and surveillance equipment."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access monitoring\n\nsecurity plan\n\nphysical access logs or records\n\nphysical access monitoring records\n\nphysical access log reviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access monitoring responsibilities\n\norganizational personnel with incident response responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring physical intrusion alarms and surveillance equipment\n\nautomated mechanisms supporting and\/or implementing physical access monitoring\n\nautomated mechanisms supporting and\/or implementing physical intrusion alarms and surveillance equipment"}]}]},{"id":"pe-6.4","class":"SP800-53-enhancement","title":"Monitoring Physical Access to Information Systems","params":[{"id":"pe-6.4_prm_1","label":"organization-defined physical spaces containing one or more components of the information system"}],"props":[{"name":"label","value":"PE-6(4)"},{"name":"sort-id","value":"pe-06.04"}],"parts":[{"id":"pe-6.4_smt","name":"statement","prose":"The organization monitors physical access to the information system in addition to the physical access monitoring of the facility as {{ insert: param, pe-6.4_prm_1 }}."},{"id":"pe-6.4_gdn","name":"guidance","prose":"This control enhancement provides additional monitoring for those areas within facilities where there is a concentration of information system components (e.g., server rooms, media storage areas, communications centers).","links":[{"href":"#ps-2","rel":"related"},{"href":"#ps-3","rel":"related"}]},{"id":"pe-6.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-6.4_obj.1","name":"objective","props":[{"name":"label","value":"PE-6(4)[1]"}],"prose":"defines physical spaces containing one or more components of the information system; and"},{"id":"pe-6.4_obj.2","name":"objective","props":[{"name":"label","value":"PE-6(4)[2]"}],"prose":"monitors physical access to the information system in addition to the physical access monitoring of the facility at organization-defined physical spaces containing one or more components of the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access monitoring\n\nphysical access control logs or records\n\nphysical access control devices\n\naccess authorizations\n\naccess credentials\n\nlist of areas within the facility containing concentrations of information system components or information system components requiring additional physical access monitoring\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access monitoring responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring physical access to the information system\n\nautomated mechanisms supporting and\/or implementing physical access monitoring for facility areas containing information system components"}]}]}]},{"id":"pe-8","class":"SP800-53","title":"Visitor Access Records","params":[{"id":"pe-8_prm_1","label":"organization-defined time period"},{"id":"pe-8_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"PE-8"},{"name":"sort-id","value":"pe-08"}],"parts":[{"id":"pe-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Maintains visitor access records to the facility where the information system resides for {{ insert: param, pe-8_prm_1 }}; and"},{"id":"pe-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews visitor access records {{ insert: param, pe-8_prm_2 }}."}]},{"id":"pe-8_gdn","name":"guidance","prose":"Visitor access records include, for example, names and organizations of persons visiting, visitor signatures, forms of identification, dates of access, entry and departure times, purposes of visits, and names and organizations of persons visited. Visitor access records are not required for publicly accessible areas."},{"id":"pe-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-8.a_obj","name":"objective","props":[{"name":"label","value":"PE-8(a)"}],"parts":[{"id":"pe-8.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-8(a)[1]"}],"prose":"defines the time period to maintain visitor access records to the facility where the information system resides;"},{"id":"pe-8.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-8(a)[2]"}],"prose":"maintains visitor access records to the facility where the information system resides for the organization-defined time period;"}]},{"id":"pe-8.b_obj","name":"objective","props":[{"name":"label","value":"PE-8(b)"}],"parts":[{"id":"pe-8.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-8(b)[1]"}],"prose":"defines the frequency to review visitor access records; and"},{"id":"pe-8.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-8(b)[2]"}],"prose":"reviews visitor access records with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing visitor access records\n\nsecurity plan\n\nvisitor access control logs or records\n\nvisitor access record or log reviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with visitor access records responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for maintaining and reviewing visitor access records\n\nautomated mechanisms supporting and\/or implementing maintenance and review of visitor access records"}]}],"controls":[{"id":"pe-8.1","class":"SP800-53-enhancement","title":"Automated Records Maintenance \/ Review","props":[{"name":"label","value":"PE-8(1)"},{"name":"sort-id","value":"pe-08.01"}],"parts":[{"id":"pe-8.1_smt","name":"statement","prose":"The organization employs automated mechanisms to facilitate the maintenance and review of visitor access records."},{"id":"pe-8.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to facilitate the maintenance and review of visitor access records."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing visitor access records\n\nautomated mechanisms supporting management of visitor access records\n\nvisitor access control logs or records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with visitor access records responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for maintaining and reviewing visitor access records\n\nautomated mechanisms supporting and\/or implementing maintenance and review of visitor access records"}]}]}]},{"id":"pe-9","class":"SP800-53","title":"Power Equipment and Cabling","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-9"},{"name":"sort-id","value":"pe-09"}],"parts":[{"id":"pe-9_smt","name":"statement","prose":"The organization protects power equipment and power cabling for the information system from damage and destruction."},{"id":"pe-9_gdn","name":"guidance","prose":"Organizations determine the types of protection necessary for power equipment and cabling employed at different locations both internal and external to organizational facilities and environments of operation. This includes, for example, generators and power cabling outside of buildings, internal cabling and uninterruptable power sources within an office or data center, and power sources for self-contained entities such as vehicles and satellites.","links":[{"href":"#pe-4","rel":"related"}]},{"id":"pe-9_obj","name":"objective","prose":"Determine if the organization protects power equipment and power cabling for the information system from damage and destruction."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing power equipment\/cabling protection\n\nfacilities housing power equipment\/cabling\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for protecting power equipment\/cabling\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing protection of power equipment\/cabling"}]}]},{"id":"pe-10","class":"SP800-53","title":"Emergency Shutoff","params":[{"id":"pe-10_prm_1","label":"organization-defined location by information system or system component"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-10"},{"name":"sort-id","value":"pe-10"}],"parts":[{"id":"pe-10_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-10_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Provides the capability of shutting off power to the information system or individual system components in emergency situations;"},{"id":"pe-10_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Places emergency shutoff switches or devices in {{ insert: param, pe-10_prm_1 }} to facilitate safe and easy access for personnel; and"},{"id":"pe-10_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Protects emergency power shutoff capability from unauthorized activation."}]},{"id":"pe-10_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms.","links":[{"href":"#pe-15","rel":"related"}]},{"id":"pe-10_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-10.a_obj","name":"objective","props":[{"name":"label","value":"PE-10(a)"}],"prose":"provides the capability of shutting off power to the information system or individual system components in emergency situations;"},{"id":"pe-10.b_obj","name":"objective","props":[{"name":"label","value":"PE-10(b)"}],"parts":[{"id":"pe-10.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-10(b)[1]"}],"prose":"defines the location of emergency shutoff switches or devices by information system or system component;"},{"id":"pe-10.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-10(b)[2]"}],"prose":"places emergency shutoff switches or devices in the organization-defined location by information system or system component to facilitate safe and easy access for personnel; and"}]},{"id":"pe-10.c_obj","name":"objective","props":[{"name":"label","value":"PE-10(c)"}],"prose":"protects emergency power shutoff capability from unauthorized activation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing power source emergency shutoff\n\nsecurity plan\n\nemergency shutoff controls or switches\n\nlocations housing emergency shutoff switches and devices\n\nsecurity safeguards protecting emergency power shutoff capability from unauthorized activation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for emergency power shutoff capability (both implementing and using the capability)\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing emergency power shutoff"}]}]},{"id":"pe-11","class":"SP800-53","title":"Emergency Power","params":[{"id":"pe-11_prm_1","select":{"how-many":"one-or-more","choice":["an orderly shutdown of the information system","transition of the information system to long-term alternate power"]}}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-11"},{"name":"sort-id","value":"pe-11"}],"parts":[{"id":"pe-11_smt","name":"statement","prose":"The organization provides a short-term uninterruptible power supply to facilitate {{ insert: param, pe-11_prm_1 }} in the event of a primary power source loss."},{"id":"pe-11_gdn","name":"guidance","links":[{"href":"#at-3","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#cp-7","rel":"related"}]},{"id":"pe-11_obj","name":"objective","prose":"Determine if the organization provides a short-term uninterruptible power supply to facilitate one or more of the following in the event of a primary power source loss:","parts":[{"id":"pe-11_obj.1","name":"objective","props":[{"name":"label","value":"PE-11[1]"}],"prose":"an orderly shutdown of the information system; and\/or"},{"id":"pe-11_obj.2","name":"objective","props":[{"name":"label","value":"PE-11[2]"}],"prose":"transition of the information system to long-term alternate power."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing emergency power\n\nuninterruptible power supply\n\nuninterruptible power supply documentation\n\nuninterruptible power supply test records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for emergency power and\/or planning\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing uninterruptible power supply\n\nthe uninterruptable power supply"}]}],"controls":[{"id":"pe-11.1","class":"SP800-53-enhancement","title":"Long-term Alternate Power Supply - Minimal Operational Capability","props":[{"name":"label","value":"PE-11(1)"},{"name":"sort-id","value":"pe-11.01"}],"parts":[{"id":"pe-11.1_smt","name":"statement","prose":"The organization provides a long-term alternate power supply for the information system that is capable of maintaining minimally required operational capability in the event of an extended loss of the primary power source."},{"id":"pe-11.1_gdn","name":"guidance","prose":"This control enhancement can be satisfied, for example, by the use of a secondary commercial power supply or other external power supply. Long-term alternate power supplies for the information system can be either manually or automatically activated."},{"id":"pe-11.1_obj","name":"objective","prose":"Determine if the organization provides a long-term alternate power supply for the information system that is capable of maintaining minimally required operational capability in the event of an extended loss of the primary power source."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing emergency power\n\nalternate power supply\n\nalternate power supply documentation\n\nalternate power supply test records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for emergency power and\/or planning\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing alternate power supply\n\nthe alternate power supply"}]}]}]},{"id":"pe-12","class":"SP800-53","title":"Emergency Lighting","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-12"},{"name":"sort-id","value":"pe-12"}],"parts":[{"id":"pe-12_smt","name":"statement","prose":"The organization employs and maintains automatic emergency lighting for the information system that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility."},{"id":"pe-12_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-7","rel":"related"}]},{"id":"pe-12_obj","name":"objective","prose":"Determine if the organization employs and maintains automatic emergency lighting for the information system that:","parts":[{"id":"pe-12_obj.1","name":"objective","props":[{"name":"label","value":"PE-12[1]"}],"prose":"activates in the event of a power outage or disruption; and"},{"id":"pe-12_obj.2","name":"objective","props":[{"name":"label","value":"PE-12[2]"}],"prose":"covers emergency exits and evacuation routes within the facility."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing emergency lighting\n\nemergency lighting documentation\n\nemergency lighting test records\n\nemergency exits and evacuation routes\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for emergency lighting and\/or planning\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing emergency lighting capability"}]}]},{"id":"pe-13","class":"SP800-53","title":"Fire Protection","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-13"},{"name":"sort-id","value":"pe-13"}],"parts":[{"id":"pe-13_smt","name":"statement","prose":"The organization employs and maintains fire suppression and detection devices\/systems for the information system that are supported by an independent energy source."},{"id":"pe-13_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms. Fire suppression and detection devices\/systems include, for example, sprinkler systems, handheld fire extinguishers, fixed fire hoses, and smoke detectors."},{"id":"pe-13_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-13_obj.1","name":"objective","props":[{"name":"label","value":"PE-13[1]"}],"prose":"employs fire suppression and detection devices\/systems for the information system that are supported by an independent energy source; and"},{"id":"pe-13_obj.2","name":"objective","props":[{"name":"label","value":"PE-13[2]"}],"prose":"maintains fire suppression and detection devices\/systems for the information system that are supported by an independent energy source."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing fire protection\n\nfire suppression and detection devices\/systems\n\nfire suppression and detection devices\/systems documentation\n\ntest records of fire suppression and detection devices\/systems\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for fire detection and suppression devices\/systems\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing fire suppression\/detection devices\/systems"}]}],"controls":[{"id":"pe-13.1","class":"SP800-53-enhancement","title":"Detection Devices \/ Systems","params":[{"id":"pe-13.1_prm_1","label":"organization-defined personnel or roles"},{"id":"pe-13.1_prm_2","label":"organization-defined emergency responders"}],"props":[{"name":"label","value":"PE-13(1)"},{"name":"sort-id","value":"pe-13.01"}],"parts":[{"id":"pe-13.1_smt","name":"statement","prose":"The organization employs fire detection devices\/systems for the information system that activate automatically and notify {{ insert: param, pe-13.1_prm_1 }} and {{ insert: param, pe-13.1_prm_2 }} in the event of a fire."},{"id":"pe-13.1_gdn","name":"guidance","prose":"Organizations can identify specific personnel, roles, and emergency responders in the event that individuals on the notification list must have appropriate access authorizations and\/or clearances, for example, to obtain access to facilities where classified operations are taking place or where there are information systems containing classified information."},{"id":"pe-13.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-13.1_obj.1","name":"objective","props":[{"name":"label","value":"PE-13(1)[1]"}],"prose":"defines personnel or roles to be notified in the event of a fire;"},{"id":"pe-13.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-13(1)[2]"}],"prose":"defines emergency responders to be notified in the event of a fire;"},{"id":"pe-13.1_obj.3","name":"objective","props":[{"name":"label","value":"PE-13(1)[3]"}],"prose":"employs fire detection devices\/systems for the information system that, in the event of a fire,:","parts":[{"id":"pe-13.1_obj.3.a","name":"objective","props":[{"name":"label","value":"PE-13(1)[3][a]"}],"prose":"activate automatically;"},{"id":"pe-13.1_obj.3.b","name":"objective","props":[{"name":"label","value":"PE-13(1)[3][b]"}],"prose":"notify organization-defined personnel or roles; and"},{"id":"pe-13.1_obj.3.c","name":"objective","props":[{"name":"label","value":"PE-13(1)[3][c]"}],"prose":"notify organization-defined emergency responders."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing fire protection\n\nfacility housing the information system\n\nalarm service-level agreements\n\ntest records of fire suppression and detection devices\/systems\n\nfire suppression and detection devices\/systems documentation\n\nalerts\/notifications of fire events\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for fire detection and suppression devices\/systems\n\norganizational personnel with responsibilities for notifying appropriate personnel, roles, and emergency responders of fires\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing fire detection devices\/systems\n\nactivation of fire detection devices\/systems (simulated)\n\nautomated notifications"}]}]},{"id":"pe-13.2","class":"SP800-53-enhancement","title":"Suppression Devices \/ Systems","params":[{"id":"pe-13.2_prm_1","label":"organization-defined personnel or roles"},{"id":"pe-13.2_prm_2","label":"organization-defined emergency responders"}],"props":[{"name":"label","value":"PE-13(2)"},{"name":"sort-id","value":"pe-13.02"}],"parts":[{"id":"pe-13.2_smt","name":"statement","prose":"The organization employs fire suppression devices\/systems for the information system that provide automatic notification of any activation to {{ insert: param, pe-13.2_prm_1 }} and {{ insert: param, pe-13.2_prm_2 }}."},{"id":"pe-13.2_gdn","name":"guidance","prose":"Organizations can identify specific personnel, roles, and emergency responders in the event that individuals on the notification list must have appropriate access authorizations and\/or clearances, for example, to obtain access to facilities where classified operations are taking place or where there are information systems containing classified information."},{"id":"pe-13.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-13.2_obj.1","name":"objective","props":[{"name":"label","value":"PE-13(2)[1]"}],"prose":"defines personnel or roles to be provided automatic notification of any activation of fire suppression devices\/systems for the information system;"},{"id":"pe-13.2_obj.2","name":"objective","props":[{"name":"label","value":"PE-13(2)[2]"}],"prose":"defines emergency responders to be provided automatic notification of any activation of fire suppression devices\/systems for the information system;"},{"id":"pe-13.2_obj.3","name":"objective","props":[{"name":"label","value":"PE-13(2)[3]"}],"prose":"employs fire suppression devices\/systems for the information system that provide automatic notification of any activation to:","parts":[{"id":"pe-13.2_obj.3.a","name":"objective","props":[{"name":"label","value":"PE-13(2)[3][a]"}],"prose":"organization-defined personnel or roles; and"},{"id":"pe-13.2_obj.3.b","name":"objective","props":[{"name":"label","value":"PE-13(2)[3][b]"}],"prose":"organization-defined emergency responders."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing fire protection\n\nfire suppression and detection devices\/systems documentation\n\nfacility housing the information system\n\nalarm service-level agreements\n\ntest records of fire suppression and detection devices\/systems\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for fire detection and suppression devices\/systems\n\norganizational personnel with responsibilities for providing automatic notifications of any activation of fire suppression devices\/systems to appropriate personnel, roles, and emergency responders\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing fire suppression devices\/systems\n\nactivation of fire suppression devices\/systems (simulated)\n\nautomated notifications"}]}]},{"id":"pe-13.3","class":"SP800-53-enhancement","title":"Automatic Fire Suppression","props":[{"name":"label","value":"PE-13(3)"},{"name":"sort-id","value":"pe-13.03"}],"parts":[{"id":"pe-13.3_smt","name":"statement","prose":"The organization employs an automatic fire suppression capability for the information system when the facility is not staffed on a continuous basis."},{"id":"pe-13.3_obj","name":"objective","prose":"Determine if the organization employs an automatic fire suppression capability for the information system when the facility is not staffed on a continuous basis."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing fire protection\n\nfire suppression and detection devices\/systems documentation\n\nfacility housing the information system\n\nalarm service-level agreements\n\ntest records of fire suppression and detection devices\/systems\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for fire detection and suppression devices\/systems\n\norganizational personnel with responsibilities for providing automatic notifications of any activation of fire suppression devices\/systems to appropriate personnel, roles, and emergency responders\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing fire suppression devices\/systems\n\nactivation of fire suppression devices\/systems (simulated)"}]}]}]},{"id":"pe-14","class":"SP800-53","title":"Temperature and Humidity Controls","params":[{"id":"pe-14_prm_1","label":"organization-defined acceptable levels"},{"id":"pe-14_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-14"},{"name":"sort-id","value":"pe-14"}],"parts":[{"id":"pe-14_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-14_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Maintains temperature and humidity levels within the facility where the information system resides at {{ insert: param, pe-14_prm_1 }}; and"},{"id":"pe-14_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Monitors temperature and humidity levels {{ insert: param, pe-14_prm_2 }}."}]},{"id":"pe-14_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources, for example, data centers, server rooms, and mainframe computer rooms.","links":[{"href":"#at-3","rel":"related"}]},{"id":"pe-14_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-14.a_obj","name":"objective","props":[{"name":"label","value":"PE-14(a)"}],"parts":[{"id":"pe-14.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-14(a)[1]"}],"prose":"defines acceptable temperature levels to be maintained within the facility where the information system resides;"},{"id":"pe-14.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-14(a)[2]"}],"prose":"defines acceptable humidity levels to be maintained within the facility where the information system resides;"},{"id":"pe-14.a_obj.3","name":"objective","props":[{"name":"label","value":"PE-14(a)[3]"}],"prose":"maintains temperature levels within the facility where the information system resides at the organization-defined levels;"},{"id":"pe-14.a_obj.4","name":"objective","props":[{"name":"label","value":"PE-14(a)[4]"}],"prose":"maintains humidity levels within the facility where the information system resides at the organization-defined levels;"}]},{"id":"pe-14.b_obj","name":"objective","props":[{"name":"label","value":"PE-14(b)"}],"parts":[{"id":"pe-14.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-14(b)[1]"}],"prose":"defines the frequency to monitor temperature levels;"},{"id":"pe-14.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-14(b)[2]"}],"prose":"defines the frequency to monitor humidity levels;"},{"id":"pe-14.b_obj.3","name":"objective","props":[{"name":"label","value":"PE-14(b)[3]"}],"prose":"monitors temperature levels with the organization-defined frequency; and"},{"id":"pe-14.b_obj.4","name":"objective","props":[{"name":"label","value":"PE-14(b)[4]"}],"prose":"monitors humidity levels with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing temperature and humidity control\n\nsecurity plan\n\ntemperature and humidity controls\n\nfacility housing the information system\n\ntemperature and humidity controls documentation\n\ntemperature and humidity records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for information system environmental controls\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing maintenance and monitoring of temperature and humidity levels"}]}]},{"id":"pe-15","class":"SP800-53","title":"Water Damage Protection","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-15"},{"name":"sort-id","value":"pe-15"}],"parts":[{"id":"pe-15_smt","name":"statement","prose":"The organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are accessible, working properly, and known to key personnel."},{"id":"pe-15_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms. Isolation valves can be employed in addition to or in lieu of master shutoff valves to shut off water supplies in specific areas of concern, without affecting entire organizations.","links":[{"href":"#at-3","rel":"related"}]},{"id":"pe-15_obj","name":"objective","prose":"Determine if the organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are:","parts":[{"id":"pe-15_obj.1","name":"objective","props":[{"name":"label","value":"PE-15[1]"}],"prose":"accessible;"},{"id":"pe-15_obj.2","name":"objective","props":[{"name":"label","value":"PE-15[2]"}],"prose":"working properly; and"},{"id":"pe-15_obj.3","name":"objective","props":[{"name":"label","value":"PE-15[3]"}],"prose":"known to key personnel."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing water damage protection\n\nfacility housing the information system\n\nmaster shutoff valves\n\nlist of key personnel with knowledge of location and activation procedures for master shutoff valves for the plumbing system\n\nmaster shutoff valve documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for information system environmental controls\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Master water-shutoff valves\n\norganizational process for activating master water-shutoff"}]}],"controls":[{"id":"pe-15.1","class":"SP800-53-enhancement","title":"Automation Support","params":[{"id":"pe-15.1_prm_1","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"PE-15(1)"},{"name":"sort-id","value":"pe-15.01"}],"parts":[{"id":"pe-15.1_smt","name":"statement","prose":"The organization employs automated mechanisms to detect the presence of water in the vicinity of the information system and alerts {{ insert: param, pe-15.1_prm_1 }}."},{"id":"pe-15.1_gdn","name":"guidance","prose":"Automated mechanisms can include, for example, water detection sensors, alarms, and notification systems."},{"id":"pe-15.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-15.1_obj.1","name":"objective","props":[{"name":"label","value":"PE-15(1)[1]"}],"prose":"defines personnel or roles to be alerted when the presence of water is detected in the vicinity of the information system;"},{"id":"pe-15.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-15(1)[2]"}],"prose":"employs automated mechanisms to detect the presence of water in the vicinity of the information system; and"},{"id":"pe-15.1_obj.3","name":"objective","props":[{"name":"label","value":"PE-15(1)[3]"}],"prose":"alerts organization-defined personnel or roles when the presence of water is detected in the vicinity of the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing water damage protection\n\nfacility housing the information system\n\nautomated mechanisms for water shutoff valves\n\nautomated mechanisms detecting presence of water in vicinity of information system\n\nalerts\/notifications of water detection in information system facility\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for information system environmental controls\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing water detection capability and alerts for the information system"}]}]}]},{"id":"pe-16","class":"SP800-53","title":"Delivery and Removal","params":[{"id":"pe-16_prm_1","label":"organization-defined types of information system components"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PE-16"},{"name":"sort-id","value":"pe-16"}],"parts":[{"id":"pe-16_smt","name":"statement","prose":"The organization authorizes, monitors, and controls {{ insert: param, pe-16_prm_1 }} entering and exiting the facility and maintains records of those items."},{"id":"pe-16_gdn","name":"guidance","prose":"Effectively enforcing authorizations for entry and exit of information system components may require restricting access to delivery areas and possibly isolating the areas from the information system and media libraries.","links":[{"href":"#cm-3","rel":"related"},{"href":"#ma-2","rel":"related"},{"href":"#ma-3","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#sa-12","rel":"related"}]},{"id":"pe-16_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-16_obj.1","name":"objective","props":[{"name":"label","value":"PE-16[1]"}],"prose":"defines types of information system components to be authorized, monitored, and controlled as such components are entering and exiting the facility;"},{"id":"pe-16_obj.2","name":"objective","props":[{"name":"label","value":"PE-16[2]"}],"prose":"authorizes organization-defined information system components entering the facility;"},{"id":"pe-16_obj.3","name":"objective","props":[{"name":"label","value":"PE-16[3]"}],"prose":"monitors organization-defined information system components entering the facility;"},{"id":"pe-16_obj.4","name":"objective","props":[{"name":"label","value":"PE-16[4]"}],"prose":"controls organization-defined information system components entering the facility;"},{"id":"pe-16_obj.5","name":"objective","props":[{"name":"label","value":"PE-16[5]"}],"prose":"authorizes organization-defined information system components exiting the facility;"},{"id":"pe-16_obj.6","name":"objective","props":[{"name":"label","value":"PE-16[6]"}],"prose":"monitors organization-defined information system components exiting the facility;"},{"id":"pe-16_obj.7","name":"objective","props":[{"name":"label","value":"PE-16[7]"}],"prose":"controls organization-defined information system components exiting the facility;"},{"id":"pe-16_obj.8","name":"objective","props":[{"name":"label","value":"PE-16[8]"}],"prose":"maintains records of information system components entering the facility; and"},{"id":"pe-16_obj.9","name":"objective","props":[{"name":"label","value":"PE-16[9]"}],"prose":"maintains records of information system components exiting the facility."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing delivery and removal of information system components from the facility\n\nsecurity plan\n\nfacility housing the information system\n\nrecords of items entering and exiting the facility\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for controlling information system components entering and exiting the facility\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for authorizing, monitoring, and controlling information system-related items entering and exiting the facility\n\nautomated mechanisms supporting and\/or implementing authorizing, monitoring, and controlling information system-related items entering and exiting the facility"}]}]},{"id":"pe-17","class":"SP800-53","title":"Alternate Work Site","params":[{"id":"pe-17_prm_1","label":"organization-defined security controls"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PE-17"},{"name":"sort-id","value":"pe-17"}],"links":[{"href":"#5309d4d0-46f8-4213-a749-e7584164e5e8","rel":"reference"}],"parts":[{"id":"pe-17_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-17_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Employs {{ insert: param, pe-17_prm_1 }} at alternate work sites;"},{"id":"pe-17_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Assesses as feasible, the effectiveness of security controls at alternate work sites; and"},{"id":"pe-17_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Provides a means for employees to communicate with information security personnel in case of security incidents or problems."}]},{"id":"pe-17_gdn","name":"guidance","prose":"Alternate work sites may include, for example, government facilities or private residences of employees. While commonly distinct from alternative processing sites, alternate work sites may provide readily available alternate locations as part of contingency operations. Organizations may define different sets of security controls for specific alternate work sites or types of sites depending on the work-related activities conducted at those sites. This control supports the contingency planning activities of organizations and the federal telework initiative.","links":[{"href":"#ac-17","rel":"related"},{"href":"#cp-7","rel":"related"}]},{"id":"pe-17_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-17.a_obj","name":"objective","props":[{"name":"label","value":"PE-17(a)"}],"parts":[{"id":"pe-17.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-17(a)[1]"}],"prose":"defines security controls to be employed at alternate work sites;"},{"id":"pe-17.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-17(a)[2]"}],"prose":"employs organization-defined security controls at alternate work sites;"}]},{"id":"pe-17.b_obj","name":"objective","props":[{"name":"label","value":"PE-17(b)"}],"prose":"assesses, as feasible, the effectiveness of security controls at alternate work sites; and"},{"id":"pe-17.c_obj","name":"objective","props":[{"name":"label","value":"PE-17(c)"}],"prose":"provides a means for employees to communicate with information security personnel in case of security incidents or problems."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing alternate work sites for organizational personnel\n\nsecurity plan\n\nlist of security controls required for alternate work sites\n\nassessments of security controls at alternate work sites\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel approving use of alternate work sites\n\norganizational personnel using alternate work sites\n\norganizational personnel assessing controls at alternate work sites\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security at alternate work sites\n\nautomated mechanisms supporting alternate work sites\n\nsecurity controls employed at alternate work sites\n\nmeans of communications between personnel at alternate work sites and security personnel"}]}]},{"id":"pe-18","class":"SP800-53","title":"Location of Information System Components","params":[{"id":"pe-18_prm_1","label":"organization-defined physical and environmental hazards"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"PE-18"},{"name":"sort-id","value":"pe-18"}],"parts":[{"id":"pe-18_smt","name":"statement","prose":"The organization positions information system components within the facility to minimize potential damage from {{ insert: param, pe-18_prm_1 }} and to minimize the opportunity for unauthorized access."},{"id":"pe-18_gdn","name":"guidance","prose":"Physical and environmental hazards include, for example, flooding, fire, tornados, earthquakes, hurricanes, acts of terrorism, vandalism, electromagnetic pulse, electrical interference, and other forms of incoming electromagnetic radiation. In addition, organizations consider the location of physical entry points where unauthorized individuals, while not being granted access, might nonetheless be in close proximity to information systems and therefore increase the potential for unauthorized access to organizational communications (e.g., through the use of wireless sniffers or microphones).","links":[{"href":"#cp-2","rel":"related"},{"href":"#pe-19","rel":"related"},{"href":"#ra-3","rel":"related"}]},{"id":"pe-18_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-18_obj.1","name":"objective","props":[{"name":"label","value":"PE-18[1]"}],"prose":"defines physical hazards that could result in potential damage to information system components within the facility;"},{"id":"pe-18_obj.2","name":"objective","props":[{"name":"label","value":"PE-18[2]"}],"prose":"defines environmental hazards that could result in potential damage to information system components within the facility;"},{"id":"pe-18_obj.3","name":"objective","props":[{"name":"label","value":"PE-18[3]"}],"prose":"positions information system components within the facility to minimize potential damage from organization-defined physical and environmental hazards; and"},{"id":"pe-18_obj.4","name":"objective","props":[{"name":"label","value":"PE-18[4]"}],"prose":"positions information system components within the facility to minimize the opportunity for unauthorized access."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing positioning of information system components\n\ndocumentation providing the location and position of information system components within the facility\n\nlocations housing information system components within the facility\n\nlist of physical and environmental hazards with potential to damage information system components within the facility\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for positioning information system components\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for positioning information system components"}]}]}]},{"id":"pl","class":"family","title":"Planning","controls":[{"id":"pl-1","class":"SP800-53","title":"Security Planning Policy and Procedures","params":[{"id":"pl-1_prm_1","label":"organization-defined personnel or roles"},{"id":"pl-1_prm_2","label":"organization-defined frequency"},{"id":"pl-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PL-1"},{"name":"sort-id","value":"pl-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9c5c9e8c-dc81-4f55-a11c-d71d7487790f","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"pl-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, pl-1_prm_1 }}:","parts":[{"id":"pl-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A security planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"pl-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the security planning policy and associated security planning controls; and"}]},{"id":"pl-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"pl-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security planning policy {{ insert: param, pl-1_prm_2 }}; and"},{"id":"pl-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Security planning procedures {{ insert: param, pl-1_prm_3 }}."}]}]},{"id":"pl-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the PL family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"pl-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-1.a_obj","name":"objective","props":[{"name":"label","value":"PL-1(a)"}],"parts":[{"id":"pl-1.a.1_obj","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)"}],"parts":[{"id":"pl-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1]"}],"prose":"develops and documents a planning policy that addresses:","parts":[{"id":"pl-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"pl-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"pl-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"pl-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"pl-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"pl-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"pl-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"pl-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the planning policy is to be disseminated;"},{"id":"pl-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[3]"}],"prose":"disseminates the planning policy to organization-defined personnel or roles;"}]},{"id":"pl-1.a.2_obj","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)"}],"parts":[{"id":"pl-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the planning policy and associated planning controls;"},{"id":"pl-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"pl-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"pl-1.b_obj","name":"objective","props":[{"name":"label","value":"PL-1(b)"}],"parts":[{"id":"pl-1.b.1_obj","name":"objective","props":[{"name":"label","value":"PL-1(b)(1)"}],"parts":[{"id":"pl-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current planning policy;"},{"id":"pl-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(b)(1)[2]"}],"prose":"reviews and updates the current planning policy with the organization-defined frequency;"}]},{"id":"pl-1.b.2_obj","name":"objective","props":[{"name":"label","value":"PL-1(b)(2)"}],"parts":[{"id":"pl-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current planning procedures; and"},{"id":"pl-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(b)(2)[2]"}],"prose":"reviews and updates the current planning procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Planning policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with planning responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"pl-2","class":"SP800-53","title":"System Security Plan","params":[{"id":"pl-2_prm_1","label":"organization-defined personnel or roles"},{"id":"pl-2_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PL-2"},{"name":"sort-id","value":"pl-02"}],"links":[{"href":"#9c5c9e8c-dc81-4f55-a11c-d71d7487790f","rel":"reference"}],"parts":[{"id":"pl-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a security plan for the information system that:","parts":[{"id":"pl-2_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Is consistent with the organization’s enterprise architecture;"},{"id":"pl-2_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Explicitly defines the authorization boundary for the system;"},{"id":"pl-2_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Describes the operational context of the information system in terms of missions and business processes;"},{"id":"pl-2_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Provides the security categorization of the information system including supporting rationale;"},{"id":"pl-2_smt.a.5","name":"item","props":[{"name":"label","value":"5."}],"prose":"Describes the operational environment for the information system and relationships with or connections to other information systems;"},{"id":"pl-2_smt.a.6","name":"item","props":[{"name":"label","value":"6."}],"prose":"Provides an overview of the security requirements for the system;"},{"id":"pl-2_smt.a.7","name":"item","props":[{"name":"label","value":"7."}],"prose":"Identifies any relevant overlays, if applicable;"},{"id":"pl-2_smt.a.8","name":"item","props":[{"name":"label","value":"8."}],"prose":"Describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring decisions; and"},{"id":"pl-2_smt.a.9","name":"item","props":[{"name":"label","value":"9."}],"prose":"Is reviewed and approved by the authorizing official or designated representative prior to plan implementation;"}]},{"id":"pl-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Distributes copies of the security plan and communicates subsequent changes to the plan to {{ insert: param, pl-2_prm_1 }};"},{"id":"pl-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the security plan for the information system {{ insert: param, pl-2_prm_2 }};"},{"id":"pl-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Updates the plan to address changes to the information system\/environment of operation or problems identified during plan implementation or security control assessments; and"},{"id":"pl-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Protects the security plan from unauthorized disclosure and modification."}]},{"id":"pl-2_gdn","name":"guidance","prose":"Security plans relate security requirements to a set of security controls and control enhancements. Security plans also describe, at a high level, how the security controls and control enhancements meet those security requirements, but do not provide detailed, technical descriptions of the specific design or implementation of the controls\/enhancements. Security plans contain sufficient information (including the specification of parameter values for assignment and selection statements either explicitly or by reference) to enable a design and implementation that is unambiguously compliant with the intent of the plans and subsequent determinations of risk to organizational operations and assets, individuals, other organizations, and the Nation if the plan is implemented as intended. Organizations can also apply tailoring guidance to the security control baselines in Appendix D and CNSS Instruction 1253 to develop overlays for community-wide use or to address specialized requirements, technologies, or missions\/environments of operation (e.g., DoD-tactical, Federal Public Key Infrastructure, or Federal Identity, Credential, and Access Management, space operations). Appendix I provides guidance on developing overlays. Security plans need not be single documents; the plans can be a collection of various documents including documents that already exist. Effective security plans make extensive use of references to policies, procedures, and additional documents (e.g., design and implementation specifications) where more detailed information can be obtained. This reduces the documentation requirements associated with security programs and maintains security-related information in other established management\/operational areas related to enterprise architecture, system development life cycle, systems engineering, and acquisition. For example, security plans do not contain detailed contingency plan or incident response plan information but instead provide explicitly or by reference, sufficient information to define what needs to be accomplished by those plans.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ca-2","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#pl-7","rel":"related"},{"href":"#pm-1","rel":"related"},{"href":"#pm-7","rel":"related"},{"href":"#pm-8","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#pm-11","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-17","rel":"related"}]},{"id":"pl-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-2.a_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)"}],"prose":"develops a security plan for the information system that:","parts":[{"id":"pl-2.a.1_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(1)"}],"prose":"is consistent with the organization’s enterprise architecture;"},{"id":"pl-2.a.2_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(2)"}],"prose":"explicitly defines the authorization boundary for the system;"},{"id":"pl-2.a.3_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(3)"}],"prose":"describes the operational context of the information system in terms of missions and business processes;"},{"id":"pl-2.a.4_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(4)"}],"prose":"provides the security categorization of the information system including supporting rationale;"},{"id":"pl-2.a.5_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(5)"}],"prose":"describes the operational environment for the information system and relationships with or connections to other information systems;"},{"id":"pl-2.a.6_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(6)"}],"prose":"provides an overview of the security requirements for the system;"},{"id":"pl-2.a.7_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(7)"}],"prose":"identifies any relevant overlays, if applicable;"},{"id":"pl-2.a.8_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(8)"}],"prose":"describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring and supplemental decisions;"},{"id":"pl-2.a.9_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(9)"}],"prose":"is reviewed and approved by the authorizing official or designated representative prior to plan implementation;"}]},{"id":"pl-2.b_obj","name":"objective","props":[{"name":"label","value":"PL-2(b)"}],"parts":[{"id":"pl-2.b_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(b)[1]"}],"prose":"defines personnel or roles to whom copies of the security plan are to be distributed and subsequent changes to the plan are to be communicated;"},{"id":"pl-2.b_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(b)[2]"}],"prose":"distributes copies of the security plan and communicates subsequent changes to the plan to organization-defined personnel or roles;"}]},{"id":"pl-2.c_obj","name":"objective","props":[{"name":"label","value":"PL-2(c)"}],"parts":[{"id":"pl-2.c_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(c)[1]"}],"prose":"defines the frequency to review the security plan for the information system;"},{"id":"pl-2.c_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(c)[2]"}],"prose":"reviews the security plan for the information system with the organization-defined frequency;"}]},{"id":"pl-2.d_obj","name":"objective","props":[{"name":"label","value":"PL-2(d)"}],"prose":"updates the plan to address:","parts":[{"id":"pl-2.d_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(d)[1]"}],"prose":"changes to the information system\/environment of operation;"},{"id":"pl-2.d_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(d)[2]"}],"prose":"problems identified during plan implementation;"},{"id":"pl-2.d_obj.3","name":"objective","props":[{"name":"label","value":"PL-2(d)[3]"}],"prose":"problems identified during security control assessments;"}]},{"id":"pl-2.e_obj","name":"objective","props":[{"name":"label","value":"PL-2(e)"}],"prose":"protects the security plan from unauthorized:","parts":[{"id":"pl-2.e_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(e)[1]"}],"prose":"disclosure; and"},{"id":"pl-2.e_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(e)[2]"}],"prose":"modification."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\nprocedures addressing security plan development and implementation\n\nprocedures addressing security plan reviews and updates\n\nenterprise architecture documentation\n\nsecurity plan for the information system\n\nrecords of security plan reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security plan development\/review\/update\/approval\n\nautomated mechanisms supporting the information system security plan"}]}],"controls":[{"id":"pl-2.3","class":"SP800-53-enhancement","title":"Plan \/ Coordinate with Other Organizational Entities","params":[{"id":"pl-2.3_prm_1","label":"organization-defined individuals or groups"}],"props":[{"name":"label","value":"PL-2(3)"},{"name":"sort-id","value":"pl-02.03"}],"parts":[{"id":"pl-2.3_smt","name":"statement","prose":"The organization plans and coordinates security-related activities affecting the information system with {{ insert: param, pl-2.3_prm_1 }} before conducting such activities in order to reduce the impact on other organizational entities."},{"id":"pl-2.3_gdn","name":"guidance","prose":"Security-related activities include, for example, security assessments, audits, hardware and software maintenance, patch management, and contingency plan testing. Advance planning and coordination includes emergency and nonemergency (i.e., planned or nonurgent unplanned) situations. The process defined by organizations to plan and coordinate security-related activities can be included in security plans for information systems or other documents, as appropriate.","links":[{"href":"#cp-4","rel":"related"},{"href":"#ir-4","rel":"related"}]},{"id":"pl-2.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-2.3_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(3)[1]"}],"prose":"defines individuals or groups with whom security-related activities affecting the information system are to be planned and coordinated before conducting such activities in order to reduce the impact on other organizational entities; and"},{"id":"pl-2.3_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(3)[2]"}],"prose":"plans and coordinates security-related activities affecting the information system with organization-defined individuals or groups before conducting such activities in order to reduce the impact on other organizational entities."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\naccess control policy\n\ncontingency planning policy\n\nprocedures addressing security-related activity planning for the information system\n\nsecurity plan for the information system\n\ncontingency plan for the information system\n\ninformation system design documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security planning and plan implementation responsibilities\n\norganizational individuals or groups with whom security-related activities are to be planned and coordinated\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"pl-4","class":"SP800-53","title":"Rules of Behavior","params":[{"id":"pl-4_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PL-4"},{"name":"sort-id","value":"pl-04"}],"links":[{"href":"#9c5c9e8c-dc81-4f55-a11c-d71d7487790f","rel":"reference"}],"parts":[{"id":"pl-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes and makes readily available to individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;"},{"id":"pl-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Receives a signed acknowledgment from such individuals, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the information system;"},{"id":"pl-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews and updates the rules of behavior {{ insert: param, pl-4_prm_1 }}; and"},{"id":"pl-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Requires individuals who have signed a previous version of the rules of behavior to read and re-sign when the rules of behavior are revised\/updated."}]},{"id":"pl-4_gdn","name":"guidance","prose":"This control enhancement applies to organizational users. Organizations consider rules of behavior based on individual user roles and responsibilities, differentiating, for example, between rules that apply to privileged users and rules that apply to general users. Establishing rules of behavior for some types of non-organizational users including, for example, individuals who simply receive data\/information from federal information systems, is often not feasible given the large number of such users and the limited nature of their interactions with the systems. Rules of behavior for both organizational and non-organizational users can also be established in AC-8, System Use Notification. PL-4 b. (the signed acknowledgment portion of this control) may be satisfied by the security awareness training and role-based security training programs conducted by organizations if such training includes rules of behavior. Organizations can use electronic signatures for acknowledging rules of behavior.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-8","rel":"related"},{"href":"#ac-9","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#mp-7","rel":"related"},{"href":"#ps-6","rel":"related"},{"href":"#ps-8","rel":"related"},{"href":"#sa-5","rel":"related"}]},{"id":"pl-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-4.a_obj","name":"objective","props":[{"name":"label","value":"PL-4(a)"}],"parts":[{"id":"pl-4.a_obj.1","name":"objective","props":[{"name":"label","value":"PL-4(a)[1]"}],"prose":"establishes, for individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;"},{"id":"pl-4.a_obj.2","name":"objective","props":[{"name":"label","value":"PL-4(a)[2]"}],"prose":"makes readily available to individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;"}]},{"id":"pl-4.b_obj","name":"objective","props":[{"name":"label","value":"PL-4(b)"}],"prose":"receives a signed acknowledgement from such individuals, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the information system;"},{"id":"pl-4.c_obj","name":"objective","props":[{"name":"label","value":"PL-4(c)"}],"parts":[{"id":"pl-4.c_obj.1","name":"objective","props":[{"name":"label","value":"PL-4(c)[1]"}],"prose":"defines the frequency to review and update the rules of behavior;"},{"id":"pl-4.c_obj.2","name":"objective","props":[{"name":"label","value":"PL-4(c)[2]"}],"prose":"reviews and updates the rules of behavior with the organization-defined frequency; and"}]},{"id":"pl-4.d_obj","name":"objective","props":[{"name":"label","value":"PL-4(d)"}],"prose":"requires individuals who have signed a previous version of the rules of behavior to read and resign when the rules of behavior are revised\/updated."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\nprocedures addressing rules of behavior for information system users\n\nrules of behavior\n\nsigned acknowledgements\n\nrecords for rules of behavior reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for establishing, reviewing, and updating rules of behavior\n\norganizational personnel who are authorized users of the information system and have signed and resigned rules of behavior\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for establishing, reviewing, disseminating, and updating rules of behavior\n\nautomated mechanisms supporting and\/or implementing the establishment, review, dissemination, and update of rules of behavior"}]}],"controls":[{"id":"pl-4.1","class":"SP800-53-enhancement","title":"Social Media and Networking Restrictions","props":[{"name":"label","value":"PL-4(1)"},{"name":"sort-id","value":"pl-04.01"}],"parts":[{"id":"pl-4.1_smt","name":"statement","prose":"The organization includes in the rules of behavior, explicit restrictions on the use of social media\/networking sites and posting organizational information on public websites."},{"id":"pl-4.1_gdn","name":"guidance","prose":"This control enhancement addresses rules of behavior related to the use of social media\/networking sites: (i) when organizational personnel are using such sites for official duties or in the conduct of official business; (ii) when organizational information is involved in social media\/networking transactions; and (iii) when personnel are accessing social media\/networking sites from organizational information systems. Organizations also address specific rules that prevent unauthorized entities from obtaining and\/or inferring non-public organizational information (e.g., system account information, personally identifiable information) from social media\/networking sites."},{"id":"pl-4.1_obj","name":"objective","prose":"Determine if the organization includes the following in the rules of behavior:","parts":[{"id":"pl-4.1_obj.1","name":"objective","props":[{"name":"label","value":"PL-4(1)[1]"}],"prose":"explicit restrictions on the use of social media\/networking sites; and"},{"id":"pl-4.1_obj.2","name":"objective","props":[{"name":"label","value":"PL-4(1)[2]"}],"prose":"posting organizational information on public websites."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\nprocedures addressing rules of behavior for information system users\n\nrules of behavior\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for establishing, reviewing, and updating rules of behavior\n\norganizational personnel who are authorized users of the information system and have signed rules of behavior\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for establishing rules of behavior\n\nautomated mechanisms supporting and\/or implementing the establishment of rules of behavior"}]}]}]},{"id":"pl-8","class":"SP800-53","title":"Information Security Architecture","params":[{"id":"pl-8_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PL-8"},{"name":"sort-id","value":"pl-08"}],"parts":[{"id":"pl-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops an information security architecture for the information system that:","parts":[{"id":"pl-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Describes the overall philosophy, requirements, and approach to be taken with regard to protecting the confidentiality, integrity, and availability of organizational information;"},{"id":"pl-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Describes how the information security architecture is integrated into and supports the enterprise architecture; and"},{"id":"pl-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Describes any information security assumptions about, and dependencies on, external services;"}]},{"id":"pl-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the information security architecture {{ insert: param, pl-8_prm_1 }} to reflect updates in the enterprise architecture; and"},{"id":"pl-8_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensures that planned information security architecture changes are reflected in the security plan, the security Concept of Operations (CONOPS), and organizational procurements\/acquisitions."}]},{"id":"pl-8_gdn","name":"guidance","prose":"This control addresses actions taken by organizations in the design and development of information systems. The information security architecture at the individual information system level is consistent with and complements the more global, organization-wide information security architecture described in PM-7 that is integral to and developed as part of the enterprise architecture. The information security architecture includes an architectural description, the placement\/allocation of security functionality (including security controls), security-related information for external interfaces, information being exchanged across the interfaces, and the protection mechanisms associated with each interface. In addition, the security architecture can include other important security-related information, for example, user roles and access privileges assigned to each role, unique security requirements, the types of information processed, stored, and transmitted by the information system, restoration priorities of information and information system services, and any other specific protection needs. In today’s modern architecture, it is becoming less common for organizations to control all information resources. There are going to be key dependencies on external information services and service providers. Describing such dependencies in the information security architecture is important to developing a comprehensive mission\/business protection strategy. Establishing, developing, documenting, and maintaining under configuration control, a baseline configuration for organizational information systems is critical to implementing and maintaining an effective information security architecture. The development of the information security architecture is coordinated with the Senior Agency Official for Privacy (SAOP)\/Chief Privacy Officer (CPO) to ensure that security controls needed to support privacy requirements are identified and effectively implemented. PL-8 is primarily directed at organizations (i.e., internally focused) to help ensure that organizations develop an information security architecture for the information system, and that the security architecture is integrated with or tightly coupled to the enterprise architecture through the organization-wide information security architecture. In contrast, SA-17 is primarily directed at external information technology product\/system developers and integrators (although SA-17 could be used internally within organizations for in-house system development). SA-17, which is complementary to PL-8, is selected when organizations outsource the development of information systems or information system components to external entities, and there is a need to demonstrate\/show consistency with the organization’s enterprise architecture and information security architecture.","links":[{"href":"#cm-2","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#pm-7","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-17","rel":"related"},{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-53r4","rel":"related"}]},{"id":"pl-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-8.a_obj","name":"objective","props":[{"name":"label","value":"PL-8(a)"}],"prose":"develops an information security architecture for the information system that describes:","parts":[{"id":"pl-8.a.1_obj","name":"objective","props":[{"name":"label","value":"PL-8(a)(1)"}],"prose":"the overall philosophy, requirements, and approach to be taken with regard to protecting the confidentiality, integrity, and availability of organizational information;"},{"id":"pl-8.a.2_obj","name":"objective","props":[{"name":"label","value":"PL-8(a)(2)"}],"prose":"how the information security architecture is integrated into and supports the enterprise architecture;"},{"id":"pl-8.a.3_obj","name":"objective","props":[{"name":"label","value":"PL-8(a)(3)"}],"prose":"any information security assumptions about, and dependencies on, external services;"}]},{"id":"pl-8.b_obj","name":"objective","props":[{"name":"label","value":"PL-8(b)"}],"parts":[{"id":"pl-8.b_obj.1","name":"objective","props":[{"name":"label","value":"PL-8(b)[1]"}],"prose":"defines the frequency to review and update the information security architecture;"},{"id":"pl-8.b_obj.2","name":"objective","props":[{"name":"label","value":"PL-8(b)[2]"}],"prose":"reviews and updates the information security architecture with the organization-defined frequency to reflect updates in the enterprise architecture;"}]},{"id":"pl-8.c_obj","name":"objective","props":[{"name":"label","value":"PL-8(c)"}],"prose":"ensures that planned information security architecture changes are reflected in:","parts":[{"id":"pl-8.c_obj.1","name":"objective","props":[{"name":"label","value":"PL-8(c)[1]"}],"prose":"the security plan;"},{"id":"pl-8.c_obj.2","name":"objective","props":[{"name":"label","value":"PL-8(c)[2]"}],"prose":"the security Concept of Operations (CONOPS); and"},{"id":"pl-8.c_obj.3","name":"objective","props":[{"name":"label","value":"PL-8(c)[3]"}],"prose":"the organizational procurements\/acquisitions."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\nprocedures addressing information security architecture development\n\nprocedures addressing information security architecture reviews and updates\n\nenterprise architecture documentation\n\ninformation security architecture documentation\n\nsecurity plan for the information system\n\nsecurity CONOPS for the information system\n\nrecords of information security architecture reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security planning and plan implementation responsibilities\n\norganizational personnel with information security architecture development responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for developing, reviewing, and updating the information security architecture\n\nautomated mechanisms supporting and\/or implementing the development, review, and update of the information security architecture"}]}]}]},{"id":"ps","class":"family","title":"Personnel Security","controls":[{"id":"ps-1","class":"SP800-53","title":"Personnel Security Policy and Procedures","params":[{"id":"ps-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ps-1_prm_2","label":"organization-defined frequency"},{"id":"ps-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-1"},{"name":"sort-id","value":"ps-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ps-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ps-1_prm_1 }}:","parts":[{"id":"ps-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A personnel security policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ps-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the personnel security policy and associated personnel security controls; and"}]},{"id":"ps-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ps-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Personnel security policy {{ insert: param, ps-1_prm_2 }}; and"},{"id":"ps-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Personnel security procedures {{ insert: param, ps-1_prm_3 }}."}]}]},{"id":"ps-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the PS family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ps-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-1.a_obj","name":"objective","props":[{"name":"label","value":"PS-1(a)"}],"parts":[{"id":"ps-1.a.1_obj","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)"}],"parts":[{"id":"ps-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1]"}],"prose":"develops and documents an personnel security policy that addresses:","parts":[{"id":"ps-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ps-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ps-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ps-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ps-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ps-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ps-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ps-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the personnel security policy is to be disseminated;"},{"id":"ps-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[3]"}],"prose":"disseminates the personnel security policy to organization-defined personnel or roles;"}]},{"id":"ps-1.a.2_obj","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)"}],"parts":[{"id":"ps-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the personnel security policy and associated personnel security controls;"},{"id":"ps-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ps-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ps-1.b_obj","name":"objective","props":[{"name":"label","value":"PS-1(b)"}],"parts":[{"id":"ps-1.b.1_obj","name":"objective","props":[{"name":"label","value":"PS-1(b)(1)"}],"parts":[{"id":"ps-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current personnel security policy;"},{"id":"ps-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(b)(1)[2]"}],"prose":"reviews and updates the current personnel security policy with the organization-defined frequency;"}]},{"id":"ps-1.b.2_obj","name":"objective","props":[{"name":"label","value":"PS-1(b)(2)"}],"parts":[{"id":"ps-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current personnel security procedures; and"},{"id":"ps-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(b)(2)[2]"}],"prose":"reviews and updates the current personnel security procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access control responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ps-2","class":"SP800-53","title":"Position Risk Designation","params":[{"id":"ps-2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-2"},{"name":"sort-id","value":"ps-02"}],"links":[{"href":"#0c97e60b-325a-4efa-ba2b-90f20ccd5abc","rel":"reference"}],"parts":[{"id":"ps-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Assigns a risk designation to all organizational positions;"},{"id":"ps-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishes screening criteria for individuals filling those positions; and"},{"id":"ps-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews and updates position risk designations {{ insert: param, ps-2_prm_1 }}."}]},{"id":"ps-2_gdn","name":"guidance","prose":"Position risk designations reflect Office of Personnel Management policy and guidance. Risk designations can guide and inform the types of authorizations individuals receive when accessing organizational information and information systems. Position screening criteria include explicit information security role appointment requirements (e.g., training, security clearances).","links":[{"href":"#at-3","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#ps-3","rel":"related"}]},{"id":"ps-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-2.a_obj","name":"objective","props":[{"name":"label","value":"PS-2(a)"}],"prose":"assigns a risk designation to all organizational positions;"},{"id":"ps-2.b_obj","name":"objective","props":[{"name":"label","value":"PS-2(b)"}],"prose":"establishes screening criteria for individuals filling those positions;"},{"id":"ps-2.c_obj","name":"objective","props":[{"name":"label","value":"PS-2(c)"}],"parts":[{"id":"ps-2.c_obj.1","name":"objective","props":[{"name":"label","value":"PS-2(c)[1]"}],"prose":"defines the frequency to review and update position risk designations; and"},{"id":"ps-2.c_obj.2","name":"objective","props":[{"name":"label","value":"PS-2(c)[2]"}],"prose":"reviews and updates position risk designations with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing position categorization\n\nappropriate codes of federal regulations\n\nlist of risk designations for organizational positions\n\nsecurity plan\n\nrecords of position risk designation reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for assigning, reviewing, and updating position risk designations\n\norganizational processes for establishing screening criteria"}]}]},{"id":"ps-3","class":"SP800-53","title":"Personnel Screening","params":[{"id":"ps-3_prm_1","label":"organization-defined conditions requiring rescreening and, where rescreening is so indicated, the frequency of such rescreening"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-3"},{"name":"sort-id","value":"ps-03"}],"links":[{"href":"#0c97e60b-325a-4efa-ba2b-90f20ccd5abc","rel":"reference"},{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#6caa237b-531b-43ac-9711-d8f6b97b0377","rel":"reference"}],"parts":[{"id":"ps-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Screens individuals prior to authorizing access to the information system; and"},{"id":"ps-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Rescreens individuals according to {{ insert: param, ps-3_prm_1 }}."}]},{"id":"ps-3_gdn","name":"guidance","prose":"Personnel screening and rescreening activities reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, guidance, and specific criteria established for the risk designations of assigned positions. Organizations may define different rescreening conditions and frequencies for personnel accessing information systems based on types of information processed, stored, or transmitted by the systems.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#ps-2","rel":"related"}]},{"id":"ps-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-3.a_obj","name":"objective","props":[{"name":"label","value":"PS-3(a)"}],"prose":"screens individuals prior to authorizing access to the information system;"},{"id":"ps-3.b_obj","name":"objective","props":[{"name":"label","value":"PS-3(b)"}],"parts":[{"id":"ps-3.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-3(b)[1]"}],"prose":"defines conditions requiring re-screening;"},{"id":"ps-3.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-3(b)[2]"}],"prose":"defines the frequency of re-screening where it is so indicated; and"},{"id":"ps-3.b_obj.3","name":"objective","props":[{"name":"label","value":"PS-3(b)[3]"}],"prose":"re-screens individuals in accordance with organization-defined conditions requiring re-screening and, where re-screening is so indicated, with the organization-defined frequency of such re-screening."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel screening\n\nrecords of screened personnel\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for personnel screening"}]}]},{"id":"ps-4","class":"SP800-53","title":"Personnel Termination","params":[{"id":"ps-4_prm_1","label":"organization-defined time period"},{"id":"ps-4_prm_2","label":"organization-defined information security topics"},{"id":"ps-4_prm_3","label":"organization-defined personnel or roles"},{"id":"ps-4_prm_4","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-4"},{"name":"sort-id","value":"ps-04"}],"parts":[{"id":"ps-4_smt","name":"statement","prose":"The organization, upon termination of individual employment:","parts":[{"id":"ps-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Disables information system access within {{ insert: param, ps-4_prm_1 }};"},{"id":"ps-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Terminates\/revokes any authenticators\/credentials associated with the individual;"},{"id":"ps-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Conducts exit interviews that include a discussion of {{ insert: param, ps-4_prm_2 }};"},{"id":"ps-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Retrieves all security-related organizational information system-related property;"},{"id":"ps-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Retains access to organizational information and information systems formerly controlled by terminated individual; and"},{"id":"ps-4_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Notifies {{ insert: param, ps-4_prm_3 }} within {{ insert: param, ps-4_prm_4 }}."}]},{"id":"ps-4_gdn","name":"guidance","prose":"Information system-related property includes, for example, hardware authentication tokens, system administration technical manuals, keys, identification cards, and building passes. Exit interviews ensure that terminated individuals understand the security constraints imposed by being former employees and that proper accountability is achieved for information system-related property. Security topics of interest at exit interviews can include, for example, reminding terminated individuals of nondisclosure agreements and potential limitations on future employment. Exit interviews may not be possible for some terminated individuals, for example, in cases related to job abandonment, illnesses, and nonavailability of supervisors. Exit interviews are important for individuals with security clearances. Timely execution of termination actions is essential for individuals terminated for cause. In certain situations, organizations consider disabling the information system accounts of individuals that are being terminated prior to the individuals being notified.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#ps-5","rel":"related"},{"href":"#ps-6","rel":"related"}]},{"id":"ps-4_obj","name":"objective","prose":"Determine if the organization, upon termination of individual employment,:","parts":[{"id":"ps-4.a_obj","name":"objective","props":[{"name":"label","value":"PS-4(a)"}],"parts":[{"id":"ps-4.a_obj.1","name":"objective","props":[{"name":"label","value":"PS-4(a)[1]"}],"prose":"defines a time period within which to disable information system access;"},{"id":"ps-4.a_obj.2","name":"objective","props":[{"name":"label","value":"PS-4(a)[2]"}],"prose":"disables information system access within the organization-defined time period;"}]},{"id":"ps-4.b_obj","name":"objective","props":[{"name":"label","value":"PS-4(b)"}],"prose":"terminates\/revokes any authenticators\/credentials associated with the individual;"},{"id":"ps-4.c_obj","name":"objective","props":[{"name":"label","value":"PS-4(c)"}],"parts":[{"id":"ps-4.c_obj.1","name":"objective","props":[{"name":"label","value":"PS-4(c)[1]"}],"prose":"defines information security topics to be discussed when conducting exit interviews;"},{"id":"ps-4.c_obj.2","name":"objective","props":[{"name":"label","value":"PS-4(c)[2]"}],"prose":"conducts exit interviews that include a discussion of organization-defined information security topics;"}]},{"id":"ps-4.d_obj","name":"objective","props":[{"name":"label","value":"PS-4(d)"}],"prose":"retrieves all security-related organizational information system-related property;"},{"id":"ps-4.e_obj","name":"objective","props":[{"name":"label","value":"PS-4(e)"}],"prose":"retains access to organizational information and information systems formerly controlled by the terminated individual;"},{"id":"ps-4.f_obj","name":"objective","props":[{"name":"label","value":"PS-4(f)"}],"parts":[{"id":"ps-4.f_obj.1","name":"objective","props":[{"name":"label","value":"PS-4(f)[1]"}],"prose":"defines personnel or roles to be notified of the termination;"},{"id":"ps-4.f_obj.2","name":"objective","props":[{"name":"label","value":"PS-4(f)[2]"}],"prose":"defines the time period within which to notify organization-defined personnel or roles; and"},{"id":"ps-4.f_obj.3","name":"objective","props":[{"name":"label","value":"PS-4(f)[3]"}],"prose":"notifies organization-defined personnel or roles within the organization-defined time period."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel termination\n\nrecords of personnel termination actions\n\nlist of information system accounts\n\nrecords of terminated or revoked authenticators\/credentials\n\nrecords of exit interviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for personnel termination\n\nautomated mechanisms supporting and\/or implementing personnel termination notifications\n\nautomated mechanisms for disabling information system access\/revoking authenticators"}]}],"controls":[{"id":"ps-4.2","class":"SP800-53-enhancement","title":"Automated Notification","params":[{"id":"ps-4.2_prm_1","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"PS-4(2)"},{"name":"sort-id","value":"ps-04.02"}],"parts":[{"id":"ps-4.2_smt","name":"statement","prose":"The organization employs automated mechanisms to notify {{ insert: param, ps-4.2_prm_1 }} upon termination of an individual."},{"id":"ps-4.2_gdn","name":"guidance","prose":"In organizations with a large number of employees, not all personnel who need to know about termination actions receive the appropriate notifications—or, if such notifications are received, they may not occur in a timely manner. Automated mechanisms can be used to send automatic alerts or notifications to specific organizational personnel or roles (e.g., management personnel, supervisors, personnel security officers, information security officers, systems administrators, or information technology administrators) when individuals are terminated. Such automatic alerts or notifications can be conveyed in a variety of ways, including, for example, telephonically, via electronic mail, via text message, or via websites."},{"id":"ps-4.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-4.2_obj.1","name":"objective","props":[{"name":"label","value":"PS-4(2)[1]"}],"prose":"defines personnel or roles to be notified upon termination of an individual; and"},{"id":"ps-4.2_obj.2","name":"objective","props":[{"name":"label","value":"PS-4(2)[2]"}],"prose":"employs automated mechanisms to notify organization-defined personnel or roles upon termination of an individual."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel termination\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nrecords of personnel termination actions\n\nautomated notifications of employee terminations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for personnel termination\n\nautomated mechanisms supporting and\/or implementing personnel termination notifications"}]}]}]},{"id":"ps-5","class":"SP800-53","title":"Personnel Transfer","params":[{"id":"ps-5_prm_1","label":"organization-defined transfer or reassignment actions"},{"id":"ps-5_prm_2","label":"organization-defined time period following the formal transfer action"},{"id":"ps-5_prm_3","label":"organization-defined personnel or roles"},{"id":"ps-5_prm_4","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PS-5"},{"name":"sort-id","value":"ps-05"}],"parts":[{"id":"ps-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Reviews and confirms ongoing operational need for current logical and physical access authorizations to information systems\/facilities when individuals are reassigned or transferred to other positions within the organization;"},{"id":"ps-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Initiates {{ insert: param, ps-5_prm_1 }} within {{ insert: param, ps-5_prm_2 }};"},{"id":"ps-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Modifies access authorization as needed to correspond with any changes in operational need due to reassignment or transfer; and"},{"id":"ps-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Notifies {{ insert: param, ps-5_prm_3 }} within {{ insert: param, ps-5_prm_4 }}."}]},{"id":"ps-5_gdn","name":"guidance","prose":"This control applies when reassignments or transfers of individuals are permanent or of such extended durations as to make the actions warranted. Organizations define actions appropriate for the types of reassignments or transfers, whether permanent or extended. Actions that may be required for personnel transfers or reassignments to other positions within organizations include, for example: (i) returning old and issuing new keys, identification cards, and building passes; (ii) closing information system accounts and establishing new accounts; (iii) changing information system access authorizations (i.e., privileges); and (iv) providing for access to official records to which individuals had access at previous work locations and in previous information system accounts.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#ps-4","rel":"related"}]},{"id":"ps-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-5.a_obj","name":"objective","props":[{"name":"label","value":"PS-5(a)"}],"prose":"when individuals are reassigned or transferred to other positions within the organization, reviews and confirms ongoing operational need for current:","parts":[{"id":"ps-5.a_obj.1","name":"objective","props":[{"name":"label","value":"PS-5(a)[1]"}],"prose":"logical access authorizations to information systems;"},{"id":"ps-5.a_obj.2","name":"objective","props":[{"name":"label","value":"PS-5(a)[2]"}],"prose":"physical access authorizations to information systems and facilities;"}]},{"id":"ps-5.b_obj","name":"objective","props":[{"name":"label","value":"PS-5(b)"}],"parts":[{"id":"ps-5.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-5(b)[1]"}],"prose":"defines transfer or reassignment actions to be initiated following transfer or reassignment;"},{"id":"ps-5.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-5(b)[2]"}],"prose":"defines the time period within which transfer or reassignment actions must occur following transfer or reassignment;"},{"id":"ps-5.b_obj.3","name":"objective","props":[{"name":"label","value":"PS-5(b)[3]"}],"prose":"initiates organization-defined transfer or reassignment actions within the organization-defined time period following transfer or reassignment;"}]},{"id":"ps-5.c_obj","name":"objective","props":[{"name":"label","value":"PS-5(c)"}],"prose":"modifies access authorization as needed to correspond with any changes in operational need due to reassignment or transfer;"},{"id":"ps-5.d_obj","name":"objective","props":[{"name":"label","value":"PS-5(d)"}],"parts":[{"id":"ps-5.d_obj.1","name":"objective","props":[{"name":"label","value":"PS-5(d)[1]"}],"prose":"defines personnel or roles to be notified when individuals are reassigned or transferred to other positions within the organization;"},{"id":"ps-5.d_obj.2","name":"objective","props":[{"name":"label","value":"PS-5(d)[2]"}],"prose":"defines the time period within which to notify organization-defined personnel or roles when individuals are reassigned or transferred to other positions within the organization; and"},{"id":"ps-5.d_obj.3","name":"objective","props":[{"name":"label","value":"PS-5(d)[3]"}],"prose":"notifies organization-defined personnel or roles within the organization-defined time period when individuals are reassigned or transferred to other positions within the organization."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel transfer\n\nsecurity plan\n\nrecords of personnel transfer actions\n\nlist of information system and facility access authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for personnel transfer\n\nautomated mechanisms supporting and\/or implementing personnel transfer notifications\n\nautomated mechanisms for disabling information system access\/revoking authenticators"}]}]},{"id":"ps-6","class":"SP800-53","title":"Access Agreements","params":[{"id":"ps-6_prm_1","label":"organization-defined frequency"},{"id":"ps-6_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"PS-6"},{"name":"sort-id","value":"ps-06"}],"parts":[{"id":"ps-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops and documents access agreements for organizational information systems;"},{"id":"ps-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the access agreements {{ insert: param, ps-6_prm_1 }}; and"},{"id":"ps-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensures that individuals requiring access to organizational information and information systems:","parts":[{"id":"ps-6_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Sign appropriate access agreements prior to being granted access; and"},{"id":"ps-6_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Re-sign access agreements to maintain access to organizational information systems when access agreements have been updated or {{ insert: param, ps-6_prm_2 }}."}]}]},{"id":"ps-6_gdn","name":"guidance","prose":"Access agreements include, for example, nondisclosure agreements, acceptable use agreements, rules of behavior, and conflict-of-interest agreements. Signed access agreements include an acknowledgement that individuals have read, understand, and agree to abide by the constraints associated with organizational information systems to which access is authorized. Organizations can use electronic signatures to acknowledge access agreements unless specifically prohibited by organizational policy.","links":[{"href":"#pl-4","rel":"related"},{"href":"#ps-2","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ps-4","rel":"related"},{"href":"#ps-8","rel":"related"}]},{"id":"ps-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-6.a_obj","name":"objective","props":[{"name":"label","value":"PS-6(a)"}],"prose":"develops and documents access agreements for organizational information systems;"},{"id":"ps-6.b_obj","name":"objective","props":[{"name":"label","value":"PS-6(b)"}],"parts":[{"id":"ps-6.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-6(b)[1]"}],"prose":"defines the frequency to review and update the access agreements;"},{"id":"ps-6.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-6(b)[2]"}],"prose":"reviews and updates the access agreements with the organization-defined frequency;"}]},{"id":"ps-6.c_obj","name":"objective","props":[{"name":"label","value":"PS-6(c)"}],"parts":[{"id":"ps-6.c.1_obj","name":"objective","props":[{"name":"label","value":"PS-6(c)(1)"}],"prose":"ensures that individuals requiring access to organizational information and information systems sign appropriate access agreements prior to being granted access;"},{"id":"ps-6.c.2_obj","name":"objective","props":[{"name":"label","value":"PS-6(c)(2)"}],"parts":[{"id":"ps-6.c.2_obj.1","name":"objective","props":[{"name":"label","value":"PS-6(c)(2)[1]"}],"prose":"defines the frequency to re-sign access agreements to maintain access to organizational information systems when access agreements have been updated;"},{"id":"ps-6.c.2_obj.2","name":"objective","props":[{"name":"label","value":"PS-6(c)(2)[2]"}],"prose":"ensures that individuals requiring access to organizational information and information systems re-sign access agreements to maintain access to organizational information systems when access agreements have been updated or with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing access agreements for organizational information and information systems\n\nsecurity plan\n\naccess agreements\n\nrecords of access agreement reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel who have signed\/resigned access agreements\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for access agreements\n\nautomated mechanisms supporting access agreements"}]}]},{"id":"ps-7","class":"SP800-53","title":"Third-party Personnel Security","params":[{"id":"ps-7_prm_1","label":"organization-defined personnel or roles"},{"id":"ps-7_prm_2","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-7"},{"name":"sort-id","value":"ps-07"}],"links":[{"href":"#0c775bc3-bfc3-42c7-a382-88949f503171","rel":"reference"}],"parts":[{"id":"ps-7_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes personnel security requirements including security roles and responsibilities for third-party providers;"},{"id":"ps-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Requires third-party providers to comply with personnel security policies and procedures established by the organization;"},{"id":"ps-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Documents personnel security requirements;"},{"id":"ps-7_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Requires third-party providers to notify {{ insert: param, ps-7_prm_1 }} of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges within {{ insert: param, ps-7_prm_2 }}; and"},{"id":"ps-7_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Monitors provider compliance."}]},{"id":"ps-7_gdn","name":"guidance","prose":"Third-party providers include, for example, service bureaus, contractors, and other organizations providing information system development, information technology services, outsourced applications, and network and security management. Organizations explicitly include personnel security requirements in acquisition-related documents. Third-party providers may have personnel working at organizational facilities with credentials, badges, or information system privileges issued by organizations. Notifications of third-party personnel changes ensure appropriate termination of privileges and credentials. Organizations define the transfers and terminations deemed reportable by security-related characteristics that include, for example, functions, roles, and nature of credentials\/privileges associated with individuals transferred or terminated.","links":[{"href":"#ps-2","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ps-4","rel":"related"},{"href":"#ps-5","rel":"related"},{"href":"#ps-6","rel":"related"},{"href":"#sa-9","rel":"related"},{"href":"#sa-21","rel":"related"}]},{"id":"ps-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-7.a_obj","name":"objective","props":[{"name":"label","value":"PS-7(a)"}],"prose":"establishes personnel security requirements, including security roles and responsibilities, for third-party providers;"},{"id":"ps-7.b_obj","name":"objective","props":[{"name":"label","value":"PS-7(b)"}],"prose":"requires third-party providers to comply with personnel security policies and procedures established by the organization;"},{"id":"ps-7.c_obj","name":"objective","props":[{"name":"label","value":"PS-7(c)"}],"prose":"documents personnel security requirements;"},{"id":"ps-7.d_obj","name":"objective","props":[{"name":"label","value":"PS-7(d)"}],"parts":[{"id":"ps-7.d_obj.1","name":"objective","props":[{"name":"label","value":"PS-7(d)[1]"}],"prose":"defines personnel or roles to be notified of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges;"},{"id":"ps-7.d_obj.2","name":"objective","props":[{"name":"label","value":"PS-7(d)[2]"}],"prose":"defines the time period within which third-party providers are required to notify organization-defined personnel or roles of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges;"},{"id":"ps-7.d_obj.3","name":"objective","props":[{"name":"label","value":"PS-7(d)[3]"}],"prose":"requires third-party providers to notify organization-defined personnel or roles within the organization-defined time period of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges; and"}]},{"id":"ps-7.e_obj","name":"objective","props":[{"name":"label","value":"PS-7(e)"}],"prose":"monitors provider compliance."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing third-party personnel security\n\nlist of personnel security requirements\n\nacquisition documents\n\nservice-level agreements\n\ncompliance monitoring process\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\nthird-party providers\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing and monitoring third-party personnel security\n\nautomated mechanisms supporting and\/or implementing monitoring of provider compliance"}]}]},{"id":"ps-8","class":"SP800-53","title":"Personnel Sanctions","params":[{"id":"ps-8_prm_1","label":"organization-defined personnel or roles"},{"id":"ps-8_prm_2","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"PS-8"},{"name":"sort-id","value":"ps-08"}],"parts":[{"id":"ps-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Employs a formal sanctions process for individuals failing to comply with established information security policies and procedures; and"},{"id":"ps-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Notifies {{ insert: param, ps-8_prm_1 }} within {{ insert: param, ps-8_prm_2 }} when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction."}]},{"id":"ps-8_gdn","name":"guidance","prose":"Organizational sanctions processes reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Sanctions processes are described in access agreements and can be included as part of general personnel policies and procedures for organizations. Organizations consult with the Office of the General Counsel regarding matters of employee sanctions.","links":[{"href":"#pl-4","rel":"related"},{"href":"#ps-6","rel":"related"}]},{"id":"ps-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-8.a_obj","name":"objective","props":[{"name":"label","value":"PS-8(a)"}],"prose":"employs a formal sanctions process for individuals failing to comply with established information security policies and procedures;"},{"id":"ps-8.b_obj","name":"objective","props":[{"name":"label","value":"PS-8(b)"}],"parts":[{"id":"ps-8.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-8(b)[1]"}],"prose":"defines personnel or roles to be notified when a formal employee sanctions process is initiated;"},{"id":"ps-8.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-8(b)[2]"}],"prose":"defines the time period within which organization-defined personnel or roles must be notified when a formal employee sanctions process is initiated; and"},{"id":"ps-8.b_obj.3","name":"objective","props":[{"name":"label","value":"PS-8(b)[3]"}],"prose":"notifies organization-defined personnel or roles within the organization-defined time period when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel sanctions\n\nrules of behavior\n\nrecords of formal sanctions\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing personnel sanctions\n\nautomated mechanisms supporting and\/or implementing notifications"}]}]}]},{"id":"ra","class":"family","title":"Risk Assessment","controls":[{"id":"ra-1","class":"SP800-53","title":"Risk Assessment Policy and Procedures","params":[{"id":"ra-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ra-1_prm_2","label":"organization-defined frequency"},{"id":"ra-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-1"},{"name":"sort-id","value":"ra-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ra-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ra-1_prm_1 }}:","parts":[{"id":"ra-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ra-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls; and"}]},{"id":"ra-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ra-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Risk assessment policy {{ insert: param, ra-1_prm_2 }}; and"},{"id":"ra-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Risk assessment procedures {{ insert: param, ra-1_prm_3 }}."}]}]},{"id":"ra-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the RA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ra-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-1.a_obj","name":"objective","props":[{"name":"label","value":"RA-1(a)"}],"parts":[{"id":"ra-1.a.1_obj","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)"}],"parts":[{"id":"ra-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1]"}],"prose":"develops and documents a risk assessment policy that addresses:","parts":[{"id":"ra-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ra-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ra-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ra-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ra-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ra-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ra-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ra-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the risk assessment policy is to be disseminated;"},{"id":"ra-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[3]"}],"prose":"disseminates the risk assessment policy to organization-defined personnel or roles;"}]},{"id":"ra-1.a.2_obj","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)"}],"parts":[{"id":"ra-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls;"},{"id":"ra-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ra-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ra-1.b_obj","name":"objective","props":[{"name":"label","value":"RA-1(b)"}],"parts":[{"id":"ra-1.b.1_obj","name":"objective","props":[{"name":"label","value":"RA-1(b)(1)"}],"parts":[{"id":"ra-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current risk assessment policy;"},{"id":"ra-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(b)(1)[2]"}],"prose":"reviews and updates the current risk assessment policy with the organization-defined frequency;"}]},{"id":"ra-1.b.2_obj","name":"objective","props":[{"name":"label","value":"RA-1(b)(2)"}],"parts":[{"id":"ra-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current risk assessment procedures; and"},{"id":"ra-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(b)(2)[2]"}],"prose":"reviews and updates the current risk assessment procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"risk assessment policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with risk assessment responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ra-2","class":"SP800-53","title":"Security Categorization","props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-2"},{"name":"sort-id","value":"ra-02"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"}],"parts":[{"id":"ra-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Categorizes information and the information system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"},{"id":"ra-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents the security categorization results (including supporting rationale) in the security plan for the information system; and"},{"id":"ra-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensures that the authorizing official or authorizing official designated representative reviews and approves the security categorization decision."}]},{"id":"ra-2_gdn","name":"guidance","prose":"Clearly defined authorization boundaries are a prerequisite for effective security categorization decisions. Security categories describe the potential adverse impacts to organizational operations, organizational assets, and individuals if organizational information and information systems are comprised through a loss of confidentiality, integrity, or availability. Organizations conduct the security categorization process as an organization-wide activity with the involvement of chief information officers, senior information security officers, information system owners, mission\/business owners, and information owners\/stewards. Organizations also consider the potential adverse impacts to other organizations and, in accordance with the USA PATRIOT Act of 2001 and Homeland Security Presidential Directives, potential national-level adverse impacts. Security categorization processes carried out by organizations facilitate the development of inventories of information assets, and along with CM-8, mappings to specific information system components where information is processed, stored, or transmitted.","links":[{"href":"#cm-8","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"ra-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-2.a_obj","name":"objective","props":[{"name":"label","value":"RA-2(a)"}],"prose":"categorizes information and the information system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"},{"id":"ra-2.b_obj","name":"objective","props":[{"name":"label","value":"RA-2(b)"}],"prose":"documents the security categorization results (including supporting rationale) in the security plan for the information system; and"},{"id":"ra-2.c_obj","name":"objective","props":[{"name":"label","value":"RA-2(c)"}],"prose":"ensures the authorizing official or authorizing official designated representative reviews and approves the security categorization decision."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nsecurity planning policy and procedures\n\nprocedures addressing security categorization of organizational information and information systems\n\nsecurity plan\n\nsecurity categorization documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security categorization and risk assessment responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security categorization"}]}]},{"id":"ra-3","class":"SP800-53","title":"Risk Assessment","params":[{"id":"ra-3_prm_1","select":{"choice":["security plan","risk assessment report"," {{ insert: param, ra-3_prm_2 }} "]}},{"id":"ra-3_prm_2","depends-on":"ra-3_prm_1","label":"organization-defined document"},{"id":"ra-3_prm_3","label":"organization-defined frequency"},{"id":"ra-3_prm_4","label":"organization-defined personnel or roles"},{"id":"ra-3_prm_5","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-3"},{"name":"sort-id","value":"ra-03"}],"links":[{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ra-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Conducts an assessment of risk, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, disruption, modification, or destruction of the information system and the information it processes, stores, or transmits;"},{"id":"ra-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents risk assessment results in {{ insert: param, ra-3_prm_1 }};"},{"id":"ra-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews risk assessment results {{ insert: param, ra-3_prm_3 }};"},{"id":"ra-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Disseminates risk assessment results to {{ insert: param, ra-3_prm_4 }}; and"},{"id":"ra-3_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Updates the risk assessment {{ insert: param, ra-3_prm_5 }} or whenever there are significant changes to the information system or environment of operation (including the identification of new threats and vulnerabilities), or other conditions that may impact the security state of the system."}]},{"id":"ra-3_gdn","name":"guidance","prose":"Clearly defined authorization boundaries are a prerequisite for effective risk assessments. Risk assessments take into account threats, vulnerabilities, likelihood, and impact to organizational operations and assets, individuals, other organizations, and the Nation based on the operation and use of information systems. Risk assessments also take into account risk from external parties (e.g., service providers, contractors operating information systems on behalf of the organization, individuals accessing organizational information systems, outsourcing entities). In accordance with OMB policy and related E-authentication initiatives, authentication of public users accessing federal information systems may also be required to protect nonpublic or privacy-related information. As such, organizational assessments of risk also address public access to federal information systems. Risk assessments (either formal or informal) can be conducted at all three tiers in the risk management hierarchy (i.e., organization level, mission\/business process level, or information system level) and at any phase in the system development life cycle. Risk assessments can also be conducted at various steps in the Risk Management Framework, including categorization, security control selection, security control implementation, security control assessment, information system authorization, and security control monitoring. RA-3 is noteworthy in that the control must be partially implemented prior to the implementation of other controls in order to complete the first two steps in the Risk Management Framework. Risk assessments can play an important role in security control selection processes, particularly during the application of tailoring guidance, which includes security control supplementation.","links":[{"href":"#ra-2","rel":"related"},{"href":"#pm-9","rel":"related"}]},{"id":"ra-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-3.a_obj","name":"objective","props":[{"name":"label","value":"RA-3(a)"}],"prose":"conducts an assessment of risk, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, disruption, modification, or destruction of:","parts":[{"id":"ra-3.a_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(a)[1]"}],"prose":"the information system;"},{"id":"ra-3.a_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(a)[2]"}],"prose":"the information the system processes, stores, or transmits;"}]},{"id":"ra-3.b_obj","name":"objective","props":[{"name":"label","value":"RA-3(b)"}],"parts":[{"id":"ra-3.b_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(b)[1]"}],"prose":"defines a document in which risk assessment results are to be documented (if not documented in the security plan or risk assessment report);"},{"id":"ra-3.b_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(b)[2]"}],"prose":"documents risk assessment results in one of the following:","parts":[{"id":"ra-3.b_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-3(b)[2][a]"}],"prose":"the security plan;"},{"id":"ra-3.b_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-3(b)[2][b]"}],"prose":"the risk assessment report; or"},{"id":"ra-3.b_obj.2.c","name":"objective","props":[{"name":"label","value":"RA-3(b)[2][c]"}],"prose":"the organization-defined document;"}]}]},{"id":"ra-3.c_obj","name":"objective","props":[{"name":"label","value":"RA-3(c)"}],"parts":[{"id":"ra-3.c_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(c)[1]"}],"prose":"defines the frequency to review risk assessment results;"},{"id":"ra-3.c_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(c)[2]"}],"prose":"reviews risk assessment results with the organization-defined frequency;"}]},{"id":"ra-3.d_obj","name":"objective","props":[{"name":"label","value":"RA-3(d)"}],"parts":[{"id":"ra-3.d_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(d)[1]"}],"prose":"defines personnel or roles to whom risk assessment results are to be disseminated;"},{"id":"ra-3.d_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(d)[2]"}],"prose":"disseminates risk assessment results to organization-defined personnel or roles;"}]},{"id":"ra-3.e_obj","name":"objective","props":[{"name":"label","value":"RA-3(e)"}],"parts":[{"id":"ra-3.e_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(e)[1]"}],"prose":"defines the frequency to update the risk assessment;"},{"id":"ra-3.e_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(e)[2]"}],"prose":"updates the risk assessment:","parts":[{"id":"ra-3.e_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-3(e)[2][a]"}],"prose":"with the organization-defined frequency;"},{"id":"ra-3.e_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-3(e)[2][b]"}],"prose":"whenever there are significant changes to the information system or environment of operation (including the identification of new threats and vulnerabilities); and"},{"id":"ra-3.e_obj.2.c","name":"objective","props":[{"name":"label","value":"RA-3(e)[2][c]"}],"prose":"whenever there are other conditions that may impact the security state of the system."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nsecurity planning policy and procedures\n\nprocedures addressing organizational assessments of risk\n\nsecurity plan\n\nrisk assessment\n\nrisk assessment results\n\nrisk assessment reviews\n\nrisk assessment updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with risk assessment responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for risk assessment\n\nautomated mechanisms supporting and\/or for conducting, documenting, reviewing, disseminating, and updating the risk assessment"}]}]},{"id":"ra-5","class":"SP800-53","title":"Vulnerability Scanning","params":[{"id":"ra-5_prm_1","label":"organization-defined frequency and\/or randomly in accordance with organization-defined process"},{"id":"ra-5_prm_2","label":"organization-defined response times"},{"id":"ra-5_prm_3","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-5"},{"name":"sort-id","value":"ra-05"}],"links":[{"href":"#bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","rel":"reference"},{"href":"#84a37532-6db6-477b-9ea8-f9085ebca0fc","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"},{"href":"#15522e92-9192-463d-9646-6a01982db8ca","rel":"reference"},{"href":"#275cc052-0f7f-423c-bdb6-ed503dc36228","rel":"reference"}],"parts":[{"id":"ra-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Scans for vulnerabilities in the information system and hosted applications {{ insert: param, ra-5_prm_1 }} and when new vulnerabilities potentially affecting the system\/applications are identified and reported;"},{"id":"ra-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for:","parts":[{"id":"ra-5_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Enumerating platforms, software flaws, and improper configurations;"},{"id":"ra-5_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Formatting checklists and test procedures; and"},{"id":"ra-5_smt.b.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Measuring vulnerability impact;"}]},{"id":"ra-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Analyzes vulnerability scan reports and results from security control assessments;"},{"id":"ra-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Remediates legitimate vulnerabilities {{ insert: param, ra-5_prm_2 }} in accordance with an organizational assessment of risk; and"},{"id":"ra-5_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Shares information obtained from the vulnerability scanning process and security control assessments with {{ insert: param, ra-5_prm_3 }} to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies)."}]},{"id":"ra-5_gdn","name":"guidance","prose":"Security categorization of information systems guides the frequency and comprehensiveness of vulnerability scans. Organizations determine the required vulnerability scanning for all information system components, ensuring that potential sources of vulnerabilities such as networked printers, scanners, and copiers are not overlooked. Vulnerability analyses for custom software applications may require additional approaches such as static analysis, dynamic analysis, binary analysis, or a hybrid of the three approaches. Organizations can employ these analysis approaches in a variety of tools (e.g., web-based application scanners, static analysis tools, binary analyzers) and in source code reviews. Vulnerability scanning includes, for example: (i) scanning for patch levels; (ii) scanning for functions, ports, protocols, and services that should not be accessible to users or devices; and (iii) scanning for improperly configured or incorrectly operating information flow control mechanisms. Organizations consider using tools that express vulnerabilities in the Common Vulnerabilities and Exposures (CVE) naming convention and that use the Open Vulnerability Assessment Language (OVAL) to determine\/test for the presence of vulnerabilities. Suggested sources for vulnerability information include the Common Weakness Enumeration (CWE) listing and the National Vulnerability Database (NVD). In addition, security control assessments such as red team exercises provide other sources of potential vulnerabilities for which to scan. Organizations also consider using tools that express vulnerability impact by the Common Vulnerability Scoring System (CVSS).","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#ra-2","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"ra-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-5.a_obj","name":"objective","props":[{"name":"label","value":"RA-5(a)"}],"parts":[{"id":"ra-5.a_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(a)[1]"}],"parts":[{"id":"ra-5.a_obj.1.a","name":"objective","props":[{"name":"label","value":"RA-5(a)[1][a]"}],"prose":"defines the frequency for conducting vulnerability scans on the information system and hosted applications; and\/or"},{"id":"ra-5.a_obj.1.b","name":"objective","props":[{"name":"label","value":"RA-5(a)[1][b]"}],"prose":"defines the process for conducting random vulnerability scans on the information system and hosted applications;"}]},{"id":"ra-5.a_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(a)[2]"}],"prose":"in accordance with the organization-defined frequency and\/or organization-defined process for conducting random scans, scans for vulnerabilities in:","parts":[{"id":"ra-5.a_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-5(a)[2][a]"}],"prose":"the information system;"},{"id":"ra-5.a_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-5(a)[2][b]"}],"prose":"hosted applications;"}]},{"id":"ra-5.a_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(a)[3]"}],"prose":"when new vulnerabilities potentially affecting the system\/applications are identified and reported, scans for vulnerabilities in:","parts":[{"id":"ra-5.a_obj.3.a","name":"objective","props":[{"name":"label","value":"RA-5(a)[3][a]"}],"prose":"the information system;"},{"id":"ra-5.a_obj.3.b","name":"objective","props":[{"name":"label","value":"RA-5(a)[3][b]"}],"prose":"hosted applications;"}]}]},{"id":"ra-5.b_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)"}],"prose":"employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for:","parts":[{"id":"ra-5.b.1_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)"}],"parts":[{"id":"ra-5.b.1_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)[1]"}],"prose":"enumerating platforms;"},{"id":"ra-5.b.1_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)[2]"}],"prose":"enumerating software flaws;"},{"id":"ra-5.b.1_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)[3]"}],"prose":"enumerating improper configurations;"}]},{"id":"ra-5.b.2_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)(2)"}],"parts":[{"id":"ra-5.b.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(b)(2)[1]"}],"prose":"formatting checklists;"},{"id":"ra-5.b.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(b)(2)[2]"}],"prose":"formatting test procedures;"}]},{"id":"ra-5.b.3_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)(3)"}],"prose":"measuring vulnerability impact;"}]},{"id":"ra-5.c_obj","name":"objective","props":[{"name":"label","value":"RA-5(c)"}],"parts":[{"id":"ra-5.c_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(c)[1]"}],"prose":"analyzes vulnerability scan reports;"},{"id":"ra-5.c_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(c)[2]"}],"prose":"analyzes results from security control assessments;"}]},{"id":"ra-5.d_obj","name":"objective","props":[{"name":"label","value":"RA-5(d)"}],"parts":[{"id":"ra-5.d_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(d)[1]"}],"prose":"defines response times to remediate legitimate vulnerabilities in accordance with an organizational assessment of risk;"},{"id":"ra-5.d_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(d)[2]"}],"prose":"remediates legitimate vulnerabilities within the organization-defined response times in accordance with an organizational assessment of risk;"}]},{"id":"ra-5.e_obj","name":"objective","props":[{"name":"label","value":"RA-5(e)"}],"parts":[{"id":"ra-5.e_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(e)[1]"}],"prose":"defines personnel or roles with whom information obtained from the vulnerability scanning process and security control assessments is to be shared;"},{"id":"ra-5.e_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(e)[2]"}],"prose":"shares information obtained from the vulnerability scanning process with organization-defined personnel or roles to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies); and"},{"id":"ra-5.e_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(e)[3]"}],"prose":"shares information obtained from security control assessments with organization-defined personnel or roles to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies)."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nprocedures addressing vulnerability scanning\n\nrisk assessment\n\nsecurity plan\n\nsecurity assessment report\n\nvulnerability scanning tools and associated configuration documentation\n\nvulnerability scanning results\n\npatch and vulnerability management records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with risk assessment, security control assessment and vulnerability scanning responsibilities\n\norganizational personnel with vulnerability scan analysis responsibilities\n\norganizational personnel with vulnerability remediation responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for vulnerability scanning, analysis, remediation, and information sharing\n\nautomated mechanisms supporting and\/or implementing vulnerability scanning, analysis, remediation, and information sharing"}]}],"controls":[{"id":"ra-5.1","class":"SP800-53-enhancement","title":"Update Tool Capability","props":[{"name":"label","value":"RA-5(1)"},{"name":"sort-id","value":"ra-05.01"}],"parts":[{"id":"ra-5.1_smt","name":"statement","prose":"The organization employs vulnerability scanning tools that include the capability to readily update the information system vulnerabilities to be scanned."},{"id":"ra-5.1_gdn","name":"guidance","prose":"The vulnerabilities to be scanned need to be readily updated as new vulnerabilities are discovered, announced, and scanning methods developed. This updating process helps to ensure that potential vulnerabilities in the information system are identified and addressed as quickly as possible.","links":[{"href":"#si-3","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"ra-5.1_obj","name":"objective","prose":"Determine if the organization employs vulnerability scanning tools that include the capability to readily update the information system vulnerabilities to be scanned."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Procedures addressing vulnerability scanning\n\nsecurity plan\n\nsecurity assessment report\n\nvulnerability scanning tools and associated configuration documentation\n\nvulnerability scanning results\n\npatch and vulnerability management records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with vulnerability scanning responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for vulnerability scanning\n\nautomated mechanisms\/tools supporting and\/or implementing vulnerability scanning"}]}]},{"id":"ra-5.2","class":"SP800-53-enhancement","title":"Update by Frequency \/ Prior to New Scan \/ When Identified","params":[{"id":"ra-5.2_prm_1","select":{"how-many":"one-or-more","choice":[" {{ insert: param, ra-5.2_prm_2 }} ","prior to a new scan","when new vulnerabilities are identified and reported"]}},{"id":"ra-5.2_prm_2","depends-on":"ra-5.2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"RA-5(2)"},{"name":"sort-id","value":"ra-05.02"}],"parts":[{"id":"ra-5.2_smt","name":"statement","prose":"The organization updates the information system vulnerabilities scanned {{ insert: param, ra-5.2_prm_1 }}."},{"id":"ra-5.2_gdn","name":"guidance","links":[{"href":"#si-3","rel":"related"},{"href":"#si-5","rel":"related"}]},{"id":"ra-5.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-5.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(2)[1]"}],"prose":"defines the frequency to update the information system vulnerabilities scanned;"},{"id":"ra-5.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(2)[2]"}],"prose":"updates the information system vulnerabilities scanned one or more of the following:","parts":[{"id":"ra-5.2_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-5(2)[2][a]"}],"prose":"with the organization-defined frequency;"},{"id":"ra-5.2_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-5(2)[2][b]"}],"prose":"prior to a new scan; and\/or"},{"id":"ra-5.2_obj.2.c","name":"objective","props":[{"name":"label","value":"RA-5(2)[2][c]"}],"prose":"when new vulnerabilities are identified and reported."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Procedures addressing vulnerability scanning\n\nsecurity plan\n\nsecurity assessment report\n\nvulnerability scanning tools and associated configuration documentation\n\nvulnerability scanning results\n\npatch and vulnerability management records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with vulnerability scanning responsibilities\n\norganizational personnel with vulnerability scan analysis responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for vulnerability scanning\n\nautomated mechanisms\/tools supporting and\/or implementing vulnerability scanning"}]}]},{"id":"ra-5.4","class":"SP800-53-enhancement","title":"Discoverable Information","params":[{"id":"ra-5.4_prm_1","label":"organization-defined corrective actions"}],"props":[{"name":"label","value":"RA-5(4)"},{"name":"sort-id","value":"ra-05.04"}],"parts":[{"id":"ra-5.4_smt","name":"statement","prose":"The organization determines what information about the information system is discoverable by adversaries and subsequently takes {{ insert: param, ra-5.4_prm_1 }}."},{"id":"ra-5.4_gdn","name":"guidance","prose":"Discoverable information includes information that adversaries could obtain without directly compromising or breaching the information system, for example, by collecting information the system is exposing or by conducting extensive searches of the web. Corrective actions can include, for example, notifying appropriate organizational personnel, removing designated information, or changing the information system to make designated information less relevant or attractive to adversaries.","links":[{"href":"#au-13","rel":"related"}]},{"id":"ra-5.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-5.4_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(4)[1]"}],"prose":"defines corrective actions to be taken if information about the information system is discoverable by adversaries;"},{"id":"ra-5.4_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(4)[2]"}],"prose":"determines what information about the information system is discoverable by adversaries; and"},{"id":"ra-5.4_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(4)[3]"}],"prose":"subsequently takes organization-defined corrective actions."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Procedures addressing vulnerability scanning\n\nsecurity assessment report\n\npenetration test results\n\nvulnerability scanning results\n\nrisk assessment report\n\nrecords of corrective actions taken\n\nincident response records\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with vulnerability scanning and\/or penetration testing responsibilities\n\norganizational personnel with vulnerability scan analysis responsibilities\n\norganizational personnel responsible for risk response\n\norganizational personnel responsible for incident management and response\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for vulnerability scanning\n\norganizational processes for risk response\n\norganizational processes for incident management and response\n\nautomated mechanisms\/tools supporting and\/or implementing vulnerability scanning\n\nautomated mechanisms supporting and\/or implementing risk response\n\nautomated mechanisms supporting and\/or implementing incident management and response"}]}]},{"id":"ra-5.5","class":"SP800-53-enhancement","title":"Privileged Access","params":[{"id":"ra-5.5_prm_1","label":"organization-identified information system components"},{"id":"ra-5.5_prm_2","label":"organization-defined vulnerability scanning activities"}],"props":[{"name":"label","value":"RA-5(5)"},{"name":"sort-id","value":"ra-05.05"}],"parts":[{"id":"ra-5.5_smt","name":"statement","prose":"The information system implements privileged access authorization to {{ insert: param, ra-5.5_prm_1 }} for selected {{ insert: param, ra-5.5_prm_2 }}."},{"id":"ra-5.5_gdn","name":"guidance","prose":"In certain situations, the nature of the vulnerability scanning may be more intrusive or the information system component that is the subject of the scanning may contain highly sensitive information. Privileged access authorization to selected system components facilitates more thorough vulnerability scanning and also protects the sensitive nature of such scanning."},{"id":"ra-5.5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ra-5.5_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(5)[1]"}],"prose":"the organization defines information system components to which privileged access is authorized for selected vulnerability scanning activities;"},{"id":"ra-5.5_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(5)[2]"}],"prose":"the organization defines vulnerability scanning activities selected for privileged access authorization to organization-defined information system components; and"},{"id":"ra-5.5_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(5)[3]"}],"prose":"the information system implements privileged access authorization to organization-defined information system components for selected organization-defined vulnerability scanning activities."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nprocedures addressing vulnerability scanning\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of information system components for vulnerability scanning\n\npersonnel access authorization list\n\nauthorization credentials\n\naccess authorization records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with vulnerability scanning responsibilities\n\nsystem\/network administrators\n\norganizational personnel responsible for access control to the information system\n\norganizational personnel responsible for configuration management of the information system\n\nsystem developers\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for vulnerability scanning\n\norganizational processes for access control\n\nautomated mechanisms supporting and\/or implementing access control\n\nautomated mechanisms\/tools supporting and\/or implementing vulnerability scanning"}]}]}]}]},{"id":"sa","class":"family","title":"System and Services Acquisition","controls":[{"id":"sa-1","class":"SP800-53","title":"System and Services Acquisition Policy and Procedures","params":[{"id":"sa-1_prm_1","label":"organization-defined personnel or roles"},{"id":"sa-1_prm_2","label":"organization-defined frequency"},{"id":"sa-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-1"},{"name":"sort-id","value":"sa-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"sa-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, sa-1_prm_1 }}:","parts":[{"id":"sa-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system and services acquisition policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"sa-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls; and"}]},{"id":"sa-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"sa-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System and services acquisition policy {{ insert: param, sa-1_prm_2 }}; and"},{"id":"sa-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System and services acquisition procedures {{ insert: param, sa-1_prm_3 }}."}]}]},{"id":"sa-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the SA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"sa-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-1.a_obj","name":"objective","props":[{"name":"label","value":"SA-1(a)"}],"parts":[{"id":"sa-1.a.1_obj","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)"}],"parts":[{"id":"sa-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1]"}],"prose":"develops and documents a system and services acquisition policy that addresses:","parts":[{"id":"sa-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"sa-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"sa-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"sa-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"sa-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"sa-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"sa-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"sa-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system and services acquisition policy is to be disseminated;"},{"id":"sa-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[3]"}],"prose":"disseminates the system and services acquisition policy to organization-defined personnel or roles;"}]},{"id":"sa-1.a.2_obj","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)"}],"parts":[{"id":"sa-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls;"},{"id":"sa-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"sa-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"sa-1.b_obj","name":"objective","props":[{"name":"label","value":"SA-1(b)"}],"parts":[{"id":"sa-1.b.1_obj","name":"objective","props":[{"name":"label","value":"SA-1(b)(1)"}],"parts":[{"id":"sa-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system and services acquisition policy;"},{"id":"sa-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(b)(1)[2]"}],"prose":"reviews and updates the current system and services acquisition policy with the organization-defined frequency;"}]},{"id":"sa-1.b.2_obj","name":"objective","props":[{"name":"label","value":"SA-1(b)(2)"}],"parts":[{"id":"sa-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system and services acquisition procedures; and"},{"id":"sa-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(b)(2)[2]"}],"prose":"reviews and updates the current system and services acquisition procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"sa-2","class":"SP800-53","title":"Allocation of Resources","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-2"},{"name":"sort-id","value":"sa-02"}],"links":[{"href":"#29fcfe59-33cd-494a-8756-5907ae3a8f92","rel":"reference"}],"parts":[{"id":"sa-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Determines information security requirements for the information system or information system service in mission\/business process planning;"},{"id":"sa-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Determines, documents, and allocates the resources required to protect the information system or information system service as part of its capital planning and investment control process; and"},{"id":"sa-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Establishes a discrete line item for information security in organizational programming and budgeting documentation."}]},{"id":"sa-2_gdn","name":"guidance","prose":"Resource allocation for information security includes funding for the initial information system or information system service acquisition and funding for the sustainment of the system\/service.","links":[{"href":"#pm-3","rel":"related"},{"href":"#pm-11","rel":"related"}]},{"id":"sa-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-2.a_obj","name":"objective","props":[{"name":"label","value":"SA-2(a)"}],"prose":"determines information security requirements for the information system or information system service in mission\/business process planning;"},{"id":"sa-2.b_obj","name":"objective","props":[{"name":"label","value":"SA-2(b)"}],"prose":"to protect the information system or information system service as part of its capital planning and investment control process:","parts":[{"id":"sa-2.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-2(b)[1]"}],"prose":"determines the resources required;"},{"id":"sa-2.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-2(b)[2]"}],"prose":"documents the resources required;"},{"id":"sa-2.b_obj.3","name":"objective","props":[{"name":"label","value":"SA-2(b)[3]"}],"prose":"allocates the resources required; and"}]},{"id":"sa-2.c_obj","name":"objective","props":[{"name":"label","value":"SA-2(c)"}],"prose":"establishes a discrete line item for information security in organizational programming and budgeting documentation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the allocation of resources to information security requirements\n\nprocedures addressing capital planning and investment control\n\norganizational programming and budgeting documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with capital planning, investment control, organizational programming and budgeting responsibilities\n\norganizational personnel responsible for determining information security requirements for information systems\/services\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for determining information security requirements\n\norganizational processes for capital planning, programming, and budgeting\n\nautomated mechanisms supporting and\/or implementing organizational capital planning, programming, and budgeting"}]}]},{"id":"sa-3","class":"SP800-53","title":"System Development Life Cycle","params":[{"id":"sa-3_prm_1","label":"organization-defined system development life cycle"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-3"},{"name":"sort-id","value":"sa-03"}],"links":[{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#abd950ae-092f-4b7a-b374-1c7c67fe9350","rel":"reference"}],"parts":[{"id":"sa-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Manages the information system using {{ insert: param, sa-3_prm_1 }} that incorporates information security considerations;"},{"id":"sa-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Defines and documents information security roles and responsibilities throughout the system development life cycle;"},{"id":"sa-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Identifies individuals having information security roles and responsibilities; and"},{"id":"sa-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Integrates the organizational information security risk management process into system development life cycle activities."}]},{"id":"sa-3_gdn","name":"guidance","prose":"A well-defined system development life cycle provides the foundation for the successful development, implementation, and operation of organizational information systems. To apply the required security controls within the system development life cycle requires a basic understanding of information security, threats, vulnerabilities, adverse impacts, and risk to critical missions\/business functions. The security engineering principles in SA-8 cannot be properly applied if individuals that design, code, and test information systems and system components (including information technology products) do not understand security. Therefore, organizations include qualified personnel, for example, chief information security officers, security architects, security engineers, and information system security officers in system development life cycle activities to ensure that security requirements are incorporated into organizational information systems. It is equally important that developers include individuals on the development team that possess the requisite security expertise and skills to ensure that needed security capabilities are effectively integrated into the information system. Security awareness and training programs can help ensure that individuals having key security roles and responsibilities have the appropriate experience, skills, and expertise to conduct assigned system development life cycle activities. The effective integration of security requirements into enterprise architecture also helps to ensure that important security considerations are addressed early in the system development life cycle and that those considerations are directly related to the organizational mission\/business processes. This process also facilitates the integration of the information security architecture into the enterprise architecture, consistent with organizational risk management and information security strategies.","links":[{"href":"#at-3","rel":"related"},{"href":"#pm-7","rel":"related"},{"href":"#sa-8","rel":"related"}]},{"id":"sa-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-3.a_obj","name":"objective","props":[{"name":"label","value":"SA-3(a)"}],"parts":[{"id":"sa-3.a_obj.1","name":"objective","props":[{"name":"label","value":"SA-3(a)[1]"}],"prose":"defines a system development life cycle that incorporates information security considerations to be used to manage the information system;"},{"id":"sa-3.a_obj.2","name":"objective","props":[{"name":"label","value":"SA-3(a)[2]"}],"prose":"manages the information system using the organization-defined system development life cycle;"}]},{"id":"sa-3.b_obj","name":"objective","props":[{"name":"label","value":"SA-3(b)"}],"prose":"defines and documents information security roles and responsibilities throughout the system development life cycle;"},{"id":"sa-3.c_obj","name":"objective","props":[{"name":"label","value":"SA-3(c)"}],"prose":"identifies individuals having information security roles and responsibilities; and"},{"id":"sa-3.d_obj","name":"objective","props":[{"name":"label","value":"SA-3(d)"}],"prose":"integrates the organizational information security risk management process into system development life cycle activities."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security into the system development life cycle process\n\ninformation system development life cycle documentation\n\ninformation security risk management strategy\/program documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security and system life cycle development responsibilities\n\norganizational personnel with information security risk management responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for defining and documenting the SDLC\n\norganizational processes for identifying SDLC roles and responsibilities\n\norganizational process for integrating information security risk management into the SDLC\n\nautomated mechanisms supporting and\/or implementing the SDLC"}]}]},{"id":"sa-4","class":"SP800-53","title":"Acquisition Process","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-4"},{"name":"sort-id","value":"sa-04"}],"links":[{"href":"#ad733a42-a7ed-4774-b988-4930c28852f3","rel":"reference"},{"href":"#1737a687-52fb-4008-b900-cbfa836f7b65","rel":"reference"},{"href":"#d715b234-9b5b-4e07-b1ed-99836727664d","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#0a5db899-f033-467f-8631-f5a8ba971475","rel":"reference"},{"href":"#0c775bc3-bfc3-42c7-a382-88949f503171","rel":"reference"},{"href":"#d818efd3-db31-4953-8afa-9e76afe83ce2","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#abd950ae-092f-4b7a-b374-1c7c67fe9350","rel":"reference"},{"href":"#84a37532-6db6-477b-9ea8-f9085ebca0fc","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"},{"href":"#56d671da-6b7b-4abf-8296-84b61980390a","rel":"reference"},{"href":"#c95a9986-3cd6-4a98-931b-ccfc56cb11e5","rel":"reference"},{"href":"#5ed1f4d5-1494-421b-97ed-39d3c88ab51f","rel":"reference"},{"href":"#bbd50dd1-54ce-4432-959d-63ea564b1bb4","rel":"reference"}],"parts":[{"id":"sa-4_smt","name":"statement","prose":"The organization includes the following requirements, descriptions, and criteria, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission\/business needs:","parts":[{"id":"sa-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Security functional requirements;"},{"id":"sa-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Security strength requirements;"},{"id":"sa-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Security assurance requirements;"},{"id":"sa-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Security-related documentation requirements;"},{"id":"sa-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Requirements for protecting security-related documentation;"},{"id":"sa-4_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Description of the information system development environment and environment in which the system is intended to operate; and"},{"id":"sa-4_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Acceptance criteria."}]},{"id":"sa-4_gdn","name":"guidance","prose":"Information system components are discrete, identifiable information technology assets (e.g., hardware, software, or firmware) that represent the building blocks of an information system. Information system components include commercial information technology products. Security functional requirements include security capabilities, security functions, and security mechanisms. Security strength requirements associated with such capabilities, functions, and mechanisms include degree of correctness, completeness, resistance to direct attack, and resistance to tampering or bypass. Security assurance requirements include: (i) development processes, procedures, practices, and methodologies; and (ii) evidence from development and assessment activities providing grounds for confidence that the required security functionality has been implemented and the required security strength has been achieved. Security documentation requirements address all phases of the system development life cycle. Security functionality, assurance, and documentation requirements are expressed in terms of security controls and control enhancements that have been selected through the tailoring process. The security control tailoring process includes, for example, the specification of parameter values through the use of assignment and selection statements and the specification of platform dependencies and implementation information. Security documentation provides user and administrator guidance regarding the implementation and operation of security controls. The level of detail required in security documentation is based on the security category or classification level of the information system and the degree to which organizations depend on the stated security capability, functions, or mechanisms to meet overall risk response expectations (as defined in the organizational risk management strategy). Security requirements can also include organizationally mandated configuration settings specifying allowed functions, ports, protocols, and services. Acceptance criteria for information systems, information system components, and information system services are defined in the same manner as such criteria for any organizational acquisition or procurement. The Federal Acquisition Regulation (FAR) Section 7.103 contains information security requirements from FISMA.","links":[{"href":"#cm-6","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#ps-7","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#sa-12","rel":"related"}]},{"id":"sa-4_obj","name":"objective","prose":"Determine if the organization includes the following requirements, descriptions, and criteria, explicitly or by reference, in the acquisition contracts for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission\/business needs:","parts":[{"id":"sa-4.a_obj","name":"objective","props":[{"name":"label","value":"SA-4(a)"}],"prose":"security functional requirements;"},{"id":"sa-4.b_obj","name":"objective","props":[{"name":"label","value":"SA-4(b)"}],"prose":"security strength requirements;"},{"id":"sa-4.c_obj","name":"objective","props":[{"name":"label","value":"SA-4(c)"}],"prose":"security assurance requirements;"},{"id":"sa-4.d_obj","name":"objective","props":[{"name":"label","value":"SA-4(d)"}],"prose":"security-related documentation requirements;"},{"id":"sa-4.e_obj","name":"objective","props":[{"name":"label","value":"SA-4(e)"}],"prose":"requirements for protecting security-related documentation;"},{"id":"sa-4.f_obj","name":"objective","props":[{"name":"label","value":"SA-4(f)"}],"prose":"description of:","parts":[{"id":"sa-4.f_obj.1","name":"objective","props":[{"name":"label","value":"SA-4(f)[1]"}],"prose":"the information system development environment;"},{"id":"sa-4.f_obj.2","name":"objective","props":[{"name":"label","value":"SA-4(f)[2]"}],"prose":"the environment in which the system is intended to operate; and"}]},{"id":"sa-4.g_obj","name":"objective","props":[{"name":"label","value":"SA-4(g)"}],"prose":"acceptance criteria."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\nacquisition contracts for the information system, system component, or information system service\n\ninformation system design documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security functional, strength, and assurance requirements\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for determining information system security functional, strength, and assurance requirements\n\norganizational processes for developing acquisition contracts\n\nautomated mechanisms supporting and\/or implementing acquisitions and inclusion of security requirements in contracts"}]}],"controls":[{"id":"sa-4.1","class":"SP800-53-enhancement","title":"Functional Properties of Security Controls","props":[{"name":"label","value":"SA-4(1)"},{"name":"sort-id","value":"sa-04.01"}],"parts":[{"id":"sa-4.1_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to provide a description of the functional properties of the security controls to be employed."},{"id":"sa-4.1_gdn","name":"guidance","prose":"Functional properties of security controls describe the functionality (i.e., security capability, functions, or mechanisms) visible at the interfaces of the controls and specifically exclude functionality and data structures internal to the operation of the controls.","links":[{"href":"#sa-5","rel":"related"}]},{"id":"sa-4.1_obj","name":"objective","prose":"Determine if the organization requires the developer of the information system, system component, or information system service to provide a description of the functional properties of the security controls to be employed."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\nsolicitation documents\n\nacquisition documentation\n\nacquisition contracts for the information system, system component, or information system services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security functional requirements\n\ninformation system developer or service provider\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for determining information system security functional, requirements\n\norganizational processes for developing acquisition contracts\n\nautomated mechanisms supporting and\/or implementing acquisitions and inclusion of security requirements in contracts"}]}]},{"id":"sa-4.2","class":"SP800-53-enhancement","title":"Design \/ Implementation Information for Security Controls","params":[{"id":"sa-4.2_prm_1","select":{"how-many":"one-or-more","choice":["security-relevant external system interfaces","high-level design","low-level design","source code or hardware schematics"," {{ insert: param, sa-4.2_prm_2 }} "]}},{"id":"sa-4.2_prm_2","depends-on":"sa-4.2_prm_1","label":"organization-defined design\/implementation information"},{"id":"sa-4.2_prm_3","label":"organization-defined level of detail"}],"props":[{"name":"label","value":"SA-4(2)"},{"name":"sort-id","value":"sa-04.02"}],"parts":[{"id":"sa-4.2_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to provide design and implementation information for the security controls to be employed that includes: {{ insert: param, sa-4.2_prm_1 }} at {{ insert: param, sa-4.2_prm_3 }}."},{"id":"sa-4.2_gdn","name":"guidance","prose":"Organizations may require different levels of detail in design and implementation documentation for security controls employed in organizational information systems, system components, or information system services based on mission\/business requirements, requirements for trustworthiness\/resiliency, and requirements for analysis and testing. Information systems can be partitioned into multiple subsystems. Each subsystem within the system can contain one or more modules. The high-level design for the system is expressed in terms of multiple subsystems and the interfaces between subsystems providing security-relevant functionality. The low-level design for the system is expressed in terms of modules with particular emphasis on software and firmware (but not excluding hardware) and the interfaces between modules providing security-relevant functionality. Source code and hardware schematics are typically referred to as the implementation representation of the information system.","links":[{"href":"#sa-5","rel":"related"}]},{"id":"sa-4.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-4.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-4(2)[1]"}],"prose":"defines level of detail that the developer is required to provide in design and implementation information for the security controls to be employed in the information system, system component, or information system service;"},{"id":"sa-4.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-4(2)[2]"}],"prose":"defines design\/implementation information that the developer is to provide for the security controls to be employed (if selected);"},{"id":"sa-4.2_obj.3","name":"objective","props":[{"name":"label","value":"SA-4(2)[3]"}],"prose":"requires the developer of the information system, system component, or information system service to provide design and implementation information for the security controls to be employed that includes, at the organization-defined level of detail, one or more of the following:","parts":[{"id":"sa-4.2_obj.3.a","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][a]"}],"prose":"security-relevant external system interfaces;"},{"id":"sa-4.2_obj.3.b","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][b]"}],"prose":"high-level design;"},{"id":"sa-4.2_obj.3.c","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][c]"}],"prose":"low-level design;"},{"id":"sa-4.2_obj.3.d","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][d]"}],"prose":"source code;"},{"id":"sa-4.2_obj.3.e","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][e]"}],"prose":"hardware schematics; and\/or"},{"id":"sa-4.2_obj.3.f","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][f]"}],"prose":"organization-defined design\/implementation information."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\nsolicitation documents\n\nacquisition documentation\n\nacquisition contracts for the information system, system components, or information system services\n\ndesign and implementation information for security controls employed in the information system, system component, or information system service\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\ninformation system developer or service provider\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for determining level of detail for system design and security controls\n\norganizational processes for developing acquisition contracts\n\nautomated mechanisms supporting and\/or implementing development of system design details"}]}]},{"id":"sa-4.9","class":"SP800-53-enhancement","title":"Functions \/ Ports \/ Protocols \/ Services in Use","props":[{"name":"label","value":"SA-4(9)"},{"name":"sort-id","value":"sa-04.09"}],"parts":[{"id":"sa-4.9_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to identify early in the system development life cycle, the functions, ports, protocols, and services intended for organizational use."},{"id":"sa-4.9_gdn","name":"guidance","prose":"The identification of functions, ports, protocols, and services early in the system development life cycle (e.g., during the initial requirements definition and design phases) allows organizations to influence the design of the information system, information system component, or information system service. This early involvement in the life cycle helps organizations to avoid or minimize the use of functions, ports, protocols, or services that pose unnecessarily high risks and understand the trade-offs involved in blocking specific ports, protocols, or services (or when requiring information system service providers to do so). Early identification of functions, ports, protocols, and services avoids costly retrofitting of security controls after the information system, system component, or information system service has been implemented. SA-9 describes requirements for external information system services with organizations identifying which functions, ports, protocols, and services are provided from external sources.","links":[{"href":"#cm-7","rel":"related"},{"href":"#sa-9","rel":"related"}]},{"id":"sa-4.9_obj","name":"objective","prose":"Determine if the organization requires the developer of the information system, system component, or information system service to identify early in the system development life cycle:","parts":[{"id":"sa-4.9_obj.1","name":"objective","props":[{"name":"label","value":"SA-4(9)[1]"}],"prose":"the functions intended for organizational use;"},{"id":"sa-4.9_obj.2","name":"objective","props":[{"name":"label","value":"SA-4(9)[2]"}],"prose":"the ports intended for organizational use;"},{"id":"sa-4.9_obj.3","name":"objective","props":[{"name":"label","value":"SA-4(9)[3]"}],"prose":"the protocols intended for organizational use; and"},{"id":"sa-4.9_obj.4","name":"objective","props":[{"name":"label","value":"SA-4(9)[4]"}],"prose":"the services intended for organizational use."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\ninformation system design documentation\n\ninformation system documentation including functions, ports, protocols, and services intended for organizational use\n\nacquisition contracts for information systems or services\n\nacquisition documentation\n\nsolicitation documentation\n\nservice-level agreements\n\norganizational security requirements, descriptions, and criteria for developers of information systems, system components, and information system services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\nsystem\/network administrators\n\norganizational personnel operating, using, and\/or maintaining the information system\n\ninformation system developers\n\norganizational personnel with information security responsibilities"}]}]},{"id":"sa-4.10","class":"SP800-53-enhancement","title":"Use of Approved PIV Products","props":[{"name":"label","value":"SA-4(10)"},{"name":"sort-id","value":"sa-04.10"}],"parts":[{"id":"sa-4.10_smt","name":"statement","prose":"The organization employs only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational information systems."},{"id":"sa-4.10_gdn","name":"guidance","links":[{"href":"#ia-2","rel":"related"},{"href":"#ia-8","rel":"related"}]},{"id":"sa-4.10_obj","name":"objective","prose":"Determine if the organization employs only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational information systems."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\nsolicitation documentation\n\nacquisition documentation\n\nacquisition contracts for the information system, system component, or information system service\n\nservice-level agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\norganizational personnel with responsibility for ensuring only FIPS 201-approved products are implemented\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for selecting and employing FIPS 201-approved products"}]}]}]},{"id":"sa-5","class":"SP800-53","title":"Information System Documentation","params":[{"id":"sa-5_prm_1","label":"organization-defined actions"},{"id":"sa-5_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"SA-5"},{"name":"sort-id","value":"sa-05"}],"parts":[{"id":"sa-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Obtains administrator documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Secure configuration, installation, and operation of the system, component, or service;"},{"id":"sa-5_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Effective use and maintenance of security functions\/mechanisms; and"},{"id":"sa-5_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Known vulnerabilities regarding configuration and use of administrative (i.e., privileged) functions;"}]},{"id":"sa-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Obtains user documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"User-accessible security functions\/mechanisms and how to effectively use those security functions\/mechanisms;"},{"id":"sa-5_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and"},{"id":"sa-5_smt.b.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"User responsibilities in maintaining the security of the system, component, or service;"}]},{"id":"sa-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent and takes {{ insert: param, sa-5_prm_1 }} in response;"},{"id":"sa-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects documentation as required, in accordance with the risk management strategy; and"},{"id":"sa-5_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Distributes documentation to {{ insert: param, sa-5_prm_2 }}."}]},{"id":"sa-5_gdn","name":"guidance","prose":"This control helps organizational personnel understand the implementation and operation of security controls associated with information systems, system components, and information system services. Organizations consider establishing specific measures to determine the quality\/completeness of the content provided. The inability to obtain needed documentation may occur, for example, due to the age of the information system\/component or lack of support from developers and contractors. In those situations, organizations may need to recreate selected documentation if such documentation is essential to the effective implementation or operation of security controls. The level of protection provided for selected information system, component, or service documentation is commensurate with the security category or classification of the system. For example, documentation associated with a key DoD weapons system or command and control system would typically require a higher level of protection than a routine administrative system. Documentation that addresses information system vulnerabilities may also require an increased level of protection. Secure operation of the information system, includes, for example, initially starting the system and resuming secure system operation after any lapse in system operation.","links":[{"href":"#cm-6","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#ps-2","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-4","rel":"related"}]},{"id":"sa-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-5.a_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)"}],"prose":"obtains administrator documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5.a.1_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)"}],"parts":[{"id":"sa-5.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)[1]"}],"prose":"secure configuration of the system, system component, or service;"},{"id":"sa-5.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)[2]"}],"prose":"secure installation of the system, system component, or service;"},{"id":"sa-5.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)[3]"}],"prose":"secure operation of the system, system component, or service;"}]},{"id":"sa-5.a.2_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)(2)"}],"parts":[{"id":"sa-5.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(a)(2)[1]"}],"prose":"effective use of the security features\/mechanisms;"},{"id":"sa-5.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(a)(2)[2]"}],"prose":"effective maintenance of the security features\/mechanisms;"}]},{"id":"sa-5.a.3_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)(3)"}],"prose":"known vulnerabilities regarding configuration and use of administrative (i.e., privileged) functions;"}]},{"id":"sa-5.b_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)"}],"prose":"obtains user documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5.b.1_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)(1)"}],"parts":[{"id":"sa-5.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(b)(1)[1]"}],"prose":"user-accessible security functions\/mechanisms;"},{"id":"sa-5.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(b)(1)[2]"}],"prose":"how to effectively use those functions\/mechanisms;"}]},{"id":"sa-5.b.2_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)(2)"}],"prose":"methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner;"},{"id":"sa-5.b.3_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)(3)"}],"prose":"user responsibilities in maintaining the security of the system, component, or service;"}]},{"id":"sa-5.c_obj","name":"objective","props":[{"name":"label","value":"SA-5(c)"}],"parts":[{"id":"sa-5.c_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(c)[1]"}],"prose":"defines actions to be taken after documented attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent;"},{"id":"sa-5.c_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(c)[2]"}],"prose":"documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent;"},{"id":"sa-5.c_obj.3","name":"objective","props":[{"name":"label","value":"SA-5(c)[3]"}],"prose":"takes organization-defined actions in response;"}]},{"id":"sa-5.d_obj","name":"objective","props":[{"name":"label","value":"SA-5(d)"}],"prose":"protects documentation as required, in accordance with the risk management strategy;"},{"id":"sa-5.e_obj","name":"objective","props":[{"name":"label","value":"SA-5(e)"}],"parts":[{"id":"sa-5.e_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(e)[1]"}],"prose":"defines personnel or roles to whom documentation is to be distributed; and"},{"id":"sa-5.e_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(e)[2]"}],"prose":"distributes documentation to organization-defined personnel or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing information system documentation\n\ninformation system documentation including administrator and user guides\n\nrecords documenting attempts to obtain unavailable or nonexistent information system documentation\n\nlist of actions to be taken in response to documented attempts to obtain information system, system component, or information system service documentation\n\nrisk management strategy documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\nsystem administrators\n\norganizational personnel operating, using, and\/or maintaining the information system\n\ninformation system developers\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for obtaining, protecting, and distributing information system administrator and user documentation"}]}]},{"id":"sa-8","class":"SP800-53","title":"Security Engineering Principles","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-8"},{"name":"sort-id","value":"sa-08"}],"links":[{"href":"#21b1ed35-56d2-40a8-bdfe-b461fffe322f","rel":"reference"}],"parts":[{"id":"sa-8_smt","name":"statement","prose":"The organization applies information system security engineering principles in the specification, design, development, implementation, and modification of the information system."},{"id":"sa-8_gdn","name":"guidance","prose":"Organizations apply security engineering principles primarily to new development information systems or systems undergoing major upgrades. For legacy systems, organizations apply security engineering principles to system upgrades and modifications to the extent feasible, given the current state of hardware, software, and firmware within those systems. Security engineering principles include, for example: (i) developing layered protections; (ii) establishing sound security policy, architecture, and controls as the foundation for design; (iii) incorporating security requirements into the system development life cycle; (iv) delineating physical and logical security boundaries; (v) ensuring that system developers are trained on how to build secure software; (vi) tailoring security controls to meet organizational and operational needs; (vii) performing threat modeling to identify use cases, threat agents, attack vectors, and attack patterns as well as compensating controls and design patterns needed to mitigate risk; and (viii) reducing risk to acceptable levels, thus enabling informed risk management decisions.","links":[{"href":"#pm-7","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-17","rel":"related"},{"href":"#sc-2","rel":"related"},{"href":"#sc-3","rel":"related"}]},{"id":"sa-8_obj","name":"objective","prose":"Determine if the organization applies information system security engineering principles in:","parts":[{"id":"sa-8_obj.1","name":"objective","props":[{"name":"label","value":"SA-8[1]"}],"prose":"the specification of the information system;"},{"id":"sa-8_obj.2","name":"objective","props":[{"name":"label","value":"SA-8[2]"}],"prose":"the design of the information system;"},{"id":"sa-8_obj.3","name":"objective","props":[{"name":"label","value":"SA-8[3]"}],"prose":"the development of the information system;"},{"id":"sa-8_obj.4","name":"objective","props":[{"name":"label","value":"SA-8[4]"}],"prose":"the implementation of the information system; and"},{"id":"sa-8_obj.5","name":"objective","props":[{"name":"label","value":"SA-8[5]"}],"prose":"the modification of the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing security engineering principles used in the specification, design, development, implementation, and modification of the information system\n\ninformation system design documentation\n\ninformation security requirements and specifications for the information system\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\norganizational personnel with information system specification, design, development, implementation, and modification responsibilities\n\ninformation system developers\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for applying security engineering principles in information system specification, design, development, implementation, and modification\n\nautomated mechanisms supporting the application of security engineering principles in information system specification, design, development, implementation, and modification"}]}]},{"id":"sa-9","class":"SP800-53","title":"External Information System Services","params":[{"id":"sa-9_prm_1","label":"organization-defined security controls"},{"id":"sa-9_prm_2","label":"organization-defined processes, methods, and techniques"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-9"},{"name":"sort-id","value":"sa-09"}],"links":[{"href":"#0c775bc3-bfc3-42c7-a382-88949f503171","rel":"reference"}],"parts":[{"id":"sa-9_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Requires that providers of external information system services comply with organizational information security requirements and employ {{ insert: param, sa-9_prm_1 }} in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"},{"id":"sa-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Defines and documents government oversight and user roles and responsibilities with regard to external information system services; and"},{"id":"sa-9_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Employs {{ insert: param, sa-9_prm_2 }} to monitor security control compliance by external service providers on an ongoing basis."}]},{"id":"sa-9_gdn","name":"guidance","prose":"External information system services are services that are implemented outside of the authorization boundaries of organizational information systems. This includes services that are used by, but not a part of, organizational information systems. FISMA and OMB policy require that organizations using external service providers that are processing, storing, or transmitting federal information or operating information systems on behalf of the federal government ensure that such providers meet the same security requirements that federal agencies are required to meet. Organizations establish relationships with external service providers in a variety of ways including, for example, through joint ventures, business partnerships, contracts, interagency agreements, lines of business arrangements, licensing agreements, and supply chain exchanges. The responsibility for managing risks from the use of external information system services remains with authorizing officials. For services external to organizations, a chain of trust requires that organizations establish and retain a level of confidence that each participating provider in the potentially complex consumer-provider relationship provides adequate protection for the services rendered. The extent and nature of this chain of trust varies based on the relationships between organizations and the external providers. Organizations document the basis for trust relationships so the relationships can be monitored over time. External information system services documentation includes government, service providers, end user security roles and responsibilities, and service-level agreements. Service-level agreements define expectations of performance for security controls, describe measurable outcomes, and identify remedies and response requirements for identified instances of noncompliance.","links":[{"href":"#ca-3","rel":"related"},{"href":"#ir-7","rel":"related"},{"href":"#ps-7","rel":"related"}]},{"id":"sa-9_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-9.a_obj","name":"objective","props":[{"name":"label","value":"SA-9(a)"}],"parts":[{"id":"sa-9.a_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(a)[1]"}],"prose":"defines security controls to be employed by providers of external information system services;"},{"id":"sa-9.a_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(a)[2]"}],"prose":"requires that providers of external information system services comply with organizational information security requirements;"},{"id":"sa-9.a_obj.3","name":"objective","props":[{"name":"label","value":"SA-9(a)[3]"}],"prose":"requires that providers of external information system services employ organization-defined security controls in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"}]},{"id":"sa-9.b_obj","name":"objective","props":[{"name":"label","value":"SA-9(b)"}],"parts":[{"id":"sa-9.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(b)[1]"}],"prose":"defines and documents government oversight with regard to external information system services;"},{"id":"sa-9.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(b)[2]"}],"prose":"defines and documents user roles and responsibilities with regard to external information system services;"}]},{"id":"sa-9.c_obj","name":"objective","props":[{"name":"label","value":"SA-9(c)"}],"parts":[{"id":"sa-9.c_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(c)[1]"}],"prose":"defines processes, methods, and techniques to be employed to monitor security control compliance by external service providers; and"},{"id":"sa-9.c_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(c)[2]"}],"prose":"employs organization-defined processes, methods, and techniques to monitor security control compliance by external service providers on an ongoing basis."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing external information system services\n\nprocedures addressing methods and techniques for monitoring security control compliance by external service providers of information system services\n\nacquisition contracts, service-level agreements\n\norganizational security requirements and security specifications for external provider services\n\nsecurity control assessment evidence from external providers of information system services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\nexternal providers of information system services\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring security control compliance by external service providers on an ongoing basis\n\nautomated mechanisms for monitoring security control compliance by external service providers on an ongoing basis"}]}],"controls":[{"id":"sa-9.2","class":"SP800-53-enhancement","title":"Identification of Functions \/ Ports \/ Protocols \/ Services","params":[{"id":"sa-9.2_prm_1","label":"organization-defined external information system services"}],"props":[{"name":"label","value":"SA-9(2)"},{"name":"sort-id","value":"sa-09.02"}],"parts":[{"id":"sa-9.2_smt","name":"statement","prose":"The organization requires providers of {{ insert: param, sa-9.2_prm_1 }} to identify the functions, ports, protocols, and other services required for the use of such services."},{"id":"sa-9.2_gdn","name":"guidance","prose":"Information from external service providers regarding the specific functions, ports, protocols, and services used in the provision of such services can be particularly useful when the need arises to understand the trade-offs involved in restricting certain functions\/services or blocking certain ports\/protocols.","links":[{"href":"#cm-7","rel":"related"}]},{"id":"sa-9.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-9.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(2)[1]"}],"prose":"defines external information system services for which providers of such services are to identify the functions, ports, protocols, and other services required for the use of such services;"},{"id":"sa-9.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(2)[2]"}],"prose":"requires providers of organization-defined external information system services to identify:","parts":[{"id":"sa-9.2_obj.2.a","name":"objective","props":[{"name":"label","value":"SA-9(2)[2][a]"}],"prose":"the functions required for the use of such services;"},{"id":"sa-9.2_obj.2.b","name":"objective","props":[{"name":"label","value":"SA-9(2)[2][b]"}],"prose":"the ports required for the use of such services;"},{"id":"sa-9.2_obj.2.c","name":"objective","props":[{"name":"label","value":"SA-9(2)[2][c]"}],"prose":"the protocols required for the use of such services; and"},{"id":"sa-9.2_obj.2.d","name":"objective","props":[{"name":"label","value":"SA-9(2)[2][d]"}],"prose":"the other services required for the use of such services."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing external information system services\n\nacquisition contracts for the information system, system component, or information system service\n\nacquisition documentation\n\nsolicitation documentation, service-level agreements\n\norganizational security requirements and security specifications for external service providers\n\nlist of required functions, ports, protocols, and other services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nexternal providers of information system services"}]}]}]},{"id":"sa-10","class":"SP800-53","title":"Developer Configuration Management","params":[{"id":"sa-10_prm_1","select":{"how-many":"one-or-more","choice":["design","development","implementation","operation"]}},{"id":"sa-10_prm_2","label":"organization-defined configuration items under configuration management"},{"id":"sa-10_prm_3","label":"organization-defined personnel"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-10"},{"name":"sort-id","value":"sa-10"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"sa-10_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to:","parts":[{"id":"sa-10_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Perform configuration management during system, component, or service {{ insert: param, sa-10_prm_1 }};"},{"id":"sa-10_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Document, manage, and control the integrity of changes to {{ insert: param, sa-10_prm_2 }};"},{"id":"sa-10_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Implement only organization-approved changes to the system, component, or service;"},{"id":"sa-10_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Document approved changes to the system, component, or service and the potential security impacts of such changes; and"},{"id":"sa-10_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Track security flaws and flaw resolution within the system, component, or service and report findings to {{ insert: param, sa-10_prm_3 }}."}]},{"id":"sa-10_gdn","name":"guidance","prose":"This control also applies to organizations conducting internal information systems development and integration. Organizations consider the quality and completeness of the configuration management activities conducted by developers as evidence of applying effective security safeguards. Safeguards include, for example, protecting from unauthorized modification or destruction, the master copies of all material used to generate security-relevant portions of the system hardware, software, and firmware. Maintaining the integrity of changes to the information system, information system component, or information system service requires configuration control throughout the system development life cycle to track authorized changes and prevent unauthorized changes. Configuration items that are placed under configuration management (if existence\/use is required by other security controls) include: the formal model; the functional, high-level, and low-level design specifications; other design data; implementation documentation; source code and hardware schematics; the running version of the object code; tools for comparing new versions of security-relevant hardware descriptions and software\/firmware source code with previous versions; and test fixtures and documentation. Depending on the mission\/business needs of organizations and the nature of the contractual relationships in place, developers may provide configuration management support during the operations and maintenance phases of the life cycle.","links":[{"href":"#cm-3","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"sa-10_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-10.a_obj","name":"objective","props":[{"name":"label","value":"SA-10(a)"}],"prose":"requires the developer of the information system, system component, or information system service to perform configuration management during one or more of the following:","parts":[{"id":"sa-10.a_obj.1","name":"objective","props":[{"name":"label","value":"SA-10(a)[1]"}],"prose":"system, component, or service design;"},{"id":"sa-10.a_obj.2","name":"objective","props":[{"name":"label","value":"SA-10(a)[2]"}],"prose":"system, component, or service development;"},{"id":"sa-10.a_obj.3","name":"objective","props":[{"name":"label","value":"SA-10(a)[3]"}],"prose":"system, component, or service implementation; and\/or"},{"id":"sa-10.a_obj.4","name":"objective","props":[{"name":"label","value":"SA-10(a)[4]"}],"prose":"system, component, or service operation;"}]},{"id":"sa-10.b_obj","name":"objective","props":[{"name":"label","value":"SA-10(b)"}],"parts":[{"id":"sa-10.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-10(b)[1]"}],"prose":"defines configuration items to be placed under configuration management;"},{"id":"sa-10.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-10(b)[2]"}],"prose":"requires the developer of the information system, system component, or information system service to:","parts":[{"id":"sa-10.b_obj.2.a","name":"objective","props":[{"name":"label","value":"SA-10(b)[2][a]"}],"prose":"document the integrity of changes to organization-defined items under configuration management;"},{"id":"sa-10.b_obj.2.b","name":"objective","props":[{"name":"label","value":"SA-10(b)[2][b]"}],"prose":"manage the integrity of changes to organization-defined items under configuration management;"},{"id":"sa-10.b_obj.2.c","name":"objective","props":[{"name":"label","value":"SA-10(b)[2][c]"}],"prose":"control the integrity of changes to organization-defined items under configuration management;"}]}]},{"id":"sa-10.c_obj","name":"objective","props":[{"name":"label","value":"SA-10(c)"}],"prose":"requires the developer of the information system, system component, or information system service to implement only organization-approved changes to the system, component, or service;"},{"id":"sa-10.d_obj","name":"objective","props":[{"name":"label","value":"SA-10(d)"}],"prose":"requires the developer of the information system, system component, or information system service to document:","parts":[{"id":"sa-10.d_obj.1","name":"objective","props":[{"name":"label","value":"SA-10(d)[1]"}],"prose":"approved changes to the system, component, or service;"},{"id":"sa-10.d_obj.2","name":"objective","props":[{"name":"label","value":"SA-10(d)[2]"}],"prose":"the potential security impacts of such changes;"}]},{"id":"sa-10.e_obj","name":"objective","props":[{"name":"label","value":"SA-10(e)"}],"parts":[{"id":"sa-10.e_obj.1","name":"objective","props":[{"name":"label","value":"SA-10(e)[1]"}],"prose":"defines personnel to whom findings, resulting from security flaws and flaw resolution tracked within the system, component, or service, are to be reported;"},{"id":"sa-10.e_obj.2","name":"objective","props":[{"name":"label","value":"SA-10(e)[2]"}],"prose":"requires the developer of the information system, system component, or information system service to:","parts":[{"id":"sa-10.e_obj.2.a","name":"objective","props":[{"name":"label","value":"SA-10(e)[2][a]"}],"prose":"track security flaws within the system, component, or service;"},{"id":"sa-10.e_obj.2.b","name":"objective","props":[{"name":"label","value":"SA-10(e)[2][b]"}],"prose":"track security flaw resolution within the system, component, or service; and"},{"id":"sa-10.e_obj.2.c","name":"objective","props":[{"name":"label","value":"SA-10(e)[2][c]"}],"prose":"report findings to organization-defined personnel."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing system developer configuration management\n\nsolicitation documentation\n\nacquisition documentation\n\nservice-level agreements\n\nacquisition contracts for the information system, system component, or information system service\n\nsystem developer configuration management plan\n\nsecurity flaw and flaw resolution tracking records\n\nsystem change authorization records\n\nchange control records\n\nconfiguration management records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with configuration management responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring developer configuration management\n\nautomated mechanisms supporting and\/or implementing the monitoring of developer configuration management"}]}]},{"id":"sa-11","class":"SP800-53","title":"Developer Security Testing and Evaluation","params":[{"id":"sa-11_prm_1","select":{"how-many":"one-or-more","choice":["unit","integration","system","regression"]}},{"id":"sa-11_prm_2","label":"organization-defined depth and coverage"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-11"},{"name":"sort-id","value":"sa-11"}],"links":[{"href":"#1737a687-52fb-4008-b900-cbfa836f7b65","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#275cc052-0f7f-423c-bdb6-ed503dc36228","rel":"reference"},{"href":"#15522e92-9192-463d-9646-6a01982db8ca","rel":"reference"},{"href":"#0931209f-00ae-4132-b92c-bc645847e8f9","rel":"reference"},{"href":"#4ef539ba-b767-4666-b0d3-168c53005fa3","rel":"reference"}],"parts":[{"id":"sa-11_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to:","parts":[{"id":"sa-11_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Create and implement a security assessment plan;"},{"id":"sa-11_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Perform {{ insert: param, sa-11_prm_1 }} testing\/evaluation at {{ insert: param, sa-11_prm_2 }};"},{"id":"sa-11_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Produce evidence of the execution of the security assessment plan and the results of the security testing\/evaluation;"},{"id":"sa-11_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Implement a verifiable flaw remediation process; and"},{"id":"sa-11_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Correct flaws identified during security testing\/evaluation."}]},{"id":"sa-11_gdn","name":"guidance","prose":"Developmental security testing\/evaluation occurs at all post-design phases of the system development life cycle. Such testing\/evaluation confirms that the required security controls are implemented correctly, operating as intended, enforcing the desired security policy, and meeting established security requirements. Security properties of information systems may be affected by the interconnection of system components or changes to those components. These interconnections or changes (e.g., upgrading or replacing applications and operating systems) may adversely affect previously implemented security controls. This control provides additional types of security testing\/evaluation that developers can conduct to reduce or eliminate potential flaws. Testing custom software applications may require approaches such as static analysis, dynamic analysis, binary analysis, or a hybrid of the three approaches. Developers can employ these analysis approaches in a variety of tools (e.g., web-based application scanners, static analysis tools, binary analyzers) and in source code reviews. Security assessment plans provide the specific activities that developers plan to carry out including the types of analyses, testing, evaluation, and reviews of software and firmware components, the degree of rigor to be applied, and the types of artifacts produced during those processes. The depth of security testing\/evaluation refers to the rigor and level of detail associated with the assessment process (e.g., black box, gray box, or white box testing). The coverage of security testing\/evaluation refers to the scope (i.e., number and type) of the artifacts included in the assessment process. Contracts specify the acceptance criteria for security assessment plans, flaw remediation processes, and the evidence that the plans\/processes have been diligently applied. Methods for reviewing and protecting assessment plans, evidence, and documentation are commensurate with the security category or classification level of the information system. Contracts may specify documentation protection requirements.","links":[{"href":"#ca-2","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"sa-11_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-11.a_obj","name":"objective","props":[{"name":"label","value":"SA-11(a)"}],"prose":"requires the developer of the information system, system component, or information system service to create and implement a security plan;"},{"id":"sa-11.b_obj","name":"objective","props":[{"name":"label","value":"SA-11(b)"}],"parts":[{"id":"sa-11.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-11(b)[1]"}],"prose":"defines the depth of testing\/evaluation to be performed by the developer of the information system, system component, or information system service;"},{"id":"sa-11.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-11(b)[2]"}],"prose":"defines the coverage of testing\/evaluation to be performed by the developer of the information system, system component, or information system service;"},{"id":"sa-11.b_obj.3","name":"objective","props":[{"name":"label","value":"SA-11(b)[3]"}],"prose":"requires the developer of the information system, system component, or information system service to perform one or more of the following testing\/evaluation at the organization-defined depth and coverage:","parts":[{"id":"sa-11.b_obj.3.a","name":"objective","props":[{"name":"label","value":"SA-11(b)[3][a]"}],"prose":"unit testing\/evaluation;"},{"id":"sa-11.b_obj.3.b","name":"objective","props":[{"name":"label","value":"SA-11(b)[3][b]"}],"prose":"integration testing\/evaluation;"},{"id":"sa-11.b_obj.3.c","name":"objective","props":[{"name":"label","value":"SA-11(b)[3][c]"}],"prose":"system testing\/evaluation; and\/or"},{"id":"sa-11.b_obj.3.d","name":"objective","props":[{"name":"label","value":"SA-11(b)[3][d]"}],"prose":"regression testing\/evaluation;"}]}]},{"id":"sa-11.c_obj","name":"objective","props":[{"name":"label","value":"SA-11(c)"}],"prose":"requires the developer of the information system, system component, or information system service to produce evidence of:","parts":[{"id":"sa-11.c_obj.1","name":"objective","props":[{"name":"label","value":"SA-11(c)[1]"}],"prose":"the execution of the security assessment plan;"},{"id":"sa-11.c_obj.2","name":"objective","props":[{"name":"label","value":"SA-11(c)[2]"}],"prose":"the results of the security testing\/evaluation;"}]},{"id":"sa-11.d_obj","name":"objective","props":[{"name":"label","value":"SA-11(d)"}],"prose":"requires the developer of the information system, system component, or information system service to implement a verifiable flaw remediation process; and"},{"id":"sa-11.e_obj","name":"objective","props":[{"name":"label","value":"SA-11(e)"}],"prose":"requires the developer of the information system, system component, or information system service to correct flaws identified during security testing\/evaluation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing system developer security testing\n\nprocedures addressing flaw remediation\n\nsolicitation documentation\n\nacquisition documentation\n\nservice-level agreements\n\nacquisition contracts for the information system, system component, or information system service\n\nsystem developer security test plans\n\nrecords of developer security testing results for the information system, system component, or information system service\n\nsecurity flaw and remediation tracking records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with developer security testing responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring developer security testing and evaluation\n\nautomated mechanisms supporting and\/or implementing the monitoring of developer security testing and evaluation"}]}]},{"id":"sa-12","class":"SP800-53","title":"Supply Chain Protection","params":[{"id":"sa-12_prm_1","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-12"},{"name":"sort-id","value":"sa-12"}],"links":[{"href":"#8ab6bcdc-339b-4068-b45e-994814a6e187","rel":"reference"},{"href":"#bdd2f49e-edf7-491f-a178-4487898228f3","rel":"reference"}],"parts":[{"id":"sa-12_smt","name":"statement","prose":"The organization protects against supply chain threats to the information system, system component, or information system service by employing {{ insert: param, sa-12_prm_1 }} as part of a comprehensive, defense-in-breadth information security strategy."},{"id":"sa-12_gdn","name":"guidance","prose":"Information systems (including system components that compose those systems) need to be protected throughout the system development life cycle (i.e., during design, development, manufacturing, packaging, assembly, distribution, system integration, operations, maintenance, and retirement). Protection of organizational information systems is accomplished through threat awareness, by the identification, management, and reduction of vulnerabilities at each phase of the life cycle and the use of complementary, mutually reinforcing strategies to respond to risk. Organizations consider implementing a standardized process to address supply chain risk with respect to information systems and system components, and to educate the acquisition workforce on threats, risk, and required security controls. Organizations use the acquisition\/procurement processes to require supply chain entities to implement necessary security safeguards to: (i) reduce the likelihood of unauthorized modifications at each stage in the supply chain; and (ii) protect information systems and information system components, prior to taking delivery of such systems\/components. This control also applies to information system services. Security safeguards include, for example: (i) security controls for development systems, development facilities, and external connections to development systems; (ii) vetting development personnel; and (iii) use of tamper-evident packaging during shipping\/warehousing. Methods for reviewing and protecting development plans, evidence, and documentation are commensurate with the security category or classification level of the information system. Contracts may specify documentation protection requirements.","links":[{"href":"#at-3","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#pe-16","rel":"related"},{"href":"#pl-8","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#sa-14","rel":"related"},{"href":"#sa-15","rel":"related"},{"href":"#sa-18","rel":"related"},{"href":"#sa-19","rel":"related"},{"href":"#sc-29","rel":"related"},{"href":"#sc-30","rel":"related"},{"href":"#sc-38","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"sa-12_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-12_obj.1","name":"objective","props":[{"name":"label","value":"SA-12[1]"}],"prose":"defines security safeguards to be employed to protect against supply chain threats to the information system, system component, or information system service; and"},{"id":"sa-12_obj.2","name":"objective","props":[{"name":"label","value":"SA-12[2]"}],"prose":"protects against supply chain threats to the information system, system component, or information system service by employing organization-defined security safeguards as part of a comprehensive, defense-in-breadth information security strategy."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing supply chain protection\n\nprocedures addressing the integration of information security requirements into the acquisition process\n\nsolicitation documentation\n\nacquisition documentation\n\nservice-level agreements\n\nacquisition contracts for the information system, system component, or information system service\n\nlist of supply chain threats\n\nlist of security safeguards to be taken against supply chain threats\n\nsystem development life cycle documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with supply chain protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for defining safeguards for and protecting against supply chain threats\n\nautomated mechanisms supporting and\/or implementing safeguards for supply chain threats"}]}]},{"id":"sa-15","class":"SP800-53","title":"Development Process, Standards, and Tools","params":[{"id":"sa-15_prm_1","label":"organization-defined frequency"},{"id":"sa-15_prm_2","label":"organization-defined security requirements"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"SA-15"},{"name":"sort-id","value":"sa-15"}],"parts":[{"id":"sa-15_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-15_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Requires the developer of the information system, system component, or information system service to follow a documented development process that:","parts":[{"id":"sa-15_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Explicitly addresses security requirements;"},{"id":"sa-15_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Identifies the standards and tools used in the development process;"},{"id":"sa-15_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Documents the specific tool options and tool configurations used in the development process; and"},{"id":"sa-15_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Documents, manages, and ensures the integrity of changes to the process and\/or tools used in development; and"}]},{"id":"sa-15_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews the development process, standards, tools, and tool options\/configurations {{ insert: param, sa-15_prm_1 }} to determine if the process, standards, tools, and tool options\/configurations selected and employed can satisfy {{ insert: param, sa-15_prm_2 }}."}]},{"id":"sa-15_gdn","name":"guidance","prose":"Development tools include, for example, programming languages and computer-aided design (CAD) systems. Reviews of development processes can include, for example, the use of maturity models to determine the potential effectiveness of such processes. Maintaining the integrity of changes to tools and processes enables accurate supply chain risk assessment and mitigation, and requires robust configuration control throughout the life cycle (including design, development, transport, delivery, integration, and maintenance) to track authorized changes and prevent unauthorized changes.","links":[{"href":"#sa-3","rel":"related"},{"href":"#sa-8","rel":"related"}]},{"id":"sa-15_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-15.a_obj","name":"objective","props":[{"name":"label","value":"SA-15(a)"}],"prose":"requires the developer of the information system, system component, or information system service to follow a documented development process that:","parts":[{"id":"sa-15.a.1_obj","name":"objective","props":[{"name":"label","value":"SA-15(a)(1)"}],"prose":"explicitly addresses security requirements;"},{"id":"sa-15.a.2_obj","name":"objective","props":[{"name":"label","value":"SA-15(a)(2)"}],"prose":"identifies the standards and tools used in the development process;"},{"id":"sa-15.a.3_obj","name":"objective","props":[{"name":"label","value":"SA-15(a)(3)"}],"parts":[{"id":"sa-15.a.3_obj.1","name":"objective","props":[{"name":"label","value":"SA-15(a)(3)[1]"}],"prose":"documents the specific tool options used in the development process;"},{"id":"sa-15.a.3_obj.2","name":"objective","props":[{"name":"label","value":"SA-15(a)(3)[2]"}],"prose":"documents the specific tool configurations used in the development process;"}]},{"id":"sa-15.a.4_obj","name":"objective","props":[{"name":"label","value":"SA-15(a)(4)"}],"parts":[{"id":"sa-15.a.4_obj.1","name":"objective","props":[{"name":"label","value":"SA-15(a)(4)[1]"}],"prose":"documents changes to the process and\/or tools used in the development;"},{"id":"sa-15.a.4_obj.2","name":"objective","props":[{"name":"label","value":"SA-15(a)(4)[2]"}],"prose":"manages changes to the process and\/or tools used in the development;"},{"id":"sa-15.a.4_obj.3","name":"objective","props":[{"name":"label","value":"SA-15(a)(4)[3]"}],"prose":"ensures the integrity of changes to the process and\/or tools used in the development;"}]}]},{"id":"sa-15.b_obj","name":"objective","props":[{"name":"label","value":"SA-15(b)"}],"parts":[{"id":"sa-15.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-15(b)[1]"}],"prose":"defines a frequency to review the development process, standards, tools, and tool options\/configurations;"},{"id":"sa-15.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-15(b)[2]"}],"prose":"defines security requirements to be satisfied by the process, standards, tools, and tool option\/configurations selected and employed; and"},{"id":"sa-15.b_obj.3","name":"objective","props":[{"name":"label","value":"SA-15(b)[3]"}],"parts":[{"id":"sa-15.b_obj.3.a","name":"objective","props":[{"name":"label","value":"SA-15(b)[3][a]"}],"prose":"reviews the development process with the organization-defined frequency to determine if the process selected and employed can satisfy organization-defined security requirements;"},{"id":"sa-15.b_obj.3.b","name":"objective","props":[{"name":"label","value":"SA-15(b)[3][b]"}],"prose":"reviews the development standards with the organization-defined frequency to determine if the standards selected and employed can satisfy organization-defined security requirements;"},{"id":"sa-15.b_obj.3.c","name":"objective","props":[{"name":"label","value":"SA-15(b)[3][c]"}],"prose":"reviews the development tools with the organization-defined frequency to determine if the tools selected and employed can satisfy organization-defined security requirements; and"},{"id":"sa-15.b_obj.3.d","name":"objective","props":[{"name":"label","value":"SA-15(b)[3][d]"}],"prose":"reviews the development tool options\/configurations with the organization-defined frequency to determine if the tool options\/configurations selected and employed can satisfy organization-defined security requirements."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing development process, standards, and tools\n\nprocedures addressing the integration of security requirements during the development process\n\nsolicitation documentation\n\nacquisition documentation\n\nservice-level agreements\n\nacquisition contracts for the information system, system component, or information system service\n\nsystem developer documentation listing tool options\/configuration guides, configuration management records\n\nchange control records\n\nconfiguration control records\n\ndocumented reviews of development process, standards, tools, and tool options\/configurations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]}]},{"id":"sa-16","class":"SP800-53","title":"Developer-provided Training","params":[{"id":"sa-16_prm_1","label":"organization-defined training"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"SA-16"},{"name":"sort-id","value":"sa-16"}],"parts":[{"id":"sa-16_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to provide {{ insert: param, sa-16_prm_1 }} on the correct use and operation of the implemented security functions, controls, and\/or mechanisms."},{"id":"sa-16_gdn","name":"guidance","prose":"This control applies to external and internal (in-house) developers. Training of personnel is an essential element to ensure the effectiveness of security controls implemented within organizational information systems. Training options include, for example, classroom-style training, web-based\/computer-based training, and hands-on training. Organizations can also request sufficient training materials from developers to conduct in-house training or offer self-training to organizational personnel. Organizations determine the type of training necessary and may require different types of training for different security functions, controls, or mechanisms.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#sa-5","rel":"related"}]},{"id":"sa-16_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-16_obj.1","name":"objective","props":[{"name":"label","value":"SA-16[1]"}],"prose":"defines training to be provided by the developer of the information system, system component, or information system service; and"},{"id":"sa-16_obj.2","name":"objective","props":[{"name":"label","value":"SA-16[2]"}],"prose":"requires the developer of the information system, system component, or information system service to provide organization-defined training on the correct use and operation of the implemented security functions, controls, and\/or mechanisms."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing developer-provided training\n\nsolicitation documentation\n\nacquisition documentation\n\nservice-level agreements\n\nacquisition contracts for the information system, system component, or information system service\n\ndeveloper-provided training materials\n\ntraining records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information system security responsibilities\n\nsystem developer\n\norganizational or third-party developers with training responsibilities for the information system, system component, or information system service"}]}]},{"id":"sa-17","class":"SP800-53","title":"Developer Security Architecture and Design","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-17"},{"name":"sort-id","value":"sa-17"}],"parts":[{"id":"sa-17_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to produce a design specification and security architecture that:","parts":[{"id":"sa-17_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Is consistent with and supportive of the organization’s security architecture which is established within and is an integrated part of the organization’s enterprise architecture;"},{"id":"sa-17_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Accurately and completely describes the required security functionality, and the allocation of security controls among physical and logical components; and"},{"id":"sa-17_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Expresses how individual security functions, mechanisms, and services work together to provide required security capabilities and a unified approach to protection."}]},{"id":"sa-17_gdn","name":"guidance","prose":"This control is primarily directed at external developers, although it could also be used for internal (in-house) development. In contrast, PL-8 is primarily directed at internal developers to help ensure that organizations develop an information security architecture and such security architecture is integrated or tightly coupled to the enterprise architecture. This distinction is important if\/when organizations outsource the development of information systems, information system components, or information system services to external entities, and there is a requirement to demonstrate consistency with the organization’s enterprise architecture and information security architecture.","links":[{"href":"#pl-8","rel":"related"},{"href":"#pm-7","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-8","rel":"related"}]},{"id":"sa-17_obj","name":"objective","prose":"Determine if the organization requires the developer of the information system, system component, or information system service to produce a design specification and security architecture that:","parts":[{"id":"sa-17.a_obj","name":"objective","props":[{"name":"label","value":"SA-17(a)"}],"prose":"is consistent with and supportive of the organization’s security architecture which is established within and is an integrated part of the organization’s enterprise architecture;"},{"id":"sa-17.b_obj","name":"objective","props":[{"name":"label","value":"SA-17(b)"}],"prose":"accurately and completely describes:","parts":[{"id":"sa-17.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-17(b)[1]"}],"prose":"the required security functionality;"},{"id":"sa-17.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-17(b)[2]"}],"prose":"the allocation of security controls among physical and logical components; and"}]},{"id":"sa-17.c_obj","name":"objective","props":[{"name":"label","value":"SA-17(c)"}],"prose":"expresses how individual security functions, mechanisms, and services work together to provide required security capabilities and a unified approach to protection."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nenterprise architecture policy\n\nprocedures addressing developer security architecture and design specification for the information system\n\nsolicitation documentation\n\nacquisition documentation\n\nservice-level agreements\n\nacquisition contracts for the information system, system component, or information system service\n\ndesign specification and security architecture documentation for the system\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with security architecture and design responsibilities"}]}]}]},{"id":"sc","class":"family","title":"System and Communications Protection","controls":[{"id":"sc-1","class":"SP800-53","title":"System and Communications Protection Policy and Procedures","params":[{"id":"sc-1_prm_1","label":"organization-defined personnel or roles"},{"id":"sc-1_prm_2","label":"organization-defined frequency"},{"id":"sc-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-1"},{"name":"sort-id","value":"sc-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"sc-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"sc-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, sc-1_prm_1 }}:","parts":[{"id":"sc-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"sc-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls; and"}]},{"id":"sc-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"sc-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System and communications protection policy {{ insert: param, sc-1_prm_2 }}; and"},{"id":"sc-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System and communications protection procedures {{ insert: param, sc-1_prm_3 }}."}]}]},{"id":"sc-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the SC family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"sc-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-1.a_obj","name":"objective","props":[{"name":"label","value":"SC-1(a)"}],"parts":[{"id":"sc-1.a.1_obj","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)"}],"parts":[{"id":"sc-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1]"}],"prose":"develops and documents a system and communications protection policy that addresses:","parts":[{"id":"sc-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"sc-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"sc-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"sc-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"sc-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"sc-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"sc-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"sc-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system and communications protection policy is to be disseminated;"},{"id":"sc-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[3]"}],"prose":"disseminates the system and communications protection policy to organization-defined personnel or roles;"}]},{"id":"sc-1.a.2_obj","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)"}],"parts":[{"id":"sc-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls;"},{"id":"sc-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"sc-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"sc-1.b_obj","name":"objective","props":[{"name":"label","value":"SC-1(b)"}],"parts":[{"id":"sc-1.b.1_obj","name":"objective","props":[{"name":"label","value":"SC-1(b)(1)"}],"parts":[{"id":"sc-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system and communications protection policy;"},{"id":"sc-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(b)(1)[2]"}],"prose":"reviews and updates the current system and communications protection policy with the organization-defined frequency;"}]},{"id":"sc-1.b.2_obj","name":"objective","props":[{"name":"label","value":"SC-1(b)(2)"}],"parts":[{"id":"sc-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system and communications protection procedures; and"},{"id":"sc-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(b)(2)[2]"}],"prose":"reviews and updates the current system and communications protection procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and communications protection responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"sc-2","class":"SP800-53","title":"Application Partitioning","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-2"},{"name":"sort-id","value":"sc-02"}],"parts":[{"id":"sc-2_smt","name":"statement","prose":"The information system separates user functionality (including user interface services) from information system management functionality."},{"id":"sc-2_gdn","name":"guidance","prose":"Information system management functionality includes, for example, functions necessary to administer databases, network components, workstations, or servers, and typically requires privileged user access. The separation of user functionality from information system management functionality is either physical or logical. Organizations implement separation of system management-related functionality from user functionality by using different computers, different central processing units, different instances of operating systems, different network addresses, virtualization techniques, or combinations of these or other methods, as appropriate. This type of separation includes, for example, web administrative interfaces that use separate authentication methods for users of any other information system resources. Separation of system and user functionality may include isolating administrative interfaces on different domains and with additional access controls.","links":[{"href":"#sa-4","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sc-3","rel":"related"}]},{"id":"sc-2_obj","name":"objective","prose":"Determine if the information system separates user functionality (including user interface services) from information system management functionality."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing application partitioning\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Separation of user functionality from information system management functionality"}]}]},{"id":"sc-3","class":"SP800-53","title":"Security Function Isolation","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-3"},{"name":"sort-id","value":"sc-03"}],"parts":[{"id":"sc-3_smt","name":"statement","prose":"The information system isolates security functions from nonsecurity functions."},{"id":"sc-3_gdn","name":"guidance","prose":"The information system isolates security functions from nonsecurity functions by means of an isolation boundary (implemented via partitions and domains). Such isolation controls access to and protects the integrity of the hardware, software, and firmware that perform those security functions. Information systems implement code separation (i.e., separation of security functions from nonsecurity functions) in a number of ways, including, for example, through the provision of security kernels via processor rings or processor modes. For non-kernel code, security function isolation is often achieved through file system protections that serve to protect the code on disk, and address space protections that protect executing code. Information systems restrict access to security functions through the use of access control mechanisms and by implementing least privilege capabilities. While the ideal is for all of the code within the security function isolation boundary to only contain security-relevant code, it is sometimes necessary to include nonsecurity functions within the isolation boundary as an exception.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sa-13","rel":"related"},{"href":"#sc-2","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-39","rel":"related"}]},{"id":"sc-3_obj","name":"objective","prose":"Determine if the information system isolates security functions from nonsecurity functions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing security function isolation\n\nlist of security functions to be isolated from nonsecurity functions\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Separation of security functions from nonsecurity functions within the information system"}]}]},{"id":"sc-4","class":"SP800-53","title":"Information in Shared Resources","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-4"},{"name":"sort-id","value":"sc-04"}],"parts":[{"id":"sc-4_smt","name":"statement","prose":"The information system prevents unauthorized and unintended information transfer via shared system resources."},{"id":"sc-4_gdn","name":"guidance","prose":"This control prevents information, including encrypted representations of information, produced by the actions of prior users\/roles (or the actions of processes acting on behalf of prior users\/roles) from being available to any current users\/roles (or current processes) that obtain access to shared system resources (e.g., registers, main memory, hard disks) after those resources have been released back to information systems. The control of information in shared resources is also commonly referred to as object reuse and residual information protection. This control does not address: (i) information remanence which refers to residual representation of data that has been nominally erased or removed; (ii) covert channels (including storage and\/or timing channels) where shared resources are manipulated to violate information flow restrictions; or (iii) components within information systems for which there are only single users\/roles.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#mp-6","rel":"related"}]},{"id":"sc-4_obj","name":"objective","prose":"Determine if the information system prevents unauthorized and unintended information transfer via shared system resources."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing information protection in shared system resources\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms preventing unauthorized and unintended transfer of information via shared system resources"}]}]},{"id":"sc-5","class":"SP800-53","title":"Denial of Service Protection","params":[{"id":"sc-5_prm_1","label":"organization-defined types of denial of service attacks or references to sources for such information"},{"id":"sc-5_prm_2","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-5"},{"name":"sort-id","value":"sc-05"}],"parts":[{"id":"sc-5_smt","name":"statement","prose":"The information system protects against or limits the effects of the following types of denial of service attacks: {{ insert: param, sc-5_prm_1 }} by employing {{ insert: param, sc-5_prm_2 }}."},{"id":"sc-5_gdn","name":"guidance","prose":"A variety of technologies exist to limit, or in some cases, eliminate the effects of denial of service attacks. For example, boundary protection devices can filter certain types of packets to protect information system components on internal organizational networks from being directly affected by denial of service attacks. Employing increased capacity and bandwidth combined with service redundancy may also reduce the susceptibility to denial of service attacks.","links":[{"href":"#sc-6","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"sc-5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-5_obj.1","name":"objective","props":[{"name":"label","value":"SC-5[1]"}],"prose":"the organization defines types of denial of service attacks or reference to source of such information for the information system to protect against or limit the effects;"},{"id":"sc-5_obj.2","name":"objective","props":[{"name":"label","value":"SC-5[2]"}],"prose":"the organization defines security safeguards to be employed by the information system to protect against or limit the effects of organization-defined types of denial of service attacks; and"},{"id":"sc-5_obj.3","name":"objective","props":[{"name":"label","value":"SC-5[3]"}],"prose":"the information system protects against or limits the effects of the organization-defined denial or service attacks (or reference to source for such information) by employing organization-defined security safeguards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing denial of service protection\n\ninformation system design documentation\n\nsecurity plan\n\nlist of denial of services attacks requiring employment of security safeguards to protect against or limit effects of such attacks\n\nlist of security safeguards protecting against or limiting the effects of denial of service attacks\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with incident response responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms protecting against or limiting the effects of denial of service attacks"}]}]},{"id":"sc-7","class":"SP800-53","title":"Boundary Protection","params":[{"id":"sc-7_prm_1","select":{"choice":["physically","logically"]}}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-7"},{"name":"sort-id","value":"sc-07"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#756a8e86-57d5-4701-8382-f7a40439665a","rel":"reference"},{"href":"#99f331f2-a9f0-46c2-9856-a3cbb9b89442","rel":"reference"}],"parts":[{"id":"sc-7_smt","name":"statement","prose":"The information system:","parts":[{"id":"sc-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Monitors and controls communications at the external boundary of the system and at key internal boundaries within the system;"},{"id":"sc-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Implements subnetworks for publicly accessible system components that are {{ insert: param, sc-7_prm_1 }} separated from internal organizational networks; and"},{"id":"sc-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture."}]},{"id":"sc-7_gdn","name":"guidance","prose":"Managed interfaces include, for example, gateways, routers, firewalls, guards, network-based malicious code analysis and virtualization systems, or encrypted tunnels implemented within a security architecture (e.g., routers protecting firewalls or application gateways residing on protected subnetworks). Subnetworks that are physically or logically separated from internal networks are referred to as demilitarized zones or DMZs. Restricting or prohibiting interfaces within organizational information systems includes, for example, restricting external web traffic to designated web servers within managed interfaces and prohibiting external traffic that appears to be spoofing internal addresses. Organizations consider the shared nature of commercial telecommunications services in the implementation of security controls associated with the use of such services. Commercial telecommunications services are commonly based on network components and consolidated management systems shared by all attached commercial customers, and may also include third party-provided access lines and other service elements. Such transmission services may represent sources of increased risk despite contract security provisions.","links":[{"href":"#ac-4","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#cp-8","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"sc-7_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"sc-7.a_obj","name":"objective","props":[{"name":"label","value":"SC-7(a)"}],"parts":[{"id":"sc-7.a_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(a)[1]"}],"prose":"monitors communications at the external boundary of the information system;"},{"id":"sc-7.a_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(a)[2]"}],"prose":"monitors communications at key internal boundaries within the system;"},{"id":"sc-7.a_obj.3","name":"objective","props":[{"name":"label","value":"SC-7(a)[3]"}],"prose":"controls communications at the external boundary of the information system;"},{"id":"sc-7.a_obj.4","name":"objective","props":[{"name":"label","value":"SC-7(a)[4]"}],"prose":"controls communications at key internal boundaries within the system;"}]},{"id":"sc-7.b_obj","name":"objective","props":[{"name":"label","value":"SC-7(b)"}],"prose":"implements subnetworks for publicly accessible system components that are either:","parts":[{"id":"sc-7.b_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(b)[1]"}],"prose":"physically separated from internal organizational networks; and\/or"},{"id":"sc-7.b_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(b)[2]"}],"prose":"logically separated from internal organizational networks; and"}]},{"id":"sc-7.c_obj","name":"objective","props":[{"name":"label","value":"SC-7(c)"}],"prose":"connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\nlist of key internal boundaries of the information system\n\ninformation system design documentation\n\nboundary protection hardware and software\n\ninformation system configuration settings and associated documentation\n\nenterprise security architecture documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing boundary protection capability"}]}],"controls":[{"id":"sc-7.3","class":"SP800-53-enhancement","title":"Access Points","props":[{"name":"label","value":"SC-7(3)"},{"name":"sort-id","value":"sc-07.03"}],"parts":[{"id":"sc-7.3_smt","name":"statement","prose":"The organization limits the number of external network connections to the information system."},{"id":"sc-7.3_gdn","name":"guidance","prose":"Limiting the number of external network connections facilitates more comprehensive monitoring of inbound and outbound communications traffic. The Trusted Internet Connection (TIC) initiative is an example of limiting the number of external network connections."},{"id":"sc-7.3_obj","name":"objective","prose":"Determine if the organization limits the number of external network connections to the information system."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\ninformation system design documentation\n\nboundary protection hardware and software\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\ncommunications and network traffic monitoring logs\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing boundary protection capability\n\nautomated mechanisms limiting the number of external network connections to the information system"}]}]},{"id":"sc-7.4","class":"SP800-53-enhancement","title":"External Telecommunications Services","params":[{"id":"sc-7.4_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"SC-7(4)"},{"name":"sort-id","value":"sc-07.04"}],"parts":[{"id":"sc-7.4_smt","name":"statement","prose":"The organization:","parts":[{"id":"sc-7.4_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Implements a managed interface for each external telecommunication service;"},{"id":"sc-7.4_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Establishes a traffic flow policy for each managed interface;"},{"id":"sc-7.4_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Protects the confidentiality and integrity of the information being transmitted across each interface;"},{"id":"sc-7.4_smt.d","name":"item","props":[{"name":"label","value":"(d)"}],"prose":"Documents each exception to the traffic flow policy with a supporting mission\/business need and duration of that need; and"},{"id":"sc-7.4_smt.e","name":"item","props":[{"name":"label","value":"(e)"}],"prose":"Reviews exceptions to the traffic flow policy {{ insert: param, sc-7.4_prm_1 }} and removes exceptions that are no longer supported by an explicit mission\/business need."}]},{"id":"sc-7.4_gdn","name":"guidance","links":[{"href":"#sc-8","rel":"related"}]},{"id":"sc-7.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-7.4.a_obj","name":"objective","props":[{"name":"label","value":"SC-7(4)(a)"}],"prose":"implements a managed interface for each external telecommunication service;","links":[{"href":"#sc-7.4_smt.a","rel":"corresp"}]},{"id":"sc-7.4.b_obj","name":"objective","props":[{"name":"label","value":"SC-7(4)(b)"}],"prose":"establishes a traffic flow policy for each managed interface;","links":[{"href":"#sc-7.4_smt.b","rel":"corresp"}]},{"id":"sc-7.4.c_obj","name":"objective","props":[{"name":"label","value":"SC-7(4)(c)"}],"prose":"protects the confidentiality and integrity of the information being transmitted across each interface;","links":[{"href":"#sc-7.4_smt.c","rel":"corresp"}]},{"id":"sc-7.4.d_obj","name":"objective","props":[{"name":"label","value":"SC-7(4)(d)"}],"prose":"documents each exception to the traffic flow policy with:","parts":[{"id":"sc-7.4.d_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(4)(d)[1]"}],"prose":"a supporting mission\/business need;"},{"id":"sc-7.4.d_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(4)(d)[2]"}],"prose":"duration of that need;"}],"links":[{"href":"#sc-7.4_smt.d","rel":"corresp"}]},{"id":"sc-7.4.e_obj","name":"objective","props":[{"name":"label","value":"SC-7(4)(e)"}],"parts":[{"id":"sc-7.4.e_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(4)(e)[1]"}],"prose":"defines a frequency to review exceptions to traffic flow policy;"},{"id":"sc-7.4.e_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(4)(e)[2]"}],"prose":"reviews exceptions to the traffic flow policy with the organization-defined frequency; and"},{"id":"sc-7.4.e_obj.3","name":"objective","props":[{"name":"label","value":"SC-7(4)(e)[3]"}],"prose":"removes traffic flow policy exceptions that are no longer supported by an explicit mission\/business need"}],"links":[{"href":"#sc-7.4_smt.e","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\ntraffic flow policy\n\ninformation flow control policy\n\nprocedures addressing boundary protection\n\ninformation system security architecture\n\ninformation system design documentation\n\nboundary protection hardware and software\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nrecords of traffic flow policy exceptions\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for documenting and reviewing exceptions to the traffic flow policy\n\norganizational processes for removing exceptions to the traffic flow policy\n\nautomated mechanisms implementing boundary protection capability\n\nmanaged interfaces implementing traffic flow policy"}]}]},{"id":"sc-7.5","class":"SP800-53-enhancement","title":"Deny by Default \/ Allow by Exception","props":[{"name":"label","value":"SC-7(5)"},{"name":"sort-id","value":"sc-07.05"}],"parts":[{"id":"sc-7.5_smt","name":"statement","prose":"The information system at managed interfaces denies network communications traffic by default and allows network communications traffic by exception (i.e., deny all, permit by exception)."},{"id":"sc-7.5_gdn","name":"guidance","prose":"This control enhancement applies to both inbound and outbound network communications traffic. A deny-all, permit-by-exception network communications traffic policy ensures that only those connections which are essential and approved are allowed."},{"id":"sc-7.5_obj","name":"objective","prose":"Determine if the information system, at managed interfaces:","parts":[{"id":"sc-7.5_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(5)[1]"}],"prose":"denies network traffic by default; and"},{"id":"sc-7.5_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(5)[2]"}],"prose":"allows network traffic by exception."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing traffic management at managed interfaces"}]}]},{"id":"sc-7.7","class":"SP800-53-enhancement","title":"Prevent Split Tunneling for Remote Devices","props":[{"name":"label","value":"SC-7(7)"},{"name":"sort-id","value":"sc-07.07"}],"parts":[{"id":"sc-7.7_smt","name":"statement","prose":"The information system, in conjunction with a remote device, prevents the device from simultaneously establishing non-remote connections with the system and communicating via some other connection to resources in external networks."},{"id":"sc-7.7_gdn","name":"guidance","prose":"This control enhancement is implemented within remote devices (e.g., notebook computers) through configuration settings to disable split tunneling in those devices, and by preventing those configuration settings from being readily configurable by users. This control enhancement is implemented within the information system by the detection of split tunneling (or of configuration settings that allow split tunneling) in the remote device, and by prohibiting the connection if the remote device is using split tunneling. Split tunneling might be desirable by remote users to communicate with local information system resources such as printers\/file servers. However, split tunneling would in effect allow unauthorized external connections, making the system more vulnerable to attack and to exfiltration of organizational information. The use of VPNs for remote connections, when adequately provisioned with appropriate security controls, may provide the organization with sufficient assurance that it can effectively treat such connections as non-remote connections from the confidentiality and integrity perspective. VPNs thus provide a means for allowing non-remote communications paths from remote devices. The use of an adequately provisioned VPN does not eliminate the need for preventing split tunneling."},{"id":"sc-7.7_obj","name":"objective","prose":"Determine if the information system, in conjunction with a remote device, prevents the device from simultaneously establishing non-remote connections with the system and communicating via some other connection to resources in external networks."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\ninformation system design documentation\n\ninformation system hardware and software\n\ninformation system architecture\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing boundary protection capability\n\nautomated mechanisms supporting\/restricting non-remote connections"}]}]},{"id":"sc-7.8","class":"SP800-53-enhancement","title":"Route Traffic to Authenticated Proxy Servers","params":[{"id":"sc-7.8_prm_1","label":"organization-defined internal communications traffic"},{"id":"sc-7.8_prm_2","label":"organization-defined external networks"}],"props":[{"name":"label","value":"SC-7(8)"},{"name":"sort-id","value":"sc-07.08"}],"parts":[{"id":"sc-7.8_smt","name":"statement","prose":"The information system routes {{ insert: param, sc-7.8_prm_1 }} to {{ insert: param, sc-7.8_prm_2 }} through authenticated proxy servers at managed interfaces."},{"id":"sc-7.8_gdn","name":"guidance","prose":"External networks are networks outside of organizational control. A proxy server is a server (i.e., information system or application) that acts as an intermediary for clients requesting information system resources (e.g., files, connections, web pages, or services) from other organizational servers. Client requests established through an initial connection to the proxy server are evaluated to manage complexity and to provide additional protection by limiting direct connectivity. Web content filtering devices are one of the most common proxy servers providing access to the Internet. Proxy servers support logging individual Transmission Control Protocol (TCP) sessions and blocking specific Uniform Resource Locators (URLs), domain names, and Internet Protocol (IP) addresses. Web proxies can be configured with organization-defined lists of authorized and unauthorized websites.","links":[{"href":"#ac-3","rel":"related"},{"href":"#au-2","rel":"related"}]},{"id":"sc-7.8_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-7.8_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(8)[1]"}],"prose":"the organization defines internal communications traffic to be routed to external networks;"},{"id":"sc-7.8_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(8)[2]"}],"prose":"the organization defines external networks to which organization-defined internal communications traffic is to be routed; and"},{"id":"sc-7.8_obj.3","name":"objective","props":[{"name":"label","value":"SC-7(8)[3]"}],"prose":"the information system routes organization-defined internal communications traffic to organization-defined external networks through authenticated proxy servers at managed interfaces."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\ninformation system design documentation\n\ninformation system hardware and software\n\ninformation system architecture\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing traffic management through authenticated proxy servers at managed interfaces"}]}]},{"id":"sc-7.18","class":"SP800-53-enhancement","title":"Fail Secure","props":[{"name":"label","value":"SC-7(18)"},{"name":"sort-id","value":"sc-07.18"}],"parts":[{"id":"sc-7.18_smt","name":"statement","prose":"The information system fails securely in the event of an operational failure of a boundary protection device."},{"id":"sc-7.18_gdn","name":"guidance","prose":"Fail secure is a condition achieved by employing information system mechanisms to ensure that in the event of operational failures of boundary protection devices at managed interfaces (e.g., routers, firewalls, guards, and application gateways residing on protected subnetworks commonly referred to as demilitarized zones), information systems do not enter into unsecure states where intended security properties no longer hold. Failures of boundary protection devices cannot lead to, or cause information external to the devices to enter the devices, nor can failures permit unauthorized information releases.","links":[{"href":"#cp-2","rel":"related"},{"href":"#sc-24","rel":"related"}]},{"id":"sc-7.18_obj","name":"objective","prose":"Determine if the information system fails securely in the event of an operational failure of a boundary protection device."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\ninformation system design documentation\n\ninformation system architecture\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing secure failure"}]}]},{"id":"sc-7.21","class":"SP800-53-enhancement","title":"Isolation of Information System Components","params":[{"id":"sc-7.21_prm_1","label":"organization-defined information system components"},{"id":"sc-7.21_prm_2","label":"organization-defined missions and\/or business functions"}],"props":[{"name":"label","value":"SC-7(21)"},{"name":"sort-id","value":"sc-07.21"}],"parts":[{"id":"sc-7.21_smt","name":"statement","prose":"The organization employs boundary protection mechanisms to separate {{ insert: param, sc-7.21_prm_1 }} supporting {{ insert: param, sc-7.21_prm_2 }}."},{"id":"sc-7.21_gdn","name":"guidance","prose":"Organizations can isolate information system components performing different missions and\/or business functions. Such isolation limits unauthorized information flows among system components and also provides the opportunity to deploy greater levels of protection for selected components. Separating system components with boundary protection mechanisms provides the capability for increased protection of individual components and to more effectively control information flows between those components. This type of enhanced protection limits the potential harm from cyber attacks and errors. The degree of separation provided varies depending upon the mechanisms chosen. Boundary protection mechanisms include, for example, routers, gateways, and firewalls separating system components into physically separate networks or subnetworks, cross-domain devices separating subnetworks, virtualization techniques, and encrypting information flows among system components using distinct encryption keys.","links":[{"href":"#ca-9","rel":"related"},{"href":"#sc-3","rel":"related"}]},{"id":"sc-7.21_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-7.21_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(21)[1]"}],"prose":"defines information system components to be separated by boundary protection mechanisms;"},{"id":"sc-7.21_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(21)[2]"}],"prose":"defines missions and\/or business functions to be supported by organization-defined information system components separated by boundary protection mechanisms; and"},{"id":"sc-7.21_obj.3","name":"objective","props":[{"name":"label","value":"SC-7(21)[3]"}],"prose":"employs boundary protection mechanisms to separate organization-defined information system components supporting organization-defined missions and\/or business functions."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\ninformation system design documentation\n\ninformation system hardware and software\n\nenterprise architecture documentation\n\ninformation system architecture\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing the capability to separate information system components supporting organizational missions and\/or business functions"}]}]}]},{"id":"sc-8","class":"SP800-53","title":"Transmission Confidentiality and Integrity","params":[{"id":"sc-8_prm_1","select":{"how-many":"one-or-more","choice":["confidentiality","integrity"]}}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-8"},{"name":"sort-id","value":"sc-08"}],"links":[{"href":"#d715b234-9b5b-4e07-b1ed-99836727664d","rel":"reference"},{"href":"#f2dbd4ec-c413-4714-b85b-6b7184d1c195","rel":"reference"},{"href":"#90c5bc98-f9c4-44c9-98b7-787422f0999c","rel":"reference"},{"href":"#99f331f2-a9f0-46c2-9856-a3cbb9b89442","rel":"reference"},{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"},{"href":"#349fe082-502d-464a-aa0c-1443c6a5cf40","rel":"reference"},{"href":"#a4aa9645-9a8a-4b51-90a9-e223250f9a75","rel":"reference"},{"href":"#06dff0ea-3848-4945-8d91-e955ee69f05d","rel":"reference"}],"parts":[{"id":"sc-8_smt","name":"statement","prose":"The information system protects the {{ insert: param, sc-8_prm_1 }} of transmitted information."},{"id":"sc-8_gdn","name":"guidance","prose":"This control applies to both internal and external networks and all types of information system components from which information can be transmitted (e.g., servers, mobile devices, notebook computers, printers, copiers, scanners, facsimile machines). Communication paths outside the physical protection of a controlled boundary are exposed to the possibility of interception and modification. Protecting the confidentiality and\/or integrity of organizational information can be accomplished by physical means (e.g., by employing protected distribution systems) or by logical means (e.g., employing encryption techniques). Organizations relying on commercial providers offering transmission services as commodity services rather than as fully dedicated services (i.e., services which can be highly specialized to individual customer needs), may find it difficult to obtain the necessary assurances regarding the implementation of needed security controls for transmission confidentiality\/integrity. In such situations, organizations determine what types of confidentiality\/integrity services are available in standard, commercial telecommunication service packages. If it is infeasible or impractical to obtain the necessary security controls and assurances of control effectiveness through appropriate contracting vehicles, organizations implement appropriate compensating security controls or explicitly accept the additional risk.","links":[{"href":"#ac-17","rel":"related"},{"href":"#pe-4","rel":"related"}]},{"id":"sc-8_obj","name":"objective","prose":"Determine if the information system protects one or more of the following:","parts":[{"id":"sc-8_obj.1","name":"objective","props":[{"name":"label","value":"SC-8[1]"}],"prose":"confidentiality of transmitted information; and\/or"},{"id":"sc-8_obj.2","name":"objective","props":[{"name":"label","value":"SC-8[2]"}],"prose":"integrity of transmitted information."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing transmission confidentiality and integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing transmission confidentiality and\/or integrity"}]}],"controls":[{"id":"sc-8.1","class":"SP800-53-enhancement","title":"Cryptographic or Alternate Physical Protection","params":[{"id":"sc-8.1_prm_1","select":{"how-many":"one-or-more","choice":["prevent unauthorized disclosure of information","detect changes to information"]}},{"id":"sc-8.1_prm_2","label":"organization-defined alternative physical safeguards"}],"props":[{"name":"label","value":"SC-8(1)"},{"name":"sort-id","value":"sc-08.01"}],"parts":[{"id":"sc-8.1_smt","name":"statement","prose":"The information system implements cryptographic mechanisms to {{ insert: param, sc-8.1_prm_1 }} during transmission unless otherwise protected by {{ insert: param, sc-8.1_prm_2 }}."},{"id":"sc-8.1_gdn","name":"guidance","prose":"Encrypting information for transmission protects information from unauthorized disclosure and modification. Cryptographic mechanisms implemented to protect information integrity include, for example, cryptographic hash functions which have common application in digital signatures, checksums, and message authentication codes. Alternative physical security safeguards include, for example, protected distribution systems.","links":[{"href":"#sc-13","rel":"related"}]},{"id":"sc-8.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-8.1_obj.1","name":"objective","props":[{"name":"label","value":"SC-8(1)[1]"}],"prose":"the organization defines physical safeguards to be implemented to protect information during transmission when cryptographic mechanisms are not implemented; and"},{"id":"sc-8.1_obj.2","name":"objective","props":[{"name":"label","value":"SC-8(1)[2]"}],"prose":"the information system implements cryptographic mechanisms to do one or more of the following during transmission unless otherwise protected by organization-defined alternative physical safeguards:","parts":[{"id":"sc-8.1_obj.2.a","name":"objective","props":[{"name":"label","value":"SC-8(1)[2][a]"}],"prose":"prevent unauthorized disclosure of information; and\/or"},{"id":"sc-8.1_obj.2.b","name":"objective","props":[{"name":"label","value":"SC-8(1)[2][b]"}],"prose":"detect changes to information."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing transmission confidentiality and integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Cryptographic mechanisms supporting and\/or implementing transmission confidentiality and\/or integrity\n\nautomated mechanisms supporting and\/or implementing alternative physical safeguards\n\norganizational processes for defining and implementing alternative physical safeguards"}]}]}]},{"id":"sc-10","class":"SP800-53","title":"Network Disconnect","params":[{"id":"sc-10_prm_1","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"SC-10"},{"name":"sort-id","value":"sc-10"}],"parts":[{"id":"sc-10_smt","name":"statement","prose":"The information system terminates the network connection associated with a communications session at the end of the session or after {{ insert: param, sc-10_prm_1 }} of inactivity."},{"id":"sc-10_gdn","name":"guidance","prose":"This control applies to both internal and external networks. Terminating network connections associated with communications sessions include, for example, de-allocating associated TCP\/IP address\/port pairs at the operating system level, or de-allocating networking assignments at the application level if multiple application sessions are using a single, operating system-level network connection. Time periods of inactivity may be established by organizations and include, for example, time periods by type of network access or for specific network accesses."},{"id":"sc-10_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-10_obj.1","name":"objective","props":[{"name":"label","value":"SC-10[1]"}],"prose":"the organization defines a time period of inactivity after which the information system terminates a network connection associated with a communications session; and"},{"id":"sc-10_obj.2","name":"objective","props":[{"name":"label","value":"SC-10[2]"}],"prose":"the information system terminates the network connection associated with a communication session at the end of the session or after the organization-defined time period of inactivity."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing network disconnect\n\ninformation system design documentation\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing network disconnect capability"}]}]},{"id":"sc-12","class":"SP800-53","title":"Cryptographic Key Establishment and Management","params":[{"id":"sc-12_prm_1","label":"organization-defined requirements for key generation, distribution, storage, access, and destruction"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-12"},{"name":"sort-id","value":"sc-12"}],"links":[{"href":"#81f09e01-d0b0-4ae2-aa6a-064ed9950070","rel":"reference"},{"href":"#a6c774c0-bf50-4590-9841-2a5c1c91ac6f","rel":"reference"}],"parts":[{"id":"sc-12_smt","name":"statement","prose":"The organization establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with {{ insert: param, sc-12_prm_1 }}."},{"id":"sc-12_gdn","name":"guidance","prose":"Cryptographic key management and establishment can be performed using manual procedures or automated mechanisms with supporting manual procedures. Organizations define key management requirements in accordance with applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance, specifying appropriate options, levels, and parameters. Organizations manage trust stores to ensure that only approved trust anchors are in such trust stores. This includes certificates with visibility external to organizational information systems and certificates related to the internal operations of systems.","links":[{"href":"#sc-13","rel":"related"},{"href":"#sc-17","rel":"related"}]},{"id":"sc-12_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-12_obj.1","name":"objective","props":[{"name":"label","value":"SC-12[1]"}],"prose":"defines requirements for cryptographic key:","parts":[{"id":"sc-12_obj.1.a","name":"objective","props":[{"name":"label","value":"SC-12[1][a]"}],"prose":"generation;"},{"id":"sc-12_obj.1.b","name":"objective","props":[{"name":"label","value":"SC-12[1][b]"}],"prose":"distribution;"},{"id":"sc-12_obj.1.c","name":"objective","props":[{"name":"label","value":"SC-12[1][c]"}],"prose":"storage;"},{"id":"sc-12_obj.1.d","name":"objective","props":[{"name":"label","value":"SC-12[1][d]"}],"prose":"access;"},{"id":"sc-12_obj.1.e","name":"objective","props":[{"name":"label","value":"SC-12[1][e]"}],"prose":"destruction; and"}]},{"id":"sc-12_obj.2","name":"objective","props":[{"name":"label","value":"SC-12[2]"}],"prose":"establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key generation, distribution, storage, access, and destruction."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing cryptographic key establishment and management\n\ninformation system design documentation\n\ncryptographic mechanisms\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for cryptographic key establishment and\/or management"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing cryptographic key establishment and management"}]}],"controls":[{"id":"sc-12.1","class":"SP800-53-enhancement","title":"Availability","props":[{"name":"label","value":"SC-12(1)"},{"name":"sort-id","value":"sc-12.01"}],"parts":[{"id":"sc-12.1_smt","name":"statement","prose":"The organization maintains availability of information in the event of the loss of cryptographic keys by users."},{"id":"sc-12.1_gdn","name":"guidance","prose":"Escrowing of encryption keys is a common practice for ensuring availability in the event of loss of keys (e.g., due to forgotten passphrase)."},{"id":"sc-12.1_obj","name":"objective","prose":"Determine if the organization maintains availability of information in the event of the loss of cryptographic keys by users."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing cryptographic key establishment, management, and recovery\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for cryptographic key establishment or management"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing cryptographic key establishment and management"}]}]}]},{"id":"sc-13","class":"SP800-53","title":"Cryptographic Protection","params":[{"id":"sc-13_prm_1","label":"organization-defined cryptographic uses and type of cryptography required for each use"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-13"},{"name":"sort-id","value":"sc-13"}],"links":[{"href":"#39f9087d-7687-46d2-8eda-b6f4b7a4d8a9","rel":"reference"},{"href":"#6a1041fc-054e-4230-946b-2e6f4f3731bb","rel":"reference"},{"href":"#9b97ed27-3dd6-4f9a-ade5-1b43e9669794","rel":"reference"}],"parts":[{"id":"sc-13_smt","name":"statement","prose":"The information system implements {{ insert: param, sc-13_prm_1 }} in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards."},{"id":"sc-13_gdn","name":"guidance","prose":"Cryptography can be employed to support a variety of security solutions including, for example, the protection of classified and Controlled Unclassified Information, the provision of digital signatures, and the enforcement of information separation when authorized individuals have the necessary clearances for such information but lack the necessary formal access approvals. Cryptography can also be used to support random number generation and hash generation. Generally applicable cryptographic standards include FIPS-validated cryptography and NSA-approved cryptography. This control does not impose any requirements on organizations to use cryptography. However, if cryptography is required based on the selection of other security controls, organizations define each type of cryptographic use and the type of cryptography required (e.g., protection of classified information: NSA-approved cryptography; provision of digital signatures: FIPS-validated cryptography).","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-7","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#au-10","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-7","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-28","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"sc-13_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-13_obj.1","name":"objective","props":[{"name":"label","value":"SC-13[1]"}],"prose":"the organization defines cryptographic uses; and"},{"id":"sc-13_obj.2","name":"objective","props":[{"name":"label","value":"SC-13[2]"}],"prose":"the organization defines the type of cryptography required for each use; and"},{"id":"sc-13_obj.3","name":"objective","props":[{"name":"label","value":"SC-13[3]"}],"prose":"the information system implements the organization-defined cryptographic uses and type of cryptography required for each use in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing cryptographic protection\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ncryptographic module validation certificates\n\nlist of FIPS validated cryptographic modules\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with responsibilities for cryptographic protection"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing cryptographic protection"}]}]},{"id":"sc-15","class":"SP800-53","title":"Collaborative Computing Devices","params":[{"id":"sc-15_prm_1","label":"organization-defined exceptions where remote activation is to be allowed"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-15"},{"name":"sort-id","value":"sc-15"}],"parts":[{"id":"sc-15_smt","name":"statement","prose":"The information system:","parts":[{"id":"sc-15_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Prohibits remote activation of collaborative computing devices with the following exceptions: {{ insert: param, sc-15_prm_1 }}; and"},{"id":"sc-15_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Provides an explicit indication of use to users physically present at the devices."}]},{"id":"sc-15_gdn","name":"guidance","prose":"Collaborative computing devices include, for example, networked white boards, cameras, and microphones. Explicit indication of use includes, for example, signals to users when collaborative computing devices are activated.","links":[{"href":"#ac-21","rel":"related"}]},{"id":"sc-15_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-15.a_obj","name":"objective","props":[{"name":"label","value":"SC-15(a)"}],"parts":[{"id":"sc-15.a_obj.1","name":"objective","props":[{"name":"label","value":"SC-15(a)[1]"}],"prose":"the organization defines exceptions where remote activation of collaborative computing devices is to be allowed;"},{"id":"sc-15.a_obj.2","name":"objective","props":[{"name":"label","value":"SC-15(a)[2]"}],"prose":"the information system prohibits remote activation of collaborative computing devices, except for organization-defined exceptions where remote activation is to be allowed; and"}]},{"id":"sc-15.b_obj","name":"objective","props":[{"name":"label","value":"SC-15(b)"}],"prose":"the information system provides an explicit indication of use to users physically present at the devices."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing collaborative computing\n\naccess control policy and procedures\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with responsibilities for managing collaborative computing devices"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing management of remote activation of collaborative computing devices\n\nautomated mechanisms providing an indication of use of collaborative computing devices"}]}]},{"id":"sc-17","class":"SP800-53","title":"Public Key Infrastructure Certificates","params":[{"id":"sc-17_prm_1","label":"organization-defined certificate policy"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-17"},{"name":"sort-id","value":"sc-17"}],"links":[{"href":"#58ad6f27-af99-429f-86a8-8bb767b014b9","rel":"reference"},{"href":"#8f174e91-844e-4cf1-a72a-45c119a3a8dd","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"}],"parts":[{"id":"sc-17_smt","name":"statement","prose":"The organization issues public key certificates under an {{ insert: param, sc-17_prm_1 }} or obtains public key certificates from an approved service provider."},{"id":"sc-17_gdn","name":"guidance","prose":"For all certificates, organizations manage information system trust stores to ensure only approved trust anchors are in the trust stores. This control addresses both certificates with visibility external to organizational information systems and certificates related to the internal operations of systems, for example, application-specific time services.","links":[{"href":"#sc-12","rel":"related"}]},{"id":"sc-17_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-17_obj.1","name":"objective","props":[{"name":"label","value":"SC-17[1]"}],"prose":"defines a certificate policy for issuing public key certificates;"},{"id":"sc-17_obj.2","name":"objective","props":[{"name":"label","value":"SC-17[2]"}],"prose":"issues public key certificates:","parts":[{"id":"sc-17_obj.2.a","name":"objective","props":[{"name":"label","value":"SC-17[2][a]"}],"prose":"under an organization-defined certificate policy: or"},{"id":"sc-17_obj.2.b","name":"objective","props":[{"name":"label","value":"SC-17[2][b]"}],"prose":"obtains public key certificates from an approved service provider."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing public key infrastructure certificates\n\npublic key certificate policy or policies\n\npublic key issuing process\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for issuing public key certificates\n\nservice providers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing the management of public key infrastructure certificates"}]}]},{"id":"sc-18","class":"SP800-53","title":"Mobile Code","props":[{"name":"priority","value":"P2"},{"name":"label","value":"SC-18"},{"name":"sort-id","value":"sc-18"}],"links":[{"href":"#e716cd51-d1d5-4c6a-967a-22e9fbbc42f1","rel":"reference"},{"href":"#e6522953-6714-435d-a0d3-140df554c186","rel":"reference"}],"parts":[{"id":"sc-18_smt","name":"statement","prose":"The organization:","parts":[{"id":"sc-18_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Defines acceptable and unacceptable mobile code and mobile code technologies;"},{"id":"sc-18_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishes usage restrictions and implementation guidance for acceptable mobile code and mobile code technologies; and"},{"id":"sc-18_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Authorizes, monitors, and controls the use of mobile code within the information system."}]},{"id":"sc-18_gdn","name":"guidance","prose":"Decisions regarding the employment of mobile code within organizational information systems are based on the potential for the code to cause damage to the systems if used maliciously. Mobile code technologies include, for example, Java, JavaScript, ActiveX, Postscript, PDF, Shockwave movies, Flash animations, and VBScript. Usage restrictions and implementation guidance apply to both the selection and use of mobile code installed on servers and mobile code downloaded and executed on individual workstations and devices (e.g., smart phones). Mobile code policy and procedures address preventing the development, acquisition, or introduction of unacceptable mobile code within organizational information systems.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#si-3","rel":"related"}]},{"id":"sc-18_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-18.a_obj","name":"objective","props":[{"name":"label","value":"SC-18(a)"}],"prose":"defines acceptable and unacceptable mobile code and mobile code technologies;"},{"id":"sc-18.b_obj","name":"objective","props":[{"name":"label","value":"SC-18(b)"}],"parts":[{"id":"sc-18.b_obj.1","name":"objective","props":[{"name":"label","value":"SC-18(b)[1]"}],"prose":"establishes usage restrictions for acceptable mobile code and mobile code technologies;"},{"id":"sc-18.b_obj.2","name":"objective","props":[{"name":"label","value":"SC-18(b)[2]"}],"prose":"establishes implementation guidance for acceptable mobile code and mobile code technologies;"}]},{"id":"sc-18.c_obj","name":"objective","props":[{"name":"label","value":"SC-18(c)"}],"parts":[{"id":"sc-18.c_obj.1","name":"objective","props":[{"name":"label","value":"SC-18(c)[1]"}],"prose":"authorizes the use of mobile code within the information system;"},{"id":"sc-18.c_obj.2","name":"objective","props":[{"name":"label","value":"SC-18(c)[2]"}],"prose":"monitors the use of mobile code within the information system; and"},{"id":"sc-18.c_obj.3","name":"objective","props":[{"name":"label","value":"SC-18(c)[3]"}],"prose":"controls the use of mobile code within the information system."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing mobile code\n\nmobile code usage restrictions, mobile code implementation policy and procedures\n\nlist of acceptable mobile code and mobile code technologies\n\nlist of unacceptable mobile code and mobile technologies\n\nauthorization records\n\ninformation system monitoring records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing mobile code"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for controlling, authorizing, monitoring, and restricting mobile code\n\nautomated mechanisms supporting and\/or implementing the management of mobile code\n\nautomated mechanisms supporting and\/or implementing the monitoring of mobile code"}]}]},{"id":"sc-19","class":"SP800-53","title":"Voice Over Internet Protocol","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-19"},{"name":"sort-id","value":"sc-19"}],"links":[{"href":"#7783f3e7-09b3-478b-9aa2-4a76dfd0ea90","rel":"reference"}],"parts":[{"id":"sc-19_smt","name":"statement","prose":"The organization:","parts":[{"id":"sc-19_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously; and"},{"id":"sc-19_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes, monitors, and controls the use of VoIP within the information system."}]},{"id":"sc-19_gdn","name":"guidance","links":[{"href":"#cm-6","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-15","rel":"related"}]},{"id":"sc-19_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-19.a_obj","name":"objective","props":[{"name":"label","value":"SC-19(a)"}],"parts":[{"id":"sc-19.a_obj.1","name":"objective","props":[{"name":"label","value":"SC-19(a)[1]"}],"prose":"establishes usage restrictions for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously;"},{"id":"sc-19.a_obj.2","name":"objective","props":[{"name":"label","value":"SC-19(a)[2]"}],"prose":"establishes implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously;"}]},{"id":"sc-19.b_obj","name":"objective","props":[{"name":"label","value":"SC-19(b)"}],"parts":[{"id":"sc-19.b_obj.1","name":"objective","props":[{"name":"label","value":"SC-19(b)[1]"}],"prose":"authorizes the use of VoIP within the information system;"},{"id":"sc-19.b_obj.2","name":"objective","props":[{"name":"label","value":"SC-19(b)[2]"}],"prose":"monitors the use of VoIP within the information system; and"},{"id":"sc-19.b_obj.3","name":"objective","props":[{"name":"label","value":"SC-19(b)[3]"}],"prose":"controls the use of VoIP within the information system."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing VoIP\n\nVoIP usage restrictions\n\nVoIP implementation guidance\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system monitoring records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing VoIP"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for authorizing, monitoring, and controlling VoIP\n\nautomated mechanisms supporting and\/or implementing authorizing, monitoring, and controlling VoIP"}]}]},{"id":"sc-20","class":"SP800-53","title":"Secure Name \/ Address Resolution Service (authoritative Source)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-20"},{"name":"sort-id","value":"sc-20"}],"links":[{"href":"#28115a56-da6b-4d44-b1df-51dd7f048a3e","rel":"reference"},{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"}],"parts":[{"id":"sc-20_smt","name":"statement","prose":"The information system:","parts":[{"id":"sc-20_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Provides additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name\/address resolution queries; and"},{"id":"sc-20_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Provides the means to indicate the security status of child zones and (if the child supports secure resolution services) to enable verification of a chain of trust among parent and child domains, when operating as part of a distributed, hierarchical namespace."}]},{"id":"sc-20_gdn","name":"guidance","prose":"This control enables external clients including, for example, remote Internet clients, to obtain origin authentication and integrity verification assurances for the host\/service name to network address resolution information obtained through the service. Information systems that provide name and address resolution services include, for example, domain name system (DNS) servers. Additional artifacts include, for example, DNS Security (DNSSEC) digital signatures and cryptographic keys. DNS resource records are examples of authoritative data. The means to indicate the security status of child zones includes, for example, the use of delegation signer resource records in the DNS. The DNS security controls reflect (and are referenced from) OMB Memorandum 08-23. Information systems that use technologies other than the DNS to map between host\/service names and network addresses provide other means to assure the authenticity and integrity of response data.","links":[{"href":"#au-10","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-21","rel":"related"},{"href":"#sc-22","rel":"related"}]},{"id":"sc-20_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"sc-20.a_obj","name":"objective","props":[{"name":"label","value":"SC-20(a)"}],"prose":"provides additional data origin and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name\/address resolution queries;"},{"id":"sc-20.b_obj","name":"objective","props":[{"name":"label","value":"SC-20(b)"}],"prose":"provides the means to, when operating as part of a distributed, hierarchical namespace:","parts":[{"id":"sc-20.b_obj.1","name":"objective","props":[{"name":"label","value":"SC-20(b)[1]"}],"prose":"indicate the security status of child zones; and"},{"id":"sc-20.b_obj.2","name":"objective","props":[{"name":"label","value":"SC-20(b)[2]"}],"prose":"enable verification of a chain of trust among parent and child domains (if the child supports secure resolution services)."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing secure name\/address resolution service (authoritative source)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing DNS"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing secure name\/address resolution service"}]}]},{"id":"sc-21","class":"SP800-53","title":"Secure Name \/ Address Resolution Service (recursive or Caching Resolver)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-21"},{"name":"sort-id","value":"sc-21"}],"links":[{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"}],"parts":[{"id":"sc-21_smt","name":"statement","prose":"The information system requests and performs data origin authentication and data integrity verification on the name\/address resolution responses the system receives from authoritative sources."},{"id":"sc-21_gdn","name":"guidance","prose":"Each client of name resolution services either performs this validation on its own, or has authenticated channels to trusted validation providers. Information systems that provide name and address resolution services for local clients include, for example, recursive resolving or caching domain name system (DNS) servers. DNS client resolvers either perform validation of DNSSEC signatures, or clients use authenticated channels to recursive resolvers that perform such validations. Information systems that use technologies other than the DNS to map between host\/service names and network addresses provide other means to enable clients to verify the authenticity and integrity of response data.","links":[{"href":"#sc-20","rel":"related"},{"href":"#sc-22","rel":"related"}]},{"id":"sc-21_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"sc-21_obj.1","name":"objective","props":[{"name":"label","value":"SC-21[1]"}],"prose":"requests data origin authentication on the name\/address resolution responses the system receives from authoritative sources;"},{"id":"sc-21_obj.2","name":"objective","props":[{"name":"label","value":"SC-21[2]"}],"prose":"requests data integrity verification on the name\/address resolution responses the system receives from authoritative sources;"},{"id":"sc-21_obj.3","name":"objective","props":[{"name":"label","value":"SC-21[3]"}],"prose":"performs data origin authentication on the name\/address resolution responses the system receives from authoritative sources; and"},{"id":"sc-21_obj.4","name":"objective","props":[{"name":"label","value":"SC-21[4]"}],"prose":"performs data integrity verification on the name\/address resolution responses the system receives from authoritative sources."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing secure name\/address resolution service (recursive or caching resolver)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing DNS"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing data origin authentication and data integrity verification for name\/address resolution services"}]}]},{"id":"sc-22","class":"SP800-53","title":"Architecture and Provisioning for Name \/ Address Resolution Service","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-22"},{"name":"sort-id","value":"sc-22"}],"links":[{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"}],"parts":[{"id":"sc-22_smt","name":"statement","prose":"The information systems that collectively provide name\/address resolution service for an organization are fault-tolerant and implement internal\/external role separation."},{"id":"sc-22_gdn","name":"guidance","prose":"Information systems that provide name and address resolution services include, for example, domain name system (DNS) servers. To eliminate single points of failure and to enhance redundancy, organizations employ at least two authoritative domain name system servers, one configured as the primary server and the other configured as the secondary server. Additionally, organizations typically deploy the servers in two geographically separated network subnetworks (i.e., not located in the same physical facility). For role separation, DNS servers with internal roles only process name and address resolution requests from within organizations (i.e., from internal clients). DNS servers with external roles only process name and address resolution information requests from clients external to organizations (i.e., on external networks including the Internet). Organizations specify clients that can access authoritative DNS servers in particular roles (e.g., by address ranges, explicit lists).","links":[{"href":"#sc-2","rel":"related"},{"href":"#sc-20","rel":"related"},{"href":"#sc-21","rel":"related"},{"href":"#sc-24","rel":"related"}]},{"id":"sc-22_obj","name":"objective","prose":"Determine if the information systems that collectively provide name\/address resolution service for an organization:","parts":[{"id":"sc-22_obj.1","name":"objective","props":[{"name":"label","value":"SC-22[1]"}],"prose":"are fault tolerant; and"},{"id":"sc-22_obj.2","name":"objective","props":[{"name":"label","value":"SC-22[2]"}],"prose":"implement internal\/external role separation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing architecture and provisioning for name\/address resolution service\n\naccess control policy and procedures\n\ninformation system design documentation\n\nassessment results from independent, testing organizations\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing DNS"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing name\/address resolution service for fault tolerance and role separation"}]}]},{"id":"sc-23","class":"SP800-53","title":"Session Authenticity","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-23"},{"name":"sort-id","value":"sc-23"}],"links":[{"href":"#90c5bc98-f9c4-44c9-98b7-787422f0999c","rel":"reference"},{"href":"#99f331f2-a9f0-46c2-9856-a3cbb9b89442","rel":"reference"},{"href":"#1ebdf782-d95d-4a7b-8ec7-ee860951eced","rel":"reference"}],"parts":[{"id":"sc-23_smt","name":"statement","prose":"The information system protects the authenticity of communications sessions."},{"id":"sc-23_gdn","name":"guidance","prose":"This control addresses communications protection at the session, versus packet level (e.g., sessions in service-oriented architectures providing web-based services) and establishes grounds for confidence at both ends of communications sessions in ongoing identities of other parties and in the validity of information transmitted. Authenticity protection includes, for example, protecting against man-in-the-middle attacks\/session hijacking and the insertion of false information into sessions.","links":[{"href":"#sc-8","rel":"related"},{"href":"#sc-10","rel":"related"},{"href":"#sc-11","rel":"related"}]},{"id":"sc-23_obj","name":"objective","prose":"Determine if the information system protects the authenticity of communications sessions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing session authenticity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing session authenticity"}]}]},{"id":"sc-24","class":"SP800-53","title":"Fail in Known State","params":[{"id":"sc-24_prm_1","label":"organization-defined known-state"},{"id":"sc-24_prm_2","label":"organization-defined types of failures"},{"id":"sc-24_prm_3","label":"organization-defined system state information"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-24"},{"name":"sort-id","value":"sc-24"}],"parts":[{"id":"sc-24_smt","name":"statement","prose":"The information system fails to a {{ insert: param, sc-24_prm_1 }} for {{ insert: param, sc-24_prm_2 }} preserving {{ insert: param, sc-24_prm_3 }} in failure."},{"id":"sc-24_gdn","name":"guidance","prose":"Failure in a known state addresses security concerns in accordance with the mission\/business needs of organizations. Failure in a known secure state helps to prevent the loss of confidentiality, integrity, or availability of information in the event of failures of organizational information systems or system components. Failure in a known safe state helps to prevent systems from failing to a state that may cause injury to individuals or destruction to property. Preserving information system state information facilitates system restart and return to the operational mode of organizations with less disruption of mission\/business processes.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-10","rel":"related"},{"href":"#cp-12","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-22","rel":"related"}]},{"id":"sc-24_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-24_obj.1","name":"objective","props":[{"name":"label","value":"SC-24[1]"}],"prose":"the organization defines a known-state to which the information system is to fail in the event of a system failure;"},{"id":"sc-24_obj.2","name":"objective","props":[{"name":"label","value":"SC-24[2]"}],"prose":"the organization defines types of failures for which the information system is to fail to an organization-defined known-state;"},{"id":"sc-24_obj.3","name":"objective","props":[{"name":"label","value":"SC-24[3]"}],"prose":"the organization defines system state information to be preserved in the event of a system failure;"},{"id":"sc-24_obj.4","name":"objective","props":[{"name":"label","value":"SC-24[4]"}],"prose":"the information system fails to the organization-defined known-state for organization-defined types of failures; and"},{"id":"sc-24_obj.5","name":"objective","props":[{"name":"label","value":"SC-24[5]"}],"prose":"the information system preserves the organization-defined system state information in the event of a system failure."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing information system failure to known state\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of failures requiring information system to fail in a known state\n\nstate information to be preserved in system failure\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing fail-in-known state capability\n\nautomated mechanisms preserving system state information in the event of a system failure"}]}]},{"id":"sc-28","class":"SP800-53","title":"Protection of Information at Rest","params":[{"id":"sc-28_prm_1","select":{"how-many":"one-or-more","choice":["confidentiality","integrity"]}},{"id":"sc-28_prm_2","label":"organization-defined information at rest"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-28"},{"name":"sort-id","value":"sc-28"}],"links":[{"href":"#81f09e01-d0b0-4ae2-aa6a-064ed9950070","rel":"reference"},{"href":"#a6c774c0-bf50-4590-9841-2a5c1c91ac6f","rel":"reference"},{"href":"#3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","rel":"reference"}],"parts":[{"id":"sc-28_smt","name":"statement","prose":"The information system protects the {{ insert: param, sc-28_prm_1 }} of {{ insert: param, sc-28_prm_2 }}."},{"id":"sc-28_gdn","name":"guidance","prose":"This control addresses the confidentiality and integrity of information at rest and covers user information and system information. Information at rest refers to the state of information when it is located on storage devices as specific components of information systems. System-related information requiring protection includes, for example, configurations or rule sets for firewalls, gateways, intrusion detection\/prevention systems, filtering routers, and authenticator content. Organizations may employ different mechanisms to achieve confidentiality and integrity protections, including the use of cryptographic mechanisms and file share scanning. Integrity protection can be achieved, for example, by implementing Write-Once-Read-Many (WORM) technologies. Organizations may also employ other security controls including, for example, secure off-line storage in lieu of online storage when adequate protection of information at rest cannot otherwise be achieved and\/or continuous monitoring to identify malicious code at rest.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"sc-28_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-28_obj.1","name":"objective","props":[{"name":"label","value":"SC-28[1]"}],"prose":"the organization defines information at rest requiring one or more of the following:","parts":[{"id":"sc-28_obj.1.a","name":"objective","props":[{"name":"label","value":"SC-28[1][a]"}],"prose":"confidentiality protection; and\/or"},{"id":"sc-28_obj.1.b","name":"objective","props":[{"name":"label","value":"SC-28[1][b]"}],"prose":"integrity protection;"}]},{"id":"sc-28_obj.2","name":"objective","props":[{"name":"label","value":"SC-28[2]"}],"prose":"the information system protects:","parts":[{"id":"sc-28_obj.2.a","name":"objective","props":[{"name":"label","value":"SC-28[2][a]"}],"prose":"the confidentiality of organization-defined information at rest; and\/or"},{"id":"sc-28_obj.2.b","name":"objective","props":[{"name":"label","value":"SC-28[2][b]"}],"prose":"the integrity of organization-defined information at rest."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing protection of information at rest\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ncryptographic mechanisms and associated configuration documentation\n\nlist of information at rest requiring confidentiality and integrity protections\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing confidentiality and integrity protections for information at rest"}]}]},{"id":"sc-39","class":"SP800-53","title":"Process Isolation","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-39"},{"name":"sort-id","value":"sc-39"}],"parts":[{"id":"sc-39_smt","name":"statement","prose":"The information system maintains a separate execution domain for each executing process."},{"id":"sc-39_gdn","name":"guidance","prose":"Information systems can maintain separate execution domains for each executing process by assigning each process a separate address space. Each information system process has a distinct address space so that communication between processes is performed in a manner controlled through the security functions, and one process cannot modify the executing code of another process. Maintaining separate execution domains for executing processes can be achieved, for example, by implementing separate address spaces. This capability is available in most commercial operating systems that employ multi-state processor technologies.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sc-2","rel":"related"},{"href":"#sc-3","rel":"related"}]},{"id":"sc-39_obj","name":"objective","prose":"Determine if the information system maintains a separate execution domain for each executing process."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system design documentation\n\ninformation system architecture\n\nindependent verification and validation documentation\n\ntesting and evaluation documentation, other relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Information system developers\/integrators\n\ninformation system security architect"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing separate execution domains for each executing process"}]}]}]},{"id":"si","class":"family","title":"System and Information Integrity","controls":[{"id":"si-1","class":"SP800-53","title":"System and Information Integrity Policy and Procedures","params":[{"id":"si-1_prm_1","label":"organization-defined personnel or roles"},{"id":"si-1_prm_2","label":"organization-defined frequency"},{"id":"si-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-1"},{"name":"sort-id","value":"si-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"si-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, si-1_prm_1 }}:","parts":[{"id":"si-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system and information integrity policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"si-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system and information integrity policy and associated system and information integrity controls; and"}]},{"id":"si-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"si-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System and information integrity policy {{ insert: param, si-1_prm_2 }}; and"},{"id":"si-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System and information integrity procedures {{ insert: param, si-1_prm_3 }}."}]}]},{"id":"si-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the SI family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"si-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-1.a_obj","name":"objective","props":[{"name":"label","value":"SI-1(a)"}],"parts":[{"id":"si-1.a.1_obj","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)"}],"parts":[{"id":"si-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1]"}],"prose":"develops and documents a system and information integrity policy that addresses:","parts":[{"id":"si-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"si-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"si-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"si-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"si-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"si-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"si-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"si-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system and information integrity policy is to be disseminated;"},{"id":"si-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[3]"}],"prose":"disseminates the system and information integrity policy to organization-defined personnel or roles;"}]},{"id":"si-1.a.2_obj","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)"}],"parts":[{"id":"si-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the system and information integrity policy and associated system and information integrity controls;"},{"id":"si-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"si-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"si-1.b_obj","name":"objective","props":[{"name":"label","value":"SI-1(b)"}],"parts":[{"id":"si-1.b.1_obj","name":"objective","props":[{"name":"label","value":"SI-1(b)(1)"}],"parts":[{"id":"si-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system and information integrity policy;"},{"id":"si-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(b)(1)[2]"}],"prose":"reviews and updates the current system and information integrity policy with the organization-defined frequency;"}]},{"id":"si-1.b.2_obj","name":"objective","props":[{"name":"label","value":"SI-1(b)(2)"}],"parts":[{"id":"si-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system and information integrity procedures; and"},{"id":"si-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(b)(2)[2]"}],"prose":"reviews and updates the current system and information integrity procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and information integrity responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"si-2","class":"SP800-53","title":"Flaw Remediation","params":[{"id":"si-2_prm_1","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-2"},{"name":"sort-id","value":"si-02"}],"links":[{"href":"#bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","rel":"reference"},{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"si-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Identifies, reports, and corrects information system flaws;"},{"id":"si-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Tests software and firmware updates related to flaw remediation for effectiveness and potential side effects before installation;"},{"id":"si-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Installs security-relevant software and firmware updates within {{ insert: param, si-2_prm_1 }} of the release of the updates; and"},{"id":"si-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Incorporates flaw remediation into the organizational configuration management process."}]},{"id":"si-2_gdn","name":"guidance","prose":"Organizations identify information systems affected by announced software flaws including potential vulnerabilities resulting from those flaws, and report this information to designated organizational personnel with information security responsibilities. Security-relevant software updates include, for example, patches, service packs, hot fixes, and anti-virus signatures. Organizations also address flaws discovered during security assessments, continuous monitoring, incident response activities, and system error handling. Organizations take advantage of available resources such as the Common Weakness Enumeration (CWE) or Common Vulnerabilities and Exposures (CVE) databases in remediating flaws discovered in organizational information systems. By incorporating flaw remediation into ongoing configuration management processes, required\/anticipated remediation actions can be tracked and verified. Flaw remediation actions that can be tracked and verified include, for example, determining whether organizations follow US-CERT guidance and Information Assurance Vulnerability Alerts. Organization-defined time periods for updating security-relevant software and firmware may vary based on a variety of factors including, for example, the security category of the information system or the criticality of the update (i.e., severity of the vulnerability related to the discovered flaw). Some types of flaw remediation may require more testing than other types. Organizations determine the degree and type of testing needed for the specific type of flaw remediation activity under consideration and also the types of changes that are to be configuration-managed. In some situations, organizations may determine that the testing of software and\/or firmware updates is not necessary or practical, for example, when implementing simple anti-virus signature updates. Organizations may also consider in testing decisions, whether security-relevant software or firmware updates are obtained from authorized sources with appropriate digital signatures.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#ma-2","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#si-11","rel":"related"}]},{"id":"si-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-2.a_obj","name":"objective","props":[{"name":"label","value":"SI-2(a)"}],"parts":[{"id":"si-2.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(a)[1]"}],"prose":"identifies information system flaws;"},{"id":"si-2.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(a)[2]"}],"prose":"reports information system flaws;"},{"id":"si-2.a_obj.3","name":"objective","props":[{"name":"label","value":"SI-2(a)[3]"}],"prose":"corrects information system flaws;"}]},{"id":"si-2.b_obj","name":"objective","props":[{"name":"label","value":"SI-2(b)"}],"parts":[{"id":"si-2.b_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(b)[1]"}],"prose":"tests software updates related to flaw remediation for effectiveness and potential side effects before installation;"},{"id":"si-2.b_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(b)[2]"}],"prose":"tests firmware updates related to flaw remediation for effectiveness and potential side effects before installation;"}]},{"id":"si-2.c_obj","name":"objective","props":[{"name":"label","value":"SI-2(c)"}],"parts":[{"id":"si-2.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(c)[1]"}],"prose":"defines the time period within which to install security-relevant software updates after the release of the updates;"},{"id":"si-2.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(c)[2]"}],"prose":"defines the time period within which to install security-relevant firmware updates after the release of the updates;"},{"id":"si-2.c_obj.3","name":"objective","props":[{"name":"label","value":"SI-2(c)[3]"}],"prose":"installs software updates within the organization-defined time period of the release of the updates;"},{"id":"si-2.c_obj.4","name":"objective","props":[{"name":"label","value":"SI-2(c)[4]"}],"prose":"installs firmware updates within the organization-defined time period of the release of the updates; and"}]},{"id":"si-2.d_obj","name":"objective","props":[{"name":"label","value":"SI-2(d)"}],"prose":"incorporates flaw remediation into the organizational configuration management process."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing flaw remediation\n\nprocedures addressing configuration management\n\nlist of flaws and vulnerabilities potentially affecting the information system\n\nlist of recent security flaw remediation actions performed on the information system (e.g., list of installed patches, service packs, hot fixes, and other software updates to correct information system flaws)\n\ntest results from the installation of software and firmware updates to correct information system flaws\n\ninstallation\/change control records for security-relevant software and firmware updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for flaw remediation\n\norganizational personnel with configuration management responsibility"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for identifying, reporting, and correcting information system flaws\n\norganizational process for installing software and firmware updates\n\nautomated mechanisms supporting and\/or implementing reporting, and correcting information system flaws\n\nautomated mechanisms supporting and\/or implementing testing software and firmware updates"}]}],"controls":[{"id":"si-2.1","class":"SP800-53-enhancement","title":"Central Management","props":[{"name":"label","value":"SI-2(1)"},{"name":"sort-id","value":"si-02.01"}],"parts":[{"id":"si-2.1_smt","name":"statement","prose":"The organization centrally manages the flaw remediation process."},{"id":"si-2.1_gdn","name":"guidance","prose":"Central management is the organization-wide management and implementation of flaw remediation processes. Central management includes planning, implementing, assessing, authorizing, and monitoring the organization-defined, centrally managed flaw remediation security controls."},{"id":"si-2.1_obj","name":"objective","prose":"Determine if the organization centrally manages the flaw remediation process."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing flaw remediation\n\nautomated mechanisms supporting centralized management of flaw remediation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for flaw remediation"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for central management of the flaw remediation process\n\nautomated mechanisms supporting and\/or implementing central management of the flaw remediation process"}]}]},{"id":"si-2.2","class":"SP800-53-enhancement","title":"Automated Flaw Remediation Status","params":[{"id":"si-2.2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"SI-2(2)"},{"name":"sort-id","value":"si-02.02"}],"parts":[{"id":"si-2.2_smt","name":"statement","prose":"The organization employs automated mechanisms {{ insert: param, si-2.2_prm_1 }} to determine the state of information system components with regard to flaw remediation."},{"id":"si-2.2_gdn","name":"guidance","links":[{"href":"#cm-6","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"si-2.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-2.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(2)[1]"}],"prose":"defines a frequency to employ automated mechanisms to determine the state of information system components with regard to flaw remediation; and"},{"id":"si-2.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(2)[2]"}],"prose":"employs automated mechanisms with the organization-defined frequency to determine the state of information system components with regard to flaw remediation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing flaw remediation\n\nautomated mechanisms supporting centralized management of flaw remediation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for flaw remediation"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms used to determine the state of information system components with regard to flaw remediation"}]}]}]},{"id":"si-3","class":"SP800-53","title":"Malicious Code Protection","params":[{"id":"si-3_prm_1","label":"organization-defined frequency"},{"id":"si-3_prm_2","select":{"how-many":"one-or-more","choice":["endpoint","network entry\/exit points"]}},{"id":"si-3_prm_3","select":{"how-many":"one-or-more","choice":["block malicious code","quarantine malicious code","send alert to administrator"," {{ insert: param, si-3_prm_4 }} "]}},{"id":"si-3_prm_4","depends-on":"si-3_prm_3","label":"organization-defined action"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-3"},{"name":"sort-id","value":"si-03"}],"links":[{"href":"#6d431fee-658f-4a0e-9f2e-a38b5d398fab","rel":"reference"}],"parts":[{"id":"si-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code;"},{"id":"si-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures;"},{"id":"si-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Configures malicious code protection mechanisms to:","parts":[{"id":"si-3_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Perform periodic scans of the information system {{ insert: param, si-3_prm_1 }} and real-time scans of files from external sources at {{ insert: param, si-3_prm_2 }} as the files are downloaded, opened, or executed in accordance with organizational security policy; and"},{"id":"si-3_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":" {{ insert: param, si-3_prm_3 }} in response to malicious code detection; and"}]},{"id":"si-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Addresses the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the information system."}]},{"id":"si-3_gdn","name":"guidance","prose":"Information system entry and exit points include, for example, firewalls, electronic mail servers, web servers, proxy servers, remote-access servers, workstations, notebook computers, and mobile devices. Malicious code includes, for example, viruses, worms, Trojan horses, and spyware. Malicious code can also be encoded in various formats (e.g., UUENCODE, Unicode), contained within compressed or hidden files, or hidden in files using steganography. Malicious code can be transported by different means including, for example, web accesses, electronic mail, electronic mail attachments, and portable storage devices. Malicious code insertions occur through the exploitation of information system vulnerabilities. Malicious code protection mechanisms include, for example, anti-virus signature definitions and reputation-based technologies. A variety of technologies and methods exist to limit or eliminate the effects of malicious code. Pervasive configuration management and comprehensive software integrity controls may be effective in preventing execution of unauthorized code. In addition to commercial off-the-shelf software, malicious code may also be present in custom-built software. This could include, for example, logic bombs, back doors, and other types of cyber attacks that could affect organizational missions\/business functions. Traditional malicious code protection mechanisms cannot always detect such code. In these situations, organizations rely instead on other safeguards including, for example, secure coding practices, configuration management and control, trusted procurement processes, and monitoring practices to help ensure that software does not perform functions other than the functions intended. Organizations may determine that in response to the detection of malicious code, different actions may be warranted. For example, organizations can define actions in response to malicious code detection during periodic scans, actions in response to detection of malicious downloads, and\/or actions in response to detection of maliciousness when attempting to open or execute files.","links":[{"href":"#cm-3","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#sa-13","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-26","rel":"related"},{"href":"#sc-44","rel":"related"},{"href":"#si-2","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"si-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-3.a_obj","name":"objective","props":[{"name":"label","value":"SI-3(a)"}],"prose":"employs malicious code protection mechanisms to detect and eradicate malicious code at information system:","parts":[{"id":"si-3.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-3(a)[1]"}],"prose":"entry points;"},{"id":"si-3.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-3(a)[2]"}],"prose":"exit points;"}]},{"id":"si-3.b_obj","name":"objective","props":[{"name":"label","value":"SI-3(b)"}],"prose":"updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures (as identified in CM-1);"},{"id":"si-3.c_obj","name":"objective","props":[{"name":"label","value":"SI-3(c)"}],"parts":[{"id":"si-3.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-3(c)[1]"}],"prose":"defines a frequency for malicious code protection mechanisms to perform periodic scans of the information system;"},{"id":"si-3.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-3(c)[2]"}],"prose":"defines action to be initiated by malicious protection mechanisms in response to malicious code detection;"},{"id":"si-3.c_obj.3","name":"objective","props":[{"name":"label","value":"SI-3(c)[3]"}],"parts":[{"id":"si-3.c.1_obj.3","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](1)"}],"prose":"configures malicious code protection mechanisms to:","parts":[{"id":"si-3.c.1_obj.3.a","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](1)[a]"}],"prose":"perform periodic scans of the information system with the organization-defined frequency;"},{"id":"si-3.c.1_obj.3.b","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](1)[b]"}],"prose":"perform real-time scans of files from external sources at endpoint and\/or network entry\/exit points as the files are downloaded, opened, or executed in accordance with organizational security policy;"}]},{"id":"si-3.c.2_obj.3","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)"}],"prose":"configures malicious code protection mechanisms to do one or more of the following:","parts":[{"id":"si-3.c.2_obj.3.a","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[a]"}],"prose":"block malicious code in response to malicious code detection;"},{"id":"si-3.c.2_obj.3.b","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[b]"}],"prose":"quarantine malicious code in response to malicious code detection;"},{"id":"si-3.c.2_obj.3.c","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[c]"}],"prose":"send alert to administrator in response to malicious code detection; and\/or"},{"id":"si-3.c.2_obj.3.d","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[d]"}],"prose":"initiate organization-defined action in response to malicious code detection;"}]}]}]},{"id":"si-3.d_obj","name":"objective","props":[{"name":"label","value":"SI-3(d)"}],"parts":[{"id":"si-3.d_obj.1","name":"objective","props":[{"name":"label","value":"SI-3(d)[1]"}],"prose":"addresses the receipt of false positives during malicious code detection and eradication; and"},{"id":"si-3.d_obj.2","name":"objective","props":[{"name":"label","value":"SI-3(d)[2]"}],"prose":"addresses the resulting potential impact on the availability of the information system."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nconfiguration management policy and procedures\n\nprocedures addressing malicious code protection\n\nmalicious code protection mechanisms\n\nrecords of malicious code protection updates\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nscan results from malicious code protection mechanisms\n\nrecord of actions initiated by malicious code protection mechanisms in response to malicious code detection\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for malicious code protection\n\norganizational personnel with configuration management responsibility"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for employing, updating, and configuring malicious code protection mechanisms\n\norganizational process for addressing false positives and resulting potential impact\n\nautomated mechanisms supporting and\/or implementing employing, updating, and configuring malicious code protection mechanisms\n\nautomated mechanisms supporting and\/or implementing malicious code scanning and subsequent actions"}]}],"controls":[{"id":"si-3.1","class":"SP800-53-enhancement","title":"Central Management","props":[{"name":"label","value":"SI-3(1)"},{"name":"sort-id","value":"si-03.01"}],"parts":[{"id":"si-3.1_smt","name":"statement","prose":"The organization centrally manages malicious code protection mechanisms."},{"id":"si-3.1_gdn","name":"guidance","prose":"Central management is the organization-wide management and implementation of malicious code protection mechanisms. Central management includes planning, implementing, assessing, authorizing, and monitoring the organization-defined, centrally managed flaw malicious code protection security controls.","links":[{"href":"#au-2","rel":"related"},{"href":"#si-8","rel":"related"}]},{"id":"si-3.1_obj","name":"objective","prose":"Determine if the organization centrally manages malicious code protection mechanisms."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing malicious code protection\n\nautomated mechanisms supporting centralized management of malicious code protection mechanisms\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for malicious code protection"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for central management of malicious code protection mechanisms\n\nautomated mechanisms supporting and\/or implementing central management of malicious code protection mechanisms"}]}]},{"id":"si-3.2","class":"SP800-53-enhancement","title":"Automatic Updates","props":[{"name":"label","value":"SI-3(2)"},{"name":"sort-id","value":"si-03.02"}],"parts":[{"id":"si-3.2_smt","name":"statement","prose":"The information system automatically updates malicious code protection mechanisms."},{"id":"si-3.2_gdn","name":"guidance","prose":"Malicious code protection mechanisms include, for example, signature definitions. Due to information system integrity and availability concerns, organizations give careful consideration to the methodology used to carry out automatic updates.","links":[{"href":"#si-8","rel":"related"}]},{"id":"si-3.2_obj","name":"objective","prose":"Determine if the information system automatically updates malicious code protection mechanisms."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing malicious code protection\n\nautomated mechanisms supporting centralized management of malicious code protection mechanisms\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for malicious code protection"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing automatic updates to malicious code protection capability"}]}]}]},{"id":"si-4","class":"SP800-53","title":"Information System Monitoring","params":[{"id":"si-4_prm_1","label":"organization-defined monitoring objectives"},{"id":"si-4_prm_2","label":"organization-defined techniques and methods"},{"id":"si-4_prm_3","label":"organization-defined information system monitoring information"},{"id":"si-4_prm_4","label":"organization-defined personnel or roles"},{"id":"si-4_prm_5","select":{"how-many":"one-or-more","choice":["as needed"," {{ insert: param, si-4_prm_6 }} "]}},{"id":"si-4_prm_6","depends-on":"si-4_prm_5","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-4"},{"name":"sort-id","value":"si-04"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"},{"href":"#6d431fee-658f-4a0e-9f2e-a38b5d398fab","rel":"reference"},{"href":"#672fd561-b92b-4713-b9cf-6c9d9456728b","rel":"reference"},{"href":"#d1b1d689-0f66-4474-9924-c81119758dc1","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"}],"parts":[{"id":"si-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Monitors the information system to detect:","parts":[{"id":"si-4_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Attacks and indicators of potential attacks in accordance with {{ insert: param, si-4_prm_1 }}; and"},{"id":"si-4_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Unauthorized local, network, and remote connections;"}]},{"id":"si-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Identifies unauthorized use of the information system through {{ insert: param, si-4_prm_2 }};"},{"id":"si-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Deploys monitoring devices:","parts":[{"id":"si-4_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Strategically within the information system to collect organization-determined essential information; and"},{"id":"si-4_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"At ad hoc locations within the system to track specific types of transactions of interest to the organization;"}]},{"id":"si-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects information obtained from intrusion-monitoring tools from unauthorized access, modification, and deletion;"},{"id":"si-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information;"},{"id":"si-4_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations; and"},{"id":"si-4_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Provides {{ insert: param, si-4_prm_3 }} to {{ insert: param, si-4_prm_4 }} {{ insert: param, si-4_prm_5 }}."}]},{"id":"si-4_gdn","name":"guidance","prose":"Information system monitoring includes external and internal monitoring. External monitoring includes the observation of events occurring at the information system boundary (i.e., part of perimeter defense and boundary protection). Internal monitoring includes the observation of events occurring within the information system. Organizations can monitor information systems, for example, by observing audit activities in real time or by observing other system aspects such as access patterns, characteristics of access, and other actions. The monitoring objectives may guide determination of the events. Information system monitoring capability is achieved through a variety of tools and techniques (e.g., intrusion detection systems, intrusion prevention systems, malicious code protection software, scanning tools, audit record monitoring software, network monitoring software). Strategic locations for monitoring devices include, for example, selected perimeter locations and near server farms supporting critical applications, with such devices typically being employed at the managed interfaces associated with controls SC-7 and AC-17. Einstein network monitoring devices from the Department of Homeland Security can also be included as monitoring devices. The granularity of monitoring information collected is based on organizational monitoring objectives and the capability of information systems to support such objectives. Specific types of transactions of interest include, for example, Hyper Text Transfer Protocol (HTTP) traffic that bypasses HTTP proxies. Information system monitoring is an integral part of organizational continuous monitoring and incident response programs. Output from system monitoring serves as input to continuous monitoring and incident response programs. A network connection is any connection with a device that communicates through a network (e.g., local area network, Internet). A remote connection is any connection with a device communicating through an external network (e.g., the Internet). Local, network, and remote connections can be either wired or wireless.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-8","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-26","rel":"related"},{"href":"#sc-35","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"si-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-4.a_obj","name":"objective","props":[{"name":"label","value":"SI-4(a)"}],"parts":[{"id":"si-4.a.1_obj","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)"}],"parts":[{"id":"si-4.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[1]"}],"prose":"defines monitoring objectives to detect attacks and indicators of potential attacks on the information system;"},{"id":"si-4.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[2]"}],"prose":"monitors the information system to detect, in accordance with organization-defined monitoring objectives,:","parts":[{"id":"si-4.a.1_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[2][a]"}],"prose":"attacks;"},{"id":"si-4.a.1_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[2][b]"}],"prose":"indicators of potential attacks;"}]}]},{"id":"si-4.a.2_obj","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)"}],"prose":"monitors the information system to detect unauthorized:","parts":[{"id":"si-4.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)[1]"}],"prose":"local connections;"},{"id":"si-4.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)[2]"}],"prose":"network connections;"},{"id":"si-4.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)[3]"}],"prose":"remote connections;"}]}]},{"id":"si-4.b_obj","name":"objective","props":[{"name":"label","value":"SI-4(b)"}],"parts":[{"id":"si-4.b.1_obj","name":"objective","props":[{"name":"label","value":"SI-4(b)(1)"}],"prose":"defines techniques and methods to identify unauthorized use of the information system;"},{"id":"si-4.b.2_obj","name":"objective","props":[{"name":"label","value":"SI-4(b)(2)"}],"prose":"identifies unauthorized use of the information system through organization-defined techniques and methods;"}]},{"id":"si-4.c_obj","name":"objective","props":[{"name":"label","value":"SI-4(c)"}],"prose":"deploys monitoring devices:","parts":[{"id":"si-4.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(c)[1]"}],"prose":"strategically within the information system to collect organization-determined essential information;"},{"id":"si-4.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(c)[2]"}],"prose":"at ad hoc locations within the system to track specific types of transactions of interest to the organization;"}]},{"id":"si-4.d_obj","name":"objective","props":[{"name":"label","value":"SI-4(d)"}],"prose":"protects information obtained from intrusion-monitoring tools from unauthorized:","parts":[{"id":"si-4.d_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(d)[1]"}],"prose":"access;"},{"id":"si-4.d_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(d)[2]"}],"prose":"modification;"},{"id":"si-4.d_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(d)[3]"}],"prose":"deletion;"}]},{"id":"si-4.e_obj","name":"objective","props":[{"name":"label","value":"SI-4(e)"}],"prose":"heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information;"},{"id":"si-4.f_obj","name":"objective","props":[{"name":"label","value":"SI-4(f)"}],"prose":"obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations;"},{"id":"si-4.g_obj","name":"objective","props":[{"name":"label","value":"SI-4(g)"}],"parts":[{"id":"si-4.g_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(g)[1]"}],"prose":"defines personnel or roles to whom information system monitoring information is to be provided;"},{"id":"si-4.g_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(g)[2]"}],"prose":"defines information system monitoring information to be provided to organization-defined personnel or roles;"},{"id":"si-4.g_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(g)[3]"}],"prose":"defines a frequency to provide organization-defined information system monitoring to organization-defined personnel or roles;"},{"id":"si-4.g_obj.4","name":"objective","props":[{"name":"label","value":"SI-4(g)[4]"}],"prose":"provides organization-defined information system monitoring information to organization-defined personnel or roles one or more of the following:","parts":[{"id":"si-4.g_obj.4.a","name":"objective","props":[{"name":"label","value":"SI-4(g)[4][a]"}],"prose":"as needed; and\/or"},{"id":"si-4.g_obj.4.b","name":"objective","props":[{"name":"label","value":"SI-4(g)[4][b]"}],"prose":"with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Continuous monitoring strategy\n\nsystem and information integrity policy\n\nprocedures addressing information system monitoring tools and techniques\n\nfacility diagram\/layout\n\ninformation system design documentation\n\ninformation system monitoring tools and techniques documentation\n\nlocations within information system where monitoring devices are deployed\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility monitoring the information system"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for information system monitoring\n\nautomated mechanisms supporting and\/or implementing information system monitoring capability"}]}],"controls":[{"id":"si-4.2","class":"SP800-53-enhancement","title":"Automated Tools for Real-time Analysis","props":[{"name":"label","value":"SI-4(2)"},{"name":"sort-id","value":"si-04.02"}],"parts":[{"id":"si-4.2_smt","name":"statement","prose":"The organization employs automated tools to support near real-time analysis of events."},{"id":"si-4.2_gdn","name":"guidance","prose":"Automated tools include, for example, host-based, network-based, transport-based, or storage-based event monitoring tools or Security Information and Event Management (SIEM) technologies that provide real time analysis of alerts and\/or notifications generated by organizational information systems."},{"id":"si-4.2_obj","name":"objective","prose":"Determine if the organization employs automated tools to support near real-time analysis of events."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing information system monitoring tools and techniques\n\ninformation system design documentation\n\ninformation system monitoring tools and techniques documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for monitoring the information system\n\norganizational personnel with responsibility for incident response\/management"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for near real-time analysis of events\n\norganizational processes for information system monitoring\n\nautomated mechanisms supporting and\/or implementing information system monitoring\n\nautomated mechanisms\/tools supporting and\/or implementing analysis of events"}]}]},{"id":"si-4.4","class":"SP800-53-enhancement","title":"Inbound and Outbound Communications Traffic","params":[{"id":"si-4.4_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"SI-4(4)"},{"name":"sort-id","value":"si-04.04"}],"parts":[{"id":"si-4.4_smt","name":"statement","prose":"The information system monitors inbound and outbound communications traffic {{ insert: param, si-4.4_prm_1 }} for unusual or unauthorized activities or conditions."},{"id":"si-4.4_gdn","name":"guidance","prose":"Unusual\/unauthorized activities or conditions related to information system inbound and outbound communications traffic include, for example, internal traffic that indicates the presence of malicious code within organizational information systems or propagating among system components, the unauthorized exporting of information, or signaling to external information systems. Evidence of malicious code is used to identify potentially compromised information systems or information system components."},{"id":"si-4.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-4.4_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(4)[1]"}],"prose":"defines a frequency to monitor:","parts":[{"id":"si-4.4_obj.1.a","name":"objective","props":[{"name":"label","value":"SI-4(4)[1][a]"}],"prose":"inbound communications traffic for unusual or unauthorized activities or conditions;"},{"id":"si-4.4_obj.1.b","name":"objective","props":[{"name":"label","value":"SI-4(4)[1][b]"}],"prose":"outbound communications traffic for unusual or unauthorized activities or conditions;"}]},{"id":"si-4.4_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(4)[2]"}],"prose":"monitors, with the organization-defined frequency:","parts":[{"id":"si-4.4_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-4(4)[2][a]"}],"prose":"inbound communications traffic for unusual or unauthorized activities or conditions; and"},{"id":"si-4.4_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-4(4)[2][b]"}],"prose":"outbound communications traffic for unusual or unauthorized activities or conditions."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing information system monitoring tools and techniques\n\ninformation system design documentation\n\ninformation system monitoring tools and techniques documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system protocols\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for monitoring the information system\n\norganizational personnel with responsibility for the intrusion detection system"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for intrusion detection\/information system monitoring\n\nautomated mechanisms supporting and\/or implementing intrusion detection capability\/information system monitoring\n\nautomated mechanisms supporting and\/or implementing monitoring of inbound\/outbound communications traffic"}]}]},{"id":"si-4.5","class":"SP800-53-enhancement","title":"System-generated Alerts","params":[{"id":"si-4.5_prm_1","label":"organization-defined personnel or roles"},{"id":"si-4.5_prm_2","label":"organization-defined compromise indicators"}],"props":[{"name":"label","value":"SI-4(5)"},{"name":"sort-id","value":"si-04.05"}],"parts":[{"id":"si-4.5_smt","name":"statement","prose":"The information system alerts {{ insert: param, si-4.5_prm_1 }} when the following indications of compromise or potential compromise occur: {{ insert: param, si-4.5_prm_2 }}."},{"id":"si-4.5_gdn","name":"guidance","prose":"Alerts may be generated from a variety of sources, including, for example, audit records or inputs from malicious code protection mechanisms, intrusion detection or prevention mechanisms, or boundary protection devices such as firewalls, gateways, and routers. Alerts can be transmitted, for example, telephonically, by electronic mail messages, or by text messaging. Organizational personnel on the notification list can include, for example, system administrators, mission\/business owners, system owners, or information system security officers.","links":[{"href":"#au-5","rel":"related"},{"href":"#pe-6","rel":"related"}]},{"id":"si-4.5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-4.5_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(5)[1]"}],"prose":"the organization defines compromise indicators for the information system;"},{"id":"si-4.5_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(5)[2]"}],"prose":"the organization defines personnel or roles to be alerted when indications of compromise or potential compromise occur; and"},{"id":"si-4.5_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(5)[3]"}],"prose":"the information system alerts organization-defined personnel or roles when organization-defined compromise indicators occur."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing information system monitoring tools and techniques\n\ninformation system monitoring tools and techniques documentation\n\ninformation system configuration settings and associated documentation\n\nalerts\/notifications generated based on compromise indicators\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for monitoring the information system\n\norganizational personnel with responsibility for the intrusion detection system"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for intrusion detection\/information system monitoring\n\nautomated mechanisms supporting and\/or implementing intrusion detection\/information system monitoring capability\n\nautomated mechanisms supporting and\/or implementing alerts for compromise indicators"}]}]}]},{"id":"si-5","class":"SP800-53","title":"Security Alerts, Advisories, and Directives","params":[{"id":"si-5_prm_1","label":"organization-defined external organizations"},{"id":"si-5_prm_2","select":{"how-many":"one-or-more","choice":[" {{ insert: param, si-5_prm_3 }} "," {{ insert: param, si-5_prm_4 }} "," {{ insert: param, si-5_prm_5 }} "]}},{"id":"si-5_prm_3","depends-on":"si-5_prm_2","label":"organization-defined personnel or roles"},{"id":"si-5_prm_4","depends-on":"si-5_prm_2","label":"organization-defined elements within the organization"},{"id":"si-5_prm_5","depends-on":"si-5_prm_2","label":"organization-defined external organizations"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-5"},{"name":"sort-id","value":"si-05"}],"links":[{"href":"#bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","rel":"reference"}],"parts":[{"id":"si-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Receives information system security alerts, advisories, and directives from {{ insert: param, si-5_prm_1 }} on an ongoing basis;"},{"id":"si-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Generates internal security alerts, advisories, and directives as deemed necessary;"},{"id":"si-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Disseminates security alerts, advisories, and directives to: {{ insert: param, si-5_prm_2 }}; and"},{"id":"si-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Implements security directives in accordance with established time frames, or notifies the issuing organization of the degree of noncompliance."}]},{"id":"si-5_gdn","name":"guidance","prose":"The United States Computer Emergency Readiness Team (US-CERT) generates security alerts and advisories to maintain situational awareness across the federal government. Security directives are issued by OMB or other designated organizations with the responsibility and authority to issue such directives. Compliance to security directives is essential due to the critical nature of many of these directives and the potential immediate adverse effects on organizational operations and assets, individuals, other organizations, and the Nation should the directives not be implemented in a timely manner. External organizations include, for example, external mission\/business partners, supply chain partners, external service providers, and other peer\/supporting organizations.","links":[{"href":"#si-2","rel":"related"}]},{"id":"si-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-5.a_obj","name":"objective","props":[{"name":"label","value":"SI-5(a)"}],"parts":[{"id":"si-5.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-5(a)[1]"}],"prose":"defines external organizations from whom information system security alerts, advisories and directives are to be received;"},{"id":"si-5.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-5(a)[2]"}],"prose":"receives information system security alerts, advisories, and directives from organization-defined external organizations on an ongoing basis;"}]},{"id":"si-5.b_obj","name":"objective","props":[{"name":"label","value":"SI-5(b)"}],"prose":"generates internal security alerts, advisories, and directives as deemed necessary;"},{"id":"si-5.c_obj","name":"objective","props":[{"name":"label","value":"SI-5(c)"}],"parts":[{"id":"si-5.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-5(c)[1]"}],"prose":"defines personnel or roles to whom security alerts, advisories, and directives are to be provided;"},{"id":"si-5.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-5(c)[2]"}],"prose":"defines elements within the organization to whom security alerts, advisories, and directives are to be provided;"},{"id":"si-5.c_obj.3","name":"objective","props":[{"name":"label","value":"SI-5(c)[3]"}],"prose":"defines external organizations to whom security alerts, advisories, and directives are to be provided;"},{"id":"si-5.c_obj.4","name":"objective","props":[{"name":"label","value":"SI-5(c)[4]"}],"prose":"disseminates security alerts, advisories, and directives to one or more of the following:","parts":[{"id":"si-5.c_obj.4.a","name":"objective","props":[{"name":"label","value":"SI-5(c)[4][a]"}],"prose":"organization-defined personnel or roles;"},{"id":"si-5.c_obj.4.b","name":"objective","props":[{"name":"label","value":"SI-5(c)[4][b]"}],"prose":"organization-defined elements within the organization; and\/or"},{"id":"si-5.c_obj.4.c","name":"objective","props":[{"name":"label","value":"SI-5(c)[4][c]"}],"prose":"organization-defined external organizations; and"}]}]},{"id":"si-5.d_obj","name":"objective","props":[{"name":"label","value":"SI-5(d)"}],"parts":[{"id":"si-5.d_obj.1","name":"objective","props":[{"name":"label","value":"SI-5(d)[1]"}],"prose":"implements security directives in accordance with established time frames; or"},{"id":"si-5.d_obj.2","name":"objective","props":[{"name":"label","value":"SI-5(d)[2]"}],"prose":"notifies the issuing organization of the degree of noncompliance."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing security alerts, advisories, and directives\n\nrecords of security alerts and advisories\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security alert and advisory responsibilities\n\norganizational personnel implementing, operating, maintaining, and using the information system\n\norganizational personnel, organizational elements, and\/or external organizations to whom alerts, advisories, and directives are to be disseminated\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for defining, receiving, generating, disseminating, and complying with security alerts, advisories, and directives\n\nautomated mechanisms supporting and\/or implementing definition, receipt, generation, and dissemination of security alerts, advisories, and directives\n\nautomated mechanisms supporting and\/or implementing security directives"}]}],"controls":[{"id":"si-5.1","class":"SP800-53-enhancement","title":"Automated Alerts and Advisories","props":[{"name":"label","value":"SI-5(1)"},{"name":"sort-id","value":"si-05.01"}],"parts":[{"id":"si-5.1_smt","name":"statement","prose":"The organization employs automated mechanisms to make security alert and advisory information available throughout the organization."},{"id":"si-5.1_gdn","name":"guidance","prose":"The significant number of changes to organizational information systems and the environments in which those systems operate requires the dissemination of security-related information to a variety of organizational entities that have a direct interest in the success of organizational missions and business functions. Based on the information provided by the security alerts and advisories, changes may be required at one or more of the three tiers related to the management of information security risk including the governance level, mission\/business process\/enterprise architecture level, and the information system level."},{"id":"si-5.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to make security alert and advisory information available throughout the organization."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing security alerts, advisories, and directives\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nautomated mechanisms supporting the distribution of security alert and advisory information\n\nrecords of security alerts and advisories\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security alert and advisory responsibilities\n\norganizational personnel implementing, operating, maintaining, and using the information system\n\norganizational personnel, organizational elements, and\/or external organizations to whom alerts and advisories are to be disseminated\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for defining, receiving, generating, and disseminating security alerts and advisories\n\nautomated mechanisms supporting and\/or implementing dissemination of security alerts and advisories"}]}]}]},{"id":"si-6","class":"SP800-53","title":"Security Function Verification","params":[{"id":"si-6_prm_1","label":"organization-defined security functions"},{"id":"si-6_prm_2","select":{"how-many":"one-or-more","choice":[" {{ insert: param, si-6_prm_3 }} ","upon command by user with appropriate privilege"," {{ insert: param, si-6_prm_4 }} "]}},{"id":"si-6_prm_3","depends-on":"si-6_prm_2","label":"organization-defined system transitional states"},{"id":"si-6_prm_4","depends-on":"si-6_prm_2","label":"organization-defined frequency"},{"id":"si-6_prm_5","label":"organization-defined personnel or roles"},{"id":"si-6_prm_6","select":{"how-many":"one-or-more","choice":["shuts the information system down","restarts the information system"," {{ insert: param, si-6_prm_7 }} "]}},{"id":"si-6_prm_7","depends-on":"si-6_prm_6","label":"organization-defined alternative action(s)"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-6"},{"name":"sort-id","value":"si-06"}],"parts":[{"id":"si-6_smt","name":"statement","prose":"The information system:","parts":[{"id":"si-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Verifies the correct operation of {{ insert: param, si-6_prm_1 }};"},{"id":"si-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Performs this verification {{ insert: param, si-6_prm_2 }};"},{"id":"si-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Notifies {{ insert: param, si-6_prm_5 }} of failed security verification tests; and"},{"id":"si-6_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":" {{ insert: param, si-6_prm_6 }} when anomalies are discovered."}]},{"id":"si-6_gdn","name":"guidance","prose":"Transitional states for information systems include, for example, system startup, restart, shutdown, and abort. Notifications provided by information systems include, for example, electronic alerts to system administrators, messages to local computer consoles, and\/or hardware indications such as lights.","links":[{"href":"#ca-7","rel":"related"},{"href":"#cm-6","rel":"related"}]},{"id":"si-6_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-6.a_obj","name":"objective","props":[{"name":"label","value":"SI-6(a)"}],"parts":[{"id":"si-6.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-6(a)[1]"}],"prose":"the organization defines security functions to be verified for correct operation;"},{"id":"si-6.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-6(a)[2]"}],"prose":"the information system verifies the correct operation of organization-defined security functions;"}]},{"id":"si-6.b_obj","name":"objective","props":[{"name":"label","value":"SI-6(b)"}],"parts":[{"id":"si-6.b_obj.1","name":"objective","props":[{"name":"label","value":"SI-6(b)[1]"}],"prose":"the organization defines system transitional states requiring verification of organization-defined security functions;"},{"id":"si-6.b_obj.2","name":"objective","props":[{"name":"label","value":"SI-6(b)[2]"}],"prose":"the organization defines a frequency to verify the correct operation of organization-defined security functions;"},{"id":"si-6.b_obj.3","name":"objective","props":[{"name":"label","value":"SI-6(b)[3]"}],"prose":"the information system performs this verification one or more of the following:","parts":[{"id":"si-6.b_obj.3.a","name":"objective","props":[{"name":"label","value":"SI-6(b)[3][a]"}],"prose":"at organization-defined system transitional states;"},{"id":"si-6.b_obj.3.b","name":"objective","props":[{"name":"label","value":"SI-6(b)[3][b]"}],"prose":"upon command by user with appropriate privilege; and\/or"},{"id":"si-6.b_obj.3.c","name":"objective","props":[{"name":"label","value":"SI-6(b)[3][c]"}],"prose":"with the organization-defined frequency;"}]}]},{"id":"si-6.c_obj","name":"objective","props":[{"name":"label","value":"SI-6(c)"}],"parts":[{"id":"si-6.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-6(c)[1]"}],"prose":"the organization defines personnel or roles to be notified of failed security verification tests;"},{"id":"si-6.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-6(c)[2]"}],"prose":"the information system notifies organization-defined personnel or roles of failed security verification tests;"}]},{"id":"si-6.d_obj","name":"objective","props":[{"name":"label","value":"SI-6(d)"}],"parts":[{"id":"si-6.d_obj.1","name":"objective","props":[{"name":"label","value":"SI-6(d)[1]"}],"prose":"the organization defines alternative action(s) to be performed when anomalies are discovered;"},{"id":"si-6.d_obj.2","name":"objective","props":[{"name":"label","value":"SI-6(d)[2]"}],"prose":"the information system performs one or more of the following actions when anomalies are discovered:","parts":[{"id":"si-6.d_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-6(d)[2][a]"}],"prose":"shuts the information system down;"},{"id":"si-6.d_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-6(d)[2][b]"}],"prose":"restarts the information system; and\/or"},{"id":"si-6.d_obj.2.c","name":"objective","props":[{"name":"label","value":"SI-6(d)[2][c]"}],"prose":"performs organization-defined alternative action(s)."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing security function verification\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nalerts\/notifications of failed security verification tests\n\nlist of system transition states requiring security functionality verification\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security function verification responsibilities\n\norganizational personnel implementing, operating, and maintaining the information system\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security function verification\n\nautomated mechanisms supporting and\/or implementing security function verification capability"}]}]},{"id":"si-7","class":"SP800-53","title":"Software, Firmware, and Information Integrity","params":[{"id":"si-7_prm_1","label":"organization-defined software, firmware, and information"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-7"},{"name":"sort-id","value":"si-07"}],"links":[{"href":"#6bf8d24a-78dc-4727-a2ac-0e64d71c495c","rel":"reference"},{"href":"#3878cc04-144a-483e-af62-8fe6f4ad6c7a","rel":"reference"}],"parts":[{"id":"si-7_smt","name":"statement","prose":"The organization employs integrity verification tools to detect unauthorized changes to {{ insert: param, si-7_prm_1 }}."},{"id":"si-7_gdn","name":"guidance","prose":"Unauthorized changes to software, firmware, and information can occur due to errors or malicious activity (e.g., tampering). Software includes, for example, operating systems (with key internal components such as kernels, drivers), middleware, and applications. Firmware includes, for example, the Basic Input Output System (BIOS). Information includes metadata such as security attributes associated with information. State-of-the-practice integrity-checking mechanisms (e.g., parity checks, cyclical redundancy checks, cryptographic hashes) and associated tools can automatically monitor the integrity of information systems and hosted applications.","links":[{"href":"#sa-12","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#si-3","rel":"related"}]},{"id":"si-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-7_obj.1","name":"objective","props":[{"name":"label","value":"SI-7[1]"}],"parts":[{"id":"si-7_obj.1.a","name":"objective","props":[{"name":"label","value":"SI-7[1][a]"}],"prose":"defines software requiring integrity verification tools to be employed to detect unauthorized changes;"},{"id":"si-7_obj.1.b","name":"objective","props":[{"name":"label","value":"SI-7[1][b]"}],"prose":"defines firmware requiring integrity verification tools to be employed to detect unauthorized changes;"},{"id":"si-7_obj.1.c","name":"objective","props":[{"name":"label","value":"SI-7[1][c]"}],"prose":"defines information requiring integrity verification tools to be employed to detect unauthorized changes;"}]},{"id":"si-7_obj.2","name":"objective","props":[{"name":"label","value":"SI-7[2]"}],"prose":"employs integrity verification tools to detect unauthorized changes to organization-defined:","parts":[{"id":"si-7_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-7[2][a]"}],"prose":"software;"},{"id":"si-7_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-7[2][b]"}],"prose":"firmware; and"},{"id":"si-7_obj.2.c","name":"objective","props":[{"name":"label","value":"SI-7[2][c]"}],"prose":"information."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing software, firmware, and information integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nintegrity verification tools and associated documentation\n\nrecords generated\/triggered from integrity verification tools regarding unauthorized software, firmware, and information changes\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for software, firmware, and\/or information integrity\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Software, firmware, and information integrity verification tools"}]}],"controls":[{"id":"si-7.1","class":"SP800-53-enhancement","title":"Integrity Checks","params":[{"id":"si-7.1_prm_1","label":"organization-defined software, firmware, and information"},{"id":"si-7.1_prm_2","select":{"how-many":"one-or-more","choice":["at startup","at {{ insert: param, si-7.1_prm_3 }} "," {{ insert: param, si-7.1_prm_4 }} "]}},{"id":"si-7.1_prm_3","depends-on":"si-7.1_prm_2","label":"organization-defined transitional states or security-relevant events"},{"id":"si-7.1_prm_4","depends-on":"si-7.1_prm_2","label":"organization-defined frequency"}],"props":[{"name":"label","value":"SI-7(1)"},{"name":"sort-id","value":"si-07.01"}],"parts":[{"id":"si-7.1_smt","name":"statement","prose":"The information system performs an integrity check of {{ insert: param, si-7.1_prm_1 }} {{ insert: param, si-7.1_prm_2 }}."},{"id":"si-7.1_gdn","name":"guidance","prose":"Security-relevant events include, for example, the identification of a new threat to which organizational information systems are susceptible, and the installation of new hardware, software, or firmware. Transitional states include, for example, system startup, restart, shutdown, and abort."},{"id":"si-7.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-7.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-7(1)[1]"}],"prose":"the organization defines:","parts":[{"id":"si-7.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SI-7(1)[1][a]"}],"prose":"software requiring integrity checks to be performed;"},{"id":"si-7.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SI-7(1)[1][b]"}],"prose":"firmware requiring integrity checks to be performed;"},{"id":"si-7.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SI-7(1)[1][c]"}],"prose":"information requiring integrity checks to be performed;"}]},{"id":"si-7.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-7(1)[2]"}],"prose":"the organization defines transitional states or security-relevant events requiring integrity checks of organization-defined:","parts":[{"id":"si-7.1_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-7(1)[2][a]"}],"prose":"software;"},{"id":"si-7.1_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-7(1)[2][b]"}],"prose":"firmware;"},{"id":"si-7.1_obj.2.c","name":"objective","props":[{"name":"label","value":"SI-7(1)[2][c]"}],"prose":"information;"}]},{"id":"si-7.1_obj.3","name":"objective","props":[{"name":"label","value":"SI-7(1)[3]"}],"prose":"the organization defines a frequency with which to perform an integrity check of organization-defined:","parts":[{"id":"si-7.1_obj.3.a","name":"objective","props":[{"name":"label","value":"SI-7(1)[3][a]"}],"prose":"software;"},{"id":"si-7.1_obj.3.b","name":"objective","props":[{"name":"label","value":"SI-7(1)[3][b]"}],"prose":"firmware;"},{"id":"si-7.1_obj.3.c","name":"objective","props":[{"name":"label","value":"SI-7(1)[3][c]"}],"prose":"information;"}]},{"id":"si-7.1_obj.4","name":"objective","props":[{"name":"label","value":"SI-7(1)[4]"}],"prose":"the information system performs an integrity check of organization-defined software, firmware, and information one or more of the following:","parts":[{"id":"si-7.1_obj.4.a","name":"objective","props":[{"name":"label","value":"SI-7(1)[4][a]"}],"prose":"at startup;"},{"id":"si-7.1_obj.4.b","name":"objective","props":[{"name":"label","value":"SI-7(1)[4][b]"}],"prose":"at organization-defined transitional states or security-relevant events; and\/or"},{"id":"si-7.1_obj.4.c","name":"objective","props":[{"name":"label","value":"SI-7(1)[4][c]"}],"prose":"with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing software, firmware, and information integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nintegrity verification tools and associated documentation\n\nrecords of integrity scans\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for software, firmware, and\/or information integrity\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Software, firmware, and information integrity verification tools"}]}]},{"id":"si-7.2","class":"SP800-53-enhancement","title":"Automated Notifications of Integrity Violations","params":[{"id":"si-7.2_prm_1","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"SI-7(2)"},{"name":"sort-id","value":"si-07.02"}],"parts":[{"id":"si-7.2_smt","name":"statement","prose":"The organization employs automated tools that provide notification to {{ insert: param, si-7.2_prm_1 }} upon discovering discrepancies during integrity verification."},{"id":"si-7.2_gdn","name":"guidance","prose":"The use of automated tools to report integrity violations and to notify organizational personnel in a timely matter is an essential precursor to effective risk response. Personnel having an interest in integrity violations include, for example, mission\/business owners, information system owners, systems administrators, software developers, systems integrators, and information security officers."},{"id":"si-7.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-7.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-7(2)[1]"}],"prose":"defines personnel or roles to whom notification is to be provided upon discovering discrepancies during integrity verification; and"},{"id":"si-7.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-7(2)[2]"}],"prose":"employs automated tools that provide notification to organization-defined personnel or roles upon discovering discrepancies during integrity verification."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing software, firmware, and information integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nintegrity verification tools and associated documentation\n\nrecords of integrity scans\n\nautomated tools supporting alerts and notifications for integrity discrepancies\n\nalerts\/notifications provided upon discovering discrepancies during integrity verifications\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for software, firmware, and\/or information integrity\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Software, firmware, and information integrity verification tools\n\nautomated mechanisms providing integrity discrepancy notifications"}]}]},{"id":"si-7.5","class":"SP800-53-enhancement","title":"Automated Response to Integrity Violations","params":[{"id":"si-7.5_prm_1","select":{"how-many":"one-or-more","choice":["shuts the information system down","restarts the information system","implements {{ insert: param, si-7.5_prm_2 }} "]}},{"id":"si-7.5_prm_2","depends-on":"si-7.5_prm_1","label":"organization-defined security safeguards"}],"props":[{"name":"label","value":"SI-7(5)"},{"name":"sort-id","value":"si-07.05"}],"parts":[{"id":"si-7.5_smt","name":"statement","prose":"The information system automatically {{ insert: param, si-7.5_prm_1 }} when integrity violations are discovered."},{"id":"si-7.5_gdn","name":"guidance","prose":"Organizations may define different integrity checking and anomaly responses: (i) by type of information (e.g., firmware, software, user data); (ii) by specific information (e.g., boot firmware, boot firmware for a specific types of machines); or (iii) a combination of both. Automatic implementation of specific safeguards within organizational information systems includes, for example, reversing the changes, halting the information system, or triggering audit alerts when unauthorized modifications to critical security files occur."},{"id":"si-7.5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-7.5_obj.1","name":"objective","props":[{"name":"label","value":"SI-7(5)[1]"}],"prose":"the organization defines security safeguards to be implemented when integrity violations are discovered;"},{"id":"si-7.5_obj.2","name":"objective","props":[{"name":"label","value":"SI-7(5)[2]"}],"prose":"the information system automatically performs one or more of the following actions when integrity violations are discovered:","parts":[{"id":"si-7.5_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-7(5)[2][a]"}],"prose":"shuts the information system down;"},{"id":"si-7.5_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-7(5)[2][b]"}],"prose":"restarts the information system; and\/or"},{"id":"si-7.5_obj.2.c","name":"objective","props":[{"name":"label","value":"SI-7(5)[2][c]"}],"prose":"implements the organization-defined security safeguards."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing software, firmware, and information integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nintegrity verification tools and associated documentation\n\nrecords of integrity scans\n\nrecords of integrity checks and responses to integrity violations\n\ninformation audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for software, firmware, and\/or information integrity\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Software, firmware, and information integrity verification tools\n\nautomated mechanisms providing an automated response to integrity violations\n\nautomated mechanisms supporting and\/or implementing security safeguards to be implemented when integrity violations are discovered"}]}]},{"id":"si-7.7","class":"SP800-53-enhancement","title":"Integration of Detection and Response","params":[{"id":"si-7.7_prm_1","label":"organization-defined security-relevant changes to the information system"}],"props":[{"name":"label","value":"SI-7(7)"},{"name":"sort-id","value":"si-07.07"}],"parts":[{"id":"si-7.7_smt","name":"statement","prose":"The organization incorporates the detection of unauthorized {{ insert: param, si-7.7_prm_1 }} into the organizational incident response capability."},{"id":"si-7.7_gdn","name":"guidance","prose":"This control enhancement helps to ensure that detected events are tracked, monitored, corrected, and available for historical purposes. Maintaining historical records is important both for being able to identify and discern adversary actions over an extended period of time and for possible legal actions. Security-relevant changes include, for example, unauthorized changes to established configuration settings or unauthorized elevation of information system privileges.","links":[{"href":"#ir-4","rel":"related"},{"href":"#ir-5","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"si-7.7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-7.7_obj.1","name":"objective","props":[{"name":"label","value":"SI-7(7)[1]"}],"prose":"defines unauthorized security-relevant changes to the information system; and"},{"id":"si-7.7_obj.2","name":"objective","props":[{"name":"label","value":"SI-7(7)[2]"}],"prose":"incorporates the detection of unauthorized organization-defined security-relevant changes to the information system into the organizational incident response capability."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing software, firmware, and information integrity\n\nprocedures addressing incident response\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nincident response records\n\ninformation audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for software, firmware, and\/or information integrity\n\norganizational personnel with information security responsibilities\n\norganizational personnel with incident response responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incorporating detection of unauthorized security-relevant changes into the incident response capability\n\nsoftware, firmware, and information integrity verification tools\n\nautomated mechanisms supporting and\/or implementing incorporation of detection of unauthorized security-relevant changes into the incident response capability"}]}]},{"id":"si-7.14","class":"SP800-53-enhancement","title":"Binary or Machine Executable Code","props":[{"name":"label","value":"SI-7(14)"},{"name":"sort-id","value":"si-07.14"}],"parts":[{"id":"si-7.14_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-7.14_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Prohibits the use of binary or machine-executable code from sources with limited or no warranty and without the provision of source code; and"},{"id":"si-7.14_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Provides exceptions to the source code requirement only for compelling mission\/operational requirements and with the approval of the authorizing official."}]},{"id":"si-7.14_gdn","name":"guidance","prose":"This control enhancement applies to all sources of binary or machine-executable code including, for example, commercial software\/firmware and open source software. Organizations assess software products without accompanying source code from sources with limited or no warranty for potential security impacts. The assessments address the fact that these types of software products may be very difficult to review, repair, or extend, given that organizations, in most cases, do not have access to the original source code, and there may be no owners who could make such repairs on behalf of organizations.","links":[{"href":"#sa-5","rel":"related"}]},{"id":"si-7.14_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-7.14.a_obj","name":"objective","props":[{"name":"label","value":"SI-7(14)(a)"}],"parts":[{"id":"si-7.14.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-7(14)(a)[1]"}],"prose":"prohibits the use of binary or machine-executable code from sources with limited or no warranty;"},{"id":"si-7.14.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-7(14)(a)[2]"}],"prose":"prohibits the use of binary or machine-executable code without the provision of source code;"}],"links":[{"href":"#si-7.14_smt.a","rel":"corresp"}]},{"id":"si-7.14.b_obj","name":"objective","props":[{"name":"label","value":"SI-7(14)(b)"}],"parts":[{"id":"si-7.14.b_obj.1","name":"objective","props":[{"name":"label","value":"SI-7(14)(b)[1]"}],"prose":"provides exceptions to the source code requirement only for compelling mission\/operational requirements; and"},{"id":"si-7.14.b_obj.2","name":"objective","props":[{"name":"label","value":"SI-7(14)(b)[2]"}],"prose":"provides exceptions to the source code requirement only with the approval of the authorizing official."}],"links":[{"href":"#si-7.14_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing software, firmware, and information integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\napproval records for execution of binary and machine-executable code\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for software, firmware, and\/or information integrity\n\norganizational personnel with information security responsibilities\n\nauthorizing official\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing prohibition of the execution of binary or machine-executable code"}]}]}]},{"id":"si-8","class":"SP800-53","title":"Spam Protection","props":[{"name":"priority","value":"P2"},{"name":"label","value":"SI-8"},{"name":"sort-id","value":"si-08"}],"links":[{"href":"#c6e95ca0-5828-420e-b095-00895b72b5e8","rel":"reference"}],"parts":[{"id":"si-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Employs spam protection mechanisms at information system entry and exit points to detect and take action on unsolicited messages; and"},{"id":"si-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Updates spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures."}]},{"id":"si-8_gdn","name":"guidance","prose":"Information system entry and exit points include, for example, firewalls, electronic mail servers, web servers, proxy servers, remote-access servers, workstations, mobile devices, and notebook\/laptop computers. Spam can be transported by different means including, for example, electronic mail, electronic mail attachments, and web accesses. Spam protection mechanisms include, for example, signature definitions.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-3","rel":"related"}]},{"id":"si-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-8.a_obj","name":"objective","props":[{"name":"label","value":"SI-8(a)"}],"prose":"employs spam protection mechanisms:","parts":[{"id":"si-8.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-8(a)[1]"}],"prose":"at information system entry points to detect unsolicited messages;"},{"id":"si-8.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-8(a)[2]"}],"prose":"at information system entry points to take action on unsolicited messages;"},{"id":"si-8.a_obj.3","name":"objective","props":[{"name":"label","value":"SI-8(a)[3]"}],"prose":"at information system exit points to detect unsolicited messages;"},{"id":"si-8.a_obj.4","name":"objective","props":[{"name":"label","value":"SI-8(a)[4]"}],"prose":"at information system exit points to take action on unsolicited messages; and"}]},{"id":"si-8.b_obj","name":"objective","props":[{"name":"label","value":"SI-8(b)"}],"prose":"updates spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nconfiguration management policy and procedures (CM-1)\n\nprocedures addressing spam protection\n\nspam protection mechanisms\n\nrecords of spam protection updates\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for spam protection\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for implementing spam protection\n\nautomated mechanisms supporting and\/or implementing spam protection"}]}],"controls":[{"id":"si-8.1","class":"SP800-53-enhancement","title":"Central Management","props":[{"name":"label","value":"SI-8(1)"},{"name":"sort-id","value":"si-08.01"}],"parts":[{"id":"si-8.1_smt","name":"statement","prose":"The organization centrally manages spam protection mechanisms."},{"id":"si-8.1_gdn","name":"guidance","prose":"Central management is the organization-wide management and implementation of spam protection mechanisms. Central management includes planning, implementing, assessing, authorizing, and monitoring the organization-defined, centrally managed spam protection security controls.","links":[{"href":"#au-3","rel":"related"},{"href":"#si-2","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"si-8.1_obj","name":"objective","prose":"Determine if the organization centrally manages spam protection mechanisms."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing spam protection\n\nspam protection mechanisms\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for spam protection\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for central management of spam protection\n\nautomated mechanisms supporting and\/or implementing central management of spam protection"}]}]},{"id":"si-8.2","class":"SP800-53-enhancement","title":"Automatic Updates","props":[{"name":"label","value":"SI-8(2)"},{"name":"sort-id","value":"si-08.02"}],"parts":[{"id":"si-8.2_smt","name":"statement","prose":"The information system automatically updates spam protection mechanisms."},{"id":"si-8.2_obj","name":"objective","prose":"Determine if the information system automatically updates spam protection mechanisms."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing spam protection\n\nspam protection mechanisms\n\nrecords of spam protection updates\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for spam protection\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for spam protection\n\nautomated mechanisms supporting and\/or implementing automatic updates to spam protection mechanisms"}]}]}]},{"id":"si-10","class":"SP800-53","title":"Information Input Validation","params":[{"id":"si-10_prm_1","label":"organization-defined information inputs"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-10"},{"name":"sort-id","value":"si-10"}],"parts":[{"id":"si-10_smt","name":"statement","prose":"The information system checks the validity of {{ insert: param, si-10_prm_1 }}."},{"id":"si-10_gdn","name":"guidance","prose":"Checking the valid syntax and semantics of information system inputs (e.g., character set, length, numerical range, and acceptable values) verifies that inputs match specified definitions for format and content. Software applications typically follow well-defined protocols that use structured messages (i.e., commands or queries) to communicate between software modules or system components. Structured messages can contain raw or unstructured data interspersed with metadata or control information. If software applications use attacker-supplied inputs to construct structured messages without properly encoding such messages, then the attacker could insert malicious commands or special characters that can cause the data to be interpreted as control information or metadata. Consequently, the module or component that receives the tainted output will perform the wrong operations or otherwise interpret the data incorrectly. Prescreening inputs prior to passing to interpreters prevents the content from being unintentionally interpreted as commands. Input validation helps to ensure accurate and correct inputs and prevent attacks such as cross-site scripting and a variety of injection attacks."},{"id":"si-10_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-10_obj.1","name":"objective","props":[{"name":"label","value":"SI-10[1]"}],"prose":"the organization defines information inputs requiring validity checks; and"},{"id":"si-10_obj.2","name":"objective","props":[{"name":"label","value":"SI-10[2]"}],"prose":"the information system checks the validity of organization-defined information inputs."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\naccess control policy and procedures\n\nseparation of duties policy and procedures\n\nprocedures addressing information input validation\n\ndocumentation for automated tools and applications to verify validity of information\n\nlist of information inputs requiring validity checks\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for information input validation\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing validity checks on information inputs"}]}]},{"id":"si-11","class":"SP800-53","title":"Error Handling","params":[{"id":"si-11_prm_1","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"SI-11"},{"name":"sort-id","value":"si-11"}],"parts":[{"id":"si-11_smt","name":"statement","prose":"The information system:","parts":[{"id":"si-11_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Generates error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries; and"},{"id":"si-11_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reveals error messages only to {{ insert: param, si-11_prm_1 }}."}]},{"id":"si-11_gdn","name":"guidance","prose":"Organizations carefully consider the structure\/content of error messages. The extent to which information systems are able to identify and handle error conditions is guided by organizational policy and operational requirements. Information that could be exploited by adversaries includes, for example, erroneous logon attempts with passwords entered by mistake as the username, mission\/business information that can be derived from (if not stated explicitly by) information recorded, and personal information such as account numbers, social security numbers, and credit card numbers. In addition, error messages may provide a covert channel for transmitting information.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#sc-31","rel":"related"}]},{"id":"si-11_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-11.a_obj","name":"objective","props":[{"name":"label","value":"SI-11(a)"}],"prose":"the information system generates error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries;"},{"id":"si-11.b_obj","name":"objective","props":[{"name":"label","value":"SI-11(b)"}],"parts":[{"id":"si-11.b_obj.1","name":"objective","props":[{"name":"label","value":"SI-11(b)[1]"}],"prose":"the organization defines personnel or roles to whom error messages are to be revealed; and"},{"id":"si-11.b_obj.2","name":"objective","props":[{"name":"label","value":"SI-11(b)[2]"}],"prose":"the information system reveals error messages only to organization-defined personnel or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing information system error handling\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ndocumentation providing structure\/content of error messages\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for information input validation\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for error handling\n\nautomated mechanisms supporting and\/or implementing error handling\n\nautomated mechanisms supporting and\/or implementing management of error messages"}]}]},{"id":"si-12","class":"SP800-53","title":"Information Handling and Retention","props":[{"name":"priority","value":"P2"},{"name":"label","value":"SI-12"},{"name":"sort-id","value":"si-12"}],"parts":[{"id":"si-12_smt","name":"statement","prose":"The organization handles and retains information within the information system and information output from the system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements."},{"id":"si-12_gdn","name":"guidance","prose":"Information handling and retention requirements cover the full life cycle of information, in some cases extending beyond the disposal of information systems. The National Archives and Records Administration provides guidance on records retention.","links":[{"href":"#ac-16","rel":"related"},{"href":"#au-5","rel":"related"},{"href":"#au-11","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"}]},{"id":"si-12_obj","name":"objective","prose":"Determine if the organization, in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements:","parts":[{"id":"si-12_obj.1","name":"objective","props":[{"name":"label","value":"SI-12[1]"}],"prose":"handles information within the information system;"},{"id":"si-12_obj.2","name":"objective","props":[{"name":"label","value":"SI-12[2]"}],"prose":"handles output from the information system;"},{"id":"si-12_obj.3","name":"objective","props":[{"name":"label","value":"SI-12[3]"}],"prose":"retains information within the information system; and"},{"id":"si-12_obj.4","name":"objective","props":[{"name":"label","value":"SI-12[4]"}],"prose":"retains output from the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nfederal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements applicable to information handling and retention\n\nmedia protection policy and procedures\n\nprocedures addressing information system output handling and retention\n\ninformation retention records, other relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for information handling and retention\n\norganizational personnel with information security responsibilities\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for information handling and retention\n\nautomated mechanisms supporting and\/or implementing information handling and retention"}]}]},{"id":"si-16","class":"SP800-53","title":"Memory Protection","params":[{"id":"si-16_prm_1","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-16"},{"name":"sort-id","value":"si-16"}],"parts":[{"id":"si-16_smt","name":"statement","prose":"The information system implements {{ insert: param, si-16_prm_1 }} to protect its memory from unauthorized code execution."},{"id":"si-16_gdn","name":"guidance","prose":"Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory include, for example, data execution prevention and address space layout randomization. Data execution prevention safeguards can either be hardware-enforced or software-enforced with hardware providing the greater strength of mechanism.","links":[{"href":"#ac-25","rel":"related"},{"href":"#sc-3","rel":"related"}]},{"id":"si-16_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-16_obj.1","name":"objective","props":[{"name":"label","value":"SI-16[1]"}],"prose":"the organization defines security safeguards to be implemented to protect information system memory from unauthorized code execution; and"},{"id":"si-16_obj.2","name":"objective","props":[{"name":"label","value":"SI-16[2]"}],"prose":"the information system implements organization-defined security safeguards to protect its memory from unauthorized code execution."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing memory protection for the information system\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of security safeguards protecting information system memory from unauthorized code execution\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for memory protection\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing safeguards to protect information system memory from unauthorized code execution"}]}]}]}],"back-matter":{"resources":[{"uuid":"0c97e60b-325a-4efa-ba2b-90f20ccd5abc","title":"5 C.F.R. 731.106","citation":{"text":"Code of Federal Regulations, Title 5, Administrative Personnel, Section 731.106, Designation of Public Trust Positions and Investigative Requirements (5 C.F.R. 731.106)."},"rlinks":[{"href":"http:\/\/www.gpo.gov\/fdsys\/granule\/CFR-2012-title5-vol2\/CFR-2012-title5-vol2-sec731-106\/content-detail.html"}]},{"uuid":"bb61234b-46c3-4211-8c2b-9869222a720d","title":"C.F.R. Part 5 Subpart C (5 C.F.R. 930.301)","citation":{"text":"C.F.R. Part 5 Subpart C (5 C.F.R. 930.301)"},"rlinks":[{"href":"http:\/\/www.gpo.gov\/fdsys\/granule\/CFR-2009-title5-vol2\/CFR-2009-title5-vol2-sec930-301\/content-detail.html"}]},{"uuid":"a4aa9645-9a8a-4b51-90a9-e223250f9a75","title":"CNSS Policy 15","citation":{"text":"CNSS Policy 15"},"rlinks":[{"href":"https:\/\/www.cnss.gov\/policies.html"}]},{"uuid":"2d8b14e9-c8b5-4d3d-8bdc-155078f3281b","title":"DoD Information Assurance Vulnerability Alerts","citation":{"text":"DoD Information Assurance Vulnerability Alerts"}},{"uuid":"61081e7f-041d-4033-96a7-44a439071683","title":"DoD Instruction 5200.39","citation":{"text":"DoD Instruction 5200.39"},"rlinks":[{"href":"http:\/\/www.dtic.mil\/whs\/directives\/corres\/ins1.html"}]},{"uuid":"e42b2099-3e1c-415b-952c-61c96533c12e","title":"DoD Instruction 8551.01","citation":{"text":"DoD Instruction 8551.01"},"rlinks":[{"href":"http:\/\/www.dtic.mil\/whs\/directives\/corres\/ins1.html"}]},{"uuid":"e6522953-6714-435d-a0d3-140df554c186","title":"DoD Instruction 8552.01","citation":{"text":"DoD Instruction 8552.01"},"rlinks":[{"href":"http:\/\/www.dtic.mil\/whs\/directives\/corres\/ins1.html"}]},{"uuid":"c5034e0c-eba6-4ecd-a541-79f0678f4ba4","title":"Executive Order 13587","citation":{"text":"Executive Order 13587"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/the-press-office\/2011\/10\/07\/executive-order-13587-structural-reforms-improve-security-classified-net"}]},{"uuid":"56d671da-6b7b-4abf-8296-84b61980390a","title":"Federal Acquisition Regulation","citation":{"text":"Federal Acquisition Regulation"},"rlinks":[{"href":"https:\/\/acquisition.gov\/far"}]},{"uuid":"023104bc-6f75-4cd5-b7d0-fc92326f8007","title":"Federal Continuity Directive 1","citation":{"text":"Federal Continuity Directive 1"},"rlinks":[{"href":"http:\/\/www.fema.gov\/pdf\/about\/offices\/fcd1.pdf"}]},{"uuid":"ba557c91-ba3e-4792-adc6-a4ae479b39ff","title":"FICAM Roadmap and Implementation Guidance","citation":{"text":"FICAM Roadmap and Implementation Guidance"},"rlinks":[{"href":"http:\/\/www.idmanagement.gov\/documents\/ficam-roadmap-and-implementation-guidance"}]},{"uuid":"39f9087d-7687-46d2-8eda-b6f4b7a4d8a9","title":"FIPS Publication 140","citation":{"text":"FIPS Publication 140"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html"}]},{"uuid":"d715b234-9b5b-4e07-b1ed-99836727664d","title":"FIPS Publication 140-2","citation":{"text":"FIPS Publication 140-2"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#140-2"}]},{"uuid":"f2dbd4ec-c413-4714-b85b-6b7184d1c195","title":"FIPS Publication 197","citation":{"text":"FIPS Publication 197"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#197"}]},{"uuid":"e85cdb3f-7f0a-4083-8639-f13f70d3760b","title":"FIPS Publication 199","citation":{"text":"FIPS Publication 199"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#199"}]},{"uuid":"c80c10b3-1294-4984-a4cc-d1733ca432b9","title":"FIPS Publication 201","citation":{"text":"FIPS Publication 201"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#201"}]},{"uuid":"ad733a42-a7ed-4774-b988-4930c28852f3","title":"HSPD-12","citation":{"text":"HSPD-12"},"rlinks":[{"href":"http:\/\/www.dhs.gov\/homeland-security-presidential-directive-12"}]},{"uuid":"4ef539ba-b767-4666-b0d3-168c53005fa3","title":"http:\/\/capec.mitre.org","citation":{"text":"http:\/\/capec.mitre.org"},"rlinks":[{"href":"http:\/\/capec.mitre.org"}]},{"uuid":"e95dd121-2733-413e-bf1e-f1eb49f20a98","title":"http:\/\/checklists.nist.gov","citation":{"text":"http:\/\/checklists.nist.gov"},"rlinks":[{"href":"http:\/\/checklists.nist.gov"}]},{"uuid":"6a1041fc-054e-4230-946b-2e6f4f3731bb","title":"http:\/\/csrc.nist.gov\/cryptval","citation":{"text":"http:\/\/csrc.nist.gov\/cryptval"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/cryptval"}]},{"uuid":"b09d1a31-d3c9-4138-a4f4-4c63816afd7d","title":"http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/index.html","citation":{"text":"http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/index.html"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/index.html"}]},{"uuid":"0931209f-00ae-4132-b92c-bc645847e8f9","title":"http:\/\/cve.mitre.org","citation":{"text":"http:\/\/cve.mitre.org"},"rlinks":[{"href":"http:\/\/cve.mitre.org"}]},{"uuid":"15522e92-9192-463d-9646-6a01982db8ca","title":"http:\/\/cwe.mitre.org","citation":{"text":"http:\/\/cwe.mitre.org"},"rlinks":[{"href":"http:\/\/cwe.mitre.org"}]},{"uuid":"5ed1f4d5-1494-421b-97ed-39d3c88ab51f","title":"http:\/\/fips201ep.cio.gov","citation":{"text":"http:\/\/fips201ep.cio.gov"},"rlinks":[{"href":"http:\/\/fips201ep.cio.gov"}]},{"uuid":"85280698-0417-489d-b214-12bb935fb939","title":"http:\/\/idmanagement.gov","citation":{"text":"http:\/\/idmanagement.gov"},"rlinks":[{"href":"http:\/\/idmanagement.gov"}]},{"uuid":"275cc052-0f7f-423c-bdb6-ed503dc36228","title":"http:\/\/nvd.nist.gov","citation":{"text":"http:\/\/nvd.nist.gov"},"rlinks":[{"href":"http:\/\/nvd.nist.gov"}]},{"uuid":"bbd50dd1-54ce-4432-959d-63ea564b1bb4","title":"http:\/\/www.acquisition.gov\/far","citation":{"text":"http:\/\/www.acquisition.gov\/far"},"rlinks":[{"href":"http:\/\/www.acquisition.gov\/far"}]},{"uuid":"9b97ed27-3dd6-4f9a-ade5-1b43e9669794","title":"http:\/\/www.cnss.gov","citation":{"text":"http:\/\/www.cnss.gov"},"rlinks":[{"href":"http:\/\/www.cnss.gov"}]},{"uuid":"3ac12e79-f54f-4a63-9f4b-ee4bcd4df604","title":"http:\/\/www.dhs.gov\/telecommunications-service-priority-tsp","citation":{"text":"http:\/\/www.dhs.gov\/telecommunications-service-priority-tsp"},"rlinks":[{"href":"http:\/\/www.dhs.gov\/telecommunications-service-priority-tsp"}]},{"uuid":"c95a9986-3cd6-4a98-931b-ccfc56cb11e5","title":"http:\/\/www.niap-ccevs.org","citation":{"text":"http:\/\/www.niap-ccevs.org"},"rlinks":[{"href":"http:\/\/www.niap-ccevs.org"}]},{"uuid":"647b6de3-81d0-4d22-bec1-5f1333e34380","title":"http:\/\/www.nsa.gov","citation":{"text":"http:\/\/www.nsa.gov"},"rlinks":[{"href":"http:\/\/www.nsa.gov"}]},{"uuid":"a47466c4-c837-4f06-a39f-e68412a5f73d","title":"http:\/\/www.nsa.gov\/ia\/mitigation_guidance\/media_destruction_guidance\/index.shtml","citation":{"text":"http:\/\/www.nsa.gov\/ia\/mitigation_guidance\/media_destruction_guidance\/index.shtml"},"rlinks":[{"href":"http:\/\/www.nsa.gov\/ia\/mitigation_guidance\/media_destruction_guidance\/index.shtml"}]},{"uuid":"02631467-668b-4233-989b-3dfded2fd184","title":"http:\/\/www.us-cert.gov","citation":{"text":"http:\/\/www.us-cert.gov"},"rlinks":[{"href":"http:\/\/www.us-cert.gov"}]},{"uuid":"6caa237b-531b-43ac-9711-d8f6b97b0377","title":"ICD 704","citation":{"text":"ICD 704"},"rlinks":[{"href":"http:\/\/www.dni.gov\/index.php\/intelligence-community\/ic-policies-reports\/intelligence-community-directives"}]},{"uuid":"398e33fd-f404-4e5c-b90e-2d50d3181244","title":"ICD 705","citation":{"text":"ICD 705"},"rlinks":[{"href":"http:\/\/www.dni.gov\/index.php\/intelligence-community\/ic-policies-reports\/intelligence-community-directives"}]},{"uuid":"1737a687-52fb-4008-b900-cbfa836f7b65","title":"ISO\/IEC 15408","citation":{"text":"ISO\/IEC 15408"},"rlinks":[{"href":"http:\/\/www.iso.org\/iso\/iso_catalog\/catalog_tc\/catalog_detail.htm?csnumber=50341"}]},{"uuid":"fb5844de-ff96-47c0-b258-4f52bcc2f30d","title":"National Communications Systems Directive 3-10","citation":{"text":"National Communications Systems Directive 3-10"}},{"uuid":"654f21e2-f3bc-43b2-abdc-60ab8d09744b","title":"National Strategy for Trusted Identities in Cyberspace","citation":{"text":"National Strategy for Trusted Identities in Cyberspace"},"rlinks":[{"href":"http:\/\/www.nist.gov\/nstic"}]},{"uuid":"bdd2f49e-edf7-491f-a178-4487898228f3","title":"NIST Interagency Report 7622","citation":{"text":"NIST Interagency Report 7622"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsNISTIRs.html#NIST-IR-7622"}]},{"uuid":"9cb3d8fe-2127-48ba-821e-cdd2d7aee921","title":"NIST Special Publication 800-100","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-100"}],"citation":{"text":"NIST Special Publication 800-100"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-100"}]},{"uuid":"3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","title":"NIST Special Publication 800-111","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-111"}],"citation":{"text":"NIST Special Publication 800-111"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-111"}]},{"uuid":"349fe082-502d-464a-aa0c-1443c6a5cf40","title":"NIST Special Publication 800-113","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-113"}],"citation":{"text":"NIST Special Publication 800-113"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-113"}]},{"uuid":"1201fcf3-afb1-4675-915a-fb4ae0435717","title":"NIST Special Publication 800-114 Rev. 1","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-114r1"}],"citation":{"text":"NIST Special Publication 800-114 Rev. 1"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-114r1"}]},{"uuid":"c4691b88-57d1-463b-9053-2d0087913f31","title":"NIST Special Publication 800-115","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-115"}],"citation":{"text":"NIST Special Publication 800-115"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-115"}]},{"uuid":"2157bb7e-192c-4eaa-877f-93ef6b0a3292","title":"NIST Special Publication 800-116 Rev. 1","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-116r1"}],"citation":{"text":"NIST Special Publication 800-116 Rev. 1"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-116r1"}]},{"uuid":"5c201b63-0768-417b-ac22-3f014e3941b2","title":"NIST Special Publication 800-12 Rev. 1","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-12r1"}],"citation":{"text":"NIST Special Publication 800-12 Rev. 1"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-12r1"}]},{"uuid":"d1a4e2a9-e512-4132-8795-5357aba29254","title":"NIST Special Publication 800-121","citation":{"text":"NIST Special Publication 800-121"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-121"}]},{"uuid":"0293a393-fbe8-4ed1-b0b4-f6fbd3ae1589","title":"NIST Special Publication 800-124","citation":{"text":"NIST Special Publication 800-124"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-124"}]},{"uuid":"080f8068-5e3e-435e-9790-d22ba4722693","title":"NIST Special Publication 800-128","citation":{"text":"NIST Special Publication 800-128"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-128"}]},{"uuid":"cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","title":"NIST Special Publication 800-137","citation":{"text":"NIST Special Publication 800-137"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-137"}]},{"uuid":"6bf8d24a-78dc-4727-a2ac-0e64d71c495c","title":"NIST Special Publication 800-147","citation":{"text":"NIST Special Publication 800-147"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-147"}]},{"uuid":"3878cc04-144a-483e-af62-8fe6f4ad6c7a","title":"NIST Special Publication 800-155","citation":{"text":"NIST Special Publication 800-155"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-155"}]},{"uuid":"825438c3-248d-4e30-a51e-246473ce6ada","title":"NIST Special Publication 800-16","citation":{"text":"NIST Special Publication 800-16"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-16"}]},{"uuid":"8ab6bcdc-339b-4068-b45e-994814a6e187","title":"NIST Special Publication 800-161","citation":{"text":"NIST Special Publication 800-161"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-161"}]},{"uuid":"6513e480-fada-4876-abba-1397084dfb26","title":"NIST Special Publication 800-164","citation":{"text":"NIST Special Publication 800-164"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-164"}]},{"uuid":"9c5c9e8c-dc81-4f55-a11c-d71d7487790f","title":"NIST Special Publication 800-18","citation":{"text":"NIST Special Publication 800-18"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-18"}]},{"uuid":"0a5db899-f033-467f-8631-f5a8ba971475","title":"NIST Special Publication 800-23","citation":{"text":"NIST Special Publication 800-23"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-23"}]},{"uuid":"21b1ed35-56d2-40a8-bdfe-b461fffe322f","title":"NIST Special Publication 800-27","citation":{"text":"NIST Special Publication 800-27"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-27"}]},{"uuid":"e716cd51-d1d5-4c6a-967a-22e9fbbc42f1","title":"NIST Special Publication 800-28","citation":{"text":"NIST Special Publication 800-28"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-28"}]},{"uuid":"a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","title":"NIST Special Publication 800-30","citation":{"text":"NIST Special Publication 800-30"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-30"}]},{"uuid":"8f174e91-844e-4cf1-a72a-45c119a3a8dd","title":"NIST Special Publication 800-32","citation":{"text":"NIST Special Publication 800-32"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-32"}]},{"uuid":"748a81b9-9cad-463f-abde-8b368167e70d","title":"NIST Special Publication 800-34","citation":{"text":"NIST Special Publication 800-34"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-34"}]},{"uuid":"0c775bc3-bfc3-42c7-a382-88949f503171","title":"NIST Special Publication 800-35","citation":{"text":"NIST Special Publication 800-35"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-35"}]},{"uuid":"d818efd3-db31-4953-8afa-9e76afe83ce2","title":"NIST Special Publication 800-36","citation":{"text":"NIST Special Publication 800-36"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-36"}]},{"uuid":"0a0c26b6-fd44-4274-8b36-93442d49d998","title":"NIST Special Publication 800-37","citation":{"text":"NIST Special Publication 800-37"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-37"}]},{"uuid":"d480aa6a-7a88-424e-a10c-ad1c7870354b","title":"NIST Special Publication 800-39","citation":{"text":"NIST Special Publication 800-39"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-39"}]},{"uuid":"bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","title":"NIST Special Publication 800-40","citation":{"text":"NIST Special Publication 800-40"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-40"}]},{"uuid":"756a8e86-57d5-4701-8382-f7a40439665a","title":"NIST Special Publication 800-41","citation":{"text":"NIST Special Publication 800-41"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-41"}]},{"uuid":"c6e95ca0-5828-420e-b095-00895b72b5e8","title":"NIST Special Publication 800-45","citation":{"text":"NIST Special Publication 800-45"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-45"}]},{"uuid":"5309d4d0-46f8-4213-a749-e7584164e5e8","title":"NIST Special Publication 800-46","citation":{"text":"NIST Special Publication 800-46"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-46"}]},{"uuid":"2711f068-734e-4afd-94ba-0b22247fbc88","title":"NIST Special Publication 800-47","citation":{"text":"NIST Special Publication 800-47"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-47"}]},{"uuid":"238ed479-eccb-49f6-82ec-ab74a7a428cf","title":"NIST Special Publication 800-48","citation":{"text":"NIST Special Publication 800-48"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-48"}]},{"uuid":"e12b5738-de74-4fb3-8317-a3995a8a1898","title":"NIST Special Publication 800-50","citation":{"text":"NIST Special Publication 800-50"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-50"}]},{"uuid":"90c5bc98-f9c4-44c9-98b7-787422f0999c","title":"NIST Special Publication 800-52","citation":{"text":"NIST Special Publication 800-52"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-52"}]},{"uuid":"cd4cf751-3312-4a55-b1a9-fad2f1db9119","title":"NIST Special Publication 800-53A","citation":{"text":"NIST Special Publication 800-53A"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-53A"}]},{"uuid":"81f09e01-d0b0-4ae2-aa6a-064ed9950070","title":"NIST Special Publication 800-56","citation":{"text":"NIST Special Publication 800-56"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-56"}]},{"uuid":"a6c774c0-bf50-4590-9841-2a5c1c91ac6f","title":"NIST Special Publication 800-57","citation":{"text":"NIST Special Publication 800-57"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-57"}]},{"uuid":"7783f3e7-09b3-478b-9aa2-4a76dfd0ea90","title":"NIST Special Publication 800-58","citation":{"text":"NIST Special Publication 800-58"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-58"}]},{"uuid":"f152844f-b1ef-4836-8729-6277078ebee1","title":"NIST Special Publication 800-60","citation":{"text":"NIST Special Publication 800-60"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-60"}]},{"uuid":"be95fb85-a53f-4624-bdbb-140075500aa3","title":"NIST Special Publication 800-61","citation":{"text":"NIST Special Publication 800-61"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-61"}]},{"uuid":"644f44a9-a2de-4494-9c04-cd37fba45471","title":"NIST Special Publication 800-63","citation":{"text":"NIST Special Publication 800-63"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-63"}]},{"uuid":"abd950ae-092f-4b7a-b374-1c7c67fe9350","title":"NIST Special Publication 800-64","citation":{"text":"NIST Special Publication 800-64"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-64"}]},{"uuid":"29fcfe59-33cd-494a-8756-5907ae3a8f92","title":"NIST Special Publication 800-65","citation":{"text":"NIST Special Publication 800-65"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-65"}]},{"uuid":"84a37532-6db6-477b-9ea8-f9085ebca0fc","title":"NIST Special Publication 800-70","citation":{"text":"NIST Special Publication 800-70"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-70"}]},{"uuid":"ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","title":"NIST Special Publication 800-73","citation":{"text":"NIST Special Publication 800-73"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-73"}]},{"uuid":"2a71298a-ee90-490e-80ff-48c967173a47","title":"NIST Special Publication 800-76","citation":{"text":"NIST Special Publication 800-76"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-76"}]},{"uuid":"99f331f2-a9f0-46c2-9856-a3cbb9b89442","title":"NIST Special Publication 800-77","citation":{"text":"NIST Special Publication 800-77"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-77"}]},{"uuid":"2042d97b-f7f6-4c74-84f8-981867684659","title":"NIST Special Publication 800-78","citation":{"text":"NIST Special Publication 800-78"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-78"}]},{"uuid":"6af1e841-672c-46c4-b121-96f603d04be3","title":"NIST Special Publication 800-81","citation":{"text":"NIST Special Publication 800-81"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-81"}]},{"uuid":"6d431fee-658f-4a0e-9f2e-a38b5d398fab","title":"NIST Special Publication 800-83","citation":{"text":"NIST Special Publication 800-83"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-83"}]},{"uuid":"0243a05a-e8a3-4d51-9364-4a9d20b0dcdf","title":"NIST Special Publication 800-84","citation":{"text":"NIST Special Publication 800-84"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-84"}]},{"uuid":"263823e0-a971-4b00-959d-315b26278b22","title":"NIST Special Publication 800-88","citation":{"text":"NIST Special Publication 800-88"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-88"}]},{"uuid":"672fd561-b92b-4713-b9cf-6c9d9456728b","title":"NIST Special Publication 800-92","citation":{"text":"NIST Special Publication 800-92"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-92"}]},{"uuid":"d1b1d689-0f66-4474-9924-c81119758dc1","title":"NIST Special Publication 800-94","citation":{"text":"NIST Special Publication 800-94"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-94"}]},{"uuid":"1ebdf782-d95d-4a7b-8ec7-ee860951eced","title":"NIST Special Publication 800-95","citation":{"text":"NIST Special Publication 800-95"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-95"}]},{"uuid":"6f336ecd-f2a0-4c84-9699-0491d81b6e0d","title":"NIST Special Publication 800-97","citation":{"text":"NIST Special Publication 800-97"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-97"}]},{"uuid":"06dff0ea-3848-4945-8d91-e955ee69f05d","title":"NSTISSI No. 7003","citation":{"text":"NSTISSI No. 7003"},"rlinks":[{"href":"http:\/\/www.cnss.gov\/Assets\/pdf\/nstissi_7003.pdf"}]},{"uuid":"9f77f845-e3ea-4ca4-b2c0-aa9eedc214ab","title":"OMB Circular A-130","citation":{"text":"OMB Circular A-130"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/omb\/circulars_a130_a130trans4"}]},{"uuid":"2c5884cd-7b96-425c-862a-99877e1cf909","title":"OMB Memorandum 02-01","citation":{"text":"OMB Memorandum 02-01"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/omb\/memoranda_m02-01"}]},{"uuid":"ff3bfb02-79b2-411f-8735-98dfe5af2ab0","title":"OMB Memorandum 04-04","citation":{"text":"OMB Memorandum 04-04"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy04\/m04-04.pdf"}]},{"uuid":"58ad6f27-af99-429f-86a8-8bb767b014b9","title":"OMB Memorandum 05-24","citation":{"text":"OMB Memorandum 05-24"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2005\/m05-24.pdf"}]},{"uuid":"4da24a96-6cf8-435d-9d1f-c73247cad109","title":"OMB Memorandum 06-16","citation":{"text":"OMB Memorandum 06-16"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2006\/m06-16.pdf"}]},{"uuid":"990268bf-f4a9-4c81-91ae-dc7d3115f4b1","title":"OMB Memorandum 07-11","citation":{"text":"OMB Memorandum 07-11"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2007\/m07-11.pdf"}]},{"uuid":"0b3d8ba9-051f-498d-81ea-97f0f018c612","title":"OMB Memorandum 07-18","citation":{"text":"OMB Memorandum 07-18"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2007\/m07-18.pdf"}]},{"uuid":"0916ef02-3618-411b-a525-565c088849a6","title":"OMB Memorandum 08-22","citation":{"text":"OMB Memorandum 08-22"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2008\/m08-22.pdf"}]},{"uuid":"28115a56-da6b-4d44-b1df-51dd7f048a3e","title":"OMB Memorandum 08-23","citation":{"text":"OMB Memorandum 08-23"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2008\/m08-23.pdf"}]},{"uuid":"599fe9ba-4750-4450-9eeb-b95bd19a5e8f","title":"OMB Memorandum 10-06-2011","citation":{"text":"OMB Memorandum 10-06-2011"}},{"uuid":"74e740a4-c45d-49f3-a86e-eb747c549e01","title":"OMB Memorandum 11-11","citation":{"text":"OMB Memorandum 11-11"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/memoranda\/2011\/m11-11.pdf"}]},{"uuid":"bedb15b7-ec5c-4a68-807f-385125751fcd","title":"OMB Memorandum 11-33","citation":{"text":"OMB Memorandum 11-33"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/memoranda\/2011\/m11-33.pdf"}]},{"uuid":"dd2f5acd-08f1-435a-9837-f8203088dc1a","title":"Personal Identity Verification (PIV) in Enterprise Physical Access Control System (E-PACS)","citation":{"text":"Personal Identity Verification (PIV) in Enterprise Physical Access Control System (E-PACS)"}},{"uuid":"8ade2fbe-e468-4ca8-9a40-54d7f23c32bb","title":"US-CERT Technical Cyber Security Alerts","citation":{"text":"US-CERT Technical Cyber Security Alerts"},"rlinks":[{"href":"http:\/\/www.us-cert.gov\/ncas\/alerts"}]}]}}} \ No newline at end of file diff --git a/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_HIGH-baseline-resolved-profile_catalog.json b/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_HIGH-baseline-resolved-profile_catalog.json index 08099a13..3e82a28d 100644 --- a/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_HIGH-baseline-resolved-profile_catalog.json +++ b/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_HIGH-baseline-resolved-profile_catalog.json @@ -1,9 +1,9 @@ { "catalog": { - "uuid": "d42ac376-bf01-4baf-bad5-d0b7ee2626d5", + "uuid": "d3d0fe20-8c66-4ead-a7bf-10455eada4ac", "metadata": { "title": "NIST Special Publication 800-53 Revision 4 HIGH IMPACT BASELINE", - "last-modified": "2023-11-02T11:49:45.965719-04:00", + "last-modified": "2023-12-05T21:54:41.390821Z", "version": "2015-01-22", "oscal-version": "1.1.1", "props": [ diff --git a/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_LOW-baseline-resolved-profile_catalog-min.json b/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_LOW-baseline-resolved-profile_catalog-min.json index b6dc9b88..b8bb2071 100644 --- a/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_LOW-baseline-resolved-profile_catalog-min.json +++ b/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_LOW-baseline-resolved-profile_catalog-min.json @@ -1 +1 @@ -{"catalog":{"uuid":"bec68292-6541-40e5-bc3b-5fcfee922bd9","metadata":{"title":"NIST Special Publication 800-53 Revision 4 LOW IMPACT BASELINE","last-modified":"2023-11-02T11:49:37.69093-04:00","version":"2015-01-22","oscal-version":"1.1.1","props":[{"name":"resolution-tool","value":"OSCAL Profile Resolver XSLT Pipeline OPRXP"}],"links":[{"href":"NIST_SP-800-53_rev4_LOW-baseline_profile.xml","rel":"source-profile"}],"roles":[{"id":"creator","title":"Document Creator"},{"id":"contact","title":"Contact"}],"parties":[{"uuid":"96310e12-f661-41a7-bed9-842b6a931875","type":"organization","name":"Joint Task Force, Transformation Initiative","email-addresses":["sec-cert@nist.gov"],"addresses":[{"addr-lines":["National Institute of Standards and Technology","Attn: Computer Security Division","Information Technology Laboratory","100 Bureau Drive (Mail Stop 8930)"],"city":"Gaithersburg","state":"MD","postal-code":"20899-8930"}]}],"responsible-parties":[{"role-id":"creator","party-uuids":["fcde62b1-8cce-4a57-a26b-b07ad2865ae1"]},{"role-id":"contact","party-uuids":["fcde62b1-8cce-4a57-a26b-b07ad2865ae1"]}]},"groups":[{"id":"ac","class":"family","title":"Access Control","controls":[{"id":"ac-1","class":"SP800-53","title":"Access Control Policy and Procedures","params":[{"id":"ac-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ac-1_prm_2","label":"organization-defined frequency"},{"id":"ac-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-1"},{"name":"sort-id","value":"ac-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ac-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ac-1_prm_1 }}:","parts":[{"id":"ac-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ac-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the access control policy and associated access controls; and"}]},{"id":"ac-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ac-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Access control policy {{ insert: param, ac-1_prm_2 }}; and"},{"id":"ac-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Access control procedures {{ insert: param, ac-1_prm_3 }}."}]}]},{"id":"ac-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the AC family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ac-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-1.a_obj","name":"objective","props":[{"name":"label","value":"AC-1(a)"}],"parts":[{"id":"ac-1.a.1_obj","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)"}],"parts":[{"id":"ac-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1]"}],"prose":"develops and documents an access control policy that addresses:","parts":[{"id":"ac-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ac-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ac-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ac-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ac-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ac-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ac-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ac-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the access control policy are to be disseminated;"},{"id":"ac-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[3]"}],"prose":"disseminates the access control policy to organization-defined personnel or roles;"}]},{"id":"ac-1.a.2_obj","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)"}],"parts":[{"id":"ac-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the access control policy and associated access control controls;"},{"id":"ac-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ac-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ac-1.b_obj","name":"objective","props":[{"name":"label","value":"AC-1(b)"}],"parts":[{"id":"ac-1.b.1_obj","name":"objective","props":[{"name":"label","value":"AC-1(b)(1)"}],"parts":[{"id":"ac-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current access control policy;"},{"id":"ac-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(b)(1)[2]"}],"prose":"reviews and updates the current access control policy with the organization-defined frequency;"}]},{"id":"ac-1.b.2_obj","name":"objective","props":[{"name":"label","value":"AC-1(b)(2)"}],"parts":[{"id":"ac-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current access control procedures; and"},{"id":"ac-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(b)(2)[2]"}],"prose":"reviews and updates the current access control procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access control responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ac-2","class":"SP800-53","title":"Account Management","params":[{"id":"ac-2_prm_1","label":"organization-defined information system account types"},{"id":"ac-2_prm_2","label":"organization-defined personnel or roles"},{"id":"ac-2_prm_3","label":"organization-defined procedures or conditions"},{"id":"ac-2_prm_4","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-2"},{"name":"sort-id","value":"ac-02"}],"parts":[{"id":"ac-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Identifies and selects the following types of information system accounts to support organizational missions\/business functions: {{ insert: param, ac-2_prm_1 }};"},{"id":"ac-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Assigns account managers for information system accounts;"},{"id":"ac-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Establishes conditions for group and role membership;"},{"id":"ac-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Specifies authorized users of the information system, group and role membership, and access authorizations (i.e., privileges) and other attributes (as required) for each account;"},{"id":"ac-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Requires approvals by {{ insert: param, ac-2_prm_2 }} for requests to create information system accounts;"},{"id":"ac-2_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Creates, enables, modifies, disables, and removes information system accounts in accordance with {{ insert: param, ac-2_prm_3 }};"},{"id":"ac-2_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Monitors the use of information system accounts;"},{"id":"ac-2_smt.h","name":"item","props":[{"name":"label","value":"h."}],"prose":"Notifies account managers:","parts":[{"id":"ac-2_smt.h.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"When accounts are no longer required;"},{"id":"ac-2_smt.h.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"When users are terminated or transferred; and"},{"id":"ac-2_smt.h.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"When individual information system usage or need-to-know changes;"}]},{"id":"ac-2_smt.i","name":"item","props":[{"name":"label","value":"i."}],"prose":"Authorizes access to the information system based on:","parts":[{"id":"ac-2_smt.i.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A valid access authorization;"},{"id":"ac-2_smt.i.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Intended system usage; and"},{"id":"ac-2_smt.i.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Other attributes as required by the organization or associated missions\/business functions;"}]},{"id":"ac-2_smt.j","name":"item","props":[{"name":"label","value":"j."}],"prose":"Reviews accounts for compliance with account management requirements {{ insert: param, ac-2_prm_4 }}; and"},{"id":"ac-2_smt.k","name":"item","props":[{"name":"label","value":"k."}],"prose":"Establishes a process for reissuing shared\/group account credentials (if deployed) when individuals are removed from the group."}]},{"id":"ac-2_gdn","name":"guidance","prose":"Information system account types include, for example, individual, shared, group, system, guest\/anonymous, emergency, developer\/manufacturer\/vendor, temporary, and service. Some of the account management requirements listed above can be implemented by organizational information systems. The identification of authorized users of the information system and the specification of access privileges reflects the requirements in other security controls in the security plan. Users requiring administrative privileges on information system accounts receive additional scrutiny by appropriate organizational personnel (e.g., system owner, mission\/business owner, or chief information security officer) responsible for approving such accounts and privileged access. Organizations may choose to define access privileges or other attributes by account, by type of account, or a combination of both. Other attributes required for authorizing access include, for example, restrictions on time-of-day, day-of-week, and point-of-origin. In defining other account attributes, organizations consider system-related requirements (e.g., scheduled maintenance, system upgrades) and mission\/business requirements, (e.g., time zone differences, customer requirements, remote access to support travel requirements). Failure to consider these factors could affect information system availability. Temporary and emergency accounts are accounts intended for short-term use. Organizations establish temporary accounts as a part of normal account activation procedures when there is a need for short-term accounts without the demand for immediacy in account activation. Organizations establish emergency accounts in response to crisis situations and with the need for rapid account activation. Therefore, emergency account activation may bypass normal account authorization processes. Emergency and temporary accounts are not to be confused with infrequently used accounts (e.g., local logon accounts used for special tasks defined by organizations or when network resources are unavailable). Such accounts remain available and are not subject to automatic disabling or removal dates. Conditions for disabling or deactivating accounts include, for example: (i) when shared\/group, emergency, or temporary accounts are no longer required; or (ii) when individuals are transferred or terminated. Some types of information system accounts may require specialized training.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-5","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-10","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ma-3","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"ac-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-2.a_obj","name":"objective","props":[{"name":"label","value":"AC-2(a)"}],"parts":[{"id":"ac-2.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(a)[1]"}],"prose":"defines information system account types to be identified and selected to support organizational missions\/business functions;"},{"id":"ac-2.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(a)[2]"}],"prose":"identifies and selects organization-defined information system account types to support organizational missions\/business functions;"}]},{"id":"ac-2.b_obj","name":"objective","props":[{"name":"label","value":"AC-2(b)"}],"prose":"assigns account managers for information system accounts;"},{"id":"ac-2.c_obj","name":"objective","props":[{"name":"label","value":"AC-2(c)"}],"prose":"establishes conditions for group and role membership;"},{"id":"ac-2.d_obj","name":"objective","props":[{"name":"label","value":"AC-2(d)"}],"prose":"specifies for each account (as required):","parts":[{"id":"ac-2.d_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(d)[1]"}],"prose":"authorized users of the information system;"},{"id":"ac-2.d_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(d)[2]"}],"prose":"group and role membership;"},{"id":"ac-2.d_obj.3","name":"objective","props":[{"name":"label","value":"AC-2(d)[3]"}],"prose":"access authorizations (i.e., privileges);"},{"id":"ac-2.d_obj.4","name":"objective","props":[{"name":"label","value":"AC-2(d)[4]"}],"prose":"other attributes;"}]},{"id":"ac-2.e_obj","name":"objective","props":[{"name":"label","value":"AC-2(e)"}],"parts":[{"id":"ac-2.e_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(e)[1]"}],"prose":"defines personnel or roles required to approve requests to create information system accounts;"},{"id":"ac-2.e_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(e)[2]"}],"prose":"requires approvals by organization-defined personnel or roles for requests to create information system accounts;"}]},{"id":"ac-2.f_obj","name":"objective","props":[{"name":"label","value":"AC-2(f)"}],"parts":[{"id":"ac-2.f_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(f)[1]"}],"prose":"defines procedures or conditions to:","parts":[{"id":"ac-2.f_obj.1.a","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][a]"}],"prose":"create information system accounts;"},{"id":"ac-2.f_obj.1.b","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][b]"}],"prose":"enable information system accounts;"},{"id":"ac-2.f_obj.1.c","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][c]"}],"prose":"modify information system accounts;"},{"id":"ac-2.f_obj.1.d","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][d]"}],"prose":"disable information system accounts;"},{"id":"ac-2.f_obj.1.e","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][e]"}],"prose":"remove information system accounts;"}]},{"id":"ac-2.f_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(f)[2]"}],"prose":"in accordance with organization-defined procedures or conditions:","parts":[{"id":"ac-2.f_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][a]"}],"prose":"creates information system accounts;"},{"id":"ac-2.f_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][b]"}],"prose":"enables information system accounts;"},{"id":"ac-2.f_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][c]"}],"prose":"modifies information system accounts;"},{"id":"ac-2.f_obj.2.d","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][d]"}],"prose":"disables information system accounts;"},{"id":"ac-2.f_obj.2.e","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][e]"}],"prose":"removes information system accounts;"}]}]},{"id":"ac-2.g_obj","name":"objective","props":[{"name":"label","value":"AC-2(g)"}],"prose":"monitors the use of information system accounts;"},{"id":"ac-2.h_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)"}],"prose":"notifies account managers:","parts":[{"id":"ac-2.h.1_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)(1)"}],"prose":"when accounts are no longer required;"},{"id":"ac-2.h.2_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)(2)"}],"prose":"when users are terminated or transferred;"},{"id":"ac-2.h.3_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)(3)"}],"prose":"when individual information system usage or need to know changes;"}]},{"id":"ac-2.i_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)"}],"prose":"authorizes access to the information system based on;","parts":[{"id":"ac-2.i.1_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)(1)"}],"prose":"a valid access authorization;"},{"id":"ac-2.i.2_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)(2)"}],"prose":"intended system usage;"},{"id":"ac-2.i.3_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)(3)"}],"prose":"other attributes as required by the organization or associated missions\/business functions;"}]},{"id":"ac-2.j_obj","name":"objective","props":[{"name":"label","value":"AC-2(j)"}],"parts":[{"id":"ac-2.j_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(j)[1]"}],"prose":"defines the frequency to review accounts for compliance with account management requirements;"},{"id":"ac-2.j_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(j)[2]"}],"prose":"reviews accounts for compliance with account management requirements with the organization-defined frequency; and"}]},{"id":"ac-2.k_obj","name":"objective","props":[{"name":"label","value":"AC-2(k)"}],"prose":"establishes a process for reissuing shared\/group account credentials (if deployed) when individuals are removed from the group."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of active system accounts along with the name of the individual associated with each account\n\nlist of conditions for group and role membership\n\nnotifications or records of recently transferred, separated, or terminated employees\n\nlist of recently disabled information system accounts along with the name of the individual associated with each account\n\naccess authorization records\n\naccount management compliance reviews\n\ninformation system monitoring records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes account management on the information system\n\nautomated mechanisms for implementing account management"}]}]},{"id":"ac-3","class":"SP800-53","title":"Access Enforcement","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-3"},{"name":"sort-id","value":"ac-03"}],"parts":[{"id":"ac-3_smt","name":"statement","prose":"The information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies."},{"id":"ac-3_gdn","name":"guidance","prose":"Access control policies (e.g., identity-based policies, role-based policies, control matrices, cryptography) control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (e.g., devices, files, records, domains) in information systems. In addition to enforcing authorized access at the information system level and recognizing that information systems can host many applications and services in support of organizational missions and business operations, access enforcement mechanisms can also be employed at the application and service level to provide increased information security.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-5","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-16","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ac-21","rel":"related"},{"href":"#ac-22","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ma-3","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#pe-3","rel":"related"}]},{"id":"ac-3_obj","name":"objective","prose":"Determine if the information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing access enforcement\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of approved authorizations (user privileges)\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access enforcement responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing access control policy"}]}]},{"id":"ac-7","class":"SP800-53","title":"Unsuccessful Logon Attempts","params":[{"id":"ac-7_prm_1","label":"organization-defined number"},{"id":"ac-7_prm_2","label":"organization-defined time period"},{"id":"ac-7_prm_3","select":{"choice":["locks the account\/node for an {{ insert: param, ac-7_prm_4 }} ","locks the account\/node until released by an administrator","delays next logon prompt according to {{ insert: param, ac-7_prm_5 }} "]}},{"id":"ac-7_prm_4","depends-on":"ac-7_prm_3","label":"organization-defined time period"},{"id":"ac-7_prm_5","depends-on":"ac-7_prm_3","label":"organization-defined delay algorithm"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"AC-7"},{"name":"sort-id","value":"ac-07"}],"parts":[{"id":"ac-7_smt","name":"statement","prose":"The information system:","parts":[{"id":"ac-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Enforces a limit of {{ insert: param, ac-7_prm_1 }} consecutive invalid logon attempts by a user during a {{ insert: param, ac-7_prm_2 }}; and"},{"id":"ac-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Automatically {{ insert: param, ac-7_prm_3 }} when the maximum number of unsuccessful attempts is exceeded."}]},{"id":"ac-7_gdn","name":"guidance","prose":"This control applies regardless of whether the logon occurs via a local or network connection. Due to the potential for denial of service, automatic lockouts initiated by information systems are usually temporary and automatically release after a predetermined time period established by organizations. If a delay algorithm is selected, organizations may choose to employ different algorithms for different information system components based on the capabilities of those components. Responses to unsuccessful logon attempts may be implemented at both the operating system and the application levels.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-9","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ia-5","rel":"related"}]},{"id":"ac-7_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-7.a_obj","name":"objective","props":[{"name":"label","value":"AC-7(a)"}],"parts":[{"id":"ac-7.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-7(a)[1]"}],"prose":"the organization defines the number of consecutive invalid logon attempts allowed to the information system by a user during an organization-defined time period;"},{"id":"ac-7.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-7(a)[2]"}],"prose":"the organization defines the time period allowed by a user of the information system for an organization-defined number of consecutive invalid logon attempts;"},{"id":"ac-7.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-7(a)[3]"}],"prose":"the information system enforces a limit of organization-defined number of consecutive invalid logon attempts by a user during an organization-defined time period;"}]},{"id":"ac-7.b_obj","name":"objective","props":[{"name":"label","value":"AC-7(b)"}],"parts":[{"id":"ac-7.b_obj.1","name":"objective","props":[{"name":"label","value":"AC-7(b)[1]"}],"prose":"the organization defines account\/node lockout time period or logon delay algorithm to be automatically enforced by the information system when the maximum number of unsuccessful logon attempts is exceeded;"},{"id":"ac-7.b_obj.2","name":"objective","props":[{"name":"label","value":"AC-7(b)[2]"}],"prose":"the information system, when the maximum number of unsuccessful logon attempts is exceeded, automatically:","parts":[{"id":"ac-7.b_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-7(b)[2][a]"}],"prose":"locks the account\/node for the organization-defined time period;"},{"id":"ac-7.b_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-7(b)[2][b]"}],"prose":"locks the account\/node until released by an administrator; or"},{"id":"ac-7.b_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-7(b)[2][c]"}],"prose":"delays next logon prompt according to the organization-defined delay algorithm."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing unsuccessful logon attempts\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem developers\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing access control policy for unsuccessful logon attempts"}]}]},{"id":"ac-8","class":"SP800-53","title":"System Use Notification","params":[{"id":"ac-8_prm_1","label":"organization-defined system use notification message or banner"},{"id":"ac-8_prm_2","label":"organization-defined conditions"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-8"},{"name":"sort-id","value":"ac-08"}],"parts":[{"id":"ac-8_smt","name":"statement","prose":"The information system:","parts":[{"id":"ac-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Displays to users {{ insert: param, ac-8_prm_1 }} before granting access to the system that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance and states that:","parts":[{"id":"ac-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Users are accessing a U.S. Government information system;"},{"id":"ac-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Information system usage may be monitored, recorded, and subject to audit;"},{"id":"ac-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Unauthorized use of the information system is prohibited and subject to criminal and civil penalties; and"},{"id":"ac-8_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Use of the information system indicates consent to monitoring and recording;"}]},{"id":"ac-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Retains the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the information system; and"},{"id":"ac-8_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"For publicly accessible systems:","parts":[{"id":"ac-8_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Displays system use information {{ insert: param, ac-8_prm_2 }}, before granting further access;"},{"id":"ac-8_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Displays references, if any, to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities; and"},{"id":"ac-8_smt.c.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Includes a description of the authorized uses of the system."}]}]},{"id":"ac-8_gdn","name":"guidance","prose":"System use notifications can be implemented using messages or warning banners displayed before individuals log in to information systems. System use notifications are used only for access via logon interfaces with human users and are not required when such human interfaces do not exist. Organizations consider system use notification messages\/banners displayed in multiple languages based on specific organizational needs and the demographics of information system users. Organizations also consult with the Office of the General Counsel for legal review and approval of warning banner content."},{"id":"ac-8_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-8.a_obj","name":"objective","props":[{"name":"label","value":"AC-8(a)"}],"parts":[{"id":"ac-8.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-8(a)[1]"}],"prose":"the organization defines a system use notification message or banner to be displayed by the information system to users before granting access to the system;"},{"id":"ac-8.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2]"}],"prose":"the information system displays to users the organization-defined system use notification message or banner before granting access to the information system that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance, and states that:","parts":[{"id":"ac-8.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](1)"}],"prose":"users are accessing a U.S. Government information system;"},{"id":"ac-8.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](2)"}],"prose":"information system usage may be monitored, recorded, and subject to audit;"},{"id":"ac-8.a.3_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](3)"}],"prose":"unauthorized use of the information system is prohibited and subject to criminal and civil penalties;"},{"id":"ac-8.a.4_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](4)"}],"prose":"use of the information system indicates consent to monitoring and recording;"}]}]},{"id":"ac-8.b_obj","name":"objective","props":[{"name":"label","value":"AC-8(b)"}],"prose":"the information system retains the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the information system;"},{"id":"ac-8.c_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)"}],"prose":"for publicly accessible systems:","parts":[{"id":"ac-8.c.1_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)(1)"}],"parts":[{"id":"ac-8.c.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-8(c)(1)[1]"}],"prose":"the organization defines conditions for system use to be displayed by the information system before granting further access;"},{"id":"ac-8.c.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(c)(1)[2]"}],"prose":"the information system displays organization-defined conditions before granting further access;"}]},{"id":"ac-8.c.2_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)(2)"}],"prose":"the information system displays references, if any, to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities; and"},{"id":"ac-8.c.3_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)(3)"}],"prose":"the information system includes a description of the authorized uses of the system."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprivacy and security policies, procedures addressing system use notification\n\ndocumented approval of information system use notification messages or banners\n\ninformation system audit records\n\nuser acknowledgements of notification message or banner\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system use notification messages\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibility for providing legal advice\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing system use notification"}]}]},{"id":"ac-14","class":"SP800-53","title":"Permitted Actions Without Identification or Authentication","params":[{"id":"ac-14_prm_1","label":"organization-defined user actions"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AC-14"},{"name":"sort-id","value":"ac-14"}],"parts":[{"id":"ac-14_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-14_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Identifies {{ insert: param, ac-14_prm_1 }} that can be performed on the information system without identification or authentication consistent with organizational missions\/business functions; and"},{"id":"ac-14_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents and provides supporting rationale in the security plan for the information system, user actions not requiring identification or authentication."}]},{"id":"ac-14_gdn","name":"guidance","prose":"This control addresses situations in which organizations determine that no identification or authentication is required in organizational information systems. Organizations may allow a limited number of user actions without identification or authentication including, for example, when individuals access public websites or other publicly accessible federal information systems, when individuals use mobile phones to receive calls, or when facsimiles are received. Organizations also identify actions that normally require identification or authentication but may under certain circumstances (e.g., emergencies), allow identification or authentication mechanisms to be bypassed. Such bypasses may occur, for example, via a software-readable physical switch that commands bypass of the logon functionality and is protected from accidental or unmonitored use. This control does not apply to situations where identification and authentication have already occurred and are not repeated, but rather to situations where identification and authentication have not yet occurred. Organizations may decide that there are no user actions that can be performed on organizational information systems without identification and authentication and thus, the values for assignment statements can be none.","links":[{"href":"#cp-2","rel":"related"},{"href":"#ia-2","rel":"related"}]},{"id":"ac-14_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-14.a_obj","name":"objective","props":[{"name":"label","value":"AC-14(a)"}],"parts":[{"id":"ac-14.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-14(a)[1]"}],"prose":"defines user actions that can be performed on the information system without identification or authentication consistent with organizational missions\/business functions;"},{"id":"ac-14.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-14(a)[2]"}],"prose":"identifies organization-defined user actions that can be performed on the information system without identification or authentication consistent with organizational missions\/business functions; and"}]},{"id":"ac-14.b_obj","name":"objective","props":[{"name":"label","value":"AC-14(b)"}],"prose":"documents and provides supporting rationale in the security plan for the information system, user actions not requiring identification or authentication."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing permitted actions without identification or authentication\n\ninformation system configuration settings and associated documentation\n\nsecurity plan\n\nlist of user actions that can be performed without identification or authentication\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ac-17","class":"SP800-53","title":"Remote Access","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-17"},{"name":"sort-id","value":"ac-17"}],"links":[{"href":"#5309d4d0-46f8-4213-a749-e7584164e5e8","rel":"reference"},{"href":"#99f331f2-a9f0-46c2-9856-a3cbb9b89442","rel":"reference"},{"href":"#349fe082-502d-464a-aa0c-1443c6a5cf40","rel":"reference"},{"href":"#1201fcf3-afb1-4675-915a-fb4ae0435717","rel":"reference"},{"href":"#d1a4e2a9-e512-4132-8795-5357aba29254","rel":"reference"}],"parts":[{"id":"ac-17_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-17_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes and documents usage restrictions, configuration\/connection requirements, and implementation guidance for each type of remote access allowed; and"},{"id":"ac-17_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes remote access to the information system prior to allowing such connections."}]},{"id":"ac-17_gdn","name":"guidance","prose":"Remote access is access to organizational information systems by users (or processes acting on behalf of users) communicating through external networks (e.g., the Internet). Remote access methods include, for example, dial-up, broadband, and wireless. Organizations often employ encrypted virtual private networks (VPNs) to enhance confidentiality and integrity over remote connections. The use of encrypted VPNs does not make the access non-remote; however, the use of VPNs, when adequately provisioned with appropriate security controls (e.g., employing appropriate encryption techniques for confidentiality and integrity protection) may provide sufficient assurance to the organization that it can effectively treat such connections as internal networks. Still, VPN connections traverse external networks, and the encrypted VPN does not enhance the availability of remote connections. Also, VPNs with encrypted tunnels can affect the organizational capability to adequately monitor network communications traffic for malicious code. Remote access controls apply to information systems other than public web servers or systems designed for public access. This control addresses authorization prior to allowing remote access without specifying the formats for such authorization. While organizations may use interconnection security agreements to authorize remote access connections, such agreements are not required by this control. Enforcing access restrictions for remote connections is addressed in AC-3.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#pe-17","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sc-10","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ac-17_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-17.a_obj","name":"objective","props":[{"name":"label","value":"AC-17(a)"}],"parts":[{"id":"ac-17.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-17(a)[1]"}],"prose":"identifies the types of remote access allowed to the information system;"},{"id":"ac-17.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-17(a)[2]"}],"prose":"establishes for each type of remote access allowed:","parts":[{"id":"ac-17.a_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-17(a)[2][a]"}],"prose":"usage restrictions;"},{"id":"ac-17.a_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-17(a)[2][b]"}],"prose":"configuration\/connection requirements;"},{"id":"ac-17.a_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-17(a)[2][c]"}],"prose":"implementation guidance;"}]},{"id":"ac-17.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-17(a)[3]"}],"prose":"documents for each type of remote access allowed:","parts":[{"id":"ac-17.a_obj.3.a","name":"objective","props":[{"name":"label","value":"AC-17(a)[3][a]"}],"prose":"usage restrictions;"},{"id":"ac-17.a_obj.3.b","name":"objective","props":[{"name":"label","value":"AC-17(a)[3][b]"}],"prose":"configuration\/connection requirements;"},{"id":"ac-17.a_obj.3.c","name":"objective","props":[{"name":"label","value":"AC-17(a)[3][c]"}],"prose":"implementation guidance; and"}]}]},{"id":"ac-17.b_obj","name":"objective","props":[{"name":"label","value":"AC-17(b)"}],"prose":"authorizes remote access to the information system prior to allowing such connections."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access implementation and usage (including restrictions)\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\nremote access authorizations\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing remote access connections\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Remote access management capability for the information system"}]}]},{"id":"ac-18","class":"SP800-53","title":"Wireless Access","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-18"},{"name":"sort-id","value":"ac-18"}],"links":[{"href":"#238ed479-eccb-49f6-82ec-ab74a7a428cf","rel":"reference"},{"href":"#d1b1d689-0f66-4474-9924-c81119758dc1","rel":"reference"},{"href":"#6f336ecd-f2a0-4c84-9699-0491d81b6e0d","rel":"reference"}],"parts":[{"id":"ac-18_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-18_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes usage restrictions, configuration\/connection requirements, and implementation guidance for wireless access; and"},{"id":"ac-18_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes wireless access to the information system prior to allowing such connections."}]},{"id":"ac-18_gdn","name":"guidance","prose":"Wireless technologies include, for example, microwave, packet radio (UHF\/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP\/TLS, PEAP), which provide credential protection and mutual authentication.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ac-18_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-18.a_obj","name":"objective","props":[{"name":"label","value":"AC-18(a)"}],"prose":"establishes for wireless access:","parts":[{"id":"ac-18.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-18(a)[1]"}],"prose":"usage restrictions;"},{"id":"ac-18.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-18(a)[2]"}],"prose":"configuration\/connection requirement;"},{"id":"ac-18.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-18(a)[3]"}],"prose":"implementation guidance; and"}]},{"id":"ac-18.b_obj","name":"objective","props":[{"name":"label","value":"AC-18(b)"}],"prose":"authorizes wireless access to the information system prior to allowing such connections."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing wireless access implementation and usage (including restrictions)\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nwireless access authorizations\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing wireless access connections\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Wireless access management capability for the information system"}]}]},{"id":"ac-19","class":"SP800-53","title":"Access Control for Mobile Devices","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-19"},{"name":"sort-id","value":"ac-19"}],"links":[{"href":"#4da24a96-6cf8-435d-9d1f-c73247cad109","rel":"reference"},{"href":"#1201fcf3-afb1-4675-915a-fb4ae0435717","rel":"reference"},{"href":"#0293a393-fbe8-4ed1-b0b4-f6fbd3ae1589","rel":"reference"},{"href":"#6513e480-fada-4876-abba-1397084dfb26","rel":"reference"}],"parts":[{"id":"ac-19_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-19_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes usage restrictions, configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices; and"},{"id":"ac-19_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes the connection of mobile devices to organizational information systems."}]},{"id":"ac-19_gdn","name":"guidance","prose":"A mobile device is a computing device that: (i) has a small form factor such that it can easily be carried by a single individual; (ii) is designed to operate without a physical connection (e.g., wirelessly transmit or receive information); (iii) possesses local, non-removable or removable data storage; and (iv) includes a self-contained power source. Mobile devices may also include voice communication capabilities, on-board sensors that allow the device to capture information, and\/or built-in features for synchronizing local data with remote locations. Examples include smart phones, E-readers, and tablets. Mobile devices are typically associated with a single individual and the device is usually in close proximity to the individual; however, the degree of proximity can vary depending upon on the form factor and size of the device. The processing, storage, and transmission capability of the mobile device may be comparable to or merely a subset of desktop systems, depending upon the nature and intended purpose of the device. Due to the large variety of mobile devices with different technical characteristics and capabilities, organizational restrictions may vary for the different classes\/types of such devices. Usage restrictions and specific implementation guidance for mobile devices include, for example, configuration management, device identification and authentication, implementation of mandatory protective software (e.g., malicious code detection, firewall), scanning devices for malicious code, updating virus protection software, scanning for critical software updates and patches, conducting primary operating system (and possibly other resident software) integrity checks, and disabling unnecessary hardware (e.g., wireless, infrared). Organizations are cautioned that the need to provide adequate security for mobile devices goes beyond the requirements in this control. Many safeguards and countermeasures for mobile devices are reflected in other security controls in the catalog allocated in the initial control baselines as starting points for the development of security plans and overlays using the tailoring process. There may also be some degree of overlap in the requirements articulated by the security controls within the different families of controls. AC-20 addresses mobile devices that are not organization-controlled.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-7","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ca-9","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-43","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ac-19_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-19.a_obj","name":"objective","props":[{"name":"label","value":"AC-19(a)"}],"prose":"establishes for organization-controlled mobile devices:","parts":[{"id":"ac-19.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-19(a)[1]"}],"prose":"usage restrictions;"},{"id":"ac-19.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-19(a)[2]"}],"prose":"configuration\/connection requirement;"},{"id":"ac-19.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-19(a)[3]"}],"prose":"implementation guidance; and"}]},{"id":"ac-19.b_obj","name":"objective","props":[{"name":"label","value":"AC-19(b)"}],"prose":"authorizes the connection of mobile devices to organizational information systems."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing access control for mobile device usage (including restrictions)\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nauthorizations for mobile device connections to organizational information systems\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel using mobile devices to access organizational information systems\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Access control capability authorizing mobile device connections to organizational information systems"}]}]},{"id":"ac-20","class":"SP800-53","title":"Use of External Information Systems","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-20"},{"name":"sort-id","value":"ac-20"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"}],"parts":[{"id":"ac-20_smt","name":"statement","prose":"The organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and\/or maintaining external information systems, allowing authorized individuals to:","parts":[{"id":"ac-20_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Access the information system from external information systems; and"},{"id":"ac-20_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Process, store, or transmit organization-controlled information using external information systems."}]},{"id":"ac-20_gdn","name":"guidance","prose":"External information systems are information systems or components of information systems that are outside of the authorization boundary established by organizations and for which organizations typically have no direct supervision and authority over the application of required security controls or the assessment of control effectiveness. External information systems include, for example: (i) personally owned information systems\/devices (e.g., notebook computers, smart phones, tablets, personal digital assistants); (ii) privately owned computing and communications devices resident in commercial or public facilities (e.g., hotels, train stations, convention centers, shopping malls, or airports); (iii) information systems owned or controlled by nonfederal governmental organizations; and (iv) federal information systems that are not owned by, operated by, or under the direct supervision and authority of organizations. This control also addresses the use of external information systems for the processing, storage, or transmission of organizational information, including, for example, accessing cloud services (e.g., infrastructure as a service, platform as a service, or software as a service) from organizational information systems. For some external information systems (i.e., information systems operated by other federal agencies, including organizations subordinate to those agencies), the trust relationships that have been established between those organizations and the originating organization may be such, that no explicit terms and conditions are required. Information systems within these organizations would not be considered external. These situations occur when, for example, there are pre-existing sharing\/trust agreements (either implicit or explicit) established between federal agencies or organizations subordinate to those agencies, or when such trust agreements are specified by applicable laws, Executive Orders, directives, or policies. Authorized individuals include, for example, organizational personnel, contractors, or other individuals with authorized access to organizational information systems and over which organizations have the authority to impose rules of behavior with regard to system access. Restrictions that organizations impose on authorized individuals need not be uniform, as those restrictions may vary depending upon the trust relationships between organizations. Therefore, organizations may choose to impose different security restrictions on contractors than on state, local, or tribal governments. This control does not apply to the use of external information systems to access public interfaces to organizational information systems (e.g., individuals accessing federal information through www.usa.gov). Organizations establish terms and conditions for the use of external information systems in accordance with organizational security policies and procedures. Terms and conditions address as a minimum: types of applications that can be accessed on organizational information systems from external information systems; and the highest security category of information that can be processed, stored, or transmitted on external information systems. If terms and conditions with the owners of external information systems cannot be established, organizations may impose restrictions on organizational personnel using those external systems.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sa-9","rel":"related"}]},{"id":"ac-20_obj","name":"objective","prose":"Determine if the organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and\/or maintaining external information systems, allowing authorized individuals to:","parts":[{"id":"ac-20.a_obj","name":"objective","props":[{"name":"label","value":"AC-20(a)"}],"prose":"access the information system from the external information systems; and"},{"id":"ac-20.b_obj","name":"objective","props":[{"name":"label","value":"AC-20(b)"}],"prose":"process, store, or transmit organization-controlled information using external information systems."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing the use of external information systems\n\nexternal information systems terms and conditions\n\nlist of types of applications accessible from external information systems\n\nmaximum security categorization for information processed, stored, or transmitted on external information systems\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining terms and conditions for use of external information systems to access organizational systems\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing terms and conditions on use of external information systems"}]}]},{"id":"ac-22","class":"SP800-53","title":"Publicly Accessible Content","params":[{"id":"ac-22_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AC-22"},{"name":"sort-id","value":"ac-22"}],"parts":[{"id":"ac-22_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-22_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Designates individuals authorized to post information onto a publicly accessible information system;"},{"id":"ac-22_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Trains authorized individuals to ensure that publicly accessible information does not contain nonpublic information;"},{"id":"ac-22_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included; and"},{"id":"ac-22_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Reviews the content on the publicly accessible information system for nonpublic information {{ insert: param, ac-22_prm_1 }} and removes such information, if discovered."}]},{"id":"ac-22_gdn","name":"guidance","prose":"In accordance with federal laws, Executive Orders, directives, policies, regulations, standards, and\/or guidance, the general public is not authorized access to nonpublic information (e.g., information protected under the Privacy Act and proprietary information). This control addresses information systems that are controlled by the organization and accessible to the general public, typically without identification or authentication. The posting of information on non-organization information systems is covered by organizational policy.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#au-13","rel":"related"}]},{"id":"ac-22_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-22.a_obj","name":"objective","props":[{"name":"label","value":"AC-22(a)"}],"prose":"designates individuals authorized to post information onto a publicly accessible information system;"},{"id":"ac-22.b_obj","name":"objective","props":[{"name":"label","value":"AC-22(b)"}],"prose":"trains authorized individuals to ensure that publicly accessible information does not contain nonpublic information;"},{"id":"ac-22.c_obj","name":"objective","props":[{"name":"label","value":"AC-22(c)"}],"prose":"reviews the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included;"},{"id":"ac-22.d_obj","name":"objective","props":[{"name":"label","value":"AC-22(d)"}],"parts":[{"id":"ac-22.d_obj.1","name":"objective","props":[{"name":"label","value":"AC-22(d)[1]"}],"prose":"defines the frequency to review the content on the publicly accessible information system for nonpublic information;"},{"id":"ac-22.d_obj.2","name":"objective","props":[{"name":"label","value":"AC-22(d)[2]"}],"prose":"reviews the content on the publicly accessible information system for nonpublic information with the organization-defined frequency; and"},{"id":"ac-22.d_obj.3","name":"objective","props":[{"name":"label","value":"AC-22(d)[3]"}],"prose":"removes nonpublic information from the publicly accessible information system, if discovered."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing publicly accessible content\n\nlist of users authorized to post publicly accessible content on organizational information systems\n\ntraining materials and\/or records\n\nrecords of publicly accessible information reviews\n\nrecords of response to nonpublic information on public websites\n\nsystem audit logs\n\nsecurity awareness training records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing publicly accessible information posted on organizational information systems\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing management of publicly accessible content"}]}]}]},{"id":"at","class":"family","title":"Awareness and Training","controls":[{"id":"at-1","class":"SP800-53","title":"Security Awareness and Training Policy and Procedures","params":[{"id":"at-1_prm_1","label":"organization-defined personnel or roles"},{"id":"at-1_prm_2","label":"organization-defined frequency"},{"id":"at-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AT-1"},{"name":"sort-id","value":"at-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"at-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"at-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, at-1_prm_1 }}:","parts":[{"id":"at-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A security awareness and training policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"at-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the security awareness and training policy and associated security awareness and training controls; and"}]},{"id":"at-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"at-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security awareness and training policy {{ insert: param, at-1_prm_2 }}; and"},{"id":"at-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Security awareness and training procedures {{ insert: param, at-1_prm_3 }}."}]}]},{"id":"at-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the AT family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"at-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-1.a_obj","name":"objective","props":[{"name":"label","value":"AT-1(a)"}],"parts":[{"id":"at-1.a.1_obj","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)"}],"parts":[{"id":"at-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1]"}],"prose":"develops and documents an security awareness and training policy that addresses:","parts":[{"id":"at-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"at-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"at-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"at-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"at-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"at-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"at-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"at-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the security awareness and training policy are to be disseminated;"},{"id":"at-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[3]"}],"prose":"disseminates the security awareness and training policy to organization-defined personnel or roles;"}]},{"id":"at-1.a.2_obj","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)"}],"parts":[{"id":"at-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the security awareness and training policy and associated awareness and training controls;"},{"id":"at-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"at-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"at-1.b_obj","name":"objective","props":[{"name":"label","value":"AT-1(b)"}],"parts":[{"id":"at-1.b.1_obj","name":"objective","props":[{"name":"label","value":"AT-1(b)(1)"}],"parts":[{"id":"at-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current security awareness and training policy;"},{"id":"at-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(b)(1)[2]"}],"prose":"reviews and updates the current security awareness and training policy with the organization-defined frequency;"}]},{"id":"at-1.b.2_obj","name":"objective","props":[{"name":"label","value":"AT-1(b)(2)"}],"parts":[{"id":"at-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current security awareness and training procedures; and"},{"id":"at-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(b)(2)[2]"}],"prose":"reviews and updates the current security awareness and training procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security awareness and training responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"at-2","class":"SP800-53","title":"Security Awareness Training","params":[{"id":"at-2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AT-2"},{"name":"sort-id","value":"at-02"}],"links":[{"href":"#bb61234b-46c3-4211-8c2b-9869222a720d","rel":"reference"},{"href":"#c5034e0c-eba6-4ecd-a541-79f0678f4ba4","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"at-2_smt","name":"statement","prose":"The organization provides basic security awareness training to information system users (including managers, senior executives, and contractors):","parts":[{"id":"at-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"As part of initial training for new users;"},{"id":"at-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"at-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, at-2_prm_1 }} thereafter."}]},{"id":"at-2_gdn","name":"guidance","prose":"Organizations determine the appropriate content of security awareness training and security awareness techniques based on the specific organizational requirements and the information systems to which personnel have authorized access. The content includes a basic understanding of the need for information security and user actions to maintain security and to respond to suspected security incidents. The content also addresses awareness of the need for operations security. Security awareness techniques can include, for example, displaying posters, offering supplies inscribed with security reminders, generating email advisories\/notices from senior organizational officials, displaying logon screen messages, and conducting information security awareness events.","links":[{"href":"#at-3","rel":"related"},{"href":"#at-4","rel":"related"},{"href":"#pl-4","rel":"related"}]},{"id":"at-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-2.a_obj","name":"objective","props":[{"name":"label","value":"AT-2(a)"}],"prose":"provides basic security awareness training to information system users (including managers, senior executives, and contractors) as part of initial training for new users;"},{"id":"at-2.b_obj","name":"objective","props":[{"name":"label","value":"AT-2(b)"}],"prose":"provides basic security awareness training to information system users (including managers, senior executives, and contractors) when required by information system changes; and"},{"id":"at-2.c_obj","name":"objective","props":[{"name":"label","value":"AT-2(c)"}],"parts":[{"id":"at-2.c_obj.1","name":"objective","props":[{"name":"label","value":"AT-2(c)[1]"}],"prose":"defines the frequency to provide refresher security awareness training thereafter to information system users (including managers, senior executives, and contractors); and"},{"id":"at-2.c_obj.2","name":"objective","props":[{"name":"label","value":"AT-2(c)[2]"}],"prose":"provides refresher security awareness training to information users (including managers, senior executives, and contractors) with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security awareness training implementation\n\nappropriate codes of federal regulations\n\nsecurity awareness training curriculum\n\nsecurity awareness training materials\n\nsecurity plan\n\ntraining records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for security awareness training\n\norganizational personnel with information security responsibilities\n\norganizational personnel comprising the general information system user community"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms managing security awareness training"}]}]},{"id":"at-3","class":"SP800-53","title":"Role-based Security Training","params":[{"id":"at-3_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AT-3"},{"name":"sort-id","value":"at-03"}],"links":[{"href":"#bb61234b-46c3-4211-8c2b-9869222a720d","rel":"reference"},{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"at-3_smt","name":"statement","prose":"The organization provides role-based security training to personnel with assigned security roles and responsibilities:","parts":[{"id":"at-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Before authorizing access to the information system or performing assigned duties;"},{"id":"at-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"at-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, at-3_prm_1 }} thereafter."}]},{"id":"at-3_gdn","name":"guidance","prose":"Organizations determine the appropriate content of security training based on the assigned roles and responsibilities of individuals and the specific security requirements of organizations and the information systems to which personnel have authorized access. In addition, organizations provide enterprise architects, information system developers, software developers, acquisition\/procurement officials, information system managers, system\/network administrators, personnel conducting configuration management and auditing activities, personnel performing independent verification and validation activities, security control assessors, and other personnel having access to system-level software, adequate security-related technical training specifically tailored for their assigned duties. Comprehensive role-based training addresses management, operational, and technical roles and responsibilities covering physical, personnel, and technical safeguards and countermeasures. Such training can include for example, policies, procedures, tools, and artifacts for the organizational security roles defined. Organizations also provide the training necessary for individuals to carry out their responsibilities related to operations and supply chain security within the context of organizational information security programs. Role-based security training also applies to contractors providing services to federal agencies.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-4","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#ps-7","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#sa-16","rel":"related"}]},{"id":"at-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-3.a_obj","name":"objective","props":[{"name":"label","value":"AT-3(a)"}],"prose":"provides role-based security training to personnel with assigned security roles and responsibilities before authorizing access to the information system or performing assigned duties;"},{"id":"at-3.b_obj","name":"objective","props":[{"name":"label","value":"AT-3(b)"}],"prose":"provides role-based security training to personnel with assigned security roles and responsibilities when required by information system changes; and"},{"id":"at-3.c_obj","name":"objective","props":[{"name":"label","value":"AT-3(c)"}],"parts":[{"id":"at-3.c_obj.1","name":"objective","props":[{"name":"label","value":"AT-3(c)[1]"}],"prose":"defines the frequency to provide refresher role-based security training thereafter to personnel with assigned security roles and responsibilities; and"},{"id":"at-3.c_obj.2","name":"objective","props":[{"name":"label","value":"AT-3(c)[2]"}],"prose":"provides refresher role-based security training to personnel with assigned security roles and responsibilities with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security training implementation\n\ncodes of federal regulations\n\nsecurity training curriculum\n\nsecurity training materials\n\nsecurity plan\n\ntraining records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for role-based security training\n\norganizational personnel with assigned information system security roles and responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms managing role-based security training"}]}]},{"id":"at-4","class":"SP800-53","title":"Security Training Records","params":[{"id":"at-4_prm_1","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AT-4"},{"name":"sort-id","value":"at-04"}],"parts":[{"id":"at-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"at-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Documents and monitors individual information system security training activities including basic security awareness training and specific information system security training; and"},{"id":"at-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Retains individual training records for {{ insert: param, at-4_prm_1 }}."}]},{"id":"at-4_gdn","name":"guidance","prose":"Documentation for specialized training may be maintained by individual supervisors at the option of the organization.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#pm-14","rel":"related"}]},{"id":"at-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-4.a_obj","name":"objective","props":[{"name":"label","value":"AT-4(a)"}],"parts":[{"id":"at-4.a_obj.1","name":"objective","props":[{"name":"label","value":"AT-4(a)[1]"}],"prose":"documents individual information system security training activities including:","parts":[{"id":"at-4.a_obj.1.a","name":"objective","props":[{"name":"label","value":"AT-4(a)[1][a]"}],"prose":"basic security awareness training;"},{"id":"at-4.a_obj.1.b","name":"objective","props":[{"name":"label","value":"AT-4(a)[1][b]"}],"prose":"specific role-based information system security training;"}]},{"id":"at-4.a_obj.2","name":"objective","props":[{"name":"label","value":"AT-4(a)[2]"}],"prose":"monitors individual information system security training activities including:","parts":[{"id":"at-4.a_obj.2.a","name":"objective","props":[{"name":"label","value":"AT-4(a)[2][a]"}],"prose":"basic security awareness training;"},{"id":"at-4.a_obj.2.b","name":"objective","props":[{"name":"label","value":"AT-4(a)[2][b]"}],"prose":"specific role-based information system security training;"}]}]},{"id":"at-4.b_obj","name":"objective","props":[{"name":"label","value":"AT-4(b)"}],"parts":[{"id":"at-4.b_obj.1","name":"objective","props":[{"name":"label","value":"AT-4(b)[1]"}],"prose":"defines a time period to retain individual training records; and"},{"id":"at-4.b_obj.2","name":"objective","props":[{"name":"label","value":"AT-4(b)[2]"}],"prose":"retains individual training records for the organization-defined time period."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security training records\n\nsecurity awareness and training records\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security training record retention responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting management of security training records"}]}]}]},{"id":"au","class":"family","title":"Audit and Accountability","controls":[{"id":"au-1","class":"SP800-53","title":"Audit and Accountability Policy and Procedures","params":[{"id":"au-1_prm_1","label":"organization-defined personnel or roles"},{"id":"au-1_prm_2","label":"organization-defined frequency"},{"id":"au-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-1"},{"name":"sort-id","value":"au-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"au-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"au-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, au-1_prm_1 }}:","parts":[{"id":"au-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An audit and accountability policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"au-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls; and"}]},{"id":"au-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"au-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Audit and accountability policy {{ insert: param, au-1_prm_2 }}; and"},{"id":"au-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Audit and accountability procedures {{ insert: param, au-1_prm_3 }}."}]}]},{"id":"au-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the AU family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"au-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-1.a_obj","name":"objective","props":[{"name":"label","value":"AU-1(a)"}],"parts":[{"id":"au-1.a.1_obj","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)"}],"parts":[{"id":"au-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1]"}],"prose":"develops and documents an audit and accountability policy that addresses:","parts":[{"id":"au-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"au-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"au-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"au-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"au-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"au-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"au-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"au-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the audit and accountability policy are to be disseminated;"},{"id":"au-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[3]"}],"prose":"disseminates the audit and accountability policy to organization-defined personnel or roles;"}]},{"id":"au-1.a.2_obj","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)"}],"parts":[{"id":"au-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls;"},{"id":"au-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"au-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"au-1.b_obj","name":"objective","props":[{"name":"label","value":"AU-1(b)"}],"parts":[{"id":"au-1.b.1_obj","name":"objective","props":[{"name":"label","value":"AU-1(b)(1)"}],"parts":[{"id":"au-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current audit and accountability policy;"},{"id":"au-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(b)(1)[2]"}],"prose":"reviews and updates the current audit and accountability policy with the organization-defined frequency;"}]},{"id":"au-1.b.2_obj","name":"objective","props":[{"name":"label","value":"AU-1(b)(2)"}],"parts":[{"id":"au-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current audit and accountability procedures; and"},{"id":"au-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(b)(2)[2]"}],"prose":"reviews and updates the current audit and accountability procedures in accordance with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"au-2","class":"SP800-53","title":"Audit Events","params":[{"id":"au-2_prm_1","label":"organization-defined auditable events"},{"id":"au-2_prm_2","label":"organization-defined audited events (the subset of the auditable events defined in AU-2 a.) along with the frequency of (or situation requiring) auditing for each identified event"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-2"},{"name":"sort-id","value":"au-02"}],"links":[{"href":"#672fd561-b92b-4713-b9cf-6c9d9456728b","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"au-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"au-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Determines that the information system is capable of auditing the following events: {{ insert: param, au-2_prm_1 }};"},{"id":"au-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events;"},{"id":"au-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Provides a rationale for why the auditable events are deemed to be adequate to support after-the-fact investigations of security incidents; and"},{"id":"au-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Determines that the following events are to be audited within the information system: {{ insert: param, au-2_prm_2 }}."}]},{"id":"au-2_gdn","name":"guidance","prose":"An event is any observable occurrence in an organizational information system. Organizations identify audit events as those events which are significant and relevant to the security of information systems and the environments in which those systems operate in order to meet specific and ongoing audit needs. Audit events can include, for example, password changes, failed logons, or failed accesses related to information systems, administrative privilege usage, PIV credential usage, or third-party credential usage. In determining the set of auditable events, organizations consider the auditing appropriate for each of the security controls to be implemented. To balance auditing requirements with other information system needs, this control also requires identifying that subset of auditable events that are audited at a given point in time. For example, organizations may determine that information systems must have the capability to log every file access both successful and unsuccessful, but not activate that capability except for specific circumstances due to the potential burden on system performance. Auditing requirements, including the need for auditable events, may be referenced in other security controls and control enhancements. Organizations also include auditable events that are required by applicable federal laws, Executive Orders, directives, policies, regulations, and standards. Audit records can be generated at various levels of abstraction, including at the packet level as information traverses the network. Selecting the appropriate level of abstraction is a critical aspect of an audit capability and can facilitate the identification of root causes to problems. Organizations consider in the definition of auditable events, the auditing necessary to cover related events such as the steps in distributed, transaction-based processes (e.g., processes that are distributed across multiple organizations) and actions that occur in service-oriented architectures.","links":[{"href":"#ac-6","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"au-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-2.a_obj","name":"objective","props":[{"name":"label","value":"AU-2(a)"}],"parts":[{"id":"au-2.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-2(a)[1]"}],"prose":"defines the auditable events that the information system must be capable of auditing;"},{"id":"au-2.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-2(a)[2]"}],"prose":"determines that the information system is capable of auditing organization-defined auditable events;"}]},{"id":"au-2.b_obj","name":"objective","props":[{"name":"label","value":"AU-2(b)"}],"prose":"coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events;"},{"id":"au-2.c_obj","name":"objective","props":[{"name":"label","value":"AU-2(c)"}],"prose":"provides a rationale for why the auditable events are deemed to be adequate to support after-the-fact investigations of security incidents;"},{"id":"au-2.d_obj","name":"objective","props":[{"name":"label","value":"AU-2(d)"}],"parts":[{"id":"au-2.d_obj.1","name":"objective","props":[{"name":"label","value":"AU-2(d)[1]"}],"prose":"defines the subset of auditable events defined in AU-2a that are to be audited within the information system;"},{"id":"au-2.d_obj.2","name":"objective","props":[{"name":"label","value":"AU-2(d)[2]"}],"prose":"determines that the subset of auditable events defined in AU-2a are to be audited within the information system; and"},{"id":"au-2.d_obj.3","name":"objective","props":[{"name":"label","value":"AU-2(d)[3]"}],"prose":"determines the frequency of (or situation requiring) auditing for each identified event."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing auditable events\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\ninformation system auditable events\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information system auditing"}]}]},{"id":"au-3","class":"SP800-53","title":"Content of Audit Records","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-3"},{"name":"sort-id","value":"au-03"}],"parts":[{"id":"au-3_smt","name":"statement","prose":"The information system generates audit records containing information that establishes what type of event occurred, when the event occurred, where the event occurred, the source of the event, the outcome of the event, and the identity of any individuals or subjects associated with the event."},{"id":"au-3_gdn","name":"guidance","prose":"Audit record content that may be necessary to satisfy the requirement of this control, includes, for example, time stamps, source and destination addresses, user\/process identifiers, event descriptions, success\/fail indications, filenames involved, and access control or flow control rules invoked. Event outcomes can include indicators of event success or failure and event-specific results (e.g., the security state of the information system after the event occurred).","links":[{"href":"#au-2","rel":"related"},{"href":"#au-8","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#si-11","rel":"related"}]},{"id":"au-3_obj","name":"objective","prose":"Determine if the information system generates audit records containing information that establishes:","parts":[{"id":"au-3_obj.1","name":"objective","props":[{"name":"label","value":"AU-3[1]"}],"prose":"what type of event occurred;"},{"id":"au-3_obj.2","name":"objective","props":[{"name":"label","value":"AU-3[2]"}],"prose":"when the event occurred;"},{"id":"au-3_obj.3","name":"objective","props":[{"name":"label","value":"AU-3[3]"}],"prose":"where the event occurred;"},{"id":"au-3_obj.4","name":"objective","props":[{"name":"label","value":"AU-3[4]"}],"prose":"the source of the event;"},{"id":"au-3_obj.5","name":"objective","props":[{"name":"label","value":"AU-3[5]"}],"prose":"the outcome of the event; and"},{"id":"au-3_obj.6","name":"objective","props":[{"name":"label","value":"AU-3[6]"}],"prose":"the identity of any individuals or subjects associated with the event."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing content of audit records\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of organization-defined auditable events\n\ninformation system audit records\n\ninformation system incident reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information system auditing of auditable events"}]}]},{"id":"au-4","class":"SP800-53","title":"Audit Storage Capacity","params":[{"id":"au-4_prm_1","label":"organization-defined audit record storage requirements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-4"},{"name":"sort-id","value":"au-04"}],"parts":[{"id":"au-4_smt","name":"statement","prose":"The organization allocates audit record storage capacity in accordance with {{ insert: param, au-4_prm_1 }}."},{"id":"au-4_gdn","name":"guidance","prose":"Organizations consider the types of auditing to be performed and the audit processing requirements when allocating audit storage capacity. Allocating sufficient audit storage capacity reduces the likelihood of such capacity being exceeded and resulting in the potential loss or reduction of auditing capability.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-5","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"},{"href":"#au-11","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"au-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-4_obj.1","name":"objective","props":[{"name":"label","value":"AU-4[1]"}],"prose":"defines audit record storage requirements; and"},{"id":"au-4_obj.2","name":"objective","props":[{"name":"label","value":"AU-4[2]"}],"prose":"allocates audit record storage capacity in accordance with the organization-defined audit record storage requirements."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit storage capacity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit record storage requirements\n\naudit record storage capability for information system components\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Audit record storage capacity and related configuration settings"}]}]},{"id":"au-5","class":"SP800-53","title":"Response to Audit Processing Failures","params":[{"id":"au-5_prm_1","label":"organization-defined personnel or roles"},{"id":"au-5_prm_2","label":"organization-defined actions to be taken (e.g., shut down information system, overwrite oldest audit records, stop generating audit records)"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-5"},{"name":"sort-id","value":"au-05"}],"parts":[{"id":"au-5_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Alerts {{ insert: param, au-5_prm_1 }} in the event of an audit processing failure; and"},{"id":"au-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Takes the following additional actions: {{ insert: param, au-5_prm_2 }}."}]},{"id":"au-5_gdn","name":"guidance","prose":"Audit processing failures include, for example, software\/hardware errors, failures in the audit capturing mechanisms, and audit storage capacity being reached or exceeded. Organizations may choose to define additional actions for different audit processing failures (e.g., by type, by location, by severity, or a combination of such factors). This control applies to each audit data storage repository (i.e., distinct information system component where audit records are stored), the total audit storage capacity of organizations (i.e., all audit data storage repositories combined), or both.","links":[{"href":"#au-4","rel":"related"},{"href":"#si-12","rel":"related"}]},{"id":"au-5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-5.a_obj","name":"objective","props":[{"name":"label","value":"AU-5(a)"}],"parts":[{"id":"au-5.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-5(a)[1]"}],"prose":"the organization defines the personnel or roles to be alerted in the event of an audit processing failure;"},{"id":"au-5.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-5(a)[2]"}],"prose":"the information system alerts the organization-defined personnel or roles in the event of an audit processing failure;"}]},{"id":"au-5.b_obj","name":"objective","props":[{"name":"label","value":"AU-5(b)"}],"parts":[{"id":"au-5.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-5(b)[1]"}],"prose":"the organization defines additional actions to be taken (e.g., shutdown information system, overwrite oldest audit records, stop generating audit records) in the event of an audit processing failure; and"},{"id":"au-5.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-5(b)[2]"}],"prose":"the information system takes the additional organization-defined actions in the event of an audit processing failure."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing response to audit processing failures\n\ninformation system design documentation\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\nlist of personnel to be notified in case of an audit processing failure\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information system response to audit processing failures"}]}]},{"id":"au-6","class":"SP800-53","title":"Audit Review, Analysis, and Reporting","params":[{"id":"au-6_prm_1","label":"organization-defined frequency"},{"id":"au-6_prm_2","label":"organization-defined inappropriate or unusual activity"},{"id":"au-6_prm_3","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-6"},{"name":"sort-id","value":"au-06"}],"parts":[{"id":"au-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"au-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Reviews and analyzes information system audit records {{ insert: param, au-6_prm_1 }} for indications of {{ insert: param, au-6_prm_2 }}; and"},{"id":"au-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reports findings to {{ insert: param, au-6_prm_3 }}."}]},{"id":"au-6_gdn","name":"guidance","prose":"Audit review, analysis, and reporting covers information security-related auditing performed by organizations including, for example, auditing that results from monitoring of account usage, remote access, wireless connectivity, mobile device connection, configuration settings, system component inventory, use of maintenance tools and nonlocal maintenance, physical access, temperature and humidity, equipment delivery and removal, communications at the information system boundaries, use of mobile code, and use of VoIP. Findings can be reported to organizational entities that include, for example, incident response team, help desk, information security group\/department. If organizations are prohibited from reviewing and analyzing audit information or unable to conduct such activities (e.g., in certain national security applications or systems), the review\/analysis may be carried out by other organizations granted such authority.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#au-7","rel":"related"},{"href":"#au-16","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-10","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ir-5","rel":"related"},{"href":"#ir-6","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-6","rel":"related"},{"href":"#pe-14","rel":"related"},{"href":"#pe-16","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-18","rel":"related"},{"href":"#sc-19","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"au-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-6.a_obj","name":"objective","props":[{"name":"label","value":"AU-6(a)"}],"parts":[{"id":"au-6.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-6(a)[1]"}],"prose":"defines the types of inappropriate or unusual activity to look for when information system audit records are reviewed and analyzed;"},{"id":"au-6.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-6(a)[2]"}],"prose":"defines the frequency to review and analyze information system audit records for indications of organization-defined inappropriate or unusual activity;"},{"id":"au-6.a_obj.3","name":"objective","props":[{"name":"label","value":"AU-6(a)[3]"}],"prose":"reviews and analyzes information system audit records for indications of organization-defined inappropriate or unusual activity with the organization-defined frequency;"}]},{"id":"au-6.b_obj","name":"objective","props":[{"name":"label","value":"AU-6(b)"}],"parts":[{"id":"au-6.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-6(b)[1]"}],"prose":"defines personnel or roles to whom findings resulting from reviews and analysis of information system audit records are to be reported; and"},{"id":"au-6.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-6(b)[2]"}],"prose":"reports findings to organization-defined personnel or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit review, analysis, and reporting\n\nreports of audit findings\n\nrecords of actions taken in response to reviews\/analyses of audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit review, analysis, and reporting responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"au-8","class":"SP800-53","title":"Time Stamps","params":[{"id":"au-8_prm_1","label":"organization-defined granularity of time measurement"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-8"},{"name":"sort-id","value":"au-08"}],"parts":[{"id":"au-8_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Uses internal system clocks to generate time stamps for audit records; and"},{"id":"au-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT) and meets {{ insert: param, au-8_prm_1 }}."}]},{"id":"au-8_gdn","name":"guidance","prose":"Time stamps generated by the information system include date and time. Time is commonly expressed in Coordinated Universal Time (UTC), a modern continuation of Greenwich Mean Time (GMT), or local time with an offset from UTC. Granularity of time measurements refers to the degree of synchronization between information system clocks and reference clocks, for example, clocks synchronizing within hundreds of milliseconds or within tens of milliseconds. Organizations may define different time granularities for different system components. Time service can also be critical to other security capabilities such as access control and identification and authentication, depending on the nature of the mechanisms used to support those capabilities.","links":[{"href":"#au-3","rel":"related"},{"href":"#au-12","rel":"related"}]},{"id":"au-8_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-8.a_obj","name":"objective","props":[{"name":"label","value":"AU-8(a)"}],"prose":"the information system uses internal system clocks to generate time stamps for audit records;"},{"id":"au-8.b_obj","name":"objective","props":[{"name":"label","value":"AU-8(b)"}],"parts":[{"id":"au-8.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-8(b)[1]"}],"prose":"the information system records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT);"},{"id":"au-8.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-8(b)[2]"}],"prose":"the organization defines the granularity of time measurement to be met when recording time stamps for audit records; and"},{"id":"au-8.b_obj.3","name":"objective","props":[{"name":"label","value":"AU-8(b)[3]"}],"prose":"the organization records time stamps for audit records that meet the organization-defined granularity of time measurement."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing time stamp generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing time stamp generation"}]}]},{"id":"au-9","class":"SP800-53","title":"Protection of Audit Information","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-9"},{"name":"sort-id","value":"au-09"}],"parts":[{"id":"au-9_smt","name":"statement","prose":"The information system protects audit information and audit tools from unauthorized access, modification, and deletion."},{"id":"au-9_gdn","name":"guidance","prose":"Audit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully audit information system activity. This control focuses on technical protection of audit information. Physical protection of audit information is addressed by media protection controls and physical and environmental protection controls.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-6","rel":"related"}]},{"id":"au-9_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-9_obj.1","name":"objective","props":[{"name":"label","value":"AU-9[1]"}],"prose":"the information system protects audit information from unauthorized:","parts":[{"id":"au-9_obj.1.a","name":"objective","props":[{"name":"label","value":"AU-9[1][a]"}],"prose":"access;"},{"id":"au-9_obj.1.b","name":"objective","props":[{"name":"label","value":"AU-9[1][b]"}],"prose":"modification;"},{"id":"au-9_obj.1.c","name":"objective","props":[{"name":"label","value":"AU-9[1][c]"}],"prose":"deletion;"}]},{"id":"au-9_obj.2","name":"objective","props":[{"name":"label","value":"AU-9[2]"}],"prose":"the information system protects audit tools from unauthorized:","parts":[{"id":"au-9_obj.2.a","name":"objective","props":[{"name":"label","value":"AU-9[2][a]"}],"prose":"access;"},{"id":"au-9_obj.2.b","name":"objective","props":[{"name":"label","value":"AU-9[2][b]"}],"prose":"modification; and"},{"id":"au-9_obj.2.c","name":"objective","props":[{"name":"label","value":"AU-9[2][c]"}],"prose":"deletion."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\naccess control policy and procedures\n\nprocedures addressing protection of audit information\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation, information system audit records\n\naudit tools\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing audit information protection"}]}]},{"id":"au-11","class":"SP800-53","title":"Audit Record Retention","params":[{"id":"au-11_prm_1","label":"organization-defined time period consistent with records retention policy"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AU-11"},{"name":"sort-id","value":"au-11"}],"parts":[{"id":"au-11_smt","name":"statement","prose":"The organization retains audit records for {{ insert: param, au-11_prm_1 }} to provide support for after-the-fact investigations of security incidents and to meet regulatory and organizational information retention requirements."},{"id":"au-11_gdn","name":"guidance","prose":"Organizations retain audit records until it is determined that they are no longer needed for administrative, legal, audit, or other operational purposes. This includes, for example, retention and availability of audit records relative to Freedom of Information Act (FOIA) requests, subpoenas, and law enforcement actions. Organizations develop standard categories of audit records relative to such types of actions and standard response processes for each type of action. The National Archives and Records Administration (NARA) General Records Schedules provide federal policy on record retention.","links":[{"href":"#au-4","rel":"related"},{"href":"#au-5","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#mp-6","rel":"related"}]},{"id":"au-11_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-11_obj.1","name":"objective","props":[{"name":"label","value":"AU-11[1]"}],"prose":"defines a time period to retain audit records that is consistent with records retention policy;"},{"id":"au-11_obj.2","name":"objective","props":[{"name":"label","value":"AU-11[2]"}],"prose":"retains audit records for the organization-defined time period consistent with records retention policy to:","parts":[{"id":"au-11_obj.2.a","name":"objective","props":[{"name":"label","value":"AU-11[2][a]"}],"prose":"provide support for after-the-fact investigations of security incidents; and"},{"id":"au-11_obj.2.b","name":"objective","props":[{"name":"label","value":"AU-11[2][b]"}],"prose":"meet regulatory and organizational information retention requirements."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\naudit record retention policy and procedures\n\nsecurity plan\n\norganization-defined retention period for audit records\n\naudit record archives\n\naudit logs\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit record retention responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]}]},{"id":"au-12","class":"SP800-53","title":"Audit Generation","params":[{"id":"au-12_prm_1","label":"organization-defined information system components"},{"id":"au-12_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-12"},{"name":"sort-id","value":"au-12"}],"parts":[{"id":"au-12_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-12_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Provides audit record generation capability for the auditable events defined in AU-2 a. at {{ insert: param, au-12_prm_1 }};"},{"id":"au-12_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Allows {{ insert: param, au-12_prm_2 }} to select which auditable events are to be audited by specific components of the information system; and"},{"id":"au-12_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Generates audit records for the events defined in AU-2 d. with the content defined in AU-3."}]},{"id":"au-12_gdn","name":"guidance","prose":"Audit records can be generated from many different information system components. The list of audited events is the set of events for which audits are to be generated. These events are typically a subset of all events for which the information system is capable of generating audit records.","links":[{"href":"#ac-3","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"}]},{"id":"au-12_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-12.a_obj","name":"objective","props":[{"name":"label","value":"AU-12(a)"}],"parts":[{"id":"au-12.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-12(a)[1]"}],"prose":"the organization defines the information system components which are to provide audit record generation capability for the auditable events defined in AU-2a;"},{"id":"au-12.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-12(a)[2]"}],"prose":"the information system provides audit record generation capability, for the auditable events defined in AU-2a, at organization-defined information system components;"}]},{"id":"au-12.b_obj","name":"objective","props":[{"name":"label","value":"AU-12(b)"}],"parts":[{"id":"au-12.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-12(b)[1]"}],"prose":"the organization defines the personnel or roles allowed to select which auditable events are to be audited by specific components of the information system;"},{"id":"au-12.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-12(b)[2]"}],"prose":"the information system allows the organization-defined personnel or roles to select which auditable events are to be audited by specific components of the system; and"}]},{"id":"au-12.c_obj","name":"objective","props":[{"name":"label","value":"AU-12(c)"}],"prose":"the information system generates audit records for the events defined in AU-2d with the content in defined in AU-3."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit record generation\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of auditable events\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit record generation responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing audit record generation capability"}]}]}]},{"id":"ca","class":"family","title":"Security Assessment and Authorization","controls":[{"id":"ca-1","class":"SP800-53","title":"Security Assessment and Authorization Policy and Procedures","params":[{"id":"ca-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ca-1_prm_2","label":"organization-defined frequency"},{"id":"ca-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CA-1"},{"name":"sort-id","value":"ca-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ca-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ca-1_prm_1 }}:","parts":[{"id":"ca-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ca-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the security assessment and authorization policy and associated security assessment and authorization controls; and"}]},{"id":"ca-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ca-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security assessment and authorization policy {{ insert: param, ca-1_prm_2 }}; and"},{"id":"ca-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Security assessment and authorization procedures {{ insert: param, ca-1_prm_3 }}."}]}]},{"id":"ca-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the CA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ca-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-1.a_obj","name":"objective","props":[{"name":"label","value":"CA-1(a)"}],"parts":[{"id":"ca-1.a.1_obj","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)"}],"parts":[{"id":"ca-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1]"}],"prose":"develops and documents a security assessment and authorization policy that addresses:","parts":[{"id":"ca-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ca-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ca-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ca-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ca-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ca-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ca-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ca-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the security assessment and authorization policy is to be disseminated;"},{"id":"ca-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[3]"}],"prose":"disseminates the security assessment and authorization policy to organization-defined personnel or roles;"}]},{"id":"ca-1.a.2_obj","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)"}],"parts":[{"id":"ca-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the security assessment and authorization policy and associated assessment and authorization controls;"},{"id":"ca-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ca-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ca-1.b_obj","name":"objective","props":[{"name":"label","value":"CA-1(b)"}],"parts":[{"id":"ca-1.b.1_obj","name":"objective","props":[{"name":"label","value":"CA-1(b)(1)"}],"parts":[{"id":"ca-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current security assessment and authorization policy;"},{"id":"ca-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(b)(1)[2]"}],"prose":"reviews and updates the current security assessment and authorization policy with the organization-defined frequency;"}]},{"id":"ca-1.b.2_obj","name":"objective","props":[{"name":"label","value":"CA-1(b)(2)"}],"parts":[{"id":"ca-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current security assessment and authorization procedures; and"},{"id":"ca-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(b)(2)[2]"}],"prose":"reviews and updates the current security assessment and authorization procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security assessment and authorization responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ca-2","class":"SP800-53","title":"Security Assessments","params":[{"id":"ca-2_prm_1","label":"organization-defined frequency"},{"id":"ca-2_prm_2","label":"organization-defined individuals or roles"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-2"},{"name":"sort-id","value":"ca-02"}],"links":[{"href":"#c5034e0c-eba6-4ecd-a541-79f0678f4ba4","rel":"reference"},{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"}],"parts":[{"id":"ca-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a security assessment plan that describes the scope of the assessment including:","parts":[{"id":"ca-2_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security controls and control enhancements under assessment;"},{"id":"ca-2_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Assessment procedures to be used to determine security control effectiveness; and"},{"id":"ca-2_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Assessment environment, assessment team, and assessment roles and responsibilities;"}]},{"id":"ca-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Assesses the security controls in the information system and its environment of operation {{ insert: param, ca-2_prm_1 }} to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;"},{"id":"ca-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Produces a security assessment report that documents the results of the assessment; and"},{"id":"ca-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Provides the results of the security control assessment to {{ insert: param, ca-2_prm_2 }}."}]},{"id":"ca-2_gdn","name":"guidance","prose":"Organizations assess security controls in organizational information systems and the environments in which those systems operate as part of: (i) initial and ongoing security authorizations; (ii) FISMA annual assessments; (iii) continuous monitoring; and (iv) system development life cycle activities. Security assessments: (i) ensure that information security is built into organizational information systems; (ii) identify weaknesses and deficiencies early in the development process; (iii) provide essential information needed to make risk-based decisions as part of security authorization processes; and (iv) ensure compliance to vulnerability mitigation procedures. Assessments are conducted on the implemented security controls from Appendix F (main catalog) and Appendix G (Program Management controls) as documented in System Security Plans and Information Security Program Plans. Organizations can use other types of assessment activities such as vulnerability scanning and system monitoring to maintain the security posture of information systems during the entire life cycle. Security assessment reports document assessment results in sufficient detail as deemed necessary by organizations, to determine the accuracy and completeness of the reports and whether the security controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting security requirements. The FISMA requirement for assessing security controls at least annually does not require additional assessment activities to those activities already in place in organizational security authorization processes. Security assessment results are provided to the individuals or roles appropriate for the types of assessments being conducted. For example, assessments conducted in support of security authorization decisions are provided to authorizing officials or authorizing official designated representatives. To satisfy annual assessment requirements, organizations can use assessment results from the following sources: (i) initial or ongoing information system authorizations; (ii) continuous monitoring; or (iii) system development life cycle activities. Organizations ensure that security assessment results are current, relevant to the determination of security control effectiveness, and obtained with the appropriate level of assessor independence. Existing security control assessment results can be reused to the extent that the results are still valid and can also be supplemented with additional assessments as needed. Subsequent to initial authorizations and in accordance with OMB policy, organizations assess security controls during continuous monitoring. Organizations establish the frequency for ongoing security control assessments in accordance with organizational continuous monitoring strategies. Information Assurance Vulnerability Alerts provide useful examples of vulnerability mitigation procedures. External audits (e.g., audits by external entities such as regulatory agencies) are outside the scope of this control.","links":[{"href":"#ca-5","rel":"related"},{"href":"#ca-6","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-2.a_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)"}],"prose":"develops a security assessment plan that describes the scope of the assessment including:","parts":[{"id":"ca-2.a.1_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)(1)"}],"prose":"security controls and control enhancements under assessment;"},{"id":"ca-2.a.2_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)(2)"}],"prose":"assessment procedures to be used to determine security control effectiveness;"},{"id":"ca-2.a.3_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)"}],"parts":[{"id":"ca-2.a.3_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)[1]"}],"prose":"assessment environment;"},{"id":"ca-2.a.3_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)[2]"}],"prose":"assessment team;"},{"id":"ca-2.a.3_obj.3","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)[3]"}],"prose":"assessment roles and responsibilities;"}]}]},{"id":"ca-2.b_obj","name":"objective","props":[{"name":"label","value":"CA-2(b)"}],"parts":[{"id":"ca-2.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(b)[1]"}],"prose":"defines the frequency to assess the security controls in the information system and its environment of operation;"},{"id":"ca-2.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(b)[2]"}],"prose":"assesses the security controls in the information system with the organization-defined frequency to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;"}]},{"id":"ca-2.c_obj","name":"objective","props":[{"name":"label","value":"CA-2(c)"}],"prose":"produces a security assessment report that documents the results of the assessment;"},{"id":"ca-2.d_obj","name":"objective","props":[{"name":"label","value":"CA-2(d)"}],"parts":[{"id":"ca-2.d_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(d)[1]"}],"prose":"defines individuals or roles to whom the results of the security control assessment are to be provided; and"},{"id":"ca-2.d_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(d)[2]"}],"prose":"provides the results of the security control assessment to organization-defined individuals or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing security assessment planning\n\nprocedures addressing security assessments\n\nsecurity assessment plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security assessment responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting security assessment, security assessment plan development, and\/or security assessment reporting"}]}]},{"id":"ca-3","class":"SP800-53","title":"System Interconnections","params":[{"id":"ca-3_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CA-3"},{"name":"sort-id","value":"ca-03"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#2711f068-734e-4afd-94ba-0b22247fbc88","rel":"reference"}],"parts":[{"id":"ca-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;"},{"id":"ca-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents, for each interconnection, the interface characteristics, security requirements, and the nature of the information communicated; and"},{"id":"ca-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews and updates Interconnection Security Agreements {{ insert: param, ca-3_prm_1 }}."}]},{"id":"ca-3_gdn","name":"guidance","prose":"This control applies to dedicated connections between information systems (i.e., system interconnections) and does not apply to transitory, user-controlled connections such as email and website browsing. Organizations carefully consider the risks that may be introduced when information systems are connected to other systems with different security requirements and security controls, both within organizations and external to organizations. Authorizing officials determine the risk associated with information system connections and the appropriate controls employed. If interconnecting systems have the same authorizing official, organizations do not need to develop Interconnection Security Agreements. Instead, organizations can describe the interface characteristics between those interconnecting systems in their respective security plans. If interconnecting systems have different authorizing officials within the same organization, organizations can either develop Interconnection Security Agreements or describe the interface characteristics between systems in the security plans for the respective systems. Organizations may also incorporate Interconnection Security Agreement information into formal contracts, especially for interconnections established between federal agencies and nonfederal (i.e., private sector) organizations. Risk considerations also include information systems sharing the same networks. For certain technologies (e.g., space, unmanned aerial vehicles, and medical devices), there may be specialized connections in place during preoperational testing. Such connections may require Interconnection Security Agreements and be subject to additional security controls.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#au-16","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#sa-9","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-3.a_obj","name":"objective","props":[{"name":"label","value":"CA-3(a)"}],"prose":"authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;"},{"id":"ca-3.b_obj","name":"objective","props":[{"name":"label","value":"CA-3(b)"}],"prose":"documents, for each interconnection:","parts":[{"id":"ca-3.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-3(b)[1]"}],"prose":"the interface characteristics;"},{"id":"ca-3.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-3(b)[2]"}],"prose":"the security requirements;"},{"id":"ca-3.b_obj.3","name":"objective","props":[{"name":"label","value":"CA-3(b)[3]"}],"prose":"the nature of the information communicated;"}]},{"id":"ca-3.c_obj","name":"objective","props":[{"name":"label","value":"CA-3(c)"}],"parts":[{"id":"ca-3.c_obj.1","name":"objective","props":[{"name":"label","value":"CA-3(c)[1]"}],"prose":"defines the frequency to review and update Interconnection Security Agreements; and"},{"id":"ca-3.c_obj.2","name":"objective","props":[{"name":"label","value":"CA-3(c)[2]"}],"prose":"reviews and updates Interconnection Security Agreements with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing information system connections\n\nsystem and communications protection policy\n\ninformation system Interconnection Security Agreements\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for developing, implementing, or approving information system interconnection agreements\n\norganizational personnel with information security responsibilities\n\npersonnel managing the system(s) to which the Interconnection Security Agreement applies"}]}]},{"id":"ca-5","class":"SP800-53","title":"Plan of Action and Milestones","params":[{"id":"ca-5_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"CA-5"},{"name":"sort-id","value":"ca-05"}],"links":[{"href":"#2c5884cd-7b96-425c-862a-99877e1cf909","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"}],"parts":[{"id":"ca-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a plan of action and milestones for the information system to document the organization’s planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls and to reduce or eliminate known vulnerabilities in the system; and"},{"id":"ca-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Updates existing plan of action and milestones {{ insert: param, ca-5_prm_1 }} based on the findings from security controls assessments, security impact analyses, and continuous monitoring activities."}]},{"id":"ca-5_gdn","name":"guidance","prose":"Plans of action and milestones are key documents in security authorization packages and are subject to federal reporting requirements established by OMB.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#pm-4","rel":"related"}]},{"id":"ca-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-5.a_obj","name":"objective","props":[{"name":"label","value":"CA-5(a)"}],"prose":"develops a plan of action and milestones for the information system to:","parts":[{"id":"ca-5.a_obj.1","name":"objective","props":[{"name":"label","value":"CA-5(a)[1]"}],"prose":"document the organization’s planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls;"},{"id":"ca-5.a_obj.2","name":"objective","props":[{"name":"label","value":"CA-5(a)[2]"}],"prose":"reduce or eliminate known vulnerabilities in the system;"}]},{"id":"ca-5.b_obj","name":"objective","props":[{"name":"label","value":"CA-5(b)"}],"parts":[{"id":"ca-5.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-5(b)[1]"}],"prose":"defines the frequency to update the existing plan of action and milestones;"},{"id":"ca-5.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-5(b)[2]"}],"prose":"updates the existing plan of action and milestones with the organization-defined frequency based on the findings from:","parts":[{"id":"ca-5.b_obj.2.a","name":"objective","props":[{"name":"label","value":"CA-5(b)[2][a]"}],"prose":"security controls assessments;"},{"id":"ca-5.b_obj.2.b","name":"objective","props":[{"name":"label","value":"CA-5(b)[2][b]"}],"prose":"security impact analyses; and"},{"id":"ca-5.b_obj.2.c","name":"objective","props":[{"name":"label","value":"CA-5(b)[2][c]"}],"prose":"continuous monitoring activities."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing plan of action and milestones\n\nsecurity plan\n\nsecurity assessment plan\n\nsecurity assessment report\n\nsecurity assessment evidence\n\nplan of action and milestones\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with plan of action and milestones development and implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms for developing, implementing, and maintaining plan of action and milestones"}]}]},{"id":"ca-6","class":"SP800-53","title":"Security Authorization","params":[{"id":"ca-6_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-6"},{"name":"sort-id","value":"ca-06"}],"links":[{"href":"#9f77f845-e3ea-4ca4-b2c0-aa9eedc214ab","rel":"reference"},{"href":"#bedb15b7-ec5c-4a68-807f-385125751fcd","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"}],"parts":[{"id":"ca-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Assigns a senior-level executive or manager as the authorizing official for the information system;"},{"id":"ca-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Ensures that the authorizing official authorizes the information system for processing before commencing operations; and"},{"id":"ca-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Updates the security authorization {{ insert: param, ca-6_prm_1 }}."}]},{"id":"ca-6_gdn","name":"guidance","prose":"Security authorizations are official management decisions, conveyed through authorization decision documents, by senior organizational officials or executives (i.e., authorizing officials) to authorize operation of information systems and to explicitly accept the risk to organizational operations and assets, individuals, other organizations, and the Nation based on the implementation of agreed-upon security controls. Authorizing officials provide budgetary oversight for organizational information systems or assume responsibility for the mission\/business operations supported by those systems. The security authorization process is an inherently federal responsibility and therefore, authorizing officials must be federal employees. Through the security authorization process, authorizing officials assume responsibility and are accountable for security risks associated with the operation and use of organizational information systems. Accordingly, authorizing officials are in positions with levels of authority commensurate with understanding and accepting such information security-related risks. OMB policy requires that organizations conduct ongoing authorizations of information systems by implementing continuous monitoring programs. Continuous monitoring programs can satisfy three-year reauthorization requirements, so separate reauthorization processes are not necessary. Through the employment of comprehensive continuous monitoring processes, critical information contained in authorization packages (i.e., security plans, security assessment reports, and plans of action and milestones) is updated on an ongoing basis, providing authorizing officials and information system owners with an up-to-date status of the security state of organizational information systems and environments of operation. To reduce the administrative cost of security reauthorization, authorizing officials use the results of continuous monitoring processes to the maximum extent possible as the basis for rendering reauthorization decisions.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#pm-10","rel":"related"}]},{"id":"ca-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-6.a_obj","name":"objective","props":[{"name":"label","value":"CA-6(a)"}],"prose":"assigns a senior-level executive or manager as the authorizing official for the information system;"},{"id":"ca-6.b_obj","name":"objective","props":[{"name":"label","value":"CA-6(b)"}],"prose":"ensures that the authorizing official authorizes the information system for processing before commencing operations;"},{"id":"ca-6.c_obj","name":"objective","props":[{"name":"label","value":"CA-6(c)"}],"parts":[{"id":"ca-6.c_obj.1","name":"objective","props":[{"name":"label","value":"CA-6(c)[1]"}],"prose":"defines the frequency to update the security authorization; and"},{"id":"ca-6.c_obj.2","name":"objective","props":[{"name":"label","value":"CA-6(c)[2]"}],"prose":"updates the security authorization with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing security authorization\n\nsecurity authorization package (including security plan\n\nsecurity assessment report\n\nplan of action and milestones\n\nauthorization statement)\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security authorization responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms that facilitate security authorizations and updates"}]}]},{"id":"ca-7","class":"SP800-53","title":"Continuous Monitoring","params":[{"id":"ca-7_prm_1","label":"organization-defined metrics"},{"id":"ca-7_prm_2","label":"organization-defined frequencies"},{"id":"ca-7_prm_3","label":"organization-defined frequencies"},{"id":"ca-7_prm_4","label":"organization-defined personnel or roles"},{"id":"ca-7_prm_5","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-7"},{"name":"sort-id","value":"ca-07"}],"links":[{"href":"#bedb15b7-ec5c-4a68-807f-385125751fcd","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"},{"href":"#8ade2fbe-e468-4ca8-9a40-54d7f23c32bb","rel":"reference"},{"href":"#2d8b14e9-c8b5-4d3d-8bdc-155078f3281b","rel":"reference"}],"parts":[{"id":"ca-7_smt","name":"statement","prose":"The organization develops a continuous monitoring strategy and implements a continuous monitoring program that includes:","parts":[{"id":"ca-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishment of {{ insert: param, ca-7_prm_1 }} to be monitored;"},{"id":"ca-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishment of {{ insert: param, ca-7_prm_2 }} for monitoring and {{ insert: param, ca-7_prm_3 }} for assessments supporting such monitoring;"},{"id":"ca-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ongoing security control assessments in accordance with the organizational continuous monitoring strategy;"},{"id":"ca-7_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;"},{"id":"ca-7_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Correlation and analysis of security-related information generated by assessments and monitoring;"},{"id":"ca-7_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Response actions to address results of the analysis of security-related information; and"},{"id":"ca-7_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Reporting the security status of organization and the information system to {{ insert: param, ca-7_prm_4 }} {{ insert: param, ca-7_prm_5 }}."}]},{"id":"ca-7_gdn","name":"guidance","prose":"Continuous monitoring programs facilitate ongoing awareness of threats, vulnerabilities, and information security to support organizational risk management decisions. The terms continuous and ongoing imply that organizations assess\/analyze security controls and information security-related risks at a frequency sufficient to support organizational risk-based decisions. The results of continuous monitoring programs generate appropriate risk response actions by organizations. Continuous monitoring programs also allow organizations to maintain the security authorizations of information systems and common controls over time in highly dynamic environments of operation with changing mission\/business needs, threats, vulnerabilities, and technologies. Having access to security-related information on a continuing basis through reports\/dashboards gives organizational officials the capability to make more effective and timely risk management decisions, including ongoing security authorization decisions. Automation supports more frequent updates to security authorization packages, hardware\/software\/firmware inventories, and other system information. Effectiveness is further enhanced when continuous monitoring outputs are formatted to provide information that is specific, measurable, actionable, relevant, and timely. Continuous monitoring activities are scaled in accordance with the security categories of information systems.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-5","rel":"related"},{"href":"#ca-6","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#pm-6","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-2","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-7.a_obj","name":"objective","props":[{"name":"label","value":"CA-7(a)"}],"parts":[{"id":"ca-7.a_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(a)[1]"}],"prose":"develops a continuous monitoring strategy that defines metrics to be monitored;"},{"id":"ca-7.a_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(a)[2]"}],"prose":"develops a continuous monitoring strategy that includes monitoring of organization-defined metrics;"},{"id":"ca-7.a_obj.3","name":"objective","props":[{"name":"label","value":"CA-7(a)[3]"}],"prose":"implements a continuous monitoring program that includes monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.b_obj","name":"objective","props":[{"name":"label","value":"CA-7(b)"}],"parts":[{"id":"ca-7.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(b)[1]"}],"prose":"develops a continuous monitoring strategy that defines frequencies for monitoring;"},{"id":"ca-7.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(b)[2]"}],"prose":"defines frequencies for assessments supporting monitoring;"},{"id":"ca-7.b_obj.3","name":"objective","props":[{"name":"label","value":"CA-7(b)[3]"}],"prose":"develops a continuous monitoring strategy that includes establishment of the organization-defined frequencies for monitoring and for assessments supporting monitoring;"},{"id":"ca-7.b_obj.4","name":"objective","props":[{"name":"label","value":"CA-7(b)[4]"}],"prose":"implements a continuous monitoring program that includes establishment of organization-defined frequencies for monitoring and for assessments supporting such monitoring in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.c_obj","name":"objective","props":[{"name":"label","value":"CA-7(c)"}],"parts":[{"id":"ca-7.c_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(c)[1]"}],"prose":"develops a continuous monitoring strategy that includes ongoing security control assessments;"},{"id":"ca-7.c_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(c)[2]"}],"prose":"implements a continuous monitoring program that includes ongoing security control assessments in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.d_obj","name":"objective","props":[{"name":"label","value":"CA-7(d)"}],"parts":[{"id":"ca-7.d_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(d)[1]"}],"prose":"develops a continuous monitoring strategy that includes ongoing security status monitoring of organization-defined metrics;"},{"id":"ca-7.d_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(d)[2]"}],"prose":"implements a continuous monitoring program that includes ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.e_obj","name":"objective","props":[{"name":"label","value":"CA-7(e)"}],"parts":[{"id":"ca-7.e_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(e)[1]"}],"prose":"develops a continuous monitoring strategy that includes correlation and analysis of security-related information generated by assessments and monitoring;"},{"id":"ca-7.e_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(e)[2]"}],"prose":"implements a continuous monitoring program that includes correlation and analysis of security-related information generated by assessments and monitoring in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.f_obj","name":"objective","props":[{"name":"label","value":"CA-7(f)"}],"parts":[{"id":"ca-7.f_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(f)[1]"}],"prose":"develops a continuous monitoring strategy that includes response actions to address results of the analysis of security-related information;"},{"id":"ca-7.f_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(f)[2]"}],"prose":"implements a continuous monitoring program that includes response actions to address results of the analysis of security-related information in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.g_obj","name":"objective","props":[{"name":"label","value":"CA-7(g)"}],"parts":[{"id":"ca-7.g_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(g)[1]"}],"prose":"develops a continuous monitoring strategy that defines the personnel or roles to whom the security status of the organization and information system are to be reported;"},{"id":"ca-7.g_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(g)[2]"}],"prose":"develops a continuous monitoring strategy that defines the frequency to report the security status of the organization and information system to organization-defined personnel or roles;"},{"id":"ca-7.g_obj.3","name":"objective","props":[{"name":"label","value":"CA-7(g)[3]"}],"prose":"develops a continuous monitoring strategy that includes reporting the security status of the organization or information system to organizational-defined personnel or roles with the organization-defined frequency; and"},{"id":"ca-7.g_obj.4","name":"objective","props":[{"name":"label","value":"CA-7(g)[4]"}],"prose":"implements a continuous monitoring program that includes reporting the security status of the organization and information system to organization-defined personnel or roles with the organization-defined frequency in accordance with the organizational continuous monitoring strategy."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing continuous monitoring of information system security controls\n\nprocedures addressing configuration management\n\nsecurity plan\n\nsecurity assessment report\n\nplan of action and milestones\n\ninformation system monitoring records\n\nconfiguration management records, security impact analyses\n\nstatus reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with continuous monitoring responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Mechanisms implementing continuous monitoring"}]}]},{"id":"ca-9","class":"SP800-53","title":"Internal System Connections","params":[{"id":"ca-9_prm_1","label":"organization-defined information system components or classes of components"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-9"},{"name":"sort-id","value":"ca-09"}],"parts":[{"id":"ca-9_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Authorizes internal connections of {{ insert: param, ca-9_prm_1 }} to the information system; and"},{"id":"ca-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents, for each internal connection, the interface characteristics, security requirements, and the nature of the information communicated."}]},{"id":"ca-9_gdn","name":"guidance","prose":"This control applies to connections between organizational information systems and (separate) constituent system components (i.e., intra-system connections) including, for example, system connections with mobile devices, notebook\/desktop computers, printers, copiers, facsimile machines, scanners, sensors, and servers. Instead of authorizing each individual internal connection, organizations can authorize internal connections for a class of components with common characteristics and\/or configurations, for example, all digital printers, scanners, and copiers with a specified processing, storage, and transmission capability or all smart phones with a specific baseline configuration.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-9_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-9.a_obj","name":"objective","props":[{"name":"label","value":"CA-9(a)"}],"parts":[{"id":"ca-9.a_obj.1","name":"objective","props":[{"name":"label","value":"CA-9(a)[1]"}],"prose":"defines information system components or classes of components to be authorized as internal connections to the information system;"},{"id":"ca-9.a_obj.2","name":"objective","props":[{"name":"label","value":"CA-9(a)[2]"}],"prose":"authorizes internal connections of organization-defined information system components or classes of components to the information system;"}]},{"id":"ca-9.b_obj","name":"objective","props":[{"name":"label","value":"CA-9(b)"}],"prose":"documents, for each internal connection:","parts":[{"id":"ca-9.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-9(b)[1]"}],"prose":"the interface characteristics;"},{"id":"ca-9.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-9(b)[2]"}],"prose":"the security requirements; and"},{"id":"ca-9.b_obj.3","name":"objective","props":[{"name":"label","value":"CA-9(b)[3]"}],"prose":"the nature of the information communicated."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing information system connections\n\nsystem and communications protection policy\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of components or classes of components authorized as internal system connections\n\nsecurity assessment report\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for developing, implementing, or authorizing internal system connections\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"cm","class":"family","title":"Configuration Management","controls":[{"id":"cm-1","class":"SP800-53","title":"Configuration Management Policy and Procedures","params":[{"id":"cm-1_prm_1","label":"organization-defined personnel or roles"},{"id":"cm-1_prm_2","label":"organization-defined frequency"},{"id":"cm-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-1"},{"name":"sort-id","value":"cm-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"cm-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, cm-1_prm_1 }}:","parts":[{"id":"cm-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"cm-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the configuration management policy and associated configuration management controls; and"}]},{"id":"cm-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"cm-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Configuration management policy {{ insert: param, cm-1_prm_2 }}; and"},{"id":"cm-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Configuration management procedures {{ insert: param, cm-1_prm_3 }}."}]}]},{"id":"cm-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the CM family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"cm-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-1.a_obj","name":"objective","props":[{"name":"label","value":"CM-1(a)"}],"parts":[{"id":"cm-1.a.1_obj","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)"}],"parts":[{"id":"cm-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1]"}],"prose":"develops and documents a configuration management policy that addresses:","parts":[{"id":"cm-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"cm-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"cm-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"cm-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"cm-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"cm-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"cm-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"cm-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the configuration management policy is to be disseminated;"},{"id":"cm-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[3]"}],"prose":"disseminates the configuration management policy to organization-defined personnel or roles;"}]},{"id":"cm-1.a.2_obj","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)"}],"parts":[{"id":"cm-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the configuration management policy and associated configuration management controls;"},{"id":"cm-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"cm-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"cm-1.b_obj","name":"objective","props":[{"name":"label","value":"CM-1(b)"}],"parts":[{"id":"cm-1.b.1_obj","name":"objective","props":[{"name":"label","value":"CM-1(b)(1)"}],"parts":[{"id":"cm-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current configuration management policy;"},{"id":"cm-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(b)(1)[2]"}],"prose":"reviews and updates the current configuration management policy with the organization-defined frequency;"}]},{"id":"cm-1.b.2_obj","name":"objective","props":[{"name":"label","value":"CM-1(b)(2)"}],"parts":[{"id":"cm-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current configuration management procedures; and"},{"id":"cm-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(b)(2)[2]"}],"prose":"reviews and updates the current configuration management procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]}]},{"id":"cm-2","class":"SP800-53","title":"Baseline Configuration","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-2"},{"name":"sort-id","value":"cm-02"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-2_smt","name":"statement","prose":"The organization develops, documents, and maintains under configuration control, a current baseline configuration of the information system."},{"id":"cm-2_gdn","name":"guidance","prose":"This control establishes baseline configurations for information systems and system components including communications and connectivity-related aspects of systems. Baseline configurations are documented, formally reviewed and agreed-upon sets of specifications for information systems or configuration items within those systems. Baseline configurations serve as a basis for future builds, releases, and\/or changes to information systems. Baseline configurations include information about information system components (e.g., standard software packages installed on workstations, notebook computers, servers, network components, or mobile devices; current version numbers and patch information on operating systems and applications; and configuration settings\/parameters), network topology, and the logical placement of those components within the system architecture. Maintaining baseline configurations requires creating new baselines as organizational information systems change over time. Baseline configurations of information systems reflect the current enterprise architecture.","links":[{"href":"#cm-3","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#pm-5","rel":"related"},{"href":"#pm-7","rel":"related"}]},{"id":"cm-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-2_obj.1","name":"objective","props":[{"name":"label","value":"CM-2[1]"}],"prose":"develops and documents a current baseline configuration of the information system; and"},{"id":"cm-2_obj.2","name":"objective","props":[{"name":"label","value":"CM-2[2]"}],"prose":"maintains, under configuration control, a current baseline configuration of the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing the baseline configuration of the information system\n\nconfiguration management plan\n\nenterprise architecture documentation\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nchange control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing baseline configurations\n\nautomated mechanisms supporting configuration control of the baseline configuration"}]}]},{"id":"cm-4","class":"SP800-53","title":"Security Impact Analysis","props":[{"name":"priority","value":"P2"},{"name":"label","value":"CM-4"},{"name":"sort-id","value":"cm-04"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-4_smt","name":"statement","prose":"The organization analyzes changes to the information system to determine potential security impacts prior to change implementation."},{"id":"cm-4_gdn","name":"guidance","prose":"Organizational personnel with information security responsibilities (e.g., Information System Administrators, Information System Security Officers, Information System Security Managers, and Information System Security Engineers) conduct security impact analyses. Individuals conducting security impact analyses possess the necessary skills\/technical expertise to analyze the changes to information systems and the associated security ramifications. Security impact analysis may include, for example, reviewing security plans to understand security control requirements and reviewing system design documentation to understand control implementation and how specific changes might affect the controls. Security impact analyses may also include assessments of risk to better understand the impact of the changes and to determine if additional security controls are required. Security impact analyses are scaled in accordance with the security categories of the information systems.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"cm-4_obj","name":"objective","prose":"Determine if the organization analyzes changes to the information system to determine potential security impacts prior to change implementation."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing security impact analysis for changes to the information system\n\nconfiguration management plan\n\nsecurity impact analysis documentation\n\nanalysis tools and associated outputs\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for conducting security impact analysis\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security impact analysis"}]}]},{"id":"cm-6","class":"SP800-53","title":"Configuration Settings","params":[{"id":"cm-6_prm_1","label":"organization-defined security configuration checklists"},{"id":"cm-6_prm_2","label":"organization-defined information system components"},{"id":"cm-6_prm_3","label":"organization-defined operational requirements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-6"},{"name":"sort-id","value":"cm-06"}],"links":[{"href":"#990268bf-f4a9-4c81-91ae-dc7d3115f4b1","rel":"reference"},{"href":"#0b3d8ba9-051f-498d-81ea-97f0f018c612","rel":"reference"},{"href":"#0916ef02-3618-411b-a525-565c088849a6","rel":"reference"},{"href":"#84a37532-6db6-477b-9ea8-f9085ebca0fc","rel":"reference"},{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"},{"href":"#275cc052-0f7f-423c-bdb6-ed503dc36228","rel":"reference"},{"href":"#e95dd121-2733-413e-bf1e-f1eb49f20a98","rel":"reference"},{"href":"#647b6de3-81d0-4d22-bec1-5f1333e34380","rel":"reference"}],"parts":[{"id":"cm-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes and documents configuration settings for information technology products employed within the information system using {{ insert: param, cm-6_prm_1 }} that reflect the most restrictive mode consistent with operational requirements;"},{"id":"cm-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Implements the configuration settings;"},{"id":"cm-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Identifies, documents, and approves any deviations from established configuration settings for {{ insert: param, cm-6_prm_2 }} based on {{ insert: param, cm-6_prm_3 }}; and"},{"id":"cm-6_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Monitors and controls changes to the configuration settings in accordance with organizational policies and procedures."}]},{"id":"cm-6_gdn","name":"guidance","prose":"Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the information system that affect the security posture and\/or functionality of the system. Information technology products for which security-related configuration settings can be defined include, for example, mainframe computers, servers (e.g., database, electronic mail, authentication, web, proxy, file, domain name), workstations, input\/output devices (e.g., scanners, copiers, and printers), network components (e.g., firewalls, routers, gateways, voice and data switches, wireless access points, network appliances, sensors), operating systems, middleware, and applications. Security-related parameters are those parameters impacting the security state of information systems including the parameters required to satisfy other security control requirements. Security-related parameters include, for example: (i) registry settings; (ii) account, file, directory permission settings; and (iii) settings for functions, ports, protocols, services, and remote connections. Organizations establish organization-wide configuration settings and subsequently derive specific settings for information systems. The established settings become part of the systems configuration baseline. Common secure configurations (also referred to as security configuration checklists, lockdown and hardening guides, security reference guides, security technical implementation guides) provide recognized, standardized, and established benchmarks that stipulate secure configuration settings for specific information technology platforms\/products and instructions for configuring those information system components to meet operational requirements. Common secure configurations can be developed by a variety of organizations including, for example, information technology product developers, manufacturers, vendors, consortia, academia, industry, federal agencies, and other organizations in the public and private sectors. Common secure configurations include the United States Government Configuration Baseline (USGCB) which affects the implementation of CM-6 and other controls such as AC-19 and CM-7. The Security Content Automation Protocol (SCAP) and the defined standards within the protocol (e.g., Common Configuration Enumeration) provide an effective method to uniquely identify, track, and control configuration settings. OMB establishes federal policy on configuration requirements for federal information systems.","links":[{"href":"#ac-19","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"cm-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-6.a_obj","name":"objective","props":[{"name":"label","value":"CM-6(a)"}],"parts":[{"id":"cm-6.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(a)[1]"}],"prose":"defines security configuration checklists to be used to establish and document configuration settings for the information technology products employed;"},{"id":"cm-6.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(a)[2]"}],"prose":"ensures the defined security configuration checklists reflect the most restrictive mode consistent with operational requirements;"},{"id":"cm-6.a_obj.3","name":"objective","props":[{"name":"label","value":"CM-6(a)[3]"}],"prose":"establishes and documents configuration settings for information technology products employed within the information system using organization-defined security configuration checklists;"}]},{"id":"cm-6.b_obj","name":"objective","props":[{"name":"label","value":"CM-6(b)"}],"prose":"implements the configuration settings established\/documented in CM-6(a);;"},{"id":"cm-6.c_obj","name":"objective","props":[{"name":"label","value":"CM-6(c)"}],"parts":[{"id":"cm-6.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(c)[1]"}],"prose":"defines information system components for which any deviations from established configuration settings must be:","parts":[{"id":"cm-6.c_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-6(c)[1][a]"}],"prose":"identified;"},{"id":"cm-6.c_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-6(c)[1][b]"}],"prose":"documented;"},{"id":"cm-6.c_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-6(c)[1][c]"}],"prose":"approved;"}]},{"id":"cm-6.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(c)[2]"}],"prose":"defines operational requirements to support:","parts":[{"id":"cm-6.c_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-6(c)[2][a]"}],"prose":"the identification of any deviations from established configuration settings;"},{"id":"cm-6.c_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-6(c)[2][b]"}],"prose":"the documentation of any deviations from established configuration settings;"},{"id":"cm-6.c_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-6(c)[2][c]"}],"prose":"the approval of any deviations from established configuration settings;"}]},{"id":"cm-6.c_obj.3","name":"objective","props":[{"name":"label","value":"CM-6(c)[3]"}],"prose":"identifies any deviations from established configuration settings for organization-defined information system components based on organizational-defined operational requirements;"},{"id":"cm-6.c_obj.4","name":"objective","props":[{"name":"label","value":"CM-6(c)[4]"}],"prose":"documents any deviations from established configuration settings for organization-defined information system components based on organizational-defined operational requirements;"},{"id":"cm-6.c_obj.5","name":"objective","props":[{"name":"label","value":"CM-6(c)[5]"}],"prose":"approves any deviations from established configuration settings for organization-defined information system components based on organizational-defined operational requirements;"}]},{"id":"cm-6.d_obj","name":"objective","props":[{"name":"label","value":"CM-6(d)"}],"parts":[{"id":"cm-6.d_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(d)[1]"}],"prose":"monitors changes to the configuration settings in accordance with organizational policies and procedures; and"},{"id":"cm-6.d_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(d)[2]"}],"prose":"controls changes to the configuration settings in accordance with organizational policies and procedures."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing configuration settings for the information system\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity configuration checklists\n\nevidence supporting approved deviations from established configuration settings\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing configuration settings\n\nautomated mechanisms that implement, monitor, and\/or control information system configuration settings\n\nautomated mechanisms that identify and\/or document deviations from established configuration settings"}]}]},{"id":"cm-7","class":"SP800-53","title":"Least Functionality","params":[{"id":"cm-7_prm_1","label":"organization-defined prohibited or restricted functions, ports, protocols, and\/or services"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-7"},{"name":"sort-id","value":"cm-07"}],"links":[{"href":"#e42b2099-3e1c-415b-952c-61c96533c12e","rel":"reference"}],"parts":[{"id":"cm-7_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Configures the information system to provide only essential capabilities; and"},{"id":"cm-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Prohibits or restricts the use of the following functions, ports, protocols, and\/or services: {{ insert: param, cm-7_prm_1 }}."}]},{"id":"cm-7_gdn","name":"guidance","prose":"Information systems can provide a wide variety of functions and services. Some of the functions and services, provided by default, may not be necessary to support essential organizational operations (e.g., key missions, functions). Additionally, it is sometimes convenient to provide multiple services from single information system components, but doing so increases risk over limiting the services provided by any one component. Where feasible, organizations limit component functionality to a single function per device (e.g., email servers or web servers, but not both). Organizations review functions and services provided by information systems or individual components of information systems, to determine which functions and services are candidates for elimination (e.g., Voice Over Internet Protocol, Instant Messaging, auto-execute, and file sharing). Organizations consider disabling unused or unnecessary physical and logical ports\/protocols (e.g., Universal Serial Bus, File Transfer Protocol, and Hyper Text Transfer Protocol) on information systems to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling. Organizations can utilize network scanning tools, intrusion detection and prevention systems, and end-point protections such as firewalls and host-based intrusion detection systems to identify and prevent the use of prohibited functions, ports, protocols, and services.","links":[{"href":"#ac-6","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"cm-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-7.a_obj","name":"objective","props":[{"name":"label","value":"CM-7(a)"}],"prose":"configures the information system to provide only essential capabilities;"},{"id":"cm-7.b_obj","name":"objective","props":[{"name":"label","value":"CM-7(b)"}],"parts":[{"id":"cm-7.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(b)[1]"}],"prose":"defines prohibited or restricted:","parts":[{"id":"cm-7.b_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][a]"}],"prose":"functions;"},{"id":"cm-7.b_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][b]"}],"prose":"ports;"},{"id":"cm-7.b_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.b_obj.1.d","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][d]"}],"prose":"services;"}]},{"id":"cm-7.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(b)[2]"}],"prose":"prohibits or restricts the use of organization-defined:","parts":[{"id":"cm-7.b_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][a]"}],"prose":"functions;"},{"id":"cm-7.b_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][b]"}],"prose":"ports;"},{"id":"cm-7.b_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.b_obj.2.d","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][d]"}],"prose":"services."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nconfiguration management plan\n\nprocedures addressing least functionality in the information system\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity configuration checklists\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes prohibiting or restricting functions, ports, protocols, and\/or services\n\nautomated mechanisms implementing restrictions or prohibition of functions, ports, protocols, and\/or services"}]}]},{"id":"cm-8","class":"SP800-53","title":"Information System Component Inventory","params":[{"id":"cm-8_prm_1","label":"organization-defined information deemed necessary to achieve effective information system component accountability"},{"id":"cm-8_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-8"},{"name":"sort-id","value":"cm-08"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops and documents an inventory of information system components that:","parts":[{"id":"cm-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Accurately reflects the current information system;"},{"id":"cm-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Includes all components within the authorization boundary of the information system;"},{"id":"cm-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Is at the level of granularity deemed necessary for tracking and reporting; and"},{"id":"cm-8_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Includes {{ insert: param, cm-8_prm_1 }}; and"}]},{"id":"cm-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the information system component inventory {{ insert: param, cm-8_prm_2 }}."}]},{"id":"cm-8_gdn","name":"guidance","prose":"Organizations may choose to implement centralized information system component inventories that include components from all organizational information systems. In such situations, organizations ensure that the resulting inventories include system-specific information required for proper component accountability (e.g., information system association, information system owner). Information deemed necessary for effective accountability of information system components includes, for example, hardware inventory specifications, software license information, software version numbers, component owners, and for networked components or devices, machine names and network addresses. Inventory specifications include, for example, manufacturer, device type, model, serial number, and physical location.","links":[{"href":"#cm-2","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#pm-5","rel":"related"}]},{"id":"cm-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-8.a_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)"}],"parts":[{"id":"cm-8.a.1_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(1)"}],"prose":"develops and documents an inventory of information system components that accurately reflects the current information system;"},{"id":"cm-8.a.2_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(2)"}],"prose":"develops and documents an inventory of information system components that includes all components within the authorization boundary of the information system;"},{"id":"cm-8.a.3_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(3)"}],"prose":"develops and documents an inventory of information system components that is at the level of granularity deemed necessary for tracking and reporting;"},{"id":"cm-8.a.4_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(4)"}],"parts":[{"id":"cm-8.a.4_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(a)(4)[1]"}],"prose":"defines the information deemed necessary to achieve effective information system component accountability;"},{"id":"cm-8.a.4_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(a)(4)[2]"}],"prose":"develops and documents an inventory of information system components that includes organization-defined information deemed necessary to achieve effective information system component accountability;"}]}]},{"id":"cm-8.b_obj","name":"objective","props":[{"name":"label","value":"CM-8(b)"}],"parts":[{"id":"cm-8.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(b)[1]"}],"prose":"defines the frequency to review and update the information system component inventory; and"},{"id":"cm-8.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(b)[2]"}],"prose":"reviews and updates the information system component inventory with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system component inventory\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system inventory records\n\ninventory reviews and update records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for information system component inventory\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for developing and documenting an inventory of information system components\n\nautomated mechanisms supporting and\/or implementing the information system component inventory"}]}]},{"id":"cm-10","class":"SP800-53","title":"Software Usage Restrictions","props":[{"name":"priority","value":"P2"},{"name":"label","value":"CM-10"},{"name":"sort-id","value":"cm-10"}],"parts":[{"id":"cm-10_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-10_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Uses software and associated documentation in accordance with contract agreements and copyright laws;"},{"id":"cm-10_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Tracks the use of software and associated documentation protected by quantity licenses to control copying and distribution; and"},{"id":"cm-10_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Controls and documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work."}]},{"id":"cm-10_gdn","name":"guidance","prose":"Software license tracking can be accomplished by manual methods (e.g., simple spreadsheets) or automated methods (e.g., specialized tracking applications) depending on organizational needs.","links":[{"href":"#ac-17","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"cm-10_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-10.a_obj","name":"objective","props":[{"name":"label","value":"CM-10(a)"}],"prose":"uses software and associated documentation in accordance with contract agreements and copyright laws;"},{"id":"cm-10.b_obj","name":"objective","props":[{"name":"label","value":"CM-10(b)"}],"prose":"tracks the use of software and associated documentation protected by quantity licenses to control copying and distribution; and"},{"id":"cm-10.c_obj","name":"objective","props":[{"name":"label","value":"CM-10(c)"}],"prose":"controls and documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing software usage restrictions\n\nconfiguration management plan\n\nsecurity plan\n\nsoftware contract agreements and copyright laws\n\nsite license documentation\n\nlist of software usage restrictions\n\nsoftware license tracking reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\norganizational personnel operating, using, and\/or maintaining the information system\n\norganizational personnel with software license management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for tracking the use of software protected by quantity licenses\n\norganization process for controlling\/documenting the use of peer-to-peer file sharing technology\n\nautomated mechanisms implementing software license tracking\n\nautomated mechanisms implementing and controlling the use of peer-to-peer files sharing technology"}]}]},{"id":"cm-11","class":"SP800-53","title":"User-installed Software","params":[{"id":"cm-11_prm_1","label":"organization-defined policies"},{"id":"cm-11_prm_2","label":"organization-defined methods"},{"id":"cm-11_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-11"},{"name":"sort-id","value":"cm-11"}],"parts":[{"id":"cm-11_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-11_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes {{ insert: param, cm-11_prm_1 }} governing the installation of software by users;"},{"id":"cm-11_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Enforces software installation policies through {{ insert: param, cm-11_prm_2 }}; and"},{"id":"cm-11_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Monitors policy compliance at {{ insert: param, cm-11_prm_3 }}."}]},{"id":"cm-11_gdn","name":"guidance","prose":"If provided the necessary privileges, users have the ability to install software in organizational information systems. To maintain control over the types of software installed, organizations identify permitted and prohibited actions regarding software installation. Permitted software installations may include, for example, updates and security patches to existing software and downloading applications from organization-approved “app stores” Prohibited software installations may include, for example, software with unknown or suspect pedigrees or software that organizations consider potentially malicious. The policies organizations select governing user-installed software may be organization-developed or provided by some external entity. Policy enforcement methods include procedural methods (e.g., periodic examination of user accounts), automated methods (e.g., configuration settings implemented on organizational information systems), or both.","links":[{"href":"#ac-3","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#pl-4","rel":"related"}]},{"id":"cm-11_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-11.a_obj","name":"objective","props":[{"name":"label","value":"CM-11(a)"}],"parts":[{"id":"cm-11.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-11(a)[1]"}],"prose":"defines policies to govern the installation of software by users;"},{"id":"cm-11.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-11(a)[2]"}],"prose":"establishes organization-defined policies governing the installation of software by users;"}]},{"id":"cm-11.b_obj","name":"objective","props":[{"name":"label","value":"CM-11(b)"}],"parts":[{"id":"cm-11.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-11(b)[1]"}],"prose":"defines methods to enforce software installation policies;"},{"id":"cm-11.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-11(b)[2]"}],"prose":"enforces software installation policies through organization-defined methods;"}]},{"id":"cm-11.c_obj","name":"objective","props":[{"name":"label","value":"CM-11(c)"}],"parts":[{"id":"cm-11.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-11(c)[1]"}],"prose":"defines frequency to monitor policy compliance; and"},{"id":"cm-11.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-11(c)[2]"}],"prose":"monitors policy compliance at organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing user installed software\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of rules governing user installed software\n\ninformation system monitoring records\n\ninformation system audit records\n\nother relevant documents or records\n\ncontinuous monitoring strategy"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for governing user-installed software\n\norganizational personnel operating, using, and\/or maintaining the information system\n\norganizational personnel monitoring compliance with user-installed software policy\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes governing user-installed software on the information system\n\nautomated mechanisms enforcing rules\/methods for governing the installation of software by users\n\nautomated mechanisms monitoring policy compliance"}]}]}]},{"id":"cp","class":"family","title":"Contingency Planning","controls":[{"id":"cp-1","class":"SP800-53","title":"Contingency Planning Policy and Procedures","params":[{"id":"cp-1_prm_1","label":"organization-defined personnel or roles"},{"id":"cp-1_prm_2","label":"organization-defined frequency"},{"id":"cp-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-1"},{"name":"sort-id","value":"cp-01"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"cp-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, cp-1_prm_1 }}:","parts":[{"id":"cp-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A contingency planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"cp-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls; and"}]},{"id":"cp-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"cp-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Contingency planning policy {{ insert: param, cp-1_prm_2 }}; and"},{"id":"cp-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Contingency planning procedures {{ insert: param, cp-1_prm_3 }}."}]}]},{"id":"cp-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the CP family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"cp-1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"cp-1.a_obj","name":"objective","props":[{"name":"label","value":"CP-1(a)"}],"parts":[{"id":"cp-1.a.1_obj","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)"}],"parts":[{"id":"cp-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1]"}],"prose":"the organization develops and documents a contingency planning policy that addresses:","parts":[{"id":"cp-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"cp-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"cp-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"cp-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"cp-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"cp-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"cp-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"cp-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[2]"}],"prose":"the organization defines personnel or roles to whom the contingency planning policy is to be disseminated;"},{"id":"cp-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[3]"}],"prose":"the organization disseminates the contingency planning policy to organization-defined personnel or roles;"}]},{"id":"cp-1.a.2_obj","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)"}],"parts":[{"id":"cp-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)[1]"}],"prose":"the organization develops and documents procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls;"},{"id":"cp-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)[2]"}],"prose":"the organization defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"cp-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)[3]"}],"prose":"the organization disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"cp-1.b_obj","name":"objective","props":[{"name":"label","value":"CP-1(b)"}],"parts":[{"id":"cp-1.b.1_obj","name":"objective","props":[{"name":"label","value":"CP-1(b)(1)"}],"parts":[{"id":"cp-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(b)(1)[1]"}],"prose":"the organization defines the frequency to review and update the current contingency planning policy;"},{"id":"cp-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(b)(1)[2]"}],"prose":"the organization reviews and updates the current contingency planning with the organization-defined frequency;"}]},{"id":"cp-1.b.2_obj","name":"objective","props":[{"name":"label","value":"CP-1(b)(2)"}],"parts":[{"id":"cp-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(b)(2)[1]"}],"prose":"the organization defines the frequency to review and update the current contingency planning procedures; and"},{"id":"cp-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(b)(2)[2]"}],"prose":"the organization reviews and updates the current contingency planning procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-2","class":"SP800-53","title":"Contingency Plan","params":[{"id":"cp-2_prm_1","label":"organization-defined personnel or roles"},{"id":"cp-2_prm_2","label":"organization-defined key contingency personnel (identified by name and\/or by role) and organizational elements"},{"id":"cp-2_prm_3","label":"organization-defined frequency"},{"id":"cp-2_prm_4","label":"organization-defined key contingency personnel (identified by name and\/or by role) and organizational elements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-2"},{"name":"sort-id","value":"cp-02"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a contingency plan for the information system that:","parts":[{"id":"cp-2_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Identifies essential missions and business functions and associated contingency requirements;"},{"id":"cp-2_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Provides recovery objectives, restoration priorities, and metrics;"},{"id":"cp-2_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Addresses contingency roles, responsibilities, assigned individuals with contact information;"},{"id":"cp-2_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Addresses maintaining essential missions and business functions despite an information system disruption, compromise, or failure;"},{"id":"cp-2_smt.a.5","name":"item","props":[{"name":"label","value":"5."}],"prose":"Addresses eventual, full information system restoration without deterioration of the security safeguards originally planned and implemented; and"},{"id":"cp-2_smt.a.6","name":"item","props":[{"name":"label","value":"6."}],"prose":"Is reviewed and approved by {{ insert: param, cp-2_prm_1 }};"}]},{"id":"cp-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Distributes copies of the contingency plan to {{ insert: param, cp-2_prm_2 }};"},{"id":"cp-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Coordinates contingency planning activities with incident handling activities;"},{"id":"cp-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Reviews the contingency plan for the information system {{ insert: param, cp-2_prm_3 }};"},{"id":"cp-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Updates the contingency plan to address changes to the organization, information system, or environment of operation and problems encountered during contingency plan implementation, execution, or testing;"},{"id":"cp-2_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Communicates contingency plan changes to {{ insert: param, cp-2_prm_4 }}; and"},{"id":"cp-2_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Protects the contingency plan from unauthorized disclosure and modification."}]},{"id":"cp-2_gdn","name":"guidance","prose":"Contingency planning for information systems is part of an overall organizational program for achieving continuity of operations for mission\/business functions. Contingency planning addresses both information system restoration and implementation of alternative mission\/business processes when systems are compromised. The effectiveness of contingency planning is maximized by considering such planning throughout the phases of the system development life cycle. Performing contingency planning on hardware, software, and firmware development can be an effective means of achieving information system resiliency. Contingency plans reflect the degree of restoration required for organizational information systems since not all systems may need to fully recover to achieve the level of continuity of operations desired. Information system recovery objectives reflect applicable laws, Executive Orders, directives, policies, standards, regulations, and guidelines. In addition to information system availability, contingency plans also address other security-related events resulting in a reduction in mission and\/or business effectiveness, such as malicious attacks compromising the confidentiality or integrity of information systems. Actions addressed in contingency plans include, for example, orderly\/graceful degradation, information system shutdown, fallback to a manual mode, alternate information flows, and operating in modes reserved for when systems are under attack. By closely coordinating contingency planning with incident handling activities, organizations can ensure that the necessary contingency planning activities are in place and activated in the event of a security incident.","links":[{"href":"#ac-14","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#cp-7","rel":"related"},{"href":"#cp-8","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#cp-10","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#pm-8","rel":"related"},{"href":"#pm-11","rel":"related"}]},{"id":"cp-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-2.a_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)"}],"prose":"develops and documents a contingency plan for the information system that:","parts":[{"id":"cp-2.a.1_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(1)"}],"prose":"identifies essential missions and business functions and associated contingency requirements;"},{"id":"cp-2.a.2_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)"}],"parts":[{"id":"cp-2.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)[1]"}],"prose":"provides recovery objectives;"},{"id":"cp-2.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)[2]"}],"prose":"provides restoration priorities;"},{"id":"cp-2.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)[3]"}],"prose":"provides metrics;"}]},{"id":"cp-2.a.3_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)"}],"parts":[{"id":"cp-2.a.3_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)[1]"}],"prose":"addresses contingency roles;"},{"id":"cp-2.a.3_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)[2]"}],"prose":"addresses contingency responsibilities;"},{"id":"cp-2.a.3_obj.3","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)[3]"}],"prose":"addresses assigned individuals with contact information;"}]},{"id":"cp-2.a.4_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(4)"}],"prose":"addresses maintaining essential missions and business functions despite an information system disruption, compromise, or failure;"},{"id":"cp-2.a.5_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(5)"}],"prose":"addresses eventual, full information system restoration without deterioration of the security safeguards originally planned and implemented;"},{"id":"cp-2.a.6_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(6)"}],"parts":[{"id":"cp-2.a.6_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(a)(6)[1]"}],"prose":"defines personnel or roles to review and approve the contingency plan for the information system;"},{"id":"cp-2.a.6_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(a)(6)[2]"}],"prose":"is reviewed and approved by organization-defined personnel or roles;"}]}]},{"id":"cp-2.b_obj","name":"objective","props":[{"name":"label","value":"CP-2(b)"}],"parts":[{"id":"cp-2.b_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(b)[1]"}],"prose":"defines key contingency personnel (identified by name and\/or by role) and organizational elements to whom copies of the contingency plan are to be distributed;"},{"id":"cp-2.b_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(b)[2]"}],"prose":"distributes copies of the contingency plan to organization-defined key contingency personnel and organizational elements;"}]},{"id":"cp-2.c_obj","name":"objective","props":[{"name":"label","value":"CP-2(c)"}],"prose":"coordinates contingency planning activities with incident handling activities;"},{"id":"cp-2.d_obj","name":"objective","props":[{"name":"label","value":"CP-2(d)"}],"parts":[{"id":"cp-2.d_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(d)[1]"}],"prose":"defines a frequency to review the contingency plan for the information system;"},{"id":"cp-2.d_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(d)[2]"}],"prose":"reviews the contingency plan with the organization-defined frequency;"}]},{"id":"cp-2.e_obj","name":"objective","props":[{"name":"label","value":"CP-2(e)"}],"prose":"updates the contingency plan to address:","parts":[{"id":"cp-2.e_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(e)[1]"}],"prose":"changes to the organization, information system, or environment of operation;"},{"id":"cp-2.e_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(e)[2]"}],"prose":"problems encountered during plan implementation, execution, and testing;"}]},{"id":"cp-2.f_obj","name":"objective","props":[{"name":"label","value":"CP-2(f)"}],"parts":[{"id":"cp-2.f_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(f)[1]"}],"prose":"defines key contingency personnel (identified by name and\/or by role) and organizational elements to whom contingency plan changes are to be communicated;"},{"id":"cp-2.f_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(f)[2]"}],"prose":"communicates contingency plan changes to organization-defined key contingency personnel and organizational elements; and"}]},{"id":"cp-2.g_obj","name":"objective","props":[{"name":"label","value":"CP-2(g)"}],"prose":"protects the contingency plan from unauthorized disclosure and modification."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nsecurity plan\n\nevidence of contingency plan reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with incident handling responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency plan development, review, update, and protection\n\nautomated mechanisms for developing, reviewing, updating and\/or protecting the contingency plan"}]}]},{"id":"cp-3","class":"SP800-53","title":"Contingency Training","params":[{"id":"cp-3_prm_1","label":"organization-defined time period"},{"id":"cp-3_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CP-3"},{"name":"sort-id","value":"cp-03"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"cp-3_smt","name":"statement","prose":"The organization provides contingency training to information system users consistent with assigned roles and responsibilities:","parts":[{"id":"cp-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Within {{ insert: param, cp-3_prm_1 }} of assuming a contingency role or responsibility;"},{"id":"cp-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"cp-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, cp-3_prm_2 }} thereafter."}]},{"id":"cp-3_gdn","name":"guidance","prose":"Contingency training provided by organizations is linked to the assigned roles and responsibilities of organizational personnel to ensure that the appropriate content and level of detail is included in such training. For example, regular users may only need to know when and where to report for duty during contingency operations and if normal duties are affected; system administrators may require additional training on how to set up information systems at alternate processing and storage sites; and managers\/senior leaders may receive more specific training on how to conduct mission-essential functions in designated off-site locations and how to establish communications with other governmental entities for purposes of coordination on contingency-related activities. Training for contingency roles\/responsibilities reflects the specific continuity requirements in the contingency plan.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#ir-2","rel":"related"}]},{"id":"cp-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-3.a_obj","name":"objective","props":[{"name":"label","value":"CP-3(a)"}],"parts":[{"id":"cp-3.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-3(a)[1]"}],"prose":"defines a time period within which contingency training is to be provided to information system users assuming a contingency role or responsibility;"},{"id":"cp-3.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-3(a)[2]"}],"prose":"provides contingency training to information system users consistent with assigned roles and responsibilities within the organization-defined time period of assuming a contingency role or responsibility;"}]},{"id":"cp-3.b_obj","name":"objective","props":[{"name":"label","value":"CP-3(b)"}],"prose":"provides contingency training to information system users consistent with assigned roles and responsibilities when required by information system changes;"},{"id":"cp-3.c_obj","name":"objective","props":[{"name":"label","value":"CP-3(c)"}],"parts":[{"id":"cp-3.c_obj.1","name":"objective","props":[{"name":"label","value":"CP-3(c)[1]"}],"prose":"defines the frequency for contingency training thereafter; and"},{"id":"cp-3.c_obj.2","name":"objective","props":[{"name":"label","value":"CP-3(c)[2]"}],"prose":"provides contingency training to information system users consistent with assigned roles and responsibilities with the organization-defined frequency thereafter."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency training\n\ncontingency plan\n\ncontingency training curriculum\n\ncontingency training material\n\nsecurity plan\n\ncontingency training records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning, plan implementation, and training responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency training"}]}]},{"id":"cp-4","class":"SP800-53","title":"Contingency Plan Testing","params":[{"id":"cp-4_prm_1","label":"organization-defined frequency"},{"id":"cp-4_prm_2","label":"organization-defined tests"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CP-4"},{"name":"sort-id","value":"cp-04"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"},{"href":"#0243a05a-e8a3-4d51-9364-4a9d20b0dcdf","rel":"reference"}],"parts":[{"id":"cp-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Tests the contingency plan for the information system {{ insert: param, cp-4_prm_1 }} using {{ insert: param, cp-4_prm_2 }} to determine the effectiveness of the plan and the organizational readiness to execute the plan;"},{"id":"cp-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews the contingency plan test results; and"},{"id":"cp-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Initiates corrective actions, if needed."}]},{"id":"cp-4_gdn","name":"guidance","prose":"Methods for testing contingency plans to determine the effectiveness of the plans and to identify potential weaknesses in the plans include, for example, walk-through and tabletop exercises, checklists, simulations (parallel, full interrupt), and comprehensive exercises. Organizations conduct testing based on the continuity requirements in contingency plans and include a determination of the effects on organizational operations, assets, and individuals arising due to contingency operations. Organizations have flexibility and discretion in the breadth, depth, and timelines of corrective actions.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-3","rel":"related"},{"href":"#ir-3","rel":"related"}]},{"id":"cp-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-4.a_obj","name":"objective","props":[{"name":"label","value":"CP-4(a)"}],"parts":[{"id":"cp-4.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-4(a)[1]"}],"prose":"defines tests to determine the effectiveness of the contingency plan and the organizational readiness to execute the plan;"},{"id":"cp-4.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-4(a)[2]"}],"prose":"defines a frequency to test the contingency plan for the information system;"},{"id":"cp-4.a_obj.3","name":"objective","props":[{"name":"label","value":"CP-4(a)[3]"}],"prose":"tests the contingency plan for the information system with the organization-defined frequency, using organization-defined tests to determine the effectiveness of the plan and the organizational readiness to execute the plan;"}]},{"id":"cp-4.b_obj","name":"objective","props":[{"name":"label","value":"CP-4(b)"}],"prose":"reviews the contingency plan test results; and"},{"id":"cp-4.c_obj","name":"objective","props":[{"name":"label","value":"CP-4(c)"}],"prose":"initiates corrective actions, if needed."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency plan testing\n\ncontingency plan\n\nsecurity plan\n\ncontingency plan test documentation\n\ncontingency plan test results\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for contingency plan testing, reviewing or responding to contingency plan tests\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency plan testing\n\nautomated mechanisms supporting the contingency plan and\/or contingency plan testing"}]}]},{"id":"cp-9","class":"SP800-53","title":"Information System Backup","params":[{"id":"cp-9_prm_1","label":"organization-defined frequency consistent with recovery time and recovery point objectives"},{"id":"cp-9_prm_2","label":"organization-defined frequency consistent with recovery time and recovery point objectives"},{"id":"cp-9_prm_3","label":"organization-defined frequency consistent with recovery time and recovery point objectives"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-9"},{"name":"sort-id","value":"cp-09"}],"links":[{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-9_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Conducts backups of user-level information contained in the information system {{ insert: param, cp-9_prm_1 }};"},{"id":"cp-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Conducts backups of system-level information contained in the information system {{ insert: param, cp-9_prm_2 }};"},{"id":"cp-9_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Conducts backups of information system documentation including security-related documentation {{ insert: param, cp-9_prm_3 }}; and"},{"id":"cp-9_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects the confidentiality, integrity, and availability of backup information at storage locations."}]},{"id":"cp-9_gdn","name":"guidance","prose":"System-level information includes, for example, system-state information, operating system and application software, and licenses. User-level information includes any information other than system-level information. Mechanisms employed by organizations to protect the integrity of information system backups include, for example, digital signatures and cryptographic hashes. Protection of system backup information while in transit is beyond the scope of this control. Information system backups reflect the requirements in contingency plans as well as other organizational requirements for backing up information.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"cp-9_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-9.a_obj","name":"objective","props":[{"name":"label","value":"CP-9(a)"}],"parts":[{"id":"cp-9.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(a)[1]"}],"prose":"defines a frequency, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to conduct backups of user-level information contained in the information system;"},{"id":"cp-9.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(a)[2]"}],"prose":"conducts backups of user-level information contained in the information system with the organization-defined frequency;"}]},{"id":"cp-9.b_obj","name":"objective","props":[{"name":"label","value":"CP-9(b)"}],"parts":[{"id":"cp-9.b_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(b)[1]"}],"prose":"defines a frequency, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to conduct backups of system-level information contained in the information system;"},{"id":"cp-9.b_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(b)[2]"}],"prose":"conducts backups of system-level information contained in the information system with the organization-defined frequency;"}]},{"id":"cp-9.c_obj","name":"objective","props":[{"name":"label","value":"CP-9(c)"}],"parts":[{"id":"cp-9.c_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(c)[1]"}],"prose":"defines a frequency, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to conduct backups of information system documentation including security-related documentation;"},{"id":"cp-9.c_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(c)[2]"}],"prose":"conducts backups of information system documentation, including security-related documentation, with the organization-defined frequency; and"}]},{"id":"cp-9.d_obj","name":"objective","props":[{"name":"label","value":"CP-9(d)"}],"prose":"protects the confidentiality, integrity, and availability of backup information at storage locations."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\nbackup storage location(s)\n\ninformation system backup logs or records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system backup responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for conducting information system backups\n\nautomated mechanisms supporting and\/or implementing information system backups"}]}]},{"id":"cp-10","class":"SP800-53","title":"Information System Recovery and Reconstitution","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-10"},{"name":"sort-id","value":"cp-10"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-10_smt","name":"statement","prose":"The organization provides for the recovery and reconstitution of the information system to a known state after a disruption, compromise, or failure."},{"id":"cp-10_gdn","name":"guidance","prose":"Recovery is executing information system contingency plan activities to restore organizational missions\/business functions. Reconstitution takes place following recovery and includes activities for returning organizational information systems to fully operational states. Recovery and reconstitution operations reflect mission and business priorities, recovery point\/time and reconstitution objectives, and established organizational metrics consistent with contingency plan requirements. Reconstitution includes the deactivation of any interim information system capabilities that may have been needed during recovery operations. Reconstitution also includes assessments of fully restored information system capabilities, reestablishment of continuous monitoring activities, potential information system reauthorizations, and activities to prepare the systems against future disruptions, compromises, or failures. Recovery\/reconstitution capabilities employed by organizations can include both automated mechanisms and manual procedures.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-6","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#cp-7","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#sc-24","rel":"related"}]},{"id":"cp-10_obj","name":"objective","prose":"Determine if the organization provides for:","parts":[{"id":"cp-10_obj.1","name":"objective","props":[{"name":"label","value":"CP-10[1]"}],"prose":"the recovery of the information system to a known state after:","parts":[{"id":"cp-10_obj.1.a","name":"objective","props":[{"name":"label","value":"CP-10[1][a]"}],"prose":"a disruption;"},{"id":"cp-10_obj.1.b","name":"objective","props":[{"name":"label","value":"CP-10[1][b]"}],"prose":"a compromise; or"},{"id":"cp-10_obj.1.c","name":"objective","props":[{"name":"label","value":"CP-10[1][c]"}],"prose":"a failure;"}]},{"id":"cp-10_obj.2","name":"objective","props":[{"name":"label","value":"CP-10[2]"}],"prose":"the reconstitution of the information system to a known state after:","parts":[{"id":"cp-10_obj.2.a","name":"objective","props":[{"name":"label","value":"CP-10[2][a]"}],"prose":"a disruption;"},{"id":"cp-10_obj.2.b","name":"objective","props":[{"name":"label","value":"CP-10[2][b]"}],"prose":"a compromise; or"},{"id":"cp-10_obj.2.c","name":"objective","props":[{"name":"label","value":"CP-10[2][c]"}],"prose":"a failure."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\ninformation system backup test results\n\ncontingency plan test results\n\ncontingency plan test documentation\n\nredundant secondary system for information system backups\n\nlocation(s) of redundant secondary backup system(s)\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning, recovery, and\/or reconstitution responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes implementing information system recovery and reconstitution operations\n\nautomated mechanisms supporting and\/or implementing information system recovery and reconstitution operations"}]}]}]},{"id":"ia","class":"family","title":"Identification and Authentication","controls":[{"id":"ia-1","class":"SP800-53","title":"Identification and Authentication Policy and Procedures","params":[{"id":"ia-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ia-1_prm_2","label":"organization-defined frequency"},{"id":"ia-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-1"},{"name":"sort-id","value":"ia-01"}],"links":[{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ia-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ia-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ia-1_prm_1 }}:","parts":[{"id":"ia-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ia-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls; and"}]},{"id":"ia-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ia-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Identification and authentication policy {{ insert: param, ia-1_prm_2 }}; and"},{"id":"ia-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Identification and authentication procedures {{ insert: param, ia-1_prm_3 }}."}]}]},{"id":"ia-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the IA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ia-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ia-1.a_obj","name":"objective","props":[{"name":"label","value":"IA-1(a)"}],"parts":[{"id":"ia-1.a.1_obj","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)"}],"parts":[{"id":"ia-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1]"}],"prose":"develops and documents an identification and authentication policy that addresses:","parts":[{"id":"ia-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ia-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ia-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ia-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ia-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ia-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ia-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ia-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the identification and authentication policy is to be disseminated; and"},{"id":"ia-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[3]"}],"prose":"disseminates the identification and authentication policy to organization-defined personnel or roles;"}]},{"id":"ia-1.a.2_obj","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)"}],"parts":[{"id":"ia-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls;"},{"id":"ia-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ia-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ia-1.b_obj","name":"objective","props":[{"name":"label","value":"IA-1(b)"}],"parts":[{"id":"ia-1.b.1_obj","name":"objective","props":[{"name":"label","value":"IA-1(b)(1)"}],"parts":[{"id":"ia-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current identification and authentication policy;"},{"id":"ia-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(b)(1)[2]"}],"prose":"reviews and updates the current identification and authentication policy with the organization-defined frequency; and"}]},{"id":"ia-1.b.2_obj","name":"objective","props":[{"name":"label","value":"IA-1(b)(2)"}],"parts":[{"id":"ia-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current identification and authentication procedures; and"},{"id":"ia-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(b)(2)[2]"}],"prose":"reviews and updates the current identification and authentication procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with identification and authentication responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ia-2","class":"SP800-53","title":"Identification and Authentication (organizational Users)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-2"},{"name":"sort-id","value":"ia-02"}],"links":[{"href":"#ad733a42-a7ed-4774-b988-4930c28852f3","rel":"reference"},{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#4da24a96-6cf8-435d-9d1f-c73247cad109","rel":"reference"},{"href":"#74e740a4-c45d-49f3-a86e-eb747c549e01","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#ba557c91-ba3e-4792-adc6-a4ae479b39ff","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ia-2_smt","name":"statement","prose":"The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users)."},{"id":"ia-2_gdn","name":"guidance","prose":"Organizational users include employees or individuals that organizations deem to have equivalent status of employees (e.g., contractors, guest researchers). This control applies to all accesses other than: (i) accesses that are explicitly identified and documented in AC-14; and (ii) accesses that occur through authorized use of group authenticators without individual authentication. Organizations may require unique identification of individuals in group accounts (e.g., shared privilege accounts) or for detailed accountability of individual activity. Organizations employ passwords, tokens, or biometrics to authenticate user identities, or in the case multifactor authentication, or some combination thereof. Access to organizational information systems is defined as either local access or network access. Local access is any access to organizational information systems by users (or processes acting on behalf of users) where such access is obtained by direct connections without the use of networks. Network access is access to organizational information systems by users (or processes acting on behalf of users) where such access is obtained through network connections (i.e., nonlocal accesses). Remote access is a type of network access that involves communication through external networks (e.g., the Internet). Internal networks include local area networks and wide area networks. In addition, the use of encrypted virtual private networks (VPNs) for network connections between organization-controlled endpoints and non-organization controlled endpoints may be treated as internal networks from the perspective of protecting the confidentiality and integrity of information traversing the network. Organizations can satisfy the identification and authentication requirements in this control by complying with the requirements in Homeland Security Presidential Directive 12 consistent with the specific organizational implementation plans. Multifactor authentication requires the use of two or more different factors to achieve authentication. The factors are defined as: (i) something you know (e.g., password, personal identification number [PIN]); (ii) something you have (e.g., cryptographic identification device, token); or (iii) something you are (e.g., biometric). Multifactor solutions that require devices separate from information systems gaining access include, for example, hardware tokens providing time-based or challenge-response authenticators and smart cards such as the U.S. Government Personal Identity Verification card and the DoD common access card. In addition to identifying and authenticating users at the information system level (i.e., at logon), organizations also employ identification and authentication mechanisms at the application level, when necessary, to provide increased information security. Identification and authentication requirements for other than organizational users are described in IA-8.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"}]},{"id":"ia-2_obj","name":"objective","prose":"Determine if the information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users)."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for uniquely identifying and authenticating users\n\nautomated mechanisms supporting and\/or implementing identification and authentication capability"}]}],"controls":[{"id":"ia-2.1","class":"SP800-53-enhancement","title":"Network Access to Privileged Accounts","props":[{"name":"label","value":"IA-2(1)"},{"name":"sort-id","value":"ia-02.01"}],"parts":[{"id":"ia-2.1_smt","name":"statement","prose":"The information system implements multifactor authentication for network access to privileged accounts."},{"id":"ia-2.1_gdn","name":"guidance","links":[{"href":"#ac-6","rel":"related"}]},{"id":"ia-2.1_obj","name":"objective","prose":"Determine if the information system implements multifactor authentication for network access to privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing multifactor authentication capability"}]}]},{"id":"ia-2.12","class":"SP800-53-enhancement","title":"Acceptance of PIV Credentials","props":[{"name":"label","value":"IA-2(12)"},{"name":"sort-id","value":"ia-02.12"}],"parts":[{"id":"ia-2.12_smt","name":"statement","prose":"The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials."},{"id":"ia-2.12_gdn","name":"guidance","prose":"This control enhancement applies to organizations implementing logical access control systems (LACS) and physical access control systems (PACS). Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11 requires federal agencies to continue implementing the requirements specified in HSPD-12 to enable agency-wide use of PIV credentials.","links":[{"href":"#au-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#sa-4","rel":"related"}]},{"id":"ia-2.12_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"ia-2.12_obj.1","name":"objective","props":[{"name":"label","value":"IA-2(12)[1]"}],"prose":"accepts Personal Identity Verification (PIV) credentials; and"},{"id":"ia-2.12_obj.2","name":"objective","props":[{"name":"label","value":"IA-2(12)[2]"}],"prose":"electronically verifies Personal Identity Verification (PIV) credentials."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nPIV verification records\n\nevidence of PIV credentials\n\nPIV credential authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing acceptance and verification of PIV credentials"}]}]}]},{"id":"ia-4","class":"SP800-53","title":"Identifier Management","params":[{"id":"ia-4_prm_1","label":"organization-defined personnel or roles"},{"id":"ia-4_prm_2","label":"organization-defined time period"},{"id":"ia-4_prm_3","label":"organization-defined time period of inactivity"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-4"},{"name":"sort-id","value":"ia-04"}],"links":[{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"}],"parts":[{"id":"ia-4_smt","name":"statement","prose":"The organization manages information system identifiers by:","parts":[{"id":"ia-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Receiving authorization from {{ insert: param, ia-4_prm_1 }} to assign an individual, group, role, or device identifier;"},{"id":"ia-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Selecting an identifier that identifies an individual, group, role, or device;"},{"id":"ia-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Assigning the identifier to the intended individual, group, role, or device;"},{"id":"ia-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Preventing reuse of identifiers for {{ insert: param, ia-4_prm_2 }}; and"},{"id":"ia-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Disabling the identifier after {{ insert: param, ia-4_prm_3 }}."}]},{"id":"ia-4_gdn","name":"guidance","prose":"Common device identifiers include, for example, media access control (MAC), Internet protocol (IP) addresses, or device-unique token identifiers. Management of individual identifiers is not applicable to shared information system accounts (e.g., guest and anonymous accounts). Typically, individual identifiers are the user names of the information system accounts assigned to those individuals. In such instances, the account management activities of AC-2 use account names provided by IA-4. This control also addresses individual identifiers not necessarily associated with information system accounts (e.g., identifiers used in physical security control databases accessed by badge reader systems for access to information systems). Preventing reuse of identifiers implies preventing the assignment of previously used individual, group, role, or device identifiers to different individuals, groups, roles, or devices.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#sc-37","rel":"related"}]},{"id":"ia-4_obj","name":"objective","prose":"Determine if the organization manages information system identifiers by:","parts":[{"id":"ia-4.a_obj","name":"objective","props":[{"name":"label","value":"IA-4(a)"}],"parts":[{"id":"ia-4.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(a)[1]"}],"prose":"defining personnel or roles from whom authorization must be received to assign:","parts":[{"id":"ia-4.a_obj.1.a","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][a]"}],"prose":"an individual identifier;"},{"id":"ia-4.a_obj.1.b","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][b]"}],"prose":"a group identifier;"},{"id":"ia-4.a_obj.1.c","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][c]"}],"prose":"a role identifier; and\/or"},{"id":"ia-4.a_obj.1.d","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][d]"}],"prose":"a device identifier;"}]},{"id":"ia-4.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(a)[2]"}],"prose":"receiving authorization from organization-defined personnel or roles to assign:","parts":[{"id":"ia-4.a_obj.2.a","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][a]"}],"prose":"an individual identifier;"},{"id":"ia-4.a_obj.2.b","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][b]"}],"prose":"a group identifier;"},{"id":"ia-4.a_obj.2.c","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][c]"}],"prose":"a role identifier; and\/or"},{"id":"ia-4.a_obj.2.d","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][d]"}],"prose":"a device identifier;"}]}]},{"id":"ia-4.b_obj","name":"objective","props":[{"name":"label","value":"IA-4(b)"}],"prose":"selecting an identifier that identifies:","parts":[{"id":"ia-4.b_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(b)[1]"}],"prose":"an individual;"},{"id":"ia-4.b_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(b)[2]"}],"prose":"a group;"},{"id":"ia-4.b_obj.3","name":"objective","props":[{"name":"label","value":"IA-4(b)[3]"}],"prose":"a role; and\/or"},{"id":"ia-4.b_obj.4","name":"objective","props":[{"name":"label","value":"IA-4(b)[4]"}],"prose":"a device;"}]},{"id":"ia-4.c_obj","name":"objective","props":[{"name":"label","value":"IA-4(c)"}],"prose":"assigning the identifier to the intended:","parts":[{"id":"ia-4.c_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(c)[1]"}],"prose":"individual;"},{"id":"ia-4.c_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(c)[2]"}],"prose":"group;"},{"id":"ia-4.c_obj.3","name":"objective","props":[{"name":"label","value":"IA-4(c)[3]"}],"prose":"role; and\/or"},{"id":"ia-4.c_obj.4","name":"objective","props":[{"name":"label","value":"IA-4(c)[4]"}],"prose":"device;"}]},{"id":"ia-4.d_obj","name":"objective","props":[{"name":"label","value":"IA-4(d)"}],"parts":[{"id":"ia-4.d_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(d)[1]"}],"prose":"defining a time period for preventing reuse of identifiers;"},{"id":"ia-4.d_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(d)[2]"}],"prose":"preventing reuse of identifiers for the organization-defined time period;"}]},{"id":"ia-4.e_obj","name":"objective","props":[{"name":"label","value":"IA-4(e)"}],"parts":[{"id":"ia-4.e_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(e)[1]"}],"prose":"defining a time period of inactivity to disable the identifier; and"},{"id":"ia-4.e_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(e)[2]"}],"prose":"disabling the identifier after the organization-defined time period of inactivity."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing identifier management\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of information system accounts\n\nlist of identifiers generated from physical access control devices\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with identifier management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identifier management"}]}]},{"id":"ia-5","class":"SP800-53","title":"Authenticator Management","params":[{"id":"ia-5_prm_1","label":"organization-defined time period by authenticator type"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-5"},{"name":"sort-id","value":"ia-05"}],"links":[{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#74e740a4-c45d-49f3-a86e-eb747c549e01","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#ba557c91-ba3e-4792-adc6-a4ae479b39ff","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ia-5_smt","name":"statement","prose":"The organization manages information system authenticators by:","parts":[{"id":"ia-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, or device receiving the authenticator;"},{"id":"ia-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishing initial authenticator content for authenticators defined by the organization;"},{"id":"ia-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensuring that authenticators have sufficient strength of mechanism for their intended use;"},{"id":"ia-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Establishing and implementing administrative procedures for initial authenticator distribution, for lost\/compromised or damaged authenticators, and for revoking authenticators;"},{"id":"ia-5_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Changing default content of authenticators prior to information system installation;"},{"id":"ia-5_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Establishing minimum and maximum lifetime restrictions and reuse conditions for authenticators;"},{"id":"ia-5_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Changing\/refreshing authenticators {{ insert: param, ia-5_prm_1 }};"},{"id":"ia-5_smt.h","name":"item","props":[{"name":"label","value":"h."}],"prose":"Protecting authenticator content from unauthorized disclosure and modification;"},{"id":"ia-5_smt.i","name":"item","props":[{"name":"label","value":"i."}],"prose":"Requiring individuals to take, and having devices implement, specific security safeguards to protect authenticators; and"},{"id":"ia-5_smt.j","name":"item","props":[{"name":"label","value":"j."}],"prose":"Changing authenticators for group\/role accounts when membership to those accounts changes."}]},{"id":"ia-5_gdn","name":"guidance","prose":"Individual authenticators include, for example, passwords, tokens, biometrics, PKI certificates, and key cards. Initial authenticator content is the actual content (e.g., the initial password) as opposed to requirements about authenticator content (e.g., minimum password length). In many cases, developers ship information system components with factory default authentication credentials to allow for initial installation and configuration. Default authentication credentials are often well known, easily discoverable, and present a significant security risk. The requirement to protect individual authenticators may be implemented via control PL-4 or PS-6 for authenticators in the possession of individuals and by controls AC-3, AC-6, and SC-28 for authenticators stored within organizational information systems (e.g., passwords stored in hashed or encrypted formats, files containing encrypted or hashed passwords accessible with administrator privileges). Information systems support individual authenticator management by organization-defined settings and restrictions for various authenticator characteristics including, for example, minimum password length, password composition, validation time window for time synchronous one-time tokens, and number of allowed rejections during the verification stage of biometric authentication. Specific actions that can be taken to safeguard authenticators include, for example, maintaining possession of individual authenticators, not loaning or sharing individual authenticators with others, and reporting lost, stolen, or compromised authenticators immediately. Authenticator management includes issuing and revoking, when no longer needed, authenticators for temporary access such as that required for remote maintenance. Device authenticators include, for example, certificates and passwords.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#ps-5","rel":"related"},{"href":"#ps-6","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-17","rel":"related"},{"href":"#sc-28","rel":"related"}]},{"id":"ia-5_obj","name":"objective","prose":"Determine if the organization manages information system authenticators by:","parts":[{"id":"ia-5.a_obj","name":"objective","props":[{"name":"label","value":"IA-5(a)"}],"prose":"verifying, as part of the initial authenticator distribution, the identity of:","parts":[{"id":"ia-5.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(a)[1]"}],"prose":"the individual receiving the authenticator;"},{"id":"ia-5.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(a)[2]"}],"prose":"the group receiving the authenticator;"},{"id":"ia-5.a_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(a)[3]"}],"prose":"the role receiving the authenticator; and\/or"},{"id":"ia-5.a_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(a)[4]"}],"prose":"the device receiving the authenticator;"}]},{"id":"ia-5.b_obj","name":"objective","props":[{"name":"label","value":"IA-5(b)"}],"prose":"establishing initial authenticator content for authenticators defined by the organization;"},{"id":"ia-5.c_obj","name":"objective","props":[{"name":"label","value":"IA-5(c)"}],"prose":"ensuring that authenticators have sufficient strength of mechanism for their intended use;"},{"id":"ia-5.d_obj","name":"objective","props":[{"name":"label","value":"IA-5(d)"}],"parts":[{"id":"ia-5.d_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(d)[1]"}],"prose":"establishing and implementing administrative procedures for initial authenticator distribution;"},{"id":"ia-5.d_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(d)[2]"}],"prose":"establishing and implementing administrative procedures for lost\/compromised or damaged authenticators;"},{"id":"ia-5.d_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(d)[3]"}],"prose":"establishing and implementing administrative procedures for revoking authenticators;"}]},{"id":"ia-5.e_obj","name":"objective","props":[{"name":"label","value":"IA-5(e)"}],"prose":"changing default content of authenticators prior to information system installation;"},{"id":"ia-5.f_obj","name":"objective","props":[{"name":"label","value":"IA-5(f)"}],"parts":[{"id":"ia-5.f_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(f)[1]"}],"prose":"establishing minimum lifetime restrictions for authenticators;"},{"id":"ia-5.f_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(f)[2]"}],"prose":"establishing maximum lifetime restrictions for authenticators;"},{"id":"ia-5.f_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(f)[3]"}],"prose":"establishing reuse conditions for authenticators;"}]},{"id":"ia-5.g_obj","name":"objective","props":[{"name":"label","value":"IA-5(g)"}],"parts":[{"id":"ia-5.g_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(g)[1]"}],"prose":"defining a time period (by authenticator type) for changing\/refreshing authenticators;"},{"id":"ia-5.g_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(g)[2]"}],"prose":"changing\/refreshing authenticators with the organization-defined time period by authenticator type;"}]},{"id":"ia-5.h_obj","name":"objective","props":[{"name":"label","value":"IA-5(h)"}],"prose":"protecting authenticator content from unauthorized:","parts":[{"id":"ia-5.h_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(h)[1]"}],"prose":"disclosure;"},{"id":"ia-5.h_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(h)[2]"}],"prose":"modification;"}]},{"id":"ia-5.i_obj","name":"objective","props":[{"name":"label","value":"IA-5(i)"}],"parts":[{"id":"ia-5.i_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(i)[1]"}],"prose":"requiring individuals to take specific security safeguards to protect authenticators;"},{"id":"ia-5.i_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(i)[2]"}],"prose":"having devices implement specific security safeguards to protect authenticators; and"}]},{"id":"ia-5.j_obj","name":"objective","props":[{"name":"label","value":"IA-5(j)"}],"prose":"changing authenticators for group\/role accounts when membership to those accounts changes."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator management\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of information system authenticator types\n\nchange control records associated with managing information system authenticators\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing authenticator management capability"}]}],"controls":[{"id":"ia-5.1","class":"SP800-53-enhancement","title":"Password-based Authentication","params":[{"id":"ia-5.1_prm_1","label":"organization-defined requirements for case sensitivity, number of characters, mix of upper-case letters, lower-case letters, numbers, and special characters, including minimum requirements for each type"},{"id":"ia-5.1_prm_2","label":"organization-defined number"},{"id":"ia-5.1_prm_3","label":"organization-defined numbers for lifetime minimum, lifetime maximum"},{"id":"ia-5.1_prm_4","label":"organization-defined number"}],"props":[{"name":"label","value":"IA-5(1)"},{"name":"sort-id","value":"ia-05.01"}],"parts":[{"id":"ia-5.1_smt","name":"statement","prose":"The information system, for password-based authentication:","parts":[{"id":"ia-5.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Enforces minimum password complexity of {{ insert: param, ia-5.1_prm_1 }};"},{"id":"ia-5.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Enforces at least the following number of changed characters when new passwords are created: {{ insert: param, ia-5.1_prm_2 }};"},{"id":"ia-5.1_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Stores and transmits only cryptographically-protected passwords;"},{"id":"ia-5.1_smt.d","name":"item","props":[{"name":"label","value":"(d)"}],"prose":"Enforces password minimum and maximum lifetime restrictions of {{ insert: param, ia-5.1_prm_3 }};"},{"id":"ia-5.1_smt.e","name":"item","props":[{"name":"label","value":"(e)"}],"prose":"Prohibits password reuse for {{ insert: param, ia-5.1_prm_4 }} generations; and"},{"id":"ia-5.1_smt.f","name":"item","props":[{"name":"label","value":"(f)"}],"prose":"Allows the use of a temporary password for system logons with an immediate change to a permanent password."}]},{"id":"ia-5.1_gdn","name":"guidance","prose":"This control enhancement applies to single-factor authentication of individuals using passwords as individual or group authenticators, and in a similar manner, when passwords are part of multifactor authenticators. This control enhancement does not apply when passwords are used to unlock hardware authenticators (e.g., Personal Identity Verification cards). The implementation of such password mechanisms may not meet all of the requirements in the enhancement. Cryptographically-protected passwords include, for example, encrypted versions of passwords and one-way cryptographic hashes of passwords. The number of changed characters refers to the number of changes required with respect to the total number of positions in the current password. Password lifetime restrictions do not apply to temporary passwords. To mitigate certain brute force attacks against passwords, organizations may also consider salting passwords.","links":[{"href":"#ia-6","rel":"related"}]},{"id":"ia-5.1_obj","name":"objective","prose":"Determine if, for password-based authentication:","parts":[{"id":"ia-5.1.a_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)"}],"parts":[{"id":"ia-5.1.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[1]"}],"prose":"the organization defines requirements for case sensitivity;"},{"id":"ia-5.1.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[2]"}],"prose":"the organization defines requirements for number of characters;"},{"id":"ia-5.1.a_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[3]"}],"prose":"the organization defines requirements for the mix of upper-case letters, lower-case letters, numbers and special characters;"},{"id":"ia-5.1.a_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[4]"}],"prose":"the organization defines minimum requirements for each type of character;"},{"id":"ia-5.1.a_obj.5","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[5]"}],"prose":"the information system enforces minimum password complexity of organization-defined requirements for case sensitivity, number of characters, mix of upper-case letters, lower-case letters, numbers, and special characters, including minimum requirements for each type;"}],"links":[{"href":"#ia-5.1_smt.a","rel":"corresp"}]},{"id":"ia-5.1.b_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(b)"}],"parts":[{"id":"ia-5.1.b_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(b)[1]"}],"prose":"the organization defines a minimum number of changed characters to be enforced when new passwords are created;"},{"id":"ia-5.1.b_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(b)[2]"}],"prose":"the information system enforces at least the organization-defined minimum number of characters that must be changed when new passwords are created;"}],"links":[{"href":"#ia-5.1_smt.b","rel":"corresp"}]},{"id":"ia-5.1.c_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(c)"}],"prose":"the information system stores and transmits only encrypted representations of passwords;","links":[{"href":"#ia-5.1_smt.c","rel":"corresp"}]},{"id":"ia-5.1.d_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)"}],"parts":[{"id":"ia-5.1.d_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[1]"}],"prose":"the organization defines numbers for password minimum lifetime restrictions to be enforced for passwords;"},{"id":"ia-5.1.d_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[2]"}],"prose":"the organization defines numbers for password maximum lifetime restrictions to be enforced for passwords;"},{"id":"ia-5.1.d_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[3]"}],"prose":"the information system enforces password minimum lifetime restrictions of organization-defined numbers for lifetime minimum;"},{"id":"ia-5.1.d_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[4]"}],"prose":"the information system enforces password maximum lifetime restrictions of organization-defined numbers for lifetime maximum;"}],"links":[{"href":"#ia-5.1_smt.d","rel":"corresp"}]},{"id":"ia-5.1.e_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(e)"}],"parts":[{"id":"ia-5.1.e_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(e)[1]"}],"prose":"the organization defines the number of password generations to be prohibited from password reuse;"},{"id":"ia-5.1.e_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(e)[2]"}],"prose":"the information system prohibits password reuse for the organization-defined number of generations; and"}],"links":[{"href":"#ia-5.1_smt.e","rel":"corresp"}]},{"id":"ia-5.1.f_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(f)"}],"prose":"the information system allows the use of a temporary password for system logons with an immediate change to a permanent password.","links":[{"href":"#ia-5.1_smt.f","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\npassword policy\n\nprocedures addressing authenticator management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\npassword configurations and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing password-based authenticator management capability"}]}]},{"id":"ia-5.11","class":"SP800-53-enhancement","title":"Hardware Token-based Authentication","params":[{"id":"ia-5.11_prm_1","label":"organization-defined token quality requirements"}],"props":[{"name":"label","value":"IA-5(11)"},{"name":"sort-id","value":"ia-05.11"}],"parts":[{"id":"ia-5.11_smt","name":"statement","prose":"The information system, for hardware token-based authentication, employs mechanisms that satisfy {{ insert: param, ia-5.11_prm_1 }}."},{"id":"ia-5.11_gdn","name":"guidance","prose":"Hardware token-based authentication typically refers to the use of PKI-based tokens, such as the U.S. Government Personal Identity Verification (PIV) card. Organizations define specific requirements for tokens, such as working with a particular PKI."},{"id":"ia-5.11_obj","name":"objective","prose":"Determine if, for hardware token-based authentication:","parts":[{"id":"ia-5.11_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(11)[1]"}],"prose":"the organization defines token quality requirements to be satisfied; and"},{"id":"ia-5.11_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(11)[2]"}],"prose":"the information system employs mechanisms that satisfy organization-defined token quality requirements."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator management\n\nsecurity plan\n\ninformation system design documentation\n\nautomated mechanisms employing hardware token-based authentication for the information system\n\nlist of token quality requirements\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing hardware token-based authenticator management capability"}]}]}]},{"id":"ia-6","class":"SP800-53","title":"Authenticator Feedback","props":[{"name":"priority","value":"P2"},{"name":"label","value":"IA-6"},{"name":"sort-id","value":"ia-06"}],"parts":[{"id":"ia-6_smt","name":"statement","prose":"The information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation\/use by unauthorized individuals."},{"id":"ia-6_gdn","name":"guidance","prose":"The feedback from information systems does not provide information that would allow unauthorized individuals to compromise authentication mechanisms. For some types of information systems or system components, for example, desktops\/notebooks with relatively large monitors, the threat (often referred to as shoulder surfing) may be significant. For other types of systems or components, for example, mobile devices with 2-4 inch screens, this threat may be less significant, and may need to be balanced against the increased likelihood of typographic input errors due to the small keyboards. Therefore, the means for obscuring the authenticator feedback is selected accordingly. Obscuring the feedback of authentication information includes, for example, displaying asterisks when users type passwords into input devices, or displaying feedback for a very limited time before fully obscuring it.","links":[{"href":"#pe-18","rel":"related"}]},{"id":"ia-6_obj","name":"objective","prose":"Determine if the information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation\/use by unauthorized individuals."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator feedback\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing the obscuring of feedback of authentication information during authentication"}]}]},{"id":"ia-7","class":"SP800-53","title":"Cryptographic Module Authentication","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-7"},{"name":"sort-id","value":"ia-07"}],"links":[{"href":"#39f9087d-7687-46d2-8eda-b6f4b7a4d8a9","rel":"reference"},{"href":"#b09d1a31-d3c9-4138-a4f4-4c63816afd7d","rel":"reference"}],"parts":[{"id":"ia-7_smt","name":"statement","prose":"The information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication."},{"id":"ia-7_gdn","name":"guidance","prose":"Authentication mechanisms may be required within a cryptographic module to authenticate an operator accessing the module and to verify that the operator is authorized to assume the requested role and perform services within that role.","links":[{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"ia-7_obj","name":"objective","prose":"Determine if the information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing cryptographic module authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for cryptographic module authentication\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing cryptographic module authentication"}]}]},{"id":"ia-8","class":"SP800-53","title":"Identification and Authentication (non-organizational Users)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-8"},{"name":"sort-id","value":"ia-08"}],"links":[{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#74e740a4-c45d-49f3-a86e-eb747c549e01","rel":"reference"},{"href":"#599fe9ba-4750-4450-9eeb-b95bd19a5e8f","rel":"reference"},{"href":"#ba557c91-ba3e-4792-adc6-a4ae479b39ff","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#2157bb7e-192c-4eaa-877f-93ef6b0a3292","rel":"reference"},{"href":"#654f21e2-f3bc-43b2-abdc-60ab8d09744b","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ia-8_smt","name":"statement","prose":"The information system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users)."},{"id":"ia-8_gdn","name":"guidance","prose":"Non-organizational users include information system users other than organizational users explicitly covered by IA-2. These individuals are uniquely identified and authenticated for accesses other than those accesses explicitly identified and documented in AC-14. In accordance with the E-Authentication E-Government initiative, authentication of non-organizational users accessing federal information systems may be required to protect federal, proprietary, or privacy-related information (with exceptions noted for national security systems). Organizations use risk assessments to determine authentication needs and consider scalability, practicality, and security in balancing the need to ensure ease of use for access to federal information and information systems with the need to protect and adequately mitigate risk. IA-2 addresses identification and authentication requirements for access to information systems by organizational users.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#sc-8","rel":"related"}]},{"id":"ia-8_obj","name":"objective","prose":"Determine if the information system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users)."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability"}]}],"controls":[{"id":"ia-8.1","class":"SP800-53-enhancement","title":"Acceptance of PIV Credentials from Other Agencies","props":[{"name":"label","value":"IA-8(1)"},{"name":"sort-id","value":"ia-08.01"}],"parts":[{"id":"ia-8.1_smt","name":"statement","prose":"The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials from other federal agencies."},{"id":"ia-8.1_gdn","name":"guidance","prose":"This control enhancement applies to logical access control systems (LACS) and physical access control systems (PACS). Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11 requires federal agencies to continue implementing the requirements specified in HSPD-12 to enable agency-wide use of PIV credentials.","links":[{"href":"#au-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#sa-4","rel":"related"}]},{"id":"ia-8.1_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"ia-8.1_obj.1","name":"objective","props":[{"name":"label","value":"IA-8(1)[1]"}],"prose":"accepts Personal Identity Verification (PIV) credentials from other agencies; and"},{"id":"ia-8.1_obj.2","name":"objective","props":[{"name":"label","value":"IA-8(1)[2]"}],"prose":"electronically verifies Personal Identity Verification (PIV) credentials from other agencies."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nPIV verification records\n\nevidence of PIV credentials\n\nPIV credential authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms that accept and verify PIV credentials"}]}]},{"id":"ia-8.2","class":"SP800-53-enhancement","title":"Acceptance of Third-party Credentials","props":[{"name":"label","value":"IA-8(2)"},{"name":"sort-id","value":"ia-08.02"}],"parts":[{"id":"ia-8.2_smt","name":"statement","prose":"The information system accepts only FICAM-approved third-party credentials."},{"id":"ia-8.2_gdn","name":"guidance","prose":"This control enhancement typically applies to organizational information systems that are accessible to the general public, for example, public-facing websites. Third-party credentials are those credentials issued by nonfederal government entities approved by the Federal Identity, Credential, and Access Management (FICAM) Trust Framework Solutions initiative. Approved third-party credentials meet or exceed the set of minimum federal government-wide technical, security, privacy, and organizational maturity requirements. This allows federal government relying parties to trust such credentials at their approved assurance levels.","links":[{"href":"#au-2","rel":"related"}]},{"id":"ia-8.2_obj","name":"objective","prose":"Determine if the information system accepts only FICAM-approved third-party credentials."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of FICAM-approved, third-party credentialing products, components, or services procured and implemented by organization\n\nthird-party credential verification records\n\nevidence of FICAM-approved third-party credentials\n\nthird-party credential authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms that accept FICAM-approved credentials"}]}]},{"id":"ia-8.3","class":"SP800-53-enhancement","title":"Use of Ficam-approved Products","params":[{"id":"ia-8.3_prm_1","label":"organization-defined information systems"}],"props":[{"name":"label","value":"IA-8(3)"},{"name":"sort-id","value":"ia-08.03"}],"parts":[{"id":"ia-8.3_smt","name":"statement","prose":"The organization employs only FICAM-approved information system components in {{ insert: param, ia-8.3_prm_1 }} to accept third-party credentials."},{"id":"ia-8.3_gdn","name":"guidance","prose":"This control enhancement typically applies to information systems that are accessible to the general public, for example, public-facing websites. FICAM-approved information system components include, for example, information technology products and software libraries that have been approved by the Federal Identity, Credential, and Access Management conformance program.","links":[{"href":"#sa-4","rel":"related"}]},{"id":"ia-8.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ia-8.3_obj.1","name":"objective","props":[{"name":"label","value":"IA-8(3)[1]"}],"prose":"defines information systems in which only FICAM-approved information system components are to be employed to accept third-party credentials; and"},{"id":"ia-8.3_obj.2","name":"objective","props":[{"name":"label","value":"IA-8(3)[2]"}],"prose":"employs only FICAM-approved information system components in organization-defined information systems to accept third-party credentials."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nsystem and services acquisition policy\n\nprocedures addressing user identification and authentication\n\nprocedures addressing the integration of security requirements into the acquisition process\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nthird-party credential validations\n\nthird-party credential authorizations\n\nthird-party credential records\n\nlist of FICAM-approved information system components procured and implemented by organization\n\nacquisition documentation\n\nacquisition contracts for information system procurements or services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information system security, acquisition, and contracting responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability"}]}]},{"id":"ia-8.4","class":"SP800-53-enhancement","title":"Use of Ficam-issued Profiles","props":[{"name":"label","value":"IA-8(4)"},{"name":"sort-id","value":"ia-08.04"}],"parts":[{"id":"ia-8.4_smt","name":"statement","prose":"The information system conforms to FICAM-issued profiles."},{"id":"ia-8.4_gdn","name":"guidance","prose":"This control enhancement addresses open identity management standards. To ensure that these standards are viable, robust, reliable, sustainable (e.g., available in commercial information technology products), and interoperable as documented, the United States Government assesses and scopes identity management standards and technology implementations against applicable federal legislation, directives, policies, and requirements. The result is FICAM-issued implementation profiles of approved protocols (e.g., FICAM authentication protocols such as SAML 2.0 and OpenID 2.0, as well as other protocols such as the FICAM Backend Attribute Exchange).","links":[{"href":"#sa-4","rel":"related"}]},{"id":"ia-8.4_obj","name":"objective","prose":"Determine if the information system conforms to FICAM-issued profiles."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nsystem and services acquisition policy\n\nprocedures addressing user identification and authentication\n\nprocedures addressing the integration of security requirements into the acquisition process\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of FICAM-issued profiles and associated, approved protocols\n\nacquisition documentation\n\nacquisition contracts for information system procurements or services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms supporting and\/or implementing conformance with FICAM-issued profiles"}]}]}]}]},{"id":"ir","class":"family","title":"Incident Response","controls":[{"id":"ir-1","class":"SP800-53","title":"Incident Response Policy and Procedures","params":[{"id":"ir-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ir-1_prm_2","label":"organization-defined frequency"},{"id":"ir-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-1"},{"name":"sort-id","value":"ir-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"},{"href":"#6d431fee-658f-4a0e-9f2e-a38b5d398fab","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ir-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ir-1_prm_1 }}:","parts":[{"id":"ir-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An incident response policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ir-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the incident response policy and associated incident response controls; and"}]},{"id":"ir-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ir-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Incident response policy {{ insert: param, ir-1_prm_2 }}; and"},{"id":"ir-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Incident response procedures {{ insert: param, ir-1_prm_3 }}."}]}]},{"id":"ir-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the IR family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ir-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-1.a_obj","name":"objective","props":[{"name":"label","value":"IR-1(a)"}],"parts":[{"id":"ir-1.a.1_obj","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)"}],"parts":[{"id":"ir-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1]"}],"prose":"develops and documents an incident response policy that addresses:","parts":[{"id":"ir-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ir-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ir-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ir-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ir-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ir-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ir-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ir-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the incident response policy is to be disseminated;"},{"id":"ir-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[3]"}],"prose":"disseminates the incident response policy to organization-defined personnel or roles;"}]},{"id":"ir-1.a.2_obj","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)"}],"parts":[{"id":"ir-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the incident response policy and associated incident response controls;"},{"id":"ir-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ir-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ir-1.b_obj","name":"objective","props":[{"name":"label","value":"IR-1(b)"}],"parts":[{"id":"ir-1.b.1_obj","name":"objective","props":[{"name":"label","value":"IR-1(b)(1)"}],"parts":[{"id":"ir-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current incident response policy;"},{"id":"ir-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(b)(1)[2]"}],"prose":"reviews and updates the current incident response policy with the organization-defined frequency;"}]},{"id":"ir-1.b.2_obj","name":"objective","props":[{"name":"label","value":"IR-1(b)(2)"}],"parts":[{"id":"ir-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current incident response procedures; and"},{"id":"ir-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(b)(2)[2]"}],"prose":"reviews and updates the current incident response procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ir-2","class":"SP800-53","title":"Incident Response Training","params":[{"id":"ir-2_prm_1","label":"organization-defined time period"},{"id":"ir-2_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"IR-2"},{"name":"sort-id","value":"ir-02"}],"links":[{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"ir-2_smt","name":"statement","prose":"The organization provides incident response training to information system users consistent with assigned roles and responsibilities:","parts":[{"id":"ir-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Within {{ insert: param, ir-2_prm_1 }} of assuming an incident response role or responsibility;"},{"id":"ir-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"ir-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, ir-2_prm_2 }} thereafter."}]},{"id":"ir-2_gdn","name":"guidance","prose":"Incident response training provided by organizations is linked to the assigned roles and responsibilities of organizational personnel to ensure the appropriate content and level of detail is included in such training. For example, regular users may only need to know who to call or how to recognize an incident on the information system; system administrators may require additional training on how to handle\/remediate incidents; and incident responders may receive more specific training on forensics, reporting, system recovery, and restoration. Incident response training includes user training in the identification and reporting of suspicious activities, both from external and internal sources.","links":[{"href":"#at-3","rel":"related"},{"href":"#cp-3","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"ir-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-2.a_obj","name":"objective","props":[{"name":"label","value":"IR-2(a)"}],"parts":[{"id":"ir-2.a_obj.1","name":"objective","props":[{"name":"label","value":"IR-2(a)[1]"}],"prose":"defines a time period within which incident response training is to be provided to information system users assuming an incident response role or responsibility;"},{"id":"ir-2.a_obj.2","name":"objective","props":[{"name":"label","value":"IR-2(a)[2]"}],"prose":"provides incident response training to information system users consistent with assigned roles and responsibilities within the organization-defined time period of assuming an incident response role or responsibility;"}]},{"id":"ir-2.b_obj","name":"objective","props":[{"name":"label","value":"IR-2(b)"}],"prose":"provides incident response training to information system users consistent with assigned roles and responsibilities when required by information system changes;"},{"id":"ir-2.c_obj","name":"objective","props":[{"name":"label","value":"IR-2(c)"}],"parts":[{"id":"ir-2.c_obj.1","name":"objective","props":[{"name":"label","value":"IR-2(c)[1]"}],"prose":"defines the frequency to provide refresher incident response training to information system users consistent with assigned roles or responsibilities; and"},{"id":"ir-2.c_obj.2","name":"objective","props":[{"name":"label","value":"IR-2(c)[2]"}],"prose":"after the initial incident response training, provides refresher incident response training to information system users consistent with assigned roles and responsibilities in accordance with the organization-defined frequency to provide refresher training."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response training\n\nincident response training curriculum\n\nincident response training materials\n\nsecurity plan\n\nincident response plan\n\nsecurity plan\n\nincident response training records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response training and operational responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ir-4","class":"SP800-53","title":"Incident Handling","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-4"},{"name":"sort-id","value":"ir-04"}],"links":[{"href":"#c5034e0c-eba6-4ecd-a541-79f0678f4ba4","rel":"reference"},{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"}],"parts":[{"id":"ir-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Implements an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery;"},{"id":"ir-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Coordinates incident handling activities with contingency planning activities; and"},{"id":"ir-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Incorporates lessons learned from ongoing incident handling activities into incident response procedures, training, and testing, and implements the resulting changes accordingly."}]},{"id":"ir-4_gdn","name":"guidance","prose":"Organizations recognize that incident response capability is dependent on the capabilities of organizational information systems and the mission\/business processes being supported by those systems. Therefore, organizations consider incident response as part of the definition, design, and development of mission\/business processes and information systems. Incident-related information can be obtained from a variety of sources including, for example, audit monitoring, network monitoring, physical access monitoring, user\/administrator reports, and reported supply chain events. Effective incident handling capability includes coordination among many organizational entities including, for example, mission\/business owners, information system owners, authorizing officials, human resources offices, physical and personnel security offices, legal departments, operations personnel, procurement offices, and the risk executive (function).","links":[{"href":"#au-6","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#cp-4","rel":"related"},{"href":"#ir-2","rel":"related"},{"href":"#ir-3","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#pe-6","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"ir-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-4.a_obj","name":"objective","props":[{"name":"label","value":"IR-4(a)"}],"prose":"implements an incident handling capability for security incidents that includes:","parts":[{"id":"ir-4.a_obj.1","name":"objective","props":[{"name":"label","value":"IR-4(a)[1]"}],"prose":"preparation;"},{"id":"ir-4.a_obj.2","name":"objective","props":[{"name":"label","value":"IR-4(a)[2]"}],"prose":"detection and analysis;"},{"id":"ir-4.a_obj.3","name":"objective","props":[{"name":"label","value":"IR-4(a)[3]"}],"prose":"containment;"},{"id":"ir-4.a_obj.4","name":"objective","props":[{"name":"label","value":"IR-4(a)[4]"}],"prose":"eradication;"},{"id":"ir-4.a_obj.5","name":"objective","props":[{"name":"label","value":"IR-4(a)[5]"}],"prose":"recovery;"}]},{"id":"ir-4.b_obj","name":"objective","props":[{"name":"label","value":"IR-4(b)"}],"prose":"coordinates incident handling activities with contingency planning activities;"},{"id":"ir-4.c_obj","name":"objective","props":[{"name":"label","value":"IR-4(c)"}],"parts":[{"id":"ir-4.c_obj.1","name":"objective","props":[{"name":"label","value":"IR-4(c)[1]"}],"prose":"incorporates lessons learned from ongoing incident handling activities into:","parts":[{"id":"ir-4.c_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-4(c)[1][a]"}],"prose":"incident response procedures;"},{"id":"ir-4.c_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-4(c)[1][b]"}],"prose":"training;"},{"id":"ir-4.c_obj.1.c","name":"objective","props":[{"name":"label","value":"IR-4(c)[1][c]"}],"prose":"testing\/exercises;"}]},{"id":"ir-4.c_obj.2","name":"objective","props":[{"name":"label","value":"IR-4(c)[2]"}],"prose":"implements the resulting changes accordingly to:","parts":[{"id":"ir-4.c_obj.2.a","name":"objective","props":[{"name":"label","value":"IR-4(c)[2][a]"}],"prose":"incident response procedures;"},{"id":"ir-4.c_obj.2.b","name":"objective","props":[{"name":"label","value":"IR-4(c)[2][b]"}],"prose":"training; and"},{"id":"ir-4.c_obj.2.c","name":"objective","props":[{"name":"label","value":"IR-4(c)[2][c]"}],"prose":"testing\/exercises."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\ncontingency planning policy\n\nprocedures addressing incident handling\n\nincident response plan\n\ncontingency plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident handling responsibilities\n\norganizational personnel with contingency planning responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Incident handling capability for the organization"}]}]},{"id":"ir-5","class":"SP800-53","title":"Incident Monitoring","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-5"},{"name":"sort-id","value":"ir-05"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"}],"parts":[{"id":"ir-5_smt","name":"statement","prose":"The organization tracks and documents information system security incidents."},{"id":"ir-5_gdn","name":"guidance","prose":"Documenting information system security incidents includes, for example, maintaining records about each incident, the status of the incident, and other pertinent information necessary for forensics, evaluating incident details, trends, and handling. Incident information can be obtained from a variety of sources including, for example, incident reports, incident response teams, audit monitoring, network monitoring, physical access monitoring, and user\/administrator reports.","links":[{"href":"#au-6","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#pe-6","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"ir-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-5_obj.1","name":"objective","props":[{"name":"label","value":"IR-5[1]"}],"prose":"tracks information system security incidents; and"},{"id":"ir-5_obj.2","name":"objective","props":[{"name":"label","value":"IR-5[2]"}],"prose":"documents information system security incidents."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident monitoring\n\nincident response records and documentation\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident monitoring responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Incident monitoring capability for the organization\n\nautomated mechanisms supporting and\/or implementing tracking and documenting of system security incidents"}]}]},{"id":"ir-6","class":"SP800-53","title":"Incident Reporting","params":[{"id":"ir-6_prm_1","label":"organization-defined time period"},{"id":"ir-6_prm_2","label":"organization-defined authorities"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-6"},{"name":"sort-id","value":"ir-06"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"},{"href":"#02631467-668b-4233-989b-3dfded2fd184","rel":"reference"}],"parts":[{"id":"ir-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Requires personnel to report suspected security incidents to the organizational incident response capability within {{ insert: param, ir-6_prm_1 }}; and"},{"id":"ir-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reports security incident information to {{ insert: param, ir-6_prm_2 }}."}]},{"id":"ir-6_gdn","name":"guidance","prose":"The intent of this control is to address both specific incident reporting requirements within an organization and the formal incident reporting requirements for federal agencies and their subordinate organizations. Suspected security incidents include, for example, the receipt of suspicious email communications that can potentially contain malicious code. The types of security incidents reported, the content and timeliness of the reports, and the designated reporting authorities reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Current federal policy requires that all federal agencies (unless specifically exempted from such requirements) report security incidents to the United States Computer Emergency Readiness Team (US-CERT) within specified time frames designated in the US-CERT Concept of Operations for Federal Cyber Security Incident Handling.","links":[{"href":"#ir-4","rel":"related"},{"href":"#ir-5","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"ir-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-6.a_obj","name":"objective","props":[{"name":"label","value":"IR-6(a)"}],"parts":[{"id":"ir-6.a_obj.1","name":"objective","props":[{"name":"label","value":"IR-6(a)[1]"}],"prose":"defines the time period within which personnel report suspected security incidents to the organizational incident response capability;"},{"id":"ir-6.a_obj.2","name":"objective","props":[{"name":"label","value":"IR-6(a)[2]"}],"prose":"requires personnel to report suspected security incidents to the organizational incident response capability within the organization-defined time period;"}]},{"id":"ir-6.b_obj","name":"objective","props":[{"name":"label","value":"IR-6(b)"}],"parts":[{"id":"ir-6.b_obj.1","name":"objective","props":[{"name":"label","value":"IR-6(b)[1]"}],"prose":"defines authorities to whom security incident information is to be reported; and"},{"id":"ir-6.b_obj.2","name":"objective","props":[{"name":"label","value":"IR-6(b)[2]"}],"prose":"reports security incident information to organization-defined authorities."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident reporting\n\nincident reporting records and documentation\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident reporting responsibilities\n\norganizational personnel with information security responsibilities\n\npersonnel who have\/should have reported incidents\n\npersonnel (authorities) to whom incident information is to be reported"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incident reporting\n\nautomated mechanisms supporting and\/or implementing incident reporting"}]}]},{"id":"ir-7","class":"SP800-53","title":"Incident Response Assistance","props":[{"name":"priority","value":"P2"},{"name":"label","value":"IR-7"},{"name":"sort-id","value":"ir-07"}],"parts":[{"id":"ir-7_smt","name":"statement","prose":"The organization provides an incident response support resource, integral to the organizational incident response capability that offers advice and assistance to users of the information system for the handling and reporting of security incidents."},{"id":"ir-7_gdn","name":"guidance","prose":"Incident response support resources provided by organizations include, for example, help desks, assistance groups, and access to forensics services, when required.","links":[{"href":"#at-2","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ir-6","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#sa-9","rel":"related"}]},{"id":"ir-7_obj","name":"objective","prose":"Determine if the organization provides an incident response support resource:","parts":[{"id":"ir-7_obj.1","name":"objective","props":[{"name":"label","value":"IR-7[1]"}],"prose":"that is integral to the organizational incident response capability; and"},{"id":"ir-7_obj.2","name":"objective","props":[{"name":"label","value":"IR-7[2]"}],"prose":"that offers advice and assistance to users of the information system for the handling and reporting of security incidents."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response assistance\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response assistance and support responsibilities\n\norganizational personnel with access to incident response support and assistance capability\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incident response assistance\n\nautomated mechanisms supporting and\/or implementing incident response assistance"}]}]},{"id":"ir-8","class":"SP800-53","title":"Incident Response Plan","params":[{"id":"ir-8_prm_1","label":"organization-defined personnel or roles"},{"id":"ir-8_prm_2","label":"organization-defined incident response personnel (identified by name and\/or by role) and organizational elements"},{"id":"ir-8_prm_3","label":"organization-defined frequency"},{"id":"ir-8_prm_4","label":"organization-defined incident response personnel (identified by name and\/or by role) and organizational elements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-8"},{"name":"sort-id","value":"ir-08"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"}],"parts":[{"id":"ir-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops an incident response plan that:","parts":[{"id":"ir-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Provides the organization with a roadmap for implementing its incident response capability;"},{"id":"ir-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Describes the structure and organization of the incident response capability;"},{"id":"ir-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Provides a high-level approach for how the incident response capability fits into the overall organization;"},{"id":"ir-8_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Meets the unique requirements of the organization, which relate to mission, size, structure, and functions;"},{"id":"ir-8_smt.a.5","name":"item","props":[{"name":"label","value":"5."}],"prose":"Defines reportable incidents;"},{"id":"ir-8_smt.a.6","name":"item","props":[{"name":"label","value":"6."}],"prose":"Provides metrics for measuring the incident response capability within the organization;"},{"id":"ir-8_smt.a.7","name":"item","props":[{"name":"label","value":"7."}],"prose":"Defines the resources and management support needed to effectively maintain and mature an incident response capability; and"},{"id":"ir-8_smt.a.8","name":"item","props":[{"name":"label","value":"8."}],"prose":"Is reviewed and approved by {{ insert: param, ir-8_prm_1 }};"}]},{"id":"ir-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Distributes copies of the incident response plan to {{ insert: param, ir-8_prm_2 }};"},{"id":"ir-8_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the incident response plan {{ insert: param, ir-8_prm_3 }};"},{"id":"ir-8_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Updates the incident response plan to address system\/organizational changes or problems encountered during plan implementation, execution, or testing;"},{"id":"ir-8_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Communicates incident response plan changes to {{ insert: param, ir-8_prm_4 }}; and"},{"id":"ir-8_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Protects the incident response plan from unauthorized disclosure and modification."}]},{"id":"ir-8_gdn","name":"guidance","prose":"It is important that organizations develop and implement a coordinated approach to incident response. Organizational missions, business functions, strategies, goals, and objectives for incident response help to determine the structure of incident response capabilities. As part of a comprehensive incident response capability, organizations consider the coordination and sharing of information with external organizations, including, for example, external service providers and organizations involved in the supply chain for organizational information systems.","links":[{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"}]},{"id":"ir-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-8.a_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)"}],"prose":"develops an incident response plan that:","parts":[{"id":"ir-8.a.1_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(1)"}],"prose":"provides the organization with a roadmap for implementing its incident response capability;"},{"id":"ir-8.a.2_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(2)"}],"prose":"describes the structure and organization of the incident response capability;"},{"id":"ir-8.a.3_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(3)"}],"prose":"provides a high-level approach for how the incident response capability fits into the overall organization;"},{"id":"ir-8.a.4_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)"}],"prose":"meets the unique requirements of the organization, which relate to:","parts":[{"id":"ir-8.a.4_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[1]"}],"prose":"mission;"},{"id":"ir-8.a.4_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[2]"}],"prose":"size;"},{"id":"ir-8.a.4_obj.3","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[3]"}],"prose":"structure;"},{"id":"ir-8.a.4_obj.4","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[4]"}],"prose":"functions;"}]},{"id":"ir-8.a.5_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(5)"}],"prose":"defines reportable incidents;"},{"id":"ir-8.a.6_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(6)"}],"prose":"provides metrics for measuring the incident response capability within the organization;"},{"id":"ir-8.a.7_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(7)"}],"prose":"defines the resources and management support needed to effectively maintain and mature an incident response capability;"},{"id":"ir-8.a.8_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(8)"}],"parts":[{"id":"ir-8.a.8_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(a)(8)[1]"}],"prose":"defines personnel or roles to review and approve the incident response plan;"},{"id":"ir-8.a.8_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(a)(8)[2]"}],"prose":"is reviewed and approved by organization-defined personnel or roles;"}]}]},{"id":"ir-8.b_obj","name":"objective","props":[{"name":"label","value":"IR-8(b)"}],"parts":[{"id":"ir-8.b_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(b)[1]"}],"parts":[{"id":"ir-8.b_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-8(b)[1][a]"}],"prose":"defines incident response personnel (identified by name and\/or by role) to whom copies of the incident response plan are to be distributed;"},{"id":"ir-8.b_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-8(b)[1][b]"}],"prose":"defines organizational elements to whom copies of the incident response plan are to be distributed;"}]},{"id":"ir-8.b_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(b)[2]"}],"prose":"distributes copies of the incident response plan to organization-defined incident response personnel (identified by name and\/or by role) and organizational elements;"}]},{"id":"ir-8.c_obj","name":"objective","props":[{"name":"label","value":"IR-8(c)"}],"parts":[{"id":"ir-8.c_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(c)[1]"}],"prose":"defines the frequency to review the incident response plan;"},{"id":"ir-8.c_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(c)[2]"}],"prose":"reviews the incident response plan with the organization-defined frequency;"}]},{"id":"ir-8.d_obj","name":"objective","props":[{"name":"label","value":"IR-8(d)"}],"prose":"updates the incident response plan to address system\/organizational changes or problems encountered during plan:","parts":[{"id":"ir-8.d_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(d)[1]"}],"prose":"implementation;"},{"id":"ir-8.d_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(d)[2]"}],"prose":"execution; or"},{"id":"ir-8.d_obj.3","name":"objective","props":[{"name":"label","value":"IR-8(d)[3]"}],"prose":"testing;"}]},{"id":"ir-8.e_obj","name":"objective","props":[{"name":"label","value":"IR-8(e)"}],"parts":[{"id":"ir-8.e_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(e)[1]"}],"parts":[{"id":"ir-8.e_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-8(e)[1][a]"}],"prose":"defines incident response personnel (identified by name and\/or by role) to whom incident response plan changes are to be communicated;"},{"id":"ir-8.e_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-8(e)[1][b]"}],"prose":"defines organizational elements to whom incident response plan changes are to be communicated;"}]},{"id":"ir-8.e_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(e)[2]"}],"prose":"communicates incident response plan changes to organization-defined incident response personnel (identified by name and\/or by role) and organizational elements; and"}]},{"id":"ir-8.f_obj","name":"objective","props":[{"name":"label","value":"IR-8(f)"}],"prose":"protects the incident response plan from unauthorized disclosure and modification."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response planning\n\nincident response plan\n\nrecords of incident response plan reviews and approvals\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response planning responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational incident response plan and related organizational processes"}]}]}]},{"id":"ma","class":"family","title":"Maintenance","controls":[{"id":"ma-1","class":"SP800-53","title":"System Maintenance Policy and Procedures","params":[{"id":"ma-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ma-1_prm_2","label":"organization-defined frequency"},{"id":"ma-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MA-1"},{"name":"sort-id","value":"ma-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ma-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ma-1_prm_1 }}:","parts":[{"id":"ma-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system maintenance policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ma-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system maintenance policy and associated system maintenance controls; and"}]},{"id":"ma-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ma-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System maintenance policy {{ insert: param, ma-1_prm_2 }}; and"},{"id":"ma-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System maintenance procedures {{ insert: param, ma-1_prm_3 }}."}]}]},{"id":"ma-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the MA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ma-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-1.a_obj","name":"objective","props":[{"name":"label","value":"MA-1(a)"}],"parts":[{"id":"ma-1.a.1_obj","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)"}],"parts":[{"id":"ma-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1]"}],"prose":"develops and documents a system maintenance policy that addresses:","parts":[{"id":"ma-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ma-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ma-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ma-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ma-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ma-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ma-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ma-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system maintenance policy is to be disseminated;"},{"id":"ma-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[3]"}],"prose":"disseminates the system maintenance policy to organization-defined personnel or roles;"}]},{"id":"ma-1.a.2_obj","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)"}],"parts":[{"id":"ma-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the maintenance policy and associated system maintenance controls;"},{"id":"ma-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ma-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ma-1.b_obj","name":"objective","props":[{"name":"label","value":"MA-1(b)"}],"parts":[{"id":"ma-1.b.1_obj","name":"objective","props":[{"name":"label","value":"MA-1(b)(1)"}],"parts":[{"id":"ma-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system maintenance policy;"},{"id":"ma-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(b)(1)[2]"}],"prose":"reviews and updates the current system maintenance policy with the organization-defined frequency;"}]},{"id":"ma-1.b.2_obj","name":"objective","props":[{"name":"label","value":"MA-1(b)(2)"}],"parts":[{"id":"ma-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system maintenance procedures; and"},{"id":"ma-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(b)(2)[2]"}],"prose":"reviews and updates the current system maintenance procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Maintenance policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ma-2","class":"SP800-53","title":"Controlled Maintenance","params":[{"id":"ma-2_prm_1","label":"organization-defined personnel or roles"},{"id":"ma-2_prm_2","label":"organization-defined maintenance-related information"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-2"},{"name":"sort-id","value":"ma-02"}],"parts":[{"id":"ma-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Schedules, performs, documents, and reviews records of maintenance and repairs on information system components in accordance with manufacturer or vendor specifications and\/or organizational requirements;"},{"id":"ma-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Approves and monitors all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;"},{"id":"ma-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Requires that {{ insert: param, ma-2_prm_1 }} explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions; and"},{"id":"ma-2_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Includes {{ insert: param, ma-2_prm_2 }} in organizational maintenance records."}]},{"id":"ma-2_gdn","name":"guidance","prose":"This control addresses the information security aspects of the information system maintenance program and applies to all types of maintenance to any system component (including applications) conducted by any local or nonlocal entity (e.g., in-contract, warranty, in-house, software maintenance agreement). System maintenance also includes those components not directly associated with information processing and\/or data\/information retention such as scanners, copiers, and printers. Information necessary for creating effective maintenance records includes, for example: (i) date and time of maintenance; (ii) name of individuals or group performing the maintenance; (iii) name of escort, if necessary; (iv) a description of the maintenance performed; and (v) information system components\/equipment removed or replaced (including identification numbers, if applicable). The level of detail included in maintenance records can be informed by the security categories of organizational information systems. Organizations consider supply chain issues associated with replacement components for information systems.","links":[{"href":"#cm-3","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-6","rel":"related"},{"href":"#pe-16","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"ma-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-2.a_obj","name":"objective","props":[{"name":"label","value":"MA-2(a)"}],"parts":[{"id":"ma-2.a_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(a)[1]"}],"prose":"schedules maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.1.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[1][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.1.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[1][b]"}],"prose":"organizational requirements;"}]},{"id":"ma-2.a_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(a)[2]"}],"prose":"performs maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.2.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[2][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.2.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[2][b]"}],"prose":"organizational requirements;"}]},{"id":"ma-2.a_obj.3","name":"objective","props":[{"name":"label","value":"MA-2(a)[3]"}],"prose":"documents maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.3.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[3][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.3.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[3][b]"}],"prose":"organizational requirements;"}]},{"id":"ma-2.a_obj.4","name":"objective","props":[{"name":"label","value":"MA-2(a)[4]"}],"prose":"reviews records of maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.4.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[4][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.4.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[4][b]"}],"prose":"organizational requirements;"}]}]},{"id":"ma-2.b_obj","name":"objective","props":[{"name":"label","value":"MA-2(b)"}],"parts":[{"id":"ma-2.b_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(b)[1]"}],"prose":"approves all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;"},{"id":"ma-2.b_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(b)[2]"}],"prose":"monitors all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;"}]},{"id":"ma-2.c_obj","name":"objective","props":[{"name":"label","value":"MA-2(c)"}],"parts":[{"id":"ma-2.c_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(c)[1]"}],"prose":"defines personnel or roles required to explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2.c_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(c)[2]"}],"prose":"requires that organization-defined personnel or roles explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;"}]},{"id":"ma-2.d_obj","name":"objective","props":[{"name":"label","value":"MA-2(d)"}],"prose":"sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2.e_obj","name":"objective","props":[{"name":"label","value":"MA-2(e)"}],"prose":"checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions;"},{"id":"ma-2.f_obj","name":"objective","props":[{"name":"label","value":"MA-2(f)"}],"parts":[{"id":"ma-2.f_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(f)[1]"}],"prose":"defines maintenance-related information to be included in organizational maintenance records; and"},{"id":"ma-2.f_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(f)[2]"}],"prose":"includes organization-defined maintenance-related information in organizational maintenance records."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing controlled information system maintenance\n\nmaintenance records\n\nmanufacturer\/vendor maintenance specifications\n\nequipment sanitization records\n\nmedia sanitization records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel responsible for media sanitization\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for scheduling, performing, documenting, reviewing, approving, and monitoring maintenance and repairs for the information system\n\norganizational processes for sanitizing information system components\n\nautomated mechanisms supporting and\/or implementing controlled maintenance\n\nautomated mechanisms implementing sanitization of information system components"}]}]},{"id":"ma-4","class":"SP800-53","title":"Nonlocal Maintenance","props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-4"},{"name":"sort-id","value":"ma-04"}],"links":[{"href":"#d715b234-9b5b-4e07-b1ed-99836727664d","rel":"reference"},{"href":"#f2dbd4ec-c413-4714-b85b-6b7184d1c195","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#263823e0-a971-4b00-959d-315b26278b22","rel":"reference"},{"href":"#a4aa9645-9a8a-4b51-90a9-e223250f9a75","rel":"reference"}],"parts":[{"id":"ma-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Approves and monitors nonlocal maintenance and diagnostic activities;"},{"id":"ma-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Allows the use of nonlocal maintenance and diagnostic tools only as consistent with organizational policy and documented in the security plan for the information system;"},{"id":"ma-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions;"},{"id":"ma-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Maintains records for nonlocal maintenance and diagnostic activities; and"},{"id":"ma-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Terminates session and network connections when nonlocal maintenance is completed."}]},{"id":"ma-4_gdn","name":"guidance","prose":"Nonlocal maintenance and diagnostic activities are those activities conducted by individuals communicating through a network, either an external network (e.g., the Internet) or an internal network. Local maintenance and diagnostic activities are those activities carried out by individuals physically present at the information system or information system component and not communicating across a network connection. Authentication techniques used in the establishment of nonlocal maintenance and diagnostic sessions reflect the network access requirements in IA-2. Typically, strong authentication requires authenticators that are resistant to replay attacks and employ multifactor authentication. Strong authenticators include, for example, PKI where certificates are stored on a token protected by a password, passphrase, or biometric. Enforcing requirements in MA-4 is accomplished in part by other controls.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#ma-2","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#mp-6","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-10","rel":"related"},{"href":"#sc-17","rel":"related"}]},{"id":"ma-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-4.a_obj","name":"objective","props":[{"name":"label","value":"MA-4(a)"}],"parts":[{"id":"ma-4.a_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(a)[1]"}],"prose":"approves nonlocal maintenance and diagnostic activities;"},{"id":"ma-4.a_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(a)[2]"}],"prose":"monitors nonlocal maintenance and diagnostic activities;"}]},{"id":"ma-4.b_obj","name":"objective","props":[{"name":"label","value":"MA-4(b)"}],"prose":"allows the use of nonlocal maintenance and diagnostic tools only:","parts":[{"id":"ma-4.b_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(b)[1]"}],"prose":"as consistent with organizational policy;"},{"id":"ma-4.b_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(b)[2]"}],"prose":"as documented in the security plan for the information system;"}]},{"id":"ma-4.c_obj","name":"objective","props":[{"name":"label","value":"MA-4(c)"}],"prose":"employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions;"},{"id":"ma-4.d_obj","name":"objective","props":[{"name":"label","value":"MA-4(d)"}],"prose":"maintains records for nonlocal maintenance and diagnostic activities;"},{"id":"ma-4.e_obj","name":"objective","props":[{"name":"label","value":"MA-4(e)"}],"parts":[{"id":"ma-4.e_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(e)[1]"}],"prose":"terminates sessions when nonlocal maintenance or diagnostics is completed; and"},{"id":"ma-4.e_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(e)[2]"}],"prose":"terminates network connections when nonlocal maintenance or diagnostics is completed."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing nonlocal information system maintenance\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nmaintenance records\n\ndiagnostic records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing nonlocal maintenance\n\nautomated mechanisms implementing, supporting, and\/or managing nonlocal maintenance\n\nautomated mechanisms for strong authentication of nonlocal maintenance diagnostic sessions\n\nautomated mechanisms for terminating nonlocal maintenance sessions and network connections"}]}]},{"id":"ma-5","class":"SP800-53","title":"Maintenance Personnel","props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-5"},{"name":"sort-id","value":"ma-05"}],"parts":[{"id":"ma-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes a process for maintenance personnel authorization and maintains a list of authorized maintenance organizations or personnel;"},{"id":"ma-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and"},{"id":"ma-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations."}]},{"id":"ma-5_gdn","name":"guidance","prose":"This control applies to individuals performing hardware or software maintenance on organizational information systems, while PE-2 addresses physical access for individuals whose maintenance duties place them within the physical protection perimeter of the systems (e.g., custodial staff, physical plant maintenance personnel). Technical competence of supervising individuals relates to the maintenance performed on the information systems while having required access authorizations refers to maintenance on and near the systems. Individuals not previously identified as authorized maintenance personnel, such as information technology manufacturers, vendors, systems integrators, and consultants, may require privileged access to organizational information systems, for example, when required to conduct maintenance activities with little or no notice. Based on organizational assessments of risk, organizations may issue temporary credentials to these individuals. Temporary credentials may be for one-time use or for very limited time periods.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#ra-3","rel":"related"}]},{"id":"ma-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-5.a_obj","name":"objective","props":[{"name":"label","value":"MA-5(a)"}],"parts":[{"id":"ma-5.a_obj.1","name":"objective","props":[{"name":"label","value":"MA-5(a)[1]"}],"prose":"establishes a process for maintenance personnel authorization;"},{"id":"ma-5.a_obj.2","name":"objective","props":[{"name":"label","value":"MA-5(a)[2]"}],"prose":"maintains a list of authorized maintenance organizations or personnel;"}]},{"id":"ma-5.b_obj","name":"objective","props":[{"name":"label","value":"MA-5(b)"}],"prose":"ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and"},{"id":"ma-5.c_obj","name":"objective","props":[{"name":"label","value":"MA-5(c)"}],"prose":"designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing maintenance personnel\n\nservice provider contracts\n\nservice-level agreements\n\nlist of authorized personnel\n\nmaintenance records\n\naccess control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for authorizing and managing maintenance personnel\n\nautomated mechanisms supporting and\/or implementing authorization of maintenance personnel"}]}]}]},{"id":"mp","class":"family","title":"Media Protection","controls":[{"id":"mp-1","class":"SP800-53","title":"Media Protection Policy and Procedures","params":[{"id":"mp-1_prm_1","label":"organization-defined personnel or roles"},{"id":"mp-1_prm_2","label":"organization-defined frequency"},{"id":"mp-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-1"},{"name":"sort-id","value":"mp-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"mp-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, mp-1_prm_1 }}:","parts":[{"id":"mp-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A media protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"mp-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the media protection policy and associated media protection controls; and"}]},{"id":"mp-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"mp-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Media protection policy {{ insert: param, mp-1_prm_2 }}; and"},{"id":"mp-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Media protection procedures {{ insert: param, mp-1_prm_3 }}."}]}]},{"id":"mp-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the MP family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"mp-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-1.a_obj","name":"objective","props":[{"name":"label","value":"MP-1(a)"}],"parts":[{"id":"mp-1.a.1_obj","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)"}],"parts":[{"id":"mp-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1]"}],"prose":"develops and documents a media protection policy that addresses:","parts":[{"id":"mp-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"mp-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"mp-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"mp-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"mp-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"mp-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"mp-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"mp-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the media protection policy is to be disseminated;"},{"id":"mp-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[3]"}],"prose":"disseminates the media protection policy to organization-defined personnel or roles;"}]},{"id":"mp-1.a.2_obj","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)"}],"parts":[{"id":"mp-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the media protection policy and associated media protection controls;"},{"id":"mp-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"mp-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"mp-1.b_obj","name":"objective","props":[{"name":"label","value":"MP-1(b)"}],"parts":[{"id":"mp-1.b.1_obj","name":"objective","props":[{"name":"label","value":"MP-1(b)(1)"}],"parts":[{"id":"mp-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current media protection policy;"},{"id":"mp-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(b)(1)[2]"}],"prose":"reviews and updates the current media protection policy with the organization-defined frequency;"}]},{"id":"mp-1.b.2_obj","name":"objective","props":[{"name":"label","value":"MP-1(b)(2)"}],"parts":[{"id":"mp-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current media protection procedures; and"},{"id":"mp-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(b)(2)[2]"}],"prose":"reviews and updates the current media protection procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Media protection policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with media protection responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"mp-2","class":"SP800-53","title":"Media Access","params":[{"id":"mp-2_prm_1","label":"organization-defined types of digital and\/or non-digital media"},{"id":"mp-2_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-2"},{"name":"sort-id","value":"mp-02"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","rel":"reference"}],"parts":[{"id":"mp-2_smt","name":"statement","prose":"The organization restricts access to {{ insert: param, mp-2_prm_1 }} to {{ insert: param, mp-2_prm_2 }}."},{"id":"mp-2_gdn","name":"guidance","prose":"Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. Restricting non-digital media access includes, for example, denying access to patient medical records in a community hospital unless the individuals seeking access to such records are authorized healthcare providers. Restricting access to digital media includes, for example, limiting access to design specifications stored on compact disks in the media library to the project leader and the individuals on the development team.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pl-2","rel":"related"}]},{"id":"mp-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-2_obj.1","name":"objective","props":[{"name":"label","value":"MP-2[1]"}],"prose":"defines types of digital and\/or non-digital media requiring restricted access;"},{"id":"mp-2_obj.2","name":"objective","props":[{"name":"label","value":"MP-2[2]"}],"prose":"defines personnel or roles authorized to access organization-defined types of digital and\/or non-digital media; and"},{"id":"mp-2_obj.3","name":"objective","props":[{"name":"label","value":"MP-2[3]"}],"prose":"restricts access to organization-defined types of digital and\/or non-digital media to organization-defined personnel or roles."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media access restrictions\n\naccess control policy and procedures\n\nphysical and environmental protection policy and procedures\n\nmedia storage facilities\n\naccess control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media protection responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for restricting information media\n\nautomated mechanisms supporting and\/or implementing media access restrictions"}]}]},{"id":"mp-6","class":"SP800-53","title":"Media Sanitization","params":[{"id":"mp-6_prm_1","label":"organization-defined information system media"},{"id":"mp-6_prm_2","label":"organization-defined sanitization techniques and procedures"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-6"},{"name":"sort-id","value":"mp-06"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"},{"href":"#263823e0-a971-4b00-959d-315b26278b22","rel":"reference"},{"href":"#a47466c4-c837-4f06-a39f-e68412a5f73d","rel":"reference"}],"parts":[{"id":"mp-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Sanitizes {{ insert: param, mp-6_prm_1 }} prior to disposal, release out of organizational control, or release for reuse using {{ insert: param, mp-6_prm_2 }} in accordance with applicable federal and organizational standards and policies; and"},{"id":"mp-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Employs sanitization mechanisms with the strength and integrity commensurate with the security category or classification of the information."}]},{"id":"mp-6_gdn","name":"guidance","prose":"This control applies to all information system media, both digital and non-digital, subject to disposal or reuse, whether or not the media is considered removable. Examples include media found in scanners, copiers, printers, notebook computers, workstations, network components, and mobile devices. The sanitization process removes information from the media such that the information cannot be retrieved or reconstructed. Sanitization techniques, including clearing, purging, cryptographic erase, and destruction, prevent the disclosure of information to unauthorized individuals when such media is reused or released for disposal. Organizations determine the appropriate sanitization methods recognizing that destruction is sometimes necessary when other methods cannot be applied to media requiring sanitization. Organizations use discretion on the employment of approved sanitization techniques and procedures for media containing information deemed to be in the public domain or publicly releasable, or deemed to have no adverse impact on organizations or individuals if released for reuse or disposal. Sanitization of non-digital media includes, for example, removing a classified appendix from an otherwise unclassified document, or redacting selected sections or words from a document by obscuring the redacted sections\/words in a manner equivalent in effectiveness to removing them from the document. NSA standards and policies control the sanitization process for media containing classified information.","links":[{"href":"#ma-2","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-4","rel":"related"}]},{"id":"mp-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-6.a_obj","name":"objective","props":[{"name":"label","value":"MP-6(a)"}],"parts":[{"id":"mp-6.a_obj.1","name":"objective","props":[{"name":"label","value":"MP-6(a)[1]"}],"prose":"defines information system media to be sanitized prior to:","parts":[{"id":"mp-6.a_obj.1.a","name":"objective","props":[{"name":"label","value":"MP-6(a)[1][a]"}],"prose":"disposal;"},{"id":"mp-6.a_obj.1.b","name":"objective","props":[{"name":"label","value":"MP-6(a)[1][b]"}],"prose":"release out of organizational control; or"},{"id":"mp-6.a_obj.1.c","name":"objective","props":[{"name":"label","value":"MP-6(a)[1][c]"}],"prose":"release for reuse;"}]},{"id":"mp-6.a_obj.2","name":"objective","props":[{"name":"label","value":"MP-6(a)[2]"}],"prose":"defines sanitization techniques or procedures to be used for sanitizing organization-defined information system media prior to:","parts":[{"id":"mp-6.a_obj.2.a","name":"objective","props":[{"name":"label","value":"MP-6(a)[2][a]"}],"prose":"disposal;"},{"id":"mp-6.a_obj.2.b","name":"objective","props":[{"name":"label","value":"MP-6(a)[2][b]"}],"prose":"release out of organizational control; or"},{"id":"mp-6.a_obj.2.c","name":"objective","props":[{"name":"label","value":"MP-6(a)[2][c]"}],"prose":"release for reuse;"}]},{"id":"mp-6.a_obj.3","name":"objective","props":[{"name":"label","value":"MP-6(a)[3]"}],"prose":"sanitizes organization-defined information system media prior to disposal, release out of organizational control, or release for reuse using organization-defined sanitization techniques or procedures in accordance with applicable federal and organizational standards and policies; and"}]},{"id":"mp-6.b_obj","name":"objective","props":[{"name":"label","value":"MP-6(b)"}],"prose":"employs sanitization mechanisms with strength and integrity commensurate with the security category or classification of the information."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media sanitization and disposal\n\napplicable federal standards and policies addressing media sanitization\n\nmedia sanitization records\n\naudit records\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with media sanitization responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media sanitization\n\nautomated mechanisms supporting and\/or implementing media sanitization"}]}]},{"id":"mp-7","class":"SP800-53","title":"Media Use","params":[{"id":"mp-7_prm_1","select":{"choice":["restricts","prohibits"]}},{"id":"mp-7_prm_2","label":"organization-defined types of information system media"},{"id":"mp-7_prm_3","label":"organization-defined information systems or system components"},{"id":"mp-7_prm_4","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-7"},{"name":"sort-id","value":"mp-07"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","rel":"reference"}],"parts":[{"id":"mp-7_smt","name":"statement","prose":"The organization {{ insert: param, mp-7_prm_1 }} the use of {{ insert: param, mp-7_prm_2 }} on {{ insert: param, mp-7_prm_3 }} using {{ insert: param, mp-7_prm_4 }}."},{"id":"mp-7_gdn","name":"guidance","prose":"Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. This control also applies to mobile devices with information storage capability (e.g., smart phones, tablets, E-readers). In contrast to MP-2, which restricts user access to media, this control restricts the use of certain types of media on information systems, for example, restricting\/prohibiting the use of flash drives or external hard disk drives. Organizations can employ technical and nontechnical safeguards (e.g., policies, procedures, rules of behavior) to restrict the use of information system media. Organizations may restrict the use of portable storage devices, for example, by using physical cages on workstations to prohibit access to certain external ports, or disabling\/removing the ability to insert, read or write to such devices. Organizations may also limit the use of portable storage devices to only approved devices including, for example, devices provided by the organization, devices provided by other approved organizations, and devices that are not personally owned. Finally, organizations may restrict the use of portable storage devices based on the type of device, for example, prohibiting the use of writeable, portable storage devices, and implementing this restriction by disabling or removing the capability to write to such devices.","links":[{"href":"#ac-19","rel":"related"},{"href":"#pl-4","rel":"related"}]},{"id":"mp-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-7_obj.1","name":"objective","props":[{"name":"label","value":"MP-7[1]"}],"prose":"defines types of information system media to be:","parts":[{"id":"mp-7_obj.1.a","name":"objective","props":[{"name":"label","value":"MP-7[1][a]"}],"prose":"restricted on information systems or system components; or"},{"id":"mp-7_obj.1.b","name":"objective","props":[{"name":"label","value":"MP-7[1][b]"}],"prose":"prohibited from use on information systems or system components;"}]},{"id":"mp-7_obj.2","name":"objective","props":[{"name":"label","value":"MP-7[2]"}],"prose":"defines information systems or system components on which the use of organization-defined types of information system media is to be one of the following:","parts":[{"id":"mp-7_obj.2.a","name":"objective","props":[{"name":"label","value":"MP-7[2][a]"}],"prose":"restricted; or"},{"id":"mp-7_obj.2.b","name":"objective","props":[{"name":"label","value":"MP-7[2][b]"}],"prose":"prohibited;"}]},{"id":"mp-7_obj.3","name":"objective","props":[{"name":"label","value":"MP-7[3]"}],"prose":"defines security safeguards to be employed to restrict or prohibit the use of organization-defined types of information system media on organization-defined information systems or system components; and"},{"id":"mp-7_obj.4","name":"objective","props":[{"name":"label","value":"MP-7[4]"}],"prose":"restricts or prohibits the use of organization-defined information system media on organization-defined information systems or system components using organization-defined security safeguards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nsystem use policy\n\nprocedures addressing media usage restrictions\n\nsecurity plan\n\nrules of behavior\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media use responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media use\n\nautomated mechanisms restricting or prohibiting use of information system media on information systems or system components"}]}]}]},{"id":"pe","class":"family","title":"Physical and Environmental Protection","controls":[{"id":"pe-1","class":"SP800-53","title":"Physical and Environmental Protection Policy and Procedures","params":[{"id":"pe-1_prm_1","label":"organization-defined personnel or roles"},{"id":"pe-1_prm_2","label":"organization-defined frequency"},{"id":"pe-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-1"},{"name":"sort-id","value":"pe-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"pe-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, pe-1_prm_1 }}:","parts":[{"id":"pe-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A physical and environmental protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"pe-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls; and"}]},{"id":"pe-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"pe-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Physical and environmental protection policy {{ insert: param, pe-1_prm_2 }}; and"},{"id":"pe-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Physical and environmental protection procedures {{ insert: param, pe-1_prm_3 }}."}]}]},{"id":"pe-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the PE family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"pe-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-1.a_obj","name":"objective","props":[{"name":"label","value":"PE-1(a)"}],"parts":[{"id":"pe-1.a.1_obj","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)"}],"parts":[{"id":"pe-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1]"}],"prose":"develops and documents a physical and environmental protection policy that addresses:","parts":[{"id":"pe-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"pe-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"pe-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"pe-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"pe-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"pe-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"pe-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"pe-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the physical and environmental protection policy is to be disseminated;"},{"id":"pe-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[3]"}],"prose":"disseminates the physical and environmental protection policy to organization-defined personnel or roles;"}]},{"id":"pe-1.a.2_obj","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)"}],"parts":[{"id":"pe-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls;"},{"id":"pe-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"pe-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"pe-1.b_obj","name":"objective","props":[{"name":"label","value":"PE-1(b)"}],"parts":[{"id":"pe-1.b.1_obj","name":"objective","props":[{"name":"label","value":"PE-1(b)(1)"}],"parts":[{"id":"pe-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current physical and environmental protection policy;"},{"id":"pe-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(b)(1)[2]"}],"prose":"reviews and updates the current physical and environmental protection policy with the organization-defined frequency;"}]},{"id":"pe-1.b.2_obj","name":"objective","props":[{"name":"label","value":"PE-1(b)(2)"}],"parts":[{"id":"pe-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current physical and environmental protection procedures; and"},{"id":"pe-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(b)(2)[2]"}],"prose":"reviews and updates the current physical and environmental protection procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical and environmental protection responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"pe-2","class":"SP800-53","title":"Physical Access Authorizations","params":[{"id":"pe-2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-2"},{"name":"sort-id","value":"pe-02"}],"parts":[{"id":"pe-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, approves, and maintains a list of individuals with authorized access to the facility where the information system resides;"},{"id":"pe-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Issues authorization credentials for facility access;"},{"id":"pe-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the access list detailing authorized facility access by individuals {{ insert: param, pe-2_prm_1 }}; and"},{"id":"pe-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Removes individuals from the facility access list when access is no longer required."}]},{"id":"pe-2_gdn","name":"guidance","prose":"This control applies to organizational employees and visitors. Individuals (e.g., employees, contractors, and others) with permanent physical access authorization credentials are not considered visitors. Authorization credentials include, for example, badges, identification cards, and smart cards. Organizations determine the strength of authorization credentials needed (including level of forge-proof badges, smart cards, or identification cards) consistent with federal standards, policies, and procedures. This control only applies to areas within facilities that have not been designated as publicly accessible.","links":[{"href":"#pe-3","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#ps-3","rel":"related"}]},{"id":"pe-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-2.a_obj","name":"objective","props":[{"name":"label","value":"PE-2(a)"}],"parts":[{"id":"pe-2.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-2(a)[1]"}],"prose":"develops a list of individuals with authorized access to the facility where the information system resides;"},{"id":"pe-2.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-2(a)[2]"}],"prose":"approves a list of individuals with authorized access to the facility where the information system resides;"},{"id":"pe-2.a_obj.3","name":"objective","props":[{"name":"label","value":"PE-2(a)[3]"}],"prose":"maintains a list of individuals with authorized access to the facility where the information system resides;"}]},{"id":"pe-2.b_obj","name":"objective","props":[{"name":"label","value":"PE-2(b)"}],"prose":"issues authorization credentials for facility access;"},{"id":"pe-2.c_obj","name":"objective","props":[{"name":"label","value":"PE-2(c)"}],"parts":[{"id":"pe-2.c_obj.1","name":"objective","props":[{"name":"label","value":"PE-2(c)[1]"}],"prose":"defines the frequency to review the access list detailing authorized facility access by individuals;"},{"id":"pe-2.c_obj.2","name":"objective","props":[{"name":"label","value":"PE-2(c)[2]"}],"prose":"reviews the access list detailing authorized facility access by individuals with the organization-defined frequency; and"}]},{"id":"pe-2.d_obj","name":"objective","props":[{"name":"label","value":"PE-2(d)"}],"prose":"removes individuals from the facility access list when access is no longer required."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access authorizations\n\nsecurity plan\n\nauthorized personnel access list\n\nauthorization credentials\n\nphysical access list reviews\n\nphysical access termination records and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access authorization responsibilities\n\norganizational personnel with physical access to information system facility\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for physical access authorizations\n\nautomated mechanisms supporting and\/or implementing physical access authorizations"}]}]},{"id":"pe-3","class":"SP800-53","title":"Physical Access Control","params":[{"id":"pe-3_prm_1","label":"organization-defined entry\/exit points to the facility where the information system resides"},{"id":"pe-3_prm_2","select":{"how-many":"one-or-more","choice":[" {{ insert: param, pe-3_prm_3 }} ","guards"]}},{"id":"pe-3_prm_3","depends-on":"pe-3_prm_2","label":"organization-defined physical access control systems\/devices"},{"id":"pe-3_prm_4","label":"organization-defined entry\/exit points"},{"id":"pe-3_prm_5","label":"organization-defined security safeguards"},{"id":"pe-3_prm_6","label":"organization-defined circumstances requiring visitor escorts and monitoring"},{"id":"pe-3_prm_7","label":"organization-defined physical access devices"},{"id":"pe-3_prm_8","label":"organization-defined frequency"},{"id":"pe-3_prm_9","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-3"},{"name":"sort-id","value":"pe-03"}],"links":[{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#2157bb7e-192c-4eaa-877f-93ef6b0a3292","rel":"reference"},{"href":"#6caa237b-531b-43ac-9711-d8f6b97b0377","rel":"reference"},{"href":"#398e33fd-f404-4e5c-b90e-2d50d3181244","rel":"reference"},{"href":"#61081e7f-041d-4033-96a7-44a439071683","rel":"reference"},{"href":"#dd2f5acd-08f1-435a-9837-f8203088dc1a","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"},{"href":"#5ed1f4d5-1494-421b-97ed-39d3c88ab51f","rel":"reference"}],"parts":[{"id":"pe-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Enforces physical access authorizations at {{ insert: param, pe-3_prm_1 }} by;","parts":[{"id":"pe-3_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Verifying individual access authorizations before granting access to the facility; and"},{"id":"pe-3_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Controlling ingress\/egress to the facility using {{ insert: param, pe-3_prm_2 }};"}]},{"id":"pe-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Maintains physical access audit logs for {{ insert: param, pe-3_prm_4 }};"},{"id":"pe-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Provides {{ insert: param, pe-3_prm_5 }} to control access to areas within the facility officially designated as publicly accessible;"},{"id":"pe-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Escorts visitors and monitors visitor activity {{ insert: param, pe-3_prm_6 }};"},{"id":"pe-3_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Secures keys, combinations, and other physical access devices;"},{"id":"pe-3_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Inventories {{ insert: param, pe-3_prm_7 }} every {{ insert: param, pe-3_prm_8 }}; and"},{"id":"pe-3_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Changes combinations and keys {{ insert: param, pe-3_prm_9 }} and\/or when keys are lost, combinations are compromised, or individuals are transferred or terminated."}]},{"id":"pe-3_gdn","name":"guidance","prose":"This control applies to organizational employees and visitors. Individuals (e.g., employees, contractors, and others) with permanent physical access authorization credentials are not considered visitors. Organizations determine the types of facility guards needed including, for example, professional physical security staff or other personnel such as administrative staff or information system users. Physical access devices include, for example, keys, locks, combinations, and card readers. Safeguards for publicly accessible areas within organizational facilities include, for example, cameras, monitoring by guards, and isolating selected information systems and\/or system components in secured areas. Physical access control systems comply with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. The Federal Identity, Credential, and Access Management Program provides implementation guidance for identity, credential, and access management capabilities for physical access control systems. Organizations have flexibility in the types of audit logs employed. Audit logs can be procedural (e.g., a written log of individuals accessing the facility and when such access occurred), automated (e.g., capturing ID provided by a PIV card), or some combination thereof. Physical access points can include facility access points, interior access points to information systems and\/or components requiring supplemental access controls, or both. Components of organizational information systems (e.g., workstations, terminals) may be located in areas designated as publicly accessible with organizations safeguarding access to such devices.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#pe-5","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ra-3","rel":"related"}]},{"id":"pe-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-3.a_obj","name":"objective","props":[{"name":"label","value":"PE-3(a)"}],"parts":[{"id":"pe-3.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(a)[1]"}],"prose":"defines entry\/exit points to the facility where the information system resides;"},{"id":"pe-3.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2]"}],"prose":"enforces physical access authorizations at organization-defined entry\/exit points to the facility where the information system resides by:","parts":[{"id":"pe-3.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](1)"}],"prose":"verifying individual access authorizations before granting access to the facility;"},{"id":"pe-3.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)"}],"parts":[{"id":"pe-3.a.2_obj.2.a","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[a]"}],"prose":"defining physical access control systems\/devices to be employed to control ingress\/egress to the facility where the information system resides;"},{"id":"pe-3.a.2_obj.2.b","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[b]"}],"prose":"using one or more of the following ways to control ingress\/egress to the facility:","parts":[{"id":"pe-3.a.2_obj.2.b.1","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[b][1]"}],"prose":"organization-defined physical access control systems\/devices; and\/or"},{"id":"pe-3.a.2_obj.2.b.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[b][2]"}],"prose":"guards;"}]}]}]}]},{"id":"pe-3.b_obj","name":"objective","props":[{"name":"label","value":"PE-3(b)"}],"parts":[{"id":"pe-3.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(b)[1]"}],"prose":"defines entry\/exit points for which physical access audit logs are to be maintained;"},{"id":"pe-3.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(b)[2]"}],"prose":"maintains physical access audit logs for organization-defined entry\/exit points;"}]},{"id":"pe-3.c_obj","name":"objective","props":[{"name":"label","value":"PE-3(c)"}],"parts":[{"id":"pe-3.c_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(c)[1]"}],"prose":"defines security safeguards to be employed to control access to areas within the facility officially designated as publicly accessible;"},{"id":"pe-3.c_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(c)[2]"}],"prose":"provides organization-defined security safeguards to control access to areas within the facility officially designated as publicly accessible;"}]},{"id":"pe-3.d_obj","name":"objective","props":[{"name":"label","value":"PE-3(d)"}],"parts":[{"id":"pe-3.d_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(d)[1]"}],"prose":"defines circumstances requiring visitor:","parts":[{"id":"pe-3.d_obj.1.a","name":"objective","props":[{"name":"label","value":"PE-3(d)[1][a]"}],"prose":"escorts;"},{"id":"pe-3.d_obj.1.b","name":"objective","props":[{"name":"label","value":"PE-3(d)[1][b]"}],"prose":"monitoring;"}]},{"id":"pe-3.d_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(d)[2]"}],"prose":"in accordance with organization-defined circumstances requiring visitor escorts and monitoring:","parts":[{"id":"pe-3.d_obj.2.a","name":"objective","props":[{"name":"label","value":"PE-3(d)[2][a]"}],"prose":"escorts visitors;"},{"id":"pe-3.d_obj.2.b","name":"objective","props":[{"name":"label","value":"PE-3(d)[2][b]"}],"prose":"monitors visitor activities;"}]}]},{"id":"pe-3.e_obj","name":"objective","props":[{"name":"label","value":"PE-3(e)"}],"parts":[{"id":"pe-3.e_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(e)[1]"}],"prose":"secures keys;"},{"id":"pe-3.e_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(e)[2]"}],"prose":"secures combinations;"},{"id":"pe-3.e_obj.3","name":"objective","props":[{"name":"label","value":"PE-3(e)[3]"}],"prose":"secures other physical access devices;"}]},{"id":"pe-3.f_obj","name":"objective","props":[{"name":"label","value":"PE-3(f)"}],"parts":[{"id":"pe-3.f_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(f)[1]"}],"prose":"defines physical access devices to be inventoried;"},{"id":"pe-3.f_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(f)[2]"}],"prose":"defines the frequency to inventory organization-defined physical access devices;"},{"id":"pe-3.f_obj.3","name":"objective","props":[{"name":"label","value":"PE-3(f)[3]"}],"prose":"inventories the organization-defined physical access devices with the organization-defined frequency;"}]},{"id":"pe-3.g_obj","name":"objective","props":[{"name":"label","value":"PE-3(g)"}],"parts":[{"id":"pe-3.g_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(g)[1]"}],"prose":"defines the frequency to change combinations and keys; and"},{"id":"pe-3.g_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(g)[2]"}],"prose":"changes combinations and keys with the organization-defined frequency and\/or when:","parts":[{"id":"pe-3.g_obj.2.a","name":"objective","props":[{"name":"label","value":"PE-3(g)[2][a]"}],"prose":"keys are lost;"},{"id":"pe-3.g_obj.2.b","name":"objective","props":[{"name":"label","value":"PE-3(g)[2][b]"}],"prose":"combinations are compromised;"},{"id":"pe-3.g_obj.2.c","name":"objective","props":[{"name":"label","value":"PE-3(g)[2][c]"}],"prose":"individuals are transferred or terminated."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access control\n\nsecurity plan\n\nphysical access control logs or records\n\ninventory records of physical access control devices\n\ninformation system entry and exit points\n\nrecords of key and lock combination changes\n\nstorage locations for physical access control devices\n\nphysical access control devices\n\nlist of security safeguards controlling access to designated publicly accessible areas within facility\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access control responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for physical access control\n\nautomated mechanisms supporting and\/or implementing physical access control\n\nphysical access control devices"}]}]},{"id":"pe-6","class":"SP800-53","title":"Monitoring Physical Access","params":[{"id":"pe-6_prm_1","label":"organization-defined frequency"},{"id":"pe-6_prm_2","label":"organization-defined events or potential indications of events"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-6"},{"name":"sort-id","value":"pe-06"}],"parts":[{"id":"pe-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Monitors physical access to the facility where the information system resides to detect and respond to physical security incidents;"},{"id":"pe-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews physical access logs {{ insert: param, pe-6_prm_1 }} and upon occurrence of {{ insert: param, pe-6_prm_2 }}; and"},{"id":"pe-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Coordinates results of reviews and investigations with the organizational incident response capability."}]},{"id":"pe-6_gdn","name":"guidance","prose":"Organizational incident response capabilities include investigations of and responses to detected physical security incidents. Security incidents include, for example, apparent security violations or suspicious physical access activities. Suspicious physical access activities include, for example: (i) accesses outside of normal work hours; (ii) repeated accesses to areas not normally accessed; (iii) accesses for unusual lengths of time; and (iv) out-of-sequence accesses.","links":[{"href":"#ca-7","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"pe-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-6.a_obj","name":"objective","props":[{"name":"label","value":"PE-6(a)"}],"prose":"monitors physical access to the facility where the information system resides to detect and respond to physical security incidents;"},{"id":"pe-6.b_obj","name":"objective","props":[{"name":"label","value":"PE-6(b)"}],"parts":[{"id":"pe-6.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-6(b)[1]"}],"prose":"defines the frequency to review physical access logs;"},{"id":"pe-6.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-6(b)[2]"}],"prose":"defines events or potential indication of events requiring physical access logs to be reviewed;"},{"id":"pe-6.b_obj.3","name":"objective","props":[{"name":"label","value":"PE-6(b)[3]"}],"prose":"reviews physical access logs with the organization-defined frequency and upon occurrence of organization-defined events or potential indications of events; and"}]},{"id":"pe-6.c_obj","name":"objective","props":[{"name":"label","value":"PE-6(c)"}],"prose":"coordinates results of reviews and investigations with the organizational incident response capability."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access monitoring\n\nsecurity plan\n\nphysical access logs or records\n\nphysical access monitoring records\n\nphysical access log reviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access monitoring responsibilities\n\norganizational personnel with incident response responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring physical access\n\nautomated mechanisms supporting and\/or implementing physical access monitoring\n\nautomated mechanisms supporting and\/or implementing reviewing of physical access logs"}]}]},{"id":"pe-8","class":"SP800-53","title":"Visitor Access Records","params":[{"id":"pe-8_prm_1","label":"organization-defined time period"},{"id":"pe-8_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"PE-8"},{"name":"sort-id","value":"pe-08"}],"parts":[{"id":"pe-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Maintains visitor access records to the facility where the information system resides for {{ insert: param, pe-8_prm_1 }}; and"},{"id":"pe-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews visitor access records {{ insert: param, pe-8_prm_2 }}."}]},{"id":"pe-8_gdn","name":"guidance","prose":"Visitor access records include, for example, names and organizations of persons visiting, visitor signatures, forms of identification, dates of access, entry and departure times, purposes of visits, and names and organizations of persons visited. Visitor access records are not required for publicly accessible areas."},{"id":"pe-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-8.a_obj","name":"objective","props":[{"name":"label","value":"PE-8(a)"}],"parts":[{"id":"pe-8.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-8(a)[1]"}],"prose":"defines the time period to maintain visitor access records to the facility where the information system resides;"},{"id":"pe-8.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-8(a)[2]"}],"prose":"maintains visitor access records to the facility where the information system resides for the organization-defined time period;"}]},{"id":"pe-8.b_obj","name":"objective","props":[{"name":"label","value":"PE-8(b)"}],"parts":[{"id":"pe-8.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-8(b)[1]"}],"prose":"defines the frequency to review visitor access records; and"},{"id":"pe-8.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-8(b)[2]"}],"prose":"reviews visitor access records with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing visitor access records\n\nsecurity plan\n\nvisitor access control logs or records\n\nvisitor access record or log reviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with visitor access records responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for maintaining and reviewing visitor access records\n\nautomated mechanisms supporting and\/or implementing maintenance and review of visitor access records"}]}]},{"id":"pe-12","class":"SP800-53","title":"Emergency Lighting","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-12"},{"name":"sort-id","value":"pe-12"}],"parts":[{"id":"pe-12_smt","name":"statement","prose":"The organization employs and maintains automatic emergency lighting for the information system that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility."},{"id":"pe-12_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-7","rel":"related"}]},{"id":"pe-12_obj","name":"objective","prose":"Determine if the organization employs and maintains automatic emergency lighting for the information system that:","parts":[{"id":"pe-12_obj.1","name":"objective","props":[{"name":"label","value":"PE-12[1]"}],"prose":"activates in the event of a power outage or disruption; and"},{"id":"pe-12_obj.2","name":"objective","props":[{"name":"label","value":"PE-12[2]"}],"prose":"covers emergency exits and evacuation routes within the facility."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing emergency lighting\n\nemergency lighting documentation\n\nemergency lighting test records\n\nemergency exits and evacuation routes\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for emergency lighting and\/or planning\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing emergency lighting capability"}]}]},{"id":"pe-13","class":"SP800-53","title":"Fire Protection","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-13"},{"name":"sort-id","value":"pe-13"}],"parts":[{"id":"pe-13_smt","name":"statement","prose":"The organization employs and maintains fire suppression and detection devices\/systems for the information system that are supported by an independent energy source."},{"id":"pe-13_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms. Fire suppression and detection devices\/systems include, for example, sprinkler systems, handheld fire extinguishers, fixed fire hoses, and smoke detectors."},{"id":"pe-13_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-13_obj.1","name":"objective","props":[{"name":"label","value":"PE-13[1]"}],"prose":"employs fire suppression and detection devices\/systems for the information system that are supported by an independent energy source; and"},{"id":"pe-13_obj.2","name":"objective","props":[{"name":"label","value":"PE-13[2]"}],"prose":"maintains fire suppression and detection devices\/systems for the information system that are supported by an independent energy source."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing fire protection\n\nfire suppression and detection devices\/systems\n\nfire suppression and detection devices\/systems documentation\n\ntest records of fire suppression and detection devices\/systems\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for fire detection and suppression devices\/systems\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing fire suppression\/detection devices\/systems"}]}]},{"id":"pe-14","class":"SP800-53","title":"Temperature and Humidity Controls","params":[{"id":"pe-14_prm_1","label":"organization-defined acceptable levels"},{"id":"pe-14_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-14"},{"name":"sort-id","value":"pe-14"}],"parts":[{"id":"pe-14_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-14_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Maintains temperature and humidity levels within the facility where the information system resides at {{ insert: param, pe-14_prm_1 }}; and"},{"id":"pe-14_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Monitors temperature and humidity levels {{ insert: param, pe-14_prm_2 }}."}]},{"id":"pe-14_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources, for example, data centers, server rooms, and mainframe computer rooms.","links":[{"href":"#at-3","rel":"related"}]},{"id":"pe-14_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-14.a_obj","name":"objective","props":[{"name":"label","value":"PE-14(a)"}],"parts":[{"id":"pe-14.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-14(a)[1]"}],"prose":"defines acceptable temperature levels to be maintained within the facility where the information system resides;"},{"id":"pe-14.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-14(a)[2]"}],"prose":"defines acceptable humidity levels to be maintained within the facility where the information system resides;"},{"id":"pe-14.a_obj.3","name":"objective","props":[{"name":"label","value":"PE-14(a)[3]"}],"prose":"maintains temperature levels within the facility where the information system resides at the organization-defined levels;"},{"id":"pe-14.a_obj.4","name":"objective","props":[{"name":"label","value":"PE-14(a)[4]"}],"prose":"maintains humidity levels within the facility where the information system resides at the organization-defined levels;"}]},{"id":"pe-14.b_obj","name":"objective","props":[{"name":"label","value":"PE-14(b)"}],"parts":[{"id":"pe-14.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-14(b)[1]"}],"prose":"defines the frequency to monitor temperature levels;"},{"id":"pe-14.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-14(b)[2]"}],"prose":"defines the frequency to monitor humidity levels;"},{"id":"pe-14.b_obj.3","name":"objective","props":[{"name":"label","value":"PE-14(b)[3]"}],"prose":"monitors temperature levels with the organization-defined frequency; and"},{"id":"pe-14.b_obj.4","name":"objective","props":[{"name":"label","value":"PE-14(b)[4]"}],"prose":"monitors humidity levels with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing temperature and humidity control\n\nsecurity plan\n\ntemperature and humidity controls\n\nfacility housing the information system\n\ntemperature and humidity controls documentation\n\ntemperature and humidity records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for information system environmental controls\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing maintenance and monitoring of temperature and humidity levels"}]}]},{"id":"pe-15","class":"SP800-53","title":"Water Damage Protection","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-15"},{"name":"sort-id","value":"pe-15"}],"parts":[{"id":"pe-15_smt","name":"statement","prose":"The organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are accessible, working properly, and known to key personnel."},{"id":"pe-15_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms. Isolation valves can be employed in addition to or in lieu of master shutoff valves to shut off water supplies in specific areas of concern, without affecting entire organizations.","links":[{"href":"#at-3","rel":"related"}]},{"id":"pe-15_obj","name":"objective","prose":"Determine if the organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are:","parts":[{"id":"pe-15_obj.1","name":"objective","props":[{"name":"label","value":"PE-15[1]"}],"prose":"accessible;"},{"id":"pe-15_obj.2","name":"objective","props":[{"name":"label","value":"PE-15[2]"}],"prose":"working properly; and"},{"id":"pe-15_obj.3","name":"objective","props":[{"name":"label","value":"PE-15[3]"}],"prose":"known to key personnel."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing water damage protection\n\nfacility housing the information system\n\nmaster shutoff valves\n\nlist of key personnel with knowledge of location and activation procedures for master shutoff valves for the plumbing system\n\nmaster shutoff valve documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for information system environmental controls\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Master water-shutoff valves\n\norganizational process for activating master water-shutoff"}]}]},{"id":"pe-16","class":"SP800-53","title":"Delivery and Removal","params":[{"id":"pe-16_prm_1","label":"organization-defined types of information system components"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PE-16"},{"name":"sort-id","value":"pe-16"}],"parts":[{"id":"pe-16_smt","name":"statement","prose":"The organization authorizes, monitors, and controls {{ insert: param, pe-16_prm_1 }} entering and exiting the facility and maintains records of those items."},{"id":"pe-16_gdn","name":"guidance","prose":"Effectively enforcing authorizations for entry and exit of information system components may require restricting access to delivery areas and possibly isolating the areas from the information system and media libraries.","links":[{"href":"#cm-3","rel":"related"},{"href":"#ma-2","rel":"related"},{"href":"#ma-3","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#sa-12","rel":"related"}]},{"id":"pe-16_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-16_obj.1","name":"objective","props":[{"name":"label","value":"PE-16[1]"}],"prose":"defines types of information system components to be authorized, monitored, and controlled as such components are entering and exiting the facility;"},{"id":"pe-16_obj.2","name":"objective","props":[{"name":"label","value":"PE-16[2]"}],"prose":"authorizes organization-defined information system components entering the facility;"},{"id":"pe-16_obj.3","name":"objective","props":[{"name":"label","value":"PE-16[3]"}],"prose":"monitors organization-defined information system components entering the facility;"},{"id":"pe-16_obj.4","name":"objective","props":[{"name":"label","value":"PE-16[4]"}],"prose":"controls organization-defined information system components entering the facility;"},{"id":"pe-16_obj.5","name":"objective","props":[{"name":"label","value":"PE-16[5]"}],"prose":"authorizes organization-defined information system components exiting the facility;"},{"id":"pe-16_obj.6","name":"objective","props":[{"name":"label","value":"PE-16[6]"}],"prose":"monitors organization-defined information system components exiting the facility;"},{"id":"pe-16_obj.7","name":"objective","props":[{"name":"label","value":"PE-16[7]"}],"prose":"controls organization-defined information system components exiting the facility;"},{"id":"pe-16_obj.8","name":"objective","props":[{"name":"label","value":"PE-16[8]"}],"prose":"maintains records of information system components entering the facility; and"},{"id":"pe-16_obj.9","name":"objective","props":[{"name":"label","value":"PE-16[9]"}],"prose":"maintains records of information system components exiting the facility."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing delivery and removal of information system components from the facility\n\nsecurity plan\n\nfacility housing the information system\n\nrecords of items entering and exiting the facility\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for controlling information system components entering and exiting the facility\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for authorizing, monitoring, and controlling information system-related items entering and exiting the facility\n\nautomated mechanisms supporting and\/or implementing authorizing, monitoring, and controlling information system-related items entering and exiting the facility"}]}]}]},{"id":"pl","class":"family","title":"Planning","controls":[{"id":"pl-1","class":"SP800-53","title":"Security Planning Policy and Procedures","params":[{"id":"pl-1_prm_1","label":"organization-defined personnel or roles"},{"id":"pl-1_prm_2","label":"organization-defined frequency"},{"id":"pl-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PL-1"},{"name":"sort-id","value":"pl-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9c5c9e8c-dc81-4f55-a11c-d71d7487790f","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"pl-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, pl-1_prm_1 }}:","parts":[{"id":"pl-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A security planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"pl-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the security planning policy and associated security planning controls; and"}]},{"id":"pl-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"pl-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security planning policy {{ insert: param, pl-1_prm_2 }}; and"},{"id":"pl-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Security planning procedures {{ insert: param, pl-1_prm_3 }}."}]}]},{"id":"pl-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the PL family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"pl-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-1.a_obj","name":"objective","props":[{"name":"label","value":"PL-1(a)"}],"parts":[{"id":"pl-1.a.1_obj","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)"}],"parts":[{"id":"pl-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1]"}],"prose":"develops and documents a planning policy that addresses:","parts":[{"id":"pl-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"pl-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"pl-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"pl-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"pl-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"pl-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"pl-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"pl-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the planning policy is to be disseminated;"},{"id":"pl-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[3]"}],"prose":"disseminates the planning policy to organization-defined personnel or roles;"}]},{"id":"pl-1.a.2_obj","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)"}],"parts":[{"id":"pl-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the planning policy and associated planning controls;"},{"id":"pl-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"pl-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"pl-1.b_obj","name":"objective","props":[{"name":"label","value":"PL-1(b)"}],"parts":[{"id":"pl-1.b.1_obj","name":"objective","props":[{"name":"label","value":"PL-1(b)(1)"}],"parts":[{"id":"pl-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current planning policy;"},{"id":"pl-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(b)(1)[2]"}],"prose":"reviews and updates the current planning policy with the organization-defined frequency;"}]},{"id":"pl-1.b.2_obj","name":"objective","props":[{"name":"label","value":"PL-1(b)(2)"}],"parts":[{"id":"pl-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current planning procedures; and"},{"id":"pl-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(b)(2)[2]"}],"prose":"reviews and updates the current planning procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Planning policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with planning responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"pl-2","class":"SP800-53","title":"System Security Plan","params":[{"id":"pl-2_prm_1","label":"organization-defined personnel or roles"},{"id":"pl-2_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PL-2"},{"name":"sort-id","value":"pl-02"}],"links":[{"href":"#9c5c9e8c-dc81-4f55-a11c-d71d7487790f","rel":"reference"}],"parts":[{"id":"pl-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a security plan for the information system that:","parts":[{"id":"pl-2_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Is consistent with the organization’s enterprise architecture;"},{"id":"pl-2_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Explicitly defines the authorization boundary for the system;"},{"id":"pl-2_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Describes the operational context of the information system in terms of missions and business processes;"},{"id":"pl-2_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Provides the security categorization of the information system including supporting rationale;"},{"id":"pl-2_smt.a.5","name":"item","props":[{"name":"label","value":"5."}],"prose":"Describes the operational environment for the information system and relationships with or connections to other information systems;"},{"id":"pl-2_smt.a.6","name":"item","props":[{"name":"label","value":"6."}],"prose":"Provides an overview of the security requirements for the system;"},{"id":"pl-2_smt.a.7","name":"item","props":[{"name":"label","value":"7."}],"prose":"Identifies any relevant overlays, if applicable;"},{"id":"pl-2_smt.a.8","name":"item","props":[{"name":"label","value":"8."}],"prose":"Describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring decisions; and"},{"id":"pl-2_smt.a.9","name":"item","props":[{"name":"label","value":"9."}],"prose":"Is reviewed and approved by the authorizing official or designated representative prior to plan implementation;"}]},{"id":"pl-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Distributes copies of the security plan and communicates subsequent changes to the plan to {{ insert: param, pl-2_prm_1 }};"},{"id":"pl-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the security plan for the information system {{ insert: param, pl-2_prm_2 }};"},{"id":"pl-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Updates the plan to address changes to the information system\/environment of operation or problems identified during plan implementation or security control assessments; and"},{"id":"pl-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Protects the security plan from unauthorized disclosure and modification."}]},{"id":"pl-2_gdn","name":"guidance","prose":"Security plans relate security requirements to a set of security controls and control enhancements. Security plans also describe, at a high level, how the security controls and control enhancements meet those security requirements, but do not provide detailed, technical descriptions of the specific design or implementation of the controls\/enhancements. Security plans contain sufficient information (including the specification of parameter values for assignment and selection statements either explicitly or by reference) to enable a design and implementation that is unambiguously compliant with the intent of the plans and subsequent determinations of risk to organizational operations and assets, individuals, other organizations, and the Nation if the plan is implemented as intended. Organizations can also apply tailoring guidance to the security control baselines in Appendix D and CNSS Instruction 1253 to develop overlays for community-wide use or to address specialized requirements, technologies, or missions\/environments of operation (e.g., DoD-tactical, Federal Public Key Infrastructure, or Federal Identity, Credential, and Access Management, space operations). Appendix I provides guidance on developing overlays. Security plans need not be single documents; the plans can be a collection of various documents including documents that already exist. Effective security plans make extensive use of references to policies, procedures, and additional documents (e.g., design and implementation specifications) where more detailed information can be obtained. This reduces the documentation requirements associated with security programs and maintains security-related information in other established management\/operational areas related to enterprise architecture, system development life cycle, systems engineering, and acquisition. For example, security plans do not contain detailed contingency plan or incident response plan information but instead provide explicitly or by reference, sufficient information to define what needs to be accomplished by those plans.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ca-2","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#pl-7","rel":"related"},{"href":"#pm-1","rel":"related"},{"href":"#pm-7","rel":"related"},{"href":"#pm-8","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#pm-11","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-17","rel":"related"}]},{"id":"pl-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-2.a_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)"}],"prose":"develops a security plan for the information system that:","parts":[{"id":"pl-2.a.1_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(1)"}],"prose":"is consistent with the organization’s enterprise architecture;"},{"id":"pl-2.a.2_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(2)"}],"prose":"explicitly defines the authorization boundary for the system;"},{"id":"pl-2.a.3_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(3)"}],"prose":"describes the operational context of the information system in terms of missions and business processes;"},{"id":"pl-2.a.4_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(4)"}],"prose":"provides the security categorization of the information system including supporting rationale;"},{"id":"pl-2.a.5_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(5)"}],"prose":"describes the operational environment for the information system and relationships with or connections to other information systems;"},{"id":"pl-2.a.6_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(6)"}],"prose":"provides an overview of the security requirements for the system;"},{"id":"pl-2.a.7_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(7)"}],"prose":"identifies any relevant overlays, if applicable;"},{"id":"pl-2.a.8_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(8)"}],"prose":"describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring and supplemental decisions;"},{"id":"pl-2.a.9_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(9)"}],"prose":"is reviewed and approved by the authorizing official or designated representative prior to plan implementation;"}]},{"id":"pl-2.b_obj","name":"objective","props":[{"name":"label","value":"PL-2(b)"}],"parts":[{"id":"pl-2.b_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(b)[1]"}],"prose":"defines personnel or roles to whom copies of the security plan are to be distributed and subsequent changes to the plan are to be communicated;"},{"id":"pl-2.b_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(b)[2]"}],"prose":"distributes copies of the security plan and communicates subsequent changes to the plan to organization-defined personnel or roles;"}]},{"id":"pl-2.c_obj","name":"objective","props":[{"name":"label","value":"PL-2(c)"}],"parts":[{"id":"pl-2.c_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(c)[1]"}],"prose":"defines the frequency to review the security plan for the information system;"},{"id":"pl-2.c_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(c)[2]"}],"prose":"reviews the security plan for the information system with the organization-defined frequency;"}]},{"id":"pl-2.d_obj","name":"objective","props":[{"name":"label","value":"PL-2(d)"}],"prose":"updates the plan to address:","parts":[{"id":"pl-2.d_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(d)[1]"}],"prose":"changes to the information system\/environment of operation;"},{"id":"pl-2.d_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(d)[2]"}],"prose":"problems identified during plan implementation;"},{"id":"pl-2.d_obj.3","name":"objective","props":[{"name":"label","value":"PL-2(d)[3]"}],"prose":"problems identified during security control assessments;"}]},{"id":"pl-2.e_obj","name":"objective","props":[{"name":"label","value":"PL-2(e)"}],"prose":"protects the security plan from unauthorized:","parts":[{"id":"pl-2.e_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(e)[1]"}],"prose":"disclosure; and"},{"id":"pl-2.e_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(e)[2]"}],"prose":"modification."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\nprocedures addressing security plan development and implementation\n\nprocedures addressing security plan reviews and updates\n\nenterprise architecture documentation\n\nsecurity plan for the information system\n\nrecords of security plan reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security plan development\/review\/update\/approval\n\nautomated mechanisms supporting the information system security plan"}]}]},{"id":"pl-4","class":"SP800-53","title":"Rules of Behavior","params":[{"id":"pl-4_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PL-4"},{"name":"sort-id","value":"pl-04"}],"links":[{"href":"#9c5c9e8c-dc81-4f55-a11c-d71d7487790f","rel":"reference"}],"parts":[{"id":"pl-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes and makes readily available to individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;"},{"id":"pl-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Receives a signed acknowledgment from such individuals, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the information system;"},{"id":"pl-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews and updates the rules of behavior {{ insert: param, pl-4_prm_1 }}; and"},{"id":"pl-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Requires individuals who have signed a previous version of the rules of behavior to read and re-sign when the rules of behavior are revised\/updated."}]},{"id":"pl-4_gdn","name":"guidance","prose":"This control enhancement applies to organizational users. Organizations consider rules of behavior based on individual user roles and responsibilities, differentiating, for example, between rules that apply to privileged users and rules that apply to general users. Establishing rules of behavior for some types of non-organizational users including, for example, individuals who simply receive data\/information from federal information systems, is often not feasible given the large number of such users and the limited nature of their interactions with the systems. Rules of behavior for both organizational and non-organizational users can also be established in AC-8, System Use Notification. PL-4 b. (the signed acknowledgment portion of this control) may be satisfied by the security awareness training and role-based security training programs conducted by organizations if such training includes rules of behavior. Organizations can use electronic signatures for acknowledging rules of behavior.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-8","rel":"related"},{"href":"#ac-9","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#mp-7","rel":"related"},{"href":"#ps-6","rel":"related"},{"href":"#ps-8","rel":"related"},{"href":"#sa-5","rel":"related"}]},{"id":"pl-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-4.a_obj","name":"objective","props":[{"name":"label","value":"PL-4(a)"}],"parts":[{"id":"pl-4.a_obj.1","name":"objective","props":[{"name":"label","value":"PL-4(a)[1]"}],"prose":"establishes, for individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;"},{"id":"pl-4.a_obj.2","name":"objective","props":[{"name":"label","value":"PL-4(a)[2]"}],"prose":"makes readily available to individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;"}]},{"id":"pl-4.b_obj","name":"objective","props":[{"name":"label","value":"PL-4(b)"}],"prose":"receives a signed acknowledgement from such individuals, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the information system;"},{"id":"pl-4.c_obj","name":"objective","props":[{"name":"label","value":"PL-4(c)"}],"parts":[{"id":"pl-4.c_obj.1","name":"objective","props":[{"name":"label","value":"PL-4(c)[1]"}],"prose":"defines the frequency to review and update the rules of behavior;"},{"id":"pl-4.c_obj.2","name":"objective","props":[{"name":"label","value":"PL-4(c)[2]"}],"prose":"reviews and updates the rules of behavior with the organization-defined frequency; and"}]},{"id":"pl-4.d_obj","name":"objective","props":[{"name":"label","value":"PL-4(d)"}],"prose":"requires individuals who have signed a previous version of the rules of behavior to read and resign when the rules of behavior are revised\/updated."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\nprocedures addressing rules of behavior for information system users\n\nrules of behavior\n\nsigned acknowledgements\n\nrecords for rules of behavior reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for establishing, reviewing, and updating rules of behavior\n\norganizational personnel who are authorized users of the information system and have signed and resigned rules of behavior\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for establishing, reviewing, disseminating, and updating rules of behavior\n\nautomated mechanisms supporting and\/or implementing the establishment, review, dissemination, and update of rules of behavior"}]}]}]},{"id":"ps","class":"family","title":"Personnel Security","controls":[{"id":"ps-1","class":"SP800-53","title":"Personnel Security Policy and Procedures","params":[{"id":"ps-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ps-1_prm_2","label":"organization-defined frequency"},{"id":"ps-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-1"},{"name":"sort-id","value":"ps-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ps-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ps-1_prm_1 }}:","parts":[{"id":"ps-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A personnel security policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ps-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the personnel security policy and associated personnel security controls; and"}]},{"id":"ps-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ps-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Personnel security policy {{ insert: param, ps-1_prm_2 }}; and"},{"id":"ps-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Personnel security procedures {{ insert: param, ps-1_prm_3 }}."}]}]},{"id":"ps-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the PS family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ps-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-1.a_obj","name":"objective","props":[{"name":"label","value":"PS-1(a)"}],"parts":[{"id":"ps-1.a.1_obj","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)"}],"parts":[{"id":"ps-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1]"}],"prose":"develops and documents an personnel security policy that addresses:","parts":[{"id":"ps-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ps-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ps-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ps-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ps-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ps-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ps-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ps-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the personnel security policy is to be disseminated;"},{"id":"ps-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[3]"}],"prose":"disseminates the personnel security policy to organization-defined personnel or roles;"}]},{"id":"ps-1.a.2_obj","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)"}],"parts":[{"id":"ps-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the personnel security policy and associated personnel security controls;"},{"id":"ps-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ps-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ps-1.b_obj","name":"objective","props":[{"name":"label","value":"PS-1(b)"}],"parts":[{"id":"ps-1.b.1_obj","name":"objective","props":[{"name":"label","value":"PS-1(b)(1)"}],"parts":[{"id":"ps-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current personnel security policy;"},{"id":"ps-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(b)(1)[2]"}],"prose":"reviews and updates the current personnel security policy with the organization-defined frequency;"}]},{"id":"ps-1.b.2_obj","name":"objective","props":[{"name":"label","value":"PS-1(b)(2)"}],"parts":[{"id":"ps-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current personnel security procedures; and"},{"id":"ps-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(b)(2)[2]"}],"prose":"reviews and updates the current personnel security procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access control responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ps-2","class":"SP800-53","title":"Position Risk Designation","params":[{"id":"ps-2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-2"},{"name":"sort-id","value":"ps-02"}],"links":[{"href":"#0c97e60b-325a-4efa-ba2b-90f20ccd5abc","rel":"reference"}],"parts":[{"id":"ps-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Assigns a risk designation to all organizational positions;"},{"id":"ps-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishes screening criteria for individuals filling those positions; and"},{"id":"ps-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews and updates position risk designations {{ insert: param, ps-2_prm_1 }}."}]},{"id":"ps-2_gdn","name":"guidance","prose":"Position risk designations reflect Office of Personnel Management policy and guidance. Risk designations can guide and inform the types of authorizations individuals receive when accessing organizational information and information systems. Position screening criteria include explicit information security role appointment requirements (e.g., training, security clearances).","links":[{"href":"#at-3","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#ps-3","rel":"related"}]},{"id":"ps-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-2.a_obj","name":"objective","props":[{"name":"label","value":"PS-2(a)"}],"prose":"assigns a risk designation to all organizational positions;"},{"id":"ps-2.b_obj","name":"objective","props":[{"name":"label","value":"PS-2(b)"}],"prose":"establishes screening criteria for individuals filling those positions;"},{"id":"ps-2.c_obj","name":"objective","props":[{"name":"label","value":"PS-2(c)"}],"parts":[{"id":"ps-2.c_obj.1","name":"objective","props":[{"name":"label","value":"PS-2(c)[1]"}],"prose":"defines the frequency to review and update position risk designations; and"},{"id":"ps-2.c_obj.2","name":"objective","props":[{"name":"label","value":"PS-2(c)[2]"}],"prose":"reviews and updates position risk designations with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing position categorization\n\nappropriate codes of federal regulations\n\nlist of risk designations for organizational positions\n\nsecurity plan\n\nrecords of position risk designation reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for assigning, reviewing, and updating position risk designations\n\norganizational processes for establishing screening criteria"}]}]},{"id":"ps-3","class":"SP800-53","title":"Personnel Screening","params":[{"id":"ps-3_prm_1","label":"organization-defined conditions requiring rescreening and, where rescreening is so indicated, the frequency of such rescreening"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-3"},{"name":"sort-id","value":"ps-03"}],"links":[{"href":"#0c97e60b-325a-4efa-ba2b-90f20ccd5abc","rel":"reference"},{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#6caa237b-531b-43ac-9711-d8f6b97b0377","rel":"reference"}],"parts":[{"id":"ps-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Screens individuals prior to authorizing access to the information system; and"},{"id":"ps-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Rescreens individuals according to {{ insert: param, ps-3_prm_1 }}."}]},{"id":"ps-3_gdn","name":"guidance","prose":"Personnel screening and rescreening activities reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, guidance, and specific criteria established for the risk designations of assigned positions. Organizations may define different rescreening conditions and frequencies for personnel accessing information systems based on types of information processed, stored, or transmitted by the systems.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#ps-2","rel":"related"}]},{"id":"ps-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-3.a_obj","name":"objective","props":[{"name":"label","value":"PS-3(a)"}],"prose":"screens individuals prior to authorizing access to the information system;"},{"id":"ps-3.b_obj","name":"objective","props":[{"name":"label","value":"PS-3(b)"}],"parts":[{"id":"ps-3.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-3(b)[1]"}],"prose":"defines conditions requiring re-screening;"},{"id":"ps-3.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-3(b)[2]"}],"prose":"defines the frequency of re-screening where it is so indicated; and"},{"id":"ps-3.b_obj.3","name":"objective","props":[{"name":"label","value":"PS-3(b)[3]"}],"prose":"re-screens individuals in accordance with organization-defined conditions requiring re-screening and, where re-screening is so indicated, with the organization-defined frequency of such re-screening."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel screening\n\nrecords of screened personnel\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for personnel screening"}]}]},{"id":"ps-4","class":"SP800-53","title":"Personnel Termination","params":[{"id":"ps-4_prm_1","label":"organization-defined time period"},{"id":"ps-4_prm_2","label":"organization-defined information security topics"},{"id":"ps-4_prm_3","label":"organization-defined personnel or roles"},{"id":"ps-4_prm_4","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-4"},{"name":"sort-id","value":"ps-04"}],"parts":[{"id":"ps-4_smt","name":"statement","prose":"The organization, upon termination of individual employment:","parts":[{"id":"ps-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Disables information system access within {{ insert: param, ps-4_prm_1 }};"},{"id":"ps-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Terminates\/revokes any authenticators\/credentials associated with the individual;"},{"id":"ps-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Conducts exit interviews that include a discussion of {{ insert: param, ps-4_prm_2 }};"},{"id":"ps-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Retrieves all security-related organizational information system-related property;"},{"id":"ps-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Retains access to organizational information and information systems formerly controlled by terminated individual; and"},{"id":"ps-4_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Notifies {{ insert: param, ps-4_prm_3 }} within {{ insert: param, ps-4_prm_4 }}."}]},{"id":"ps-4_gdn","name":"guidance","prose":"Information system-related property includes, for example, hardware authentication tokens, system administration technical manuals, keys, identification cards, and building passes. Exit interviews ensure that terminated individuals understand the security constraints imposed by being former employees and that proper accountability is achieved for information system-related property. Security topics of interest at exit interviews can include, for example, reminding terminated individuals of nondisclosure agreements and potential limitations on future employment. Exit interviews may not be possible for some terminated individuals, for example, in cases related to job abandonment, illnesses, and nonavailability of supervisors. Exit interviews are important for individuals with security clearances. Timely execution of termination actions is essential for individuals terminated for cause. In certain situations, organizations consider disabling the information system accounts of individuals that are being terminated prior to the individuals being notified.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#ps-5","rel":"related"},{"href":"#ps-6","rel":"related"}]},{"id":"ps-4_obj","name":"objective","prose":"Determine if the organization, upon termination of individual employment,:","parts":[{"id":"ps-4.a_obj","name":"objective","props":[{"name":"label","value":"PS-4(a)"}],"parts":[{"id":"ps-4.a_obj.1","name":"objective","props":[{"name":"label","value":"PS-4(a)[1]"}],"prose":"defines a time period within which to disable information system access;"},{"id":"ps-4.a_obj.2","name":"objective","props":[{"name":"label","value":"PS-4(a)[2]"}],"prose":"disables information system access within the organization-defined time period;"}]},{"id":"ps-4.b_obj","name":"objective","props":[{"name":"label","value":"PS-4(b)"}],"prose":"terminates\/revokes any authenticators\/credentials associated with the individual;"},{"id":"ps-4.c_obj","name":"objective","props":[{"name":"label","value":"PS-4(c)"}],"parts":[{"id":"ps-4.c_obj.1","name":"objective","props":[{"name":"label","value":"PS-4(c)[1]"}],"prose":"defines information security topics to be discussed when conducting exit interviews;"},{"id":"ps-4.c_obj.2","name":"objective","props":[{"name":"label","value":"PS-4(c)[2]"}],"prose":"conducts exit interviews that include a discussion of organization-defined information security topics;"}]},{"id":"ps-4.d_obj","name":"objective","props":[{"name":"label","value":"PS-4(d)"}],"prose":"retrieves all security-related organizational information system-related property;"},{"id":"ps-4.e_obj","name":"objective","props":[{"name":"label","value":"PS-4(e)"}],"prose":"retains access to organizational information and information systems formerly controlled by the terminated individual;"},{"id":"ps-4.f_obj","name":"objective","props":[{"name":"label","value":"PS-4(f)"}],"parts":[{"id":"ps-4.f_obj.1","name":"objective","props":[{"name":"label","value":"PS-4(f)[1]"}],"prose":"defines personnel or roles to be notified of the termination;"},{"id":"ps-4.f_obj.2","name":"objective","props":[{"name":"label","value":"PS-4(f)[2]"}],"prose":"defines the time period within which to notify organization-defined personnel or roles; and"},{"id":"ps-4.f_obj.3","name":"objective","props":[{"name":"label","value":"PS-4(f)[3]"}],"prose":"notifies organization-defined personnel or roles within the organization-defined time period."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel termination\n\nrecords of personnel termination actions\n\nlist of information system accounts\n\nrecords of terminated or revoked authenticators\/credentials\n\nrecords of exit interviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for personnel termination\n\nautomated mechanisms supporting and\/or implementing personnel termination notifications\n\nautomated mechanisms for disabling information system access\/revoking authenticators"}]}]},{"id":"ps-5","class":"SP800-53","title":"Personnel Transfer","params":[{"id":"ps-5_prm_1","label":"organization-defined transfer or reassignment actions"},{"id":"ps-5_prm_2","label":"organization-defined time period following the formal transfer action"},{"id":"ps-5_prm_3","label":"organization-defined personnel or roles"},{"id":"ps-5_prm_4","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PS-5"},{"name":"sort-id","value":"ps-05"}],"parts":[{"id":"ps-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Reviews and confirms ongoing operational need for current logical and physical access authorizations to information systems\/facilities when individuals are reassigned or transferred to other positions within the organization;"},{"id":"ps-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Initiates {{ insert: param, ps-5_prm_1 }} within {{ insert: param, ps-5_prm_2 }};"},{"id":"ps-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Modifies access authorization as needed to correspond with any changes in operational need due to reassignment or transfer; and"},{"id":"ps-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Notifies {{ insert: param, ps-5_prm_3 }} within {{ insert: param, ps-5_prm_4 }}."}]},{"id":"ps-5_gdn","name":"guidance","prose":"This control applies when reassignments or transfers of individuals are permanent or of such extended durations as to make the actions warranted. Organizations define actions appropriate for the types of reassignments or transfers, whether permanent or extended. Actions that may be required for personnel transfers or reassignments to other positions within organizations include, for example: (i) returning old and issuing new keys, identification cards, and building passes; (ii) closing information system accounts and establishing new accounts; (iii) changing information system access authorizations (i.e., privileges); and (iv) providing for access to official records to which individuals had access at previous work locations and in previous information system accounts.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#ps-4","rel":"related"}]},{"id":"ps-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-5.a_obj","name":"objective","props":[{"name":"label","value":"PS-5(a)"}],"prose":"when individuals are reassigned or transferred to other positions within the organization, reviews and confirms ongoing operational need for current:","parts":[{"id":"ps-5.a_obj.1","name":"objective","props":[{"name":"label","value":"PS-5(a)[1]"}],"prose":"logical access authorizations to information systems;"},{"id":"ps-5.a_obj.2","name":"objective","props":[{"name":"label","value":"PS-5(a)[2]"}],"prose":"physical access authorizations to information systems and facilities;"}]},{"id":"ps-5.b_obj","name":"objective","props":[{"name":"label","value":"PS-5(b)"}],"parts":[{"id":"ps-5.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-5(b)[1]"}],"prose":"defines transfer or reassignment actions to be initiated following transfer or reassignment;"},{"id":"ps-5.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-5(b)[2]"}],"prose":"defines the time period within which transfer or reassignment actions must occur following transfer or reassignment;"},{"id":"ps-5.b_obj.3","name":"objective","props":[{"name":"label","value":"PS-5(b)[3]"}],"prose":"initiates organization-defined transfer or reassignment actions within the organization-defined time period following transfer or reassignment;"}]},{"id":"ps-5.c_obj","name":"objective","props":[{"name":"label","value":"PS-5(c)"}],"prose":"modifies access authorization as needed to correspond with any changes in operational need due to reassignment or transfer;"},{"id":"ps-5.d_obj","name":"objective","props":[{"name":"label","value":"PS-5(d)"}],"parts":[{"id":"ps-5.d_obj.1","name":"objective","props":[{"name":"label","value":"PS-5(d)[1]"}],"prose":"defines personnel or roles to be notified when individuals are reassigned or transferred to other positions within the organization;"},{"id":"ps-5.d_obj.2","name":"objective","props":[{"name":"label","value":"PS-5(d)[2]"}],"prose":"defines the time period within which to notify organization-defined personnel or roles when individuals are reassigned or transferred to other positions within the organization; and"},{"id":"ps-5.d_obj.3","name":"objective","props":[{"name":"label","value":"PS-5(d)[3]"}],"prose":"notifies organization-defined personnel or roles within the organization-defined time period when individuals are reassigned or transferred to other positions within the organization."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel transfer\n\nsecurity plan\n\nrecords of personnel transfer actions\n\nlist of information system and facility access authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for personnel transfer\n\nautomated mechanisms supporting and\/or implementing personnel transfer notifications\n\nautomated mechanisms for disabling information system access\/revoking authenticators"}]}]},{"id":"ps-6","class":"SP800-53","title":"Access Agreements","params":[{"id":"ps-6_prm_1","label":"organization-defined frequency"},{"id":"ps-6_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"PS-6"},{"name":"sort-id","value":"ps-06"}],"parts":[{"id":"ps-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops and documents access agreements for organizational information systems;"},{"id":"ps-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the access agreements {{ insert: param, ps-6_prm_1 }}; and"},{"id":"ps-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensures that individuals requiring access to organizational information and information systems:","parts":[{"id":"ps-6_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Sign appropriate access agreements prior to being granted access; and"},{"id":"ps-6_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Re-sign access agreements to maintain access to organizational information systems when access agreements have been updated or {{ insert: param, ps-6_prm_2 }}."}]}]},{"id":"ps-6_gdn","name":"guidance","prose":"Access agreements include, for example, nondisclosure agreements, acceptable use agreements, rules of behavior, and conflict-of-interest agreements. Signed access agreements include an acknowledgement that individuals have read, understand, and agree to abide by the constraints associated with organizational information systems to which access is authorized. Organizations can use electronic signatures to acknowledge access agreements unless specifically prohibited by organizational policy.","links":[{"href":"#pl-4","rel":"related"},{"href":"#ps-2","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ps-4","rel":"related"},{"href":"#ps-8","rel":"related"}]},{"id":"ps-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-6.a_obj","name":"objective","props":[{"name":"label","value":"PS-6(a)"}],"prose":"develops and documents access agreements for organizational information systems;"},{"id":"ps-6.b_obj","name":"objective","props":[{"name":"label","value":"PS-6(b)"}],"parts":[{"id":"ps-6.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-6(b)[1]"}],"prose":"defines the frequency to review and update the access agreements;"},{"id":"ps-6.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-6(b)[2]"}],"prose":"reviews and updates the access agreements with the organization-defined frequency;"}]},{"id":"ps-6.c_obj","name":"objective","props":[{"name":"label","value":"PS-6(c)"}],"parts":[{"id":"ps-6.c.1_obj","name":"objective","props":[{"name":"label","value":"PS-6(c)(1)"}],"prose":"ensures that individuals requiring access to organizational information and information systems sign appropriate access agreements prior to being granted access;"},{"id":"ps-6.c.2_obj","name":"objective","props":[{"name":"label","value":"PS-6(c)(2)"}],"parts":[{"id":"ps-6.c.2_obj.1","name":"objective","props":[{"name":"label","value":"PS-6(c)(2)[1]"}],"prose":"defines the frequency to re-sign access agreements to maintain access to organizational information systems when access agreements have been updated;"},{"id":"ps-6.c.2_obj.2","name":"objective","props":[{"name":"label","value":"PS-6(c)(2)[2]"}],"prose":"ensures that individuals requiring access to organizational information and information systems re-sign access agreements to maintain access to organizational information systems when access agreements have been updated or with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing access agreements for organizational information and information systems\n\nsecurity plan\n\naccess agreements\n\nrecords of access agreement reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel who have signed\/resigned access agreements\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for access agreements\n\nautomated mechanisms supporting access agreements"}]}]},{"id":"ps-7","class":"SP800-53","title":"Third-party Personnel Security","params":[{"id":"ps-7_prm_1","label":"organization-defined personnel or roles"},{"id":"ps-7_prm_2","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-7"},{"name":"sort-id","value":"ps-07"}],"links":[{"href":"#0c775bc3-bfc3-42c7-a382-88949f503171","rel":"reference"}],"parts":[{"id":"ps-7_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes personnel security requirements including security roles and responsibilities for third-party providers;"},{"id":"ps-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Requires third-party providers to comply with personnel security policies and procedures established by the organization;"},{"id":"ps-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Documents personnel security requirements;"},{"id":"ps-7_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Requires third-party providers to notify {{ insert: param, ps-7_prm_1 }} of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges within {{ insert: param, ps-7_prm_2 }}; and"},{"id":"ps-7_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Monitors provider compliance."}]},{"id":"ps-7_gdn","name":"guidance","prose":"Third-party providers include, for example, service bureaus, contractors, and other organizations providing information system development, information technology services, outsourced applications, and network and security management. Organizations explicitly include personnel security requirements in acquisition-related documents. Third-party providers may have personnel working at organizational facilities with credentials, badges, or information system privileges issued by organizations. Notifications of third-party personnel changes ensure appropriate termination of privileges and credentials. Organizations define the transfers and terminations deemed reportable by security-related characteristics that include, for example, functions, roles, and nature of credentials\/privileges associated with individuals transferred or terminated.","links":[{"href":"#ps-2","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ps-4","rel":"related"},{"href":"#ps-5","rel":"related"},{"href":"#ps-6","rel":"related"},{"href":"#sa-9","rel":"related"},{"href":"#sa-21","rel":"related"}]},{"id":"ps-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-7.a_obj","name":"objective","props":[{"name":"label","value":"PS-7(a)"}],"prose":"establishes personnel security requirements, including security roles and responsibilities, for third-party providers;"},{"id":"ps-7.b_obj","name":"objective","props":[{"name":"label","value":"PS-7(b)"}],"prose":"requires third-party providers to comply with personnel security policies and procedures established by the organization;"},{"id":"ps-7.c_obj","name":"objective","props":[{"name":"label","value":"PS-7(c)"}],"prose":"documents personnel security requirements;"},{"id":"ps-7.d_obj","name":"objective","props":[{"name":"label","value":"PS-7(d)"}],"parts":[{"id":"ps-7.d_obj.1","name":"objective","props":[{"name":"label","value":"PS-7(d)[1]"}],"prose":"defines personnel or roles to be notified of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges;"},{"id":"ps-7.d_obj.2","name":"objective","props":[{"name":"label","value":"PS-7(d)[2]"}],"prose":"defines the time period within which third-party providers are required to notify organization-defined personnel or roles of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges;"},{"id":"ps-7.d_obj.3","name":"objective","props":[{"name":"label","value":"PS-7(d)[3]"}],"prose":"requires third-party providers to notify organization-defined personnel or roles within the organization-defined time period of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges; and"}]},{"id":"ps-7.e_obj","name":"objective","props":[{"name":"label","value":"PS-7(e)"}],"prose":"monitors provider compliance."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing third-party personnel security\n\nlist of personnel security requirements\n\nacquisition documents\n\nservice-level agreements\n\ncompliance monitoring process\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\nthird-party providers\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing and monitoring third-party personnel security\n\nautomated mechanisms supporting and\/or implementing monitoring of provider compliance"}]}]},{"id":"ps-8","class":"SP800-53","title":"Personnel Sanctions","params":[{"id":"ps-8_prm_1","label":"organization-defined personnel or roles"},{"id":"ps-8_prm_2","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"PS-8"},{"name":"sort-id","value":"ps-08"}],"parts":[{"id":"ps-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Employs a formal sanctions process for individuals failing to comply with established information security policies and procedures; and"},{"id":"ps-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Notifies {{ insert: param, ps-8_prm_1 }} within {{ insert: param, ps-8_prm_2 }} when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction."}]},{"id":"ps-8_gdn","name":"guidance","prose":"Organizational sanctions processes reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Sanctions processes are described in access agreements and can be included as part of general personnel policies and procedures for organizations. Organizations consult with the Office of the General Counsel regarding matters of employee sanctions.","links":[{"href":"#pl-4","rel":"related"},{"href":"#ps-6","rel":"related"}]},{"id":"ps-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-8.a_obj","name":"objective","props":[{"name":"label","value":"PS-8(a)"}],"prose":"employs a formal sanctions process for individuals failing to comply with established information security policies and procedures;"},{"id":"ps-8.b_obj","name":"objective","props":[{"name":"label","value":"PS-8(b)"}],"parts":[{"id":"ps-8.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-8(b)[1]"}],"prose":"defines personnel or roles to be notified when a formal employee sanctions process is initiated;"},{"id":"ps-8.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-8(b)[2]"}],"prose":"defines the time period within which organization-defined personnel or roles must be notified when a formal employee sanctions process is initiated; and"},{"id":"ps-8.b_obj.3","name":"objective","props":[{"name":"label","value":"PS-8(b)[3]"}],"prose":"notifies organization-defined personnel or roles within the organization-defined time period when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel sanctions\n\nrules of behavior\n\nrecords of formal sanctions\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing personnel sanctions\n\nautomated mechanisms supporting and\/or implementing notifications"}]}]}]},{"id":"ra","class":"family","title":"Risk Assessment","controls":[{"id":"ra-1","class":"SP800-53","title":"Risk Assessment Policy and Procedures","params":[{"id":"ra-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ra-1_prm_2","label":"organization-defined frequency"},{"id":"ra-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-1"},{"name":"sort-id","value":"ra-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ra-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ra-1_prm_1 }}:","parts":[{"id":"ra-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ra-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls; and"}]},{"id":"ra-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ra-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Risk assessment policy {{ insert: param, ra-1_prm_2 }}; and"},{"id":"ra-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Risk assessment procedures {{ insert: param, ra-1_prm_3 }}."}]}]},{"id":"ra-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the RA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ra-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-1.a_obj","name":"objective","props":[{"name":"label","value":"RA-1(a)"}],"parts":[{"id":"ra-1.a.1_obj","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)"}],"parts":[{"id":"ra-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1]"}],"prose":"develops and documents a risk assessment policy that addresses:","parts":[{"id":"ra-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ra-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ra-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ra-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ra-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ra-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ra-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ra-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the risk assessment policy is to be disseminated;"},{"id":"ra-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[3]"}],"prose":"disseminates the risk assessment policy to organization-defined personnel or roles;"}]},{"id":"ra-1.a.2_obj","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)"}],"parts":[{"id":"ra-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls;"},{"id":"ra-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ra-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ra-1.b_obj","name":"objective","props":[{"name":"label","value":"RA-1(b)"}],"parts":[{"id":"ra-1.b.1_obj","name":"objective","props":[{"name":"label","value":"RA-1(b)(1)"}],"parts":[{"id":"ra-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current risk assessment policy;"},{"id":"ra-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(b)(1)[2]"}],"prose":"reviews and updates the current risk assessment policy with the organization-defined frequency;"}]},{"id":"ra-1.b.2_obj","name":"objective","props":[{"name":"label","value":"RA-1(b)(2)"}],"parts":[{"id":"ra-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current risk assessment procedures; and"},{"id":"ra-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(b)(2)[2]"}],"prose":"reviews and updates the current risk assessment procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"risk assessment policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with risk assessment responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ra-2","class":"SP800-53","title":"Security Categorization","props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-2"},{"name":"sort-id","value":"ra-02"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"}],"parts":[{"id":"ra-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Categorizes information and the information system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"},{"id":"ra-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents the security categorization results (including supporting rationale) in the security plan for the information system; and"},{"id":"ra-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensures that the authorizing official or authorizing official designated representative reviews and approves the security categorization decision."}]},{"id":"ra-2_gdn","name":"guidance","prose":"Clearly defined authorization boundaries are a prerequisite for effective security categorization decisions. Security categories describe the potential adverse impacts to organizational operations, organizational assets, and individuals if organizational information and information systems are comprised through a loss of confidentiality, integrity, or availability. Organizations conduct the security categorization process as an organization-wide activity with the involvement of chief information officers, senior information security officers, information system owners, mission\/business owners, and information owners\/stewards. Organizations also consider the potential adverse impacts to other organizations and, in accordance with the USA PATRIOT Act of 2001 and Homeland Security Presidential Directives, potential national-level adverse impacts. Security categorization processes carried out by organizations facilitate the development of inventories of information assets, and along with CM-8, mappings to specific information system components where information is processed, stored, or transmitted.","links":[{"href":"#cm-8","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"ra-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-2.a_obj","name":"objective","props":[{"name":"label","value":"RA-2(a)"}],"prose":"categorizes information and the information system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"},{"id":"ra-2.b_obj","name":"objective","props":[{"name":"label","value":"RA-2(b)"}],"prose":"documents the security categorization results (including supporting rationale) in the security plan for the information system; and"},{"id":"ra-2.c_obj","name":"objective","props":[{"name":"label","value":"RA-2(c)"}],"prose":"ensures the authorizing official or authorizing official designated representative reviews and approves the security categorization decision."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nsecurity planning policy and procedures\n\nprocedures addressing security categorization of organizational information and information systems\n\nsecurity plan\n\nsecurity categorization documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security categorization and risk assessment responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security categorization"}]}]},{"id":"ra-3","class":"SP800-53","title":"Risk Assessment","params":[{"id":"ra-3_prm_1","select":{"choice":["security plan","risk assessment report"," {{ insert: param, ra-3_prm_2 }} "]}},{"id":"ra-3_prm_2","depends-on":"ra-3_prm_1","label":"organization-defined document"},{"id":"ra-3_prm_3","label":"organization-defined frequency"},{"id":"ra-3_prm_4","label":"organization-defined personnel or roles"},{"id":"ra-3_prm_5","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-3"},{"name":"sort-id","value":"ra-03"}],"links":[{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ra-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Conducts an assessment of risk, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, disruption, modification, or destruction of the information system and the information it processes, stores, or transmits;"},{"id":"ra-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents risk assessment results in {{ insert: param, ra-3_prm_1 }};"},{"id":"ra-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews risk assessment results {{ insert: param, ra-3_prm_3 }};"},{"id":"ra-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Disseminates risk assessment results to {{ insert: param, ra-3_prm_4 }}; and"},{"id":"ra-3_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Updates the risk assessment {{ insert: param, ra-3_prm_5 }} or whenever there are significant changes to the information system or environment of operation (including the identification of new threats and vulnerabilities), or other conditions that may impact the security state of the system."}]},{"id":"ra-3_gdn","name":"guidance","prose":"Clearly defined authorization boundaries are a prerequisite for effective risk assessments. Risk assessments take into account threats, vulnerabilities, likelihood, and impact to organizational operations and assets, individuals, other organizations, and the Nation based on the operation and use of information systems. Risk assessments also take into account risk from external parties (e.g., service providers, contractors operating information systems on behalf of the organization, individuals accessing organizational information systems, outsourcing entities). In accordance with OMB policy and related E-authentication initiatives, authentication of public users accessing federal information systems may also be required to protect nonpublic or privacy-related information. As such, organizational assessments of risk also address public access to federal information systems. Risk assessments (either formal or informal) can be conducted at all three tiers in the risk management hierarchy (i.e., organization level, mission\/business process level, or information system level) and at any phase in the system development life cycle. Risk assessments can also be conducted at various steps in the Risk Management Framework, including categorization, security control selection, security control implementation, security control assessment, information system authorization, and security control monitoring. RA-3 is noteworthy in that the control must be partially implemented prior to the implementation of other controls in order to complete the first two steps in the Risk Management Framework. Risk assessments can play an important role in security control selection processes, particularly during the application of tailoring guidance, which includes security control supplementation.","links":[{"href":"#ra-2","rel":"related"},{"href":"#pm-9","rel":"related"}]},{"id":"ra-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-3.a_obj","name":"objective","props":[{"name":"label","value":"RA-3(a)"}],"prose":"conducts an assessment of risk, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, disruption, modification, or destruction of:","parts":[{"id":"ra-3.a_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(a)[1]"}],"prose":"the information system;"},{"id":"ra-3.a_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(a)[2]"}],"prose":"the information the system processes, stores, or transmits;"}]},{"id":"ra-3.b_obj","name":"objective","props":[{"name":"label","value":"RA-3(b)"}],"parts":[{"id":"ra-3.b_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(b)[1]"}],"prose":"defines a document in which risk assessment results are to be documented (if not documented in the security plan or risk assessment report);"},{"id":"ra-3.b_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(b)[2]"}],"prose":"documents risk assessment results in one of the following:","parts":[{"id":"ra-3.b_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-3(b)[2][a]"}],"prose":"the security plan;"},{"id":"ra-3.b_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-3(b)[2][b]"}],"prose":"the risk assessment report; or"},{"id":"ra-3.b_obj.2.c","name":"objective","props":[{"name":"label","value":"RA-3(b)[2][c]"}],"prose":"the organization-defined document;"}]}]},{"id":"ra-3.c_obj","name":"objective","props":[{"name":"label","value":"RA-3(c)"}],"parts":[{"id":"ra-3.c_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(c)[1]"}],"prose":"defines the frequency to review risk assessment results;"},{"id":"ra-3.c_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(c)[2]"}],"prose":"reviews risk assessment results with the organization-defined frequency;"}]},{"id":"ra-3.d_obj","name":"objective","props":[{"name":"label","value":"RA-3(d)"}],"parts":[{"id":"ra-3.d_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(d)[1]"}],"prose":"defines personnel or roles to whom risk assessment results are to be disseminated;"},{"id":"ra-3.d_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(d)[2]"}],"prose":"disseminates risk assessment results to organization-defined personnel or roles;"}]},{"id":"ra-3.e_obj","name":"objective","props":[{"name":"label","value":"RA-3(e)"}],"parts":[{"id":"ra-3.e_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(e)[1]"}],"prose":"defines the frequency to update the risk assessment;"},{"id":"ra-3.e_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(e)[2]"}],"prose":"updates the risk assessment:","parts":[{"id":"ra-3.e_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-3(e)[2][a]"}],"prose":"with the organization-defined frequency;"},{"id":"ra-3.e_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-3(e)[2][b]"}],"prose":"whenever there are significant changes to the information system or environment of operation (including the identification of new threats and vulnerabilities); and"},{"id":"ra-3.e_obj.2.c","name":"objective","props":[{"name":"label","value":"RA-3(e)[2][c]"}],"prose":"whenever there are other conditions that may impact the security state of the system."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nsecurity planning policy and procedures\n\nprocedures addressing organizational assessments of risk\n\nsecurity plan\n\nrisk assessment\n\nrisk assessment results\n\nrisk assessment reviews\n\nrisk assessment updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with risk assessment responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for risk assessment\n\nautomated mechanisms supporting and\/or for conducting, documenting, reviewing, disseminating, and updating the risk assessment"}]}]},{"id":"ra-5","class":"SP800-53","title":"Vulnerability Scanning","params":[{"id":"ra-5_prm_1","label":"organization-defined frequency and\/or randomly in accordance with organization-defined process"},{"id":"ra-5_prm_2","label":"organization-defined response times"},{"id":"ra-5_prm_3","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-5"},{"name":"sort-id","value":"ra-05"}],"links":[{"href":"#bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","rel":"reference"},{"href":"#84a37532-6db6-477b-9ea8-f9085ebca0fc","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"},{"href":"#15522e92-9192-463d-9646-6a01982db8ca","rel":"reference"},{"href":"#275cc052-0f7f-423c-bdb6-ed503dc36228","rel":"reference"}],"parts":[{"id":"ra-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Scans for vulnerabilities in the information system and hosted applications {{ insert: param, ra-5_prm_1 }} and when new vulnerabilities potentially affecting the system\/applications are identified and reported;"},{"id":"ra-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for:","parts":[{"id":"ra-5_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Enumerating platforms, software flaws, and improper configurations;"},{"id":"ra-5_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Formatting checklists and test procedures; and"},{"id":"ra-5_smt.b.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Measuring vulnerability impact;"}]},{"id":"ra-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Analyzes vulnerability scan reports and results from security control assessments;"},{"id":"ra-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Remediates legitimate vulnerabilities {{ insert: param, ra-5_prm_2 }} in accordance with an organizational assessment of risk; and"},{"id":"ra-5_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Shares information obtained from the vulnerability scanning process and security control assessments with {{ insert: param, ra-5_prm_3 }} to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies)."}]},{"id":"ra-5_gdn","name":"guidance","prose":"Security categorization of information systems guides the frequency and comprehensiveness of vulnerability scans. Organizations determine the required vulnerability scanning for all information system components, ensuring that potential sources of vulnerabilities such as networked printers, scanners, and copiers are not overlooked. Vulnerability analyses for custom software applications may require additional approaches such as static analysis, dynamic analysis, binary analysis, or a hybrid of the three approaches. Organizations can employ these analysis approaches in a variety of tools (e.g., web-based application scanners, static analysis tools, binary analyzers) and in source code reviews. Vulnerability scanning includes, for example: (i) scanning for patch levels; (ii) scanning for functions, ports, protocols, and services that should not be accessible to users or devices; and (iii) scanning for improperly configured or incorrectly operating information flow control mechanisms. Organizations consider using tools that express vulnerabilities in the Common Vulnerabilities and Exposures (CVE) naming convention and that use the Open Vulnerability Assessment Language (OVAL) to determine\/test for the presence of vulnerabilities. Suggested sources for vulnerability information include the Common Weakness Enumeration (CWE) listing and the National Vulnerability Database (NVD). In addition, security control assessments such as red team exercises provide other sources of potential vulnerabilities for which to scan. Organizations also consider using tools that express vulnerability impact by the Common Vulnerability Scoring System (CVSS).","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#ra-2","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"ra-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-5.a_obj","name":"objective","props":[{"name":"label","value":"RA-5(a)"}],"parts":[{"id":"ra-5.a_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(a)[1]"}],"parts":[{"id":"ra-5.a_obj.1.a","name":"objective","props":[{"name":"label","value":"RA-5(a)[1][a]"}],"prose":"defines the frequency for conducting vulnerability scans on the information system and hosted applications; and\/or"},{"id":"ra-5.a_obj.1.b","name":"objective","props":[{"name":"label","value":"RA-5(a)[1][b]"}],"prose":"defines the process for conducting random vulnerability scans on the information system and hosted applications;"}]},{"id":"ra-5.a_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(a)[2]"}],"prose":"in accordance with the organization-defined frequency and\/or organization-defined process for conducting random scans, scans for vulnerabilities in:","parts":[{"id":"ra-5.a_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-5(a)[2][a]"}],"prose":"the information system;"},{"id":"ra-5.a_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-5(a)[2][b]"}],"prose":"hosted applications;"}]},{"id":"ra-5.a_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(a)[3]"}],"prose":"when new vulnerabilities potentially affecting the system\/applications are identified and reported, scans for vulnerabilities in:","parts":[{"id":"ra-5.a_obj.3.a","name":"objective","props":[{"name":"label","value":"RA-5(a)[3][a]"}],"prose":"the information system;"},{"id":"ra-5.a_obj.3.b","name":"objective","props":[{"name":"label","value":"RA-5(a)[3][b]"}],"prose":"hosted applications;"}]}]},{"id":"ra-5.b_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)"}],"prose":"employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for:","parts":[{"id":"ra-5.b.1_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)"}],"parts":[{"id":"ra-5.b.1_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)[1]"}],"prose":"enumerating platforms;"},{"id":"ra-5.b.1_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)[2]"}],"prose":"enumerating software flaws;"},{"id":"ra-5.b.1_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)[3]"}],"prose":"enumerating improper configurations;"}]},{"id":"ra-5.b.2_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)(2)"}],"parts":[{"id":"ra-5.b.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(b)(2)[1]"}],"prose":"formatting checklists;"},{"id":"ra-5.b.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(b)(2)[2]"}],"prose":"formatting test procedures;"}]},{"id":"ra-5.b.3_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)(3)"}],"prose":"measuring vulnerability impact;"}]},{"id":"ra-5.c_obj","name":"objective","props":[{"name":"label","value":"RA-5(c)"}],"parts":[{"id":"ra-5.c_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(c)[1]"}],"prose":"analyzes vulnerability scan reports;"},{"id":"ra-5.c_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(c)[2]"}],"prose":"analyzes results from security control assessments;"}]},{"id":"ra-5.d_obj","name":"objective","props":[{"name":"label","value":"RA-5(d)"}],"parts":[{"id":"ra-5.d_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(d)[1]"}],"prose":"defines response times to remediate legitimate vulnerabilities in accordance with an organizational assessment of risk;"},{"id":"ra-5.d_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(d)[2]"}],"prose":"remediates legitimate vulnerabilities within the organization-defined response times in accordance with an organizational assessment of risk;"}]},{"id":"ra-5.e_obj","name":"objective","props":[{"name":"label","value":"RA-5(e)"}],"parts":[{"id":"ra-5.e_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(e)[1]"}],"prose":"defines personnel or roles with whom information obtained from the vulnerability scanning process and security control assessments is to be shared;"},{"id":"ra-5.e_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(e)[2]"}],"prose":"shares information obtained from the vulnerability scanning process with organization-defined personnel or roles to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies); and"},{"id":"ra-5.e_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(e)[3]"}],"prose":"shares information obtained from security control assessments with organization-defined personnel or roles to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies)."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nprocedures addressing vulnerability scanning\n\nrisk assessment\n\nsecurity plan\n\nsecurity assessment report\n\nvulnerability scanning tools and associated configuration documentation\n\nvulnerability scanning results\n\npatch and vulnerability management records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with risk assessment, security control assessment and vulnerability scanning responsibilities\n\norganizational personnel with vulnerability scan analysis responsibilities\n\norganizational personnel with vulnerability remediation responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for vulnerability scanning, analysis, remediation, and information sharing\n\nautomated mechanisms supporting and\/or implementing vulnerability scanning, analysis, remediation, and information sharing"}]}]}]},{"id":"sa","class":"family","title":"System and Services Acquisition","controls":[{"id":"sa-1","class":"SP800-53","title":"System and Services Acquisition Policy and Procedures","params":[{"id":"sa-1_prm_1","label":"organization-defined personnel or roles"},{"id":"sa-1_prm_2","label":"organization-defined frequency"},{"id":"sa-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-1"},{"name":"sort-id","value":"sa-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"sa-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, sa-1_prm_1 }}:","parts":[{"id":"sa-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system and services acquisition policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"sa-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls; and"}]},{"id":"sa-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"sa-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System and services acquisition policy {{ insert: param, sa-1_prm_2 }}; and"},{"id":"sa-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System and services acquisition procedures {{ insert: param, sa-1_prm_3 }}."}]}]},{"id":"sa-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the SA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"sa-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-1.a_obj","name":"objective","props":[{"name":"label","value":"SA-1(a)"}],"parts":[{"id":"sa-1.a.1_obj","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)"}],"parts":[{"id":"sa-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1]"}],"prose":"develops and documents a system and services acquisition policy that addresses:","parts":[{"id":"sa-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"sa-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"sa-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"sa-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"sa-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"sa-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"sa-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"sa-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system and services acquisition policy is to be disseminated;"},{"id":"sa-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[3]"}],"prose":"disseminates the system and services acquisition policy to organization-defined personnel or roles;"}]},{"id":"sa-1.a.2_obj","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)"}],"parts":[{"id":"sa-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls;"},{"id":"sa-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"sa-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"sa-1.b_obj","name":"objective","props":[{"name":"label","value":"SA-1(b)"}],"parts":[{"id":"sa-1.b.1_obj","name":"objective","props":[{"name":"label","value":"SA-1(b)(1)"}],"parts":[{"id":"sa-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system and services acquisition policy;"},{"id":"sa-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(b)(1)[2]"}],"prose":"reviews and updates the current system and services acquisition policy with the organization-defined frequency;"}]},{"id":"sa-1.b.2_obj","name":"objective","props":[{"name":"label","value":"SA-1(b)(2)"}],"parts":[{"id":"sa-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system and services acquisition procedures; and"},{"id":"sa-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(b)(2)[2]"}],"prose":"reviews and updates the current system and services acquisition procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"sa-2","class":"SP800-53","title":"Allocation of Resources","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-2"},{"name":"sort-id","value":"sa-02"}],"links":[{"href":"#29fcfe59-33cd-494a-8756-5907ae3a8f92","rel":"reference"}],"parts":[{"id":"sa-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Determines information security requirements for the information system or information system service in mission\/business process planning;"},{"id":"sa-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Determines, documents, and allocates the resources required to protect the information system or information system service as part of its capital planning and investment control process; and"},{"id":"sa-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Establishes a discrete line item for information security in organizational programming and budgeting documentation."}]},{"id":"sa-2_gdn","name":"guidance","prose":"Resource allocation for information security includes funding for the initial information system or information system service acquisition and funding for the sustainment of the system\/service.","links":[{"href":"#pm-3","rel":"related"},{"href":"#pm-11","rel":"related"}]},{"id":"sa-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-2.a_obj","name":"objective","props":[{"name":"label","value":"SA-2(a)"}],"prose":"determines information security requirements for the information system or information system service in mission\/business process planning;"},{"id":"sa-2.b_obj","name":"objective","props":[{"name":"label","value":"SA-2(b)"}],"prose":"to protect the information system or information system service as part of its capital planning and investment control process:","parts":[{"id":"sa-2.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-2(b)[1]"}],"prose":"determines the resources required;"},{"id":"sa-2.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-2(b)[2]"}],"prose":"documents the resources required;"},{"id":"sa-2.b_obj.3","name":"objective","props":[{"name":"label","value":"SA-2(b)[3]"}],"prose":"allocates the resources required; and"}]},{"id":"sa-2.c_obj","name":"objective","props":[{"name":"label","value":"SA-2(c)"}],"prose":"establishes a discrete line item for information security in organizational programming and budgeting documentation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the allocation of resources to information security requirements\n\nprocedures addressing capital planning and investment control\n\norganizational programming and budgeting documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with capital planning, investment control, organizational programming and budgeting responsibilities\n\norganizational personnel responsible for determining information security requirements for information systems\/services\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for determining information security requirements\n\norganizational processes for capital planning, programming, and budgeting\n\nautomated mechanisms supporting and\/or implementing organizational capital planning, programming, and budgeting"}]}]},{"id":"sa-3","class":"SP800-53","title":"System Development Life Cycle","params":[{"id":"sa-3_prm_1","label":"organization-defined system development life cycle"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-3"},{"name":"sort-id","value":"sa-03"}],"links":[{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#abd950ae-092f-4b7a-b374-1c7c67fe9350","rel":"reference"}],"parts":[{"id":"sa-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Manages the information system using {{ insert: param, sa-3_prm_1 }} that incorporates information security considerations;"},{"id":"sa-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Defines and documents information security roles and responsibilities throughout the system development life cycle;"},{"id":"sa-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Identifies individuals having information security roles and responsibilities; and"},{"id":"sa-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Integrates the organizational information security risk management process into system development life cycle activities."}]},{"id":"sa-3_gdn","name":"guidance","prose":"A well-defined system development life cycle provides the foundation for the successful development, implementation, and operation of organizational information systems. To apply the required security controls within the system development life cycle requires a basic understanding of information security, threats, vulnerabilities, adverse impacts, and risk to critical missions\/business functions. The security engineering principles in SA-8 cannot be properly applied if individuals that design, code, and test information systems and system components (including information technology products) do not understand security. Therefore, organizations include qualified personnel, for example, chief information security officers, security architects, security engineers, and information system security officers in system development life cycle activities to ensure that security requirements are incorporated into organizational information systems. It is equally important that developers include individuals on the development team that possess the requisite security expertise and skills to ensure that needed security capabilities are effectively integrated into the information system. Security awareness and training programs can help ensure that individuals having key security roles and responsibilities have the appropriate experience, skills, and expertise to conduct assigned system development life cycle activities. The effective integration of security requirements into enterprise architecture also helps to ensure that important security considerations are addressed early in the system development life cycle and that those considerations are directly related to the organizational mission\/business processes. This process also facilitates the integration of the information security architecture into the enterprise architecture, consistent with organizational risk management and information security strategies.","links":[{"href":"#at-3","rel":"related"},{"href":"#pm-7","rel":"related"},{"href":"#sa-8","rel":"related"}]},{"id":"sa-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-3.a_obj","name":"objective","props":[{"name":"label","value":"SA-3(a)"}],"parts":[{"id":"sa-3.a_obj.1","name":"objective","props":[{"name":"label","value":"SA-3(a)[1]"}],"prose":"defines a system development life cycle that incorporates information security considerations to be used to manage the information system;"},{"id":"sa-3.a_obj.2","name":"objective","props":[{"name":"label","value":"SA-3(a)[2]"}],"prose":"manages the information system using the organization-defined system development life cycle;"}]},{"id":"sa-3.b_obj","name":"objective","props":[{"name":"label","value":"SA-3(b)"}],"prose":"defines and documents information security roles and responsibilities throughout the system development life cycle;"},{"id":"sa-3.c_obj","name":"objective","props":[{"name":"label","value":"SA-3(c)"}],"prose":"identifies individuals having information security roles and responsibilities; and"},{"id":"sa-3.d_obj","name":"objective","props":[{"name":"label","value":"SA-3(d)"}],"prose":"integrates the organizational information security risk management process into system development life cycle activities."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security into the system development life cycle process\n\ninformation system development life cycle documentation\n\ninformation security risk management strategy\/program documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security and system life cycle development responsibilities\n\norganizational personnel with information security risk management responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for defining and documenting the SDLC\n\norganizational processes for identifying SDLC roles and responsibilities\n\norganizational process for integrating information security risk management into the SDLC\n\nautomated mechanisms supporting and\/or implementing the SDLC"}]}]},{"id":"sa-4","class":"SP800-53","title":"Acquisition Process","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-4"},{"name":"sort-id","value":"sa-04"}],"links":[{"href":"#ad733a42-a7ed-4774-b988-4930c28852f3","rel":"reference"},{"href":"#1737a687-52fb-4008-b900-cbfa836f7b65","rel":"reference"},{"href":"#d715b234-9b5b-4e07-b1ed-99836727664d","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#0a5db899-f033-467f-8631-f5a8ba971475","rel":"reference"},{"href":"#0c775bc3-bfc3-42c7-a382-88949f503171","rel":"reference"},{"href":"#d818efd3-db31-4953-8afa-9e76afe83ce2","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#abd950ae-092f-4b7a-b374-1c7c67fe9350","rel":"reference"},{"href":"#84a37532-6db6-477b-9ea8-f9085ebca0fc","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"},{"href":"#56d671da-6b7b-4abf-8296-84b61980390a","rel":"reference"},{"href":"#c95a9986-3cd6-4a98-931b-ccfc56cb11e5","rel":"reference"},{"href":"#5ed1f4d5-1494-421b-97ed-39d3c88ab51f","rel":"reference"},{"href":"#bbd50dd1-54ce-4432-959d-63ea564b1bb4","rel":"reference"}],"parts":[{"id":"sa-4_smt","name":"statement","prose":"The organization includes the following requirements, descriptions, and criteria, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission\/business needs:","parts":[{"id":"sa-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Security functional requirements;"},{"id":"sa-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Security strength requirements;"},{"id":"sa-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Security assurance requirements;"},{"id":"sa-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Security-related documentation requirements;"},{"id":"sa-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Requirements for protecting security-related documentation;"},{"id":"sa-4_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Description of the information system development environment and environment in which the system is intended to operate; and"},{"id":"sa-4_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Acceptance criteria."}]},{"id":"sa-4_gdn","name":"guidance","prose":"Information system components are discrete, identifiable information technology assets (e.g., hardware, software, or firmware) that represent the building blocks of an information system. Information system components include commercial information technology products. Security functional requirements include security capabilities, security functions, and security mechanisms. Security strength requirements associated with such capabilities, functions, and mechanisms include degree of correctness, completeness, resistance to direct attack, and resistance to tampering or bypass. Security assurance requirements include: (i) development processes, procedures, practices, and methodologies; and (ii) evidence from development and assessment activities providing grounds for confidence that the required security functionality has been implemented and the required security strength has been achieved. Security documentation requirements address all phases of the system development life cycle. Security functionality, assurance, and documentation requirements are expressed in terms of security controls and control enhancements that have been selected through the tailoring process. The security control tailoring process includes, for example, the specification of parameter values through the use of assignment and selection statements and the specification of platform dependencies and implementation information. Security documentation provides user and administrator guidance regarding the implementation and operation of security controls. The level of detail required in security documentation is based on the security category or classification level of the information system and the degree to which organizations depend on the stated security capability, functions, or mechanisms to meet overall risk response expectations (as defined in the organizational risk management strategy). Security requirements can also include organizationally mandated configuration settings specifying allowed functions, ports, protocols, and services. Acceptance criteria for information systems, information system components, and information system services are defined in the same manner as such criteria for any organizational acquisition or procurement. The Federal Acquisition Regulation (FAR) Section 7.103 contains information security requirements from FISMA.","links":[{"href":"#cm-6","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#ps-7","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#sa-12","rel":"related"}]},{"id":"sa-4_obj","name":"objective","prose":"Determine if the organization includes the following requirements, descriptions, and criteria, explicitly or by reference, in the acquisition contracts for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission\/business needs:","parts":[{"id":"sa-4.a_obj","name":"objective","props":[{"name":"label","value":"SA-4(a)"}],"prose":"security functional requirements;"},{"id":"sa-4.b_obj","name":"objective","props":[{"name":"label","value":"SA-4(b)"}],"prose":"security strength requirements;"},{"id":"sa-4.c_obj","name":"objective","props":[{"name":"label","value":"SA-4(c)"}],"prose":"security assurance requirements;"},{"id":"sa-4.d_obj","name":"objective","props":[{"name":"label","value":"SA-4(d)"}],"prose":"security-related documentation requirements;"},{"id":"sa-4.e_obj","name":"objective","props":[{"name":"label","value":"SA-4(e)"}],"prose":"requirements for protecting security-related documentation;"},{"id":"sa-4.f_obj","name":"objective","props":[{"name":"label","value":"SA-4(f)"}],"prose":"description of:","parts":[{"id":"sa-4.f_obj.1","name":"objective","props":[{"name":"label","value":"SA-4(f)[1]"}],"prose":"the information system development environment;"},{"id":"sa-4.f_obj.2","name":"objective","props":[{"name":"label","value":"SA-4(f)[2]"}],"prose":"the environment in which the system is intended to operate; and"}]},{"id":"sa-4.g_obj","name":"objective","props":[{"name":"label","value":"SA-4(g)"}],"prose":"acceptance criteria."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\nacquisition contracts for the information system, system component, or information system service\n\ninformation system design documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security functional, strength, and assurance requirements\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for determining information system security functional, strength, and assurance requirements\n\norganizational processes for developing acquisition contracts\n\nautomated mechanisms supporting and\/or implementing acquisitions and inclusion of security requirements in contracts"}]}],"controls":[{"id":"sa-4.10","class":"SP800-53-enhancement","title":"Use of Approved PIV Products","props":[{"name":"label","value":"SA-4(10)"},{"name":"sort-id","value":"sa-04.10"}],"parts":[{"id":"sa-4.10_smt","name":"statement","prose":"The organization employs only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational information systems."},{"id":"sa-4.10_gdn","name":"guidance","links":[{"href":"#ia-2","rel":"related"},{"href":"#ia-8","rel":"related"}]},{"id":"sa-4.10_obj","name":"objective","prose":"Determine if the organization employs only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational information systems."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\nsolicitation documentation\n\nacquisition documentation\n\nacquisition contracts for the information system, system component, or information system service\n\nservice-level agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\norganizational personnel with responsibility for ensuring only FIPS 201-approved products are implemented\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for selecting and employing FIPS 201-approved products"}]}]}]},{"id":"sa-5","class":"SP800-53","title":"Information System Documentation","params":[{"id":"sa-5_prm_1","label":"organization-defined actions"},{"id":"sa-5_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"SA-5"},{"name":"sort-id","value":"sa-05"}],"parts":[{"id":"sa-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Obtains administrator documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Secure configuration, installation, and operation of the system, component, or service;"},{"id":"sa-5_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Effective use and maintenance of security functions\/mechanisms; and"},{"id":"sa-5_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Known vulnerabilities regarding configuration and use of administrative (i.e., privileged) functions;"}]},{"id":"sa-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Obtains user documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"User-accessible security functions\/mechanisms and how to effectively use those security functions\/mechanisms;"},{"id":"sa-5_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and"},{"id":"sa-5_smt.b.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"User responsibilities in maintaining the security of the system, component, or service;"}]},{"id":"sa-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent and takes {{ insert: param, sa-5_prm_1 }} in response;"},{"id":"sa-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects documentation as required, in accordance with the risk management strategy; and"},{"id":"sa-5_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Distributes documentation to {{ insert: param, sa-5_prm_2 }}."}]},{"id":"sa-5_gdn","name":"guidance","prose":"This control helps organizational personnel understand the implementation and operation of security controls associated with information systems, system components, and information system services. Organizations consider establishing specific measures to determine the quality\/completeness of the content provided. The inability to obtain needed documentation may occur, for example, due to the age of the information system\/component or lack of support from developers and contractors. In those situations, organizations may need to recreate selected documentation if such documentation is essential to the effective implementation or operation of security controls. The level of protection provided for selected information system, component, or service documentation is commensurate with the security category or classification of the system. For example, documentation associated with a key DoD weapons system or command and control system would typically require a higher level of protection than a routine administrative system. Documentation that addresses information system vulnerabilities may also require an increased level of protection. Secure operation of the information system, includes, for example, initially starting the system and resuming secure system operation after any lapse in system operation.","links":[{"href":"#cm-6","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#ps-2","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-4","rel":"related"}]},{"id":"sa-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-5.a_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)"}],"prose":"obtains administrator documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5.a.1_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)"}],"parts":[{"id":"sa-5.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)[1]"}],"prose":"secure configuration of the system, system component, or service;"},{"id":"sa-5.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)[2]"}],"prose":"secure installation of the system, system component, or service;"},{"id":"sa-5.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)[3]"}],"prose":"secure operation of the system, system component, or service;"}]},{"id":"sa-5.a.2_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)(2)"}],"parts":[{"id":"sa-5.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(a)(2)[1]"}],"prose":"effective use of the security features\/mechanisms;"},{"id":"sa-5.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(a)(2)[2]"}],"prose":"effective maintenance of the security features\/mechanisms;"}]},{"id":"sa-5.a.3_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)(3)"}],"prose":"known vulnerabilities regarding configuration and use of administrative (i.e., privileged) functions;"}]},{"id":"sa-5.b_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)"}],"prose":"obtains user documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5.b.1_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)(1)"}],"parts":[{"id":"sa-5.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(b)(1)[1]"}],"prose":"user-accessible security functions\/mechanisms;"},{"id":"sa-5.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(b)(1)[2]"}],"prose":"how to effectively use those functions\/mechanisms;"}]},{"id":"sa-5.b.2_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)(2)"}],"prose":"methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner;"},{"id":"sa-5.b.3_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)(3)"}],"prose":"user responsibilities in maintaining the security of the system, component, or service;"}]},{"id":"sa-5.c_obj","name":"objective","props":[{"name":"label","value":"SA-5(c)"}],"parts":[{"id":"sa-5.c_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(c)[1]"}],"prose":"defines actions to be taken after documented attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent;"},{"id":"sa-5.c_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(c)[2]"}],"prose":"documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent;"},{"id":"sa-5.c_obj.3","name":"objective","props":[{"name":"label","value":"SA-5(c)[3]"}],"prose":"takes organization-defined actions in response;"}]},{"id":"sa-5.d_obj","name":"objective","props":[{"name":"label","value":"SA-5(d)"}],"prose":"protects documentation as required, in accordance with the risk management strategy;"},{"id":"sa-5.e_obj","name":"objective","props":[{"name":"label","value":"SA-5(e)"}],"parts":[{"id":"sa-5.e_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(e)[1]"}],"prose":"defines personnel or roles to whom documentation is to be distributed; and"},{"id":"sa-5.e_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(e)[2]"}],"prose":"distributes documentation to organization-defined personnel or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing information system documentation\n\ninformation system documentation including administrator and user guides\n\nrecords documenting attempts to obtain unavailable or nonexistent information system documentation\n\nlist of actions to be taken in response to documented attempts to obtain information system, system component, or information system service documentation\n\nrisk management strategy documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\nsystem administrators\n\norganizational personnel operating, using, and\/or maintaining the information system\n\ninformation system developers\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for obtaining, protecting, and distributing information system administrator and user documentation"}]}]},{"id":"sa-9","class":"SP800-53","title":"External Information System Services","params":[{"id":"sa-9_prm_1","label":"organization-defined security controls"},{"id":"sa-9_prm_2","label":"organization-defined processes, methods, and techniques"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-9"},{"name":"sort-id","value":"sa-09"}],"links":[{"href":"#0c775bc3-bfc3-42c7-a382-88949f503171","rel":"reference"}],"parts":[{"id":"sa-9_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Requires that providers of external information system services comply with organizational information security requirements and employ {{ insert: param, sa-9_prm_1 }} in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"},{"id":"sa-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Defines and documents government oversight and user roles and responsibilities with regard to external information system services; and"},{"id":"sa-9_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Employs {{ insert: param, sa-9_prm_2 }} to monitor security control compliance by external service providers on an ongoing basis."}]},{"id":"sa-9_gdn","name":"guidance","prose":"External information system services are services that are implemented outside of the authorization boundaries of organizational information systems. This includes services that are used by, but not a part of, organizational information systems. FISMA and OMB policy require that organizations using external service providers that are processing, storing, or transmitting federal information or operating information systems on behalf of the federal government ensure that such providers meet the same security requirements that federal agencies are required to meet. Organizations establish relationships with external service providers in a variety of ways including, for example, through joint ventures, business partnerships, contracts, interagency agreements, lines of business arrangements, licensing agreements, and supply chain exchanges. The responsibility for managing risks from the use of external information system services remains with authorizing officials. For services external to organizations, a chain of trust requires that organizations establish and retain a level of confidence that each participating provider in the potentially complex consumer-provider relationship provides adequate protection for the services rendered. The extent and nature of this chain of trust varies based on the relationships between organizations and the external providers. Organizations document the basis for trust relationships so the relationships can be monitored over time. External information system services documentation includes government, service providers, end user security roles and responsibilities, and service-level agreements. Service-level agreements define expectations of performance for security controls, describe measurable outcomes, and identify remedies and response requirements for identified instances of noncompliance.","links":[{"href":"#ca-3","rel":"related"},{"href":"#ir-7","rel":"related"},{"href":"#ps-7","rel":"related"}]},{"id":"sa-9_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-9.a_obj","name":"objective","props":[{"name":"label","value":"SA-9(a)"}],"parts":[{"id":"sa-9.a_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(a)[1]"}],"prose":"defines security controls to be employed by providers of external information system services;"},{"id":"sa-9.a_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(a)[2]"}],"prose":"requires that providers of external information system services comply with organizational information security requirements;"},{"id":"sa-9.a_obj.3","name":"objective","props":[{"name":"label","value":"SA-9(a)[3]"}],"prose":"requires that providers of external information system services employ organization-defined security controls in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"}]},{"id":"sa-9.b_obj","name":"objective","props":[{"name":"label","value":"SA-9(b)"}],"parts":[{"id":"sa-9.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(b)[1]"}],"prose":"defines and documents government oversight with regard to external information system services;"},{"id":"sa-9.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(b)[2]"}],"prose":"defines and documents user roles and responsibilities with regard to external information system services;"}]},{"id":"sa-9.c_obj","name":"objective","props":[{"name":"label","value":"SA-9(c)"}],"parts":[{"id":"sa-9.c_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(c)[1]"}],"prose":"defines processes, methods, and techniques to be employed to monitor security control compliance by external service providers; and"},{"id":"sa-9.c_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(c)[2]"}],"prose":"employs organization-defined processes, methods, and techniques to monitor security control compliance by external service providers on an ongoing basis."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing external information system services\n\nprocedures addressing methods and techniques for monitoring security control compliance by external service providers of information system services\n\nacquisition contracts, service-level agreements\n\norganizational security requirements and security specifications for external provider services\n\nsecurity control assessment evidence from external providers of information system services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\nexternal providers of information system services\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring security control compliance by external service providers on an ongoing basis\n\nautomated mechanisms for monitoring security control compliance by external service providers on an ongoing basis"}]}]}]},{"id":"sc","class":"family","title":"System and Communications Protection","controls":[{"id":"sc-1","class":"SP800-53","title":"System and Communications Protection Policy and Procedures","params":[{"id":"sc-1_prm_1","label":"organization-defined personnel or roles"},{"id":"sc-1_prm_2","label":"organization-defined frequency"},{"id":"sc-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-1"},{"name":"sort-id","value":"sc-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"sc-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"sc-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, sc-1_prm_1 }}:","parts":[{"id":"sc-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"sc-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls; and"}]},{"id":"sc-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"sc-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System and communications protection policy {{ insert: param, sc-1_prm_2 }}; and"},{"id":"sc-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System and communications protection procedures {{ insert: param, sc-1_prm_3 }}."}]}]},{"id":"sc-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the SC family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"sc-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-1.a_obj","name":"objective","props":[{"name":"label","value":"SC-1(a)"}],"parts":[{"id":"sc-1.a.1_obj","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)"}],"parts":[{"id":"sc-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1]"}],"prose":"develops and documents a system and communications protection policy that addresses:","parts":[{"id":"sc-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"sc-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"sc-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"sc-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"sc-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"sc-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"sc-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"sc-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system and communications protection policy is to be disseminated;"},{"id":"sc-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[3]"}],"prose":"disseminates the system and communications protection policy to organization-defined personnel or roles;"}]},{"id":"sc-1.a.2_obj","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)"}],"parts":[{"id":"sc-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls;"},{"id":"sc-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"sc-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"sc-1.b_obj","name":"objective","props":[{"name":"label","value":"SC-1(b)"}],"parts":[{"id":"sc-1.b.1_obj","name":"objective","props":[{"name":"label","value":"SC-1(b)(1)"}],"parts":[{"id":"sc-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system and communications protection policy;"},{"id":"sc-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(b)(1)[2]"}],"prose":"reviews and updates the current system and communications protection policy with the organization-defined frequency;"}]},{"id":"sc-1.b.2_obj","name":"objective","props":[{"name":"label","value":"SC-1(b)(2)"}],"parts":[{"id":"sc-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system and communications protection procedures; and"},{"id":"sc-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(b)(2)[2]"}],"prose":"reviews and updates the current system and communications protection procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and communications protection responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"sc-5","class":"SP800-53","title":"Denial of Service Protection","params":[{"id":"sc-5_prm_1","label":"organization-defined types of denial of service attacks or references to sources for such information"},{"id":"sc-5_prm_2","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-5"},{"name":"sort-id","value":"sc-05"}],"parts":[{"id":"sc-5_smt","name":"statement","prose":"The information system protects against or limits the effects of the following types of denial of service attacks: {{ insert: param, sc-5_prm_1 }} by employing {{ insert: param, sc-5_prm_2 }}."},{"id":"sc-5_gdn","name":"guidance","prose":"A variety of technologies exist to limit, or in some cases, eliminate the effects of denial of service attacks. For example, boundary protection devices can filter certain types of packets to protect information system components on internal organizational networks from being directly affected by denial of service attacks. Employing increased capacity and bandwidth combined with service redundancy may also reduce the susceptibility to denial of service attacks.","links":[{"href":"#sc-6","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"sc-5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-5_obj.1","name":"objective","props":[{"name":"label","value":"SC-5[1]"}],"prose":"the organization defines types of denial of service attacks or reference to source of such information for the information system to protect against or limit the effects;"},{"id":"sc-5_obj.2","name":"objective","props":[{"name":"label","value":"SC-5[2]"}],"prose":"the organization defines security safeguards to be employed by the information system to protect against or limit the effects of organization-defined types of denial of service attacks; and"},{"id":"sc-5_obj.3","name":"objective","props":[{"name":"label","value":"SC-5[3]"}],"prose":"the information system protects against or limits the effects of the organization-defined denial or service attacks (or reference to source for such information) by employing organization-defined security safeguards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing denial of service protection\n\ninformation system design documentation\n\nsecurity plan\n\nlist of denial of services attacks requiring employment of security safeguards to protect against or limit effects of such attacks\n\nlist of security safeguards protecting against or limiting the effects of denial of service attacks\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with incident response responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms protecting against or limiting the effects of denial of service attacks"}]}]},{"id":"sc-7","class":"SP800-53","title":"Boundary Protection","params":[{"id":"sc-7_prm_1","select":{"choice":["physically","logically"]}}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-7"},{"name":"sort-id","value":"sc-07"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#756a8e86-57d5-4701-8382-f7a40439665a","rel":"reference"},{"href":"#99f331f2-a9f0-46c2-9856-a3cbb9b89442","rel":"reference"}],"parts":[{"id":"sc-7_smt","name":"statement","prose":"The information system:","parts":[{"id":"sc-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Monitors and controls communications at the external boundary of the system and at key internal boundaries within the system;"},{"id":"sc-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Implements subnetworks for publicly accessible system components that are {{ insert: param, sc-7_prm_1 }} separated from internal organizational networks; and"},{"id":"sc-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture."}]},{"id":"sc-7_gdn","name":"guidance","prose":"Managed interfaces include, for example, gateways, routers, firewalls, guards, network-based malicious code analysis and virtualization systems, or encrypted tunnels implemented within a security architecture (e.g., routers protecting firewalls or application gateways residing on protected subnetworks). Subnetworks that are physically or logically separated from internal networks are referred to as demilitarized zones or DMZs. Restricting or prohibiting interfaces within organizational information systems includes, for example, restricting external web traffic to designated web servers within managed interfaces and prohibiting external traffic that appears to be spoofing internal addresses. Organizations consider the shared nature of commercial telecommunications services in the implementation of security controls associated with the use of such services. Commercial telecommunications services are commonly based on network components and consolidated management systems shared by all attached commercial customers, and may also include third party-provided access lines and other service elements. Such transmission services may represent sources of increased risk despite contract security provisions.","links":[{"href":"#ac-4","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#cp-8","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"sc-7_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"sc-7.a_obj","name":"objective","props":[{"name":"label","value":"SC-7(a)"}],"parts":[{"id":"sc-7.a_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(a)[1]"}],"prose":"monitors communications at the external boundary of the information system;"},{"id":"sc-7.a_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(a)[2]"}],"prose":"monitors communications at key internal boundaries within the system;"},{"id":"sc-7.a_obj.3","name":"objective","props":[{"name":"label","value":"SC-7(a)[3]"}],"prose":"controls communications at the external boundary of the information system;"},{"id":"sc-7.a_obj.4","name":"objective","props":[{"name":"label","value":"SC-7(a)[4]"}],"prose":"controls communications at key internal boundaries within the system;"}]},{"id":"sc-7.b_obj","name":"objective","props":[{"name":"label","value":"SC-7(b)"}],"prose":"implements subnetworks for publicly accessible system components that are either:","parts":[{"id":"sc-7.b_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(b)[1]"}],"prose":"physically separated from internal organizational networks; and\/or"},{"id":"sc-7.b_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(b)[2]"}],"prose":"logically separated from internal organizational networks; and"}]},{"id":"sc-7.c_obj","name":"objective","props":[{"name":"label","value":"SC-7(c)"}],"prose":"connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\nlist of key internal boundaries of the information system\n\ninformation system design documentation\n\nboundary protection hardware and software\n\ninformation system configuration settings and associated documentation\n\nenterprise security architecture documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing boundary protection capability"}]}]},{"id":"sc-12","class":"SP800-53","title":"Cryptographic Key Establishment and Management","params":[{"id":"sc-12_prm_1","label":"organization-defined requirements for key generation, distribution, storage, access, and destruction"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-12"},{"name":"sort-id","value":"sc-12"}],"links":[{"href":"#81f09e01-d0b0-4ae2-aa6a-064ed9950070","rel":"reference"},{"href":"#a6c774c0-bf50-4590-9841-2a5c1c91ac6f","rel":"reference"}],"parts":[{"id":"sc-12_smt","name":"statement","prose":"The organization establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with {{ insert: param, sc-12_prm_1 }}."},{"id":"sc-12_gdn","name":"guidance","prose":"Cryptographic key management and establishment can be performed using manual procedures or automated mechanisms with supporting manual procedures. Organizations define key management requirements in accordance with applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance, specifying appropriate options, levels, and parameters. Organizations manage trust stores to ensure that only approved trust anchors are in such trust stores. This includes certificates with visibility external to organizational information systems and certificates related to the internal operations of systems.","links":[{"href":"#sc-13","rel":"related"},{"href":"#sc-17","rel":"related"}]},{"id":"sc-12_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-12_obj.1","name":"objective","props":[{"name":"label","value":"SC-12[1]"}],"prose":"defines requirements for cryptographic key:","parts":[{"id":"sc-12_obj.1.a","name":"objective","props":[{"name":"label","value":"SC-12[1][a]"}],"prose":"generation;"},{"id":"sc-12_obj.1.b","name":"objective","props":[{"name":"label","value":"SC-12[1][b]"}],"prose":"distribution;"},{"id":"sc-12_obj.1.c","name":"objective","props":[{"name":"label","value":"SC-12[1][c]"}],"prose":"storage;"},{"id":"sc-12_obj.1.d","name":"objective","props":[{"name":"label","value":"SC-12[1][d]"}],"prose":"access;"},{"id":"sc-12_obj.1.e","name":"objective","props":[{"name":"label","value":"SC-12[1][e]"}],"prose":"destruction; and"}]},{"id":"sc-12_obj.2","name":"objective","props":[{"name":"label","value":"SC-12[2]"}],"prose":"establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key generation, distribution, storage, access, and destruction."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing cryptographic key establishment and management\n\ninformation system design documentation\n\ncryptographic mechanisms\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for cryptographic key establishment and\/or management"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing cryptographic key establishment and management"}]}]},{"id":"sc-13","class":"SP800-53","title":"Cryptographic Protection","params":[{"id":"sc-13_prm_1","label":"organization-defined cryptographic uses and type of cryptography required for each use"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-13"},{"name":"sort-id","value":"sc-13"}],"links":[{"href":"#39f9087d-7687-46d2-8eda-b6f4b7a4d8a9","rel":"reference"},{"href":"#6a1041fc-054e-4230-946b-2e6f4f3731bb","rel":"reference"},{"href":"#9b97ed27-3dd6-4f9a-ade5-1b43e9669794","rel":"reference"}],"parts":[{"id":"sc-13_smt","name":"statement","prose":"The information system implements {{ insert: param, sc-13_prm_1 }} in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards."},{"id":"sc-13_gdn","name":"guidance","prose":"Cryptography can be employed to support a variety of security solutions including, for example, the protection of classified and Controlled Unclassified Information, the provision of digital signatures, and the enforcement of information separation when authorized individuals have the necessary clearances for such information but lack the necessary formal access approvals. Cryptography can also be used to support random number generation and hash generation. Generally applicable cryptographic standards include FIPS-validated cryptography and NSA-approved cryptography. This control does not impose any requirements on organizations to use cryptography. However, if cryptography is required based on the selection of other security controls, organizations define each type of cryptographic use and the type of cryptography required (e.g., protection of classified information: NSA-approved cryptography; provision of digital signatures: FIPS-validated cryptography).","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-7","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#au-10","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-7","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-28","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"sc-13_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-13_obj.1","name":"objective","props":[{"name":"label","value":"SC-13[1]"}],"prose":"the organization defines cryptographic uses; and"},{"id":"sc-13_obj.2","name":"objective","props":[{"name":"label","value":"SC-13[2]"}],"prose":"the organization defines the type of cryptography required for each use; and"},{"id":"sc-13_obj.3","name":"objective","props":[{"name":"label","value":"SC-13[3]"}],"prose":"the information system implements the organization-defined cryptographic uses and type of cryptography required for each use in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing cryptographic protection\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ncryptographic module validation certificates\n\nlist of FIPS validated cryptographic modules\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with responsibilities for cryptographic protection"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing cryptographic protection"}]}]},{"id":"sc-15","class":"SP800-53","title":"Collaborative Computing Devices","params":[{"id":"sc-15_prm_1","label":"organization-defined exceptions where remote activation is to be allowed"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-15"},{"name":"sort-id","value":"sc-15"}],"parts":[{"id":"sc-15_smt","name":"statement","prose":"The information system:","parts":[{"id":"sc-15_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Prohibits remote activation of collaborative computing devices with the following exceptions: {{ insert: param, sc-15_prm_1 }}; and"},{"id":"sc-15_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Provides an explicit indication of use to users physically present at the devices."}]},{"id":"sc-15_gdn","name":"guidance","prose":"Collaborative computing devices include, for example, networked white boards, cameras, and microphones. Explicit indication of use includes, for example, signals to users when collaborative computing devices are activated.","links":[{"href":"#ac-21","rel":"related"}]},{"id":"sc-15_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-15.a_obj","name":"objective","props":[{"name":"label","value":"SC-15(a)"}],"parts":[{"id":"sc-15.a_obj.1","name":"objective","props":[{"name":"label","value":"SC-15(a)[1]"}],"prose":"the organization defines exceptions where remote activation of collaborative computing devices is to be allowed;"},{"id":"sc-15.a_obj.2","name":"objective","props":[{"name":"label","value":"SC-15(a)[2]"}],"prose":"the information system prohibits remote activation of collaborative computing devices, except for organization-defined exceptions where remote activation is to be allowed; and"}]},{"id":"sc-15.b_obj","name":"objective","props":[{"name":"label","value":"SC-15(b)"}],"prose":"the information system provides an explicit indication of use to users physically present at the devices."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing collaborative computing\n\naccess control policy and procedures\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with responsibilities for managing collaborative computing devices"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing management of remote activation of collaborative computing devices\n\nautomated mechanisms providing an indication of use of collaborative computing devices"}]}]},{"id":"sc-20","class":"SP800-53","title":"Secure Name \/ Address Resolution Service (authoritative Source)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-20"},{"name":"sort-id","value":"sc-20"}],"links":[{"href":"#28115a56-da6b-4d44-b1df-51dd7f048a3e","rel":"reference"},{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"}],"parts":[{"id":"sc-20_smt","name":"statement","prose":"The information system:","parts":[{"id":"sc-20_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Provides additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name\/address resolution queries; and"},{"id":"sc-20_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Provides the means to indicate the security status of child zones and (if the child supports secure resolution services) to enable verification of a chain of trust among parent and child domains, when operating as part of a distributed, hierarchical namespace."}]},{"id":"sc-20_gdn","name":"guidance","prose":"This control enables external clients including, for example, remote Internet clients, to obtain origin authentication and integrity verification assurances for the host\/service name to network address resolution information obtained through the service. Information systems that provide name and address resolution services include, for example, domain name system (DNS) servers. Additional artifacts include, for example, DNS Security (DNSSEC) digital signatures and cryptographic keys. DNS resource records are examples of authoritative data. The means to indicate the security status of child zones includes, for example, the use of delegation signer resource records in the DNS. The DNS security controls reflect (and are referenced from) OMB Memorandum 08-23. Information systems that use technologies other than the DNS to map between host\/service names and network addresses provide other means to assure the authenticity and integrity of response data.","links":[{"href":"#au-10","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-21","rel":"related"},{"href":"#sc-22","rel":"related"}]},{"id":"sc-20_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"sc-20.a_obj","name":"objective","props":[{"name":"label","value":"SC-20(a)"}],"prose":"provides additional data origin and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name\/address resolution queries;"},{"id":"sc-20.b_obj","name":"objective","props":[{"name":"label","value":"SC-20(b)"}],"prose":"provides the means to, when operating as part of a distributed, hierarchical namespace:","parts":[{"id":"sc-20.b_obj.1","name":"objective","props":[{"name":"label","value":"SC-20(b)[1]"}],"prose":"indicate the security status of child zones; and"},{"id":"sc-20.b_obj.2","name":"objective","props":[{"name":"label","value":"SC-20(b)[2]"}],"prose":"enable verification of a chain of trust among parent and child domains (if the child supports secure resolution services)."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing secure name\/address resolution service (authoritative source)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing DNS"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing secure name\/address resolution service"}]}]},{"id":"sc-21","class":"SP800-53","title":"Secure Name \/ Address Resolution Service (recursive or Caching Resolver)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-21"},{"name":"sort-id","value":"sc-21"}],"links":[{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"}],"parts":[{"id":"sc-21_smt","name":"statement","prose":"The information system requests and performs data origin authentication and data integrity verification on the name\/address resolution responses the system receives from authoritative sources."},{"id":"sc-21_gdn","name":"guidance","prose":"Each client of name resolution services either performs this validation on its own, or has authenticated channels to trusted validation providers. Information systems that provide name and address resolution services for local clients include, for example, recursive resolving or caching domain name system (DNS) servers. DNS client resolvers either perform validation of DNSSEC signatures, or clients use authenticated channels to recursive resolvers that perform such validations. Information systems that use technologies other than the DNS to map between host\/service names and network addresses provide other means to enable clients to verify the authenticity and integrity of response data.","links":[{"href":"#sc-20","rel":"related"},{"href":"#sc-22","rel":"related"}]},{"id":"sc-21_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"sc-21_obj.1","name":"objective","props":[{"name":"label","value":"SC-21[1]"}],"prose":"requests data origin authentication on the name\/address resolution responses the system receives from authoritative sources;"},{"id":"sc-21_obj.2","name":"objective","props":[{"name":"label","value":"SC-21[2]"}],"prose":"requests data integrity verification on the name\/address resolution responses the system receives from authoritative sources;"},{"id":"sc-21_obj.3","name":"objective","props":[{"name":"label","value":"SC-21[3]"}],"prose":"performs data origin authentication on the name\/address resolution responses the system receives from authoritative sources; and"},{"id":"sc-21_obj.4","name":"objective","props":[{"name":"label","value":"SC-21[4]"}],"prose":"performs data integrity verification on the name\/address resolution responses the system receives from authoritative sources."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing secure name\/address resolution service (recursive or caching resolver)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing DNS"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing data origin authentication and data integrity verification for name\/address resolution services"}]}]},{"id":"sc-22","class":"SP800-53","title":"Architecture and Provisioning for Name \/ Address Resolution Service","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-22"},{"name":"sort-id","value":"sc-22"}],"links":[{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"}],"parts":[{"id":"sc-22_smt","name":"statement","prose":"The information systems that collectively provide name\/address resolution service for an organization are fault-tolerant and implement internal\/external role separation."},{"id":"sc-22_gdn","name":"guidance","prose":"Information systems that provide name and address resolution services include, for example, domain name system (DNS) servers. To eliminate single points of failure and to enhance redundancy, organizations employ at least two authoritative domain name system servers, one configured as the primary server and the other configured as the secondary server. Additionally, organizations typically deploy the servers in two geographically separated network subnetworks (i.e., not located in the same physical facility). For role separation, DNS servers with internal roles only process name and address resolution requests from within organizations (i.e., from internal clients). DNS servers with external roles only process name and address resolution information requests from clients external to organizations (i.e., on external networks including the Internet). Organizations specify clients that can access authoritative DNS servers in particular roles (e.g., by address ranges, explicit lists).","links":[{"href":"#sc-2","rel":"related"},{"href":"#sc-20","rel":"related"},{"href":"#sc-21","rel":"related"},{"href":"#sc-24","rel":"related"}]},{"id":"sc-22_obj","name":"objective","prose":"Determine if the information systems that collectively provide name\/address resolution service for an organization:","parts":[{"id":"sc-22_obj.1","name":"objective","props":[{"name":"label","value":"SC-22[1]"}],"prose":"are fault tolerant; and"},{"id":"sc-22_obj.2","name":"objective","props":[{"name":"label","value":"SC-22[2]"}],"prose":"implement internal\/external role separation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing architecture and provisioning for name\/address resolution service\n\naccess control policy and procedures\n\ninformation system design documentation\n\nassessment results from independent, testing organizations\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing DNS"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing name\/address resolution service for fault tolerance and role separation"}]}]},{"id":"sc-39","class":"SP800-53","title":"Process Isolation","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-39"},{"name":"sort-id","value":"sc-39"}],"parts":[{"id":"sc-39_smt","name":"statement","prose":"The information system maintains a separate execution domain for each executing process."},{"id":"sc-39_gdn","name":"guidance","prose":"Information systems can maintain separate execution domains for each executing process by assigning each process a separate address space. Each information system process has a distinct address space so that communication between processes is performed in a manner controlled through the security functions, and one process cannot modify the executing code of another process. Maintaining separate execution domains for executing processes can be achieved, for example, by implementing separate address spaces. This capability is available in most commercial operating systems that employ multi-state processor technologies.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sc-2","rel":"related"},{"href":"#sc-3","rel":"related"}]},{"id":"sc-39_obj","name":"objective","prose":"Determine if the information system maintains a separate execution domain for each executing process."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system design documentation\n\ninformation system architecture\n\nindependent verification and validation documentation\n\ntesting and evaluation documentation, other relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Information system developers\/integrators\n\ninformation system security architect"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing separate execution domains for each executing process"}]}]}]},{"id":"si","class":"family","title":"System and Information Integrity","controls":[{"id":"si-1","class":"SP800-53","title":"System and Information Integrity Policy and Procedures","params":[{"id":"si-1_prm_1","label":"organization-defined personnel or roles"},{"id":"si-1_prm_2","label":"organization-defined frequency"},{"id":"si-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-1"},{"name":"sort-id","value":"si-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"si-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, si-1_prm_1 }}:","parts":[{"id":"si-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system and information integrity policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"si-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system and information integrity policy and associated system and information integrity controls; and"}]},{"id":"si-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"si-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System and information integrity policy {{ insert: param, si-1_prm_2 }}; and"},{"id":"si-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System and information integrity procedures {{ insert: param, si-1_prm_3 }}."}]}]},{"id":"si-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the SI family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"si-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-1.a_obj","name":"objective","props":[{"name":"label","value":"SI-1(a)"}],"parts":[{"id":"si-1.a.1_obj","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)"}],"parts":[{"id":"si-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1]"}],"prose":"develops and documents a system and information integrity policy that addresses:","parts":[{"id":"si-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"si-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"si-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"si-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"si-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"si-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"si-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"si-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system and information integrity policy is to be disseminated;"},{"id":"si-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[3]"}],"prose":"disseminates the system and information integrity policy to organization-defined personnel or roles;"}]},{"id":"si-1.a.2_obj","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)"}],"parts":[{"id":"si-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the system and information integrity policy and associated system and information integrity controls;"},{"id":"si-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"si-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"si-1.b_obj","name":"objective","props":[{"name":"label","value":"SI-1(b)"}],"parts":[{"id":"si-1.b.1_obj","name":"objective","props":[{"name":"label","value":"SI-1(b)(1)"}],"parts":[{"id":"si-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system and information integrity policy;"},{"id":"si-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(b)(1)[2]"}],"prose":"reviews and updates the current system and information integrity policy with the organization-defined frequency;"}]},{"id":"si-1.b.2_obj","name":"objective","props":[{"name":"label","value":"SI-1(b)(2)"}],"parts":[{"id":"si-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system and information integrity procedures; and"},{"id":"si-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(b)(2)[2]"}],"prose":"reviews and updates the current system and information integrity procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and information integrity responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"si-2","class":"SP800-53","title":"Flaw Remediation","params":[{"id":"si-2_prm_1","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-2"},{"name":"sort-id","value":"si-02"}],"links":[{"href":"#bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","rel":"reference"},{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"si-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Identifies, reports, and corrects information system flaws;"},{"id":"si-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Tests software and firmware updates related to flaw remediation for effectiveness and potential side effects before installation;"},{"id":"si-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Installs security-relevant software and firmware updates within {{ insert: param, si-2_prm_1 }} of the release of the updates; and"},{"id":"si-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Incorporates flaw remediation into the organizational configuration management process."}]},{"id":"si-2_gdn","name":"guidance","prose":"Organizations identify information systems affected by announced software flaws including potential vulnerabilities resulting from those flaws, and report this information to designated organizational personnel with information security responsibilities. Security-relevant software updates include, for example, patches, service packs, hot fixes, and anti-virus signatures. Organizations also address flaws discovered during security assessments, continuous monitoring, incident response activities, and system error handling. Organizations take advantage of available resources such as the Common Weakness Enumeration (CWE) or Common Vulnerabilities and Exposures (CVE) databases in remediating flaws discovered in organizational information systems. By incorporating flaw remediation into ongoing configuration management processes, required\/anticipated remediation actions can be tracked and verified. Flaw remediation actions that can be tracked and verified include, for example, determining whether organizations follow US-CERT guidance and Information Assurance Vulnerability Alerts. Organization-defined time periods for updating security-relevant software and firmware may vary based on a variety of factors including, for example, the security category of the information system or the criticality of the update (i.e., severity of the vulnerability related to the discovered flaw). Some types of flaw remediation may require more testing than other types. Organizations determine the degree and type of testing needed for the specific type of flaw remediation activity under consideration and also the types of changes that are to be configuration-managed. In some situations, organizations may determine that the testing of software and\/or firmware updates is not necessary or practical, for example, when implementing simple anti-virus signature updates. Organizations may also consider in testing decisions, whether security-relevant software or firmware updates are obtained from authorized sources with appropriate digital signatures.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#ma-2","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#si-11","rel":"related"}]},{"id":"si-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-2.a_obj","name":"objective","props":[{"name":"label","value":"SI-2(a)"}],"parts":[{"id":"si-2.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(a)[1]"}],"prose":"identifies information system flaws;"},{"id":"si-2.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(a)[2]"}],"prose":"reports information system flaws;"},{"id":"si-2.a_obj.3","name":"objective","props":[{"name":"label","value":"SI-2(a)[3]"}],"prose":"corrects information system flaws;"}]},{"id":"si-2.b_obj","name":"objective","props":[{"name":"label","value":"SI-2(b)"}],"parts":[{"id":"si-2.b_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(b)[1]"}],"prose":"tests software updates related to flaw remediation for effectiveness and potential side effects before installation;"},{"id":"si-2.b_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(b)[2]"}],"prose":"tests firmware updates related to flaw remediation for effectiveness and potential side effects before installation;"}]},{"id":"si-2.c_obj","name":"objective","props":[{"name":"label","value":"SI-2(c)"}],"parts":[{"id":"si-2.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(c)[1]"}],"prose":"defines the time period within which to install security-relevant software updates after the release of the updates;"},{"id":"si-2.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(c)[2]"}],"prose":"defines the time period within which to install security-relevant firmware updates after the release of the updates;"},{"id":"si-2.c_obj.3","name":"objective","props":[{"name":"label","value":"SI-2(c)[3]"}],"prose":"installs software updates within the organization-defined time period of the release of the updates;"},{"id":"si-2.c_obj.4","name":"objective","props":[{"name":"label","value":"SI-2(c)[4]"}],"prose":"installs firmware updates within the organization-defined time period of the release of the updates; and"}]},{"id":"si-2.d_obj","name":"objective","props":[{"name":"label","value":"SI-2(d)"}],"prose":"incorporates flaw remediation into the organizational configuration management process."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing flaw remediation\n\nprocedures addressing configuration management\n\nlist of flaws and vulnerabilities potentially affecting the information system\n\nlist of recent security flaw remediation actions performed on the information system (e.g., list of installed patches, service packs, hot fixes, and other software updates to correct information system flaws)\n\ntest results from the installation of software and firmware updates to correct information system flaws\n\ninstallation\/change control records for security-relevant software and firmware updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for flaw remediation\n\norganizational personnel with configuration management responsibility"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for identifying, reporting, and correcting information system flaws\n\norganizational process for installing software and firmware updates\n\nautomated mechanisms supporting and\/or implementing reporting, and correcting information system flaws\n\nautomated mechanisms supporting and\/or implementing testing software and firmware updates"}]}]},{"id":"si-3","class":"SP800-53","title":"Malicious Code Protection","params":[{"id":"si-3_prm_1","label":"organization-defined frequency"},{"id":"si-3_prm_2","select":{"how-many":"one-or-more","choice":["endpoint","network entry\/exit points"]}},{"id":"si-3_prm_3","select":{"how-many":"one-or-more","choice":["block malicious code","quarantine malicious code","send alert to administrator"," {{ insert: param, si-3_prm_4 }} "]}},{"id":"si-3_prm_4","depends-on":"si-3_prm_3","label":"organization-defined action"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-3"},{"name":"sort-id","value":"si-03"}],"links":[{"href":"#6d431fee-658f-4a0e-9f2e-a38b5d398fab","rel":"reference"}],"parts":[{"id":"si-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code;"},{"id":"si-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures;"},{"id":"si-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Configures malicious code protection mechanisms to:","parts":[{"id":"si-3_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Perform periodic scans of the information system {{ insert: param, si-3_prm_1 }} and real-time scans of files from external sources at {{ insert: param, si-3_prm_2 }} as the files are downloaded, opened, or executed in accordance with organizational security policy; and"},{"id":"si-3_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":" {{ insert: param, si-3_prm_3 }} in response to malicious code detection; and"}]},{"id":"si-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Addresses the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the information system."}]},{"id":"si-3_gdn","name":"guidance","prose":"Information system entry and exit points include, for example, firewalls, electronic mail servers, web servers, proxy servers, remote-access servers, workstations, notebook computers, and mobile devices. Malicious code includes, for example, viruses, worms, Trojan horses, and spyware. Malicious code can also be encoded in various formats (e.g., UUENCODE, Unicode), contained within compressed or hidden files, or hidden in files using steganography. Malicious code can be transported by different means including, for example, web accesses, electronic mail, electronic mail attachments, and portable storage devices. Malicious code insertions occur through the exploitation of information system vulnerabilities. Malicious code protection mechanisms include, for example, anti-virus signature definitions and reputation-based technologies. A variety of technologies and methods exist to limit or eliminate the effects of malicious code. Pervasive configuration management and comprehensive software integrity controls may be effective in preventing execution of unauthorized code. In addition to commercial off-the-shelf software, malicious code may also be present in custom-built software. This could include, for example, logic bombs, back doors, and other types of cyber attacks that could affect organizational missions\/business functions. Traditional malicious code protection mechanisms cannot always detect such code. In these situations, organizations rely instead on other safeguards including, for example, secure coding practices, configuration management and control, trusted procurement processes, and monitoring practices to help ensure that software does not perform functions other than the functions intended. Organizations may determine that in response to the detection of malicious code, different actions may be warranted. For example, organizations can define actions in response to malicious code detection during periodic scans, actions in response to detection of malicious downloads, and\/or actions in response to detection of maliciousness when attempting to open or execute files.","links":[{"href":"#cm-3","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#sa-13","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-26","rel":"related"},{"href":"#sc-44","rel":"related"},{"href":"#si-2","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"si-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-3.a_obj","name":"objective","props":[{"name":"label","value":"SI-3(a)"}],"prose":"employs malicious code protection mechanisms to detect and eradicate malicious code at information system:","parts":[{"id":"si-3.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-3(a)[1]"}],"prose":"entry points;"},{"id":"si-3.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-3(a)[2]"}],"prose":"exit points;"}]},{"id":"si-3.b_obj","name":"objective","props":[{"name":"label","value":"SI-3(b)"}],"prose":"updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures (as identified in CM-1);"},{"id":"si-3.c_obj","name":"objective","props":[{"name":"label","value":"SI-3(c)"}],"parts":[{"id":"si-3.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-3(c)[1]"}],"prose":"defines a frequency for malicious code protection mechanisms to perform periodic scans of the information system;"},{"id":"si-3.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-3(c)[2]"}],"prose":"defines action to be initiated by malicious protection mechanisms in response to malicious code detection;"},{"id":"si-3.c_obj.3","name":"objective","props":[{"name":"label","value":"SI-3(c)[3]"}],"parts":[{"id":"si-3.c.1_obj.3","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](1)"}],"prose":"configures malicious code protection mechanisms to:","parts":[{"id":"si-3.c.1_obj.3.a","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](1)[a]"}],"prose":"perform periodic scans of the information system with the organization-defined frequency;"},{"id":"si-3.c.1_obj.3.b","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](1)[b]"}],"prose":"perform real-time scans of files from external sources at endpoint and\/or network entry\/exit points as the files are downloaded, opened, or executed in accordance with organizational security policy;"}]},{"id":"si-3.c.2_obj.3","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)"}],"prose":"configures malicious code protection mechanisms to do one or more of the following:","parts":[{"id":"si-3.c.2_obj.3.a","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[a]"}],"prose":"block malicious code in response to malicious code detection;"},{"id":"si-3.c.2_obj.3.b","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[b]"}],"prose":"quarantine malicious code in response to malicious code detection;"},{"id":"si-3.c.2_obj.3.c","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[c]"}],"prose":"send alert to administrator in response to malicious code detection; and\/or"},{"id":"si-3.c.2_obj.3.d","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[d]"}],"prose":"initiate organization-defined action in response to malicious code detection;"}]}]}]},{"id":"si-3.d_obj","name":"objective","props":[{"name":"label","value":"SI-3(d)"}],"parts":[{"id":"si-3.d_obj.1","name":"objective","props":[{"name":"label","value":"SI-3(d)[1]"}],"prose":"addresses the receipt of false positives during malicious code detection and eradication; and"},{"id":"si-3.d_obj.2","name":"objective","props":[{"name":"label","value":"SI-3(d)[2]"}],"prose":"addresses the resulting potential impact on the availability of the information system."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nconfiguration management policy and procedures\n\nprocedures addressing malicious code protection\n\nmalicious code protection mechanisms\n\nrecords of malicious code protection updates\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nscan results from malicious code protection mechanisms\n\nrecord of actions initiated by malicious code protection mechanisms in response to malicious code detection\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for malicious code protection\n\norganizational personnel with configuration management responsibility"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for employing, updating, and configuring malicious code protection mechanisms\n\norganizational process for addressing false positives and resulting potential impact\n\nautomated mechanisms supporting and\/or implementing employing, updating, and configuring malicious code protection mechanisms\n\nautomated mechanisms supporting and\/or implementing malicious code scanning and subsequent actions"}]}]},{"id":"si-4","class":"SP800-53","title":"Information System Monitoring","params":[{"id":"si-4_prm_1","label":"organization-defined monitoring objectives"},{"id":"si-4_prm_2","label":"organization-defined techniques and methods"},{"id":"si-4_prm_3","label":"organization-defined information system monitoring information"},{"id":"si-4_prm_4","label":"organization-defined personnel or roles"},{"id":"si-4_prm_5","select":{"how-many":"one-or-more","choice":["as needed"," {{ insert: param, si-4_prm_6 }} "]}},{"id":"si-4_prm_6","depends-on":"si-4_prm_5","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-4"},{"name":"sort-id","value":"si-04"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"},{"href":"#6d431fee-658f-4a0e-9f2e-a38b5d398fab","rel":"reference"},{"href":"#672fd561-b92b-4713-b9cf-6c9d9456728b","rel":"reference"},{"href":"#d1b1d689-0f66-4474-9924-c81119758dc1","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"}],"parts":[{"id":"si-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Monitors the information system to detect:","parts":[{"id":"si-4_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Attacks and indicators of potential attacks in accordance with {{ insert: param, si-4_prm_1 }}; and"},{"id":"si-4_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Unauthorized local, network, and remote connections;"}]},{"id":"si-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Identifies unauthorized use of the information system through {{ insert: param, si-4_prm_2 }};"},{"id":"si-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Deploys monitoring devices:","parts":[{"id":"si-4_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Strategically within the information system to collect organization-determined essential information; and"},{"id":"si-4_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"At ad hoc locations within the system to track specific types of transactions of interest to the organization;"}]},{"id":"si-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects information obtained from intrusion-monitoring tools from unauthorized access, modification, and deletion;"},{"id":"si-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information;"},{"id":"si-4_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations; and"},{"id":"si-4_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Provides {{ insert: param, si-4_prm_3 }} to {{ insert: param, si-4_prm_4 }} {{ insert: param, si-4_prm_5 }}."}]},{"id":"si-4_gdn","name":"guidance","prose":"Information system monitoring includes external and internal monitoring. External monitoring includes the observation of events occurring at the information system boundary (i.e., part of perimeter defense and boundary protection). Internal monitoring includes the observation of events occurring within the information system. Organizations can monitor information systems, for example, by observing audit activities in real time or by observing other system aspects such as access patterns, characteristics of access, and other actions. The monitoring objectives may guide determination of the events. Information system monitoring capability is achieved through a variety of tools and techniques (e.g., intrusion detection systems, intrusion prevention systems, malicious code protection software, scanning tools, audit record monitoring software, network monitoring software). Strategic locations for monitoring devices include, for example, selected perimeter locations and near server farms supporting critical applications, with such devices typically being employed at the managed interfaces associated with controls SC-7 and AC-17. Einstein network monitoring devices from the Department of Homeland Security can also be included as monitoring devices. The granularity of monitoring information collected is based on organizational monitoring objectives and the capability of information systems to support such objectives. Specific types of transactions of interest include, for example, Hyper Text Transfer Protocol (HTTP) traffic that bypasses HTTP proxies. Information system monitoring is an integral part of organizational continuous monitoring and incident response programs. Output from system monitoring serves as input to continuous monitoring and incident response programs. A network connection is any connection with a device that communicates through a network (e.g., local area network, Internet). A remote connection is any connection with a device communicating through an external network (e.g., the Internet). Local, network, and remote connections can be either wired or wireless.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-8","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-26","rel":"related"},{"href":"#sc-35","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"si-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-4.a_obj","name":"objective","props":[{"name":"label","value":"SI-4(a)"}],"parts":[{"id":"si-4.a.1_obj","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)"}],"parts":[{"id":"si-4.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[1]"}],"prose":"defines monitoring objectives to detect attacks and indicators of potential attacks on the information system;"},{"id":"si-4.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[2]"}],"prose":"monitors the information system to detect, in accordance with organization-defined monitoring objectives,:","parts":[{"id":"si-4.a.1_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[2][a]"}],"prose":"attacks;"},{"id":"si-4.a.1_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[2][b]"}],"prose":"indicators of potential attacks;"}]}]},{"id":"si-4.a.2_obj","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)"}],"prose":"monitors the information system to detect unauthorized:","parts":[{"id":"si-4.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)[1]"}],"prose":"local connections;"},{"id":"si-4.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)[2]"}],"prose":"network connections;"},{"id":"si-4.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)[3]"}],"prose":"remote connections;"}]}]},{"id":"si-4.b_obj","name":"objective","props":[{"name":"label","value":"SI-4(b)"}],"parts":[{"id":"si-4.b.1_obj","name":"objective","props":[{"name":"label","value":"SI-4(b)(1)"}],"prose":"defines techniques and methods to identify unauthorized use of the information system;"},{"id":"si-4.b.2_obj","name":"objective","props":[{"name":"label","value":"SI-4(b)(2)"}],"prose":"identifies unauthorized use of the information system through organization-defined techniques and methods;"}]},{"id":"si-4.c_obj","name":"objective","props":[{"name":"label","value":"SI-4(c)"}],"prose":"deploys monitoring devices:","parts":[{"id":"si-4.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(c)[1]"}],"prose":"strategically within the information system to collect organization-determined essential information;"},{"id":"si-4.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(c)[2]"}],"prose":"at ad hoc locations within the system to track specific types of transactions of interest to the organization;"}]},{"id":"si-4.d_obj","name":"objective","props":[{"name":"label","value":"SI-4(d)"}],"prose":"protects information obtained from intrusion-monitoring tools from unauthorized:","parts":[{"id":"si-4.d_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(d)[1]"}],"prose":"access;"},{"id":"si-4.d_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(d)[2]"}],"prose":"modification;"},{"id":"si-4.d_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(d)[3]"}],"prose":"deletion;"}]},{"id":"si-4.e_obj","name":"objective","props":[{"name":"label","value":"SI-4(e)"}],"prose":"heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information;"},{"id":"si-4.f_obj","name":"objective","props":[{"name":"label","value":"SI-4(f)"}],"prose":"obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations;"},{"id":"si-4.g_obj","name":"objective","props":[{"name":"label","value":"SI-4(g)"}],"parts":[{"id":"si-4.g_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(g)[1]"}],"prose":"defines personnel or roles to whom information system monitoring information is to be provided;"},{"id":"si-4.g_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(g)[2]"}],"prose":"defines information system monitoring information to be provided to organization-defined personnel or roles;"},{"id":"si-4.g_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(g)[3]"}],"prose":"defines a frequency to provide organization-defined information system monitoring to organization-defined personnel or roles;"},{"id":"si-4.g_obj.4","name":"objective","props":[{"name":"label","value":"SI-4(g)[4]"}],"prose":"provides organization-defined information system monitoring information to organization-defined personnel or roles one or more of the following:","parts":[{"id":"si-4.g_obj.4.a","name":"objective","props":[{"name":"label","value":"SI-4(g)[4][a]"}],"prose":"as needed; and\/or"},{"id":"si-4.g_obj.4.b","name":"objective","props":[{"name":"label","value":"SI-4(g)[4][b]"}],"prose":"with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Continuous monitoring strategy\n\nsystem and information integrity policy\n\nprocedures addressing information system monitoring tools and techniques\n\nfacility diagram\/layout\n\ninformation system design documentation\n\ninformation system monitoring tools and techniques documentation\n\nlocations within information system where monitoring devices are deployed\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility monitoring the information system"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for information system monitoring\n\nautomated mechanisms supporting and\/or implementing information system monitoring capability"}]}]},{"id":"si-5","class":"SP800-53","title":"Security Alerts, Advisories, and Directives","params":[{"id":"si-5_prm_1","label":"organization-defined external organizations"},{"id":"si-5_prm_2","select":{"how-many":"one-or-more","choice":[" {{ insert: param, si-5_prm_3 }} "," {{ insert: param, si-5_prm_4 }} "," {{ insert: param, si-5_prm_5 }} "]}},{"id":"si-5_prm_3","depends-on":"si-5_prm_2","label":"organization-defined personnel or roles"},{"id":"si-5_prm_4","depends-on":"si-5_prm_2","label":"organization-defined elements within the organization"},{"id":"si-5_prm_5","depends-on":"si-5_prm_2","label":"organization-defined external organizations"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-5"},{"name":"sort-id","value":"si-05"}],"links":[{"href":"#bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","rel":"reference"}],"parts":[{"id":"si-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Receives information system security alerts, advisories, and directives from {{ insert: param, si-5_prm_1 }} on an ongoing basis;"},{"id":"si-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Generates internal security alerts, advisories, and directives as deemed necessary;"},{"id":"si-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Disseminates security alerts, advisories, and directives to: {{ insert: param, si-5_prm_2 }}; and"},{"id":"si-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Implements security directives in accordance with established time frames, or notifies the issuing organization of the degree of noncompliance."}]},{"id":"si-5_gdn","name":"guidance","prose":"The United States Computer Emergency Readiness Team (US-CERT) generates security alerts and advisories to maintain situational awareness across the federal government. Security directives are issued by OMB or other designated organizations with the responsibility and authority to issue such directives. Compliance to security directives is essential due to the critical nature of many of these directives and the potential immediate adverse effects on organizational operations and assets, individuals, other organizations, and the Nation should the directives not be implemented in a timely manner. External organizations include, for example, external mission\/business partners, supply chain partners, external service providers, and other peer\/supporting organizations.","links":[{"href":"#si-2","rel":"related"}]},{"id":"si-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-5.a_obj","name":"objective","props":[{"name":"label","value":"SI-5(a)"}],"parts":[{"id":"si-5.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-5(a)[1]"}],"prose":"defines external organizations from whom information system security alerts, advisories and directives are to be received;"},{"id":"si-5.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-5(a)[2]"}],"prose":"receives information system security alerts, advisories, and directives from organization-defined external organizations on an ongoing basis;"}]},{"id":"si-5.b_obj","name":"objective","props":[{"name":"label","value":"SI-5(b)"}],"prose":"generates internal security alerts, advisories, and directives as deemed necessary;"},{"id":"si-5.c_obj","name":"objective","props":[{"name":"label","value":"SI-5(c)"}],"parts":[{"id":"si-5.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-5(c)[1]"}],"prose":"defines personnel or roles to whom security alerts, advisories, and directives are to be provided;"},{"id":"si-5.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-5(c)[2]"}],"prose":"defines elements within the organization to whom security alerts, advisories, and directives are to be provided;"},{"id":"si-5.c_obj.3","name":"objective","props":[{"name":"label","value":"SI-5(c)[3]"}],"prose":"defines external organizations to whom security alerts, advisories, and directives are to be provided;"},{"id":"si-5.c_obj.4","name":"objective","props":[{"name":"label","value":"SI-5(c)[4]"}],"prose":"disseminates security alerts, advisories, and directives to one or more of the following:","parts":[{"id":"si-5.c_obj.4.a","name":"objective","props":[{"name":"label","value":"SI-5(c)[4][a]"}],"prose":"organization-defined personnel or roles;"},{"id":"si-5.c_obj.4.b","name":"objective","props":[{"name":"label","value":"SI-5(c)[4][b]"}],"prose":"organization-defined elements within the organization; and\/or"},{"id":"si-5.c_obj.4.c","name":"objective","props":[{"name":"label","value":"SI-5(c)[4][c]"}],"prose":"organization-defined external organizations; and"}]}]},{"id":"si-5.d_obj","name":"objective","props":[{"name":"label","value":"SI-5(d)"}],"parts":[{"id":"si-5.d_obj.1","name":"objective","props":[{"name":"label","value":"SI-5(d)[1]"}],"prose":"implements security directives in accordance with established time frames; or"},{"id":"si-5.d_obj.2","name":"objective","props":[{"name":"label","value":"SI-5(d)[2]"}],"prose":"notifies the issuing organization of the degree of noncompliance."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing security alerts, advisories, and directives\n\nrecords of security alerts and advisories\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security alert and advisory responsibilities\n\norganizational personnel implementing, operating, maintaining, and using the information system\n\norganizational personnel, organizational elements, and\/or external organizations to whom alerts, advisories, and directives are to be disseminated\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for defining, receiving, generating, disseminating, and complying with security alerts, advisories, and directives\n\nautomated mechanisms supporting and\/or implementing definition, receipt, generation, and dissemination of security alerts, advisories, and directives\n\nautomated mechanisms supporting and\/or implementing security directives"}]}]},{"id":"si-12","class":"SP800-53","title":"Information Handling and Retention","props":[{"name":"priority","value":"P2"},{"name":"label","value":"SI-12"},{"name":"sort-id","value":"si-12"}],"parts":[{"id":"si-12_smt","name":"statement","prose":"The organization handles and retains information within the information system and information output from the system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements."},{"id":"si-12_gdn","name":"guidance","prose":"Information handling and retention requirements cover the full life cycle of information, in some cases extending beyond the disposal of information systems. The National Archives and Records Administration provides guidance on records retention.","links":[{"href":"#ac-16","rel":"related"},{"href":"#au-5","rel":"related"},{"href":"#au-11","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"}]},{"id":"si-12_obj","name":"objective","prose":"Determine if the organization, in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements:","parts":[{"id":"si-12_obj.1","name":"objective","props":[{"name":"label","value":"SI-12[1]"}],"prose":"handles information within the information system;"},{"id":"si-12_obj.2","name":"objective","props":[{"name":"label","value":"SI-12[2]"}],"prose":"handles output from the information system;"},{"id":"si-12_obj.3","name":"objective","props":[{"name":"label","value":"SI-12[3]"}],"prose":"retains information within the information system; and"},{"id":"si-12_obj.4","name":"objective","props":[{"name":"label","value":"SI-12[4]"}],"prose":"retains output from the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nfederal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements applicable to information handling and retention\n\nmedia protection policy and procedures\n\nprocedures addressing information system output handling and retention\n\ninformation retention records, other relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for information handling and retention\n\norganizational personnel with information security responsibilities\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for information handling and retention\n\nautomated mechanisms supporting and\/or implementing information handling and retention"}]}]}]}],"back-matter":{"resources":[{"uuid":"0c97e60b-325a-4efa-ba2b-90f20ccd5abc","title":"5 C.F.R. 731.106","citation":{"text":"Code of Federal Regulations, Title 5, Administrative Personnel, Section 731.106, Designation of Public Trust Positions and Investigative Requirements (5 C.F.R. 731.106)."},"rlinks":[{"href":"http:\/\/www.gpo.gov\/fdsys\/granule\/CFR-2012-title5-vol2\/CFR-2012-title5-vol2-sec731-106\/content-detail.html"}]},{"uuid":"bb61234b-46c3-4211-8c2b-9869222a720d","title":"C.F.R. Part 5 Subpart C (5 C.F.R. 930.301)","citation":{"text":"C.F.R. Part 5 Subpart C (5 C.F.R. 930.301)"},"rlinks":[{"href":"http:\/\/www.gpo.gov\/fdsys\/granule\/CFR-2009-title5-vol2\/CFR-2009-title5-vol2-sec930-301\/content-detail.html"}]},{"uuid":"a4aa9645-9a8a-4b51-90a9-e223250f9a75","title":"CNSS Policy 15","citation":{"text":"CNSS Policy 15"},"rlinks":[{"href":"https:\/\/www.cnss.gov\/policies.html"}]},{"uuid":"2d8b14e9-c8b5-4d3d-8bdc-155078f3281b","title":"DoD Information Assurance Vulnerability Alerts","citation":{"text":"DoD Information Assurance Vulnerability Alerts"}},{"uuid":"61081e7f-041d-4033-96a7-44a439071683","title":"DoD Instruction 5200.39","citation":{"text":"DoD Instruction 5200.39"},"rlinks":[{"href":"http:\/\/www.dtic.mil\/whs\/directives\/corres\/ins1.html"}]},{"uuid":"e42b2099-3e1c-415b-952c-61c96533c12e","title":"DoD Instruction 8551.01","citation":{"text":"DoD Instruction 8551.01"},"rlinks":[{"href":"http:\/\/www.dtic.mil\/whs\/directives\/corres\/ins1.html"}]},{"uuid":"c5034e0c-eba6-4ecd-a541-79f0678f4ba4","title":"Executive Order 13587","citation":{"text":"Executive Order 13587"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/the-press-office\/2011\/10\/07\/executive-order-13587-structural-reforms-improve-security-classified-net"}]},{"uuid":"56d671da-6b7b-4abf-8296-84b61980390a","title":"Federal Acquisition Regulation","citation":{"text":"Federal Acquisition Regulation"},"rlinks":[{"href":"https:\/\/acquisition.gov\/far"}]},{"uuid":"023104bc-6f75-4cd5-b7d0-fc92326f8007","title":"Federal Continuity Directive 1","citation":{"text":"Federal Continuity Directive 1"},"rlinks":[{"href":"http:\/\/www.fema.gov\/pdf\/about\/offices\/fcd1.pdf"}]},{"uuid":"ba557c91-ba3e-4792-adc6-a4ae479b39ff","title":"FICAM Roadmap and Implementation Guidance","citation":{"text":"FICAM Roadmap and Implementation Guidance"},"rlinks":[{"href":"http:\/\/www.idmanagement.gov\/documents\/ficam-roadmap-and-implementation-guidance"}]},{"uuid":"39f9087d-7687-46d2-8eda-b6f4b7a4d8a9","title":"FIPS Publication 140","citation":{"text":"FIPS Publication 140"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html"}]},{"uuid":"d715b234-9b5b-4e07-b1ed-99836727664d","title":"FIPS Publication 140-2","citation":{"text":"FIPS Publication 140-2"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#140-2"}]},{"uuid":"f2dbd4ec-c413-4714-b85b-6b7184d1c195","title":"FIPS Publication 197","citation":{"text":"FIPS Publication 197"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#197"}]},{"uuid":"e85cdb3f-7f0a-4083-8639-f13f70d3760b","title":"FIPS Publication 199","citation":{"text":"FIPS Publication 199"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#199"}]},{"uuid":"c80c10b3-1294-4984-a4cc-d1733ca432b9","title":"FIPS Publication 201","citation":{"text":"FIPS Publication 201"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#201"}]},{"uuid":"ad733a42-a7ed-4774-b988-4930c28852f3","title":"HSPD-12","citation":{"text":"HSPD-12"},"rlinks":[{"href":"http:\/\/www.dhs.gov\/homeland-security-presidential-directive-12"}]},{"uuid":"e95dd121-2733-413e-bf1e-f1eb49f20a98","title":"http:\/\/checklists.nist.gov","citation":{"text":"http:\/\/checklists.nist.gov"},"rlinks":[{"href":"http:\/\/checklists.nist.gov"}]},{"uuid":"6a1041fc-054e-4230-946b-2e6f4f3731bb","title":"http:\/\/csrc.nist.gov\/cryptval","citation":{"text":"http:\/\/csrc.nist.gov\/cryptval"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/cryptval"}]},{"uuid":"b09d1a31-d3c9-4138-a4f4-4c63816afd7d","title":"http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/index.html","citation":{"text":"http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/index.html"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/index.html"}]},{"uuid":"15522e92-9192-463d-9646-6a01982db8ca","title":"http:\/\/cwe.mitre.org","citation":{"text":"http:\/\/cwe.mitre.org"},"rlinks":[{"href":"http:\/\/cwe.mitre.org"}]},{"uuid":"5ed1f4d5-1494-421b-97ed-39d3c88ab51f","title":"http:\/\/fips201ep.cio.gov","citation":{"text":"http:\/\/fips201ep.cio.gov"},"rlinks":[{"href":"http:\/\/fips201ep.cio.gov"}]},{"uuid":"85280698-0417-489d-b214-12bb935fb939","title":"http:\/\/idmanagement.gov","citation":{"text":"http:\/\/idmanagement.gov"},"rlinks":[{"href":"http:\/\/idmanagement.gov"}]},{"uuid":"275cc052-0f7f-423c-bdb6-ed503dc36228","title":"http:\/\/nvd.nist.gov","citation":{"text":"http:\/\/nvd.nist.gov"},"rlinks":[{"href":"http:\/\/nvd.nist.gov"}]},{"uuid":"bbd50dd1-54ce-4432-959d-63ea564b1bb4","title":"http:\/\/www.acquisition.gov\/far","citation":{"text":"http:\/\/www.acquisition.gov\/far"},"rlinks":[{"href":"http:\/\/www.acquisition.gov\/far"}]},{"uuid":"9b97ed27-3dd6-4f9a-ade5-1b43e9669794","title":"http:\/\/www.cnss.gov","citation":{"text":"http:\/\/www.cnss.gov"},"rlinks":[{"href":"http:\/\/www.cnss.gov"}]},{"uuid":"c95a9986-3cd6-4a98-931b-ccfc56cb11e5","title":"http:\/\/www.niap-ccevs.org","citation":{"text":"http:\/\/www.niap-ccevs.org"},"rlinks":[{"href":"http:\/\/www.niap-ccevs.org"}]},{"uuid":"647b6de3-81d0-4d22-bec1-5f1333e34380","title":"http:\/\/www.nsa.gov","citation":{"text":"http:\/\/www.nsa.gov"},"rlinks":[{"href":"http:\/\/www.nsa.gov"}]},{"uuid":"a47466c4-c837-4f06-a39f-e68412a5f73d","title":"http:\/\/www.nsa.gov\/ia\/mitigation_guidance\/media_destruction_guidance\/index.shtml","citation":{"text":"http:\/\/www.nsa.gov\/ia\/mitigation_guidance\/media_destruction_guidance\/index.shtml"},"rlinks":[{"href":"http:\/\/www.nsa.gov\/ia\/mitigation_guidance\/media_destruction_guidance\/index.shtml"}]},{"uuid":"02631467-668b-4233-989b-3dfded2fd184","title":"http:\/\/www.us-cert.gov","citation":{"text":"http:\/\/www.us-cert.gov"},"rlinks":[{"href":"http:\/\/www.us-cert.gov"}]},{"uuid":"6caa237b-531b-43ac-9711-d8f6b97b0377","title":"ICD 704","citation":{"text":"ICD 704"},"rlinks":[{"href":"http:\/\/www.dni.gov\/index.php\/intelligence-community\/ic-policies-reports\/intelligence-community-directives"}]},{"uuid":"398e33fd-f404-4e5c-b90e-2d50d3181244","title":"ICD 705","citation":{"text":"ICD 705"},"rlinks":[{"href":"http:\/\/www.dni.gov\/index.php\/intelligence-community\/ic-policies-reports\/intelligence-community-directives"}]},{"uuid":"1737a687-52fb-4008-b900-cbfa836f7b65","title":"ISO\/IEC 15408","citation":{"text":"ISO\/IEC 15408"},"rlinks":[{"href":"http:\/\/www.iso.org\/iso\/iso_catalog\/catalog_tc\/catalog_detail.htm?csnumber=50341"}]},{"uuid":"654f21e2-f3bc-43b2-abdc-60ab8d09744b","title":"National Strategy for Trusted Identities in Cyberspace","citation":{"text":"National Strategy for Trusted Identities in Cyberspace"},"rlinks":[{"href":"http:\/\/www.nist.gov\/nstic"}]},{"uuid":"9cb3d8fe-2127-48ba-821e-cdd2d7aee921","title":"NIST Special Publication 800-100","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-100"}],"citation":{"text":"NIST Special Publication 800-100"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-100"}]},{"uuid":"3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","title":"NIST Special Publication 800-111","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-111"}],"citation":{"text":"NIST Special Publication 800-111"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-111"}]},{"uuid":"349fe082-502d-464a-aa0c-1443c6a5cf40","title":"NIST Special Publication 800-113","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-113"}],"citation":{"text":"NIST Special Publication 800-113"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-113"}]},{"uuid":"1201fcf3-afb1-4675-915a-fb4ae0435717","title":"NIST Special Publication 800-114 Rev. 1","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-114r1"}],"citation":{"text":"NIST Special Publication 800-114 Rev. 1"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-114r1"}]},{"uuid":"c4691b88-57d1-463b-9053-2d0087913f31","title":"NIST Special Publication 800-115","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-115"}],"citation":{"text":"NIST Special Publication 800-115"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-115"}]},{"uuid":"2157bb7e-192c-4eaa-877f-93ef6b0a3292","title":"NIST Special Publication 800-116 Rev. 1","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-116r1"}],"citation":{"text":"NIST Special Publication 800-116 Rev. 1"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-116r1"}]},{"uuid":"5c201b63-0768-417b-ac22-3f014e3941b2","title":"NIST Special Publication 800-12 Rev. 1","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-12r1"}],"citation":{"text":"NIST Special Publication 800-12 Rev. 1"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-12r1"}]},{"uuid":"d1a4e2a9-e512-4132-8795-5357aba29254","title":"NIST Special Publication 800-121","citation":{"text":"NIST Special Publication 800-121"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-121"}]},{"uuid":"0293a393-fbe8-4ed1-b0b4-f6fbd3ae1589","title":"NIST Special Publication 800-124","citation":{"text":"NIST Special Publication 800-124"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-124"}]},{"uuid":"080f8068-5e3e-435e-9790-d22ba4722693","title":"NIST Special Publication 800-128","citation":{"text":"NIST Special Publication 800-128"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-128"}]},{"uuid":"cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","title":"NIST Special Publication 800-137","citation":{"text":"NIST Special Publication 800-137"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-137"}]},{"uuid":"825438c3-248d-4e30-a51e-246473ce6ada","title":"NIST Special Publication 800-16","citation":{"text":"NIST Special Publication 800-16"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-16"}]},{"uuid":"6513e480-fada-4876-abba-1397084dfb26","title":"NIST Special Publication 800-164","citation":{"text":"NIST Special Publication 800-164"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-164"}]},{"uuid":"9c5c9e8c-dc81-4f55-a11c-d71d7487790f","title":"NIST Special Publication 800-18","citation":{"text":"NIST Special Publication 800-18"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-18"}]},{"uuid":"0a5db899-f033-467f-8631-f5a8ba971475","title":"NIST Special Publication 800-23","citation":{"text":"NIST Special Publication 800-23"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-23"}]},{"uuid":"a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","title":"NIST Special Publication 800-30","citation":{"text":"NIST Special Publication 800-30"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-30"}]},{"uuid":"748a81b9-9cad-463f-abde-8b368167e70d","title":"NIST Special Publication 800-34","citation":{"text":"NIST Special Publication 800-34"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-34"}]},{"uuid":"0c775bc3-bfc3-42c7-a382-88949f503171","title":"NIST Special Publication 800-35","citation":{"text":"NIST Special Publication 800-35"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-35"}]},{"uuid":"d818efd3-db31-4953-8afa-9e76afe83ce2","title":"NIST Special Publication 800-36","citation":{"text":"NIST Special Publication 800-36"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-36"}]},{"uuid":"0a0c26b6-fd44-4274-8b36-93442d49d998","title":"NIST Special Publication 800-37","citation":{"text":"NIST Special Publication 800-37"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-37"}]},{"uuid":"d480aa6a-7a88-424e-a10c-ad1c7870354b","title":"NIST Special Publication 800-39","citation":{"text":"NIST Special Publication 800-39"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-39"}]},{"uuid":"bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","title":"NIST Special Publication 800-40","citation":{"text":"NIST Special Publication 800-40"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-40"}]},{"uuid":"756a8e86-57d5-4701-8382-f7a40439665a","title":"NIST Special Publication 800-41","citation":{"text":"NIST Special Publication 800-41"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-41"}]},{"uuid":"5309d4d0-46f8-4213-a749-e7584164e5e8","title":"NIST Special Publication 800-46","citation":{"text":"NIST Special Publication 800-46"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-46"}]},{"uuid":"2711f068-734e-4afd-94ba-0b22247fbc88","title":"NIST Special Publication 800-47","citation":{"text":"NIST Special Publication 800-47"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-47"}]},{"uuid":"238ed479-eccb-49f6-82ec-ab74a7a428cf","title":"NIST Special Publication 800-48","citation":{"text":"NIST Special Publication 800-48"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-48"}]},{"uuid":"e12b5738-de74-4fb3-8317-a3995a8a1898","title":"NIST Special Publication 800-50","citation":{"text":"NIST Special Publication 800-50"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-50"}]},{"uuid":"cd4cf751-3312-4a55-b1a9-fad2f1db9119","title":"NIST Special Publication 800-53A","citation":{"text":"NIST Special Publication 800-53A"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-53A"}]},{"uuid":"81f09e01-d0b0-4ae2-aa6a-064ed9950070","title":"NIST Special Publication 800-56","citation":{"text":"NIST Special Publication 800-56"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-56"}]},{"uuid":"a6c774c0-bf50-4590-9841-2a5c1c91ac6f","title":"NIST Special Publication 800-57","citation":{"text":"NIST Special Publication 800-57"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-57"}]},{"uuid":"f152844f-b1ef-4836-8729-6277078ebee1","title":"NIST Special Publication 800-60","citation":{"text":"NIST Special Publication 800-60"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-60"}]},{"uuid":"be95fb85-a53f-4624-bdbb-140075500aa3","title":"NIST Special Publication 800-61","citation":{"text":"NIST Special Publication 800-61"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-61"}]},{"uuid":"644f44a9-a2de-4494-9c04-cd37fba45471","title":"NIST Special Publication 800-63","citation":{"text":"NIST Special Publication 800-63"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-63"}]},{"uuid":"abd950ae-092f-4b7a-b374-1c7c67fe9350","title":"NIST Special Publication 800-64","citation":{"text":"NIST Special Publication 800-64"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-64"}]},{"uuid":"29fcfe59-33cd-494a-8756-5907ae3a8f92","title":"NIST Special Publication 800-65","citation":{"text":"NIST Special Publication 800-65"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-65"}]},{"uuid":"84a37532-6db6-477b-9ea8-f9085ebca0fc","title":"NIST Special Publication 800-70","citation":{"text":"NIST Special Publication 800-70"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-70"}]},{"uuid":"ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","title":"NIST Special Publication 800-73","citation":{"text":"NIST Special Publication 800-73"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-73"}]},{"uuid":"2a71298a-ee90-490e-80ff-48c967173a47","title":"NIST Special Publication 800-76","citation":{"text":"NIST Special Publication 800-76"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-76"}]},{"uuid":"99f331f2-a9f0-46c2-9856-a3cbb9b89442","title":"NIST Special Publication 800-77","citation":{"text":"NIST Special Publication 800-77"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-77"}]},{"uuid":"2042d97b-f7f6-4c74-84f8-981867684659","title":"NIST Special Publication 800-78","citation":{"text":"NIST Special Publication 800-78"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-78"}]},{"uuid":"6af1e841-672c-46c4-b121-96f603d04be3","title":"NIST Special Publication 800-81","citation":{"text":"NIST Special Publication 800-81"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-81"}]},{"uuid":"6d431fee-658f-4a0e-9f2e-a38b5d398fab","title":"NIST Special Publication 800-83","citation":{"text":"NIST Special Publication 800-83"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-83"}]},{"uuid":"0243a05a-e8a3-4d51-9364-4a9d20b0dcdf","title":"NIST Special Publication 800-84","citation":{"text":"NIST Special Publication 800-84"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-84"}]},{"uuid":"263823e0-a971-4b00-959d-315b26278b22","title":"NIST Special Publication 800-88","citation":{"text":"NIST Special Publication 800-88"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-88"}]},{"uuid":"672fd561-b92b-4713-b9cf-6c9d9456728b","title":"NIST Special Publication 800-92","citation":{"text":"NIST Special Publication 800-92"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-92"}]},{"uuid":"d1b1d689-0f66-4474-9924-c81119758dc1","title":"NIST Special Publication 800-94","citation":{"text":"NIST Special Publication 800-94"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-94"}]},{"uuid":"6f336ecd-f2a0-4c84-9699-0491d81b6e0d","title":"NIST Special Publication 800-97","citation":{"text":"NIST Special Publication 800-97"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-97"}]},{"uuid":"9f77f845-e3ea-4ca4-b2c0-aa9eedc214ab","title":"OMB Circular A-130","citation":{"text":"OMB Circular A-130"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/omb\/circulars_a130_a130trans4"}]},{"uuid":"2c5884cd-7b96-425c-862a-99877e1cf909","title":"OMB Memorandum 02-01","citation":{"text":"OMB Memorandum 02-01"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/omb\/memoranda_m02-01"}]},{"uuid":"ff3bfb02-79b2-411f-8735-98dfe5af2ab0","title":"OMB Memorandum 04-04","citation":{"text":"OMB Memorandum 04-04"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy04\/m04-04.pdf"}]},{"uuid":"4da24a96-6cf8-435d-9d1f-c73247cad109","title":"OMB Memorandum 06-16","citation":{"text":"OMB Memorandum 06-16"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2006\/m06-16.pdf"}]},{"uuid":"990268bf-f4a9-4c81-91ae-dc7d3115f4b1","title":"OMB Memorandum 07-11","citation":{"text":"OMB Memorandum 07-11"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2007\/m07-11.pdf"}]},{"uuid":"0b3d8ba9-051f-498d-81ea-97f0f018c612","title":"OMB Memorandum 07-18","citation":{"text":"OMB Memorandum 07-18"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2007\/m07-18.pdf"}]},{"uuid":"0916ef02-3618-411b-a525-565c088849a6","title":"OMB Memorandum 08-22","citation":{"text":"OMB Memorandum 08-22"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2008\/m08-22.pdf"}]},{"uuid":"28115a56-da6b-4d44-b1df-51dd7f048a3e","title":"OMB Memorandum 08-23","citation":{"text":"OMB Memorandum 08-23"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2008\/m08-23.pdf"}]},{"uuid":"599fe9ba-4750-4450-9eeb-b95bd19a5e8f","title":"OMB Memorandum 10-06-2011","citation":{"text":"OMB Memorandum 10-06-2011"}},{"uuid":"74e740a4-c45d-49f3-a86e-eb747c549e01","title":"OMB Memorandum 11-11","citation":{"text":"OMB Memorandum 11-11"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/memoranda\/2011\/m11-11.pdf"}]},{"uuid":"bedb15b7-ec5c-4a68-807f-385125751fcd","title":"OMB Memorandum 11-33","citation":{"text":"OMB Memorandum 11-33"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/memoranda\/2011\/m11-33.pdf"}]},{"uuid":"dd2f5acd-08f1-435a-9837-f8203088dc1a","title":"Personal Identity Verification (PIV) in Enterprise Physical Access Control System (E-PACS)","citation":{"text":"Personal Identity Verification (PIV) in Enterprise Physical Access Control System (E-PACS)"}},{"uuid":"8ade2fbe-e468-4ca8-9a40-54d7f23c32bb","title":"US-CERT Technical Cyber Security Alerts","citation":{"text":"US-CERT Technical Cyber Security Alerts"},"rlinks":[{"href":"http:\/\/www.us-cert.gov\/ncas\/alerts"}]}]}}} \ No newline at end of file +{"catalog":{"uuid":"90cfe612-52c5-4daa-8ec1-9a6c223fa571","metadata":{"title":"NIST Special Publication 800-53 Revision 4 LOW IMPACT BASELINE","last-modified":"2023-12-05T21:54:40.489331Z","version":"2015-01-22","oscal-version":"1.1.1","props":[{"name":"resolution-tool","value":"OSCAL Profile Resolver XSLT Pipeline OPRXP"}],"links":[{"href":"NIST_SP-800-53_rev4_LOW-baseline_profile.xml","rel":"source-profile"}],"roles":[{"id":"creator","title":"Document Creator"},{"id":"contact","title":"Contact"}],"parties":[{"uuid":"96310e12-f661-41a7-bed9-842b6a931875","type":"organization","name":"Joint Task Force, Transformation Initiative","email-addresses":["sec-cert@nist.gov"],"addresses":[{"addr-lines":["National Institute of Standards and Technology","Attn: Computer Security Division","Information Technology Laboratory","100 Bureau Drive (Mail Stop 8930)"],"city":"Gaithersburg","state":"MD","postal-code":"20899-8930"}]}],"responsible-parties":[{"role-id":"creator","party-uuids":["fcde62b1-8cce-4a57-a26b-b07ad2865ae1"]},{"role-id":"contact","party-uuids":["fcde62b1-8cce-4a57-a26b-b07ad2865ae1"]}]},"groups":[{"id":"ac","class":"family","title":"Access Control","controls":[{"id":"ac-1","class":"SP800-53","title":"Access Control Policy and Procedures","params":[{"id":"ac-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ac-1_prm_2","label":"organization-defined frequency"},{"id":"ac-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-1"},{"name":"sort-id","value":"ac-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ac-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ac-1_prm_1 }}:","parts":[{"id":"ac-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ac-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the access control policy and associated access controls; and"}]},{"id":"ac-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ac-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Access control policy {{ insert: param, ac-1_prm_2 }}; and"},{"id":"ac-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Access control procedures {{ insert: param, ac-1_prm_3 }}."}]}]},{"id":"ac-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the AC family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ac-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-1.a_obj","name":"objective","props":[{"name":"label","value":"AC-1(a)"}],"parts":[{"id":"ac-1.a.1_obj","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)"}],"parts":[{"id":"ac-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1]"}],"prose":"develops and documents an access control policy that addresses:","parts":[{"id":"ac-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ac-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ac-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ac-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ac-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ac-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ac-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ac-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the access control policy are to be disseminated;"},{"id":"ac-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[3]"}],"prose":"disseminates the access control policy to organization-defined personnel or roles;"}]},{"id":"ac-1.a.2_obj","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)"}],"parts":[{"id":"ac-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the access control policy and associated access control controls;"},{"id":"ac-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ac-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ac-1.b_obj","name":"objective","props":[{"name":"label","value":"AC-1(b)"}],"parts":[{"id":"ac-1.b.1_obj","name":"objective","props":[{"name":"label","value":"AC-1(b)(1)"}],"parts":[{"id":"ac-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current access control policy;"},{"id":"ac-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(b)(1)[2]"}],"prose":"reviews and updates the current access control policy with the organization-defined frequency;"}]},{"id":"ac-1.b.2_obj","name":"objective","props":[{"name":"label","value":"AC-1(b)(2)"}],"parts":[{"id":"ac-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current access control procedures; and"},{"id":"ac-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(b)(2)[2]"}],"prose":"reviews and updates the current access control procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access control responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ac-2","class":"SP800-53","title":"Account Management","params":[{"id":"ac-2_prm_1","label":"organization-defined information system account types"},{"id":"ac-2_prm_2","label":"organization-defined personnel or roles"},{"id":"ac-2_prm_3","label":"organization-defined procedures or conditions"},{"id":"ac-2_prm_4","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-2"},{"name":"sort-id","value":"ac-02"}],"parts":[{"id":"ac-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Identifies and selects the following types of information system accounts to support organizational missions\/business functions: {{ insert: param, ac-2_prm_1 }};"},{"id":"ac-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Assigns account managers for information system accounts;"},{"id":"ac-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Establishes conditions for group and role membership;"},{"id":"ac-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Specifies authorized users of the information system, group and role membership, and access authorizations (i.e., privileges) and other attributes (as required) for each account;"},{"id":"ac-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Requires approvals by {{ insert: param, ac-2_prm_2 }} for requests to create information system accounts;"},{"id":"ac-2_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Creates, enables, modifies, disables, and removes information system accounts in accordance with {{ insert: param, ac-2_prm_3 }};"},{"id":"ac-2_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Monitors the use of information system accounts;"},{"id":"ac-2_smt.h","name":"item","props":[{"name":"label","value":"h."}],"prose":"Notifies account managers:","parts":[{"id":"ac-2_smt.h.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"When accounts are no longer required;"},{"id":"ac-2_smt.h.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"When users are terminated or transferred; and"},{"id":"ac-2_smt.h.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"When individual information system usage or need-to-know changes;"}]},{"id":"ac-2_smt.i","name":"item","props":[{"name":"label","value":"i."}],"prose":"Authorizes access to the information system based on:","parts":[{"id":"ac-2_smt.i.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A valid access authorization;"},{"id":"ac-2_smt.i.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Intended system usage; and"},{"id":"ac-2_smt.i.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Other attributes as required by the organization or associated missions\/business functions;"}]},{"id":"ac-2_smt.j","name":"item","props":[{"name":"label","value":"j."}],"prose":"Reviews accounts for compliance with account management requirements {{ insert: param, ac-2_prm_4 }}; and"},{"id":"ac-2_smt.k","name":"item","props":[{"name":"label","value":"k."}],"prose":"Establishes a process for reissuing shared\/group account credentials (if deployed) when individuals are removed from the group."}]},{"id":"ac-2_gdn","name":"guidance","prose":"Information system account types include, for example, individual, shared, group, system, guest\/anonymous, emergency, developer\/manufacturer\/vendor, temporary, and service. Some of the account management requirements listed above can be implemented by organizational information systems. The identification of authorized users of the information system and the specification of access privileges reflects the requirements in other security controls in the security plan. Users requiring administrative privileges on information system accounts receive additional scrutiny by appropriate organizational personnel (e.g., system owner, mission\/business owner, or chief information security officer) responsible for approving such accounts and privileged access. Organizations may choose to define access privileges or other attributes by account, by type of account, or a combination of both. Other attributes required for authorizing access include, for example, restrictions on time-of-day, day-of-week, and point-of-origin. In defining other account attributes, organizations consider system-related requirements (e.g., scheduled maintenance, system upgrades) and mission\/business requirements, (e.g., time zone differences, customer requirements, remote access to support travel requirements). Failure to consider these factors could affect information system availability. Temporary and emergency accounts are accounts intended for short-term use. Organizations establish temporary accounts as a part of normal account activation procedures when there is a need for short-term accounts without the demand for immediacy in account activation. Organizations establish emergency accounts in response to crisis situations and with the need for rapid account activation. Therefore, emergency account activation may bypass normal account authorization processes. Emergency and temporary accounts are not to be confused with infrequently used accounts (e.g., local logon accounts used for special tasks defined by organizations or when network resources are unavailable). Such accounts remain available and are not subject to automatic disabling or removal dates. Conditions for disabling or deactivating accounts include, for example: (i) when shared\/group, emergency, or temporary accounts are no longer required; or (ii) when individuals are transferred or terminated. Some types of information system accounts may require specialized training.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-5","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-10","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ma-3","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"ac-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-2.a_obj","name":"objective","props":[{"name":"label","value":"AC-2(a)"}],"parts":[{"id":"ac-2.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(a)[1]"}],"prose":"defines information system account types to be identified and selected to support organizational missions\/business functions;"},{"id":"ac-2.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(a)[2]"}],"prose":"identifies and selects organization-defined information system account types to support organizational missions\/business functions;"}]},{"id":"ac-2.b_obj","name":"objective","props":[{"name":"label","value":"AC-2(b)"}],"prose":"assigns account managers for information system accounts;"},{"id":"ac-2.c_obj","name":"objective","props":[{"name":"label","value":"AC-2(c)"}],"prose":"establishes conditions for group and role membership;"},{"id":"ac-2.d_obj","name":"objective","props":[{"name":"label","value":"AC-2(d)"}],"prose":"specifies for each account (as required):","parts":[{"id":"ac-2.d_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(d)[1]"}],"prose":"authorized users of the information system;"},{"id":"ac-2.d_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(d)[2]"}],"prose":"group and role membership;"},{"id":"ac-2.d_obj.3","name":"objective","props":[{"name":"label","value":"AC-2(d)[3]"}],"prose":"access authorizations (i.e., privileges);"},{"id":"ac-2.d_obj.4","name":"objective","props":[{"name":"label","value":"AC-2(d)[4]"}],"prose":"other attributes;"}]},{"id":"ac-2.e_obj","name":"objective","props":[{"name":"label","value":"AC-2(e)"}],"parts":[{"id":"ac-2.e_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(e)[1]"}],"prose":"defines personnel or roles required to approve requests to create information system accounts;"},{"id":"ac-2.e_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(e)[2]"}],"prose":"requires approvals by organization-defined personnel or roles for requests to create information system accounts;"}]},{"id":"ac-2.f_obj","name":"objective","props":[{"name":"label","value":"AC-2(f)"}],"parts":[{"id":"ac-2.f_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(f)[1]"}],"prose":"defines procedures or conditions to:","parts":[{"id":"ac-2.f_obj.1.a","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][a]"}],"prose":"create information system accounts;"},{"id":"ac-2.f_obj.1.b","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][b]"}],"prose":"enable information system accounts;"},{"id":"ac-2.f_obj.1.c","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][c]"}],"prose":"modify information system accounts;"},{"id":"ac-2.f_obj.1.d","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][d]"}],"prose":"disable information system accounts;"},{"id":"ac-2.f_obj.1.e","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][e]"}],"prose":"remove information system accounts;"}]},{"id":"ac-2.f_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(f)[2]"}],"prose":"in accordance with organization-defined procedures or conditions:","parts":[{"id":"ac-2.f_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][a]"}],"prose":"creates information system accounts;"},{"id":"ac-2.f_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][b]"}],"prose":"enables information system accounts;"},{"id":"ac-2.f_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][c]"}],"prose":"modifies information system accounts;"},{"id":"ac-2.f_obj.2.d","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][d]"}],"prose":"disables information system accounts;"},{"id":"ac-2.f_obj.2.e","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][e]"}],"prose":"removes information system accounts;"}]}]},{"id":"ac-2.g_obj","name":"objective","props":[{"name":"label","value":"AC-2(g)"}],"prose":"monitors the use of information system accounts;"},{"id":"ac-2.h_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)"}],"prose":"notifies account managers:","parts":[{"id":"ac-2.h.1_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)(1)"}],"prose":"when accounts are no longer required;"},{"id":"ac-2.h.2_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)(2)"}],"prose":"when users are terminated or transferred;"},{"id":"ac-2.h.3_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)(3)"}],"prose":"when individual information system usage or need to know changes;"}]},{"id":"ac-2.i_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)"}],"prose":"authorizes access to the information system based on;","parts":[{"id":"ac-2.i.1_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)(1)"}],"prose":"a valid access authorization;"},{"id":"ac-2.i.2_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)(2)"}],"prose":"intended system usage;"},{"id":"ac-2.i.3_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)(3)"}],"prose":"other attributes as required by the organization or associated missions\/business functions;"}]},{"id":"ac-2.j_obj","name":"objective","props":[{"name":"label","value":"AC-2(j)"}],"parts":[{"id":"ac-2.j_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(j)[1]"}],"prose":"defines the frequency to review accounts for compliance with account management requirements;"},{"id":"ac-2.j_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(j)[2]"}],"prose":"reviews accounts for compliance with account management requirements with the organization-defined frequency; and"}]},{"id":"ac-2.k_obj","name":"objective","props":[{"name":"label","value":"AC-2(k)"}],"prose":"establishes a process for reissuing shared\/group account credentials (if deployed) when individuals are removed from the group."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of active system accounts along with the name of the individual associated with each account\n\nlist of conditions for group and role membership\n\nnotifications or records of recently transferred, separated, or terminated employees\n\nlist of recently disabled information system accounts along with the name of the individual associated with each account\n\naccess authorization records\n\naccount management compliance reviews\n\ninformation system monitoring records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes account management on the information system\n\nautomated mechanisms for implementing account management"}]}]},{"id":"ac-3","class":"SP800-53","title":"Access Enforcement","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-3"},{"name":"sort-id","value":"ac-03"}],"parts":[{"id":"ac-3_smt","name":"statement","prose":"The information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies."},{"id":"ac-3_gdn","name":"guidance","prose":"Access control policies (e.g., identity-based policies, role-based policies, control matrices, cryptography) control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (e.g., devices, files, records, domains) in information systems. In addition to enforcing authorized access at the information system level and recognizing that information systems can host many applications and services in support of organizational missions and business operations, access enforcement mechanisms can also be employed at the application and service level to provide increased information security.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-5","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-16","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ac-21","rel":"related"},{"href":"#ac-22","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ma-3","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#pe-3","rel":"related"}]},{"id":"ac-3_obj","name":"objective","prose":"Determine if the information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing access enforcement\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of approved authorizations (user privileges)\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access enforcement responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing access control policy"}]}]},{"id":"ac-7","class":"SP800-53","title":"Unsuccessful Logon Attempts","params":[{"id":"ac-7_prm_1","label":"organization-defined number"},{"id":"ac-7_prm_2","label":"organization-defined time period"},{"id":"ac-7_prm_3","select":{"choice":["locks the account\/node for an {{ insert: param, ac-7_prm_4 }} ","locks the account\/node until released by an administrator","delays next logon prompt according to {{ insert: param, ac-7_prm_5 }} "]}},{"id":"ac-7_prm_4","depends-on":"ac-7_prm_3","label":"organization-defined time period"},{"id":"ac-7_prm_5","depends-on":"ac-7_prm_3","label":"organization-defined delay algorithm"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"AC-7"},{"name":"sort-id","value":"ac-07"}],"parts":[{"id":"ac-7_smt","name":"statement","prose":"The information system:","parts":[{"id":"ac-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Enforces a limit of {{ insert: param, ac-7_prm_1 }} consecutive invalid logon attempts by a user during a {{ insert: param, ac-7_prm_2 }}; and"},{"id":"ac-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Automatically {{ insert: param, ac-7_prm_3 }} when the maximum number of unsuccessful attempts is exceeded."}]},{"id":"ac-7_gdn","name":"guidance","prose":"This control applies regardless of whether the logon occurs via a local or network connection. Due to the potential for denial of service, automatic lockouts initiated by information systems are usually temporary and automatically release after a predetermined time period established by organizations. If a delay algorithm is selected, organizations may choose to employ different algorithms for different information system components based on the capabilities of those components. Responses to unsuccessful logon attempts may be implemented at both the operating system and the application levels.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-9","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ia-5","rel":"related"}]},{"id":"ac-7_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-7.a_obj","name":"objective","props":[{"name":"label","value":"AC-7(a)"}],"parts":[{"id":"ac-7.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-7(a)[1]"}],"prose":"the organization defines the number of consecutive invalid logon attempts allowed to the information system by a user during an organization-defined time period;"},{"id":"ac-7.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-7(a)[2]"}],"prose":"the organization defines the time period allowed by a user of the information system for an organization-defined number of consecutive invalid logon attempts;"},{"id":"ac-7.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-7(a)[3]"}],"prose":"the information system enforces a limit of organization-defined number of consecutive invalid logon attempts by a user during an organization-defined time period;"}]},{"id":"ac-7.b_obj","name":"objective","props":[{"name":"label","value":"AC-7(b)"}],"parts":[{"id":"ac-7.b_obj.1","name":"objective","props":[{"name":"label","value":"AC-7(b)[1]"}],"prose":"the organization defines account\/node lockout time period or logon delay algorithm to be automatically enforced by the information system when the maximum number of unsuccessful logon attempts is exceeded;"},{"id":"ac-7.b_obj.2","name":"objective","props":[{"name":"label","value":"AC-7(b)[2]"}],"prose":"the information system, when the maximum number of unsuccessful logon attempts is exceeded, automatically:","parts":[{"id":"ac-7.b_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-7(b)[2][a]"}],"prose":"locks the account\/node for the organization-defined time period;"},{"id":"ac-7.b_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-7(b)[2][b]"}],"prose":"locks the account\/node until released by an administrator; or"},{"id":"ac-7.b_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-7(b)[2][c]"}],"prose":"delays next logon prompt according to the organization-defined delay algorithm."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing unsuccessful logon attempts\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem developers\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing access control policy for unsuccessful logon attempts"}]}]},{"id":"ac-8","class":"SP800-53","title":"System Use Notification","params":[{"id":"ac-8_prm_1","label":"organization-defined system use notification message or banner"},{"id":"ac-8_prm_2","label":"organization-defined conditions"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-8"},{"name":"sort-id","value":"ac-08"}],"parts":[{"id":"ac-8_smt","name":"statement","prose":"The information system:","parts":[{"id":"ac-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Displays to users {{ insert: param, ac-8_prm_1 }} before granting access to the system that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance and states that:","parts":[{"id":"ac-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Users are accessing a U.S. Government information system;"},{"id":"ac-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Information system usage may be monitored, recorded, and subject to audit;"},{"id":"ac-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Unauthorized use of the information system is prohibited and subject to criminal and civil penalties; and"},{"id":"ac-8_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Use of the information system indicates consent to monitoring and recording;"}]},{"id":"ac-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Retains the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the information system; and"},{"id":"ac-8_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"For publicly accessible systems:","parts":[{"id":"ac-8_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Displays system use information {{ insert: param, ac-8_prm_2 }}, before granting further access;"},{"id":"ac-8_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Displays references, if any, to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities; and"},{"id":"ac-8_smt.c.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Includes a description of the authorized uses of the system."}]}]},{"id":"ac-8_gdn","name":"guidance","prose":"System use notifications can be implemented using messages or warning banners displayed before individuals log in to information systems. System use notifications are used only for access via logon interfaces with human users and are not required when such human interfaces do not exist. Organizations consider system use notification messages\/banners displayed in multiple languages based on specific organizational needs and the demographics of information system users. Organizations also consult with the Office of the General Counsel for legal review and approval of warning banner content."},{"id":"ac-8_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-8.a_obj","name":"objective","props":[{"name":"label","value":"AC-8(a)"}],"parts":[{"id":"ac-8.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-8(a)[1]"}],"prose":"the organization defines a system use notification message or banner to be displayed by the information system to users before granting access to the system;"},{"id":"ac-8.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2]"}],"prose":"the information system displays to users the organization-defined system use notification message or banner before granting access to the information system that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance, and states that:","parts":[{"id":"ac-8.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](1)"}],"prose":"users are accessing a U.S. Government information system;"},{"id":"ac-8.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](2)"}],"prose":"information system usage may be monitored, recorded, and subject to audit;"},{"id":"ac-8.a.3_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](3)"}],"prose":"unauthorized use of the information system is prohibited and subject to criminal and civil penalties;"},{"id":"ac-8.a.4_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](4)"}],"prose":"use of the information system indicates consent to monitoring and recording;"}]}]},{"id":"ac-8.b_obj","name":"objective","props":[{"name":"label","value":"AC-8(b)"}],"prose":"the information system retains the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the information system;"},{"id":"ac-8.c_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)"}],"prose":"for publicly accessible systems:","parts":[{"id":"ac-8.c.1_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)(1)"}],"parts":[{"id":"ac-8.c.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-8(c)(1)[1]"}],"prose":"the organization defines conditions for system use to be displayed by the information system before granting further access;"},{"id":"ac-8.c.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(c)(1)[2]"}],"prose":"the information system displays organization-defined conditions before granting further access;"}]},{"id":"ac-8.c.2_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)(2)"}],"prose":"the information system displays references, if any, to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities; and"},{"id":"ac-8.c.3_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)(3)"}],"prose":"the information system includes a description of the authorized uses of the system."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprivacy and security policies, procedures addressing system use notification\n\ndocumented approval of information system use notification messages or banners\n\ninformation system audit records\n\nuser acknowledgements of notification message or banner\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system use notification messages\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibility for providing legal advice\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing system use notification"}]}]},{"id":"ac-14","class":"SP800-53","title":"Permitted Actions Without Identification or Authentication","params":[{"id":"ac-14_prm_1","label":"organization-defined user actions"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AC-14"},{"name":"sort-id","value":"ac-14"}],"parts":[{"id":"ac-14_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-14_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Identifies {{ insert: param, ac-14_prm_1 }} that can be performed on the information system without identification or authentication consistent with organizational missions\/business functions; and"},{"id":"ac-14_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents and provides supporting rationale in the security plan for the information system, user actions not requiring identification or authentication."}]},{"id":"ac-14_gdn","name":"guidance","prose":"This control addresses situations in which organizations determine that no identification or authentication is required in organizational information systems. Organizations may allow a limited number of user actions without identification or authentication including, for example, when individuals access public websites or other publicly accessible federal information systems, when individuals use mobile phones to receive calls, or when facsimiles are received. Organizations also identify actions that normally require identification or authentication but may under certain circumstances (e.g., emergencies), allow identification or authentication mechanisms to be bypassed. Such bypasses may occur, for example, via a software-readable physical switch that commands bypass of the logon functionality and is protected from accidental or unmonitored use. This control does not apply to situations where identification and authentication have already occurred and are not repeated, but rather to situations where identification and authentication have not yet occurred. Organizations may decide that there are no user actions that can be performed on organizational information systems without identification and authentication and thus, the values for assignment statements can be none.","links":[{"href":"#cp-2","rel":"related"},{"href":"#ia-2","rel":"related"}]},{"id":"ac-14_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-14.a_obj","name":"objective","props":[{"name":"label","value":"AC-14(a)"}],"parts":[{"id":"ac-14.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-14(a)[1]"}],"prose":"defines user actions that can be performed on the information system without identification or authentication consistent with organizational missions\/business functions;"},{"id":"ac-14.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-14(a)[2]"}],"prose":"identifies organization-defined user actions that can be performed on the information system without identification or authentication consistent with organizational missions\/business functions; and"}]},{"id":"ac-14.b_obj","name":"objective","props":[{"name":"label","value":"AC-14(b)"}],"prose":"documents and provides supporting rationale in the security plan for the information system, user actions not requiring identification or authentication."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing permitted actions without identification or authentication\n\ninformation system configuration settings and associated documentation\n\nsecurity plan\n\nlist of user actions that can be performed without identification or authentication\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ac-17","class":"SP800-53","title":"Remote Access","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-17"},{"name":"sort-id","value":"ac-17"}],"links":[{"href":"#5309d4d0-46f8-4213-a749-e7584164e5e8","rel":"reference"},{"href":"#99f331f2-a9f0-46c2-9856-a3cbb9b89442","rel":"reference"},{"href":"#349fe082-502d-464a-aa0c-1443c6a5cf40","rel":"reference"},{"href":"#1201fcf3-afb1-4675-915a-fb4ae0435717","rel":"reference"},{"href":"#d1a4e2a9-e512-4132-8795-5357aba29254","rel":"reference"}],"parts":[{"id":"ac-17_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-17_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes and documents usage restrictions, configuration\/connection requirements, and implementation guidance for each type of remote access allowed; and"},{"id":"ac-17_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes remote access to the information system prior to allowing such connections."}]},{"id":"ac-17_gdn","name":"guidance","prose":"Remote access is access to organizational information systems by users (or processes acting on behalf of users) communicating through external networks (e.g., the Internet). Remote access methods include, for example, dial-up, broadband, and wireless. Organizations often employ encrypted virtual private networks (VPNs) to enhance confidentiality and integrity over remote connections. The use of encrypted VPNs does not make the access non-remote; however, the use of VPNs, when adequately provisioned with appropriate security controls (e.g., employing appropriate encryption techniques for confidentiality and integrity protection) may provide sufficient assurance to the organization that it can effectively treat such connections as internal networks. Still, VPN connections traverse external networks, and the encrypted VPN does not enhance the availability of remote connections. Also, VPNs with encrypted tunnels can affect the organizational capability to adequately monitor network communications traffic for malicious code. Remote access controls apply to information systems other than public web servers or systems designed for public access. This control addresses authorization prior to allowing remote access without specifying the formats for such authorization. While organizations may use interconnection security agreements to authorize remote access connections, such agreements are not required by this control. Enforcing access restrictions for remote connections is addressed in AC-3.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#pe-17","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sc-10","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ac-17_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-17.a_obj","name":"objective","props":[{"name":"label","value":"AC-17(a)"}],"parts":[{"id":"ac-17.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-17(a)[1]"}],"prose":"identifies the types of remote access allowed to the information system;"},{"id":"ac-17.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-17(a)[2]"}],"prose":"establishes for each type of remote access allowed:","parts":[{"id":"ac-17.a_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-17(a)[2][a]"}],"prose":"usage restrictions;"},{"id":"ac-17.a_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-17(a)[2][b]"}],"prose":"configuration\/connection requirements;"},{"id":"ac-17.a_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-17(a)[2][c]"}],"prose":"implementation guidance;"}]},{"id":"ac-17.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-17(a)[3]"}],"prose":"documents for each type of remote access allowed:","parts":[{"id":"ac-17.a_obj.3.a","name":"objective","props":[{"name":"label","value":"AC-17(a)[3][a]"}],"prose":"usage restrictions;"},{"id":"ac-17.a_obj.3.b","name":"objective","props":[{"name":"label","value":"AC-17(a)[3][b]"}],"prose":"configuration\/connection requirements;"},{"id":"ac-17.a_obj.3.c","name":"objective","props":[{"name":"label","value":"AC-17(a)[3][c]"}],"prose":"implementation guidance; and"}]}]},{"id":"ac-17.b_obj","name":"objective","props":[{"name":"label","value":"AC-17(b)"}],"prose":"authorizes remote access to the information system prior to allowing such connections."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access implementation and usage (including restrictions)\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\nremote access authorizations\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing remote access connections\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Remote access management capability for the information system"}]}]},{"id":"ac-18","class":"SP800-53","title":"Wireless Access","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-18"},{"name":"sort-id","value":"ac-18"}],"links":[{"href":"#238ed479-eccb-49f6-82ec-ab74a7a428cf","rel":"reference"},{"href":"#d1b1d689-0f66-4474-9924-c81119758dc1","rel":"reference"},{"href":"#6f336ecd-f2a0-4c84-9699-0491d81b6e0d","rel":"reference"}],"parts":[{"id":"ac-18_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-18_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes usage restrictions, configuration\/connection requirements, and implementation guidance for wireless access; and"},{"id":"ac-18_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes wireless access to the information system prior to allowing such connections."}]},{"id":"ac-18_gdn","name":"guidance","prose":"Wireless technologies include, for example, microwave, packet radio (UHF\/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP\/TLS, PEAP), which provide credential protection and mutual authentication.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ac-18_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-18.a_obj","name":"objective","props":[{"name":"label","value":"AC-18(a)"}],"prose":"establishes for wireless access:","parts":[{"id":"ac-18.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-18(a)[1]"}],"prose":"usage restrictions;"},{"id":"ac-18.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-18(a)[2]"}],"prose":"configuration\/connection requirement;"},{"id":"ac-18.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-18(a)[3]"}],"prose":"implementation guidance; and"}]},{"id":"ac-18.b_obj","name":"objective","props":[{"name":"label","value":"AC-18(b)"}],"prose":"authorizes wireless access to the information system prior to allowing such connections."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing wireless access implementation and usage (including restrictions)\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nwireless access authorizations\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing wireless access connections\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Wireless access management capability for the information system"}]}]},{"id":"ac-19","class":"SP800-53","title":"Access Control for Mobile Devices","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-19"},{"name":"sort-id","value":"ac-19"}],"links":[{"href":"#4da24a96-6cf8-435d-9d1f-c73247cad109","rel":"reference"},{"href":"#1201fcf3-afb1-4675-915a-fb4ae0435717","rel":"reference"},{"href":"#0293a393-fbe8-4ed1-b0b4-f6fbd3ae1589","rel":"reference"},{"href":"#6513e480-fada-4876-abba-1397084dfb26","rel":"reference"}],"parts":[{"id":"ac-19_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-19_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes usage restrictions, configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices; and"},{"id":"ac-19_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes the connection of mobile devices to organizational information systems."}]},{"id":"ac-19_gdn","name":"guidance","prose":"A mobile device is a computing device that: (i) has a small form factor such that it can easily be carried by a single individual; (ii) is designed to operate without a physical connection (e.g., wirelessly transmit or receive information); (iii) possesses local, non-removable or removable data storage; and (iv) includes a self-contained power source. Mobile devices may also include voice communication capabilities, on-board sensors that allow the device to capture information, and\/or built-in features for synchronizing local data with remote locations. Examples include smart phones, E-readers, and tablets. Mobile devices are typically associated with a single individual and the device is usually in close proximity to the individual; however, the degree of proximity can vary depending upon on the form factor and size of the device. The processing, storage, and transmission capability of the mobile device may be comparable to or merely a subset of desktop systems, depending upon the nature and intended purpose of the device. Due to the large variety of mobile devices with different technical characteristics and capabilities, organizational restrictions may vary for the different classes\/types of such devices. Usage restrictions and specific implementation guidance for mobile devices include, for example, configuration management, device identification and authentication, implementation of mandatory protective software (e.g., malicious code detection, firewall), scanning devices for malicious code, updating virus protection software, scanning for critical software updates and patches, conducting primary operating system (and possibly other resident software) integrity checks, and disabling unnecessary hardware (e.g., wireless, infrared). Organizations are cautioned that the need to provide adequate security for mobile devices goes beyond the requirements in this control. Many safeguards and countermeasures for mobile devices are reflected in other security controls in the catalog allocated in the initial control baselines as starting points for the development of security plans and overlays using the tailoring process. There may also be some degree of overlap in the requirements articulated by the security controls within the different families of controls. AC-20 addresses mobile devices that are not organization-controlled.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-7","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ca-9","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-43","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ac-19_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-19.a_obj","name":"objective","props":[{"name":"label","value":"AC-19(a)"}],"prose":"establishes for organization-controlled mobile devices:","parts":[{"id":"ac-19.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-19(a)[1]"}],"prose":"usage restrictions;"},{"id":"ac-19.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-19(a)[2]"}],"prose":"configuration\/connection requirement;"},{"id":"ac-19.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-19(a)[3]"}],"prose":"implementation guidance; and"}]},{"id":"ac-19.b_obj","name":"objective","props":[{"name":"label","value":"AC-19(b)"}],"prose":"authorizes the connection of mobile devices to organizational information systems."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing access control for mobile device usage (including restrictions)\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nauthorizations for mobile device connections to organizational information systems\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel using mobile devices to access organizational information systems\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Access control capability authorizing mobile device connections to organizational information systems"}]}]},{"id":"ac-20","class":"SP800-53","title":"Use of External Information Systems","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-20"},{"name":"sort-id","value":"ac-20"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"}],"parts":[{"id":"ac-20_smt","name":"statement","prose":"The organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and\/or maintaining external information systems, allowing authorized individuals to:","parts":[{"id":"ac-20_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Access the information system from external information systems; and"},{"id":"ac-20_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Process, store, or transmit organization-controlled information using external information systems."}]},{"id":"ac-20_gdn","name":"guidance","prose":"External information systems are information systems or components of information systems that are outside of the authorization boundary established by organizations and for which organizations typically have no direct supervision and authority over the application of required security controls or the assessment of control effectiveness. External information systems include, for example: (i) personally owned information systems\/devices (e.g., notebook computers, smart phones, tablets, personal digital assistants); (ii) privately owned computing and communications devices resident in commercial or public facilities (e.g., hotels, train stations, convention centers, shopping malls, or airports); (iii) information systems owned or controlled by nonfederal governmental organizations; and (iv) federal information systems that are not owned by, operated by, or under the direct supervision and authority of organizations. This control also addresses the use of external information systems for the processing, storage, or transmission of organizational information, including, for example, accessing cloud services (e.g., infrastructure as a service, platform as a service, or software as a service) from organizational information systems. For some external information systems (i.e., information systems operated by other federal agencies, including organizations subordinate to those agencies), the trust relationships that have been established between those organizations and the originating organization may be such, that no explicit terms and conditions are required. Information systems within these organizations would not be considered external. These situations occur when, for example, there are pre-existing sharing\/trust agreements (either implicit or explicit) established between federal agencies or organizations subordinate to those agencies, or when such trust agreements are specified by applicable laws, Executive Orders, directives, or policies. Authorized individuals include, for example, organizational personnel, contractors, or other individuals with authorized access to organizational information systems and over which organizations have the authority to impose rules of behavior with regard to system access. Restrictions that organizations impose on authorized individuals need not be uniform, as those restrictions may vary depending upon the trust relationships between organizations. Therefore, organizations may choose to impose different security restrictions on contractors than on state, local, or tribal governments. This control does not apply to the use of external information systems to access public interfaces to organizational information systems (e.g., individuals accessing federal information through www.usa.gov). Organizations establish terms and conditions for the use of external information systems in accordance with organizational security policies and procedures. Terms and conditions address as a minimum: types of applications that can be accessed on organizational information systems from external information systems; and the highest security category of information that can be processed, stored, or transmitted on external information systems. If terms and conditions with the owners of external information systems cannot be established, organizations may impose restrictions on organizational personnel using those external systems.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sa-9","rel":"related"}]},{"id":"ac-20_obj","name":"objective","prose":"Determine if the organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and\/or maintaining external information systems, allowing authorized individuals to:","parts":[{"id":"ac-20.a_obj","name":"objective","props":[{"name":"label","value":"AC-20(a)"}],"prose":"access the information system from the external information systems; and"},{"id":"ac-20.b_obj","name":"objective","props":[{"name":"label","value":"AC-20(b)"}],"prose":"process, store, or transmit organization-controlled information using external information systems."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing the use of external information systems\n\nexternal information systems terms and conditions\n\nlist of types of applications accessible from external information systems\n\nmaximum security categorization for information processed, stored, or transmitted on external information systems\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining terms and conditions for use of external information systems to access organizational systems\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing terms and conditions on use of external information systems"}]}]},{"id":"ac-22","class":"SP800-53","title":"Publicly Accessible Content","params":[{"id":"ac-22_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AC-22"},{"name":"sort-id","value":"ac-22"}],"parts":[{"id":"ac-22_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-22_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Designates individuals authorized to post information onto a publicly accessible information system;"},{"id":"ac-22_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Trains authorized individuals to ensure that publicly accessible information does not contain nonpublic information;"},{"id":"ac-22_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included; and"},{"id":"ac-22_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Reviews the content on the publicly accessible information system for nonpublic information {{ insert: param, ac-22_prm_1 }} and removes such information, if discovered."}]},{"id":"ac-22_gdn","name":"guidance","prose":"In accordance with federal laws, Executive Orders, directives, policies, regulations, standards, and\/or guidance, the general public is not authorized access to nonpublic information (e.g., information protected under the Privacy Act and proprietary information). This control addresses information systems that are controlled by the organization and accessible to the general public, typically without identification or authentication. The posting of information on non-organization information systems is covered by organizational policy.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#au-13","rel":"related"}]},{"id":"ac-22_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-22.a_obj","name":"objective","props":[{"name":"label","value":"AC-22(a)"}],"prose":"designates individuals authorized to post information onto a publicly accessible information system;"},{"id":"ac-22.b_obj","name":"objective","props":[{"name":"label","value":"AC-22(b)"}],"prose":"trains authorized individuals to ensure that publicly accessible information does not contain nonpublic information;"},{"id":"ac-22.c_obj","name":"objective","props":[{"name":"label","value":"AC-22(c)"}],"prose":"reviews the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included;"},{"id":"ac-22.d_obj","name":"objective","props":[{"name":"label","value":"AC-22(d)"}],"parts":[{"id":"ac-22.d_obj.1","name":"objective","props":[{"name":"label","value":"AC-22(d)[1]"}],"prose":"defines the frequency to review the content on the publicly accessible information system for nonpublic information;"},{"id":"ac-22.d_obj.2","name":"objective","props":[{"name":"label","value":"AC-22(d)[2]"}],"prose":"reviews the content on the publicly accessible information system for nonpublic information with the organization-defined frequency; and"},{"id":"ac-22.d_obj.3","name":"objective","props":[{"name":"label","value":"AC-22(d)[3]"}],"prose":"removes nonpublic information from the publicly accessible information system, if discovered."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing publicly accessible content\n\nlist of users authorized to post publicly accessible content on organizational information systems\n\ntraining materials and\/or records\n\nrecords of publicly accessible information reviews\n\nrecords of response to nonpublic information on public websites\n\nsystem audit logs\n\nsecurity awareness training records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing publicly accessible information posted on organizational information systems\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing management of publicly accessible content"}]}]}]},{"id":"at","class":"family","title":"Awareness and Training","controls":[{"id":"at-1","class":"SP800-53","title":"Security Awareness and Training Policy and Procedures","params":[{"id":"at-1_prm_1","label":"organization-defined personnel or roles"},{"id":"at-1_prm_2","label":"organization-defined frequency"},{"id":"at-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AT-1"},{"name":"sort-id","value":"at-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"at-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"at-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, at-1_prm_1 }}:","parts":[{"id":"at-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A security awareness and training policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"at-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the security awareness and training policy and associated security awareness and training controls; and"}]},{"id":"at-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"at-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security awareness and training policy {{ insert: param, at-1_prm_2 }}; and"},{"id":"at-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Security awareness and training procedures {{ insert: param, at-1_prm_3 }}."}]}]},{"id":"at-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the AT family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"at-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-1.a_obj","name":"objective","props":[{"name":"label","value":"AT-1(a)"}],"parts":[{"id":"at-1.a.1_obj","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)"}],"parts":[{"id":"at-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1]"}],"prose":"develops and documents an security awareness and training policy that addresses:","parts":[{"id":"at-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"at-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"at-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"at-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"at-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"at-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"at-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"at-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the security awareness and training policy are to be disseminated;"},{"id":"at-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[3]"}],"prose":"disseminates the security awareness and training policy to organization-defined personnel or roles;"}]},{"id":"at-1.a.2_obj","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)"}],"parts":[{"id":"at-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the security awareness and training policy and associated awareness and training controls;"},{"id":"at-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"at-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"at-1.b_obj","name":"objective","props":[{"name":"label","value":"AT-1(b)"}],"parts":[{"id":"at-1.b.1_obj","name":"objective","props":[{"name":"label","value":"AT-1(b)(1)"}],"parts":[{"id":"at-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current security awareness and training policy;"},{"id":"at-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(b)(1)[2]"}],"prose":"reviews and updates the current security awareness and training policy with the organization-defined frequency;"}]},{"id":"at-1.b.2_obj","name":"objective","props":[{"name":"label","value":"AT-1(b)(2)"}],"parts":[{"id":"at-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current security awareness and training procedures; and"},{"id":"at-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(b)(2)[2]"}],"prose":"reviews and updates the current security awareness and training procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security awareness and training responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"at-2","class":"SP800-53","title":"Security Awareness Training","params":[{"id":"at-2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AT-2"},{"name":"sort-id","value":"at-02"}],"links":[{"href":"#bb61234b-46c3-4211-8c2b-9869222a720d","rel":"reference"},{"href":"#c5034e0c-eba6-4ecd-a541-79f0678f4ba4","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"at-2_smt","name":"statement","prose":"The organization provides basic security awareness training to information system users (including managers, senior executives, and contractors):","parts":[{"id":"at-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"As part of initial training for new users;"},{"id":"at-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"at-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, at-2_prm_1 }} thereafter."}]},{"id":"at-2_gdn","name":"guidance","prose":"Organizations determine the appropriate content of security awareness training and security awareness techniques based on the specific organizational requirements and the information systems to which personnel have authorized access. The content includes a basic understanding of the need for information security and user actions to maintain security and to respond to suspected security incidents. The content also addresses awareness of the need for operations security. Security awareness techniques can include, for example, displaying posters, offering supplies inscribed with security reminders, generating email advisories\/notices from senior organizational officials, displaying logon screen messages, and conducting information security awareness events.","links":[{"href":"#at-3","rel":"related"},{"href":"#at-4","rel":"related"},{"href":"#pl-4","rel":"related"}]},{"id":"at-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-2.a_obj","name":"objective","props":[{"name":"label","value":"AT-2(a)"}],"prose":"provides basic security awareness training to information system users (including managers, senior executives, and contractors) as part of initial training for new users;"},{"id":"at-2.b_obj","name":"objective","props":[{"name":"label","value":"AT-2(b)"}],"prose":"provides basic security awareness training to information system users (including managers, senior executives, and contractors) when required by information system changes; and"},{"id":"at-2.c_obj","name":"objective","props":[{"name":"label","value":"AT-2(c)"}],"parts":[{"id":"at-2.c_obj.1","name":"objective","props":[{"name":"label","value":"AT-2(c)[1]"}],"prose":"defines the frequency to provide refresher security awareness training thereafter to information system users (including managers, senior executives, and contractors); and"},{"id":"at-2.c_obj.2","name":"objective","props":[{"name":"label","value":"AT-2(c)[2]"}],"prose":"provides refresher security awareness training to information users (including managers, senior executives, and contractors) with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security awareness training implementation\n\nappropriate codes of federal regulations\n\nsecurity awareness training curriculum\n\nsecurity awareness training materials\n\nsecurity plan\n\ntraining records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for security awareness training\n\norganizational personnel with information security responsibilities\n\norganizational personnel comprising the general information system user community"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms managing security awareness training"}]}]},{"id":"at-3","class":"SP800-53","title":"Role-based Security Training","params":[{"id":"at-3_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AT-3"},{"name":"sort-id","value":"at-03"}],"links":[{"href":"#bb61234b-46c3-4211-8c2b-9869222a720d","rel":"reference"},{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"at-3_smt","name":"statement","prose":"The organization provides role-based security training to personnel with assigned security roles and responsibilities:","parts":[{"id":"at-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Before authorizing access to the information system or performing assigned duties;"},{"id":"at-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"at-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, at-3_prm_1 }} thereafter."}]},{"id":"at-3_gdn","name":"guidance","prose":"Organizations determine the appropriate content of security training based on the assigned roles and responsibilities of individuals and the specific security requirements of organizations and the information systems to which personnel have authorized access. In addition, organizations provide enterprise architects, information system developers, software developers, acquisition\/procurement officials, information system managers, system\/network administrators, personnel conducting configuration management and auditing activities, personnel performing independent verification and validation activities, security control assessors, and other personnel having access to system-level software, adequate security-related technical training specifically tailored for their assigned duties. Comprehensive role-based training addresses management, operational, and technical roles and responsibilities covering physical, personnel, and technical safeguards and countermeasures. Such training can include for example, policies, procedures, tools, and artifacts for the organizational security roles defined. Organizations also provide the training necessary for individuals to carry out their responsibilities related to operations and supply chain security within the context of organizational information security programs. Role-based security training also applies to contractors providing services to federal agencies.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-4","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#ps-7","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#sa-16","rel":"related"}]},{"id":"at-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-3.a_obj","name":"objective","props":[{"name":"label","value":"AT-3(a)"}],"prose":"provides role-based security training to personnel with assigned security roles and responsibilities before authorizing access to the information system or performing assigned duties;"},{"id":"at-3.b_obj","name":"objective","props":[{"name":"label","value":"AT-3(b)"}],"prose":"provides role-based security training to personnel with assigned security roles and responsibilities when required by information system changes; and"},{"id":"at-3.c_obj","name":"objective","props":[{"name":"label","value":"AT-3(c)"}],"parts":[{"id":"at-3.c_obj.1","name":"objective","props":[{"name":"label","value":"AT-3(c)[1]"}],"prose":"defines the frequency to provide refresher role-based security training thereafter to personnel with assigned security roles and responsibilities; and"},{"id":"at-3.c_obj.2","name":"objective","props":[{"name":"label","value":"AT-3(c)[2]"}],"prose":"provides refresher role-based security training to personnel with assigned security roles and responsibilities with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security training implementation\n\ncodes of federal regulations\n\nsecurity training curriculum\n\nsecurity training materials\n\nsecurity plan\n\ntraining records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for role-based security training\n\norganizational personnel with assigned information system security roles and responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms managing role-based security training"}]}]},{"id":"at-4","class":"SP800-53","title":"Security Training Records","params":[{"id":"at-4_prm_1","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AT-4"},{"name":"sort-id","value":"at-04"}],"parts":[{"id":"at-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"at-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Documents and monitors individual information system security training activities including basic security awareness training and specific information system security training; and"},{"id":"at-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Retains individual training records for {{ insert: param, at-4_prm_1 }}."}]},{"id":"at-4_gdn","name":"guidance","prose":"Documentation for specialized training may be maintained by individual supervisors at the option of the organization.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#pm-14","rel":"related"}]},{"id":"at-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-4.a_obj","name":"objective","props":[{"name":"label","value":"AT-4(a)"}],"parts":[{"id":"at-4.a_obj.1","name":"objective","props":[{"name":"label","value":"AT-4(a)[1]"}],"prose":"documents individual information system security training activities including:","parts":[{"id":"at-4.a_obj.1.a","name":"objective","props":[{"name":"label","value":"AT-4(a)[1][a]"}],"prose":"basic security awareness training;"},{"id":"at-4.a_obj.1.b","name":"objective","props":[{"name":"label","value":"AT-4(a)[1][b]"}],"prose":"specific role-based information system security training;"}]},{"id":"at-4.a_obj.2","name":"objective","props":[{"name":"label","value":"AT-4(a)[2]"}],"prose":"monitors individual information system security training activities including:","parts":[{"id":"at-4.a_obj.2.a","name":"objective","props":[{"name":"label","value":"AT-4(a)[2][a]"}],"prose":"basic security awareness training;"},{"id":"at-4.a_obj.2.b","name":"objective","props":[{"name":"label","value":"AT-4(a)[2][b]"}],"prose":"specific role-based information system security training;"}]}]},{"id":"at-4.b_obj","name":"objective","props":[{"name":"label","value":"AT-4(b)"}],"parts":[{"id":"at-4.b_obj.1","name":"objective","props":[{"name":"label","value":"AT-4(b)[1]"}],"prose":"defines a time period to retain individual training records; and"},{"id":"at-4.b_obj.2","name":"objective","props":[{"name":"label","value":"AT-4(b)[2]"}],"prose":"retains individual training records for the organization-defined time period."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security training records\n\nsecurity awareness and training records\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security training record retention responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting management of security training records"}]}]}]},{"id":"au","class":"family","title":"Audit and Accountability","controls":[{"id":"au-1","class":"SP800-53","title":"Audit and Accountability Policy and Procedures","params":[{"id":"au-1_prm_1","label":"organization-defined personnel or roles"},{"id":"au-1_prm_2","label":"organization-defined frequency"},{"id":"au-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-1"},{"name":"sort-id","value":"au-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"au-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"au-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, au-1_prm_1 }}:","parts":[{"id":"au-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An audit and accountability policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"au-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls; and"}]},{"id":"au-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"au-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Audit and accountability policy {{ insert: param, au-1_prm_2 }}; and"},{"id":"au-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Audit and accountability procedures {{ insert: param, au-1_prm_3 }}."}]}]},{"id":"au-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the AU family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"au-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-1.a_obj","name":"objective","props":[{"name":"label","value":"AU-1(a)"}],"parts":[{"id":"au-1.a.1_obj","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)"}],"parts":[{"id":"au-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1]"}],"prose":"develops and documents an audit and accountability policy that addresses:","parts":[{"id":"au-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"au-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"au-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"au-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"au-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"au-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"au-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"au-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the audit and accountability policy are to be disseminated;"},{"id":"au-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[3]"}],"prose":"disseminates the audit and accountability policy to organization-defined personnel or roles;"}]},{"id":"au-1.a.2_obj","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)"}],"parts":[{"id":"au-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls;"},{"id":"au-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"au-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"au-1.b_obj","name":"objective","props":[{"name":"label","value":"AU-1(b)"}],"parts":[{"id":"au-1.b.1_obj","name":"objective","props":[{"name":"label","value":"AU-1(b)(1)"}],"parts":[{"id":"au-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current audit and accountability policy;"},{"id":"au-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(b)(1)[2]"}],"prose":"reviews and updates the current audit and accountability policy with the organization-defined frequency;"}]},{"id":"au-1.b.2_obj","name":"objective","props":[{"name":"label","value":"AU-1(b)(2)"}],"parts":[{"id":"au-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current audit and accountability procedures; and"},{"id":"au-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(b)(2)[2]"}],"prose":"reviews and updates the current audit and accountability procedures in accordance with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"au-2","class":"SP800-53","title":"Audit Events","params":[{"id":"au-2_prm_1","label":"organization-defined auditable events"},{"id":"au-2_prm_2","label":"organization-defined audited events (the subset of the auditable events defined in AU-2 a.) along with the frequency of (or situation requiring) auditing for each identified event"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-2"},{"name":"sort-id","value":"au-02"}],"links":[{"href":"#672fd561-b92b-4713-b9cf-6c9d9456728b","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"au-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"au-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Determines that the information system is capable of auditing the following events: {{ insert: param, au-2_prm_1 }};"},{"id":"au-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events;"},{"id":"au-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Provides a rationale for why the auditable events are deemed to be adequate to support after-the-fact investigations of security incidents; and"},{"id":"au-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Determines that the following events are to be audited within the information system: {{ insert: param, au-2_prm_2 }}."}]},{"id":"au-2_gdn","name":"guidance","prose":"An event is any observable occurrence in an organizational information system. Organizations identify audit events as those events which are significant and relevant to the security of information systems and the environments in which those systems operate in order to meet specific and ongoing audit needs. Audit events can include, for example, password changes, failed logons, or failed accesses related to information systems, administrative privilege usage, PIV credential usage, or third-party credential usage. In determining the set of auditable events, organizations consider the auditing appropriate for each of the security controls to be implemented. To balance auditing requirements with other information system needs, this control also requires identifying that subset of auditable events that are audited at a given point in time. For example, organizations may determine that information systems must have the capability to log every file access both successful and unsuccessful, but not activate that capability except for specific circumstances due to the potential burden on system performance. Auditing requirements, including the need for auditable events, may be referenced in other security controls and control enhancements. Organizations also include auditable events that are required by applicable federal laws, Executive Orders, directives, policies, regulations, and standards. Audit records can be generated at various levels of abstraction, including at the packet level as information traverses the network. Selecting the appropriate level of abstraction is a critical aspect of an audit capability and can facilitate the identification of root causes to problems. Organizations consider in the definition of auditable events, the auditing necessary to cover related events such as the steps in distributed, transaction-based processes (e.g., processes that are distributed across multiple organizations) and actions that occur in service-oriented architectures.","links":[{"href":"#ac-6","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"au-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-2.a_obj","name":"objective","props":[{"name":"label","value":"AU-2(a)"}],"parts":[{"id":"au-2.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-2(a)[1]"}],"prose":"defines the auditable events that the information system must be capable of auditing;"},{"id":"au-2.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-2(a)[2]"}],"prose":"determines that the information system is capable of auditing organization-defined auditable events;"}]},{"id":"au-2.b_obj","name":"objective","props":[{"name":"label","value":"AU-2(b)"}],"prose":"coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events;"},{"id":"au-2.c_obj","name":"objective","props":[{"name":"label","value":"AU-2(c)"}],"prose":"provides a rationale for why the auditable events are deemed to be adequate to support after-the-fact investigations of security incidents;"},{"id":"au-2.d_obj","name":"objective","props":[{"name":"label","value":"AU-2(d)"}],"parts":[{"id":"au-2.d_obj.1","name":"objective","props":[{"name":"label","value":"AU-2(d)[1]"}],"prose":"defines the subset of auditable events defined in AU-2a that are to be audited within the information system;"},{"id":"au-2.d_obj.2","name":"objective","props":[{"name":"label","value":"AU-2(d)[2]"}],"prose":"determines that the subset of auditable events defined in AU-2a are to be audited within the information system; and"},{"id":"au-2.d_obj.3","name":"objective","props":[{"name":"label","value":"AU-2(d)[3]"}],"prose":"determines the frequency of (or situation requiring) auditing for each identified event."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing auditable events\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\ninformation system auditable events\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information system auditing"}]}]},{"id":"au-3","class":"SP800-53","title":"Content of Audit Records","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-3"},{"name":"sort-id","value":"au-03"}],"parts":[{"id":"au-3_smt","name":"statement","prose":"The information system generates audit records containing information that establishes what type of event occurred, when the event occurred, where the event occurred, the source of the event, the outcome of the event, and the identity of any individuals or subjects associated with the event."},{"id":"au-3_gdn","name":"guidance","prose":"Audit record content that may be necessary to satisfy the requirement of this control, includes, for example, time stamps, source and destination addresses, user\/process identifiers, event descriptions, success\/fail indications, filenames involved, and access control or flow control rules invoked. Event outcomes can include indicators of event success or failure and event-specific results (e.g., the security state of the information system after the event occurred).","links":[{"href":"#au-2","rel":"related"},{"href":"#au-8","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#si-11","rel":"related"}]},{"id":"au-3_obj","name":"objective","prose":"Determine if the information system generates audit records containing information that establishes:","parts":[{"id":"au-3_obj.1","name":"objective","props":[{"name":"label","value":"AU-3[1]"}],"prose":"what type of event occurred;"},{"id":"au-3_obj.2","name":"objective","props":[{"name":"label","value":"AU-3[2]"}],"prose":"when the event occurred;"},{"id":"au-3_obj.3","name":"objective","props":[{"name":"label","value":"AU-3[3]"}],"prose":"where the event occurred;"},{"id":"au-3_obj.4","name":"objective","props":[{"name":"label","value":"AU-3[4]"}],"prose":"the source of the event;"},{"id":"au-3_obj.5","name":"objective","props":[{"name":"label","value":"AU-3[5]"}],"prose":"the outcome of the event; and"},{"id":"au-3_obj.6","name":"objective","props":[{"name":"label","value":"AU-3[6]"}],"prose":"the identity of any individuals or subjects associated with the event."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing content of audit records\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of organization-defined auditable events\n\ninformation system audit records\n\ninformation system incident reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information system auditing of auditable events"}]}]},{"id":"au-4","class":"SP800-53","title":"Audit Storage Capacity","params":[{"id":"au-4_prm_1","label":"organization-defined audit record storage requirements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-4"},{"name":"sort-id","value":"au-04"}],"parts":[{"id":"au-4_smt","name":"statement","prose":"The organization allocates audit record storage capacity in accordance with {{ insert: param, au-4_prm_1 }}."},{"id":"au-4_gdn","name":"guidance","prose":"Organizations consider the types of auditing to be performed and the audit processing requirements when allocating audit storage capacity. Allocating sufficient audit storage capacity reduces the likelihood of such capacity being exceeded and resulting in the potential loss or reduction of auditing capability.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-5","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"},{"href":"#au-11","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"au-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-4_obj.1","name":"objective","props":[{"name":"label","value":"AU-4[1]"}],"prose":"defines audit record storage requirements; and"},{"id":"au-4_obj.2","name":"objective","props":[{"name":"label","value":"AU-4[2]"}],"prose":"allocates audit record storage capacity in accordance with the organization-defined audit record storage requirements."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit storage capacity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit record storage requirements\n\naudit record storage capability for information system components\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Audit record storage capacity and related configuration settings"}]}]},{"id":"au-5","class":"SP800-53","title":"Response to Audit Processing Failures","params":[{"id":"au-5_prm_1","label":"organization-defined personnel or roles"},{"id":"au-5_prm_2","label":"organization-defined actions to be taken (e.g., shut down information system, overwrite oldest audit records, stop generating audit records)"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-5"},{"name":"sort-id","value":"au-05"}],"parts":[{"id":"au-5_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Alerts {{ insert: param, au-5_prm_1 }} in the event of an audit processing failure; and"},{"id":"au-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Takes the following additional actions: {{ insert: param, au-5_prm_2 }}."}]},{"id":"au-5_gdn","name":"guidance","prose":"Audit processing failures include, for example, software\/hardware errors, failures in the audit capturing mechanisms, and audit storage capacity being reached or exceeded. Organizations may choose to define additional actions for different audit processing failures (e.g., by type, by location, by severity, or a combination of such factors). This control applies to each audit data storage repository (i.e., distinct information system component where audit records are stored), the total audit storage capacity of organizations (i.e., all audit data storage repositories combined), or both.","links":[{"href":"#au-4","rel":"related"},{"href":"#si-12","rel":"related"}]},{"id":"au-5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-5.a_obj","name":"objective","props":[{"name":"label","value":"AU-5(a)"}],"parts":[{"id":"au-5.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-5(a)[1]"}],"prose":"the organization defines the personnel or roles to be alerted in the event of an audit processing failure;"},{"id":"au-5.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-5(a)[2]"}],"prose":"the information system alerts the organization-defined personnel or roles in the event of an audit processing failure;"}]},{"id":"au-5.b_obj","name":"objective","props":[{"name":"label","value":"AU-5(b)"}],"parts":[{"id":"au-5.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-5(b)[1]"}],"prose":"the organization defines additional actions to be taken (e.g., shutdown information system, overwrite oldest audit records, stop generating audit records) in the event of an audit processing failure; and"},{"id":"au-5.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-5(b)[2]"}],"prose":"the information system takes the additional organization-defined actions in the event of an audit processing failure."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing response to audit processing failures\n\ninformation system design documentation\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\nlist of personnel to be notified in case of an audit processing failure\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information system response to audit processing failures"}]}]},{"id":"au-6","class":"SP800-53","title":"Audit Review, Analysis, and Reporting","params":[{"id":"au-6_prm_1","label":"organization-defined frequency"},{"id":"au-6_prm_2","label":"organization-defined inappropriate or unusual activity"},{"id":"au-6_prm_3","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-6"},{"name":"sort-id","value":"au-06"}],"parts":[{"id":"au-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"au-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Reviews and analyzes information system audit records {{ insert: param, au-6_prm_1 }} for indications of {{ insert: param, au-6_prm_2 }}; and"},{"id":"au-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reports findings to {{ insert: param, au-6_prm_3 }}."}]},{"id":"au-6_gdn","name":"guidance","prose":"Audit review, analysis, and reporting covers information security-related auditing performed by organizations including, for example, auditing that results from monitoring of account usage, remote access, wireless connectivity, mobile device connection, configuration settings, system component inventory, use of maintenance tools and nonlocal maintenance, physical access, temperature and humidity, equipment delivery and removal, communications at the information system boundaries, use of mobile code, and use of VoIP. Findings can be reported to organizational entities that include, for example, incident response team, help desk, information security group\/department. If organizations are prohibited from reviewing and analyzing audit information or unable to conduct such activities (e.g., in certain national security applications or systems), the review\/analysis may be carried out by other organizations granted such authority.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#au-7","rel":"related"},{"href":"#au-16","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-10","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ir-5","rel":"related"},{"href":"#ir-6","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-6","rel":"related"},{"href":"#pe-14","rel":"related"},{"href":"#pe-16","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-18","rel":"related"},{"href":"#sc-19","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"au-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-6.a_obj","name":"objective","props":[{"name":"label","value":"AU-6(a)"}],"parts":[{"id":"au-6.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-6(a)[1]"}],"prose":"defines the types of inappropriate or unusual activity to look for when information system audit records are reviewed and analyzed;"},{"id":"au-6.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-6(a)[2]"}],"prose":"defines the frequency to review and analyze information system audit records for indications of organization-defined inappropriate or unusual activity;"},{"id":"au-6.a_obj.3","name":"objective","props":[{"name":"label","value":"AU-6(a)[3]"}],"prose":"reviews and analyzes information system audit records for indications of organization-defined inappropriate or unusual activity with the organization-defined frequency;"}]},{"id":"au-6.b_obj","name":"objective","props":[{"name":"label","value":"AU-6(b)"}],"parts":[{"id":"au-6.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-6(b)[1]"}],"prose":"defines personnel or roles to whom findings resulting from reviews and analysis of information system audit records are to be reported; and"},{"id":"au-6.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-6(b)[2]"}],"prose":"reports findings to organization-defined personnel or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit review, analysis, and reporting\n\nreports of audit findings\n\nrecords of actions taken in response to reviews\/analyses of audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit review, analysis, and reporting responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"au-8","class":"SP800-53","title":"Time Stamps","params":[{"id":"au-8_prm_1","label":"organization-defined granularity of time measurement"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-8"},{"name":"sort-id","value":"au-08"}],"parts":[{"id":"au-8_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Uses internal system clocks to generate time stamps for audit records; and"},{"id":"au-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT) and meets {{ insert: param, au-8_prm_1 }}."}]},{"id":"au-8_gdn","name":"guidance","prose":"Time stamps generated by the information system include date and time. Time is commonly expressed in Coordinated Universal Time (UTC), a modern continuation of Greenwich Mean Time (GMT), or local time with an offset from UTC. Granularity of time measurements refers to the degree of synchronization between information system clocks and reference clocks, for example, clocks synchronizing within hundreds of milliseconds or within tens of milliseconds. Organizations may define different time granularities for different system components. Time service can also be critical to other security capabilities such as access control and identification and authentication, depending on the nature of the mechanisms used to support those capabilities.","links":[{"href":"#au-3","rel":"related"},{"href":"#au-12","rel":"related"}]},{"id":"au-8_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-8.a_obj","name":"objective","props":[{"name":"label","value":"AU-8(a)"}],"prose":"the information system uses internal system clocks to generate time stamps for audit records;"},{"id":"au-8.b_obj","name":"objective","props":[{"name":"label","value":"AU-8(b)"}],"parts":[{"id":"au-8.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-8(b)[1]"}],"prose":"the information system records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT);"},{"id":"au-8.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-8(b)[2]"}],"prose":"the organization defines the granularity of time measurement to be met when recording time stamps for audit records; and"},{"id":"au-8.b_obj.3","name":"objective","props":[{"name":"label","value":"AU-8(b)[3]"}],"prose":"the organization records time stamps for audit records that meet the organization-defined granularity of time measurement."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing time stamp generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing time stamp generation"}]}]},{"id":"au-9","class":"SP800-53","title":"Protection of Audit Information","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-9"},{"name":"sort-id","value":"au-09"}],"parts":[{"id":"au-9_smt","name":"statement","prose":"The information system protects audit information and audit tools from unauthorized access, modification, and deletion."},{"id":"au-9_gdn","name":"guidance","prose":"Audit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully audit information system activity. This control focuses on technical protection of audit information. Physical protection of audit information is addressed by media protection controls and physical and environmental protection controls.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-6","rel":"related"}]},{"id":"au-9_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-9_obj.1","name":"objective","props":[{"name":"label","value":"AU-9[1]"}],"prose":"the information system protects audit information from unauthorized:","parts":[{"id":"au-9_obj.1.a","name":"objective","props":[{"name":"label","value":"AU-9[1][a]"}],"prose":"access;"},{"id":"au-9_obj.1.b","name":"objective","props":[{"name":"label","value":"AU-9[1][b]"}],"prose":"modification;"},{"id":"au-9_obj.1.c","name":"objective","props":[{"name":"label","value":"AU-9[1][c]"}],"prose":"deletion;"}]},{"id":"au-9_obj.2","name":"objective","props":[{"name":"label","value":"AU-9[2]"}],"prose":"the information system protects audit tools from unauthorized:","parts":[{"id":"au-9_obj.2.a","name":"objective","props":[{"name":"label","value":"AU-9[2][a]"}],"prose":"access;"},{"id":"au-9_obj.2.b","name":"objective","props":[{"name":"label","value":"AU-9[2][b]"}],"prose":"modification; and"},{"id":"au-9_obj.2.c","name":"objective","props":[{"name":"label","value":"AU-9[2][c]"}],"prose":"deletion."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\naccess control policy and procedures\n\nprocedures addressing protection of audit information\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation, information system audit records\n\naudit tools\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing audit information protection"}]}]},{"id":"au-11","class":"SP800-53","title":"Audit Record Retention","params":[{"id":"au-11_prm_1","label":"organization-defined time period consistent with records retention policy"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AU-11"},{"name":"sort-id","value":"au-11"}],"parts":[{"id":"au-11_smt","name":"statement","prose":"The organization retains audit records for {{ insert: param, au-11_prm_1 }} to provide support for after-the-fact investigations of security incidents and to meet regulatory and organizational information retention requirements."},{"id":"au-11_gdn","name":"guidance","prose":"Organizations retain audit records until it is determined that they are no longer needed for administrative, legal, audit, or other operational purposes. This includes, for example, retention and availability of audit records relative to Freedom of Information Act (FOIA) requests, subpoenas, and law enforcement actions. Organizations develop standard categories of audit records relative to such types of actions and standard response processes for each type of action. The National Archives and Records Administration (NARA) General Records Schedules provide federal policy on record retention.","links":[{"href":"#au-4","rel":"related"},{"href":"#au-5","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#mp-6","rel":"related"}]},{"id":"au-11_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-11_obj.1","name":"objective","props":[{"name":"label","value":"AU-11[1]"}],"prose":"defines a time period to retain audit records that is consistent with records retention policy;"},{"id":"au-11_obj.2","name":"objective","props":[{"name":"label","value":"AU-11[2]"}],"prose":"retains audit records for the organization-defined time period consistent with records retention policy to:","parts":[{"id":"au-11_obj.2.a","name":"objective","props":[{"name":"label","value":"AU-11[2][a]"}],"prose":"provide support for after-the-fact investigations of security incidents; and"},{"id":"au-11_obj.2.b","name":"objective","props":[{"name":"label","value":"AU-11[2][b]"}],"prose":"meet regulatory and organizational information retention requirements."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\naudit record retention policy and procedures\n\nsecurity plan\n\norganization-defined retention period for audit records\n\naudit record archives\n\naudit logs\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit record retention responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]}]},{"id":"au-12","class":"SP800-53","title":"Audit Generation","params":[{"id":"au-12_prm_1","label":"organization-defined information system components"},{"id":"au-12_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-12"},{"name":"sort-id","value":"au-12"}],"parts":[{"id":"au-12_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-12_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Provides audit record generation capability for the auditable events defined in AU-2 a. at {{ insert: param, au-12_prm_1 }};"},{"id":"au-12_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Allows {{ insert: param, au-12_prm_2 }} to select which auditable events are to be audited by specific components of the information system; and"},{"id":"au-12_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Generates audit records for the events defined in AU-2 d. with the content defined in AU-3."}]},{"id":"au-12_gdn","name":"guidance","prose":"Audit records can be generated from many different information system components. The list of audited events is the set of events for which audits are to be generated. These events are typically a subset of all events for which the information system is capable of generating audit records.","links":[{"href":"#ac-3","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"}]},{"id":"au-12_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-12.a_obj","name":"objective","props":[{"name":"label","value":"AU-12(a)"}],"parts":[{"id":"au-12.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-12(a)[1]"}],"prose":"the organization defines the information system components which are to provide audit record generation capability for the auditable events defined in AU-2a;"},{"id":"au-12.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-12(a)[2]"}],"prose":"the information system provides audit record generation capability, for the auditable events defined in AU-2a, at organization-defined information system components;"}]},{"id":"au-12.b_obj","name":"objective","props":[{"name":"label","value":"AU-12(b)"}],"parts":[{"id":"au-12.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-12(b)[1]"}],"prose":"the organization defines the personnel or roles allowed to select which auditable events are to be audited by specific components of the information system;"},{"id":"au-12.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-12(b)[2]"}],"prose":"the information system allows the organization-defined personnel or roles to select which auditable events are to be audited by specific components of the system; and"}]},{"id":"au-12.c_obj","name":"objective","props":[{"name":"label","value":"AU-12(c)"}],"prose":"the information system generates audit records for the events defined in AU-2d with the content in defined in AU-3."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit record generation\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of auditable events\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit record generation responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing audit record generation capability"}]}]}]},{"id":"ca","class":"family","title":"Security Assessment and Authorization","controls":[{"id":"ca-1","class":"SP800-53","title":"Security Assessment and Authorization Policy and Procedures","params":[{"id":"ca-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ca-1_prm_2","label":"organization-defined frequency"},{"id":"ca-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CA-1"},{"name":"sort-id","value":"ca-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ca-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ca-1_prm_1 }}:","parts":[{"id":"ca-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ca-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the security assessment and authorization policy and associated security assessment and authorization controls; and"}]},{"id":"ca-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ca-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security assessment and authorization policy {{ insert: param, ca-1_prm_2 }}; and"},{"id":"ca-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Security assessment and authorization procedures {{ insert: param, ca-1_prm_3 }}."}]}]},{"id":"ca-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the CA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ca-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-1.a_obj","name":"objective","props":[{"name":"label","value":"CA-1(a)"}],"parts":[{"id":"ca-1.a.1_obj","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)"}],"parts":[{"id":"ca-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1]"}],"prose":"develops and documents a security assessment and authorization policy that addresses:","parts":[{"id":"ca-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ca-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ca-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ca-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ca-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ca-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ca-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ca-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the security assessment and authorization policy is to be disseminated;"},{"id":"ca-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[3]"}],"prose":"disseminates the security assessment and authorization policy to organization-defined personnel or roles;"}]},{"id":"ca-1.a.2_obj","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)"}],"parts":[{"id":"ca-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the security assessment and authorization policy and associated assessment and authorization controls;"},{"id":"ca-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ca-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ca-1.b_obj","name":"objective","props":[{"name":"label","value":"CA-1(b)"}],"parts":[{"id":"ca-1.b.1_obj","name":"objective","props":[{"name":"label","value":"CA-1(b)(1)"}],"parts":[{"id":"ca-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current security assessment and authorization policy;"},{"id":"ca-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(b)(1)[2]"}],"prose":"reviews and updates the current security assessment and authorization policy with the organization-defined frequency;"}]},{"id":"ca-1.b.2_obj","name":"objective","props":[{"name":"label","value":"CA-1(b)(2)"}],"parts":[{"id":"ca-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current security assessment and authorization procedures; and"},{"id":"ca-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(b)(2)[2]"}],"prose":"reviews and updates the current security assessment and authorization procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security assessment and authorization responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ca-2","class":"SP800-53","title":"Security Assessments","params":[{"id":"ca-2_prm_1","label":"organization-defined frequency"},{"id":"ca-2_prm_2","label":"organization-defined individuals or roles"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-2"},{"name":"sort-id","value":"ca-02"}],"links":[{"href":"#c5034e0c-eba6-4ecd-a541-79f0678f4ba4","rel":"reference"},{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"}],"parts":[{"id":"ca-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a security assessment plan that describes the scope of the assessment including:","parts":[{"id":"ca-2_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security controls and control enhancements under assessment;"},{"id":"ca-2_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Assessment procedures to be used to determine security control effectiveness; and"},{"id":"ca-2_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Assessment environment, assessment team, and assessment roles and responsibilities;"}]},{"id":"ca-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Assesses the security controls in the information system and its environment of operation {{ insert: param, ca-2_prm_1 }} to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;"},{"id":"ca-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Produces a security assessment report that documents the results of the assessment; and"},{"id":"ca-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Provides the results of the security control assessment to {{ insert: param, ca-2_prm_2 }}."}]},{"id":"ca-2_gdn","name":"guidance","prose":"Organizations assess security controls in organizational information systems and the environments in which those systems operate as part of: (i) initial and ongoing security authorizations; (ii) FISMA annual assessments; (iii) continuous monitoring; and (iv) system development life cycle activities. Security assessments: (i) ensure that information security is built into organizational information systems; (ii) identify weaknesses and deficiencies early in the development process; (iii) provide essential information needed to make risk-based decisions as part of security authorization processes; and (iv) ensure compliance to vulnerability mitigation procedures. Assessments are conducted on the implemented security controls from Appendix F (main catalog) and Appendix G (Program Management controls) as documented in System Security Plans and Information Security Program Plans. Organizations can use other types of assessment activities such as vulnerability scanning and system monitoring to maintain the security posture of information systems during the entire life cycle. Security assessment reports document assessment results in sufficient detail as deemed necessary by organizations, to determine the accuracy and completeness of the reports and whether the security controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting security requirements. The FISMA requirement for assessing security controls at least annually does not require additional assessment activities to those activities already in place in organizational security authorization processes. Security assessment results are provided to the individuals or roles appropriate for the types of assessments being conducted. For example, assessments conducted in support of security authorization decisions are provided to authorizing officials or authorizing official designated representatives. To satisfy annual assessment requirements, organizations can use assessment results from the following sources: (i) initial or ongoing information system authorizations; (ii) continuous monitoring; or (iii) system development life cycle activities. Organizations ensure that security assessment results are current, relevant to the determination of security control effectiveness, and obtained with the appropriate level of assessor independence. Existing security control assessment results can be reused to the extent that the results are still valid and can also be supplemented with additional assessments as needed. Subsequent to initial authorizations and in accordance with OMB policy, organizations assess security controls during continuous monitoring. Organizations establish the frequency for ongoing security control assessments in accordance with organizational continuous monitoring strategies. Information Assurance Vulnerability Alerts provide useful examples of vulnerability mitigation procedures. External audits (e.g., audits by external entities such as regulatory agencies) are outside the scope of this control.","links":[{"href":"#ca-5","rel":"related"},{"href":"#ca-6","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-2.a_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)"}],"prose":"develops a security assessment plan that describes the scope of the assessment including:","parts":[{"id":"ca-2.a.1_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)(1)"}],"prose":"security controls and control enhancements under assessment;"},{"id":"ca-2.a.2_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)(2)"}],"prose":"assessment procedures to be used to determine security control effectiveness;"},{"id":"ca-2.a.3_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)"}],"parts":[{"id":"ca-2.a.3_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)[1]"}],"prose":"assessment environment;"},{"id":"ca-2.a.3_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)[2]"}],"prose":"assessment team;"},{"id":"ca-2.a.3_obj.3","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)[3]"}],"prose":"assessment roles and responsibilities;"}]}]},{"id":"ca-2.b_obj","name":"objective","props":[{"name":"label","value":"CA-2(b)"}],"parts":[{"id":"ca-2.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(b)[1]"}],"prose":"defines the frequency to assess the security controls in the information system and its environment of operation;"},{"id":"ca-2.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(b)[2]"}],"prose":"assesses the security controls in the information system with the organization-defined frequency to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;"}]},{"id":"ca-2.c_obj","name":"objective","props":[{"name":"label","value":"CA-2(c)"}],"prose":"produces a security assessment report that documents the results of the assessment;"},{"id":"ca-2.d_obj","name":"objective","props":[{"name":"label","value":"CA-2(d)"}],"parts":[{"id":"ca-2.d_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(d)[1]"}],"prose":"defines individuals or roles to whom the results of the security control assessment are to be provided; and"},{"id":"ca-2.d_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(d)[2]"}],"prose":"provides the results of the security control assessment to organization-defined individuals or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing security assessment planning\n\nprocedures addressing security assessments\n\nsecurity assessment plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security assessment responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting security assessment, security assessment plan development, and\/or security assessment reporting"}]}]},{"id":"ca-3","class":"SP800-53","title":"System Interconnections","params":[{"id":"ca-3_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CA-3"},{"name":"sort-id","value":"ca-03"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#2711f068-734e-4afd-94ba-0b22247fbc88","rel":"reference"}],"parts":[{"id":"ca-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;"},{"id":"ca-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents, for each interconnection, the interface characteristics, security requirements, and the nature of the information communicated; and"},{"id":"ca-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews and updates Interconnection Security Agreements {{ insert: param, ca-3_prm_1 }}."}]},{"id":"ca-3_gdn","name":"guidance","prose":"This control applies to dedicated connections between information systems (i.e., system interconnections) and does not apply to transitory, user-controlled connections such as email and website browsing. Organizations carefully consider the risks that may be introduced when information systems are connected to other systems with different security requirements and security controls, both within organizations and external to organizations. Authorizing officials determine the risk associated with information system connections and the appropriate controls employed. If interconnecting systems have the same authorizing official, organizations do not need to develop Interconnection Security Agreements. Instead, organizations can describe the interface characteristics between those interconnecting systems in their respective security plans. If interconnecting systems have different authorizing officials within the same organization, organizations can either develop Interconnection Security Agreements or describe the interface characteristics between systems in the security plans for the respective systems. Organizations may also incorporate Interconnection Security Agreement information into formal contracts, especially for interconnections established between federal agencies and nonfederal (i.e., private sector) organizations. Risk considerations also include information systems sharing the same networks. For certain technologies (e.g., space, unmanned aerial vehicles, and medical devices), there may be specialized connections in place during preoperational testing. Such connections may require Interconnection Security Agreements and be subject to additional security controls.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#au-16","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#sa-9","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-3.a_obj","name":"objective","props":[{"name":"label","value":"CA-3(a)"}],"prose":"authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;"},{"id":"ca-3.b_obj","name":"objective","props":[{"name":"label","value":"CA-3(b)"}],"prose":"documents, for each interconnection:","parts":[{"id":"ca-3.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-3(b)[1]"}],"prose":"the interface characteristics;"},{"id":"ca-3.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-3(b)[2]"}],"prose":"the security requirements;"},{"id":"ca-3.b_obj.3","name":"objective","props":[{"name":"label","value":"CA-3(b)[3]"}],"prose":"the nature of the information communicated;"}]},{"id":"ca-3.c_obj","name":"objective","props":[{"name":"label","value":"CA-3(c)"}],"parts":[{"id":"ca-3.c_obj.1","name":"objective","props":[{"name":"label","value":"CA-3(c)[1]"}],"prose":"defines the frequency to review and update Interconnection Security Agreements; and"},{"id":"ca-3.c_obj.2","name":"objective","props":[{"name":"label","value":"CA-3(c)[2]"}],"prose":"reviews and updates Interconnection Security Agreements with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing information system connections\n\nsystem and communications protection policy\n\ninformation system Interconnection Security Agreements\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for developing, implementing, or approving information system interconnection agreements\n\norganizational personnel with information security responsibilities\n\npersonnel managing the system(s) to which the Interconnection Security Agreement applies"}]}]},{"id":"ca-5","class":"SP800-53","title":"Plan of Action and Milestones","params":[{"id":"ca-5_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"CA-5"},{"name":"sort-id","value":"ca-05"}],"links":[{"href":"#2c5884cd-7b96-425c-862a-99877e1cf909","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"}],"parts":[{"id":"ca-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a plan of action and milestones for the information system to document the organization’s planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls and to reduce or eliminate known vulnerabilities in the system; and"},{"id":"ca-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Updates existing plan of action and milestones {{ insert: param, ca-5_prm_1 }} based on the findings from security controls assessments, security impact analyses, and continuous monitoring activities."}]},{"id":"ca-5_gdn","name":"guidance","prose":"Plans of action and milestones are key documents in security authorization packages and are subject to federal reporting requirements established by OMB.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#pm-4","rel":"related"}]},{"id":"ca-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-5.a_obj","name":"objective","props":[{"name":"label","value":"CA-5(a)"}],"prose":"develops a plan of action and milestones for the information system to:","parts":[{"id":"ca-5.a_obj.1","name":"objective","props":[{"name":"label","value":"CA-5(a)[1]"}],"prose":"document the organization’s planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls;"},{"id":"ca-5.a_obj.2","name":"objective","props":[{"name":"label","value":"CA-5(a)[2]"}],"prose":"reduce or eliminate known vulnerabilities in the system;"}]},{"id":"ca-5.b_obj","name":"objective","props":[{"name":"label","value":"CA-5(b)"}],"parts":[{"id":"ca-5.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-5(b)[1]"}],"prose":"defines the frequency to update the existing plan of action and milestones;"},{"id":"ca-5.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-5(b)[2]"}],"prose":"updates the existing plan of action and milestones with the organization-defined frequency based on the findings from:","parts":[{"id":"ca-5.b_obj.2.a","name":"objective","props":[{"name":"label","value":"CA-5(b)[2][a]"}],"prose":"security controls assessments;"},{"id":"ca-5.b_obj.2.b","name":"objective","props":[{"name":"label","value":"CA-5(b)[2][b]"}],"prose":"security impact analyses; and"},{"id":"ca-5.b_obj.2.c","name":"objective","props":[{"name":"label","value":"CA-5(b)[2][c]"}],"prose":"continuous monitoring activities."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing plan of action and milestones\n\nsecurity plan\n\nsecurity assessment plan\n\nsecurity assessment report\n\nsecurity assessment evidence\n\nplan of action and milestones\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with plan of action and milestones development and implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms for developing, implementing, and maintaining plan of action and milestones"}]}]},{"id":"ca-6","class":"SP800-53","title":"Security Authorization","params":[{"id":"ca-6_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-6"},{"name":"sort-id","value":"ca-06"}],"links":[{"href":"#9f77f845-e3ea-4ca4-b2c0-aa9eedc214ab","rel":"reference"},{"href":"#bedb15b7-ec5c-4a68-807f-385125751fcd","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"}],"parts":[{"id":"ca-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Assigns a senior-level executive or manager as the authorizing official for the information system;"},{"id":"ca-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Ensures that the authorizing official authorizes the information system for processing before commencing operations; and"},{"id":"ca-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Updates the security authorization {{ insert: param, ca-6_prm_1 }}."}]},{"id":"ca-6_gdn","name":"guidance","prose":"Security authorizations are official management decisions, conveyed through authorization decision documents, by senior organizational officials or executives (i.e., authorizing officials) to authorize operation of information systems and to explicitly accept the risk to organizational operations and assets, individuals, other organizations, and the Nation based on the implementation of agreed-upon security controls. Authorizing officials provide budgetary oversight for organizational information systems or assume responsibility for the mission\/business operations supported by those systems. The security authorization process is an inherently federal responsibility and therefore, authorizing officials must be federal employees. Through the security authorization process, authorizing officials assume responsibility and are accountable for security risks associated with the operation and use of organizational information systems. Accordingly, authorizing officials are in positions with levels of authority commensurate with understanding and accepting such information security-related risks. OMB policy requires that organizations conduct ongoing authorizations of information systems by implementing continuous monitoring programs. Continuous monitoring programs can satisfy three-year reauthorization requirements, so separate reauthorization processes are not necessary. Through the employment of comprehensive continuous monitoring processes, critical information contained in authorization packages (i.e., security plans, security assessment reports, and plans of action and milestones) is updated on an ongoing basis, providing authorizing officials and information system owners with an up-to-date status of the security state of organizational information systems and environments of operation. To reduce the administrative cost of security reauthorization, authorizing officials use the results of continuous monitoring processes to the maximum extent possible as the basis for rendering reauthorization decisions.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#pm-10","rel":"related"}]},{"id":"ca-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-6.a_obj","name":"objective","props":[{"name":"label","value":"CA-6(a)"}],"prose":"assigns a senior-level executive or manager as the authorizing official for the information system;"},{"id":"ca-6.b_obj","name":"objective","props":[{"name":"label","value":"CA-6(b)"}],"prose":"ensures that the authorizing official authorizes the information system for processing before commencing operations;"},{"id":"ca-6.c_obj","name":"objective","props":[{"name":"label","value":"CA-6(c)"}],"parts":[{"id":"ca-6.c_obj.1","name":"objective","props":[{"name":"label","value":"CA-6(c)[1]"}],"prose":"defines the frequency to update the security authorization; and"},{"id":"ca-6.c_obj.2","name":"objective","props":[{"name":"label","value":"CA-6(c)[2]"}],"prose":"updates the security authorization with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing security authorization\n\nsecurity authorization package (including security plan\n\nsecurity assessment report\n\nplan of action and milestones\n\nauthorization statement)\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security authorization responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms that facilitate security authorizations and updates"}]}]},{"id":"ca-7","class":"SP800-53","title":"Continuous Monitoring","params":[{"id":"ca-7_prm_1","label":"organization-defined metrics"},{"id":"ca-7_prm_2","label":"organization-defined frequencies"},{"id":"ca-7_prm_3","label":"organization-defined frequencies"},{"id":"ca-7_prm_4","label":"organization-defined personnel or roles"},{"id":"ca-7_prm_5","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-7"},{"name":"sort-id","value":"ca-07"}],"links":[{"href":"#bedb15b7-ec5c-4a68-807f-385125751fcd","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"},{"href":"#8ade2fbe-e468-4ca8-9a40-54d7f23c32bb","rel":"reference"},{"href":"#2d8b14e9-c8b5-4d3d-8bdc-155078f3281b","rel":"reference"}],"parts":[{"id":"ca-7_smt","name":"statement","prose":"The organization develops a continuous monitoring strategy and implements a continuous monitoring program that includes:","parts":[{"id":"ca-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishment of {{ insert: param, ca-7_prm_1 }} to be monitored;"},{"id":"ca-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishment of {{ insert: param, ca-7_prm_2 }} for monitoring and {{ insert: param, ca-7_prm_3 }} for assessments supporting such monitoring;"},{"id":"ca-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ongoing security control assessments in accordance with the organizational continuous monitoring strategy;"},{"id":"ca-7_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;"},{"id":"ca-7_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Correlation and analysis of security-related information generated by assessments and monitoring;"},{"id":"ca-7_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Response actions to address results of the analysis of security-related information; and"},{"id":"ca-7_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Reporting the security status of organization and the information system to {{ insert: param, ca-7_prm_4 }} {{ insert: param, ca-7_prm_5 }}."}]},{"id":"ca-7_gdn","name":"guidance","prose":"Continuous monitoring programs facilitate ongoing awareness of threats, vulnerabilities, and information security to support organizational risk management decisions. The terms continuous and ongoing imply that organizations assess\/analyze security controls and information security-related risks at a frequency sufficient to support organizational risk-based decisions. The results of continuous monitoring programs generate appropriate risk response actions by organizations. Continuous monitoring programs also allow organizations to maintain the security authorizations of information systems and common controls over time in highly dynamic environments of operation with changing mission\/business needs, threats, vulnerabilities, and technologies. Having access to security-related information on a continuing basis through reports\/dashboards gives organizational officials the capability to make more effective and timely risk management decisions, including ongoing security authorization decisions. Automation supports more frequent updates to security authorization packages, hardware\/software\/firmware inventories, and other system information. Effectiveness is further enhanced when continuous monitoring outputs are formatted to provide information that is specific, measurable, actionable, relevant, and timely. Continuous monitoring activities are scaled in accordance with the security categories of information systems.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-5","rel":"related"},{"href":"#ca-6","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#pm-6","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-2","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-7.a_obj","name":"objective","props":[{"name":"label","value":"CA-7(a)"}],"parts":[{"id":"ca-7.a_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(a)[1]"}],"prose":"develops a continuous monitoring strategy that defines metrics to be monitored;"},{"id":"ca-7.a_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(a)[2]"}],"prose":"develops a continuous monitoring strategy that includes monitoring of organization-defined metrics;"},{"id":"ca-7.a_obj.3","name":"objective","props":[{"name":"label","value":"CA-7(a)[3]"}],"prose":"implements a continuous monitoring program that includes monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.b_obj","name":"objective","props":[{"name":"label","value":"CA-7(b)"}],"parts":[{"id":"ca-7.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(b)[1]"}],"prose":"develops a continuous monitoring strategy that defines frequencies for monitoring;"},{"id":"ca-7.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(b)[2]"}],"prose":"defines frequencies for assessments supporting monitoring;"},{"id":"ca-7.b_obj.3","name":"objective","props":[{"name":"label","value":"CA-7(b)[3]"}],"prose":"develops a continuous monitoring strategy that includes establishment of the organization-defined frequencies for monitoring and for assessments supporting monitoring;"},{"id":"ca-7.b_obj.4","name":"objective","props":[{"name":"label","value":"CA-7(b)[4]"}],"prose":"implements a continuous monitoring program that includes establishment of organization-defined frequencies for monitoring and for assessments supporting such monitoring in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.c_obj","name":"objective","props":[{"name":"label","value":"CA-7(c)"}],"parts":[{"id":"ca-7.c_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(c)[1]"}],"prose":"develops a continuous monitoring strategy that includes ongoing security control assessments;"},{"id":"ca-7.c_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(c)[2]"}],"prose":"implements a continuous monitoring program that includes ongoing security control assessments in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.d_obj","name":"objective","props":[{"name":"label","value":"CA-7(d)"}],"parts":[{"id":"ca-7.d_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(d)[1]"}],"prose":"develops a continuous monitoring strategy that includes ongoing security status monitoring of organization-defined metrics;"},{"id":"ca-7.d_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(d)[2]"}],"prose":"implements a continuous monitoring program that includes ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.e_obj","name":"objective","props":[{"name":"label","value":"CA-7(e)"}],"parts":[{"id":"ca-7.e_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(e)[1]"}],"prose":"develops a continuous monitoring strategy that includes correlation and analysis of security-related information generated by assessments and monitoring;"},{"id":"ca-7.e_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(e)[2]"}],"prose":"implements a continuous monitoring program that includes correlation and analysis of security-related information generated by assessments and monitoring in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.f_obj","name":"objective","props":[{"name":"label","value":"CA-7(f)"}],"parts":[{"id":"ca-7.f_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(f)[1]"}],"prose":"develops a continuous monitoring strategy that includes response actions to address results of the analysis of security-related information;"},{"id":"ca-7.f_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(f)[2]"}],"prose":"implements a continuous monitoring program that includes response actions to address results of the analysis of security-related information in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.g_obj","name":"objective","props":[{"name":"label","value":"CA-7(g)"}],"parts":[{"id":"ca-7.g_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(g)[1]"}],"prose":"develops a continuous monitoring strategy that defines the personnel or roles to whom the security status of the organization and information system are to be reported;"},{"id":"ca-7.g_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(g)[2]"}],"prose":"develops a continuous monitoring strategy that defines the frequency to report the security status of the organization and information system to organization-defined personnel or roles;"},{"id":"ca-7.g_obj.3","name":"objective","props":[{"name":"label","value":"CA-7(g)[3]"}],"prose":"develops a continuous monitoring strategy that includes reporting the security status of the organization or information system to organizational-defined personnel or roles with the organization-defined frequency; and"},{"id":"ca-7.g_obj.4","name":"objective","props":[{"name":"label","value":"CA-7(g)[4]"}],"prose":"implements a continuous monitoring program that includes reporting the security status of the organization and information system to organization-defined personnel or roles with the organization-defined frequency in accordance with the organizational continuous monitoring strategy."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing continuous monitoring of information system security controls\n\nprocedures addressing configuration management\n\nsecurity plan\n\nsecurity assessment report\n\nplan of action and milestones\n\ninformation system monitoring records\n\nconfiguration management records, security impact analyses\n\nstatus reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with continuous monitoring responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Mechanisms implementing continuous monitoring"}]}]},{"id":"ca-9","class":"SP800-53","title":"Internal System Connections","params":[{"id":"ca-9_prm_1","label":"organization-defined information system components or classes of components"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-9"},{"name":"sort-id","value":"ca-09"}],"parts":[{"id":"ca-9_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Authorizes internal connections of {{ insert: param, ca-9_prm_1 }} to the information system; and"},{"id":"ca-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents, for each internal connection, the interface characteristics, security requirements, and the nature of the information communicated."}]},{"id":"ca-9_gdn","name":"guidance","prose":"This control applies to connections between organizational information systems and (separate) constituent system components (i.e., intra-system connections) including, for example, system connections with mobile devices, notebook\/desktop computers, printers, copiers, facsimile machines, scanners, sensors, and servers. Instead of authorizing each individual internal connection, organizations can authorize internal connections for a class of components with common characteristics and\/or configurations, for example, all digital printers, scanners, and copiers with a specified processing, storage, and transmission capability or all smart phones with a specific baseline configuration.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-9_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-9.a_obj","name":"objective","props":[{"name":"label","value":"CA-9(a)"}],"parts":[{"id":"ca-9.a_obj.1","name":"objective","props":[{"name":"label","value":"CA-9(a)[1]"}],"prose":"defines information system components or classes of components to be authorized as internal connections to the information system;"},{"id":"ca-9.a_obj.2","name":"objective","props":[{"name":"label","value":"CA-9(a)[2]"}],"prose":"authorizes internal connections of organization-defined information system components or classes of components to the information system;"}]},{"id":"ca-9.b_obj","name":"objective","props":[{"name":"label","value":"CA-9(b)"}],"prose":"documents, for each internal connection:","parts":[{"id":"ca-9.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-9(b)[1]"}],"prose":"the interface characteristics;"},{"id":"ca-9.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-9(b)[2]"}],"prose":"the security requirements; and"},{"id":"ca-9.b_obj.3","name":"objective","props":[{"name":"label","value":"CA-9(b)[3]"}],"prose":"the nature of the information communicated."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing information system connections\n\nsystem and communications protection policy\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of components or classes of components authorized as internal system connections\n\nsecurity assessment report\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for developing, implementing, or authorizing internal system connections\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"cm","class":"family","title":"Configuration Management","controls":[{"id":"cm-1","class":"SP800-53","title":"Configuration Management Policy and Procedures","params":[{"id":"cm-1_prm_1","label":"organization-defined personnel or roles"},{"id":"cm-1_prm_2","label":"organization-defined frequency"},{"id":"cm-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-1"},{"name":"sort-id","value":"cm-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"cm-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, cm-1_prm_1 }}:","parts":[{"id":"cm-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"cm-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the configuration management policy and associated configuration management controls; and"}]},{"id":"cm-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"cm-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Configuration management policy {{ insert: param, cm-1_prm_2 }}; and"},{"id":"cm-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Configuration management procedures {{ insert: param, cm-1_prm_3 }}."}]}]},{"id":"cm-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the CM family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"cm-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-1.a_obj","name":"objective","props":[{"name":"label","value":"CM-1(a)"}],"parts":[{"id":"cm-1.a.1_obj","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)"}],"parts":[{"id":"cm-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1]"}],"prose":"develops and documents a configuration management policy that addresses:","parts":[{"id":"cm-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"cm-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"cm-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"cm-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"cm-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"cm-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"cm-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"cm-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the configuration management policy is to be disseminated;"},{"id":"cm-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[3]"}],"prose":"disseminates the configuration management policy to organization-defined personnel or roles;"}]},{"id":"cm-1.a.2_obj","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)"}],"parts":[{"id":"cm-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the configuration management policy and associated configuration management controls;"},{"id":"cm-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"cm-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"cm-1.b_obj","name":"objective","props":[{"name":"label","value":"CM-1(b)"}],"parts":[{"id":"cm-1.b.1_obj","name":"objective","props":[{"name":"label","value":"CM-1(b)(1)"}],"parts":[{"id":"cm-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current configuration management policy;"},{"id":"cm-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(b)(1)[2]"}],"prose":"reviews and updates the current configuration management policy with the organization-defined frequency;"}]},{"id":"cm-1.b.2_obj","name":"objective","props":[{"name":"label","value":"CM-1(b)(2)"}],"parts":[{"id":"cm-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current configuration management procedures; and"},{"id":"cm-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(b)(2)[2]"}],"prose":"reviews and updates the current configuration management procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]}]},{"id":"cm-2","class":"SP800-53","title":"Baseline Configuration","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-2"},{"name":"sort-id","value":"cm-02"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-2_smt","name":"statement","prose":"The organization develops, documents, and maintains under configuration control, a current baseline configuration of the information system."},{"id":"cm-2_gdn","name":"guidance","prose":"This control establishes baseline configurations for information systems and system components including communications and connectivity-related aspects of systems. Baseline configurations are documented, formally reviewed and agreed-upon sets of specifications for information systems or configuration items within those systems. Baseline configurations serve as a basis for future builds, releases, and\/or changes to information systems. Baseline configurations include information about information system components (e.g., standard software packages installed on workstations, notebook computers, servers, network components, or mobile devices; current version numbers and patch information on operating systems and applications; and configuration settings\/parameters), network topology, and the logical placement of those components within the system architecture. Maintaining baseline configurations requires creating new baselines as organizational information systems change over time. Baseline configurations of information systems reflect the current enterprise architecture.","links":[{"href":"#cm-3","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#pm-5","rel":"related"},{"href":"#pm-7","rel":"related"}]},{"id":"cm-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-2_obj.1","name":"objective","props":[{"name":"label","value":"CM-2[1]"}],"prose":"develops and documents a current baseline configuration of the information system; and"},{"id":"cm-2_obj.2","name":"objective","props":[{"name":"label","value":"CM-2[2]"}],"prose":"maintains, under configuration control, a current baseline configuration of the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing the baseline configuration of the information system\n\nconfiguration management plan\n\nenterprise architecture documentation\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nchange control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing baseline configurations\n\nautomated mechanisms supporting configuration control of the baseline configuration"}]}]},{"id":"cm-4","class":"SP800-53","title":"Security Impact Analysis","props":[{"name":"priority","value":"P2"},{"name":"label","value":"CM-4"},{"name":"sort-id","value":"cm-04"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-4_smt","name":"statement","prose":"The organization analyzes changes to the information system to determine potential security impacts prior to change implementation."},{"id":"cm-4_gdn","name":"guidance","prose":"Organizational personnel with information security responsibilities (e.g., Information System Administrators, Information System Security Officers, Information System Security Managers, and Information System Security Engineers) conduct security impact analyses. Individuals conducting security impact analyses possess the necessary skills\/technical expertise to analyze the changes to information systems and the associated security ramifications. Security impact analysis may include, for example, reviewing security plans to understand security control requirements and reviewing system design documentation to understand control implementation and how specific changes might affect the controls. Security impact analyses may also include assessments of risk to better understand the impact of the changes and to determine if additional security controls are required. Security impact analyses are scaled in accordance with the security categories of the information systems.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"cm-4_obj","name":"objective","prose":"Determine if the organization analyzes changes to the information system to determine potential security impacts prior to change implementation."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing security impact analysis for changes to the information system\n\nconfiguration management plan\n\nsecurity impact analysis documentation\n\nanalysis tools and associated outputs\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for conducting security impact analysis\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security impact analysis"}]}]},{"id":"cm-6","class":"SP800-53","title":"Configuration Settings","params":[{"id":"cm-6_prm_1","label":"organization-defined security configuration checklists"},{"id":"cm-6_prm_2","label":"organization-defined information system components"},{"id":"cm-6_prm_3","label":"organization-defined operational requirements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-6"},{"name":"sort-id","value":"cm-06"}],"links":[{"href":"#990268bf-f4a9-4c81-91ae-dc7d3115f4b1","rel":"reference"},{"href":"#0b3d8ba9-051f-498d-81ea-97f0f018c612","rel":"reference"},{"href":"#0916ef02-3618-411b-a525-565c088849a6","rel":"reference"},{"href":"#84a37532-6db6-477b-9ea8-f9085ebca0fc","rel":"reference"},{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"},{"href":"#275cc052-0f7f-423c-bdb6-ed503dc36228","rel":"reference"},{"href":"#e95dd121-2733-413e-bf1e-f1eb49f20a98","rel":"reference"},{"href":"#647b6de3-81d0-4d22-bec1-5f1333e34380","rel":"reference"}],"parts":[{"id":"cm-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes and documents configuration settings for information technology products employed within the information system using {{ insert: param, cm-6_prm_1 }} that reflect the most restrictive mode consistent with operational requirements;"},{"id":"cm-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Implements the configuration settings;"},{"id":"cm-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Identifies, documents, and approves any deviations from established configuration settings for {{ insert: param, cm-6_prm_2 }} based on {{ insert: param, cm-6_prm_3 }}; and"},{"id":"cm-6_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Monitors and controls changes to the configuration settings in accordance with organizational policies and procedures."}]},{"id":"cm-6_gdn","name":"guidance","prose":"Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the information system that affect the security posture and\/or functionality of the system. Information technology products for which security-related configuration settings can be defined include, for example, mainframe computers, servers (e.g., database, electronic mail, authentication, web, proxy, file, domain name), workstations, input\/output devices (e.g., scanners, copiers, and printers), network components (e.g., firewalls, routers, gateways, voice and data switches, wireless access points, network appliances, sensors), operating systems, middleware, and applications. Security-related parameters are those parameters impacting the security state of information systems including the parameters required to satisfy other security control requirements. Security-related parameters include, for example: (i) registry settings; (ii) account, file, directory permission settings; and (iii) settings for functions, ports, protocols, services, and remote connections. Organizations establish organization-wide configuration settings and subsequently derive specific settings for information systems. The established settings become part of the systems configuration baseline. Common secure configurations (also referred to as security configuration checklists, lockdown and hardening guides, security reference guides, security technical implementation guides) provide recognized, standardized, and established benchmarks that stipulate secure configuration settings for specific information technology platforms\/products and instructions for configuring those information system components to meet operational requirements. Common secure configurations can be developed by a variety of organizations including, for example, information technology product developers, manufacturers, vendors, consortia, academia, industry, federal agencies, and other organizations in the public and private sectors. Common secure configurations include the United States Government Configuration Baseline (USGCB) which affects the implementation of CM-6 and other controls such as AC-19 and CM-7. The Security Content Automation Protocol (SCAP) and the defined standards within the protocol (e.g., Common Configuration Enumeration) provide an effective method to uniquely identify, track, and control configuration settings. OMB establishes federal policy on configuration requirements for federal information systems.","links":[{"href":"#ac-19","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"cm-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-6.a_obj","name":"objective","props":[{"name":"label","value":"CM-6(a)"}],"parts":[{"id":"cm-6.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(a)[1]"}],"prose":"defines security configuration checklists to be used to establish and document configuration settings for the information technology products employed;"},{"id":"cm-6.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(a)[2]"}],"prose":"ensures the defined security configuration checklists reflect the most restrictive mode consistent with operational requirements;"},{"id":"cm-6.a_obj.3","name":"objective","props":[{"name":"label","value":"CM-6(a)[3]"}],"prose":"establishes and documents configuration settings for information technology products employed within the information system using organization-defined security configuration checklists;"}]},{"id":"cm-6.b_obj","name":"objective","props":[{"name":"label","value":"CM-6(b)"}],"prose":"implements the configuration settings established\/documented in CM-6(a);;"},{"id":"cm-6.c_obj","name":"objective","props":[{"name":"label","value":"CM-6(c)"}],"parts":[{"id":"cm-6.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(c)[1]"}],"prose":"defines information system components for which any deviations from established configuration settings must be:","parts":[{"id":"cm-6.c_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-6(c)[1][a]"}],"prose":"identified;"},{"id":"cm-6.c_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-6(c)[1][b]"}],"prose":"documented;"},{"id":"cm-6.c_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-6(c)[1][c]"}],"prose":"approved;"}]},{"id":"cm-6.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(c)[2]"}],"prose":"defines operational requirements to support:","parts":[{"id":"cm-6.c_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-6(c)[2][a]"}],"prose":"the identification of any deviations from established configuration settings;"},{"id":"cm-6.c_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-6(c)[2][b]"}],"prose":"the documentation of any deviations from established configuration settings;"},{"id":"cm-6.c_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-6(c)[2][c]"}],"prose":"the approval of any deviations from established configuration settings;"}]},{"id":"cm-6.c_obj.3","name":"objective","props":[{"name":"label","value":"CM-6(c)[3]"}],"prose":"identifies any deviations from established configuration settings for organization-defined information system components based on organizational-defined operational requirements;"},{"id":"cm-6.c_obj.4","name":"objective","props":[{"name":"label","value":"CM-6(c)[4]"}],"prose":"documents any deviations from established configuration settings for organization-defined information system components based on organizational-defined operational requirements;"},{"id":"cm-6.c_obj.5","name":"objective","props":[{"name":"label","value":"CM-6(c)[5]"}],"prose":"approves any deviations from established configuration settings for organization-defined information system components based on organizational-defined operational requirements;"}]},{"id":"cm-6.d_obj","name":"objective","props":[{"name":"label","value":"CM-6(d)"}],"parts":[{"id":"cm-6.d_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(d)[1]"}],"prose":"monitors changes to the configuration settings in accordance with organizational policies and procedures; and"},{"id":"cm-6.d_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(d)[2]"}],"prose":"controls changes to the configuration settings in accordance with organizational policies and procedures."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing configuration settings for the information system\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity configuration checklists\n\nevidence supporting approved deviations from established configuration settings\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing configuration settings\n\nautomated mechanisms that implement, monitor, and\/or control information system configuration settings\n\nautomated mechanisms that identify and\/or document deviations from established configuration settings"}]}]},{"id":"cm-7","class":"SP800-53","title":"Least Functionality","params":[{"id":"cm-7_prm_1","label":"organization-defined prohibited or restricted functions, ports, protocols, and\/or services"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-7"},{"name":"sort-id","value":"cm-07"}],"links":[{"href":"#e42b2099-3e1c-415b-952c-61c96533c12e","rel":"reference"}],"parts":[{"id":"cm-7_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Configures the information system to provide only essential capabilities; and"},{"id":"cm-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Prohibits or restricts the use of the following functions, ports, protocols, and\/or services: {{ insert: param, cm-7_prm_1 }}."}]},{"id":"cm-7_gdn","name":"guidance","prose":"Information systems can provide a wide variety of functions and services. Some of the functions and services, provided by default, may not be necessary to support essential organizational operations (e.g., key missions, functions). Additionally, it is sometimes convenient to provide multiple services from single information system components, but doing so increases risk over limiting the services provided by any one component. Where feasible, organizations limit component functionality to a single function per device (e.g., email servers or web servers, but not both). Organizations review functions and services provided by information systems or individual components of information systems, to determine which functions and services are candidates for elimination (e.g., Voice Over Internet Protocol, Instant Messaging, auto-execute, and file sharing). Organizations consider disabling unused or unnecessary physical and logical ports\/protocols (e.g., Universal Serial Bus, File Transfer Protocol, and Hyper Text Transfer Protocol) on information systems to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling. Organizations can utilize network scanning tools, intrusion detection and prevention systems, and end-point protections such as firewalls and host-based intrusion detection systems to identify and prevent the use of prohibited functions, ports, protocols, and services.","links":[{"href":"#ac-6","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"cm-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-7.a_obj","name":"objective","props":[{"name":"label","value":"CM-7(a)"}],"prose":"configures the information system to provide only essential capabilities;"},{"id":"cm-7.b_obj","name":"objective","props":[{"name":"label","value":"CM-7(b)"}],"parts":[{"id":"cm-7.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(b)[1]"}],"prose":"defines prohibited or restricted:","parts":[{"id":"cm-7.b_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][a]"}],"prose":"functions;"},{"id":"cm-7.b_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][b]"}],"prose":"ports;"},{"id":"cm-7.b_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.b_obj.1.d","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][d]"}],"prose":"services;"}]},{"id":"cm-7.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(b)[2]"}],"prose":"prohibits or restricts the use of organization-defined:","parts":[{"id":"cm-7.b_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][a]"}],"prose":"functions;"},{"id":"cm-7.b_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][b]"}],"prose":"ports;"},{"id":"cm-7.b_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.b_obj.2.d","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][d]"}],"prose":"services."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nconfiguration management plan\n\nprocedures addressing least functionality in the information system\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity configuration checklists\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes prohibiting or restricting functions, ports, protocols, and\/or services\n\nautomated mechanisms implementing restrictions or prohibition of functions, ports, protocols, and\/or services"}]}]},{"id":"cm-8","class":"SP800-53","title":"Information System Component Inventory","params":[{"id":"cm-8_prm_1","label":"organization-defined information deemed necessary to achieve effective information system component accountability"},{"id":"cm-8_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-8"},{"name":"sort-id","value":"cm-08"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops and documents an inventory of information system components that:","parts":[{"id":"cm-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Accurately reflects the current information system;"},{"id":"cm-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Includes all components within the authorization boundary of the information system;"},{"id":"cm-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Is at the level of granularity deemed necessary for tracking and reporting; and"},{"id":"cm-8_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Includes {{ insert: param, cm-8_prm_1 }}; and"}]},{"id":"cm-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the information system component inventory {{ insert: param, cm-8_prm_2 }}."}]},{"id":"cm-8_gdn","name":"guidance","prose":"Organizations may choose to implement centralized information system component inventories that include components from all organizational information systems. In such situations, organizations ensure that the resulting inventories include system-specific information required for proper component accountability (e.g., information system association, information system owner). Information deemed necessary for effective accountability of information system components includes, for example, hardware inventory specifications, software license information, software version numbers, component owners, and for networked components or devices, machine names and network addresses. Inventory specifications include, for example, manufacturer, device type, model, serial number, and physical location.","links":[{"href":"#cm-2","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#pm-5","rel":"related"}]},{"id":"cm-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-8.a_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)"}],"parts":[{"id":"cm-8.a.1_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(1)"}],"prose":"develops and documents an inventory of information system components that accurately reflects the current information system;"},{"id":"cm-8.a.2_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(2)"}],"prose":"develops and documents an inventory of information system components that includes all components within the authorization boundary of the information system;"},{"id":"cm-8.a.3_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(3)"}],"prose":"develops and documents an inventory of information system components that is at the level of granularity deemed necessary for tracking and reporting;"},{"id":"cm-8.a.4_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(4)"}],"parts":[{"id":"cm-8.a.4_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(a)(4)[1]"}],"prose":"defines the information deemed necessary to achieve effective information system component accountability;"},{"id":"cm-8.a.4_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(a)(4)[2]"}],"prose":"develops and documents an inventory of information system components that includes organization-defined information deemed necessary to achieve effective information system component accountability;"}]}]},{"id":"cm-8.b_obj","name":"objective","props":[{"name":"label","value":"CM-8(b)"}],"parts":[{"id":"cm-8.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(b)[1]"}],"prose":"defines the frequency to review and update the information system component inventory; and"},{"id":"cm-8.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(b)[2]"}],"prose":"reviews and updates the information system component inventory with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system component inventory\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system inventory records\n\ninventory reviews and update records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for information system component inventory\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for developing and documenting an inventory of information system components\n\nautomated mechanisms supporting and\/or implementing the information system component inventory"}]}]},{"id":"cm-10","class":"SP800-53","title":"Software Usage Restrictions","props":[{"name":"priority","value":"P2"},{"name":"label","value":"CM-10"},{"name":"sort-id","value":"cm-10"}],"parts":[{"id":"cm-10_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-10_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Uses software and associated documentation in accordance with contract agreements and copyright laws;"},{"id":"cm-10_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Tracks the use of software and associated documentation protected by quantity licenses to control copying and distribution; and"},{"id":"cm-10_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Controls and documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work."}]},{"id":"cm-10_gdn","name":"guidance","prose":"Software license tracking can be accomplished by manual methods (e.g., simple spreadsheets) or automated methods (e.g., specialized tracking applications) depending on organizational needs.","links":[{"href":"#ac-17","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"cm-10_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-10.a_obj","name":"objective","props":[{"name":"label","value":"CM-10(a)"}],"prose":"uses software and associated documentation in accordance with contract agreements and copyright laws;"},{"id":"cm-10.b_obj","name":"objective","props":[{"name":"label","value":"CM-10(b)"}],"prose":"tracks the use of software and associated documentation protected by quantity licenses to control copying and distribution; and"},{"id":"cm-10.c_obj","name":"objective","props":[{"name":"label","value":"CM-10(c)"}],"prose":"controls and documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing software usage restrictions\n\nconfiguration management plan\n\nsecurity plan\n\nsoftware contract agreements and copyright laws\n\nsite license documentation\n\nlist of software usage restrictions\n\nsoftware license tracking reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\norganizational personnel operating, using, and\/or maintaining the information system\n\norganizational personnel with software license management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for tracking the use of software protected by quantity licenses\n\norganization process for controlling\/documenting the use of peer-to-peer file sharing technology\n\nautomated mechanisms implementing software license tracking\n\nautomated mechanisms implementing and controlling the use of peer-to-peer files sharing technology"}]}]},{"id":"cm-11","class":"SP800-53","title":"User-installed Software","params":[{"id":"cm-11_prm_1","label":"organization-defined policies"},{"id":"cm-11_prm_2","label":"organization-defined methods"},{"id":"cm-11_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-11"},{"name":"sort-id","value":"cm-11"}],"parts":[{"id":"cm-11_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-11_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes {{ insert: param, cm-11_prm_1 }} governing the installation of software by users;"},{"id":"cm-11_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Enforces software installation policies through {{ insert: param, cm-11_prm_2 }}; and"},{"id":"cm-11_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Monitors policy compliance at {{ insert: param, cm-11_prm_3 }}."}]},{"id":"cm-11_gdn","name":"guidance","prose":"If provided the necessary privileges, users have the ability to install software in organizational information systems. To maintain control over the types of software installed, organizations identify permitted and prohibited actions regarding software installation. Permitted software installations may include, for example, updates and security patches to existing software and downloading applications from organization-approved “app stores” Prohibited software installations may include, for example, software with unknown or suspect pedigrees or software that organizations consider potentially malicious. The policies organizations select governing user-installed software may be organization-developed or provided by some external entity. Policy enforcement methods include procedural methods (e.g., periodic examination of user accounts), automated methods (e.g., configuration settings implemented on organizational information systems), or both.","links":[{"href":"#ac-3","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#pl-4","rel":"related"}]},{"id":"cm-11_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-11.a_obj","name":"objective","props":[{"name":"label","value":"CM-11(a)"}],"parts":[{"id":"cm-11.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-11(a)[1]"}],"prose":"defines policies to govern the installation of software by users;"},{"id":"cm-11.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-11(a)[2]"}],"prose":"establishes organization-defined policies governing the installation of software by users;"}]},{"id":"cm-11.b_obj","name":"objective","props":[{"name":"label","value":"CM-11(b)"}],"parts":[{"id":"cm-11.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-11(b)[1]"}],"prose":"defines methods to enforce software installation policies;"},{"id":"cm-11.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-11(b)[2]"}],"prose":"enforces software installation policies through organization-defined methods;"}]},{"id":"cm-11.c_obj","name":"objective","props":[{"name":"label","value":"CM-11(c)"}],"parts":[{"id":"cm-11.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-11(c)[1]"}],"prose":"defines frequency to monitor policy compliance; and"},{"id":"cm-11.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-11(c)[2]"}],"prose":"monitors policy compliance at organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing user installed software\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of rules governing user installed software\n\ninformation system monitoring records\n\ninformation system audit records\n\nother relevant documents or records\n\ncontinuous monitoring strategy"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for governing user-installed software\n\norganizational personnel operating, using, and\/or maintaining the information system\n\norganizational personnel monitoring compliance with user-installed software policy\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes governing user-installed software on the information system\n\nautomated mechanisms enforcing rules\/methods for governing the installation of software by users\n\nautomated mechanisms monitoring policy compliance"}]}]}]},{"id":"cp","class":"family","title":"Contingency Planning","controls":[{"id":"cp-1","class":"SP800-53","title":"Contingency Planning Policy and Procedures","params":[{"id":"cp-1_prm_1","label":"organization-defined personnel or roles"},{"id":"cp-1_prm_2","label":"organization-defined frequency"},{"id":"cp-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-1"},{"name":"sort-id","value":"cp-01"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"cp-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, cp-1_prm_1 }}:","parts":[{"id":"cp-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A contingency planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"cp-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls; and"}]},{"id":"cp-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"cp-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Contingency planning policy {{ insert: param, cp-1_prm_2 }}; and"},{"id":"cp-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Contingency planning procedures {{ insert: param, cp-1_prm_3 }}."}]}]},{"id":"cp-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the CP family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"cp-1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"cp-1.a_obj","name":"objective","props":[{"name":"label","value":"CP-1(a)"}],"parts":[{"id":"cp-1.a.1_obj","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)"}],"parts":[{"id":"cp-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1]"}],"prose":"the organization develops and documents a contingency planning policy that addresses:","parts":[{"id":"cp-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"cp-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"cp-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"cp-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"cp-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"cp-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"cp-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"cp-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[2]"}],"prose":"the organization defines personnel or roles to whom the contingency planning policy is to be disseminated;"},{"id":"cp-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[3]"}],"prose":"the organization disseminates the contingency planning policy to organization-defined personnel or roles;"}]},{"id":"cp-1.a.2_obj","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)"}],"parts":[{"id":"cp-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)[1]"}],"prose":"the organization develops and documents procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls;"},{"id":"cp-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)[2]"}],"prose":"the organization defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"cp-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)[3]"}],"prose":"the organization disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"cp-1.b_obj","name":"objective","props":[{"name":"label","value":"CP-1(b)"}],"parts":[{"id":"cp-1.b.1_obj","name":"objective","props":[{"name":"label","value":"CP-1(b)(1)"}],"parts":[{"id":"cp-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(b)(1)[1]"}],"prose":"the organization defines the frequency to review and update the current contingency planning policy;"},{"id":"cp-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(b)(1)[2]"}],"prose":"the organization reviews and updates the current contingency planning with the organization-defined frequency;"}]},{"id":"cp-1.b.2_obj","name":"objective","props":[{"name":"label","value":"CP-1(b)(2)"}],"parts":[{"id":"cp-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(b)(2)[1]"}],"prose":"the organization defines the frequency to review and update the current contingency planning procedures; and"},{"id":"cp-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(b)(2)[2]"}],"prose":"the organization reviews and updates the current contingency planning procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-2","class":"SP800-53","title":"Contingency Plan","params":[{"id":"cp-2_prm_1","label":"organization-defined personnel or roles"},{"id":"cp-2_prm_2","label":"organization-defined key contingency personnel (identified by name and\/or by role) and organizational elements"},{"id":"cp-2_prm_3","label":"organization-defined frequency"},{"id":"cp-2_prm_4","label":"organization-defined key contingency personnel (identified by name and\/or by role) and organizational elements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-2"},{"name":"sort-id","value":"cp-02"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a contingency plan for the information system that:","parts":[{"id":"cp-2_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Identifies essential missions and business functions and associated contingency requirements;"},{"id":"cp-2_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Provides recovery objectives, restoration priorities, and metrics;"},{"id":"cp-2_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Addresses contingency roles, responsibilities, assigned individuals with contact information;"},{"id":"cp-2_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Addresses maintaining essential missions and business functions despite an information system disruption, compromise, or failure;"},{"id":"cp-2_smt.a.5","name":"item","props":[{"name":"label","value":"5."}],"prose":"Addresses eventual, full information system restoration without deterioration of the security safeguards originally planned and implemented; and"},{"id":"cp-2_smt.a.6","name":"item","props":[{"name":"label","value":"6."}],"prose":"Is reviewed and approved by {{ insert: param, cp-2_prm_1 }};"}]},{"id":"cp-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Distributes copies of the contingency plan to {{ insert: param, cp-2_prm_2 }};"},{"id":"cp-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Coordinates contingency planning activities with incident handling activities;"},{"id":"cp-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Reviews the contingency plan for the information system {{ insert: param, cp-2_prm_3 }};"},{"id":"cp-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Updates the contingency plan to address changes to the organization, information system, or environment of operation and problems encountered during contingency plan implementation, execution, or testing;"},{"id":"cp-2_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Communicates contingency plan changes to {{ insert: param, cp-2_prm_4 }}; and"},{"id":"cp-2_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Protects the contingency plan from unauthorized disclosure and modification."}]},{"id":"cp-2_gdn","name":"guidance","prose":"Contingency planning for information systems is part of an overall organizational program for achieving continuity of operations for mission\/business functions. Contingency planning addresses both information system restoration and implementation of alternative mission\/business processes when systems are compromised. The effectiveness of contingency planning is maximized by considering such planning throughout the phases of the system development life cycle. Performing contingency planning on hardware, software, and firmware development can be an effective means of achieving information system resiliency. Contingency plans reflect the degree of restoration required for organizational information systems since not all systems may need to fully recover to achieve the level of continuity of operations desired. Information system recovery objectives reflect applicable laws, Executive Orders, directives, policies, standards, regulations, and guidelines. In addition to information system availability, contingency plans also address other security-related events resulting in a reduction in mission and\/or business effectiveness, such as malicious attacks compromising the confidentiality or integrity of information systems. Actions addressed in contingency plans include, for example, orderly\/graceful degradation, information system shutdown, fallback to a manual mode, alternate information flows, and operating in modes reserved for when systems are under attack. By closely coordinating contingency planning with incident handling activities, organizations can ensure that the necessary contingency planning activities are in place and activated in the event of a security incident.","links":[{"href":"#ac-14","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#cp-7","rel":"related"},{"href":"#cp-8","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#cp-10","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#pm-8","rel":"related"},{"href":"#pm-11","rel":"related"}]},{"id":"cp-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-2.a_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)"}],"prose":"develops and documents a contingency plan for the information system that:","parts":[{"id":"cp-2.a.1_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(1)"}],"prose":"identifies essential missions and business functions and associated contingency requirements;"},{"id":"cp-2.a.2_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)"}],"parts":[{"id":"cp-2.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)[1]"}],"prose":"provides recovery objectives;"},{"id":"cp-2.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)[2]"}],"prose":"provides restoration priorities;"},{"id":"cp-2.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)[3]"}],"prose":"provides metrics;"}]},{"id":"cp-2.a.3_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)"}],"parts":[{"id":"cp-2.a.3_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)[1]"}],"prose":"addresses contingency roles;"},{"id":"cp-2.a.3_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)[2]"}],"prose":"addresses contingency responsibilities;"},{"id":"cp-2.a.3_obj.3","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)[3]"}],"prose":"addresses assigned individuals with contact information;"}]},{"id":"cp-2.a.4_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(4)"}],"prose":"addresses maintaining essential missions and business functions despite an information system disruption, compromise, or failure;"},{"id":"cp-2.a.5_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(5)"}],"prose":"addresses eventual, full information system restoration without deterioration of the security safeguards originally planned and implemented;"},{"id":"cp-2.a.6_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(6)"}],"parts":[{"id":"cp-2.a.6_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(a)(6)[1]"}],"prose":"defines personnel or roles to review and approve the contingency plan for the information system;"},{"id":"cp-2.a.6_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(a)(6)[2]"}],"prose":"is reviewed and approved by organization-defined personnel or roles;"}]}]},{"id":"cp-2.b_obj","name":"objective","props":[{"name":"label","value":"CP-2(b)"}],"parts":[{"id":"cp-2.b_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(b)[1]"}],"prose":"defines key contingency personnel (identified by name and\/or by role) and organizational elements to whom copies of the contingency plan are to be distributed;"},{"id":"cp-2.b_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(b)[2]"}],"prose":"distributes copies of the contingency plan to organization-defined key contingency personnel and organizational elements;"}]},{"id":"cp-2.c_obj","name":"objective","props":[{"name":"label","value":"CP-2(c)"}],"prose":"coordinates contingency planning activities with incident handling activities;"},{"id":"cp-2.d_obj","name":"objective","props":[{"name":"label","value":"CP-2(d)"}],"parts":[{"id":"cp-2.d_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(d)[1]"}],"prose":"defines a frequency to review the contingency plan for the information system;"},{"id":"cp-2.d_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(d)[2]"}],"prose":"reviews the contingency plan with the organization-defined frequency;"}]},{"id":"cp-2.e_obj","name":"objective","props":[{"name":"label","value":"CP-2(e)"}],"prose":"updates the contingency plan to address:","parts":[{"id":"cp-2.e_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(e)[1]"}],"prose":"changes to the organization, information system, or environment of operation;"},{"id":"cp-2.e_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(e)[2]"}],"prose":"problems encountered during plan implementation, execution, and testing;"}]},{"id":"cp-2.f_obj","name":"objective","props":[{"name":"label","value":"CP-2(f)"}],"parts":[{"id":"cp-2.f_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(f)[1]"}],"prose":"defines key contingency personnel (identified by name and\/or by role) and organizational elements to whom contingency plan changes are to be communicated;"},{"id":"cp-2.f_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(f)[2]"}],"prose":"communicates contingency plan changes to organization-defined key contingency personnel and organizational elements; and"}]},{"id":"cp-2.g_obj","name":"objective","props":[{"name":"label","value":"CP-2(g)"}],"prose":"protects the contingency plan from unauthorized disclosure and modification."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nsecurity plan\n\nevidence of contingency plan reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with incident handling responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency plan development, review, update, and protection\n\nautomated mechanisms for developing, reviewing, updating and\/or protecting the contingency plan"}]}]},{"id":"cp-3","class":"SP800-53","title":"Contingency Training","params":[{"id":"cp-3_prm_1","label":"organization-defined time period"},{"id":"cp-3_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CP-3"},{"name":"sort-id","value":"cp-03"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"cp-3_smt","name":"statement","prose":"The organization provides contingency training to information system users consistent with assigned roles and responsibilities:","parts":[{"id":"cp-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Within {{ insert: param, cp-3_prm_1 }} of assuming a contingency role or responsibility;"},{"id":"cp-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"cp-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, cp-3_prm_2 }} thereafter."}]},{"id":"cp-3_gdn","name":"guidance","prose":"Contingency training provided by organizations is linked to the assigned roles and responsibilities of organizational personnel to ensure that the appropriate content and level of detail is included in such training. For example, regular users may only need to know when and where to report for duty during contingency operations and if normal duties are affected; system administrators may require additional training on how to set up information systems at alternate processing and storage sites; and managers\/senior leaders may receive more specific training on how to conduct mission-essential functions in designated off-site locations and how to establish communications with other governmental entities for purposes of coordination on contingency-related activities. Training for contingency roles\/responsibilities reflects the specific continuity requirements in the contingency plan.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#ir-2","rel":"related"}]},{"id":"cp-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-3.a_obj","name":"objective","props":[{"name":"label","value":"CP-3(a)"}],"parts":[{"id":"cp-3.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-3(a)[1]"}],"prose":"defines a time period within which contingency training is to be provided to information system users assuming a contingency role or responsibility;"},{"id":"cp-3.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-3(a)[2]"}],"prose":"provides contingency training to information system users consistent with assigned roles and responsibilities within the organization-defined time period of assuming a contingency role or responsibility;"}]},{"id":"cp-3.b_obj","name":"objective","props":[{"name":"label","value":"CP-3(b)"}],"prose":"provides contingency training to information system users consistent with assigned roles and responsibilities when required by information system changes;"},{"id":"cp-3.c_obj","name":"objective","props":[{"name":"label","value":"CP-3(c)"}],"parts":[{"id":"cp-3.c_obj.1","name":"objective","props":[{"name":"label","value":"CP-3(c)[1]"}],"prose":"defines the frequency for contingency training thereafter; and"},{"id":"cp-3.c_obj.2","name":"objective","props":[{"name":"label","value":"CP-3(c)[2]"}],"prose":"provides contingency training to information system users consistent with assigned roles and responsibilities with the organization-defined frequency thereafter."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency training\n\ncontingency plan\n\ncontingency training curriculum\n\ncontingency training material\n\nsecurity plan\n\ncontingency training records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning, plan implementation, and training responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency training"}]}]},{"id":"cp-4","class":"SP800-53","title":"Contingency Plan Testing","params":[{"id":"cp-4_prm_1","label":"organization-defined frequency"},{"id":"cp-4_prm_2","label":"organization-defined tests"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CP-4"},{"name":"sort-id","value":"cp-04"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"},{"href":"#0243a05a-e8a3-4d51-9364-4a9d20b0dcdf","rel":"reference"}],"parts":[{"id":"cp-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Tests the contingency plan for the information system {{ insert: param, cp-4_prm_1 }} using {{ insert: param, cp-4_prm_2 }} to determine the effectiveness of the plan and the organizational readiness to execute the plan;"},{"id":"cp-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews the contingency plan test results; and"},{"id":"cp-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Initiates corrective actions, if needed."}]},{"id":"cp-4_gdn","name":"guidance","prose":"Methods for testing contingency plans to determine the effectiveness of the plans and to identify potential weaknesses in the plans include, for example, walk-through and tabletop exercises, checklists, simulations (parallel, full interrupt), and comprehensive exercises. Organizations conduct testing based on the continuity requirements in contingency plans and include a determination of the effects on organizational operations, assets, and individuals arising due to contingency operations. Organizations have flexibility and discretion in the breadth, depth, and timelines of corrective actions.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-3","rel":"related"},{"href":"#ir-3","rel":"related"}]},{"id":"cp-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-4.a_obj","name":"objective","props":[{"name":"label","value":"CP-4(a)"}],"parts":[{"id":"cp-4.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-4(a)[1]"}],"prose":"defines tests to determine the effectiveness of the contingency plan and the organizational readiness to execute the plan;"},{"id":"cp-4.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-4(a)[2]"}],"prose":"defines a frequency to test the contingency plan for the information system;"},{"id":"cp-4.a_obj.3","name":"objective","props":[{"name":"label","value":"CP-4(a)[3]"}],"prose":"tests the contingency plan for the information system with the organization-defined frequency, using organization-defined tests to determine the effectiveness of the plan and the organizational readiness to execute the plan;"}]},{"id":"cp-4.b_obj","name":"objective","props":[{"name":"label","value":"CP-4(b)"}],"prose":"reviews the contingency plan test results; and"},{"id":"cp-4.c_obj","name":"objective","props":[{"name":"label","value":"CP-4(c)"}],"prose":"initiates corrective actions, if needed."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency plan testing\n\ncontingency plan\n\nsecurity plan\n\ncontingency plan test documentation\n\ncontingency plan test results\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for contingency plan testing, reviewing or responding to contingency plan tests\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency plan testing\n\nautomated mechanisms supporting the contingency plan and\/or contingency plan testing"}]}]},{"id":"cp-9","class":"SP800-53","title":"Information System Backup","params":[{"id":"cp-9_prm_1","label":"organization-defined frequency consistent with recovery time and recovery point objectives"},{"id":"cp-9_prm_2","label":"organization-defined frequency consistent with recovery time and recovery point objectives"},{"id":"cp-9_prm_3","label":"organization-defined frequency consistent with recovery time and recovery point objectives"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-9"},{"name":"sort-id","value":"cp-09"}],"links":[{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-9_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Conducts backups of user-level information contained in the information system {{ insert: param, cp-9_prm_1 }};"},{"id":"cp-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Conducts backups of system-level information contained in the information system {{ insert: param, cp-9_prm_2 }};"},{"id":"cp-9_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Conducts backups of information system documentation including security-related documentation {{ insert: param, cp-9_prm_3 }}; and"},{"id":"cp-9_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects the confidentiality, integrity, and availability of backup information at storage locations."}]},{"id":"cp-9_gdn","name":"guidance","prose":"System-level information includes, for example, system-state information, operating system and application software, and licenses. User-level information includes any information other than system-level information. Mechanisms employed by organizations to protect the integrity of information system backups include, for example, digital signatures and cryptographic hashes. Protection of system backup information while in transit is beyond the scope of this control. Information system backups reflect the requirements in contingency plans as well as other organizational requirements for backing up information.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"cp-9_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-9.a_obj","name":"objective","props":[{"name":"label","value":"CP-9(a)"}],"parts":[{"id":"cp-9.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(a)[1]"}],"prose":"defines a frequency, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to conduct backups of user-level information contained in the information system;"},{"id":"cp-9.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(a)[2]"}],"prose":"conducts backups of user-level information contained in the information system with the organization-defined frequency;"}]},{"id":"cp-9.b_obj","name":"objective","props":[{"name":"label","value":"CP-9(b)"}],"parts":[{"id":"cp-9.b_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(b)[1]"}],"prose":"defines a frequency, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to conduct backups of system-level information contained in the information system;"},{"id":"cp-9.b_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(b)[2]"}],"prose":"conducts backups of system-level information contained in the information system with the organization-defined frequency;"}]},{"id":"cp-9.c_obj","name":"objective","props":[{"name":"label","value":"CP-9(c)"}],"parts":[{"id":"cp-9.c_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(c)[1]"}],"prose":"defines a frequency, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to conduct backups of information system documentation including security-related documentation;"},{"id":"cp-9.c_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(c)[2]"}],"prose":"conducts backups of information system documentation, including security-related documentation, with the organization-defined frequency; and"}]},{"id":"cp-9.d_obj","name":"objective","props":[{"name":"label","value":"CP-9(d)"}],"prose":"protects the confidentiality, integrity, and availability of backup information at storage locations."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\nbackup storage location(s)\n\ninformation system backup logs or records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system backup responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for conducting information system backups\n\nautomated mechanisms supporting and\/or implementing information system backups"}]}]},{"id":"cp-10","class":"SP800-53","title":"Information System Recovery and Reconstitution","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-10"},{"name":"sort-id","value":"cp-10"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-10_smt","name":"statement","prose":"The organization provides for the recovery and reconstitution of the information system to a known state after a disruption, compromise, or failure."},{"id":"cp-10_gdn","name":"guidance","prose":"Recovery is executing information system contingency plan activities to restore organizational missions\/business functions. Reconstitution takes place following recovery and includes activities for returning organizational information systems to fully operational states. Recovery and reconstitution operations reflect mission and business priorities, recovery point\/time and reconstitution objectives, and established organizational metrics consistent with contingency plan requirements. Reconstitution includes the deactivation of any interim information system capabilities that may have been needed during recovery operations. Reconstitution also includes assessments of fully restored information system capabilities, reestablishment of continuous monitoring activities, potential information system reauthorizations, and activities to prepare the systems against future disruptions, compromises, or failures. Recovery\/reconstitution capabilities employed by organizations can include both automated mechanisms and manual procedures.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-6","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#cp-7","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#sc-24","rel":"related"}]},{"id":"cp-10_obj","name":"objective","prose":"Determine if the organization provides for:","parts":[{"id":"cp-10_obj.1","name":"objective","props":[{"name":"label","value":"CP-10[1]"}],"prose":"the recovery of the information system to a known state after:","parts":[{"id":"cp-10_obj.1.a","name":"objective","props":[{"name":"label","value":"CP-10[1][a]"}],"prose":"a disruption;"},{"id":"cp-10_obj.1.b","name":"objective","props":[{"name":"label","value":"CP-10[1][b]"}],"prose":"a compromise; or"},{"id":"cp-10_obj.1.c","name":"objective","props":[{"name":"label","value":"CP-10[1][c]"}],"prose":"a failure;"}]},{"id":"cp-10_obj.2","name":"objective","props":[{"name":"label","value":"CP-10[2]"}],"prose":"the reconstitution of the information system to a known state after:","parts":[{"id":"cp-10_obj.2.a","name":"objective","props":[{"name":"label","value":"CP-10[2][a]"}],"prose":"a disruption;"},{"id":"cp-10_obj.2.b","name":"objective","props":[{"name":"label","value":"CP-10[2][b]"}],"prose":"a compromise; or"},{"id":"cp-10_obj.2.c","name":"objective","props":[{"name":"label","value":"CP-10[2][c]"}],"prose":"a failure."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\ninformation system backup test results\n\ncontingency plan test results\n\ncontingency plan test documentation\n\nredundant secondary system for information system backups\n\nlocation(s) of redundant secondary backup system(s)\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning, recovery, and\/or reconstitution responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes implementing information system recovery and reconstitution operations\n\nautomated mechanisms supporting and\/or implementing information system recovery and reconstitution operations"}]}]}]},{"id":"ia","class":"family","title":"Identification and Authentication","controls":[{"id":"ia-1","class":"SP800-53","title":"Identification and Authentication Policy and Procedures","params":[{"id":"ia-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ia-1_prm_2","label":"organization-defined frequency"},{"id":"ia-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-1"},{"name":"sort-id","value":"ia-01"}],"links":[{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ia-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ia-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ia-1_prm_1 }}:","parts":[{"id":"ia-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ia-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls; and"}]},{"id":"ia-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ia-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Identification and authentication policy {{ insert: param, ia-1_prm_2 }}; and"},{"id":"ia-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Identification and authentication procedures {{ insert: param, ia-1_prm_3 }}."}]}]},{"id":"ia-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the IA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ia-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ia-1.a_obj","name":"objective","props":[{"name":"label","value":"IA-1(a)"}],"parts":[{"id":"ia-1.a.1_obj","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)"}],"parts":[{"id":"ia-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1]"}],"prose":"develops and documents an identification and authentication policy that addresses:","parts":[{"id":"ia-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ia-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ia-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ia-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ia-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ia-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ia-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ia-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the identification and authentication policy is to be disseminated; and"},{"id":"ia-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[3]"}],"prose":"disseminates the identification and authentication policy to organization-defined personnel or roles;"}]},{"id":"ia-1.a.2_obj","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)"}],"parts":[{"id":"ia-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls;"},{"id":"ia-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ia-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ia-1.b_obj","name":"objective","props":[{"name":"label","value":"IA-1(b)"}],"parts":[{"id":"ia-1.b.1_obj","name":"objective","props":[{"name":"label","value":"IA-1(b)(1)"}],"parts":[{"id":"ia-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current identification and authentication policy;"},{"id":"ia-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(b)(1)[2]"}],"prose":"reviews and updates the current identification and authentication policy with the organization-defined frequency; and"}]},{"id":"ia-1.b.2_obj","name":"objective","props":[{"name":"label","value":"IA-1(b)(2)"}],"parts":[{"id":"ia-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current identification and authentication procedures; and"},{"id":"ia-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(b)(2)[2]"}],"prose":"reviews and updates the current identification and authentication procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with identification and authentication responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ia-2","class":"SP800-53","title":"Identification and Authentication (organizational Users)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-2"},{"name":"sort-id","value":"ia-02"}],"links":[{"href":"#ad733a42-a7ed-4774-b988-4930c28852f3","rel":"reference"},{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#4da24a96-6cf8-435d-9d1f-c73247cad109","rel":"reference"},{"href":"#74e740a4-c45d-49f3-a86e-eb747c549e01","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#ba557c91-ba3e-4792-adc6-a4ae479b39ff","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ia-2_smt","name":"statement","prose":"The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users)."},{"id":"ia-2_gdn","name":"guidance","prose":"Organizational users include employees or individuals that organizations deem to have equivalent status of employees (e.g., contractors, guest researchers). This control applies to all accesses other than: (i) accesses that are explicitly identified and documented in AC-14; and (ii) accesses that occur through authorized use of group authenticators without individual authentication. Organizations may require unique identification of individuals in group accounts (e.g., shared privilege accounts) or for detailed accountability of individual activity. Organizations employ passwords, tokens, or biometrics to authenticate user identities, or in the case multifactor authentication, or some combination thereof. Access to organizational information systems is defined as either local access or network access. Local access is any access to organizational information systems by users (or processes acting on behalf of users) where such access is obtained by direct connections without the use of networks. Network access is access to organizational information systems by users (or processes acting on behalf of users) where such access is obtained through network connections (i.e., nonlocal accesses). Remote access is a type of network access that involves communication through external networks (e.g., the Internet). Internal networks include local area networks and wide area networks. In addition, the use of encrypted virtual private networks (VPNs) for network connections between organization-controlled endpoints and non-organization controlled endpoints may be treated as internal networks from the perspective of protecting the confidentiality and integrity of information traversing the network. Organizations can satisfy the identification and authentication requirements in this control by complying with the requirements in Homeland Security Presidential Directive 12 consistent with the specific organizational implementation plans. Multifactor authentication requires the use of two or more different factors to achieve authentication. The factors are defined as: (i) something you know (e.g., password, personal identification number [PIN]); (ii) something you have (e.g., cryptographic identification device, token); or (iii) something you are (e.g., biometric). Multifactor solutions that require devices separate from information systems gaining access include, for example, hardware tokens providing time-based or challenge-response authenticators and smart cards such as the U.S. Government Personal Identity Verification card and the DoD common access card. In addition to identifying and authenticating users at the information system level (i.e., at logon), organizations also employ identification and authentication mechanisms at the application level, when necessary, to provide increased information security. Identification and authentication requirements for other than organizational users are described in IA-8.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"}]},{"id":"ia-2_obj","name":"objective","prose":"Determine if the information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users)."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for uniquely identifying and authenticating users\n\nautomated mechanisms supporting and\/or implementing identification and authentication capability"}]}],"controls":[{"id":"ia-2.1","class":"SP800-53-enhancement","title":"Network Access to Privileged Accounts","props":[{"name":"label","value":"IA-2(1)"},{"name":"sort-id","value":"ia-02.01"}],"parts":[{"id":"ia-2.1_smt","name":"statement","prose":"The information system implements multifactor authentication for network access to privileged accounts."},{"id":"ia-2.1_gdn","name":"guidance","links":[{"href":"#ac-6","rel":"related"}]},{"id":"ia-2.1_obj","name":"objective","prose":"Determine if the information system implements multifactor authentication for network access to privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing multifactor authentication capability"}]}]},{"id":"ia-2.12","class":"SP800-53-enhancement","title":"Acceptance of PIV Credentials","props":[{"name":"label","value":"IA-2(12)"},{"name":"sort-id","value":"ia-02.12"}],"parts":[{"id":"ia-2.12_smt","name":"statement","prose":"The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials."},{"id":"ia-2.12_gdn","name":"guidance","prose":"This control enhancement applies to organizations implementing logical access control systems (LACS) and physical access control systems (PACS). Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11 requires federal agencies to continue implementing the requirements specified in HSPD-12 to enable agency-wide use of PIV credentials.","links":[{"href":"#au-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#sa-4","rel":"related"}]},{"id":"ia-2.12_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"ia-2.12_obj.1","name":"objective","props":[{"name":"label","value":"IA-2(12)[1]"}],"prose":"accepts Personal Identity Verification (PIV) credentials; and"},{"id":"ia-2.12_obj.2","name":"objective","props":[{"name":"label","value":"IA-2(12)[2]"}],"prose":"electronically verifies Personal Identity Verification (PIV) credentials."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nPIV verification records\n\nevidence of PIV credentials\n\nPIV credential authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing acceptance and verification of PIV credentials"}]}]}]},{"id":"ia-4","class":"SP800-53","title":"Identifier Management","params":[{"id":"ia-4_prm_1","label":"organization-defined personnel or roles"},{"id":"ia-4_prm_2","label":"organization-defined time period"},{"id":"ia-4_prm_3","label":"organization-defined time period of inactivity"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-4"},{"name":"sort-id","value":"ia-04"}],"links":[{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"}],"parts":[{"id":"ia-4_smt","name":"statement","prose":"The organization manages information system identifiers by:","parts":[{"id":"ia-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Receiving authorization from {{ insert: param, ia-4_prm_1 }} to assign an individual, group, role, or device identifier;"},{"id":"ia-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Selecting an identifier that identifies an individual, group, role, or device;"},{"id":"ia-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Assigning the identifier to the intended individual, group, role, or device;"},{"id":"ia-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Preventing reuse of identifiers for {{ insert: param, ia-4_prm_2 }}; and"},{"id":"ia-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Disabling the identifier after {{ insert: param, ia-4_prm_3 }}."}]},{"id":"ia-4_gdn","name":"guidance","prose":"Common device identifiers include, for example, media access control (MAC), Internet protocol (IP) addresses, or device-unique token identifiers. Management of individual identifiers is not applicable to shared information system accounts (e.g., guest and anonymous accounts). Typically, individual identifiers are the user names of the information system accounts assigned to those individuals. In such instances, the account management activities of AC-2 use account names provided by IA-4. This control also addresses individual identifiers not necessarily associated with information system accounts (e.g., identifiers used in physical security control databases accessed by badge reader systems for access to information systems). Preventing reuse of identifiers implies preventing the assignment of previously used individual, group, role, or device identifiers to different individuals, groups, roles, or devices.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#sc-37","rel":"related"}]},{"id":"ia-4_obj","name":"objective","prose":"Determine if the organization manages information system identifiers by:","parts":[{"id":"ia-4.a_obj","name":"objective","props":[{"name":"label","value":"IA-4(a)"}],"parts":[{"id":"ia-4.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(a)[1]"}],"prose":"defining personnel or roles from whom authorization must be received to assign:","parts":[{"id":"ia-4.a_obj.1.a","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][a]"}],"prose":"an individual identifier;"},{"id":"ia-4.a_obj.1.b","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][b]"}],"prose":"a group identifier;"},{"id":"ia-4.a_obj.1.c","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][c]"}],"prose":"a role identifier; and\/or"},{"id":"ia-4.a_obj.1.d","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][d]"}],"prose":"a device identifier;"}]},{"id":"ia-4.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(a)[2]"}],"prose":"receiving authorization from organization-defined personnel or roles to assign:","parts":[{"id":"ia-4.a_obj.2.a","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][a]"}],"prose":"an individual identifier;"},{"id":"ia-4.a_obj.2.b","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][b]"}],"prose":"a group identifier;"},{"id":"ia-4.a_obj.2.c","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][c]"}],"prose":"a role identifier; and\/or"},{"id":"ia-4.a_obj.2.d","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][d]"}],"prose":"a device identifier;"}]}]},{"id":"ia-4.b_obj","name":"objective","props":[{"name":"label","value":"IA-4(b)"}],"prose":"selecting an identifier that identifies:","parts":[{"id":"ia-4.b_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(b)[1]"}],"prose":"an individual;"},{"id":"ia-4.b_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(b)[2]"}],"prose":"a group;"},{"id":"ia-4.b_obj.3","name":"objective","props":[{"name":"label","value":"IA-4(b)[3]"}],"prose":"a role; and\/or"},{"id":"ia-4.b_obj.4","name":"objective","props":[{"name":"label","value":"IA-4(b)[4]"}],"prose":"a device;"}]},{"id":"ia-4.c_obj","name":"objective","props":[{"name":"label","value":"IA-4(c)"}],"prose":"assigning the identifier to the intended:","parts":[{"id":"ia-4.c_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(c)[1]"}],"prose":"individual;"},{"id":"ia-4.c_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(c)[2]"}],"prose":"group;"},{"id":"ia-4.c_obj.3","name":"objective","props":[{"name":"label","value":"IA-4(c)[3]"}],"prose":"role; and\/or"},{"id":"ia-4.c_obj.4","name":"objective","props":[{"name":"label","value":"IA-4(c)[4]"}],"prose":"device;"}]},{"id":"ia-4.d_obj","name":"objective","props":[{"name":"label","value":"IA-4(d)"}],"parts":[{"id":"ia-4.d_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(d)[1]"}],"prose":"defining a time period for preventing reuse of identifiers;"},{"id":"ia-4.d_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(d)[2]"}],"prose":"preventing reuse of identifiers for the organization-defined time period;"}]},{"id":"ia-4.e_obj","name":"objective","props":[{"name":"label","value":"IA-4(e)"}],"parts":[{"id":"ia-4.e_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(e)[1]"}],"prose":"defining a time period of inactivity to disable the identifier; and"},{"id":"ia-4.e_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(e)[2]"}],"prose":"disabling the identifier after the organization-defined time period of inactivity."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing identifier management\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of information system accounts\n\nlist of identifiers generated from physical access control devices\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with identifier management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identifier management"}]}]},{"id":"ia-5","class":"SP800-53","title":"Authenticator Management","params":[{"id":"ia-5_prm_1","label":"organization-defined time period by authenticator type"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-5"},{"name":"sort-id","value":"ia-05"}],"links":[{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#74e740a4-c45d-49f3-a86e-eb747c549e01","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#ba557c91-ba3e-4792-adc6-a4ae479b39ff","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ia-5_smt","name":"statement","prose":"The organization manages information system authenticators by:","parts":[{"id":"ia-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, or device receiving the authenticator;"},{"id":"ia-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishing initial authenticator content for authenticators defined by the organization;"},{"id":"ia-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensuring that authenticators have sufficient strength of mechanism for their intended use;"},{"id":"ia-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Establishing and implementing administrative procedures for initial authenticator distribution, for lost\/compromised or damaged authenticators, and for revoking authenticators;"},{"id":"ia-5_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Changing default content of authenticators prior to information system installation;"},{"id":"ia-5_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Establishing minimum and maximum lifetime restrictions and reuse conditions for authenticators;"},{"id":"ia-5_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Changing\/refreshing authenticators {{ insert: param, ia-5_prm_1 }};"},{"id":"ia-5_smt.h","name":"item","props":[{"name":"label","value":"h."}],"prose":"Protecting authenticator content from unauthorized disclosure and modification;"},{"id":"ia-5_smt.i","name":"item","props":[{"name":"label","value":"i."}],"prose":"Requiring individuals to take, and having devices implement, specific security safeguards to protect authenticators; and"},{"id":"ia-5_smt.j","name":"item","props":[{"name":"label","value":"j."}],"prose":"Changing authenticators for group\/role accounts when membership to those accounts changes."}]},{"id":"ia-5_gdn","name":"guidance","prose":"Individual authenticators include, for example, passwords, tokens, biometrics, PKI certificates, and key cards. Initial authenticator content is the actual content (e.g., the initial password) as opposed to requirements about authenticator content (e.g., minimum password length). In many cases, developers ship information system components with factory default authentication credentials to allow for initial installation and configuration. Default authentication credentials are often well known, easily discoverable, and present a significant security risk. The requirement to protect individual authenticators may be implemented via control PL-4 or PS-6 for authenticators in the possession of individuals and by controls AC-3, AC-6, and SC-28 for authenticators stored within organizational information systems (e.g., passwords stored in hashed or encrypted formats, files containing encrypted or hashed passwords accessible with administrator privileges). Information systems support individual authenticator management by organization-defined settings and restrictions for various authenticator characteristics including, for example, minimum password length, password composition, validation time window for time synchronous one-time tokens, and number of allowed rejections during the verification stage of biometric authentication. Specific actions that can be taken to safeguard authenticators include, for example, maintaining possession of individual authenticators, not loaning or sharing individual authenticators with others, and reporting lost, stolen, or compromised authenticators immediately. Authenticator management includes issuing and revoking, when no longer needed, authenticators for temporary access such as that required for remote maintenance. Device authenticators include, for example, certificates and passwords.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#ps-5","rel":"related"},{"href":"#ps-6","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-17","rel":"related"},{"href":"#sc-28","rel":"related"}]},{"id":"ia-5_obj","name":"objective","prose":"Determine if the organization manages information system authenticators by:","parts":[{"id":"ia-5.a_obj","name":"objective","props":[{"name":"label","value":"IA-5(a)"}],"prose":"verifying, as part of the initial authenticator distribution, the identity of:","parts":[{"id":"ia-5.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(a)[1]"}],"prose":"the individual receiving the authenticator;"},{"id":"ia-5.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(a)[2]"}],"prose":"the group receiving the authenticator;"},{"id":"ia-5.a_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(a)[3]"}],"prose":"the role receiving the authenticator; and\/or"},{"id":"ia-5.a_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(a)[4]"}],"prose":"the device receiving the authenticator;"}]},{"id":"ia-5.b_obj","name":"objective","props":[{"name":"label","value":"IA-5(b)"}],"prose":"establishing initial authenticator content for authenticators defined by the organization;"},{"id":"ia-5.c_obj","name":"objective","props":[{"name":"label","value":"IA-5(c)"}],"prose":"ensuring that authenticators have sufficient strength of mechanism for their intended use;"},{"id":"ia-5.d_obj","name":"objective","props":[{"name":"label","value":"IA-5(d)"}],"parts":[{"id":"ia-5.d_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(d)[1]"}],"prose":"establishing and implementing administrative procedures for initial authenticator distribution;"},{"id":"ia-5.d_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(d)[2]"}],"prose":"establishing and implementing administrative procedures for lost\/compromised or damaged authenticators;"},{"id":"ia-5.d_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(d)[3]"}],"prose":"establishing and implementing administrative procedures for revoking authenticators;"}]},{"id":"ia-5.e_obj","name":"objective","props":[{"name":"label","value":"IA-5(e)"}],"prose":"changing default content of authenticators prior to information system installation;"},{"id":"ia-5.f_obj","name":"objective","props":[{"name":"label","value":"IA-5(f)"}],"parts":[{"id":"ia-5.f_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(f)[1]"}],"prose":"establishing minimum lifetime restrictions for authenticators;"},{"id":"ia-5.f_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(f)[2]"}],"prose":"establishing maximum lifetime restrictions for authenticators;"},{"id":"ia-5.f_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(f)[3]"}],"prose":"establishing reuse conditions for authenticators;"}]},{"id":"ia-5.g_obj","name":"objective","props":[{"name":"label","value":"IA-5(g)"}],"parts":[{"id":"ia-5.g_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(g)[1]"}],"prose":"defining a time period (by authenticator type) for changing\/refreshing authenticators;"},{"id":"ia-5.g_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(g)[2]"}],"prose":"changing\/refreshing authenticators with the organization-defined time period by authenticator type;"}]},{"id":"ia-5.h_obj","name":"objective","props":[{"name":"label","value":"IA-5(h)"}],"prose":"protecting authenticator content from unauthorized:","parts":[{"id":"ia-5.h_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(h)[1]"}],"prose":"disclosure;"},{"id":"ia-5.h_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(h)[2]"}],"prose":"modification;"}]},{"id":"ia-5.i_obj","name":"objective","props":[{"name":"label","value":"IA-5(i)"}],"parts":[{"id":"ia-5.i_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(i)[1]"}],"prose":"requiring individuals to take specific security safeguards to protect authenticators;"},{"id":"ia-5.i_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(i)[2]"}],"prose":"having devices implement specific security safeguards to protect authenticators; and"}]},{"id":"ia-5.j_obj","name":"objective","props":[{"name":"label","value":"IA-5(j)"}],"prose":"changing authenticators for group\/role accounts when membership to those accounts changes."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator management\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of information system authenticator types\n\nchange control records associated with managing information system authenticators\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing authenticator management capability"}]}],"controls":[{"id":"ia-5.1","class":"SP800-53-enhancement","title":"Password-based Authentication","params":[{"id":"ia-5.1_prm_1","label":"organization-defined requirements for case sensitivity, number of characters, mix of upper-case letters, lower-case letters, numbers, and special characters, including minimum requirements for each type"},{"id":"ia-5.1_prm_2","label":"organization-defined number"},{"id":"ia-5.1_prm_3","label":"organization-defined numbers for lifetime minimum, lifetime maximum"},{"id":"ia-5.1_prm_4","label":"organization-defined number"}],"props":[{"name":"label","value":"IA-5(1)"},{"name":"sort-id","value":"ia-05.01"}],"parts":[{"id":"ia-5.1_smt","name":"statement","prose":"The information system, for password-based authentication:","parts":[{"id":"ia-5.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Enforces minimum password complexity of {{ insert: param, ia-5.1_prm_1 }};"},{"id":"ia-5.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Enforces at least the following number of changed characters when new passwords are created: {{ insert: param, ia-5.1_prm_2 }};"},{"id":"ia-5.1_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Stores and transmits only cryptographically-protected passwords;"},{"id":"ia-5.1_smt.d","name":"item","props":[{"name":"label","value":"(d)"}],"prose":"Enforces password minimum and maximum lifetime restrictions of {{ insert: param, ia-5.1_prm_3 }};"},{"id":"ia-5.1_smt.e","name":"item","props":[{"name":"label","value":"(e)"}],"prose":"Prohibits password reuse for {{ insert: param, ia-5.1_prm_4 }} generations; and"},{"id":"ia-5.1_smt.f","name":"item","props":[{"name":"label","value":"(f)"}],"prose":"Allows the use of a temporary password for system logons with an immediate change to a permanent password."}]},{"id":"ia-5.1_gdn","name":"guidance","prose":"This control enhancement applies to single-factor authentication of individuals using passwords as individual or group authenticators, and in a similar manner, when passwords are part of multifactor authenticators. This control enhancement does not apply when passwords are used to unlock hardware authenticators (e.g., Personal Identity Verification cards). The implementation of such password mechanisms may not meet all of the requirements in the enhancement. Cryptographically-protected passwords include, for example, encrypted versions of passwords and one-way cryptographic hashes of passwords. The number of changed characters refers to the number of changes required with respect to the total number of positions in the current password. Password lifetime restrictions do not apply to temporary passwords. To mitigate certain brute force attacks against passwords, organizations may also consider salting passwords.","links":[{"href":"#ia-6","rel":"related"}]},{"id":"ia-5.1_obj","name":"objective","prose":"Determine if, for password-based authentication:","parts":[{"id":"ia-5.1.a_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)"}],"parts":[{"id":"ia-5.1.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[1]"}],"prose":"the organization defines requirements for case sensitivity;"},{"id":"ia-5.1.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[2]"}],"prose":"the organization defines requirements for number of characters;"},{"id":"ia-5.1.a_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[3]"}],"prose":"the organization defines requirements for the mix of upper-case letters, lower-case letters, numbers and special characters;"},{"id":"ia-5.1.a_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[4]"}],"prose":"the organization defines minimum requirements for each type of character;"},{"id":"ia-5.1.a_obj.5","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[5]"}],"prose":"the information system enforces minimum password complexity of organization-defined requirements for case sensitivity, number of characters, mix of upper-case letters, lower-case letters, numbers, and special characters, including minimum requirements for each type;"}],"links":[{"href":"#ia-5.1_smt.a","rel":"corresp"}]},{"id":"ia-5.1.b_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(b)"}],"parts":[{"id":"ia-5.1.b_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(b)[1]"}],"prose":"the organization defines a minimum number of changed characters to be enforced when new passwords are created;"},{"id":"ia-5.1.b_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(b)[2]"}],"prose":"the information system enforces at least the organization-defined minimum number of characters that must be changed when new passwords are created;"}],"links":[{"href":"#ia-5.1_smt.b","rel":"corresp"}]},{"id":"ia-5.1.c_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(c)"}],"prose":"the information system stores and transmits only encrypted representations of passwords;","links":[{"href":"#ia-5.1_smt.c","rel":"corresp"}]},{"id":"ia-5.1.d_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)"}],"parts":[{"id":"ia-5.1.d_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[1]"}],"prose":"the organization defines numbers for password minimum lifetime restrictions to be enforced for passwords;"},{"id":"ia-5.1.d_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[2]"}],"prose":"the organization defines numbers for password maximum lifetime restrictions to be enforced for passwords;"},{"id":"ia-5.1.d_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[3]"}],"prose":"the information system enforces password minimum lifetime restrictions of organization-defined numbers for lifetime minimum;"},{"id":"ia-5.1.d_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[4]"}],"prose":"the information system enforces password maximum lifetime restrictions of organization-defined numbers for lifetime maximum;"}],"links":[{"href":"#ia-5.1_smt.d","rel":"corresp"}]},{"id":"ia-5.1.e_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(e)"}],"parts":[{"id":"ia-5.1.e_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(e)[1]"}],"prose":"the organization defines the number of password generations to be prohibited from password reuse;"},{"id":"ia-5.1.e_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(e)[2]"}],"prose":"the information system prohibits password reuse for the organization-defined number of generations; and"}],"links":[{"href":"#ia-5.1_smt.e","rel":"corresp"}]},{"id":"ia-5.1.f_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(f)"}],"prose":"the information system allows the use of a temporary password for system logons with an immediate change to a permanent password.","links":[{"href":"#ia-5.1_smt.f","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\npassword policy\n\nprocedures addressing authenticator management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\npassword configurations and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing password-based authenticator management capability"}]}]},{"id":"ia-5.11","class":"SP800-53-enhancement","title":"Hardware Token-based Authentication","params":[{"id":"ia-5.11_prm_1","label":"organization-defined token quality requirements"}],"props":[{"name":"label","value":"IA-5(11)"},{"name":"sort-id","value":"ia-05.11"}],"parts":[{"id":"ia-5.11_smt","name":"statement","prose":"The information system, for hardware token-based authentication, employs mechanisms that satisfy {{ insert: param, ia-5.11_prm_1 }}."},{"id":"ia-5.11_gdn","name":"guidance","prose":"Hardware token-based authentication typically refers to the use of PKI-based tokens, such as the U.S. Government Personal Identity Verification (PIV) card. Organizations define specific requirements for tokens, such as working with a particular PKI."},{"id":"ia-5.11_obj","name":"objective","prose":"Determine if, for hardware token-based authentication:","parts":[{"id":"ia-5.11_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(11)[1]"}],"prose":"the organization defines token quality requirements to be satisfied; and"},{"id":"ia-5.11_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(11)[2]"}],"prose":"the information system employs mechanisms that satisfy organization-defined token quality requirements."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator management\n\nsecurity plan\n\ninformation system design documentation\n\nautomated mechanisms employing hardware token-based authentication for the information system\n\nlist of token quality requirements\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing hardware token-based authenticator management capability"}]}]}]},{"id":"ia-6","class":"SP800-53","title":"Authenticator Feedback","props":[{"name":"priority","value":"P2"},{"name":"label","value":"IA-6"},{"name":"sort-id","value":"ia-06"}],"parts":[{"id":"ia-6_smt","name":"statement","prose":"The information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation\/use by unauthorized individuals."},{"id":"ia-6_gdn","name":"guidance","prose":"The feedback from information systems does not provide information that would allow unauthorized individuals to compromise authentication mechanisms. For some types of information systems or system components, for example, desktops\/notebooks with relatively large monitors, the threat (often referred to as shoulder surfing) may be significant. For other types of systems or components, for example, mobile devices with 2-4 inch screens, this threat may be less significant, and may need to be balanced against the increased likelihood of typographic input errors due to the small keyboards. Therefore, the means for obscuring the authenticator feedback is selected accordingly. Obscuring the feedback of authentication information includes, for example, displaying asterisks when users type passwords into input devices, or displaying feedback for a very limited time before fully obscuring it.","links":[{"href":"#pe-18","rel":"related"}]},{"id":"ia-6_obj","name":"objective","prose":"Determine if the information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation\/use by unauthorized individuals."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator feedback\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing the obscuring of feedback of authentication information during authentication"}]}]},{"id":"ia-7","class":"SP800-53","title":"Cryptographic Module Authentication","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-7"},{"name":"sort-id","value":"ia-07"}],"links":[{"href":"#39f9087d-7687-46d2-8eda-b6f4b7a4d8a9","rel":"reference"},{"href":"#b09d1a31-d3c9-4138-a4f4-4c63816afd7d","rel":"reference"}],"parts":[{"id":"ia-7_smt","name":"statement","prose":"The information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication."},{"id":"ia-7_gdn","name":"guidance","prose":"Authentication mechanisms may be required within a cryptographic module to authenticate an operator accessing the module and to verify that the operator is authorized to assume the requested role and perform services within that role.","links":[{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"ia-7_obj","name":"objective","prose":"Determine if the information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing cryptographic module authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for cryptographic module authentication\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing cryptographic module authentication"}]}]},{"id":"ia-8","class":"SP800-53","title":"Identification and Authentication (non-organizational Users)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-8"},{"name":"sort-id","value":"ia-08"}],"links":[{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#74e740a4-c45d-49f3-a86e-eb747c549e01","rel":"reference"},{"href":"#599fe9ba-4750-4450-9eeb-b95bd19a5e8f","rel":"reference"},{"href":"#ba557c91-ba3e-4792-adc6-a4ae479b39ff","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#2157bb7e-192c-4eaa-877f-93ef6b0a3292","rel":"reference"},{"href":"#654f21e2-f3bc-43b2-abdc-60ab8d09744b","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ia-8_smt","name":"statement","prose":"The information system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users)."},{"id":"ia-8_gdn","name":"guidance","prose":"Non-organizational users include information system users other than organizational users explicitly covered by IA-2. These individuals are uniquely identified and authenticated for accesses other than those accesses explicitly identified and documented in AC-14. In accordance with the E-Authentication E-Government initiative, authentication of non-organizational users accessing federal information systems may be required to protect federal, proprietary, or privacy-related information (with exceptions noted for national security systems). Organizations use risk assessments to determine authentication needs and consider scalability, practicality, and security in balancing the need to ensure ease of use for access to federal information and information systems with the need to protect and adequately mitigate risk. IA-2 addresses identification and authentication requirements for access to information systems by organizational users.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#sc-8","rel":"related"}]},{"id":"ia-8_obj","name":"objective","prose":"Determine if the information system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users)."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability"}]}],"controls":[{"id":"ia-8.1","class":"SP800-53-enhancement","title":"Acceptance of PIV Credentials from Other Agencies","props":[{"name":"label","value":"IA-8(1)"},{"name":"sort-id","value":"ia-08.01"}],"parts":[{"id":"ia-8.1_smt","name":"statement","prose":"The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials from other federal agencies."},{"id":"ia-8.1_gdn","name":"guidance","prose":"This control enhancement applies to logical access control systems (LACS) and physical access control systems (PACS). Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11 requires federal agencies to continue implementing the requirements specified in HSPD-12 to enable agency-wide use of PIV credentials.","links":[{"href":"#au-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#sa-4","rel":"related"}]},{"id":"ia-8.1_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"ia-8.1_obj.1","name":"objective","props":[{"name":"label","value":"IA-8(1)[1]"}],"prose":"accepts Personal Identity Verification (PIV) credentials from other agencies; and"},{"id":"ia-8.1_obj.2","name":"objective","props":[{"name":"label","value":"IA-8(1)[2]"}],"prose":"electronically verifies Personal Identity Verification (PIV) credentials from other agencies."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nPIV verification records\n\nevidence of PIV credentials\n\nPIV credential authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms that accept and verify PIV credentials"}]}]},{"id":"ia-8.2","class":"SP800-53-enhancement","title":"Acceptance of Third-party Credentials","props":[{"name":"label","value":"IA-8(2)"},{"name":"sort-id","value":"ia-08.02"}],"parts":[{"id":"ia-8.2_smt","name":"statement","prose":"The information system accepts only FICAM-approved third-party credentials."},{"id":"ia-8.2_gdn","name":"guidance","prose":"This control enhancement typically applies to organizational information systems that are accessible to the general public, for example, public-facing websites. Third-party credentials are those credentials issued by nonfederal government entities approved by the Federal Identity, Credential, and Access Management (FICAM) Trust Framework Solutions initiative. Approved third-party credentials meet or exceed the set of minimum federal government-wide technical, security, privacy, and organizational maturity requirements. This allows federal government relying parties to trust such credentials at their approved assurance levels.","links":[{"href":"#au-2","rel":"related"}]},{"id":"ia-8.2_obj","name":"objective","prose":"Determine if the information system accepts only FICAM-approved third-party credentials."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of FICAM-approved, third-party credentialing products, components, or services procured and implemented by organization\n\nthird-party credential verification records\n\nevidence of FICAM-approved third-party credentials\n\nthird-party credential authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms that accept FICAM-approved credentials"}]}]},{"id":"ia-8.3","class":"SP800-53-enhancement","title":"Use of Ficam-approved Products","params":[{"id":"ia-8.3_prm_1","label":"organization-defined information systems"}],"props":[{"name":"label","value":"IA-8(3)"},{"name":"sort-id","value":"ia-08.03"}],"parts":[{"id":"ia-8.3_smt","name":"statement","prose":"The organization employs only FICAM-approved information system components in {{ insert: param, ia-8.3_prm_1 }} to accept third-party credentials."},{"id":"ia-8.3_gdn","name":"guidance","prose":"This control enhancement typically applies to information systems that are accessible to the general public, for example, public-facing websites. FICAM-approved information system components include, for example, information technology products and software libraries that have been approved by the Federal Identity, Credential, and Access Management conformance program.","links":[{"href":"#sa-4","rel":"related"}]},{"id":"ia-8.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ia-8.3_obj.1","name":"objective","props":[{"name":"label","value":"IA-8(3)[1]"}],"prose":"defines information systems in which only FICAM-approved information system components are to be employed to accept third-party credentials; and"},{"id":"ia-8.3_obj.2","name":"objective","props":[{"name":"label","value":"IA-8(3)[2]"}],"prose":"employs only FICAM-approved information system components in organization-defined information systems to accept third-party credentials."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nsystem and services acquisition policy\n\nprocedures addressing user identification and authentication\n\nprocedures addressing the integration of security requirements into the acquisition process\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nthird-party credential validations\n\nthird-party credential authorizations\n\nthird-party credential records\n\nlist of FICAM-approved information system components procured and implemented by organization\n\nacquisition documentation\n\nacquisition contracts for information system procurements or services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information system security, acquisition, and contracting responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability"}]}]},{"id":"ia-8.4","class":"SP800-53-enhancement","title":"Use of Ficam-issued Profiles","props":[{"name":"label","value":"IA-8(4)"},{"name":"sort-id","value":"ia-08.04"}],"parts":[{"id":"ia-8.4_smt","name":"statement","prose":"The information system conforms to FICAM-issued profiles."},{"id":"ia-8.4_gdn","name":"guidance","prose":"This control enhancement addresses open identity management standards. To ensure that these standards are viable, robust, reliable, sustainable (e.g., available in commercial information technology products), and interoperable as documented, the United States Government assesses and scopes identity management standards and technology implementations against applicable federal legislation, directives, policies, and requirements. The result is FICAM-issued implementation profiles of approved protocols (e.g., FICAM authentication protocols such as SAML 2.0 and OpenID 2.0, as well as other protocols such as the FICAM Backend Attribute Exchange).","links":[{"href":"#sa-4","rel":"related"}]},{"id":"ia-8.4_obj","name":"objective","prose":"Determine if the information system conforms to FICAM-issued profiles."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nsystem and services acquisition policy\n\nprocedures addressing user identification and authentication\n\nprocedures addressing the integration of security requirements into the acquisition process\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of FICAM-issued profiles and associated, approved protocols\n\nacquisition documentation\n\nacquisition contracts for information system procurements or services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms supporting and\/or implementing conformance with FICAM-issued profiles"}]}]}]}]},{"id":"ir","class":"family","title":"Incident Response","controls":[{"id":"ir-1","class":"SP800-53","title":"Incident Response Policy and Procedures","params":[{"id":"ir-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ir-1_prm_2","label":"organization-defined frequency"},{"id":"ir-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-1"},{"name":"sort-id","value":"ir-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"},{"href":"#6d431fee-658f-4a0e-9f2e-a38b5d398fab","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ir-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ir-1_prm_1 }}:","parts":[{"id":"ir-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An incident response policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ir-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the incident response policy and associated incident response controls; and"}]},{"id":"ir-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ir-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Incident response policy {{ insert: param, ir-1_prm_2 }}; and"},{"id":"ir-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Incident response procedures {{ insert: param, ir-1_prm_3 }}."}]}]},{"id":"ir-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the IR family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ir-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-1.a_obj","name":"objective","props":[{"name":"label","value":"IR-1(a)"}],"parts":[{"id":"ir-1.a.1_obj","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)"}],"parts":[{"id":"ir-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1]"}],"prose":"develops and documents an incident response policy that addresses:","parts":[{"id":"ir-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ir-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ir-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ir-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ir-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ir-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ir-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ir-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the incident response policy is to be disseminated;"},{"id":"ir-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[3]"}],"prose":"disseminates the incident response policy to organization-defined personnel or roles;"}]},{"id":"ir-1.a.2_obj","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)"}],"parts":[{"id":"ir-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the incident response policy and associated incident response controls;"},{"id":"ir-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ir-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ir-1.b_obj","name":"objective","props":[{"name":"label","value":"IR-1(b)"}],"parts":[{"id":"ir-1.b.1_obj","name":"objective","props":[{"name":"label","value":"IR-1(b)(1)"}],"parts":[{"id":"ir-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current incident response policy;"},{"id":"ir-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(b)(1)[2]"}],"prose":"reviews and updates the current incident response policy with the organization-defined frequency;"}]},{"id":"ir-1.b.2_obj","name":"objective","props":[{"name":"label","value":"IR-1(b)(2)"}],"parts":[{"id":"ir-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current incident response procedures; and"},{"id":"ir-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(b)(2)[2]"}],"prose":"reviews and updates the current incident response procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ir-2","class":"SP800-53","title":"Incident Response Training","params":[{"id":"ir-2_prm_1","label":"organization-defined time period"},{"id":"ir-2_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"IR-2"},{"name":"sort-id","value":"ir-02"}],"links":[{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"ir-2_smt","name":"statement","prose":"The organization provides incident response training to information system users consistent with assigned roles and responsibilities:","parts":[{"id":"ir-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Within {{ insert: param, ir-2_prm_1 }} of assuming an incident response role or responsibility;"},{"id":"ir-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"ir-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, ir-2_prm_2 }} thereafter."}]},{"id":"ir-2_gdn","name":"guidance","prose":"Incident response training provided by organizations is linked to the assigned roles and responsibilities of organizational personnel to ensure the appropriate content and level of detail is included in such training. For example, regular users may only need to know who to call or how to recognize an incident on the information system; system administrators may require additional training on how to handle\/remediate incidents; and incident responders may receive more specific training on forensics, reporting, system recovery, and restoration. Incident response training includes user training in the identification and reporting of suspicious activities, both from external and internal sources.","links":[{"href":"#at-3","rel":"related"},{"href":"#cp-3","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"ir-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-2.a_obj","name":"objective","props":[{"name":"label","value":"IR-2(a)"}],"parts":[{"id":"ir-2.a_obj.1","name":"objective","props":[{"name":"label","value":"IR-2(a)[1]"}],"prose":"defines a time period within which incident response training is to be provided to information system users assuming an incident response role or responsibility;"},{"id":"ir-2.a_obj.2","name":"objective","props":[{"name":"label","value":"IR-2(a)[2]"}],"prose":"provides incident response training to information system users consistent with assigned roles and responsibilities within the organization-defined time period of assuming an incident response role or responsibility;"}]},{"id":"ir-2.b_obj","name":"objective","props":[{"name":"label","value":"IR-2(b)"}],"prose":"provides incident response training to information system users consistent with assigned roles and responsibilities when required by information system changes;"},{"id":"ir-2.c_obj","name":"objective","props":[{"name":"label","value":"IR-2(c)"}],"parts":[{"id":"ir-2.c_obj.1","name":"objective","props":[{"name":"label","value":"IR-2(c)[1]"}],"prose":"defines the frequency to provide refresher incident response training to information system users consistent with assigned roles or responsibilities; and"},{"id":"ir-2.c_obj.2","name":"objective","props":[{"name":"label","value":"IR-2(c)[2]"}],"prose":"after the initial incident response training, provides refresher incident response training to information system users consistent with assigned roles and responsibilities in accordance with the organization-defined frequency to provide refresher training."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response training\n\nincident response training curriculum\n\nincident response training materials\n\nsecurity plan\n\nincident response plan\n\nsecurity plan\n\nincident response training records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response training and operational responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ir-4","class":"SP800-53","title":"Incident Handling","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-4"},{"name":"sort-id","value":"ir-04"}],"links":[{"href":"#c5034e0c-eba6-4ecd-a541-79f0678f4ba4","rel":"reference"},{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"}],"parts":[{"id":"ir-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Implements an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery;"},{"id":"ir-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Coordinates incident handling activities with contingency planning activities; and"},{"id":"ir-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Incorporates lessons learned from ongoing incident handling activities into incident response procedures, training, and testing, and implements the resulting changes accordingly."}]},{"id":"ir-4_gdn","name":"guidance","prose":"Organizations recognize that incident response capability is dependent on the capabilities of organizational information systems and the mission\/business processes being supported by those systems. Therefore, organizations consider incident response as part of the definition, design, and development of mission\/business processes and information systems. Incident-related information can be obtained from a variety of sources including, for example, audit monitoring, network monitoring, physical access monitoring, user\/administrator reports, and reported supply chain events. Effective incident handling capability includes coordination among many organizational entities including, for example, mission\/business owners, information system owners, authorizing officials, human resources offices, physical and personnel security offices, legal departments, operations personnel, procurement offices, and the risk executive (function).","links":[{"href":"#au-6","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#cp-4","rel":"related"},{"href":"#ir-2","rel":"related"},{"href":"#ir-3","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#pe-6","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"ir-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-4.a_obj","name":"objective","props":[{"name":"label","value":"IR-4(a)"}],"prose":"implements an incident handling capability for security incidents that includes:","parts":[{"id":"ir-4.a_obj.1","name":"objective","props":[{"name":"label","value":"IR-4(a)[1]"}],"prose":"preparation;"},{"id":"ir-4.a_obj.2","name":"objective","props":[{"name":"label","value":"IR-4(a)[2]"}],"prose":"detection and analysis;"},{"id":"ir-4.a_obj.3","name":"objective","props":[{"name":"label","value":"IR-4(a)[3]"}],"prose":"containment;"},{"id":"ir-4.a_obj.4","name":"objective","props":[{"name":"label","value":"IR-4(a)[4]"}],"prose":"eradication;"},{"id":"ir-4.a_obj.5","name":"objective","props":[{"name":"label","value":"IR-4(a)[5]"}],"prose":"recovery;"}]},{"id":"ir-4.b_obj","name":"objective","props":[{"name":"label","value":"IR-4(b)"}],"prose":"coordinates incident handling activities with contingency planning activities;"},{"id":"ir-4.c_obj","name":"objective","props":[{"name":"label","value":"IR-4(c)"}],"parts":[{"id":"ir-4.c_obj.1","name":"objective","props":[{"name":"label","value":"IR-4(c)[1]"}],"prose":"incorporates lessons learned from ongoing incident handling activities into:","parts":[{"id":"ir-4.c_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-4(c)[1][a]"}],"prose":"incident response procedures;"},{"id":"ir-4.c_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-4(c)[1][b]"}],"prose":"training;"},{"id":"ir-4.c_obj.1.c","name":"objective","props":[{"name":"label","value":"IR-4(c)[1][c]"}],"prose":"testing\/exercises;"}]},{"id":"ir-4.c_obj.2","name":"objective","props":[{"name":"label","value":"IR-4(c)[2]"}],"prose":"implements the resulting changes accordingly to:","parts":[{"id":"ir-4.c_obj.2.a","name":"objective","props":[{"name":"label","value":"IR-4(c)[2][a]"}],"prose":"incident response procedures;"},{"id":"ir-4.c_obj.2.b","name":"objective","props":[{"name":"label","value":"IR-4(c)[2][b]"}],"prose":"training; and"},{"id":"ir-4.c_obj.2.c","name":"objective","props":[{"name":"label","value":"IR-4(c)[2][c]"}],"prose":"testing\/exercises."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\ncontingency planning policy\n\nprocedures addressing incident handling\n\nincident response plan\n\ncontingency plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident handling responsibilities\n\norganizational personnel with contingency planning responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Incident handling capability for the organization"}]}]},{"id":"ir-5","class":"SP800-53","title":"Incident Monitoring","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-5"},{"name":"sort-id","value":"ir-05"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"}],"parts":[{"id":"ir-5_smt","name":"statement","prose":"The organization tracks and documents information system security incidents."},{"id":"ir-5_gdn","name":"guidance","prose":"Documenting information system security incidents includes, for example, maintaining records about each incident, the status of the incident, and other pertinent information necessary for forensics, evaluating incident details, trends, and handling. Incident information can be obtained from a variety of sources including, for example, incident reports, incident response teams, audit monitoring, network monitoring, physical access monitoring, and user\/administrator reports.","links":[{"href":"#au-6","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#pe-6","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"ir-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-5_obj.1","name":"objective","props":[{"name":"label","value":"IR-5[1]"}],"prose":"tracks information system security incidents; and"},{"id":"ir-5_obj.2","name":"objective","props":[{"name":"label","value":"IR-5[2]"}],"prose":"documents information system security incidents."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident monitoring\n\nincident response records and documentation\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident monitoring responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Incident monitoring capability for the organization\n\nautomated mechanisms supporting and\/or implementing tracking and documenting of system security incidents"}]}]},{"id":"ir-6","class":"SP800-53","title":"Incident Reporting","params":[{"id":"ir-6_prm_1","label":"organization-defined time period"},{"id":"ir-6_prm_2","label":"organization-defined authorities"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-6"},{"name":"sort-id","value":"ir-06"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"},{"href":"#02631467-668b-4233-989b-3dfded2fd184","rel":"reference"}],"parts":[{"id":"ir-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Requires personnel to report suspected security incidents to the organizational incident response capability within {{ insert: param, ir-6_prm_1 }}; and"},{"id":"ir-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reports security incident information to {{ insert: param, ir-6_prm_2 }}."}]},{"id":"ir-6_gdn","name":"guidance","prose":"The intent of this control is to address both specific incident reporting requirements within an organization and the formal incident reporting requirements for federal agencies and their subordinate organizations. Suspected security incidents include, for example, the receipt of suspicious email communications that can potentially contain malicious code. The types of security incidents reported, the content and timeliness of the reports, and the designated reporting authorities reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Current federal policy requires that all federal agencies (unless specifically exempted from such requirements) report security incidents to the United States Computer Emergency Readiness Team (US-CERT) within specified time frames designated in the US-CERT Concept of Operations for Federal Cyber Security Incident Handling.","links":[{"href":"#ir-4","rel":"related"},{"href":"#ir-5","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"ir-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-6.a_obj","name":"objective","props":[{"name":"label","value":"IR-6(a)"}],"parts":[{"id":"ir-6.a_obj.1","name":"objective","props":[{"name":"label","value":"IR-6(a)[1]"}],"prose":"defines the time period within which personnel report suspected security incidents to the organizational incident response capability;"},{"id":"ir-6.a_obj.2","name":"objective","props":[{"name":"label","value":"IR-6(a)[2]"}],"prose":"requires personnel to report suspected security incidents to the organizational incident response capability within the organization-defined time period;"}]},{"id":"ir-6.b_obj","name":"objective","props":[{"name":"label","value":"IR-6(b)"}],"parts":[{"id":"ir-6.b_obj.1","name":"objective","props":[{"name":"label","value":"IR-6(b)[1]"}],"prose":"defines authorities to whom security incident information is to be reported; and"},{"id":"ir-6.b_obj.2","name":"objective","props":[{"name":"label","value":"IR-6(b)[2]"}],"prose":"reports security incident information to organization-defined authorities."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident reporting\n\nincident reporting records and documentation\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident reporting responsibilities\n\norganizational personnel with information security responsibilities\n\npersonnel who have\/should have reported incidents\n\npersonnel (authorities) to whom incident information is to be reported"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incident reporting\n\nautomated mechanisms supporting and\/or implementing incident reporting"}]}]},{"id":"ir-7","class":"SP800-53","title":"Incident Response Assistance","props":[{"name":"priority","value":"P2"},{"name":"label","value":"IR-7"},{"name":"sort-id","value":"ir-07"}],"parts":[{"id":"ir-7_smt","name":"statement","prose":"The organization provides an incident response support resource, integral to the organizational incident response capability that offers advice and assistance to users of the information system for the handling and reporting of security incidents."},{"id":"ir-7_gdn","name":"guidance","prose":"Incident response support resources provided by organizations include, for example, help desks, assistance groups, and access to forensics services, when required.","links":[{"href":"#at-2","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ir-6","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#sa-9","rel":"related"}]},{"id":"ir-7_obj","name":"objective","prose":"Determine if the organization provides an incident response support resource:","parts":[{"id":"ir-7_obj.1","name":"objective","props":[{"name":"label","value":"IR-7[1]"}],"prose":"that is integral to the organizational incident response capability; and"},{"id":"ir-7_obj.2","name":"objective","props":[{"name":"label","value":"IR-7[2]"}],"prose":"that offers advice and assistance to users of the information system for the handling and reporting of security incidents."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response assistance\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response assistance and support responsibilities\n\norganizational personnel with access to incident response support and assistance capability\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incident response assistance\n\nautomated mechanisms supporting and\/or implementing incident response assistance"}]}]},{"id":"ir-8","class":"SP800-53","title":"Incident Response Plan","params":[{"id":"ir-8_prm_1","label":"organization-defined personnel or roles"},{"id":"ir-8_prm_2","label":"organization-defined incident response personnel (identified by name and\/or by role) and organizational elements"},{"id":"ir-8_prm_3","label":"organization-defined frequency"},{"id":"ir-8_prm_4","label":"organization-defined incident response personnel (identified by name and\/or by role) and organizational elements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-8"},{"name":"sort-id","value":"ir-08"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"}],"parts":[{"id":"ir-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops an incident response plan that:","parts":[{"id":"ir-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Provides the organization with a roadmap for implementing its incident response capability;"},{"id":"ir-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Describes the structure and organization of the incident response capability;"},{"id":"ir-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Provides a high-level approach for how the incident response capability fits into the overall organization;"},{"id":"ir-8_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Meets the unique requirements of the organization, which relate to mission, size, structure, and functions;"},{"id":"ir-8_smt.a.5","name":"item","props":[{"name":"label","value":"5."}],"prose":"Defines reportable incidents;"},{"id":"ir-8_smt.a.6","name":"item","props":[{"name":"label","value":"6."}],"prose":"Provides metrics for measuring the incident response capability within the organization;"},{"id":"ir-8_smt.a.7","name":"item","props":[{"name":"label","value":"7."}],"prose":"Defines the resources and management support needed to effectively maintain and mature an incident response capability; and"},{"id":"ir-8_smt.a.8","name":"item","props":[{"name":"label","value":"8."}],"prose":"Is reviewed and approved by {{ insert: param, ir-8_prm_1 }};"}]},{"id":"ir-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Distributes copies of the incident response plan to {{ insert: param, ir-8_prm_2 }};"},{"id":"ir-8_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the incident response plan {{ insert: param, ir-8_prm_3 }};"},{"id":"ir-8_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Updates the incident response plan to address system\/organizational changes or problems encountered during plan implementation, execution, or testing;"},{"id":"ir-8_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Communicates incident response plan changes to {{ insert: param, ir-8_prm_4 }}; and"},{"id":"ir-8_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Protects the incident response plan from unauthorized disclosure and modification."}]},{"id":"ir-8_gdn","name":"guidance","prose":"It is important that organizations develop and implement a coordinated approach to incident response. Organizational missions, business functions, strategies, goals, and objectives for incident response help to determine the structure of incident response capabilities. As part of a comprehensive incident response capability, organizations consider the coordination and sharing of information with external organizations, including, for example, external service providers and organizations involved in the supply chain for organizational information systems.","links":[{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"}]},{"id":"ir-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-8.a_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)"}],"prose":"develops an incident response plan that:","parts":[{"id":"ir-8.a.1_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(1)"}],"prose":"provides the organization with a roadmap for implementing its incident response capability;"},{"id":"ir-8.a.2_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(2)"}],"prose":"describes the structure and organization of the incident response capability;"},{"id":"ir-8.a.3_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(3)"}],"prose":"provides a high-level approach for how the incident response capability fits into the overall organization;"},{"id":"ir-8.a.4_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)"}],"prose":"meets the unique requirements of the organization, which relate to:","parts":[{"id":"ir-8.a.4_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[1]"}],"prose":"mission;"},{"id":"ir-8.a.4_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[2]"}],"prose":"size;"},{"id":"ir-8.a.4_obj.3","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[3]"}],"prose":"structure;"},{"id":"ir-8.a.4_obj.4","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[4]"}],"prose":"functions;"}]},{"id":"ir-8.a.5_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(5)"}],"prose":"defines reportable incidents;"},{"id":"ir-8.a.6_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(6)"}],"prose":"provides metrics for measuring the incident response capability within the organization;"},{"id":"ir-8.a.7_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(7)"}],"prose":"defines the resources and management support needed to effectively maintain and mature an incident response capability;"},{"id":"ir-8.a.8_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(8)"}],"parts":[{"id":"ir-8.a.8_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(a)(8)[1]"}],"prose":"defines personnel or roles to review and approve the incident response plan;"},{"id":"ir-8.a.8_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(a)(8)[2]"}],"prose":"is reviewed and approved by organization-defined personnel or roles;"}]}]},{"id":"ir-8.b_obj","name":"objective","props":[{"name":"label","value":"IR-8(b)"}],"parts":[{"id":"ir-8.b_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(b)[1]"}],"parts":[{"id":"ir-8.b_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-8(b)[1][a]"}],"prose":"defines incident response personnel (identified by name and\/or by role) to whom copies of the incident response plan are to be distributed;"},{"id":"ir-8.b_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-8(b)[1][b]"}],"prose":"defines organizational elements to whom copies of the incident response plan are to be distributed;"}]},{"id":"ir-8.b_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(b)[2]"}],"prose":"distributes copies of the incident response plan to organization-defined incident response personnel (identified by name and\/or by role) and organizational elements;"}]},{"id":"ir-8.c_obj","name":"objective","props":[{"name":"label","value":"IR-8(c)"}],"parts":[{"id":"ir-8.c_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(c)[1]"}],"prose":"defines the frequency to review the incident response plan;"},{"id":"ir-8.c_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(c)[2]"}],"prose":"reviews the incident response plan with the organization-defined frequency;"}]},{"id":"ir-8.d_obj","name":"objective","props":[{"name":"label","value":"IR-8(d)"}],"prose":"updates the incident response plan to address system\/organizational changes or problems encountered during plan:","parts":[{"id":"ir-8.d_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(d)[1]"}],"prose":"implementation;"},{"id":"ir-8.d_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(d)[2]"}],"prose":"execution; or"},{"id":"ir-8.d_obj.3","name":"objective","props":[{"name":"label","value":"IR-8(d)[3]"}],"prose":"testing;"}]},{"id":"ir-8.e_obj","name":"objective","props":[{"name":"label","value":"IR-8(e)"}],"parts":[{"id":"ir-8.e_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(e)[1]"}],"parts":[{"id":"ir-8.e_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-8(e)[1][a]"}],"prose":"defines incident response personnel (identified by name and\/or by role) to whom incident response plan changes are to be communicated;"},{"id":"ir-8.e_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-8(e)[1][b]"}],"prose":"defines organizational elements to whom incident response plan changes are to be communicated;"}]},{"id":"ir-8.e_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(e)[2]"}],"prose":"communicates incident response plan changes to organization-defined incident response personnel (identified by name and\/or by role) and organizational elements; and"}]},{"id":"ir-8.f_obj","name":"objective","props":[{"name":"label","value":"IR-8(f)"}],"prose":"protects the incident response plan from unauthorized disclosure and modification."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response planning\n\nincident response plan\n\nrecords of incident response plan reviews and approvals\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response planning responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational incident response plan and related organizational processes"}]}]}]},{"id":"ma","class":"family","title":"Maintenance","controls":[{"id":"ma-1","class":"SP800-53","title":"System Maintenance Policy and Procedures","params":[{"id":"ma-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ma-1_prm_2","label":"organization-defined frequency"},{"id":"ma-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MA-1"},{"name":"sort-id","value":"ma-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ma-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ma-1_prm_1 }}:","parts":[{"id":"ma-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system maintenance policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ma-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system maintenance policy and associated system maintenance controls; and"}]},{"id":"ma-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ma-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System maintenance policy {{ insert: param, ma-1_prm_2 }}; and"},{"id":"ma-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System maintenance procedures {{ insert: param, ma-1_prm_3 }}."}]}]},{"id":"ma-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the MA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ma-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-1.a_obj","name":"objective","props":[{"name":"label","value":"MA-1(a)"}],"parts":[{"id":"ma-1.a.1_obj","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)"}],"parts":[{"id":"ma-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1]"}],"prose":"develops and documents a system maintenance policy that addresses:","parts":[{"id":"ma-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ma-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ma-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ma-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ma-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ma-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ma-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ma-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system maintenance policy is to be disseminated;"},{"id":"ma-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[3]"}],"prose":"disseminates the system maintenance policy to organization-defined personnel or roles;"}]},{"id":"ma-1.a.2_obj","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)"}],"parts":[{"id":"ma-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the maintenance policy and associated system maintenance controls;"},{"id":"ma-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ma-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ma-1.b_obj","name":"objective","props":[{"name":"label","value":"MA-1(b)"}],"parts":[{"id":"ma-1.b.1_obj","name":"objective","props":[{"name":"label","value":"MA-1(b)(1)"}],"parts":[{"id":"ma-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system maintenance policy;"},{"id":"ma-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(b)(1)[2]"}],"prose":"reviews and updates the current system maintenance policy with the organization-defined frequency;"}]},{"id":"ma-1.b.2_obj","name":"objective","props":[{"name":"label","value":"MA-1(b)(2)"}],"parts":[{"id":"ma-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system maintenance procedures; and"},{"id":"ma-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(b)(2)[2]"}],"prose":"reviews and updates the current system maintenance procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Maintenance policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ma-2","class":"SP800-53","title":"Controlled Maintenance","params":[{"id":"ma-2_prm_1","label":"organization-defined personnel or roles"},{"id":"ma-2_prm_2","label":"organization-defined maintenance-related information"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-2"},{"name":"sort-id","value":"ma-02"}],"parts":[{"id":"ma-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Schedules, performs, documents, and reviews records of maintenance and repairs on information system components in accordance with manufacturer or vendor specifications and\/or organizational requirements;"},{"id":"ma-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Approves and monitors all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;"},{"id":"ma-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Requires that {{ insert: param, ma-2_prm_1 }} explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions; and"},{"id":"ma-2_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Includes {{ insert: param, ma-2_prm_2 }} in organizational maintenance records."}]},{"id":"ma-2_gdn","name":"guidance","prose":"This control addresses the information security aspects of the information system maintenance program and applies to all types of maintenance to any system component (including applications) conducted by any local or nonlocal entity (e.g., in-contract, warranty, in-house, software maintenance agreement). System maintenance also includes those components not directly associated with information processing and\/or data\/information retention such as scanners, copiers, and printers. Information necessary for creating effective maintenance records includes, for example: (i) date and time of maintenance; (ii) name of individuals or group performing the maintenance; (iii) name of escort, if necessary; (iv) a description of the maintenance performed; and (v) information system components\/equipment removed or replaced (including identification numbers, if applicable). The level of detail included in maintenance records can be informed by the security categories of organizational information systems. Organizations consider supply chain issues associated with replacement components for information systems.","links":[{"href":"#cm-3","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-6","rel":"related"},{"href":"#pe-16","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"ma-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-2.a_obj","name":"objective","props":[{"name":"label","value":"MA-2(a)"}],"parts":[{"id":"ma-2.a_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(a)[1]"}],"prose":"schedules maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.1.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[1][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.1.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[1][b]"}],"prose":"organizational requirements;"}]},{"id":"ma-2.a_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(a)[2]"}],"prose":"performs maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.2.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[2][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.2.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[2][b]"}],"prose":"organizational requirements;"}]},{"id":"ma-2.a_obj.3","name":"objective","props":[{"name":"label","value":"MA-2(a)[3]"}],"prose":"documents maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.3.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[3][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.3.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[3][b]"}],"prose":"organizational requirements;"}]},{"id":"ma-2.a_obj.4","name":"objective","props":[{"name":"label","value":"MA-2(a)[4]"}],"prose":"reviews records of maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.4.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[4][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.4.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[4][b]"}],"prose":"organizational requirements;"}]}]},{"id":"ma-2.b_obj","name":"objective","props":[{"name":"label","value":"MA-2(b)"}],"parts":[{"id":"ma-2.b_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(b)[1]"}],"prose":"approves all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;"},{"id":"ma-2.b_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(b)[2]"}],"prose":"monitors all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;"}]},{"id":"ma-2.c_obj","name":"objective","props":[{"name":"label","value":"MA-2(c)"}],"parts":[{"id":"ma-2.c_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(c)[1]"}],"prose":"defines personnel or roles required to explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2.c_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(c)[2]"}],"prose":"requires that organization-defined personnel or roles explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;"}]},{"id":"ma-2.d_obj","name":"objective","props":[{"name":"label","value":"MA-2(d)"}],"prose":"sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2.e_obj","name":"objective","props":[{"name":"label","value":"MA-2(e)"}],"prose":"checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions;"},{"id":"ma-2.f_obj","name":"objective","props":[{"name":"label","value":"MA-2(f)"}],"parts":[{"id":"ma-2.f_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(f)[1]"}],"prose":"defines maintenance-related information to be included in organizational maintenance records; and"},{"id":"ma-2.f_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(f)[2]"}],"prose":"includes organization-defined maintenance-related information in organizational maintenance records."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing controlled information system maintenance\n\nmaintenance records\n\nmanufacturer\/vendor maintenance specifications\n\nequipment sanitization records\n\nmedia sanitization records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel responsible for media sanitization\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for scheduling, performing, documenting, reviewing, approving, and monitoring maintenance and repairs for the information system\n\norganizational processes for sanitizing information system components\n\nautomated mechanisms supporting and\/or implementing controlled maintenance\n\nautomated mechanisms implementing sanitization of information system components"}]}]},{"id":"ma-4","class":"SP800-53","title":"Nonlocal Maintenance","props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-4"},{"name":"sort-id","value":"ma-04"}],"links":[{"href":"#d715b234-9b5b-4e07-b1ed-99836727664d","rel":"reference"},{"href":"#f2dbd4ec-c413-4714-b85b-6b7184d1c195","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#263823e0-a971-4b00-959d-315b26278b22","rel":"reference"},{"href":"#a4aa9645-9a8a-4b51-90a9-e223250f9a75","rel":"reference"}],"parts":[{"id":"ma-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Approves and monitors nonlocal maintenance and diagnostic activities;"},{"id":"ma-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Allows the use of nonlocal maintenance and diagnostic tools only as consistent with organizational policy and documented in the security plan for the information system;"},{"id":"ma-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions;"},{"id":"ma-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Maintains records for nonlocal maintenance and diagnostic activities; and"},{"id":"ma-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Terminates session and network connections when nonlocal maintenance is completed."}]},{"id":"ma-4_gdn","name":"guidance","prose":"Nonlocal maintenance and diagnostic activities are those activities conducted by individuals communicating through a network, either an external network (e.g., the Internet) or an internal network. Local maintenance and diagnostic activities are those activities carried out by individuals physically present at the information system or information system component and not communicating across a network connection. Authentication techniques used in the establishment of nonlocal maintenance and diagnostic sessions reflect the network access requirements in IA-2. Typically, strong authentication requires authenticators that are resistant to replay attacks and employ multifactor authentication. Strong authenticators include, for example, PKI where certificates are stored on a token protected by a password, passphrase, or biometric. Enforcing requirements in MA-4 is accomplished in part by other controls.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#ma-2","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#mp-6","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-10","rel":"related"},{"href":"#sc-17","rel":"related"}]},{"id":"ma-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-4.a_obj","name":"objective","props":[{"name":"label","value":"MA-4(a)"}],"parts":[{"id":"ma-4.a_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(a)[1]"}],"prose":"approves nonlocal maintenance and diagnostic activities;"},{"id":"ma-4.a_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(a)[2]"}],"prose":"monitors nonlocal maintenance and diagnostic activities;"}]},{"id":"ma-4.b_obj","name":"objective","props":[{"name":"label","value":"MA-4(b)"}],"prose":"allows the use of nonlocal maintenance and diagnostic tools only:","parts":[{"id":"ma-4.b_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(b)[1]"}],"prose":"as consistent with organizational policy;"},{"id":"ma-4.b_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(b)[2]"}],"prose":"as documented in the security plan for the information system;"}]},{"id":"ma-4.c_obj","name":"objective","props":[{"name":"label","value":"MA-4(c)"}],"prose":"employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions;"},{"id":"ma-4.d_obj","name":"objective","props":[{"name":"label","value":"MA-4(d)"}],"prose":"maintains records for nonlocal maintenance and diagnostic activities;"},{"id":"ma-4.e_obj","name":"objective","props":[{"name":"label","value":"MA-4(e)"}],"parts":[{"id":"ma-4.e_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(e)[1]"}],"prose":"terminates sessions when nonlocal maintenance or diagnostics is completed; and"},{"id":"ma-4.e_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(e)[2]"}],"prose":"terminates network connections when nonlocal maintenance or diagnostics is completed."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing nonlocal information system maintenance\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nmaintenance records\n\ndiagnostic records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing nonlocal maintenance\n\nautomated mechanisms implementing, supporting, and\/or managing nonlocal maintenance\n\nautomated mechanisms for strong authentication of nonlocal maintenance diagnostic sessions\n\nautomated mechanisms for terminating nonlocal maintenance sessions and network connections"}]}]},{"id":"ma-5","class":"SP800-53","title":"Maintenance Personnel","props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-5"},{"name":"sort-id","value":"ma-05"}],"parts":[{"id":"ma-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes a process for maintenance personnel authorization and maintains a list of authorized maintenance organizations or personnel;"},{"id":"ma-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and"},{"id":"ma-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations."}]},{"id":"ma-5_gdn","name":"guidance","prose":"This control applies to individuals performing hardware or software maintenance on organizational information systems, while PE-2 addresses physical access for individuals whose maintenance duties place them within the physical protection perimeter of the systems (e.g., custodial staff, physical plant maintenance personnel). Technical competence of supervising individuals relates to the maintenance performed on the information systems while having required access authorizations refers to maintenance on and near the systems. Individuals not previously identified as authorized maintenance personnel, such as information technology manufacturers, vendors, systems integrators, and consultants, may require privileged access to organizational information systems, for example, when required to conduct maintenance activities with little or no notice. Based on organizational assessments of risk, organizations may issue temporary credentials to these individuals. Temporary credentials may be for one-time use or for very limited time periods.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#ra-3","rel":"related"}]},{"id":"ma-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-5.a_obj","name":"objective","props":[{"name":"label","value":"MA-5(a)"}],"parts":[{"id":"ma-5.a_obj.1","name":"objective","props":[{"name":"label","value":"MA-5(a)[1]"}],"prose":"establishes a process for maintenance personnel authorization;"},{"id":"ma-5.a_obj.2","name":"objective","props":[{"name":"label","value":"MA-5(a)[2]"}],"prose":"maintains a list of authorized maintenance organizations or personnel;"}]},{"id":"ma-5.b_obj","name":"objective","props":[{"name":"label","value":"MA-5(b)"}],"prose":"ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and"},{"id":"ma-5.c_obj","name":"objective","props":[{"name":"label","value":"MA-5(c)"}],"prose":"designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing maintenance personnel\n\nservice provider contracts\n\nservice-level agreements\n\nlist of authorized personnel\n\nmaintenance records\n\naccess control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for authorizing and managing maintenance personnel\n\nautomated mechanisms supporting and\/or implementing authorization of maintenance personnel"}]}]}]},{"id":"mp","class":"family","title":"Media Protection","controls":[{"id":"mp-1","class":"SP800-53","title":"Media Protection Policy and Procedures","params":[{"id":"mp-1_prm_1","label":"organization-defined personnel or roles"},{"id":"mp-1_prm_2","label":"organization-defined frequency"},{"id":"mp-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-1"},{"name":"sort-id","value":"mp-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"mp-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, mp-1_prm_1 }}:","parts":[{"id":"mp-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A media protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"mp-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the media protection policy and associated media protection controls; and"}]},{"id":"mp-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"mp-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Media protection policy {{ insert: param, mp-1_prm_2 }}; and"},{"id":"mp-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Media protection procedures {{ insert: param, mp-1_prm_3 }}."}]}]},{"id":"mp-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the MP family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"mp-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-1.a_obj","name":"objective","props":[{"name":"label","value":"MP-1(a)"}],"parts":[{"id":"mp-1.a.1_obj","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)"}],"parts":[{"id":"mp-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1]"}],"prose":"develops and documents a media protection policy that addresses:","parts":[{"id":"mp-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"mp-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"mp-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"mp-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"mp-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"mp-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"mp-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"mp-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the media protection policy is to be disseminated;"},{"id":"mp-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[3]"}],"prose":"disseminates the media protection policy to organization-defined personnel or roles;"}]},{"id":"mp-1.a.2_obj","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)"}],"parts":[{"id":"mp-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the media protection policy and associated media protection controls;"},{"id":"mp-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"mp-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"mp-1.b_obj","name":"objective","props":[{"name":"label","value":"MP-1(b)"}],"parts":[{"id":"mp-1.b.1_obj","name":"objective","props":[{"name":"label","value":"MP-1(b)(1)"}],"parts":[{"id":"mp-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current media protection policy;"},{"id":"mp-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(b)(1)[2]"}],"prose":"reviews and updates the current media protection policy with the organization-defined frequency;"}]},{"id":"mp-1.b.2_obj","name":"objective","props":[{"name":"label","value":"MP-1(b)(2)"}],"parts":[{"id":"mp-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current media protection procedures; and"},{"id":"mp-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(b)(2)[2]"}],"prose":"reviews and updates the current media protection procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Media protection policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with media protection responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"mp-2","class":"SP800-53","title":"Media Access","params":[{"id":"mp-2_prm_1","label":"organization-defined types of digital and\/or non-digital media"},{"id":"mp-2_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-2"},{"name":"sort-id","value":"mp-02"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","rel":"reference"}],"parts":[{"id":"mp-2_smt","name":"statement","prose":"The organization restricts access to {{ insert: param, mp-2_prm_1 }} to {{ insert: param, mp-2_prm_2 }}."},{"id":"mp-2_gdn","name":"guidance","prose":"Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. Restricting non-digital media access includes, for example, denying access to patient medical records in a community hospital unless the individuals seeking access to such records are authorized healthcare providers. Restricting access to digital media includes, for example, limiting access to design specifications stored on compact disks in the media library to the project leader and the individuals on the development team.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pl-2","rel":"related"}]},{"id":"mp-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-2_obj.1","name":"objective","props":[{"name":"label","value":"MP-2[1]"}],"prose":"defines types of digital and\/or non-digital media requiring restricted access;"},{"id":"mp-2_obj.2","name":"objective","props":[{"name":"label","value":"MP-2[2]"}],"prose":"defines personnel or roles authorized to access organization-defined types of digital and\/or non-digital media; and"},{"id":"mp-2_obj.3","name":"objective","props":[{"name":"label","value":"MP-2[3]"}],"prose":"restricts access to organization-defined types of digital and\/or non-digital media to organization-defined personnel or roles."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media access restrictions\n\naccess control policy and procedures\n\nphysical and environmental protection policy and procedures\n\nmedia storage facilities\n\naccess control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media protection responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for restricting information media\n\nautomated mechanisms supporting and\/or implementing media access restrictions"}]}]},{"id":"mp-6","class":"SP800-53","title":"Media Sanitization","params":[{"id":"mp-6_prm_1","label":"organization-defined information system media"},{"id":"mp-6_prm_2","label":"organization-defined sanitization techniques and procedures"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-6"},{"name":"sort-id","value":"mp-06"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"},{"href":"#263823e0-a971-4b00-959d-315b26278b22","rel":"reference"},{"href":"#a47466c4-c837-4f06-a39f-e68412a5f73d","rel":"reference"}],"parts":[{"id":"mp-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Sanitizes {{ insert: param, mp-6_prm_1 }} prior to disposal, release out of organizational control, or release for reuse using {{ insert: param, mp-6_prm_2 }} in accordance with applicable federal and organizational standards and policies; and"},{"id":"mp-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Employs sanitization mechanisms with the strength and integrity commensurate with the security category or classification of the information."}]},{"id":"mp-6_gdn","name":"guidance","prose":"This control applies to all information system media, both digital and non-digital, subject to disposal or reuse, whether or not the media is considered removable. Examples include media found in scanners, copiers, printers, notebook computers, workstations, network components, and mobile devices. The sanitization process removes information from the media such that the information cannot be retrieved or reconstructed. Sanitization techniques, including clearing, purging, cryptographic erase, and destruction, prevent the disclosure of information to unauthorized individuals when such media is reused or released for disposal. Organizations determine the appropriate sanitization methods recognizing that destruction is sometimes necessary when other methods cannot be applied to media requiring sanitization. Organizations use discretion on the employment of approved sanitization techniques and procedures for media containing information deemed to be in the public domain or publicly releasable, or deemed to have no adverse impact on organizations or individuals if released for reuse or disposal. Sanitization of non-digital media includes, for example, removing a classified appendix from an otherwise unclassified document, or redacting selected sections or words from a document by obscuring the redacted sections\/words in a manner equivalent in effectiveness to removing them from the document. NSA standards and policies control the sanitization process for media containing classified information.","links":[{"href":"#ma-2","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-4","rel":"related"}]},{"id":"mp-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-6.a_obj","name":"objective","props":[{"name":"label","value":"MP-6(a)"}],"parts":[{"id":"mp-6.a_obj.1","name":"objective","props":[{"name":"label","value":"MP-6(a)[1]"}],"prose":"defines information system media to be sanitized prior to:","parts":[{"id":"mp-6.a_obj.1.a","name":"objective","props":[{"name":"label","value":"MP-6(a)[1][a]"}],"prose":"disposal;"},{"id":"mp-6.a_obj.1.b","name":"objective","props":[{"name":"label","value":"MP-6(a)[1][b]"}],"prose":"release out of organizational control; or"},{"id":"mp-6.a_obj.1.c","name":"objective","props":[{"name":"label","value":"MP-6(a)[1][c]"}],"prose":"release for reuse;"}]},{"id":"mp-6.a_obj.2","name":"objective","props":[{"name":"label","value":"MP-6(a)[2]"}],"prose":"defines sanitization techniques or procedures to be used for sanitizing organization-defined information system media prior to:","parts":[{"id":"mp-6.a_obj.2.a","name":"objective","props":[{"name":"label","value":"MP-6(a)[2][a]"}],"prose":"disposal;"},{"id":"mp-6.a_obj.2.b","name":"objective","props":[{"name":"label","value":"MP-6(a)[2][b]"}],"prose":"release out of organizational control; or"},{"id":"mp-6.a_obj.2.c","name":"objective","props":[{"name":"label","value":"MP-6(a)[2][c]"}],"prose":"release for reuse;"}]},{"id":"mp-6.a_obj.3","name":"objective","props":[{"name":"label","value":"MP-6(a)[3]"}],"prose":"sanitizes organization-defined information system media prior to disposal, release out of organizational control, or release for reuse using organization-defined sanitization techniques or procedures in accordance with applicable federal and organizational standards and policies; and"}]},{"id":"mp-6.b_obj","name":"objective","props":[{"name":"label","value":"MP-6(b)"}],"prose":"employs sanitization mechanisms with strength and integrity commensurate with the security category or classification of the information."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media sanitization and disposal\n\napplicable federal standards and policies addressing media sanitization\n\nmedia sanitization records\n\naudit records\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with media sanitization responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media sanitization\n\nautomated mechanisms supporting and\/or implementing media sanitization"}]}]},{"id":"mp-7","class":"SP800-53","title":"Media Use","params":[{"id":"mp-7_prm_1","select":{"choice":["restricts","prohibits"]}},{"id":"mp-7_prm_2","label":"organization-defined types of information system media"},{"id":"mp-7_prm_3","label":"organization-defined information systems or system components"},{"id":"mp-7_prm_4","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-7"},{"name":"sort-id","value":"mp-07"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","rel":"reference"}],"parts":[{"id":"mp-7_smt","name":"statement","prose":"The organization {{ insert: param, mp-7_prm_1 }} the use of {{ insert: param, mp-7_prm_2 }} on {{ insert: param, mp-7_prm_3 }} using {{ insert: param, mp-7_prm_4 }}."},{"id":"mp-7_gdn","name":"guidance","prose":"Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. This control also applies to mobile devices with information storage capability (e.g., smart phones, tablets, E-readers). In contrast to MP-2, which restricts user access to media, this control restricts the use of certain types of media on information systems, for example, restricting\/prohibiting the use of flash drives or external hard disk drives. Organizations can employ technical and nontechnical safeguards (e.g., policies, procedures, rules of behavior) to restrict the use of information system media. Organizations may restrict the use of portable storage devices, for example, by using physical cages on workstations to prohibit access to certain external ports, or disabling\/removing the ability to insert, read or write to such devices. Organizations may also limit the use of portable storage devices to only approved devices including, for example, devices provided by the organization, devices provided by other approved organizations, and devices that are not personally owned. Finally, organizations may restrict the use of portable storage devices based on the type of device, for example, prohibiting the use of writeable, portable storage devices, and implementing this restriction by disabling or removing the capability to write to such devices.","links":[{"href":"#ac-19","rel":"related"},{"href":"#pl-4","rel":"related"}]},{"id":"mp-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-7_obj.1","name":"objective","props":[{"name":"label","value":"MP-7[1]"}],"prose":"defines types of information system media to be:","parts":[{"id":"mp-7_obj.1.a","name":"objective","props":[{"name":"label","value":"MP-7[1][a]"}],"prose":"restricted on information systems or system components; or"},{"id":"mp-7_obj.1.b","name":"objective","props":[{"name":"label","value":"MP-7[1][b]"}],"prose":"prohibited from use on information systems or system components;"}]},{"id":"mp-7_obj.2","name":"objective","props":[{"name":"label","value":"MP-7[2]"}],"prose":"defines information systems or system components on which the use of organization-defined types of information system media is to be one of the following:","parts":[{"id":"mp-7_obj.2.a","name":"objective","props":[{"name":"label","value":"MP-7[2][a]"}],"prose":"restricted; or"},{"id":"mp-7_obj.2.b","name":"objective","props":[{"name":"label","value":"MP-7[2][b]"}],"prose":"prohibited;"}]},{"id":"mp-7_obj.3","name":"objective","props":[{"name":"label","value":"MP-7[3]"}],"prose":"defines security safeguards to be employed to restrict or prohibit the use of organization-defined types of information system media on organization-defined information systems or system components; and"},{"id":"mp-7_obj.4","name":"objective","props":[{"name":"label","value":"MP-7[4]"}],"prose":"restricts or prohibits the use of organization-defined information system media on organization-defined information systems or system components using organization-defined security safeguards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nsystem use policy\n\nprocedures addressing media usage restrictions\n\nsecurity plan\n\nrules of behavior\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media use responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media use\n\nautomated mechanisms restricting or prohibiting use of information system media on information systems or system components"}]}]}]},{"id":"pe","class":"family","title":"Physical and Environmental Protection","controls":[{"id":"pe-1","class":"SP800-53","title":"Physical and Environmental Protection Policy and Procedures","params":[{"id":"pe-1_prm_1","label":"organization-defined personnel or roles"},{"id":"pe-1_prm_2","label":"organization-defined frequency"},{"id":"pe-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-1"},{"name":"sort-id","value":"pe-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"pe-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, pe-1_prm_1 }}:","parts":[{"id":"pe-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A physical and environmental protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"pe-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls; and"}]},{"id":"pe-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"pe-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Physical and environmental protection policy {{ insert: param, pe-1_prm_2 }}; and"},{"id":"pe-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Physical and environmental protection procedures {{ insert: param, pe-1_prm_3 }}."}]}]},{"id":"pe-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the PE family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"pe-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-1.a_obj","name":"objective","props":[{"name":"label","value":"PE-1(a)"}],"parts":[{"id":"pe-1.a.1_obj","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)"}],"parts":[{"id":"pe-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1]"}],"prose":"develops and documents a physical and environmental protection policy that addresses:","parts":[{"id":"pe-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"pe-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"pe-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"pe-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"pe-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"pe-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"pe-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"pe-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the physical and environmental protection policy is to be disseminated;"},{"id":"pe-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[3]"}],"prose":"disseminates the physical and environmental protection policy to organization-defined personnel or roles;"}]},{"id":"pe-1.a.2_obj","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)"}],"parts":[{"id":"pe-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls;"},{"id":"pe-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"pe-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"pe-1.b_obj","name":"objective","props":[{"name":"label","value":"PE-1(b)"}],"parts":[{"id":"pe-1.b.1_obj","name":"objective","props":[{"name":"label","value":"PE-1(b)(1)"}],"parts":[{"id":"pe-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current physical and environmental protection policy;"},{"id":"pe-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(b)(1)[2]"}],"prose":"reviews and updates the current physical and environmental protection policy with the organization-defined frequency;"}]},{"id":"pe-1.b.2_obj","name":"objective","props":[{"name":"label","value":"PE-1(b)(2)"}],"parts":[{"id":"pe-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current physical and environmental protection procedures; and"},{"id":"pe-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(b)(2)[2]"}],"prose":"reviews and updates the current physical and environmental protection procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical and environmental protection responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"pe-2","class":"SP800-53","title":"Physical Access Authorizations","params":[{"id":"pe-2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-2"},{"name":"sort-id","value":"pe-02"}],"parts":[{"id":"pe-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, approves, and maintains a list of individuals with authorized access to the facility where the information system resides;"},{"id":"pe-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Issues authorization credentials for facility access;"},{"id":"pe-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the access list detailing authorized facility access by individuals {{ insert: param, pe-2_prm_1 }}; and"},{"id":"pe-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Removes individuals from the facility access list when access is no longer required."}]},{"id":"pe-2_gdn","name":"guidance","prose":"This control applies to organizational employees and visitors. Individuals (e.g., employees, contractors, and others) with permanent physical access authorization credentials are not considered visitors. Authorization credentials include, for example, badges, identification cards, and smart cards. Organizations determine the strength of authorization credentials needed (including level of forge-proof badges, smart cards, or identification cards) consistent with federal standards, policies, and procedures. This control only applies to areas within facilities that have not been designated as publicly accessible.","links":[{"href":"#pe-3","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#ps-3","rel":"related"}]},{"id":"pe-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-2.a_obj","name":"objective","props":[{"name":"label","value":"PE-2(a)"}],"parts":[{"id":"pe-2.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-2(a)[1]"}],"prose":"develops a list of individuals with authorized access to the facility where the information system resides;"},{"id":"pe-2.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-2(a)[2]"}],"prose":"approves a list of individuals with authorized access to the facility where the information system resides;"},{"id":"pe-2.a_obj.3","name":"objective","props":[{"name":"label","value":"PE-2(a)[3]"}],"prose":"maintains a list of individuals with authorized access to the facility where the information system resides;"}]},{"id":"pe-2.b_obj","name":"objective","props":[{"name":"label","value":"PE-2(b)"}],"prose":"issues authorization credentials for facility access;"},{"id":"pe-2.c_obj","name":"objective","props":[{"name":"label","value":"PE-2(c)"}],"parts":[{"id":"pe-2.c_obj.1","name":"objective","props":[{"name":"label","value":"PE-2(c)[1]"}],"prose":"defines the frequency to review the access list detailing authorized facility access by individuals;"},{"id":"pe-2.c_obj.2","name":"objective","props":[{"name":"label","value":"PE-2(c)[2]"}],"prose":"reviews the access list detailing authorized facility access by individuals with the organization-defined frequency; and"}]},{"id":"pe-2.d_obj","name":"objective","props":[{"name":"label","value":"PE-2(d)"}],"prose":"removes individuals from the facility access list when access is no longer required."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access authorizations\n\nsecurity plan\n\nauthorized personnel access list\n\nauthorization credentials\n\nphysical access list reviews\n\nphysical access termination records and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access authorization responsibilities\n\norganizational personnel with physical access to information system facility\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for physical access authorizations\n\nautomated mechanisms supporting and\/or implementing physical access authorizations"}]}]},{"id":"pe-3","class":"SP800-53","title":"Physical Access Control","params":[{"id":"pe-3_prm_1","label":"organization-defined entry\/exit points to the facility where the information system resides"},{"id":"pe-3_prm_2","select":{"how-many":"one-or-more","choice":[" {{ insert: param, pe-3_prm_3 }} ","guards"]}},{"id":"pe-3_prm_3","depends-on":"pe-3_prm_2","label":"organization-defined physical access control systems\/devices"},{"id":"pe-3_prm_4","label":"organization-defined entry\/exit points"},{"id":"pe-3_prm_5","label":"organization-defined security safeguards"},{"id":"pe-3_prm_6","label":"organization-defined circumstances requiring visitor escorts and monitoring"},{"id":"pe-3_prm_7","label":"organization-defined physical access devices"},{"id":"pe-3_prm_8","label":"organization-defined frequency"},{"id":"pe-3_prm_9","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-3"},{"name":"sort-id","value":"pe-03"}],"links":[{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#2157bb7e-192c-4eaa-877f-93ef6b0a3292","rel":"reference"},{"href":"#6caa237b-531b-43ac-9711-d8f6b97b0377","rel":"reference"},{"href":"#398e33fd-f404-4e5c-b90e-2d50d3181244","rel":"reference"},{"href":"#61081e7f-041d-4033-96a7-44a439071683","rel":"reference"},{"href":"#dd2f5acd-08f1-435a-9837-f8203088dc1a","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"},{"href":"#5ed1f4d5-1494-421b-97ed-39d3c88ab51f","rel":"reference"}],"parts":[{"id":"pe-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Enforces physical access authorizations at {{ insert: param, pe-3_prm_1 }} by;","parts":[{"id":"pe-3_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Verifying individual access authorizations before granting access to the facility; and"},{"id":"pe-3_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Controlling ingress\/egress to the facility using {{ insert: param, pe-3_prm_2 }};"}]},{"id":"pe-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Maintains physical access audit logs for {{ insert: param, pe-3_prm_4 }};"},{"id":"pe-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Provides {{ insert: param, pe-3_prm_5 }} to control access to areas within the facility officially designated as publicly accessible;"},{"id":"pe-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Escorts visitors and monitors visitor activity {{ insert: param, pe-3_prm_6 }};"},{"id":"pe-3_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Secures keys, combinations, and other physical access devices;"},{"id":"pe-3_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Inventories {{ insert: param, pe-3_prm_7 }} every {{ insert: param, pe-3_prm_8 }}; and"},{"id":"pe-3_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Changes combinations and keys {{ insert: param, pe-3_prm_9 }} and\/or when keys are lost, combinations are compromised, or individuals are transferred or terminated."}]},{"id":"pe-3_gdn","name":"guidance","prose":"This control applies to organizational employees and visitors. Individuals (e.g., employees, contractors, and others) with permanent physical access authorization credentials are not considered visitors. Organizations determine the types of facility guards needed including, for example, professional physical security staff or other personnel such as administrative staff or information system users. Physical access devices include, for example, keys, locks, combinations, and card readers. Safeguards for publicly accessible areas within organizational facilities include, for example, cameras, monitoring by guards, and isolating selected information systems and\/or system components in secured areas. Physical access control systems comply with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. The Federal Identity, Credential, and Access Management Program provides implementation guidance for identity, credential, and access management capabilities for physical access control systems. Organizations have flexibility in the types of audit logs employed. Audit logs can be procedural (e.g., a written log of individuals accessing the facility and when such access occurred), automated (e.g., capturing ID provided by a PIV card), or some combination thereof. Physical access points can include facility access points, interior access points to information systems and\/or components requiring supplemental access controls, or both. Components of organizational information systems (e.g., workstations, terminals) may be located in areas designated as publicly accessible with organizations safeguarding access to such devices.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#pe-5","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ra-3","rel":"related"}]},{"id":"pe-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-3.a_obj","name":"objective","props":[{"name":"label","value":"PE-3(a)"}],"parts":[{"id":"pe-3.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(a)[1]"}],"prose":"defines entry\/exit points to the facility where the information system resides;"},{"id":"pe-3.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2]"}],"prose":"enforces physical access authorizations at organization-defined entry\/exit points to the facility where the information system resides by:","parts":[{"id":"pe-3.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](1)"}],"prose":"verifying individual access authorizations before granting access to the facility;"},{"id":"pe-3.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)"}],"parts":[{"id":"pe-3.a.2_obj.2.a","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[a]"}],"prose":"defining physical access control systems\/devices to be employed to control ingress\/egress to the facility where the information system resides;"},{"id":"pe-3.a.2_obj.2.b","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[b]"}],"prose":"using one or more of the following ways to control ingress\/egress to the facility:","parts":[{"id":"pe-3.a.2_obj.2.b.1","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[b][1]"}],"prose":"organization-defined physical access control systems\/devices; and\/or"},{"id":"pe-3.a.2_obj.2.b.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[b][2]"}],"prose":"guards;"}]}]}]}]},{"id":"pe-3.b_obj","name":"objective","props":[{"name":"label","value":"PE-3(b)"}],"parts":[{"id":"pe-3.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(b)[1]"}],"prose":"defines entry\/exit points for which physical access audit logs are to be maintained;"},{"id":"pe-3.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(b)[2]"}],"prose":"maintains physical access audit logs for organization-defined entry\/exit points;"}]},{"id":"pe-3.c_obj","name":"objective","props":[{"name":"label","value":"PE-3(c)"}],"parts":[{"id":"pe-3.c_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(c)[1]"}],"prose":"defines security safeguards to be employed to control access to areas within the facility officially designated as publicly accessible;"},{"id":"pe-3.c_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(c)[2]"}],"prose":"provides organization-defined security safeguards to control access to areas within the facility officially designated as publicly accessible;"}]},{"id":"pe-3.d_obj","name":"objective","props":[{"name":"label","value":"PE-3(d)"}],"parts":[{"id":"pe-3.d_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(d)[1]"}],"prose":"defines circumstances requiring visitor:","parts":[{"id":"pe-3.d_obj.1.a","name":"objective","props":[{"name":"label","value":"PE-3(d)[1][a]"}],"prose":"escorts;"},{"id":"pe-3.d_obj.1.b","name":"objective","props":[{"name":"label","value":"PE-3(d)[1][b]"}],"prose":"monitoring;"}]},{"id":"pe-3.d_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(d)[2]"}],"prose":"in accordance with organization-defined circumstances requiring visitor escorts and monitoring:","parts":[{"id":"pe-3.d_obj.2.a","name":"objective","props":[{"name":"label","value":"PE-3(d)[2][a]"}],"prose":"escorts visitors;"},{"id":"pe-3.d_obj.2.b","name":"objective","props":[{"name":"label","value":"PE-3(d)[2][b]"}],"prose":"monitors visitor activities;"}]}]},{"id":"pe-3.e_obj","name":"objective","props":[{"name":"label","value":"PE-3(e)"}],"parts":[{"id":"pe-3.e_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(e)[1]"}],"prose":"secures keys;"},{"id":"pe-3.e_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(e)[2]"}],"prose":"secures combinations;"},{"id":"pe-3.e_obj.3","name":"objective","props":[{"name":"label","value":"PE-3(e)[3]"}],"prose":"secures other physical access devices;"}]},{"id":"pe-3.f_obj","name":"objective","props":[{"name":"label","value":"PE-3(f)"}],"parts":[{"id":"pe-3.f_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(f)[1]"}],"prose":"defines physical access devices to be inventoried;"},{"id":"pe-3.f_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(f)[2]"}],"prose":"defines the frequency to inventory organization-defined physical access devices;"},{"id":"pe-3.f_obj.3","name":"objective","props":[{"name":"label","value":"PE-3(f)[3]"}],"prose":"inventories the organization-defined physical access devices with the organization-defined frequency;"}]},{"id":"pe-3.g_obj","name":"objective","props":[{"name":"label","value":"PE-3(g)"}],"parts":[{"id":"pe-3.g_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(g)[1]"}],"prose":"defines the frequency to change combinations and keys; and"},{"id":"pe-3.g_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(g)[2]"}],"prose":"changes combinations and keys with the organization-defined frequency and\/or when:","parts":[{"id":"pe-3.g_obj.2.a","name":"objective","props":[{"name":"label","value":"PE-3(g)[2][a]"}],"prose":"keys are lost;"},{"id":"pe-3.g_obj.2.b","name":"objective","props":[{"name":"label","value":"PE-3(g)[2][b]"}],"prose":"combinations are compromised;"},{"id":"pe-3.g_obj.2.c","name":"objective","props":[{"name":"label","value":"PE-3(g)[2][c]"}],"prose":"individuals are transferred or terminated."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access control\n\nsecurity plan\n\nphysical access control logs or records\n\ninventory records of physical access control devices\n\ninformation system entry and exit points\n\nrecords of key and lock combination changes\n\nstorage locations for physical access control devices\n\nphysical access control devices\n\nlist of security safeguards controlling access to designated publicly accessible areas within facility\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access control responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for physical access control\n\nautomated mechanisms supporting and\/or implementing physical access control\n\nphysical access control devices"}]}]},{"id":"pe-6","class":"SP800-53","title":"Monitoring Physical Access","params":[{"id":"pe-6_prm_1","label":"organization-defined frequency"},{"id":"pe-6_prm_2","label":"organization-defined events or potential indications of events"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-6"},{"name":"sort-id","value":"pe-06"}],"parts":[{"id":"pe-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Monitors physical access to the facility where the information system resides to detect and respond to physical security incidents;"},{"id":"pe-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews physical access logs {{ insert: param, pe-6_prm_1 }} and upon occurrence of {{ insert: param, pe-6_prm_2 }}; and"},{"id":"pe-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Coordinates results of reviews and investigations with the organizational incident response capability."}]},{"id":"pe-6_gdn","name":"guidance","prose":"Organizational incident response capabilities include investigations of and responses to detected physical security incidents. Security incidents include, for example, apparent security violations or suspicious physical access activities. Suspicious physical access activities include, for example: (i) accesses outside of normal work hours; (ii) repeated accesses to areas not normally accessed; (iii) accesses for unusual lengths of time; and (iv) out-of-sequence accesses.","links":[{"href":"#ca-7","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"pe-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-6.a_obj","name":"objective","props":[{"name":"label","value":"PE-6(a)"}],"prose":"monitors physical access to the facility where the information system resides to detect and respond to physical security incidents;"},{"id":"pe-6.b_obj","name":"objective","props":[{"name":"label","value":"PE-6(b)"}],"parts":[{"id":"pe-6.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-6(b)[1]"}],"prose":"defines the frequency to review physical access logs;"},{"id":"pe-6.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-6(b)[2]"}],"prose":"defines events or potential indication of events requiring physical access logs to be reviewed;"},{"id":"pe-6.b_obj.3","name":"objective","props":[{"name":"label","value":"PE-6(b)[3]"}],"prose":"reviews physical access logs with the organization-defined frequency and upon occurrence of organization-defined events or potential indications of events; and"}]},{"id":"pe-6.c_obj","name":"objective","props":[{"name":"label","value":"PE-6(c)"}],"prose":"coordinates results of reviews and investigations with the organizational incident response capability."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access monitoring\n\nsecurity plan\n\nphysical access logs or records\n\nphysical access monitoring records\n\nphysical access log reviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access monitoring responsibilities\n\norganizational personnel with incident response responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring physical access\n\nautomated mechanisms supporting and\/or implementing physical access monitoring\n\nautomated mechanisms supporting and\/or implementing reviewing of physical access logs"}]}]},{"id":"pe-8","class":"SP800-53","title":"Visitor Access Records","params":[{"id":"pe-8_prm_1","label":"organization-defined time period"},{"id":"pe-8_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"PE-8"},{"name":"sort-id","value":"pe-08"}],"parts":[{"id":"pe-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Maintains visitor access records to the facility where the information system resides for {{ insert: param, pe-8_prm_1 }}; and"},{"id":"pe-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews visitor access records {{ insert: param, pe-8_prm_2 }}."}]},{"id":"pe-8_gdn","name":"guidance","prose":"Visitor access records include, for example, names and organizations of persons visiting, visitor signatures, forms of identification, dates of access, entry and departure times, purposes of visits, and names and organizations of persons visited. Visitor access records are not required for publicly accessible areas."},{"id":"pe-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-8.a_obj","name":"objective","props":[{"name":"label","value":"PE-8(a)"}],"parts":[{"id":"pe-8.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-8(a)[1]"}],"prose":"defines the time period to maintain visitor access records to the facility where the information system resides;"},{"id":"pe-8.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-8(a)[2]"}],"prose":"maintains visitor access records to the facility where the information system resides for the organization-defined time period;"}]},{"id":"pe-8.b_obj","name":"objective","props":[{"name":"label","value":"PE-8(b)"}],"parts":[{"id":"pe-8.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-8(b)[1]"}],"prose":"defines the frequency to review visitor access records; and"},{"id":"pe-8.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-8(b)[2]"}],"prose":"reviews visitor access records with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing visitor access records\n\nsecurity plan\n\nvisitor access control logs or records\n\nvisitor access record or log reviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with visitor access records responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for maintaining and reviewing visitor access records\n\nautomated mechanisms supporting and\/or implementing maintenance and review of visitor access records"}]}]},{"id":"pe-12","class":"SP800-53","title":"Emergency Lighting","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-12"},{"name":"sort-id","value":"pe-12"}],"parts":[{"id":"pe-12_smt","name":"statement","prose":"The organization employs and maintains automatic emergency lighting for the information system that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility."},{"id":"pe-12_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-7","rel":"related"}]},{"id":"pe-12_obj","name":"objective","prose":"Determine if the organization employs and maintains automatic emergency lighting for the information system that:","parts":[{"id":"pe-12_obj.1","name":"objective","props":[{"name":"label","value":"PE-12[1]"}],"prose":"activates in the event of a power outage or disruption; and"},{"id":"pe-12_obj.2","name":"objective","props":[{"name":"label","value":"PE-12[2]"}],"prose":"covers emergency exits and evacuation routes within the facility."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing emergency lighting\n\nemergency lighting documentation\n\nemergency lighting test records\n\nemergency exits and evacuation routes\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for emergency lighting and\/or planning\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing emergency lighting capability"}]}]},{"id":"pe-13","class":"SP800-53","title":"Fire Protection","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-13"},{"name":"sort-id","value":"pe-13"}],"parts":[{"id":"pe-13_smt","name":"statement","prose":"The organization employs and maintains fire suppression and detection devices\/systems for the information system that are supported by an independent energy source."},{"id":"pe-13_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms. Fire suppression and detection devices\/systems include, for example, sprinkler systems, handheld fire extinguishers, fixed fire hoses, and smoke detectors."},{"id":"pe-13_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-13_obj.1","name":"objective","props":[{"name":"label","value":"PE-13[1]"}],"prose":"employs fire suppression and detection devices\/systems for the information system that are supported by an independent energy source; and"},{"id":"pe-13_obj.2","name":"objective","props":[{"name":"label","value":"PE-13[2]"}],"prose":"maintains fire suppression and detection devices\/systems for the information system that are supported by an independent energy source."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing fire protection\n\nfire suppression and detection devices\/systems\n\nfire suppression and detection devices\/systems documentation\n\ntest records of fire suppression and detection devices\/systems\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for fire detection and suppression devices\/systems\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing fire suppression\/detection devices\/systems"}]}]},{"id":"pe-14","class":"SP800-53","title":"Temperature and Humidity Controls","params":[{"id":"pe-14_prm_1","label":"organization-defined acceptable levels"},{"id":"pe-14_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-14"},{"name":"sort-id","value":"pe-14"}],"parts":[{"id":"pe-14_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-14_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Maintains temperature and humidity levels within the facility where the information system resides at {{ insert: param, pe-14_prm_1 }}; and"},{"id":"pe-14_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Monitors temperature and humidity levels {{ insert: param, pe-14_prm_2 }}."}]},{"id":"pe-14_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources, for example, data centers, server rooms, and mainframe computer rooms.","links":[{"href":"#at-3","rel":"related"}]},{"id":"pe-14_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-14.a_obj","name":"objective","props":[{"name":"label","value":"PE-14(a)"}],"parts":[{"id":"pe-14.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-14(a)[1]"}],"prose":"defines acceptable temperature levels to be maintained within the facility where the information system resides;"},{"id":"pe-14.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-14(a)[2]"}],"prose":"defines acceptable humidity levels to be maintained within the facility where the information system resides;"},{"id":"pe-14.a_obj.3","name":"objective","props":[{"name":"label","value":"PE-14(a)[3]"}],"prose":"maintains temperature levels within the facility where the information system resides at the organization-defined levels;"},{"id":"pe-14.a_obj.4","name":"objective","props":[{"name":"label","value":"PE-14(a)[4]"}],"prose":"maintains humidity levels within the facility where the information system resides at the organization-defined levels;"}]},{"id":"pe-14.b_obj","name":"objective","props":[{"name":"label","value":"PE-14(b)"}],"parts":[{"id":"pe-14.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-14(b)[1]"}],"prose":"defines the frequency to monitor temperature levels;"},{"id":"pe-14.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-14(b)[2]"}],"prose":"defines the frequency to monitor humidity levels;"},{"id":"pe-14.b_obj.3","name":"objective","props":[{"name":"label","value":"PE-14(b)[3]"}],"prose":"monitors temperature levels with the organization-defined frequency; and"},{"id":"pe-14.b_obj.4","name":"objective","props":[{"name":"label","value":"PE-14(b)[4]"}],"prose":"monitors humidity levels with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing temperature and humidity control\n\nsecurity plan\n\ntemperature and humidity controls\n\nfacility housing the information system\n\ntemperature and humidity controls documentation\n\ntemperature and humidity records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for information system environmental controls\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing maintenance and monitoring of temperature and humidity levels"}]}]},{"id":"pe-15","class":"SP800-53","title":"Water Damage Protection","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-15"},{"name":"sort-id","value":"pe-15"}],"parts":[{"id":"pe-15_smt","name":"statement","prose":"The organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are accessible, working properly, and known to key personnel."},{"id":"pe-15_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms. Isolation valves can be employed in addition to or in lieu of master shutoff valves to shut off water supplies in specific areas of concern, without affecting entire organizations.","links":[{"href":"#at-3","rel":"related"}]},{"id":"pe-15_obj","name":"objective","prose":"Determine if the organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are:","parts":[{"id":"pe-15_obj.1","name":"objective","props":[{"name":"label","value":"PE-15[1]"}],"prose":"accessible;"},{"id":"pe-15_obj.2","name":"objective","props":[{"name":"label","value":"PE-15[2]"}],"prose":"working properly; and"},{"id":"pe-15_obj.3","name":"objective","props":[{"name":"label","value":"PE-15[3]"}],"prose":"known to key personnel."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing water damage protection\n\nfacility housing the information system\n\nmaster shutoff valves\n\nlist of key personnel with knowledge of location and activation procedures for master shutoff valves for the plumbing system\n\nmaster shutoff valve documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for information system environmental controls\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Master water-shutoff valves\n\norganizational process for activating master water-shutoff"}]}]},{"id":"pe-16","class":"SP800-53","title":"Delivery and Removal","params":[{"id":"pe-16_prm_1","label":"organization-defined types of information system components"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PE-16"},{"name":"sort-id","value":"pe-16"}],"parts":[{"id":"pe-16_smt","name":"statement","prose":"The organization authorizes, monitors, and controls {{ insert: param, pe-16_prm_1 }} entering and exiting the facility and maintains records of those items."},{"id":"pe-16_gdn","name":"guidance","prose":"Effectively enforcing authorizations for entry and exit of information system components may require restricting access to delivery areas and possibly isolating the areas from the information system and media libraries.","links":[{"href":"#cm-3","rel":"related"},{"href":"#ma-2","rel":"related"},{"href":"#ma-3","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#sa-12","rel":"related"}]},{"id":"pe-16_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-16_obj.1","name":"objective","props":[{"name":"label","value":"PE-16[1]"}],"prose":"defines types of information system components to be authorized, monitored, and controlled as such components are entering and exiting the facility;"},{"id":"pe-16_obj.2","name":"objective","props":[{"name":"label","value":"PE-16[2]"}],"prose":"authorizes organization-defined information system components entering the facility;"},{"id":"pe-16_obj.3","name":"objective","props":[{"name":"label","value":"PE-16[3]"}],"prose":"monitors organization-defined information system components entering the facility;"},{"id":"pe-16_obj.4","name":"objective","props":[{"name":"label","value":"PE-16[4]"}],"prose":"controls organization-defined information system components entering the facility;"},{"id":"pe-16_obj.5","name":"objective","props":[{"name":"label","value":"PE-16[5]"}],"prose":"authorizes organization-defined information system components exiting the facility;"},{"id":"pe-16_obj.6","name":"objective","props":[{"name":"label","value":"PE-16[6]"}],"prose":"monitors organization-defined information system components exiting the facility;"},{"id":"pe-16_obj.7","name":"objective","props":[{"name":"label","value":"PE-16[7]"}],"prose":"controls organization-defined information system components exiting the facility;"},{"id":"pe-16_obj.8","name":"objective","props":[{"name":"label","value":"PE-16[8]"}],"prose":"maintains records of information system components entering the facility; and"},{"id":"pe-16_obj.9","name":"objective","props":[{"name":"label","value":"PE-16[9]"}],"prose":"maintains records of information system components exiting the facility."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing delivery and removal of information system components from the facility\n\nsecurity plan\n\nfacility housing the information system\n\nrecords of items entering and exiting the facility\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for controlling information system components entering and exiting the facility\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for authorizing, monitoring, and controlling information system-related items entering and exiting the facility\n\nautomated mechanisms supporting and\/or implementing authorizing, monitoring, and controlling information system-related items entering and exiting the facility"}]}]}]},{"id":"pl","class":"family","title":"Planning","controls":[{"id":"pl-1","class":"SP800-53","title":"Security Planning Policy and Procedures","params":[{"id":"pl-1_prm_1","label":"organization-defined personnel or roles"},{"id":"pl-1_prm_2","label":"organization-defined frequency"},{"id":"pl-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PL-1"},{"name":"sort-id","value":"pl-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9c5c9e8c-dc81-4f55-a11c-d71d7487790f","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"pl-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, pl-1_prm_1 }}:","parts":[{"id":"pl-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A security planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"pl-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the security planning policy and associated security planning controls; and"}]},{"id":"pl-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"pl-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security planning policy {{ insert: param, pl-1_prm_2 }}; and"},{"id":"pl-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Security planning procedures {{ insert: param, pl-1_prm_3 }}."}]}]},{"id":"pl-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the PL family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"pl-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-1.a_obj","name":"objective","props":[{"name":"label","value":"PL-1(a)"}],"parts":[{"id":"pl-1.a.1_obj","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)"}],"parts":[{"id":"pl-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1]"}],"prose":"develops and documents a planning policy that addresses:","parts":[{"id":"pl-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"pl-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"pl-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"pl-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"pl-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"pl-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"pl-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"pl-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the planning policy is to be disseminated;"},{"id":"pl-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[3]"}],"prose":"disseminates the planning policy to organization-defined personnel or roles;"}]},{"id":"pl-1.a.2_obj","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)"}],"parts":[{"id":"pl-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the planning policy and associated planning controls;"},{"id":"pl-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"pl-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"pl-1.b_obj","name":"objective","props":[{"name":"label","value":"PL-1(b)"}],"parts":[{"id":"pl-1.b.1_obj","name":"objective","props":[{"name":"label","value":"PL-1(b)(1)"}],"parts":[{"id":"pl-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current planning policy;"},{"id":"pl-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(b)(1)[2]"}],"prose":"reviews and updates the current planning policy with the organization-defined frequency;"}]},{"id":"pl-1.b.2_obj","name":"objective","props":[{"name":"label","value":"PL-1(b)(2)"}],"parts":[{"id":"pl-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current planning procedures; and"},{"id":"pl-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(b)(2)[2]"}],"prose":"reviews and updates the current planning procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Planning policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with planning responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"pl-2","class":"SP800-53","title":"System Security Plan","params":[{"id":"pl-2_prm_1","label":"organization-defined personnel or roles"},{"id":"pl-2_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PL-2"},{"name":"sort-id","value":"pl-02"}],"links":[{"href":"#9c5c9e8c-dc81-4f55-a11c-d71d7487790f","rel":"reference"}],"parts":[{"id":"pl-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a security plan for the information system that:","parts":[{"id":"pl-2_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Is consistent with the organization’s enterprise architecture;"},{"id":"pl-2_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Explicitly defines the authorization boundary for the system;"},{"id":"pl-2_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Describes the operational context of the information system in terms of missions and business processes;"},{"id":"pl-2_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Provides the security categorization of the information system including supporting rationale;"},{"id":"pl-2_smt.a.5","name":"item","props":[{"name":"label","value":"5."}],"prose":"Describes the operational environment for the information system and relationships with or connections to other information systems;"},{"id":"pl-2_smt.a.6","name":"item","props":[{"name":"label","value":"6."}],"prose":"Provides an overview of the security requirements for the system;"},{"id":"pl-2_smt.a.7","name":"item","props":[{"name":"label","value":"7."}],"prose":"Identifies any relevant overlays, if applicable;"},{"id":"pl-2_smt.a.8","name":"item","props":[{"name":"label","value":"8."}],"prose":"Describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring decisions; and"},{"id":"pl-2_smt.a.9","name":"item","props":[{"name":"label","value":"9."}],"prose":"Is reviewed and approved by the authorizing official or designated representative prior to plan implementation;"}]},{"id":"pl-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Distributes copies of the security plan and communicates subsequent changes to the plan to {{ insert: param, pl-2_prm_1 }};"},{"id":"pl-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the security plan for the information system {{ insert: param, pl-2_prm_2 }};"},{"id":"pl-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Updates the plan to address changes to the information system\/environment of operation or problems identified during plan implementation or security control assessments; and"},{"id":"pl-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Protects the security plan from unauthorized disclosure and modification."}]},{"id":"pl-2_gdn","name":"guidance","prose":"Security plans relate security requirements to a set of security controls and control enhancements. Security plans also describe, at a high level, how the security controls and control enhancements meet those security requirements, but do not provide detailed, technical descriptions of the specific design or implementation of the controls\/enhancements. Security plans contain sufficient information (including the specification of parameter values for assignment and selection statements either explicitly or by reference) to enable a design and implementation that is unambiguously compliant with the intent of the plans and subsequent determinations of risk to organizational operations and assets, individuals, other organizations, and the Nation if the plan is implemented as intended. Organizations can also apply tailoring guidance to the security control baselines in Appendix D and CNSS Instruction 1253 to develop overlays for community-wide use or to address specialized requirements, technologies, or missions\/environments of operation (e.g., DoD-tactical, Federal Public Key Infrastructure, or Federal Identity, Credential, and Access Management, space operations). Appendix I provides guidance on developing overlays. Security plans need not be single documents; the plans can be a collection of various documents including documents that already exist. Effective security plans make extensive use of references to policies, procedures, and additional documents (e.g., design and implementation specifications) where more detailed information can be obtained. This reduces the documentation requirements associated with security programs and maintains security-related information in other established management\/operational areas related to enterprise architecture, system development life cycle, systems engineering, and acquisition. For example, security plans do not contain detailed contingency plan or incident response plan information but instead provide explicitly or by reference, sufficient information to define what needs to be accomplished by those plans.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ca-2","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#pl-7","rel":"related"},{"href":"#pm-1","rel":"related"},{"href":"#pm-7","rel":"related"},{"href":"#pm-8","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#pm-11","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-17","rel":"related"}]},{"id":"pl-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-2.a_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)"}],"prose":"develops a security plan for the information system that:","parts":[{"id":"pl-2.a.1_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(1)"}],"prose":"is consistent with the organization’s enterprise architecture;"},{"id":"pl-2.a.2_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(2)"}],"prose":"explicitly defines the authorization boundary for the system;"},{"id":"pl-2.a.3_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(3)"}],"prose":"describes the operational context of the information system in terms of missions and business processes;"},{"id":"pl-2.a.4_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(4)"}],"prose":"provides the security categorization of the information system including supporting rationale;"},{"id":"pl-2.a.5_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(5)"}],"prose":"describes the operational environment for the information system and relationships with or connections to other information systems;"},{"id":"pl-2.a.6_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(6)"}],"prose":"provides an overview of the security requirements for the system;"},{"id":"pl-2.a.7_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(7)"}],"prose":"identifies any relevant overlays, if applicable;"},{"id":"pl-2.a.8_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(8)"}],"prose":"describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring and supplemental decisions;"},{"id":"pl-2.a.9_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(9)"}],"prose":"is reviewed and approved by the authorizing official or designated representative prior to plan implementation;"}]},{"id":"pl-2.b_obj","name":"objective","props":[{"name":"label","value":"PL-2(b)"}],"parts":[{"id":"pl-2.b_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(b)[1]"}],"prose":"defines personnel or roles to whom copies of the security plan are to be distributed and subsequent changes to the plan are to be communicated;"},{"id":"pl-2.b_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(b)[2]"}],"prose":"distributes copies of the security plan and communicates subsequent changes to the plan to organization-defined personnel or roles;"}]},{"id":"pl-2.c_obj","name":"objective","props":[{"name":"label","value":"PL-2(c)"}],"parts":[{"id":"pl-2.c_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(c)[1]"}],"prose":"defines the frequency to review the security plan for the information system;"},{"id":"pl-2.c_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(c)[2]"}],"prose":"reviews the security plan for the information system with the organization-defined frequency;"}]},{"id":"pl-2.d_obj","name":"objective","props":[{"name":"label","value":"PL-2(d)"}],"prose":"updates the plan to address:","parts":[{"id":"pl-2.d_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(d)[1]"}],"prose":"changes to the information system\/environment of operation;"},{"id":"pl-2.d_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(d)[2]"}],"prose":"problems identified during plan implementation;"},{"id":"pl-2.d_obj.3","name":"objective","props":[{"name":"label","value":"PL-2(d)[3]"}],"prose":"problems identified during security control assessments;"}]},{"id":"pl-2.e_obj","name":"objective","props":[{"name":"label","value":"PL-2(e)"}],"prose":"protects the security plan from unauthorized:","parts":[{"id":"pl-2.e_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(e)[1]"}],"prose":"disclosure; and"},{"id":"pl-2.e_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(e)[2]"}],"prose":"modification."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\nprocedures addressing security plan development and implementation\n\nprocedures addressing security plan reviews and updates\n\nenterprise architecture documentation\n\nsecurity plan for the information system\n\nrecords of security plan reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security plan development\/review\/update\/approval\n\nautomated mechanisms supporting the information system security plan"}]}]},{"id":"pl-4","class":"SP800-53","title":"Rules of Behavior","params":[{"id":"pl-4_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PL-4"},{"name":"sort-id","value":"pl-04"}],"links":[{"href":"#9c5c9e8c-dc81-4f55-a11c-d71d7487790f","rel":"reference"}],"parts":[{"id":"pl-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes and makes readily available to individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;"},{"id":"pl-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Receives a signed acknowledgment from such individuals, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the information system;"},{"id":"pl-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews and updates the rules of behavior {{ insert: param, pl-4_prm_1 }}; and"},{"id":"pl-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Requires individuals who have signed a previous version of the rules of behavior to read and re-sign when the rules of behavior are revised\/updated."}]},{"id":"pl-4_gdn","name":"guidance","prose":"This control enhancement applies to organizational users. Organizations consider rules of behavior based on individual user roles and responsibilities, differentiating, for example, between rules that apply to privileged users and rules that apply to general users. Establishing rules of behavior for some types of non-organizational users including, for example, individuals who simply receive data\/information from federal information systems, is often not feasible given the large number of such users and the limited nature of their interactions with the systems. Rules of behavior for both organizational and non-organizational users can also be established in AC-8, System Use Notification. PL-4 b. (the signed acknowledgment portion of this control) may be satisfied by the security awareness training and role-based security training programs conducted by organizations if such training includes rules of behavior. Organizations can use electronic signatures for acknowledging rules of behavior.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-8","rel":"related"},{"href":"#ac-9","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#mp-7","rel":"related"},{"href":"#ps-6","rel":"related"},{"href":"#ps-8","rel":"related"},{"href":"#sa-5","rel":"related"}]},{"id":"pl-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-4.a_obj","name":"objective","props":[{"name":"label","value":"PL-4(a)"}],"parts":[{"id":"pl-4.a_obj.1","name":"objective","props":[{"name":"label","value":"PL-4(a)[1]"}],"prose":"establishes, for individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;"},{"id":"pl-4.a_obj.2","name":"objective","props":[{"name":"label","value":"PL-4(a)[2]"}],"prose":"makes readily available to individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;"}]},{"id":"pl-4.b_obj","name":"objective","props":[{"name":"label","value":"PL-4(b)"}],"prose":"receives a signed acknowledgement from such individuals, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the information system;"},{"id":"pl-4.c_obj","name":"objective","props":[{"name":"label","value":"PL-4(c)"}],"parts":[{"id":"pl-4.c_obj.1","name":"objective","props":[{"name":"label","value":"PL-4(c)[1]"}],"prose":"defines the frequency to review and update the rules of behavior;"},{"id":"pl-4.c_obj.2","name":"objective","props":[{"name":"label","value":"PL-4(c)[2]"}],"prose":"reviews and updates the rules of behavior with the organization-defined frequency; and"}]},{"id":"pl-4.d_obj","name":"objective","props":[{"name":"label","value":"PL-4(d)"}],"prose":"requires individuals who have signed a previous version of the rules of behavior to read and resign when the rules of behavior are revised\/updated."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\nprocedures addressing rules of behavior for information system users\n\nrules of behavior\n\nsigned acknowledgements\n\nrecords for rules of behavior reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for establishing, reviewing, and updating rules of behavior\n\norganizational personnel who are authorized users of the information system and have signed and resigned rules of behavior\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for establishing, reviewing, disseminating, and updating rules of behavior\n\nautomated mechanisms supporting and\/or implementing the establishment, review, dissemination, and update of rules of behavior"}]}]}]},{"id":"ps","class":"family","title":"Personnel Security","controls":[{"id":"ps-1","class":"SP800-53","title":"Personnel Security Policy and Procedures","params":[{"id":"ps-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ps-1_prm_2","label":"organization-defined frequency"},{"id":"ps-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-1"},{"name":"sort-id","value":"ps-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ps-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ps-1_prm_1 }}:","parts":[{"id":"ps-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A personnel security policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ps-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the personnel security policy and associated personnel security controls; and"}]},{"id":"ps-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ps-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Personnel security policy {{ insert: param, ps-1_prm_2 }}; and"},{"id":"ps-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Personnel security procedures {{ insert: param, ps-1_prm_3 }}."}]}]},{"id":"ps-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the PS family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ps-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-1.a_obj","name":"objective","props":[{"name":"label","value":"PS-1(a)"}],"parts":[{"id":"ps-1.a.1_obj","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)"}],"parts":[{"id":"ps-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1]"}],"prose":"develops and documents an personnel security policy that addresses:","parts":[{"id":"ps-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ps-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ps-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ps-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ps-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ps-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ps-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ps-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the personnel security policy is to be disseminated;"},{"id":"ps-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[3]"}],"prose":"disseminates the personnel security policy to organization-defined personnel or roles;"}]},{"id":"ps-1.a.2_obj","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)"}],"parts":[{"id":"ps-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the personnel security policy and associated personnel security controls;"},{"id":"ps-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ps-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ps-1.b_obj","name":"objective","props":[{"name":"label","value":"PS-1(b)"}],"parts":[{"id":"ps-1.b.1_obj","name":"objective","props":[{"name":"label","value":"PS-1(b)(1)"}],"parts":[{"id":"ps-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current personnel security policy;"},{"id":"ps-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(b)(1)[2]"}],"prose":"reviews and updates the current personnel security policy with the organization-defined frequency;"}]},{"id":"ps-1.b.2_obj","name":"objective","props":[{"name":"label","value":"PS-1(b)(2)"}],"parts":[{"id":"ps-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current personnel security procedures; and"},{"id":"ps-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(b)(2)[2]"}],"prose":"reviews and updates the current personnel security procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access control responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ps-2","class":"SP800-53","title":"Position Risk Designation","params":[{"id":"ps-2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-2"},{"name":"sort-id","value":"ps-02"}],"links":[{"href":"#0c97e60b-325a-4efa-ba2b-90f20ccd5abc","rel":"reference"}],"parts":[{"id":"ps-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Assigns a risk designation to all organizational positions;"},{"id":"ps-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishes screening criteria for individuals filling those positions; and"},{"id":"ps-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews and updates position risk designations {{ insert: param, ps-2_prm_1 }}."}]},{"id":"ps-2_gdn","name":"guidance","prose":"Position risk designations reflect Office of Personnel Management policy and guidance. Risk designations can guide and inform the types of authorizations individuals receive when accessing organizational information and information systems. Position screening criteria include explicit information security role appointment requirements (e.g., training, security clearances).","links":[{"href":"#at-3","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#ps-3","rel":"related"}]},{"id":"ps-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-2.a_obj","name":"objective","props":[{"name":"label","value":"PS-2(a)"}],"prose":"assigns a risk designation to all organizational positions;"},{"id":"ps-2.b_obj","name":"objective","props":[{"name":"label","value":"PS-2(b)"}],"prose":"establishes screening criteria for individuals filling those positions;"},{"id":"ps-2.c_obj","name":"objective","props":[{"name":"label","value":"PS-2(c)"}],"parts":[{"id":"ps-2.c_obj.1","name":"objective","props":[{"name":"label","value":"PS-2(c)[1]"}],"prose":"defines the frequency to review and update position risk designations; and"},{"id":"ps-2.c_obj.2","name":"objective","props":[{"name":"label","value":"PS-2(c)[2]"}],"prose":"reviews and updates position risk designations with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing position categorization\n\nappropriate codes of federal regulations\n\nlist of risk designations for organizational positions\n\nsecurity plan\n\nrecords of position risk designation reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for assigning, reviewing, and updating position risk designations\n\norganizational processes for establishing screening criteria"}]}]},{"id":"ps-3","class":"SP800-53","title":"Personnel Screening","params":[{"id":"ps-3_prm_1","label":"organization-defined conditions requiring rescreening and, where rescreening is so indicated, the frequency of such rescreening"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-3"},{"name":"sort-id","value":"ps-03"}],"links":[{"href":"#0c97e60b-325a-4efa-ba2b-90f20ccd5abc","rel":"reference"},{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#6caa237b-531b-43ac-9711-d8f6b97b0377","rel":"reference"}],"parts":[{"id":"ps-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Screens individuals prior to authorizing access to the information system; and"},{"id":"ps-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Rescreens individuals according to {{ insert: param, ps-3_prm_1 }}."}]},{"id":"ps-3_gdn","name":"guidance","prose":"Personnel screening and rescreening activities reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, guidance, and specific criteria established for the risk designations of assigned positions. Organizations may define different rescreening conditions and frequencies for personnel accessing information systems based on types of information processed, stored, or transmitted by the systems.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#ps-2","rel":"related"}]},{"id":"ps-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-3.a_obj","name":"objective","props":[{"name":"label","value":"PS-3(a)"}],"prose":"screens individuals prior to authorizing access to the information system;"},{"id":"ps-3.b_obj","name":"objective","props":[{"name":"label","value":"PS-3(b)"}],"parts":[{"id":"ps-3.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-3(b)[1]"}],"prose":"defines conditions requiring re-screening;"},{"id":"ps-3.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-3(b)[2]"}],"prose":"defines the frequency of re-screening where it is so indicated; and"},{"id":"ps-3.b_obj.3","name":"objective","props":[{"name":"label","value":"PS-3(b)[3]"}],"prose":"re-screens individuals in accordance with organization-defined conditions requiring re-screening and, where re-screening is so indicated, with the organization-defined frequency of such re-screening."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel screening\n\nrecords of screened personnel\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for personnel screening"}]}]},{"id":"ps-4","class":"SP800-53","title":"Personnel Termination","params":[{"id":"ps-4_prm_1","label":"organization-defined time period"},{"id":"ps-4_prm_2","label":"organization-defined information security topics"},{"id":"ps-4_prm_3","label":"organization-defined personnel or roles"},{"id":"ps-4_prm_4","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-4"},{"name":"sort-id","value":"ps-04"}],"parts":[{"id":"ps-4_smt","name":"statement","prose":"The organization, upon termination of individual employment:","parts":[{"id":"ps-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Disables information system access within {{ insert: param, ps-4_prm_1 }};"},{"id":"ps-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Terminates\/revokes any authenticators\/credentials associated with the individual;"},{"id":"ps-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Conducts exit interviews that include a discussion of {{ insert: param, ps-4_prm_2 }};"},{"id":"ps-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Retrieves all security-related organizational information system-related property;"},{"id":"ps-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Retains access to organizational information and information systems formerly controlled by terminated individual; and"},{"id":"ps-4_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Notifies {{ insert: param, ps-4_prm_3 }} within {{ insert: param, ps-4_prm_4 }}."}]},{"id":"ps-4_gdn","name":"guidance","prose":"Information system-related property includes, for example, hardware authentication tokens, system administration technical manuals, keys, identification cards, and building passes. Exit interviews ensure that terminated individuals understand the security constraints imposed by being former employees and that proper accountability is achieved for information system-related property. Security topics of interest at exit interviews can include, for example, reminding terminated individuals of nondisclosure agreements and potential limitations on future employment. Exit interviews may not be possible for some terminated individuals, for example, in cases related to job abandonment, illnesses, and nonavailability of supervisors. Exit interviews are important for individuals with security clearances. Timely execution of termination actions is essential for individuals terminated for cause. In certain situations, organizations consider disabling the information system accounts of individuals that are being terminated prior to the individuals being notified.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#ps-5","rel":"related"},{"href":"#ps-6","rel":"related"}]},{"id":"ps-4_obj","name":"objective","prose":"Determine if the organization, upon termination of individual employment,:","parts":[{"id":"ps-4.a_obj","name":"objective","props":[{"name":"label","value":"PS-4(a)"}],"parts":[{"id":"ps-4.a_obj.1","name":"objective","props":[{"name":"label","value":"PS-4(a)[1]"}],"prose":"defines a time period within which to disable information system access;"},{"id":"ps-4.a_obj.2","name":"objective","props":[{"name":"label","value":"PS-4(a)[2]"}],"prose":"disables information system access within the organization-defined time period;"}]},{"id":"ps-4.b_obj","name":"objective","props":[{"name":"label","value":"PS-4(b)"}],"prose":"terminates\/revokes any authenticators\/credentials associated with the individual;"},{"id":"ps-4.c_obj","name":"objective","props":[{"name":"label","value":"PS-4(c)"}],"parts":[{"id":"ps-4.c_obj.1","name":"objective","props":[{"name":"label","value":"PS-4(c)[1]"}],"prose":"defines information security topics to be discussed when conducting exit interviews;"},{"id":"ps-4.c_obj.2","name":"objective","props":[{"name":"label","value":"PS-4(c)[2]"}],"prose":"conducts exit interviews that include a discussion of organization-defined information security topics;"}]},{"id":"ps-4.d_obj","name":"objective","props":[{"name":"label","value":"PS-4(d)"}],"prose":"retrieves all security-related organizational information system-related property;"},{"id":"ps-4.e_obj","name":"objective","props":[{"name":"label","value":"PS-4(e)"}],"prose":"retains access to organizational information and information systems formerly controlled by the terminated individual;"},{"id":"ps-4.f_obj","name":"objective","props":[{"name":"label","value":"PS-4(f)"}],"parts":[{"id":"ps-4.f_obj.1","name":"objective","props":[{"name":"label","value":"PS-4(f)[1]"}],"prose":"defines personnel or roles to be notified of the termination;"},{"id":"ps-4.f_obj.2","name":"objective","props":[{"name":"label","value":"PS-4(f)[2]"}],"prose":"defines the time period within which to notify organization-defined personnel or roles; and"},{"id":"ps-4.f_obj.3","name":"objective","props":[{"name":"label","value":"PS-4(f)[3]"}],"prose":"notifies organization-defined personnel or roles within the organization-defined time period."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel termination\n\nrecords of personnel termination actions\n\nlist of information system accounts\n\nrecords of terminated or revoked authenticators\/credentials\n\nrecords of exit interviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for personnel termination\n\nautomated mechanisms supporting and\/or implementing personnel termination notifications\n\nautomated mechanisms for disabling information system access\/revoking authenticators"}]}]},{"id":"ps-5","class":"SP800-53","title":"Personnel Transfer","params":[{"id":"ps-5_prm_1","label":"organization-defined transfer or reassignment actions"},{"id":"ps-5_prm_2","label":"organization-defined time period following the formal transfer action"},{"id":"ps-5_prm_3","label":"organization-defined personnel or roles"},{"id":"ps-5_prm_4","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PS-5"},{"name":"sort-id","value":"ps-05"}],"parts":[{"id":"ps-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Reviews and confirms ongoing operational need for current logical and physical access authorizations to information systems\/facilities when individuals are reassigned or transferred to other positions within the organization;"},{"id":"ps-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Initiates {{ insert: param, ps-5_prm_1 }} within {{ insert: param, ps-5_prm_2 }};"},{"id":"ps-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Modifies access authorization as needed to correspond with any changes in operational need due to reassignment or transfer; and"},{"id":"ps-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Notifies {{ insert: param, ps-5_prm_3 }} within {{ insert: param, ps-5_prm_4 }}."}]},{"id":"ps-5_gdn","name":"guidance","prose":"This control applies when reassignments or transfers of individuals are permanent or of such extended durations as to make the actions warranted. Organizations define actions appropriate for the types of reassignments or transfers, whether permanent or extended. Actions that may be required for personnel transfers or reassignments to other positions within organizations include, for example: (i) returning old and issuing new keys, identification cards, and building passes; (ii) closing information system accounts and establishing new accounts; (iii) changing information system access authorizations (i.e., privileges); and (iv) providing for access to official records to which individuals had access at previous work locations and in previous information system accounts.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#ps-4","rel":"related"}]},{"id":"ps-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-5.a_obj","name":"objective","props":[{"name":"label","value":"PS-5(a)"}],"prose":"when individuals are reassigned or transferred to other positions within the organization, reviews and confirms ongoing operational need for current:","parts":[{"id":"ps-5.a_obj.1","name":"objective","props":[{"name":"label","value":"PS-5(a)[1]"}],"prose":"logical access authorizations to information systems;"},{"id":"ps-5.a_obj.2","name":"objective","props":[{"name":"label","value":"PS-5(a)[2]"}],"prose":"physical access authorizations to information systems and facilities;"}]},{"id":"ps-5.b_obj","name":"objective","props":[{"name":"label","value":"PS-5(b)"}],"parts":[{"id":"ps-5.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-5(b)[1]"}],"prose":"defines transfer or reassignment actions to be initiated following transfer or reassignment;"},{"id":"ps-5.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-5(b)[2]"}],"prose":"defines the time period within which transfer or reassignment actions must occur following transfer or reassignment;"},{"id":"ps-5.b_obj.3","name":"objective","props":[{"name":"label","value":"PS-5(b)[3]"}],"prose":"initiates organization-defined transfer or reassignment actions within the organization-defined time period following transfer or reassignment;"}]},{"id":"ps-5.c_obj","name":"objective","props":[{"name":"label","value":"PS-5(c)"}],"prose":"modifies access authorization as needed to correspond with any changes in operational need due to reassignment or transfer;"},{"id":"ps-5.d_obj","name":"objective","props":[{"name":"label","value":"PS-5(d)"}],"parts":[{"id":"ps-5.d_obj.1","name":"objective","props":[{"name":"label","value":"PS-5(d)[1]"}],"prose":"defines personnel or roles to be notified when individuals are reassigned or transferred to other positions within the organization;"},{"id":"ps-5.d_obj.2","name":"objective","props":[{"name":"label","value":"PS-5(d)[2]"}],"prose":"defines the time period within which to notify organization-defined personnel or roles when individuals are reassigned or transferred to other positions within the organization; and"},{"id":"ps-5.d_obj.3","name":"objective","props":[{"name":"label","value":"PS-5(d)[3]"}],"prose":"notifies organization-defined personnel or roles within the organization-defined time period when individuals are reassigned or transferred to other positions within the organization."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel transfer\n\nsecurity plan\n\nrecords of personnel transfer actions\n\nlist of information system and facility access authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for personnel transfer\n\nautomated mechanisms supporting and\/or implementing personnel transfer notifications\n\nautomated mechanisms for disabling information system access\/revoking authenticators"}]}]},{"id":"ps-6","class":"SP800-53","title":"Access Agreements","params":[{"id":"ps-6_prm_1","label":"organization-defined frequency"},{"id":"ps-6_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"PS-6"},{"name":"sort-id","value":"ps-06"}],"parts":[{"id":"ps-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops and documents access agreements for organizational information systems;"},{"id":"ps-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the access agreements {{ insert: param, ps-6_prm_1 }}; and"},{"id":"ps-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensures that individuals requiring access to organizational information and information systems:","parts":[{"id":"ps-6_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Sign appropriate access agreements prior to being granted access; and"},{"id":"ps-6_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Re-sign access agreements to maintain access to organizational information systems when access agreements have been updated or {{ insert: param, ps-6_prm_2 }}."}]}]},{"id":"ps-6_gdn","name":"guidance","prose":"Access agreements include, for example, nondisclosure agreements, acceptable use agreements, rules of behavior, and conflict-of-interest agreements. Signed access agreements include an acknowledgement that individuals have read, understand, and agree to abide by the constraints associated with organizational information systems to which access is authorized. Organizations can use electronic signatures to acknowledge access agreements unless specifically prohibited by organizational policy.","links":[{"href":"#pl-4","rel":"related"},{"href":"#ps-2","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ps-4","rel":"related"},{"href":"#ps-8","rel":"related"}]},{"id":"ps-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-6.a_obj","name":"objective","props":[{"name":"label","value":"PS-6(a)"}],"prose":"develops and documents access agreements for organizational information systems;"},{"id":"ps-6.b_obj","name":"objective","props":[{"name":"label","value":"PS-6(b)"}],"parts":[{"id":"ps-6.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-6(b)[1]"}],"prose":"defines the frequency to review and update the access agreements;"},{"id":"ps-6.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-6(b)[2]"}],"prose":"reviews and updates the access agreements with the organization-defined frequency;"}]},{"id":"ps-6.c_obj","name":"objective","props":[{"name":"label","value":"PS-6(c)"}],"parts":[{"id":"ps-6.c.1_obj","name":"objective","props":[{"name":"label","value":"PS-6(c)(1)"}],"prose":"ensures that individuals requiring access to organizational information and information systems sign appropriate access agreements prior to being granted access;"},{"id":"ps-6.c.2_obj","name":"objective","props":[{"name":"label","value":"PS-6(c)(2)"}],"parts":[{"id":"ps-6.c.2_obj.1","name":"objective","props":[{"name":"label","value":"PS-6(c)(2)[1]"}],"prose":"defines the frequency to re-sign access agreements to maintain access to organizational information systems when access agreements have been updated;"},{"id":"ps-6.c.2_obj.2","name":"objective","props":[{"name":"label","value":"PS-6(c)(2)[2]"}],"prose":"ensures that individuals requiring access to organizational information and information systems re-sign access agreements to maintain access to organizational information systems when access agreements have been updated or with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing access agreements for organizational information and information systems\n\nsecurity plan\n\naccess agreements\n\nrecords of access agreement reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel who have signed\/resigned access agreements\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for access agreements\n\nautomated mechanisms supporting access agreements"}]}]},{"id":"ps-7","class":"SP800-53","title":"Third-party Personnel Security","params":[{"id":"ps-7_prm_1","label":"organization-defined personnel or roles"},{"id":"ps-7_prm_2","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-7"},{"name":"sort-id","value":"ps-07"}],"links":[{"href":"#0c775bc3-bfc3-42c7-a382-88949f503171","rel":"reference"}],"parts":[{"id":"ps-7_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes personnel security requirements including security roles and responsibilities for third-party providers;"},{"id":"ps-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Requires third-party providers to comply with personnel security policies and procedures established by the organization;"},{"id":"ps-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Documents personnel security requirements;"},{"id":"ps-7_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Requires third-party providers to notify {{ insert: param, ps-7_prm_1 }} of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges within {{ insert: param, ps-7_prm_2 }}; and"},{"id":"ps-7_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Monitors provider compliance."}]},{"id":"ps-7_gdn","name":"guidance","prose":"Third-party providers include, for example, service bureaus, contractors, and other organizations providing information system development, information technology services, outsourced applications, and network and security management. Organizations explicitly include personnel security requirements in acquisition-related documents. Third-party providers may have personnel working at organizational facilities with credentials, badges, or information system privileges issued by organizations. Notifications of third-party personnel changes ensure appropriate termination of privileges and credentials. Organizations define the transfers and terminations deemed reportable by security-related characteristics that include, for example, functions, roles, and nature of credentials\/privileges associated with individuals transferred or terminated.","links":[{"href":"#ps-2","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ps-4","rel":"related"},{"href":"#ps-5","rel":"related"},{"href":"#ps-6","rel":"related"},{"href":"#sa-9","rel":"related"},{"href":"#sa-21","rel":"related"}]},{"id":"ps-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-7.a_obj","name":"objective","props":[{"name":"label","value":"PS-7(a)"}],"prose":"establishes personnel security requirements, including security roles and responsibilities, for third-party providers;"},{"id":"ps-7.b_obj","name":"objective","props":[{"name":"label","value":"PS-7(b)"}],"prose":"requires third-party providers to comply with personnel security policies and procedures established by the organization;"},{"id":"ps-7.c_obj","name":"objective","props":[{"name":"label","value":"PS-7(c)"}],"prose":"documents personnel security requirements;"},{"id":"ps-7.d_obj","name":"objective","props":[{"name":"label","value":"PS-7(d)"}],"parts":[{"id":"ps-7.d_obj.1","name":"objective","props":[{"name":"label","value":"PS-7(d)[1]"}],"prose":"defines personnel or roles to be notified of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges;"},{"id":"ps-7.d_obj.2","name":"objective","props":[{"name":"label","value":"PS-7(d)[2]"}],"prose":"defines the time period within which third-party providers are required to notify organization-defined personnel or roles of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges;"},{"id":"ps-7.d_obj.3","name":"objective","props":[{"name":"label","value":"PS-7(d)[3]"}],"prose":"requires third-party providers to notify organization-defined personnel or roles within the organization-defined time period of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges; and"}]},{"id":"ps-7.e_obj","name":"objective","props":[{"name":"label","value":"PS-7(e)"}],"prose":"monitors provider compliance."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing third-party personnel security\n\nlist of personnel security requirements\n\nacquisition documents\n\nservice-level agreements\n\ncompliance monitoring process\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\nthird-party providers\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing and monitoring third-party personnel security\n\nautomated mechanisms supporting and\/or implementing monitoring of provider compliance"}]}]},{"id":"ps-8","class":"SP800-53","title":"Personnel Sanctions","params":[{"id":"ps-8_prm_1","label":"organization-defined personnel or roles"},{"id":"ps-8_prm_2","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"PS-8"},{"name":"sort-id","value":"ps-08"}],"parts":[{"id":"ps-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Employs a formal sanctions process for individuals failing to comply with established information security policies and procedures; and"},{"id":"ps-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Notifies {{ insert: param, ps-8_prm_1 }} within {{ insert: param, ps-8_prm_2 }} when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction."}]},{"id":"ps-8_gdn","name":"guidance","prose":"Organizational sanctions processes reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Sanctions processes are described in access agreements and can be included as part of general personnel policies and procedures for organizations. Organizations consult with the Office of the General Counsel regarding matters of employee sanctions.","links":[{"href":"#pl-4","rel":"related"},{"href":"#ps-6","rel":"related"}]},{"id":"ps-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-8.a_obj","name":"objective","props":[{"name":"label","value":"PS-8(a)"}],"prose":"employs a formal sanctions process for individuals failing to comply with established information security policies and procedures;"},{"id":"ps-8.b_obj","name":"objective","props":[{"name":"label","value":"PS-8(b)"}],"parts":[{"id":"ps-8.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-8(b)[1]"}],"prose":"defines personnel or roles to be notified when a formal employee sanctions process is initiated;"},{"id":"ps-8.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-8(b)[2]"}],"prose":"defines the time period within which organization-defined personnel or roles must be notified when a formal employee sanctions process is initiated; and"},{"id":"ps-8.b_obj.3","name":"objective","props":[{"name":"label","value":"PS-8(b)[3]"}],"prose":"notifies organization-defined personnel or roles within the organization-defined time period when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel sanctions\n\nrules of behavior\n\nrecords of formal sanctions\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing personnel sanctions\n\nautomated mechanisms supporting and\/or implementing notifications"}]}]}]},{"id":"ra","class":"family","title":"Risk Assessment","controls":[{"id":"ra-1","class":"SP800-53","title":"Risk Assessment Policy and Procedures","params":[{"id":"ra-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ra-1_prm_2","label":"organization-defined frequency"},{"id":"ra-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-1"},{"name":"sort-id","value":"ra-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ra-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ra-1_prm_1 }}:","parts":[{"id":"ra-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ra-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls; and"}]},{"id":"ra-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ra-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Risk assessment policy {{ insert: param, ra-1_prm_2 }}; and"},{"id":"ra-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Risk assessment procedures {{ insert: param, ra-1_prm_3 }}."}]}]},{"id":"ra-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the RA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ra-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-1.a_obj","name":"objective","props":[{"name":"label","value":"RA-1(a)"}],"parts":[{"id":"ra-1.a.1_obj","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)"}],"parts":[{"id":"ra-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1]"}],"prose":"develops and documents a risk assessment policy that addresses:","parts":[{"id":"ra-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ra-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ra-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ra-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ra-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ra-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ra-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ra-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the risk assessment policy is to be disseminated;"},{"id":"ra-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[3]"}],"prose":"disseminates the risk assessment policy to organization-defined personnel or roles;"}]},{"id":"ra-1.a.2_obj","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)"}],"parts":[{"id":"ra-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls;"},{"id":"ra-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ra-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ra-1.b_obj","name":"objective","props":[{"name":"label","value":"RA-1(b)"}],"parts":[{"id":"ra-1.b.1_obj","name":"objective","props":[{"name":"label","value":"RA-1(b)(1)"}],"parts":[{"id":"ra-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current risk assessment policy;"},{"id":"ra-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(b)(1)[2]"}],"prose":"reviews and updates the current risk assessment policy with the organization-defined frequency;"}]},{"id":"ra-1.b.2_obj","name":"objective","props":[{"name":"label","value":"RA-1(b)(2)"}],"parts":[{"id":"ra-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current risk assessment procedures; and"},{"id":"ra-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(b)(2)[2]"}],"prose":"reviews and updates the current risk assessment procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"risk assessment policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with risk assessment responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ra-2","class":"SP800-53","title":"Security Categorization","props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-2"},{"name":"sort-id","value":"ra-02"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"}],"parts":[{"id":"ra-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Categorizes information and the information system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"},{"id":"ra-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents the security categorization results (including supporting rationale) in the security plan for the information system; and"},{"id":"ra-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensures that the authorizing official or authorizing official designated representative reviews and approves the security categorization decision."}]},{"id":"ra-2_gdn","name":"guidance","prose":"Clearly defined authorization boundaries are a prerequisite for effective security categorization decisions. Security categories describe the potential adverse impacts to organizational operations, organizational assets, and individuals if organizational information and information systems are comprised through a loss of confidentiality, integrity, or availability. Organizations conduct the security categorization process as an organization-wide activity with the involvement of chief information officers, senior information security officers, information system owners, mission\/business owners, and information owners\/stewards. Organizations also consider the potential adverse impacts to other organizations and, in accordance with the USA PATRIOT Act of 2001 and Homeland Security Presidential Directives, potential national-level adverse impacts. Security categorization processes carried out by organizations facilitate the development of inventories of information assets, and along with CM-8, mappings to specific information system components where information is processed, stored, or transmitted.","links":[{"href":"#cm-8","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"ra-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-2.a_obj","name":"objective","props":[{"name":"label","value":"RA-2(a)"}],"prose":"categorizes information and the information system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"},{"id":"ra-2.b_obj","name":"objective","props":[{"name":"label","value":"RA-2(b)"}],"prose":"documents the security categorization results (including supporting rationale) in the security plan for the information system; and"},{"id":"ra-2.c_obj","name":"objective","props":[{"name":"label","value":"RA-2(c)"}],"prose":"ensures the authorizing official or authorizing official designated representative reviews and approves the security categorization decision."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nsecurity planning policy and procedures\n\nprocedures addressing security categorization of organizational information and information systems\n\nsecurity plan\n\nsecurity categorization documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security categorization and risk assessment responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security categorization"}]}]},{"id":"ra-3","class":"SP800-53","title":"Risk Assessment","params":[{"id":"ra-3_prm_1","select":{"choice":["security plan","risk assessment report"," {{ insert: param, ra-3_prm_2 }} "]}},{"id":"ra-3_prm_2","depends-on":"ra-3_prm_1","label":"organization-defined document"},{"id":"ra-3_prm_3","label":"organization-defined frequency"},{"id":"ra-3_prm_4","label":"organization-defined personnel or roles"},{"id":"ra-3_prm_5","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-3"},{"name":"sort-id","value":"ra-03"}],"links":[{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ra-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Conducts an assessment of risk, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, disruption, modification, or destruction of the information system and the information it processes, stores, or transmits;"},{"id":"ra-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents risk assessment results in {{ insert: param, ra-3_prm_1 }};"},{"id":"ra-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews risk assessment results {{ insert: param, ra-3_prm_3 }};"},{"id":"ra-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Disseminates risk assessment results to {{ insert: param, ra-3_prm_4 }}; and"},{"id":"ra-3_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Updates the risk assessment {{ insert: param, ra-3_prm_5 }} or whenever there are significant changes to the information system or environment of operation (including the identification of new threats and vulnerabilities), or other conditions that may impact the security state of the system."}]},{"id":"ra-3_gdn","name":"guidance","prose":"Clearly defined authorization boundaries are a prerequisite for effective risk assessments. Risk assessments take into account threats, vulnerabilities, likelihood, and impact to organizational operations and assets, individuals, other organizations, and the Nation based on the operation and use of information systems. Risk assessments also take into account risk from external parties (e.g., service providers, contractors operating information systems on behalf of the organization, individuals accessing organizational information systems, outsourcing entities). In accordance with OMB policy and related E-authentication initiatives, authentication of public users accessing federal information systems may also be required to protect nonpublic or privacy-related information. As such, organizational assessments of risk also address public access to federal information systems. Risk assessments (either formal or informal) can be conducted at all three tiers in the risk management hierarchy (i.e., organization level, mission\/business process level, or information system level) and at any phase in the system development life cycle. Risk assessments can also be conducted at various steps in the Risk Management Framework, including categorization, security control selection, security control implementation, security control assessment, information system authorization, and security control monitoring. RA-3 is noteworthy in that the control must be partially implemented prior to the implementation of other controls in order to complete the first two steps in the Risk Management Framework. Risk assessments can play an important role in security control selection processes, particularly during the application of tailoring guidance, which includes security control supplementation.","links":[{"href":"#ra-2","rel":"related"},{"href":"#pm-9","rel":"related"}]},{"id":"ra-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-3.a_obj","name":"objective","props":[{"name":"label","value":"RA-3(a)"}],"prose":"conducts an assessment of risk, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, disruption, modification, or destruction of:","parts":[{"id":"ra-3.a_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(a)[1]"}],"prose":"the information system;"},{"id":"ra-3.a_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(a)[2]"}],"prose":"the information the system processes, stores, or transmits;"}]},{"id":"ra-3.b_obj","name":"objective","props":[{"name":"label","value":"RA-3(b)"}],"parts":[{"id":"ra-3.b_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(b)[1]"}],"prose":"defines a document in which risk assessment results are to be documented (if not documented in the security plan or risk assessment report);"},{"id":"ra-3.b_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(b)[2]"}],"prose":"documents risk assessment results in one of the following:","parts":[{"id":"ra-3.b_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-3(b)[2][a]"}],"prose":"the security plan;"},{"id":"ra-3.b_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-3(b)[2][b]"}],"prose":"the risk assessment report; or"},{"id":"ra-3.b_obj.2.c","name":"objective","props":[{"name":"label","value":"RA-3(b)[2][c]"}],"prose":"the organization-defined document;"}]}]},{"id":"ra-3.c_obj","name":"objective","props":[{"name":"label","value":"RA-3(c)"}],"parts":[{"id":"ra-3.c_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(c)[1]"}],"prose":"defines the frequency to review risk assessment results;"},{"id":"ra-3.c_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(c)[2]"}],"prose":"reviews risk assessment results with the organization-defined frequency;"}]},{"id":"ra-3.d_obj","name":"objective","props":[{"name":"label","value":"RA-3(d)"}],"parts":[{"id":"ra-3.d_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(d)[1]"}],"prose":"defines personnel or roles to whom risk assessment results are to be disseminated;"},{"id":"ra-3.d_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(d)[2]"}],"prose":"disseminates risk assessment results to organization-defined personnel or roles;"}]},{"id":"ra-3.e_obj","name":"objective","props":[{"name":"label","value":"RA-3(e)"}],"parts":[{"id":"ra-3.e_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(e)[1]"}],"prose":"defines the frequency to update the risk assessment;"},{"id":"ra-3.e_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(e)[2]"}],"prose":"updates the risk assessment:","parts":[{"id":"ra-3.e_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-3(e)[2][a]"}],"prose":"with the organization-defined frequency;"},{"id":"ra-3.e_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-3(e)[2][b]"}],"prose":"whenever there are significant changes to the information system or environment of operation (including the identification of new threats and vulnerabilities); and"},{"id":"ra-3.e_obj.2.c","name":"objective","props":[{"name":"label","value":"RA-3(e)[2][c]"}],"prose":"whenever there are other conditions that may impact the security state of the system."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nsecurity planning policy and procedures\n\nprocedures addressing organizational assessments of risk\n\nsecurity plan\n\nrisk assessment\n\nrisk assessment results\n\nrisk assessment reviews\n\nrisk assessment updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with risk assessment responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for risk assessment\n\nautomated mechanisms supporting and\/or for conducting, documenting, reviewing, disseminating, and updating the risk assessment"}]}]},{"id":"ra-5","class":"SP800-53","title":"Vulnerability Scanning","params":[{"id":"ra-5_prm_1","label":"organization-defined frequency and\/or randomly in accordance with organization-defined process"},{"id":"ra-5_prm_2","label":"organization-defined response times"},{"id":"ra-5_prm_3","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-5"},{"name":"sort-id","value":"ra-05"}],"links":[{"href":"#bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","rel":"reference"},{"href":"#84a37532-6db6-477b-9ea8-f9085ebca0fc","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"},{"href":"#15522e92-9192-463d-9646-6a01982db8ca","rel":"reference"},{"href":"#275cc052-0f7f-423c-bdb6-ed503dc36228","rel":"reference"}],"parts":[{"id":"ra-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Scans for vulnerabilities in the information system and hosted applications {{ insert: param, ra-5_prm_1 }} and when new vulnerabilities potentially affecting the system\/applications are identified and reported;"},{"id":"ra-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for:","parts":[{"id":"ra-5_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Enumerating platforms, software flaws, and improper configurations;"},{"id":"ra-5_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Formatting checklists and test procedures; and"},{"id":"ra-5_smt.b.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Measuring vulnerability impact;"}]},{"id":"ra-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Analyzes vulnerability scan reports and results from security control assessments;"},{"id":"ra-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Remediates legitimate vulnerabilities {{ insert: param, ra-5_prm_2 }} in accordance with an organizational assessment of risk; and"},{"id":"ra-5_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Shares information obtained from the vulnerability scanning process and security control assessments with {{ insert: param, ra-5_prm_3 }} to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies)."}]},{"id":"ra-5_gdn","name":"guidance","prose":"Security categorization of information systems guides the frequency and comprehensiveness of vulnerability scans. Organizations determine the required vulnerability scanning for all information system components, ensuring that potential sources of vulnerabilities such as networked printers, scanners, and copiers are not overlooked. Vulnerability analyses for custom software applications may require additional approaches such as static analysis, dynamic analysis, binary analysis, or a hybrid of the three approaches. Organizations can employ these analysis approaches in a variety of tools (e.g., web-based application scanners, static analysis tools, binary analyzers) and in source code reviews. Vulnerability scanning includes, for example: (i) scanning for patch levels; (ii) scanning for functions, ports, protocols, and services that should not be accessible to users or devices; and (iii) scanning for improperly configured or incorrectly operating information flow control mechanisms. Organizations consider using tools that express vulnerabilities in the Common Vulnerabilities and Exposures (CVE) naming convention and that use the Open Vulnerability Assessment Language (OVAL) to determine\/test for the presence of vulnerabilities. Suggested sources for vulnerability information include the Common Weakness Enumeration (CWE) listing and the National Vulnerability Database (NVD). In addition, security control assessments such as red team exercises provide other sources of potential vulnerabilities for which to scan. Organizations also consider using tools that express vulnerability impact by the Common Vulnerability Scoring System (CVSS).","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#ra-2","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"ra-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-5.a_obj","name":"objective","props":[{"name":"label","value":"RA-5(a)"}],"parts":[{"id":"ra-5.a_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(a)[1]"}],"parts":[{"id":"ra-5.a_obj.1.a","name":"objective","props":[{"name":"label","value":"RA-5(a)[1][a]"}],"prose":"defines the frequency for conducting vulnerability scans on the information system and hosted applications; and\/or"},{"id":"ra-5.a_obj.1.b","name":"objective","props":[{"name":"label","value":"RA-5(a)[1][b]"}],"prose":"defines the process for conducting random vulnerability scans on the information system and hosted applications;"}]},{"id":"ra-5.a_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(a)[2]"}],"prose":"in accordance with the organization-defined frequency and\/or organization-defined process for conducting random scans, scans for vulnerabilities in:","parts":[{"id":"ra-5.a_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-5(a)[2][a]"}],"prose":"the information system;"},{"id":"ra-5.a_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-5(a)[2][b]"}],"prose":"hosted applications;"}]},{"id":"ra-5.a_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(a)[3]"}],"prose":"when new vulnerabilities potentially affecting the system\/applications are identified and reported, scans for vulnerabilities in:","parts":[{"id":"ra-5.a_obj.3.a","name":"objective","props":[{"name":"label","value":"RA-5(a)[3][a]"}],"prose":"the information system;"},{"id":"ra-5.a_obj.3.b","name":"objective","props":[{"name":"label","value":"RA-5(a)[3][b]"}],"prose":"hosted applications;"}]}]},{"id":"ra-5.b_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)"}],"prose":"employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for:","parts":[{"id":"ra-5.b.1_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)"}],"parts":[{"id":"ra-5.b.1_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)[1]"}],"prose":"enumerating platforms;"},{"id":"ra-5.b.1_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)[2]"}],"prose":"enumerating software flaws;"},{"id":"ra-5.b.1_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)[3]"}],"prose":"enumerating improper configurations;"}]},{"id":"ra-5.b.2_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)(2)"}],"parts":[{"id":"ra-5.b.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(b)(2)[1]"}],"prose":"formatting checklists;"},{"id":"ra-5.b.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(b)(2)[2]"}],"prose":"formatting test procedures;"}]},{"id":"ra-5.b.3_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)(3)"}],"prose":"measuring vulnerability impact;"}]},{"id":"ra-5.c_obj","name":"objective","props":[{"name":"label","value":"RA-5(c)"}],"parts":[{"id":"ra-5.c_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(c)[1]"}],"prose":"analyzes vulnerability scan reports;"},{"id":"ra-5.c_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(c)[2]"}],"prose":"analyzes results from security control assessments;"}]},{"id":"ra-5.d_obj","name":"objective","props":[{"name":"label","value":"RA-5(d)"}],"parts":[{"id":"ra-5.d_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(d)[1]"}],"prose":"defines response times to remediate legitimate vulnerabilities in accordance with an organizational assessment of risk;"},{"id":"ra-5.d_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(d)[2]"}],"prose":"remediates legitimate vulnerabilities within the organization-defined response times in accordance with an organizational assessment of risk;"}]},{"id":"ra-5.e_obj","name":"objective","props":[{"name":"label","value":"RA-5(e)"}],"parts":[{"id":"ra-5.e_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(e)[1]"}],"prose":"defines personnel or roles with whom information obtained from the vulnerability scanning process and security control assessments is to be shared;"},{"id":"ra-5.e_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(e)[2]"}],"prose":"shares information obtained from the vulnerability scanning process with organization-defined personnel or roles to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies); and"},{"id":"ra-5.e_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(e)[3]"}],"prose":"shares information obtained from security control assessments with organization-defined personnel or roles to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies)."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nprocedures addressing vulnerability scanning\n\nrisk assessment\n\nsecurity plan\n\nsecurity assessment report\n\nvulnerability scanning tools and associated configuration documentation\n\nvulnerability scanning results\n\npatch and vulnerability management records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with risk assessment, security control assessment and vulnerability scanning responsibilities\n\norganizational personnel with vulnerability scan analysis responsibilities\n\norganizational personnel with vulnerability remediation responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for vulnerability scanning, analysis, remediation, and information sharing\n\nautomated mechanisms supporting and\/or implementing vulnerability scanning, analysis, remediation, and information sharing"}]}]}]},{"id":"sa","class":"family","title":"System and Services Acquisition","controls":[{"id":"sa-1","class":"SP800-53","title":"System and Services Acquisition Policy and Procedures","params":[{"id":"sa-1_prm_1","label":"organization-defined personnel or roles"},{"id":"sa-1_prm_2","label":"organization-defined frequency"},{"id":"sa-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-1"},{"name":"sort-id","value":"sa-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"sa-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, sa-1_prm_1 }}:","parts":[{"id":"sa-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system and services acquisition policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"sa-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls; and"}]},{"id":"sa-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"sa-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System and services acquisition policy {{ insert: param, sa-1_prm_2 }}; and"},{"id":"sa-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System and services acquisition procedures {{ insert: param, sa-1_prm_3 }}."}]}]},{"id":"sa-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the SA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"sa-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-1.a_obj","name":"objective","props":[{"name":"label","value":"SA-1(a)"}],"parts":[{"id":"sa-1.a.1_obj","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)"}],"parts":[{"id":"sa-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1]"}],"prose":"develops and documents a system and services acquisition policy that addresses:","parts":[{"id":"sa-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"sa-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"sa-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"sa-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"sa-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"sa-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"sa-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"sa-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system and services acquisition policy is to be disseminated;"},{"id":"sa-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[3]"}],"prose":"disseminates the system and services acquisition policy to organization-defined personnel or roles;"}]},{"id":"sa-1.a.2_obj","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)"}],"parts":[{"id":"sa-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls;"},{"id":"sa-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"sa-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"sa-1.b_obj","name":"objective","props":[{"name":"label","value":"SA-1(b)"}],"parts":[{"id":"sa-1.b.1_obj","name":"objective","props":[{"name":"label","value":"SA-1(b)(1)"}],"parts":[{"id":"sa-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system and services acquisition policy;"},{"id":"sa-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(b)(1)[2]"}],"prose":"reviews and updates the current system and services acquisition policy with the organization-defined frequency;"}]},{"id":"sa-1.b.2_obj","name":"objective","props":[{"name":"label","value":"SA-1(b)(2)"}],"parts":[{"id":"sa-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system and services acquisition procedures; and"},{"id":"sa-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(b)(2)[2]"}],"prose":"reviews and updates the current system and services acquisition procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"sa-2","class":"SP800-53","title":"Allocation of Resources","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-2"},{"name":"sort-id","value":"sa-02"}],"links":[{"href":"#29fcfe59-33cd-494a-8756-5907ae3a8f92","rel":"reference"}],"parts":[{"id":"sa-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Determines information security requirements for the information system or information system service in mission\/business process planning;"},{"id":"sa-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Determines, documents, and allocates the resources required to protect the information system or information system service as part of its capital planning and investment control process; and"},{"id":"sa-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Establishes a discrete line item for information security in organizational programming and budgeting documentation."}]},{"id":"sa-2_gdn","name":"guidance","prose":"Resource allocation for information security includes funding for the initial information system or information system service acquisition and funding for the sustainment of the system\/service.","links":[{"href":"#pm-3","rel":"related"},{"href":"#pm-11","rel":"related"}]},{"id":"sa-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-2.a_obj","name":"objective","props":[{"name":"label","value":"SA-2(a)"}],"prose":"determines information security requirements for the information system or information system service in mission\/business process planning;"},{"id":"sa-2.b_obj","name":"objective","props":[{"name":"label","value":"SA-2(b)"}],"prose":"to protect the information system or information system service as part of its capital planning and investment control process:","parts":[{"id":"sa-2.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-2(b)[1]"}],"prose":"determines the resources required;"},{"id":"sa-2.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-2(b)[2]"}],"prose":"documents the resources required;"},{"id":"sa-2.b_obj.3","name":"objective","props":[{"name":"label","value":"SA-2(b)[3]"}],"prose":"allocates the resources required; and"}]},{"id":"sa-2.c_obj","name":"objective","props":[{"name":"label","value":"SA-2(c)"}],"prose":"establishes a discrete line item for information security in organizational programming and budgeting documentation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the allocation of resources to information security requirements\n\nprocedures addressing capital planning and investment control\n\norganizational programming and budgeting documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with capital planning, investment control, organizational programming and budgeting responsibilities\n\norganizational personnel responsible for determining information security requirements for information systems\/services\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for determining information security requirements\n\norganizational processes for capital planning, programming, and budgeting\n\nautomated mechanisms supporting and\/or implementing organizational capital planning, programming, and budgeting"}]}]},{"id":"sa-3","class":"SP800-53","title":"System Development Life Cycle","params":[{"id":"sa-3_prm_1","label":"organization-defined system development life cycle"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-3"},{"name":"sort-id","value":"sa-03"}],"links":[{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#abd950ae-092f-4b7a-b374-1c7c67fe9350","rel":"reference"}],"parts":[{"id":"sa-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Manages the information system using {{ insert: param, sa-3_prm_1 }} that incorporates information security considerations;"},{"id":"sa-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Defines and documents information security roles and responsibilities throughout the system development life cycle;"},{"id":"sa-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Identifies individuals having information security roles and responsibilities; and"},{"id":"sa-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Integrates the organizational information security risk management process into system development life cycle activities."}]},{"id":"sa-3_gdn","name":"guidance","prose":"A well-defined system development life cycle provides the foundation for the successful development, implementation, and operation of organizational information systems. To apply the required security controls within the system development life cycle requires a basic understanding of information security, threats, vulnerabilities, adverse impacts, and risk to critical missions\/business functions. The security engineering principles in SA-8 cannot be properly applied if individuals that design, code, and test information systems and system components (including information technology products) do not understand security. Therefore, organizations include qualified personnel, for example, chief information security officers, security architects, security engineers, and information system security officers in system development life cycle activities to ensure that security requirements are incorporated into organizational information systems. It is equally important that developers include individuals on the development team that possess the requisite security expertise and skills to ensure that needed security capabilities are effectively integrated into the information system. Security awareness and training programs can help ensure that individuals having key security roles and responsibilities have the appropriate experience, skills, and expertise to conduct assigned system development life cycle activities. The effective integration of security requirements into enterprise architecture also helps to ensure that important security considerations are addressed early in the system development life cycle and that those considerations are directly related to the organizational mission\/business processes. This process also facilitates the integration of the information security architecture into the enterprise architecture, consistent with organizational risk management and information security strategies.","links":[{"href":"#at-3","rel":"related"},{"href":"#pm-7","rel":"related"},{"href":"#sa-8","rel":"related"}]},{"id":"sa-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-3.a_obj","name":"objective","props":[{"name":"label","value":"SA-3(a)"}],"parts":[{"id":"sa-3.a_obj.1","name":"objective","props":[{"name":"label","value":"SA-3(a)[1]"}],"prose":"defines a system development life cycle that incorporates information security considerations to be used to manage the information system;"},{"id":"sa-3.a_obj.2","name":"objective","props":[{"name":"label","value":"SA-3(a)[2]"}],"prose":"manages the information system using the organization-defined system development life cycle;"}]},{"id":"sa-3.b_obj","name":"objective","props":[{"name":"label","value":"SA-3(b)"}],"prose":"defines and documents information security roles and responsibilities throughout the system development life cycle;"},{"id":"sa-3.c_obj","name":"objective","props":[{"name":"label","value":"SA-3(c)"}],"prose":"identifies individuals having information security roles and responsibilities; and"},{"id":"sa-3.d_obj","name":"objective","props":[{"name":"label","value":"SA-3(d)"}],"prose":"integrates the organizational information security risk management process into system development life cycle activities."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security into the system development life cycle process\n\ninformation system development life cycle documentation\n\ninformation security risk management strategy\/program documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security and system life cycle development responsibilities\n\norganizational personnel with information security risk management responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for defining and documenting the SDLC\n\norganizational processes for identifying SDLC roles and responsibilities\n\norganizational process for integrating information security risk management into the SDLC\n\nautomated mechanisms supporting and\/or implementing the SDLC"}]}]},{"id":"sa-4","class":"SP800-53","title":"Acquisition Process","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-4"},{"name":"sort-id","value":"sa-04"}],"links":[{"href":"#ad733a42-a7ed-4774-b988-4930c28852f3","rel":"reference"},{"href":"#1737a687-52fb-4008-b900-cbfa836f7b65","rel":"reference"},{"href":"#d715b234-9b5b-4e07-b1ed-99836727664d","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#0a5db899-f033-467f-8631-f5a8ba971475","rel":"reference"},{"href":"#0c775bc3-bfc3-42c7-a382-88949f503171","rel":"reference"},{"href":"#d818efd3-db31-4953-8afa-9e76afe83ce2","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#abd950ae-092f-4b7a-b374-1c7c67fe9350","rel":"reference"},{"href":"#84a37532-6db6-477b-9ea8-f9085ebca0fc","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"},{"href":"#56d671da-6b7b-4abf-8296-84b61980390a","rel":"reference"},{"href":"#c95a9986-3cd6-4a98-931b-ccfc56cb11e5","rel":"reference"},{"href":"#5ed1f4d5-1494-421b-97ed-39d3c88ab51f","rel":"reference"},{"href":"#bbd50dd1-54ce-4432-959d-63ea564b1bb4","rel":"reference"}],"parts":[{"id":"sa-4_smt","name":"statement","prose":"The organization includes the following requirements, descriptions, and criteria, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission\/business needs:","parts":[{"id":"sa-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Security functional requirements;"},{"id":"sa-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Security strength requirements;"},{"id":"sa-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Security assurance requirements;"},{"id":"sa-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Security-related documentation requirements;"},{"id":"sa-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Requirements for protecting security-related documentation;"},{"id":"sa-4_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Description of the information system development environment and environment in which the system is intended to operate; and"},{"id":"sa-4_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Acceptance criteria."}]},{"id":"sa-4_gdn","name":"guidance","prose":"Information system components are discrete, identifiable information technology assets (e.g., hardware, software, or firmware) that represent the building blocks of an information system. Information system components include commercial information technology products. Security functional requirements include security capabilities, security functions, and security mechanisms. Security strength requirements associated with such capabilities, functions, and mechanisms include degree of correctness, completeness, resistance to direct attack, and resistance to tampering or bypass. Security assurance requirements include: (i) development processes, procedures, practices, and methodologies; and (ii) evidence from development and assessment activities providing grounds for confidence that the required security functionality has been implemented and the required security strength has been achieved. Security documentation requirements address all phases of the system development life cycle. Security functionality, assurance, and documentation requirements are expressed in terms of security controls and control enhancements that have been selected through the tailoring process. The security control tailoring process includes, for example, the specification of parameter values through the use of assignment and selection statements and the specification of platform dependencies and implementation information. Security documentation provides user and administrator guidance regarding the implementation and operation of security controls. The level of detail required in security documentation is based on the security category or classification level of the information system and the degree to which organizations depend on the stated security capability, functions, or mechanisms to meet overall risk response expectations (as defined in the organizational risk management strategy). Security requirements can also include organizationally mandated configuration settings specifying allowed functions, ports, protocols, and services. Acceptance criteria for information systems, information system components, and information system services are defined in the same manner as such criteria for any organizational acquisition or procurement. The Federal Acquisition Regulation (FAR) Section 7.103 contains information security requirements from FISMA.","links":[{"href":"#cm-6","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#ps-7","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#sa-12","rel":"related"}]},{"id":"sa-4_obj","name":"objective","prose":"Determine if the organization includes the following requirements, descriptions, and criteria, explicitly or by reference, in the acquisition contracts for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission\/business needs:","parts":[{"id":"sa-4.a_obj","name":"objective","props":[{"name":"label","value":"SA-4(a)"}],"prose":"security functional requirements;"},{"id":"sa-4.b_obj","name":"objective","props":[{"name":"label","value":"SA-4(b)"}],"prose":"security strength requirements;"},{"id":"sa-4.c_obj","name":"objective","props":[{"name":"label","value":"SA-4(c)"}],"prose":"security assurance requirements;"},{"id":"sa-4.d_obj","name":"objective","props":[{"name":"label","value":"SA-4(d)"}],"prose":"security-related documentation requirements;"},{"id":"sa-4.e_obj","name":"objective","props":[{"name":"label","value":"SA-4(e)"}],"prose":"requirements for protecting security-related documentation;"},{"id":"sa-4.f_obj","name":"objective","props":[{"name":"label","value":"SA-4(f)"}],"prose":"description of:","parts":[{"id":"sa-4.f_obj.1","name":"objective","props":[{"name":"label","value":"SA-4(f)[1]"}],"prose":"the information system development environment;"},{"id":"sa-4.f_obj.2","name":"objective","props":[{"name":"label","value":"SA-4(f)[2]"}],"prose":"the environment in which the system is intended to operate; and"}]},{"id":"sa-4.g_obj","name":"objective","props":[{"name":"label","value":"SA-4(g)"}],"prose":"acceptance criteria."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\nacquisition contracts for the information system, system component, or information system service\n\ninformation system design documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security functional, strength, and assurance requirements\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for determining information system security functional, strength, and assurance requirements\n\norganizational processes for developing acquisition contracts\n\nautomated mechanisms supporting and\/or implementing acquisitions and inclusion of security requirements in contracts"}]}],"controls":[{"id":"sa-4.10","class":"SP800-53-enhancement","title":"Use of Approved PIV Products","props":[{"name":"label","value":"SA-4(10)"},{"name":"sort-id","value":"sa-04.10"}],"parts":[{"id":"sa-4.10_smt","name":"statement","prose":"The organization employs only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational information systems."},{"id":"sa-4.10_gdn","name":"guidance","links":[{"href":"#ia-2","rel":"related"},{"href":"#ia-8","rel":"related"}]},{"id":"sa-4.10_obj","name":"objective","prose":"Determine if the organization employs only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational information systems."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\nsolicitation documentation\n\nacquisition documentation\n\nacquisition contracts for the information system, system component, or information system service\n\nservice-level agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\norganizational personnel with responsibility for ensuring only FIPS 201-approved products are implemented\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for selecting and employing FIPS 201-approved products"}]}]}]},{"id":"sa-5","class":"SP800-53","title":"Information System Documentation","params":[{"id":"sa-5_prm_1","label":"organization-defined actions"},{"id":"sa-5_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"SA-5"},{"name":"sort-id","value":"sa-05"}],"parts":[{"id":"sa-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Obtains administrator documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Secure configuration, installation, and operation of the system, component, or service;"},{"id":"sa-5_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Effective use and maintenance of security functions\/mechanisms; and"},{"id":"sa-5_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Known vulnerabilities regarding configuration and use of administrative (i.e., privileged) functions;"}]},{"id":"sa-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Obtains user documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"User-accessible security functions\/mechanisms and how to effectively use those security functions\/mechanisms;"},{"id":"sa-5_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and"},{"id":"sa-5_smt.b.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"User responsibilities in maintaining the security of the system, component, or service;"}]},{"id":"sa-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent and takes {{ insert: param, sa-5_prm_1 }} in response;"},{"id":"sa-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects documentation as required, in accordance with the risk management strategy; and"},{"id":"sa-5_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Distributes documentation to {{ insert: param, sa-5_prm_2 }}."}]},{"id":"sa-5_gdn","name":"guidance","prose":"This control helps organizational personnel understand the implementation and operation of security controls associated with information systems, system components, and information system services. Organizations consider establishing specific measures to determine the quality\/completeness of the content provided. The inability to obtain needed documentation may occur, for example, due to the age of the information system\/component or lack of support from developers and contractors. In those situations, organizations may need to recreate selected documentation if such documentation is essential to the effective implementation or operation of security controls. The level of protection provided for selected information system, component, or service documentation is commensurate with the security category or classification of the system. For example, documentation associated with a key DoD weapons system or command and control system would typically require a higher level of protection than a routine administrative system. Documentation that addresses information system vulnerabilities may also require an increased level of protection. Secure operation of the information system, includes, for example, initially starting the system and resuming secure system operation after any lapse in system operation.","links":[{"href":"#cm-6","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#ps-2","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-4","rel":"related"}]},{"id":"sa-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-5.a_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)"}],"prose":"obtains administrator documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5.a.1_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)"}],"parts":[{"id":"sa-5.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)[1]"}],"prose":"secure configuration of the system, system component, or service;"},{"id":"sa-5.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)[2]"}],"prose":"secure installation of the system, system component, or service;"},{"id":"sa-5.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)[3]"}],"prose":"secure operation of the system, system component, or service;"}]},{"id":"sa-5.a.2_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)(2)"}],"parts":[{"id":"sa-5.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(a)(2)[1]"}],"prose":"effective use of the security features\/mechanisms;"},{"id":"sa-5.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(a)(2)[2]"}],"prose":"effective maintenance of the security features\/mechanisms;"}]},{"id":"sa-5.a.3_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)(3)"}],"prose":"known vulnerabilities regarding configuration and use of administrative (i.e., privileged) functions;"}]},{"id":"sa-5.b_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)"}],"prose":"obtains user documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5.b.1_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)(1)"}],"parts":[{"id":"sa-5.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(b)(1)[1]"}],"prose":"user-accessible security functions\/mechanisms;"},{"id":"sa-5.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(b)(1)[2]"}],"prose":"how to effectively use those functions\/mechanisms;"}]},{"id":"sa-5.b.2_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)(2)"}],"prose":"methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner;"},{"id":"sa-5.b.3_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)(3)"}],"prose":"user responsibilities in maintaining the security of the system, component, or service;"}]},{"id":"sa-5.c_obj","name":"objective","props":[{"name":"label","value":"SA-5(c)"}],"parts":[{"id":"sa-5.c_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(c)[1]"}],"prose":"defines actions to be taken after documented attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent;"},{"id":"sa-5.c_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(c)[2]"}],"prose":"documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent;"},{"id":"sa-5.c_obj.3","name":"objective","props":[{"name":"label","value":"SA-5(c)[3]"}],"prose":"takes organization-defined actions in response;"}]},{"id":"sa-5.d_obj","name":"objective","props":[{"name":"label","value":"SA-5(d)"}],"prose":"protects documentation as required, in accordance with the risk management strategy;"},{"id":"sa-5.e_obj","name":"objective","props":[{"name":"label","value":"SA-5(e)"}],"parts":[{"id":"sa-5.e_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(e)[1]"}],"prose":"defines personnel or roles to whom documentation is to be distributed; and"},{"id":"sa-5.e_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(e)[2]"}],"prose":"distributes documentation to organization-defined personnel or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing information system documentation\n\ninformation system documentation including administrator and user guides\n\nrecords documenting attempts to obtain unavailable or nonexistent information system documentation\n\nlist of actions to be taken in response to documented attempts to obtain information system, system component, or information system service documentation\n\nrisk management strategy documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\nsystem administrators\n\norganizational personnel operating, using, and\/or maintaining the information system\n\ninformation system developers\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for obtaining, protecting, and distributing information system administrator and user documentation"}]}]},{"id":"sa-9","class":"SP800-53","title":"External Information System Services","params":[{"id":"sa-9_prm_1","label":"organization-defined security controls"},{"id":"sa-9_prm_2","label":"organization-defined processes, methods, and techniques"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-9"},{"name":"sort-id","value":"sa-09"}],"links":[{"href":"#0c775bc3-bfc3-42c7-a382-88949f503171","rel":"reference"}],"parts":[{"id":"sa-9_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Requires that providers of external information system services comply with organizational information security requirements and employ {{ insert: param, sa-9_prm_1 }} in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"},{"id":"sa-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Defines and documents government oversight and user roles and responsibilities with regard to external information system services; and"},{"id":"sa-9_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Employs {{ insert: param, sa-9_prm_2 }} to monitor security control compliance by external service providers on an ongoing basis."}]},{"id":"sa-9_gdn","name":"guidance","prose":"External information system services are services that are implemented outside of the authorization boundaries of organizational information systems. This includes services that are used by, but not a part of, organizational information systems. FISMA and OMB policy require that organizations using external service providers that are processing, storing, or transmitting federal information or operating information systems on behalf of the federal government ensure that such providers meet the same security requirements that federal agencies are required to meet. Organizations establish relationships with external service providers in a variety of ways including, for example, through joint ventures, business partnerships, contracts, interagency agreements, lines of business arrangements, licensing agreements, and supply chain exchanges. The responsibility for managing risks from the use of external information system services remains with authorizing officials. For services external to organizations, a chain of trust requires that organizations establish and retain a level of confidence that each participating provider in the potentially complex consumer-provider relationship provides adequate protection for the services rendered. The extent and nature of this chain of trust varies based on the relationships between organizations and the external providers. Organizations document the basis for trust relationships so the relationships can be monitored over time. External information system services documentation includes government, service providers, end user security roles and responsibilities, and service-level agreements. Service-level agreements define expectations of performance for security controls, describe measurable outcomes, and identify remedies and response requirements for identified instances of noncompliance.","links":[{"href":"#ca-3","rel":"related"},{"href":"#ir-7","rel":"related"},{"href":"#ps-7","rel":"related"}]},{"id":"sa-9_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-9.a_obj","name":"objective","props":[{"name":"label","value":"SA-9(a)"}],"parts":[{"id":"sa-9.a_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(a)[1]"}],"prose":"defines security controls to be employed by providers of external information system services;"},{"id":"sa-9.a_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(a)[2]"}],"prose":"requires that providers of external information system services comply with organizational information security requirements;"},{"id":"sa-9.a_obj.3","name":"objective","props":[{"name":"label","value":"SA-9(a)[3]"}],"prose":"requires that providers of external information system services employ organization-defined security controls in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"}]},{"id":"sa-9.b_obj","name":"objective","props":[{"name":"label","value":"SA-9(b)"}],"parts":[{"id":"sa-9.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(b)[1]"}],"prose":"defines and documents government oversight with regard to external information system services;"},{"id":"sa-9.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(b)[2]"}],"prose":"defines and documents user roles and responsibilities with regard to external information system services;"}]},{"id":"sa-9.c_obj","name":"objective","props":[{"name":"label","value":"SA-9(c)"}],"parts":[{"id":"sa-9.c_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(c)[1]"}],"prose":"defines processes, methods, and techniques to be employed to monitor security control compliance by external service providers; and"},{"id":"sa-9.c_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(c)[2]"}],"prose":"employs organization-defined processes, methods, and techniques to monitor security control compliance by external service providers on an ongoing basis."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing external information system services\n\nprocedures addressing methods and techniques for monitoring security control compliance by external service providers of information system services\n\nacquisition contracts, service-level agreements\n\norganizational security requirements and security specifications for external provider services\n\nsecurity control assessment evidence from external providers of information system services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\nexternal providers of information system services\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring security control compliance by external service providers on an ongoing basis\n\nautomated mechanisms for monitoring security control compliance by external service providers on an ongoing basis"}]}]}]},{"id":"sc","class":"family","title":"System and Communications Protection","controls":[{"id":"sc-1","class":"SP800-53","title":"System and Communications Protection Policy and Procedures","params":[{"id":"sc-1_prm_1","label":"organization-defined personnel or roles"},{"id":"sc-1_prm_2","label":"organization-defined frequency"},{"id":"sc-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-1"},{"name":"sort-id","value":"sc-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"sc-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"sc-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, sc-1_prm_1 }}:","parts":[{"id":"sc-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"sc-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls; and"}]},{"id":"sc-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"sc-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System and communications protection policy {{ insert: param, sc-1_prm_2 }}; and"},{"id":"sc-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System and communications protection procedures {{ insert: param, sc-1_prm_3 }}."}]}]},{"id":"sc-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the SC family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"sc-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-1.a_obj","name":"objective","props":[{"name":"label","value":"SC-1(a)"}],"parts":[{"id":"sc-1.a.1_obj","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)"}],"parts":[{"id":"sc-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1]"}],"prose":"develops and documents a system and communications protection policy that addresses:","parts":[{"id":"sc-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"sc-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"sc-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"sc-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"sc-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"sc-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"sc-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"sc-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system and communications protection policy is to be disseminated;"},{"id":"sc-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[3]"}],"prose":"disseminates the system and communications protection policy to organization-defined personnel or roles;"}]},{"id":"sc-1.a.2_obj","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)"}],"parts":[{"id":"sc-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls;"},{"id":"sc-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"sc-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"sc-1.b_obj","name":"objective","props":[{"name":"label","value":"SC-1(b)"}],"parts":[{"id":"sc-1.b.1_obj","name":"objective","props":[{"name":"label","value":"SC-1(b)(1)"}],"parts":[{"id":"sc-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system and communications protection policy;"},{"id":"sc-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(b)(1)[2]"}],"prose":"reviews and updates the current system and communications protection policy with the organization-defined frequency;"}]},{"id":"sc-1.b.2_obj","name":"objective","props":[{"name":"label","value":"SC-1(b)(2)"}],"parts":[{"id":"sc-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system and communications protection procedures; and"},{"id":"sc-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(b)(2)[2]"}],"prose":"reviews and updates the current system and communications protection procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and communications protection responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"sc-5","class":"SP800-53","title":"Denial of Service Protection","params":[{"id":"sc-5_prm_1","label":"organization-defined types of denial of service attacks or references to sources for such information"},{"id":"sc-5_prm_2","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-5"},{"name":"sort-id","value":"sc-05"}],"parts":[{"id":"sc-5_smt","name":"statement","prose":"The information system protects against or limits the effects of the following types of denial of service attacks: {{ insert: param, sc-5_prm_1 }} by employing {{ insert: param, sc-5_prm_2 }}."},{"id":"sc-5_gdn","name":"guidance","prose":"A variety of technologies exist to limit, or in some cases, eliminate the effects of denial of service attacks. For example, boundary protection devices can filter certain types of packets to protect information system components on internal organizational networks from being directly affected by denial of service attacks. Employing increased capacity and bandwidth combined with service redundancy may also reduce the susceptibility to denial of service attacks.","links":[{"href":"#sc-6","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"sc-5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-5_obj.1","name":"objective","props":[{"name":"label","value":"SC-5[1]"}],"prose":"the organization defines types of denial of service attacks or reference to source of such information for the information system to protect against or limit the effects;"},{"id":"sc-5_obj.2","name":"objective","props":[{"name":"label","value":"SC-5[2]"}],"prose":"the organization defines security safeguards to be employed by the information system to protect against or limit the effects of organization-defined types of denial of service attacks; and"},{"id":"sc-5_obj.3","name":"objective","props":[{"name":"label","value":"SC-5[3]"}],"prose":"the information system protects against or limits the effects of the organization-defined denial or service attacks (or reference to source for such information) by employing organization-defined security safeguards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing denial of service protection\n\ninformation system design documentation\n\nsecurity plan\n\nlist of denial of services attacks requiring employment of security safeguards to protect against or limit effects of such attacks\n\nlist of security safeguards protecting against or limiting the effects of denial of service attacks\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with incident response responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms protecting against or limiting the effects of denial of service attacks"}]}]},{"id":"sc-7","class":"SP800-53","title":"Boundary Protection","params":[{"id":"sc-7_prm_1","select":{"choice":["physically","logically"]}}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-7"},{"name":"sort-id","value":"sc-07"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#756a8e86-57d5-4701-8382-f7a40439665a","rel":"reference"},{"href":"#99f331f2-a9f0-46c2-9856-a3cbb9b89442","rel":"reference"}],"parts":[{"id":"sc-7_smt","name":"statement","prose":"The information system:","parts":[{"id":"sc-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Monitors and controls communications at the external boundary of the system and at key internal boundaries within the system;"},{"id":"sc-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Implements subnetworks for publicly accessible system components that are {{ insert: param, sc-7_prm_1 }} separated from internal organizational networks; and"},{"id":"sc-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture."}]},{"id":"sc-7_gdn","name":"guidance","prose":"Managed interfaces include, for example, gateways, routers, firewalls, guards, network-based malicious code analysis and virtualization systems, or encrypted tunnels implemented within a security architecture (e.g., routers protecting firewalls or application gateways residing on protected subnetworks). Subnetworks that are physically or logically separated from internal networks are referred to as demilitarized zones or DMZs. Restricting or prohibiting interfaces within organizational information systems includes, for example, restricting external web traffic to designated web servers within managed interfaces and prohibiting external traffic that appears to be spoofing internal addresses. Organizations consider the shared nature of commercial telecommunications services in the implementation of security controls associated with the use of such services. Commercial telecommunications services are commonly based on network components and consolidated management systems shared by all attached commercial customers, and may also include third party-provided access lines and other service elements. Such transmission services may represent sources of increased risk despite contract security provisions.","links":[{"href":"#ac-4","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#cp-8","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"sc-7_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"sc-7.a_obj","name":"objective","props":[{"name":"label","value":"SC-7(a)"}],"parts":[{"id":"sc-7.a_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(a)[1]"}],"prose":"monitors communications at the external boundary of the information system;"},{"id":"sc-7.a_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(a)[2]"}],"prose":"monitors communications at key internal boundaries within the system;"},{"id":"sc-7.a_obj.3","name":"objective","props":[{"name":"label","value":"SC-7(a)[3]"}],"prose":"controls communications at the external boundary of the information system;"},{"id":"sc-7.a_obj.4","name":"objective","props":[{"name":"label","value":"SC-7(a)[4]"}],"prose":"controls communications at key internal boundaries within the system;"}]},{"id":"sc-7.b_obj","name":"objective","props":[{"name":"label","value":"SC-7(b)"}],"prose":"implements subnetworks for publicly accessible system components that are either:","parts":[{"id":"sc-7.b_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(b)[1]"}],"prose":"physically separated from internal organizational networks; and\/or"},{"id":"sc-7.b_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(b)[2]"}],"prose":"logically separated from internal organizational networks; and"}]},{"id":"sc-7.c_obj","name":"objective","props":[{"name":"label","value":"SC-7(c)"}],"prose":"connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\nlist of key internal boundaries of the information system\n\ninformation system design documentation\n\nboundary protection hardware and software\n\ninformation system configuration settings and associated documentation\n\nenterprise security architecture documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing boundary protection capability"}]}]},{"id":"sc-12","class":"SP800-53","title":"Cryptographic Key Establishment and Management","params":[{"id":"sc-12_prm_1","label":"organization-defined requirements for key generation, distribution, storage, access, and destruction"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-12"},{"name":"sort-id","value":"sc-12"}],"links":[{"href":"#81f09e01-d0b0-4ae2-aa6a-064ed9950070","rel":"reference"},{"href":"#a6c774c0-bf50-4590-9841-2a5c1c91ac6f","rel":"reference"}],"parts":[{"id":"sc-12_smt","name":"statement","prose":"The organization establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with {{ insert: param, sc-12_prm_1 }}."},{"id":"sc-12_gdn","name":"guidance","prose":"Cryptographic key management and establishment can be performed using manual procedures or automated mechanisms with supporting manual procedures. Organizations define key management requirements in accordance with applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance, specifying appropriate options, levels, and parameters. Organizations manage trust stores to ensure that only approved trust anchors are in such trust stores. This includes certificates with visibility external to organizational information systems and certificates related to the internal operations of systems.","links":[{"href":"#sc-13","rel":"related"},{"href":"#sc-17","rel":"related"}]},{"id":"sc-12_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-12_obj.1","name":"objective","props":[{"name":"label","value":"SC-12[1]"}],"prose":"defines requirements for cryptographic key:","parts":[{"id":"sc-12_obj.1.a","name":"objective","props":[{"name":"label","value":"SC-12[1][a]"}],"prose":"generation;"},{"id":"sc-12_obj.1.b","name":"objective","props":[{"name":"label","value":"SC-12[1][b]"}],"prose":"distribution;"},{"id":"sc-12_obj.1.c","name":"objective","props":[{"name":"label","value":"SC-12[1][c]"}],"prose":"storage;"},{"id":"sc-12_obj.1.d","name":"objective","props":[{"name":"label","value":"SC-12[1][d]"}],"prose":"access;"},{"id":"sc-12_obj.1.e","name":"objective","props":[{"name":"label","value":"SC-12[1][e]"}],"prose":"destruction; and"}]},{"id":"sc-12_obj.2","name":"objective","props":[{"name":"label","value":"SC-12[2]"}],"prose":"establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key generation, distribution, storage, access, and destruction."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing cryptographic key establishment and management\n\ninformation system design documentation\n\ncryptographic mechanisms\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for cryptographic key establishment and\/or management"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing cryptographic key establishment and management"}]}]},{"id":"sc-13","class":"SP800-53","title":"Cryptographic Protection","params":[{"id":"sc-13_prm_1","label":"organization-defined cryptographic uses and type of cryptography required for each use"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-13"},{"name":"sort-id","value":"sc-13"}],"links":[{"href":"#39f9087d-7687-46d2-8eda-b6f4b7a4d8a9","rel":"reference"},{"href":"#6a1041fc-054e-4230-946b-2e6f4f3731bb","rel":"reference"},{"href":"#9b97ed27-3dd6-4f9a-ade5-1b43e9669794","rel":"reference"}],"parts":[{"id":"sc-13_smt","name":"statement","prose":"The information system implements {{ insert: param, sc-13_prm_1 }} in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards."},{"id":"sc-13_gdn","name":"guidance","prose":"Cryptography can be employed to support a variety of security solutions including, for example, the protection of classified and Controlled Unclassified Information, the provision of digital signatures, and the enforcement of information separation when authorized individuals have the necessary clearances for such information but lack the necessary formal access approvals. Cryptography can also be used to support random number generation and hash generation. Generally applicable cryptographic standards include FIPS-validated cryptography and NSA-approved cryptography. This control does not impose any requirements on organizations to use cryptography. However, if cryptography is required based on the selection of other security controls, organizations define each type of cryptographic use and the type of cryptography required (e.g., protection of classified information: NSA-approved cryptography; provision of digital signatures: FIPS-validated cryptography).","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-7","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#au-10","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-7","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-28","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"sc-13_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-13_obj.1","name":"objective","props":[{"name":"label","value":"SC-13[1]"}],"prose":"the organization defines cryptographic uses; and"},{"id":"sc-13_obj.2","name":"objective","props":[{"name":"label","value":"SC-13[2]"}],"prose":"the organization defines the type of cryptography required for each use; and"},{"id":"sc-13_obj.3","name":"objective","props":[{"name":"label","value":"SC-13[3]"}],"prose":"the information system implements the organization-defined cryptographic uses and type of cryptography required for each use in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing cryptographic protection\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ncryptographic module validation certificates\n\nlist of FIPS validated cryptographic modules\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with responsibilities for cryptographic protection"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing cryptographic protection"}]}]},{"id":"sc-15","class":"SP800-53","title":"Collaborative Computing Devices","params":[{"id":"sc-15_prm_1","label":"organization-defined exceptions where remote activation is to be allowed"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-15"},{"name":"sort-id","value":"sc-15"}],"parts":[{"id":"sc-15_smt","name":"statement","prose":"The information system:","parts":[{"id":"sc-15_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Prohibits remote activation of collaborative computing devices with the following exceptions: {{ insert: param, sc-15_prm_1 }}; and"},{"id":"sc-15_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Provides an explicit indication of use to users physically present at the devices."}]},{"id":"sc-15_gdn","name":"guidance","prose":"Collaborative computing devices include, for example, networked white boards, cameras, and microphones. Explicit indication of use includes, for example, signals to users when collaborative computing devices are activated.","links":[{"href":"#ac-21","rel":"related"}]},{"id":"sc-15_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-15.a_obj","name":"objective","props":[{"name":"label","value":"SC-15(a)"}],"parts":[{"id":"sc-15.a_obj.1","name":"objective","props":[{"name":"label","value":"SC-15(a)[1]"}],"prose":"the organization defines exceptions where remote activation of collaborative computing devices is to be allowed;"},{"id":"sc-15.a_obj.2","name":"objective","props":[{"name":"label","value":"SC-15(a)[2]"}],"prose":"the information system prohibits remote activation of collaborative computing devices, except for organization-defined exceptions where remote activation is to be allowed; and"}]},{"id":"sc-15.b_obj","name":"objective","props":[{"name":"label","value":"SC-15(b)"}],"prose":"the information system provides an explicit indication of use to users physically present at the devices."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing collaborative computing\n\naccess control policy and procedures\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with responsibilities for managing collaborative computing devices"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing management of remote activation of collaborative computing devices\n\nautomated mechanisms providing an indication of use of collaborative computing devices"}]}]},{"id":"sc-20","class":"SP800-53","title":"Secure Name \/ Address Resolution Service (authoritative Source)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-20"},{"name":"sort-id","value":"sc-20"}],"links":[{"href":"#28115a56-da6b-4d44-b1df-51dd7f048a3e","rel":"reference"},{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"}],"parts":[{"id":"sc-20_smt","name":"statement","prose":"The information system:","parts":[{"id":"sc-20_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Provides additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name\/address resolution queries; and"},{"id":"sc-20_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Provides the means to indicate the security status of child zones and (if the child supports secure resolution services) to enable verification of a chain of trust among parent and child domains, when operating as part of a distributed, hierarchical namespace."}]},{"id":"sc-20_gdn","name":"guidance","prose":"This control enables external clients including, for example, remote Internet clients, to obtain origin authentication and integrity verification assurances for the host\/service name to network address resolution information obtained through the service. Information systems that provide name and address resolution services include, for example, domain name system (DNS) servers. Additional artifacts include, for example, DNS Security (DNSSEC) digital signatures and cryptographic keys. DNS resource records are examples of authoritative data. The means to indicate the security status of child zones includes, for example, the use of delegation signer resource records in the DNS. The DNS security controls reflect (and are referenced from) OMB Memorandum 08-23. Information systems that use technologies other than the DNS to map between host\/service names and network addresses provide other means to assure the authenticity and integrity of response data.","links":[{"href":"#au-10","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-21","rel":"related"},{"href":"#sc-22","rel":"related"}]},{"id":"sc-20_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"sc-20.a_obj","name":"objective","props":[{"name":"label","value":"SC-20(a)"}],"prose":"provides additional data origin and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name\/address resolution queries;"},{"id":"sc-20.b_obj","name":"objective","props":[{"name":"label","value":"SC-20(b)"}],"prose":"provides the means to, when operating as part of a distributed, hierarchical namespace:","parts":[{"id":"sc-20.b_obj.1","name":"objective","props":[{"name":"label","value":"SC-20(b)[1]"}],"prose":"indicate the security status of child zones; and"},{"id":"sc-20.b_obj.2","name":"objective","props":[{"name":"label","value":"SC-20(b)[2]"}],"prose":"enable verification of a chain of trust among parent and child domains (if the child supports secure resolution services)."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing secure name\/address resolution service (authoritative source)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing DNS"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing secure name\/address resolution service"}]}]},{"id":"sc-21","class":"SP800-53","title":"Secure Name \/ Address Resolution Service (recursive or Caching Resolver)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-21"},{"name":"sort-id","value":"sc-21"}],"links":[{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"}],"parts":[{"id":"sc-21_smt","name":"statement","prose":"The information system requests and performs data origin authentication and data integrity verification on the name\/address resolution responses the system receives from authoritative sources."},{"id":"sc-21_gdn","name":"guidance","prose":"Each client of name resolution services either performs this validation on its own, or has authenticated channels to trusted validation providers. Information systems that provide name and address resolution services for local clients include, for example, recursive resolving or caching domain name system (DNS) servers. DNS client resolvers either perform validation of DNSSEC signatures, or clients use authenticated channels to recursive resolvers that perform such validations. Information systems that use technologies other than the DNS to map between host\/service names and network addresses provide other means to enable clients to verify the authenticity and integrity of response data.","links":[{"href":"#sc-20","rel":"related"},{"href":"#sc-22","rel":"related"}]},{"id":"sc-21_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"sc-21_obj.1","name":"objective","props":[{"name":"label","value":"SC-21[1]"}],"prose":"requests data origin authentication on the name\/address resolution responses the system receives from authoritative sources;"},{"id":"sc-21_obj.2","name":"objective","props":[{"name":"label","value":"SC-21[2]"}],"prose":"requests data integrity verification on the name\/address resolution responses the system receives from authoritative sources;"},{"id":"sc-21_obj.3","name":"objective","props":[{"name":"label","value":"SC-21[3]"}],"prose":"performs data origin authentication on the name\/address resolution responses the system receives from authoritative sources; and"},{"id":"sc-21_obj.4","name":"objective","props":[{"name":"label","value":"SC-21[4]"}],"prose":"performs data integrity verification on the name\/address resolution responses the system receives from authoritative sources."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing secure name\/address resolution service (recursive or caching resolver)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing DNS"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing data origin authentication and data integrity verification for name\/address resolution services"}]}]},{"id":"sc-22","class":"SP800-53","title":"Architecture and Provisioning for Name \/ Address Resolution Service","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-22"},{"name":"sort-id","value":"sc-22"}],"links":[{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"}],"parts":[{"id":"sc-22_smt","name":"statement","prose":"The information systems that collectively provide name\/address resolution service for an organization are fault-tolerant and implement internal\/external role separation."},{"id":"sc-22_gdn","name":"guidance","prose":"Information systems that provide name and address resolution services include, for example, domain name system (DNS) servers. To eliminate single points of failure and to enhance redundancy, organizations employ at least two authoritative domain name system servers, one configured as the primary server and the other configured as the secondary server. Additionally, organizations typically deploy the servers in two geographically separated network subnetworks (i.e., not located in the same physical facility). For role separation, DNS servers with internal roles only process name and address resolution requests from within organizations (i.e., from internal clients). DNS servers with external roles only process name and address resolution information requests from clients external to organizations (i.e., on external networks including the Internet). Organizations specify clients that can access authoritative DNS servers in particular roles (e.g., by address ranges, explicit lists).","links":[{"href":"#sc-2","rel":"related"},{"href":"#sc-20","rel":"related"},{"href":"#sc-21","rel":"related"},{"href":"#sc-24","rel":"related"}]},{"id":"sc-22_obj","name":"objective","prose":"Determine if the information systems that collectively provide name\/address resolution service for an organization:","parts":[{"id":"sc-22_obj.1","name":"objective","props":[{"name":"label","value":"SC-22[1]"}],"prose":"are fault tolerant; and"},{"id":"sc-22_obj.2","name":"objective","props":[{"name":"label","value":"SC-22[2]"}],"prose":"implement internal\/external role separation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing architecture and provisioning for name\/address resolution service\n\naccess control policy and procedures\n\ninformation system design documentation\n\nassessment results from independent, testing organizations\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing DNS"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing name\/address resolution service for fault tolerance and role separation"}]}]},{"id":"sc-39","class":"SP800-53","title":"Process Isolation","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-39"},{"name":"sort-id","value":"sc-39"}],"parts":[{"id":"sc-39_smt","name":"statement","prose":"The information system maintains a separate execution domain for each executing process."},{"id":"sc-39_gdn","name":"guidance","prose":"Information systems can maintain separate execution domains for each executing process by assigning each process a separate address space. Each information system process has a distinct address space so that communication between processes is performed in a manner controlled through the security functions, and one process cannot modify the executing code of another process. Maintaining separate execution domains for executing processes can be achieved, for example, by implementing separate address spaces. This capability is available in most commercial operating systems that employ multi-state processor technologies.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sc-2","rel":"related"},{"href":"#sc-3","rel":"related"}]},{"id":"sc-39_obj","name":"objective","prose":"Determine if the information system maintains a separate execution domain for each executing process."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system design documentation\n\ninformation system architecture\n\nindependent verification and validation documentation\n\ntesting and evaluation documentation, other relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Information system developers\/integrators\n\ninformation system security architect"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing separate execution domains for each executing process"}]}]}]},{"id":"si","class":"family","title":"System and Information Integrity","controls":[{"id":"si-1","class":"SP800-53","title":"System and Information Integrity Policy and Procedures","params":[{"id":"si-1_prm_1","label":"organization-defined personnel or roles"},{"id":"si-1_prm_2","label":"organization-defined frequency"},{"id":"si-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-1"},{"name":"sort-id","value":"si-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"si-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, si-1_prm_1 }}:","parts":[{"id":"si-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system and information integrity policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"si-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system and information integrity policy and associated system and information integrity controls; and"}]},{"id":"si-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"si-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System and information integrity policy {{ insert: param, si-1_prm_2 }}; and"},{"id":"si-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System and information integrity procedures {{ insert: param, si-1_prm_3 }}."}]}]},{"id":"si-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the SI family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"si-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-1.a_obj","name":"objective","props":[{"name":"label","value":"SI-1(a)"}],"parts":[{"id":"si-1.a.1_obj","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)"}],"parts":[{"id":"si-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1]"}],"prose":"develops and documents a system and information integrity policy that addresses:","parts":[{"id":"si-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"si-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"si-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"si-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"si-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"si-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"si-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"si-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system and information integrity policy is to be disseminated;"},{"id":"si-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[3]"}],"prose":"disseminates the system and information integrity policy to organization-defined personnel or roles;"}]},{"id":"si-1.a.2_obj","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)"}],"parts":[{"id":"si-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the system and information integrity policy and associated system and information integrity controls;"},{"id":"si-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"si-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"si-1.b_obj","name":"objective","props":[{"name":"label","value":"SI-1(b)"}],"parts":[{"id":"si-1.b.1_obj","name":"objective","props":[{"name":"label","value":"SI-1(b)(1)"}],"parts":[{"id":"si-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system and information integrity policy;"},{"id":"si-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(b)(1)[2]"}],"prose":"reviews and updates the current system and information integrity policy with the organization-defined frequency;"}]},{"id":"si-1.b.2_obj","name":"objective","props":[{"name":"label","value":"SI-1(b)(2)"}],"parts":[{"id":"si-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system and information integrity procedures; and"},{"id":"si-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(b)(2)[2]"}],"prose":"reviews and updates the current system and information integrity procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and information integrity responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"si-2","class":"SP800-53","title":"Flaw Remediation","params":[{"id":"si-2_prm_1","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-2"},{"name":"sort-id","value":"si-02"}],"links":[{"href":"#bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","rel":"reference"},{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"si-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Identifies, reports, and corrects information system flaws;"},{"id":"si-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Tests software and firmware updates related to flaw remediation for effectiveness and potential side effects before installation;"},{"id":"si-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Installs security-relevant software and firmware updates within {{ insert: param, si-2_prm_1 }} of the release of the updates; and"},{"id":"si-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Incorporates flaw remediation into the organizational configuration management process."}]},{"id":"si-2_gdn","name":"guidance","prose":"Organizations identify information systems affected by announced software flaws including potential vulnerabilities resulting from those flaws, and report this information to designated organizational personnel with information security responsibilities. Security-relevant software updates include, for example, patches, service packs, hot fixes, and anti-virus signatures. Organizations also address flaws discovered during security assessments, continuous monitoring, incident response activities, and system error handling. Organizations take advantage of available resources such as the Common Weakness Enumeration (CWE) or Common Vulnerabilities and Exposures (CVE) databases in remediating flaws discovered in organizational information systems. By incorporating flaw remediation into ongoing configuration management processes, required\/anticipated remediation actions can be tracked and verified. Flaw remediation actions that can be tracked and verified include, for example, determining whether organizations follow US-CERT guidance and Information Assurance Vulnerability Alerts. Organization-defined time periods for updating security-relevant software and firmware may vary based on a variety of factors including, for example, the security category of the information system or the criticality of the update (i.e., severity of the vulnerability related to the discovered flaw). Some types of flaw remediation may require more testing than other types. Organizations determine the degree and type of testing needed for the specific type of flaw remediation activity under consideration and also the types of changes that are to be configuration-managed. In some situations, organizations may determine that the testing of software and\/or firmware updates is not necessary or practical, for example, when implementing simple anti-virus signature updates. Organizations may also consider in testing decisions, whether security-relevant software or firmware updates are obtained from authorized sources with appropriate digital signatures.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#ma-2","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#si-11","rel":"related"}]},{"id":"si-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-2.a_obj","name":"objective","props":[{"name":"label","value":"SI-2(a)"}],"parts":[{"id":"si-2.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(a)[1]"}],"prose":"identifies information system flaws;"},{"id":"si-2.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(a)[2]"}],"prose":"reports information system flaws;"},{"id":"si-2.a_obj.3","name":"objective","props":[{"name":"label","value":"SI-2(a)[3]"}],"prose":"corrects information system flaws;"}]},{"id":"si-2.b_obj","name":"objective","props":[{"name":"label","value":"SI-2(b)"}],"parts":[{"id":"si-2.b_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(b)[1]"}],"prose":"tests software updates related to flaw remediation for effectiveness and potential side effects before installation;"},{"id":"si-2.b_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(b)[2]"}],"prose":"tests firmware updates related to flaw remediation for effectiveness and potential side effects before installation;"}]},{"id":"si-2.c_obj","name":"objective","props":[{"name":"label","value":"SI-2(c)"}],"parts":[{"id":"si-2.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(c)[1]"}],"prose":"defines the time period within which to install security-relevant software updates after the release of the updates;"},{"id":"si-2.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(c)[2]"}],"prose":"defines the time period within which to install security-relevant firmware updates after the release of the updates;"},{"id":"si-2.c_obj.3","name":"objective","props":[{"name":"label","value":"SI-2(c)[3]"}],"prose":"installs software updates within the organization-defined time period of the release of the updates;"},{"id":"si-2.c_obj.4","name":"objective","props":[{"name":"label","value":"SI-2(c)[4]"}],"prose":"installs firmware updates within the organization-defined time period of the release of the updates; and"}]},{"id":"si-2.d_obj","name":"objective","props":[{"name":"label","value":"SI-2(d)"}],"prose":"incorporates flaw remediation into the organizational configuration management process."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing flaw remediation\n\nprocedures addressing configuration management\n\nlist of flaws and vulnerabilities potentially affecting the information system\n\nlist of recent security flaw remediation actions performed on the information system (e.g., list of installed patches, service packs, hot fixes, and other software updates to correct information system flaws)\n\ntest results from the installation of software and firmware updates to correct information system flaws\n\ninstallation\/change control records for security-relevant software and firmware updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for flaw remediation\n\norganizational personnel with configuration management responsibility"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for identifying, reporting, and correcting information system flaws\n\norganizational process for installing software and firmware updates\n\nautomated mechanisms supporting and\/or implementing reporting, and correcting information system flaws\n\nautomated mechanisms supporting and\/or implementing testing software and firmware updates"}]}]},{"id":"si-3","class":"SP800-53","title":"Malicious Code Protection","params":[{"id":"si-3_prm_1","label":"organization-defined frequency"},{"id":"si-3_prm_2","select":{"how-many":"one-or-more","choice":["endpoint","network entry\/exit points"]}},{"id":"si-3_prm_3","select":{"how-many":"one-or-more","choice":["block malicious code","quarantine malicious code","send alert to administrator"," {{ insert: param, si-3_prm_4 }} "]}},{"id":"si-3_prm_4","depends-on":"si-3_prm_3","label":"organization-defined action"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-3"},{"name":"sort-id","value":"si-03"}],"links":[{"href":"#6d431fee-658f-4a0e-9f2e-a38b5d398fab","rel":"reference"}],"parts":[{"id":"si-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code;"},{"id":"si-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures;"},{"id":"si-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Configures malicious code protection mechanisms to:","parts":[{"id":"si-3_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Perform periodic scans of the information system {{ insert: param, si-3_prm_1 }} and real-time scans of files from external sources at {{ insert: param, si-3_prm_2 }} as the files are downloaded, opened, or executed in accordance with organizational security policy; and"},{"id":"si-3_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":" {{ insert: param, si-3_prm_3 }} in response to malicious code detection; and"}]},{"id":"si-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Addresses the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the information system."}]},{"id":"si-3_gdn","name":"guidance","prose":"Information system entry and exit points include, for example, firewalls, electronic mail servers, web servers, proxy servers, remote-access servers, workstations, notebook computers, and mobile devices. Malicious code includes, for example, viruses, worms, Trojan horses, and spyware. Malicious code can also be encoded in various formats (e.g., UUENCODE, Unicode), contained within compressed or hidden files, or hidden in files using steganography. Malicious code can be transported by different means including, for example, web accesses, electronic mail, electronic mail attachments, and portable storage devices. Malicious code insertions occur through the exploitation of information system vulnerabilities. Malicious code protection mechanisms include, for example, anti-virus signature definitions and reputation-based technologies. A variety of technologies and methods exist to limit or eliminate the effects of malicious code. Pervasive configuration management and comprehensive software integrity controls may be effective in preventing execution of unauthorized code. In addition to commercial off-the-shelf software, malicious code may also be present in custom-built software. This could include, for example, logic bombs, back doors, and other types of cyber attacks that could affect organizational missions\/business functions. Traditional malicious code protection mechanisms cannot always detect such code. In these situations, organizations rely instead on other safeguards including, for example, secure coding practices, configuration management and control, trusted procurement processes, and monitoring practices to help ensure that software does not perform functions other than the functions intended. Organizations may determine that in response to the detection of malicious code, different actions may be warranted. For example, organizations can define actions in response to malicious code detection during periodic scans, actions in response to detection of malicious downloads, and\/or actions in response to detection of maliciousness when attempting to open or execute files.","links":[{"href":"#cm-3","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#sa-13","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-26","rel":"related"},{"href":"#sc-44","rel":"related"},{"href":"#si-2","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"si-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-3.a_obj","name":"objective","props":[{"name":"label","value":"SI-3(a)"}],"prose":"employs malicious code protection mechanisms to detect and eradicate malicious code at information system:","parts":[{"id":"si-3.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-3(a)[1]"}],"prose":"entry points;"},{"id":"si-3.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-3(a)[2]"}],"prose":"exit points;"}]},{"id":"si-3.b_obj","name":"objective","props":[{"name":"label","value":"SI-3(b)"}],"prose":"updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures (as identified in CM-1);"},{"id":"si-3.c_obj","name":"objective","props":[{"name":"label","value":"SI-3(c)"}],"parts":[{"id":"si-3.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-3(c)[1]"}],"prose":"defines a frequency for malicious code protection mechanisms to perform periodic scans of the information system;"},{"id":"si-3.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-3(c)[2]"}],"prose":"defines action to be initiated by malicious protection mechanisms in response to malicious code detection;"},{"id":"si-3.c_obj.3","name":"objective","props":[{"name":"label","value":"SI-3(c)[3]"}],"parts":[{"id":"si-3.c.1_obj.3","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](1)"}],"prose":"configures malicious code protection mechanisms to:","parts":[{"id":"si-3.c.1_obj.3.a","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](1)[a]"}],"prose":"perform periodic scans of the information system with the organization-defined frequency;"},{"id":"si-3.c.1_obj.3.b","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](1)[b]"}],"prose":"perform real-time scans of files from external sources at endpoint and\/or network entry\/exit points as the files are downloaded, opened, or executed in accordance with organizational security policy;"}]},{"id":"si-3.c.2_obj.3","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)"}],"prose":"configures malicious code protection mechanisms to do one or more of the following:","parts":[{"id":"si-3.c.2_obj.3.a","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[a]"}],"prose":"block malicious code in response to malicious code detection;"},{"id":"si-3.c.2_obj.3.b","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[b]"}],"prose":"quarantine malicious code in response to malicious code detection;"},{"id":"si-3.c.2_obj.3.c","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[c]"}],"prose":"send alert to administrator in response to malicious code detection; and\/or"},{"id":"si-3.c.2_obj.3.d","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[d]"}],"prose":"initiate organization-defined action in response to malicious code detection;"}]}]}]},{"id":"si-3.d_obj","name":"objective","props":[{"name":"label","value":"SI-3(d)"}],"parts":[{"id":"si-3.d_obj.1","name":"objective","props":[{"name":"label","value":"SI-3(d)[1]"}],"prose":"addresses the receipt of false positives during malicious code detection and eradication; and"},{"id":"si-3.d_obj.2","name":"objective","props":[{"name":"label","value":"SI-3(d)[2]"}],"prose":"addresses the resulting potential impact on the availability of the information system."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nconfiguration management policy and procedures\n\nprocedures addressing malicious code protection\n\nmalicious code protection mechanisms\n\nrecords of malicious code protection updates\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nscan results from malicious code protection mechanisms\n\nrecord of actions initiated by malicious code protection mechanisms in response to malicious code detection\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for malicious code protection\n\norganizational personnel with configuration management responsibility"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for employing, updating, and configuring malicious code protection mechanisms\n\norganizational process for addressing false positives and resulting potential impact\n\nautomated mechanisms supporting and\/or implementing employing, updating, and configuring malicious code protection mechanisms\n\nautomated mechanisms supporting and\/or implementing malicious code scanning and subsequent actions"}]}]},{"id":"si-4","class":"SP800-53","title":"Information System Monitoring","params":[{"id":"si-4_prm_1","label":"organization-defined monitoring objectives"},{"id":"si-4_prm_2","label":"organization-defined techniques and methods"},{"id":"si-4_prm_3","label":"organization-defined information system monitoring information"},{"id":"si-4_prm_4","label":"organization-defined personnel or roles"},{"id":"si-4_prm_5","select":{"how-many":"one-or-more","choice":["as needed"," {{ insert: param, si-4_prm_6 }} "]}},{"id":"si-4_prm_6","depends-on":"si-4_prm_5","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-4"},{"name":"sort-id","value":"si-04"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"},{"href":"#6d431fee-658f-4a0e-9f2e-a38b5d398fab","rel":"reference"},{"href":"#672fd561-b92b-4713-b9cf-6c9d9456728b","rel":"reference"},{"href":"#d1b1d689-0f66-4474-9924-c81119758dc1","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"}],"parts":[{"id":"si-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Monitors the information system to detect:","parts":[{"id":"si-4_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Attacks and indicators of potential attacks in accordance with {{ insert: param, si-4_prm_1 }}; and"},{"id":"si-4_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Unauthorized local, network, and remote connections;"}]},{"id":"si-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Identifies unauthorized use of the information system through {{ insert: param, si-4_prm_2 }};"},{"id":"si-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Deploys monitoring devices:","parts":[{"id":"si-4_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Strategically within the information system to collect organization-determined essential information; and"},{"id":"si-4_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"At ad hoc locations within the system to track specific types of transactions of interest to the organization;"}]},{"id":"si-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects information obtained from intrusion-monitoring tools from unauthorized access, modification, and deletion;"},{"id":"si-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information;"},{"id":"si-4_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations; and"},{"id":"si-4_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Provides {{ insert: param, si-4_prm_3 }} to {{ insert: param, si-4_prm_4 }} {{ insert: param, si-4_prm_5 }}."}]},{"id":"si-4_gdn","name":"guidance","prose":"Information system monitoring includes external and internal monitoring. External monitoring includes the observation of events occurring at the information system boundary (i.e., part of perimeter defense and boundary protection). Internal monitoring includes the observation of events occurring within the information system. Organizations can monitor information systems, for example, by observing audit activities in real time or by observing other system aspects such as access patterns, characteristics of access, and other actions. The monitoring objectives may guide determination of the events. Information system monitoring capability is achieved through a variety of tools and techniques (e.g., intrusion detection systems, intrusion prevention systems, malicious code protection software, scanning tools, audit record monitoring software, network monitoring software). Strategic locations for monitoring devices include, for example, selected perimeter locations and near server farms supporting critical applications, with such devices typically being employed at the managed interfaces associated with controls SC-7 and AC-17. Einstein network monitoring devices from the Department of Homeland Security can also be included as monitoring devices. The granularity of monitoring information collected is based on organizational monitoring objectives and the capability of information systems to support such objectives. Specific types of transactions of interest include, for example, Hyper Text Transfer Protocol (HTTP) traffic that bypasses HTTP proxies. Information system monitoring is an integral part of organizational continuous monitoring and incident response programs. Output from system monitoring serves as input to continuous monitoring and incident response programs. A network connection is any connection with a device that communicates through a network (e.g., local area network, Internet). A remote connection is any connection with a device communicating through an external network (e.g., the Internet). Local, network, and remote connections can be either wired or wireless.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-8","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-26","rel":"related"},{"href":"#sc-35","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"si-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-4.a_obj","name":"objective","props":[{"name":"label","value":"SI-4(a)"}],"parts":[{"id":"si-4.a.1_obj","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)"}],"parts":[{"id":"si-4.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[1]"}],"prose":"defines monitoring objectives to detect attacks and indicators of potential attacks on the information system;"},{"id":"si-4.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[2]"}],"prose":"monitors the information system to detect, in accordance with organization-defined monitoring objectives,:","parts":[{"id":"si-4.a.1_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[2][a]"}],"prose":"attacks;"},{"id":"si-4.a.1_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[2][b]"}],"prose":"indicators of potential attacks;"}]}]},{"id":"si-4.a.2_obj","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)"}],"prose":"monitors the information system to detect unauthorized:","parts":[{"id":"si-4.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)[1]"}],"prose":"local connections;"},{"id":"si-4.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)[2]"}],"prose":"network connections;"},{"id":"si-4.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)[3]"}],"prose":"remote connections;"}]}]},{"id":"si-4.b_obj","name":"objective","props":[{"name":"label","value":"SI-4(b)"}],"parts":[{"id":"si-4.b.1_obj","name":"objective","props":[{"name":"label","value":"SI-4(b)(1)"}],"prose":"defines techniques and methods to identify unauthorized use of the information system;"},{"id":"si-4.b.2_obj","name":"objective","props":[{"name":"label","value":"SI-4(b)(2)"}],"prose":"identifies unauthorized use of the information system through organization-defined techniques and methods;"}]},{"id":"si-4.c_obj","name":"objective","props":[{"name":"label","value":"SI-4(c)"}],"prose":"deploys monitoring devices:","parts":[{"id":"si-4.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(c)[1]"}],"prose":"strategically within the information system to collect organization-determined essential information;"},{"id":"si-4.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(c)[2]"}],"prose":"at ad hoc locations within the system to track specific types of transactions of interest to the organization;"}]},{"id":"si-4.d_obj","name":"objective","props":[{"name":"label","value":"SI-4(d)"}],"prose":"protects information obtained from intrusion-monitoring tools from unauthorized:","parts":[{"id":"si-4.d_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(d)[1]"}],"prose":"access;"},{"id":"si-4.d_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(d)[2]"}],"prose":"modification;"},{"id":"si-4.d_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(d)[3]"}],"prose":"deletion;"}]},{"id":"si-4.e_obj","name":"objective","props":[{"name":"label","value":"SI-4(e)"}],"prose":"heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information;"},{"id":"si-4.f_obj","name":"objective","props":[{"name":"label","value":"SI-4(f)"}],"prose":"obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations;"},{"id":"si-4.g_obj","name":"objective","props":[{"name":"label","value":"SI-4(g)"}],"parts":[{"id":"si-4.g_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(g)[1]"}],"prose":"defines personnel or roles to whom information system monitoring information is to be provided;"},{"id":"si-4.g_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(g)[2]"}],"prose":"defines information system monitoring information to be provided to organization-defined personnel or roles;"},{"id":"si-4.g_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(g)[3]"}],"prose":"defines a frequency to provide organization-defined information system monitoring to organization-defined personnel or roles;"},{"id":"si-4.g_obj.4","name":"objective","props":[{"name":"label","value":"SI-4(g)[4]"}],"prose":"provides organization-defined information system monitoring information to organization-defined personnel or roles one or more of the following:","parts":[{"id":"si-4.g_obj.4.a","name":"objective","props":[{"name":"label","value":"SI-4(g)[4][a]"}],"prose":"as needed; and\/or"},{"id":"si-4.g_obj.4.b","name":"objective","props":[{"name":"label","value":"SI-4(g)[4][b]"}],"prose":"with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Continuous monitoring strategy\n\nsystem and information integrity policy\n\nprocedures addressing information system monitoring tools and techniques\n\nfacility diagram\/layout\n\ninformation system design documentation\n\ninformation system monitoring tools and techniques documentation\n\nlocations within information system where monitoring devices are deployed\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility monitoring the information system"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for information system monitoring\n\nautomated mechanisms supporting and\/or implementing information system monitoring capability"}]}]},{"id":"si-5","class":"SP800-53","title":"Security Alerts, Advisories, and Directives","params":[{"id":"si-5_prm_1","label":"organization-defined external organizations"},{"id":"si-5_prm_2","select":{"how-many":"one-or-more","choice":[" {{ insert: param, si-5_prm_3 }} "," {{ insert: param, si-5_prm_4 }} "," {{ insert: param, si-5_prm_5 }} "]}},{"id":"si-5_prm_3","depends-on":"si-5_prm_2","label":"organization-defined personnel or roles"},{"id":"si-5_prm_4","depends-on":"si-5_prm_2","label":"organization-defined elements within the organization"},{"id":"si-5_prm_5","depends-on":"si-5_prm_2","label":"organization-defined external organizations"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-5"},{"name":"sort-id","value":"si-05"}],"links":[{"href":"#bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","rel":"reference"}],"parts":[{"id":"si-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Receives information system security alerts, advisories, and directives from {{ insert: param, si-5_prm_1 }} on an ongoing basis;"},{"id":"si-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Generates internal security alerts, advisories, and directives as deemed necessary;"},{"id":"si-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Disseminates security alerts, advisories, and directives to: {{ insert: param, si-5_prm_2 }}; and"},{"id":"si-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Implements security directives in accordance with established time frames, or notifies the issuing organization of the degree of noncompliance."}]},{"id":"si-5_gdn","name":"guidance","prose":"The United States Computer Emergency Readiness Team (US-CERT) generates security alerts and advisories to maintain situational awareness across the federal government. Security directives are issued by OMB or other designated organizations with the responsibility and authority to issue such directives. Compliance to security directives is essential due to the critical nature of many of these directives and the potential immediate adverse effects on organizational operations and assets, individuals, other organizations, and the Nation should the directives not be implemented in a timely manner. External organizations include, for example, external mission\/business partners, supply chain partners, external service providers, and other peer\/supporting organizations.","links":[{"href":"#si-2","rel":"related"}]},{"id":"si-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-5.a_obj","name":"objective","props":[{"name":"label","value":"SI-5(a)"}],"parts":[{"id":"si-5.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-5(a)[1]"}],"prose":"defines external organizations from whom information system security alerts, advisories and directives are to be received;"},{"id":"si-5.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-5(a)[2]"}],"prose":"receives information system security alerts, advisories, and directives from organization-defined external organizations on an ongoing basis;"}]},{"id":"si-5.b_obj","name":"objective","props":[{"name":"label","value":"SI-5(b)"}],"prose":"generates internal security alerts, advisories, and directives as deemed necessary;"},{"id":"si-5.c_obj","name":"objective","props":[{"name":"label","value":"SI-5(c)"}],"parts":[{"id":"si-5.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-5(c)[1]"}],"prose":"defines personnel or roles to whom security alerts, advisories, and directives are to be provided;"},{"id":"si-5.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-5(c)[2]"}],"prose":"defines elements within the organization to whom security alerts, advisories, and directives are to be provided;"},{"id":"si-5.c_obj.3","name":"objective","props":[{"name":"label","value":"SI-5(c)[3]"}],"prose":"defines external organizations to whom security alerts, advisories, and directives are to be provided;"},{"id":"si-5.c_obj.4","name":"objective","props":[{"name":"label","value":"SI-5(c)[4]"}],"prose":"disseminates security alerts, advisories, and directives to one or more of the following:","parts":[{"id":"si-5.c_obj.4.a","name":"objective","props":[{"name":"label","value":"SI-5(c)[4][a]"}],"prose":"organization-defined personnel or roles;"},{"id":"si-5.c_obj.4.b","name":"objective","props":[{"name":"label","value":"SI-5(c)[4][b]"}],"prose":"organization-defined elements within the organization; and\/or"},{"id":"si-5.c_obj.4.c","name":"objective","props":[{"name":"label","value":"SI-5(c)[4][c]"}],"prose":"organization-defined external organizations; and"}]}]},{"id":"si-5.d_obj","name":"objective","props":[{"name":"label","value":"SI-5(d)"}],"parts":[{"id":"si-5.d_obj.1","name":"objective","props":[{"name":"label","value":"SI-5(d)[1]"}],"prose":"implements security directives in accordance with established time frames; or"},{"id":"si-5.d_obj.2","name":"objective","props":[{"name":"label","value":"SI-5(d)[2]"}],"prose":"notifies the issuing organization of the degree of noncompliance."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing security alerts, advisories, and directives\n\nrecords of security alerts and advisories\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security alert and advisory responsibilities\n\norganizational personnel implementing, operating, maintaining, and using the information system\n\norganizational personnel, organizational elements, and\/or external organizations to whom alerts, advisories, and directives are to be disseminated\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for defining, receiving, generating, disseminating, and complying with security alerts, advisories, and directives\n\nautomated mechanisms supporting and\/or implementing definition, receipt, generation, and dissemination of security alerts, advisories, and directives\n\nautomated mechanisms supporting and\/or implementing security directives"}]}]},{"id":"si-12","class":"SP800-53","title":"Information Handling and Retention","props":[{"name":"priority","value":"P2"},{"name":"label","value":"SI-12"},{"name":"sort-id","value":"si-12"}],"parts":[{"id":"si-12_smt","name":"statement","prose":"The organization handles and retains information within the information system and information output from the system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements."},{"id":"si-12_gdn","name":"guidance","prose":"Information handling and retention requirements cover the full life cycle of information, in some cases extending beyond the disposal of information systems. The National Archives and Records Administration provides guidance on records retention.","links":[{"href":"#ac-16","rel":"related"},{"href":"#au-5","rel":"related"},{"href":"#au-11","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"}]},{"id":"si-12_obj","name":"objective","prose":"Determine if the organization, in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements:","parts":[{"id":"si-12_obj.1","name":"objective","props":[{"name":"label","value":"SI-12[1]"}],"prose":"handles information within the information system;"},{"id":"si-12_obj.2","name":"objective","props":[{"name":"label","value":"SI-12[2]"}],"prose":"handles output from the information system;"},{"id":"si-12_obj.3","name":"objective","props":[{"name":"label","value":"SI-12[3]"}],"prose":"retains information within the information system; and"},{"id":"si-12_obj.4","name":"objective","props":[{"name":"label","value":"SI-12[4]"}],"prose":"retains output from the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nfederal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements applicable to information handling and retention\n\nmedia protection policy and procedures\n\nprocedures addressing information system output handling and retention\n\ninformation retention records, other relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for information handling and retention\n\norganizational personnel with information security responsibilities\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for information handling and retention\n\nautomated mechanisms supporting and\/or implementing information handling and retention"}]}]}]}],"back-matter":{"resources":[{"uuid":"0c97e60b-325a-4efa-ba2b-90f20ccd5abc","title":"5 C.F.R. 731.106","citation":{"text":"Code of Federal Regulations, Title 5, Administrative Personnel, Section 731.106, Designation of Public Trust Positions and Investigative Requirements (5 C.F.R. 731.106)."},"rlinks":[{"href":"http:\/\/www.gpo.gov\/fdsys\/granule\/CFR-2012-title5-vol2\/CFR-2012-title5-vol2-sec731-106\/content-detail.html"}]},{"uuid":"bb61234b-46c3-4211-8c2b-9869222a720d","title":"C.F.R. Part 5 Subpart C (5 C.F.R. 930.301)","citation":{"text":"C.F.R. Part 5 Subpart C (5 C.F.R. 930.301)"},"rlinks":[{"href":"http:\/\/www.gpo.gov\/fdsys\/granule\/CFR-2009-title5-vol2\/CFR-2009-title5-vol2-sec930-301\/content-detail.html"}]},{"uuid":"a4aa9645-9a8a-4b51-90a9-e223250f9a75","title":"CNSS Policy 15","citation":{"text":"CNSS Policy 15"},"rlinks":[{"href":"https:\/\/www.cnss.gov\/policies.html"}]},{"uuid":"2d8b14e9-c8b5-4d3d-8bdc-155078f3281b","title":"DoD Information Assurance Vulnerability Alerts","citation":{"text":"DoD Information Assurance Vulnerability Alerts"}},{"uuid":"61081e7f-041d-4033-96a7-44a439071683","title":"DoD Instruction 5200.39","citation":{"text":"DoD Instruction 5200.39"},"rlinks":[{"href":"http:\/\/www.dtic.mil\/whs\/directives\/corres\/ins1.html"}]},{"uuid":"e42b2099-3e1c-415b-952c-61c96533c12e","title":"DoD Instruction 8551.01","citation":{"text":"DoD Instruction 8551.01"},"rlinks":[{"href":"http:\/\/www.dtic.mil\/whs\/directives\/corres\/ins1.html"}]},{"uuid":"c5034e0c-eba6-4ecd-a541-79f0678f4ba4","title":"Executive Order 13587","citation":{"text":"Executive Order 13587"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/the-press-office\/2011\/10\/07\/executive-order-13587-structural-reforms-improve-security-classified-net"}]},{"uuid":"56d671da-6b7b-4abf-8296-84b61980390a","title":"Federal Acquisition Regulation","citation":{"text":"Federal Acquisition Regulation"},"rlinks":[{"href":"https:\/\/acquisition.gov\/far"}]},{"uuid":"023104bc-6f75-4cd5-b7d0-fc92326f8007","title":"Federal Continuity Directive 1","citation":{"text":"Federal Continuity Directive 1"},"rlinks":[{"href":"http:\/\/www.fema.gov\/pdf\/about\/offices\/fcd1.pdf"}]},{"uuid":"ba557c91-ba3e-4792-adc6-a4ae479b39ff","title":"FICAM Roadmap and Implementation Guidance","citation":{"text":"FICAM Roadmap and Implementation Guidance"},"rlinks":[{"href":"http:\/\/www.idmanagement.gov\/documents\/ficam-roadmap-and-implementation-guidance"}]},{"uuid":"39f9087d-7687-46d2-8eda-b6f4b7a4d8a9","title":"FIPS Publication 140","citation":{"text":"FIPS Publication 140"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html"}]},{"uuid":"d715b234-9b5b-4e07-b1ed-99836727664d","title":"FIPS Publication 140-2","citation":{"text":"FIPS Publication 140-2"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#140-2"}]},{"uuid":"f2dbd4ec-c413-4714-b85b-6b7184d1c195","title":"FIPS Publication 197","citation":{"text":"FIPS Publication 197"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#197"}]},{"uuid":"e85cdb3f-7f0a-4083-8639-f13f70d3760b","title":"FIPS Publication 199","citation":{"text":"FIPS Publication 199"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#199"}]},{"uuid":"c80c10b3-1294-4984-a4cc-d1733ca432b9","title":"FIPS Publication 201","citation":{"text":"FIPS Publication 201"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#201"}]},{"uuid":"ad733a42-a7ed-4774-b988-4930c28852f3","title":"HSPD-12","citation":{"text":"HSPD-12"},"rlinks":[{"href":"http:\/\/www.dhs.gov\/homeland-security-presidential-directive-12"}]},{"uuid":"e95dd121-2733-413e-bf1e-f1eb49f20a98","title":"http:\/\/checklists.nist.gov","citation":{"text":"http:\/\/checklists.nist.gov"},"rlinks":[{"href":"http:\/\/checklists.nist.gov"}]},{"uuid":"6a1041fc-054e-4230-946b-2e6f4f3731bb","title":"http:\/\/csrc.nist.gov\/cryptval","citation":{"text":"http:\/\/csrc.nist.gov\/cryptval"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/cryptval"}]},{"uuid":"b09d1a31-d3c9-4138-a4f4-4c63816afd7d","title":"http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/index.html","citation":{"text":"http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/index.html"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/index.html"}]},{"uuid":"15522e92-9192-463d-9646-6a01982db8ca","title":"http:\/\/cwe.mitre.org","citation":{"text":"http:\/\/cwe.mitre.org"},"rlinks":[{"href":"http:\/\/cwe.mitre.org"}]},{"uuid":"5ed1f4d5-1494-421b-97ed-39d3c88ab51f","title":"http:\/\/fips201ep.cio.gov","citation":{"text":"http:\/\/fips201ep.cio.gov"},"rlinks":[{"href":"http:\/\/fips201ep.cio.gov"}]},{"uuid":"85280698-0417-489d-b214-12bb935fb939","title":"http:\/\/idmanagement.gov","citation":{"text":"http:\/\/idmanagement.gov"},"rlinks":[{"href":"http:\/\/idmanagement.gov"}]},{"uuid":"275cc052-0f7f-423c-bdb6-ed503dc36228","title":"http:\/\/nvd.nist.gov","citation":{"text":"http:\/\/nvd.nist.gov"},"rlinks":[{"href":"http:\/\/nvd.nist.gov"}]},{"uuid":"bbd50dd1-54ce-4432-959d-63ea564b1bb4","title":"http:\/\/www.acquisition.gov\/far","citation":{"text":"http:\/\/www.acquisition.gov\/far"},"rlinks":[{"href":"http:\/\/www.acquisition.gov\/far"}]},{"uuid":"9b97ed27-3dd6-4f9a-ade5-1b43e9669794","title":"http:\/\/www.cnss.gov","citation":{"text":"http:\/\/www.cnss.gov"},"rlinks":[{"href":"http:\/\/www.cnss.gov"}]},{"uuid":"c95a9986-3cd6-4a98-931b-ccfc56cb11e5","title":"http:\/\/www.niap-ccevs.org","citation":{"text":"http:\/\/www.niap-ccevs.org"},"rlinks":[{"href":"http:\/\/www.niap-ccevs.org"}]},{"uuid":"647b6de3-81d0-4d22-bec1-5f1333e34380","title":"http:\/\/www.nsa.gov","citation":{"text":"http:\/\/www.nsa.gov"},"rlinks":[{"href":"http:\/\/www.nsa.gov"}]},{"uuid":"a47466c4-c837-4f06-a39f-e68412a5f73d","title":"http:\/\/www.nsa.gov\/ia\/mitigation_guidance\/media_destruction_guidance\/index.shtml","citation":{"text":"http:\/\/www.nsa.gov\/ia\/mitigation_guidance\/media_destruction_guidance\/index.shtml"},"rlinks":[{"href":"http:\/\/www.nsa.gov\/ia\/mitigation_guidance\/media_destruction_guidance\/index.shtml"}]},{"uuid":"02631467-668b-4233-989b-3dfded2fd184","title":"http:\/\/www.us-cert.gov","citation":{"text":"http:\/\/www.us-cert.gov"},"rlinks":[{"href":"http:\/\/www.us-cert.gov"}]},{"uuid":"6caa237b-531b-43ac-9711-d8f6b97b0377","title":"ICD 704","citation":{"text":"ICD 704"},"rlinks":[{"href":"http:\/\/www.dni.gov\/index.php\/intelligence-community\/ic-policies-reports\/intelligence-community-directives"}]},{"uuid":"398e33fd-f404-4e5c-b90e-2d50d3181244","title":"ICD 705","citation":{"text":"ICD 705"},"rlinks":[{"href":"http:\/\/www.dni.gov\/index.php\/intelligence-community\/ic-policies-reports\/intelligence-community-directives"}]},{"uuid":"1737a687-52fb-4008-b900-cbfa836f7b65","title":"ISO\/IEC 15408","citation":{"text":"ISO\/IEC 15408"},"rlinks":[{"href":"http:\/\/www.iso.org\/iso\/iso_catalog\/catalog_tc\/catalog_detail.htm?csnumber=50341"}]},{"uuid":"654f21e2-f3bc-43b2-abdc-60ab8d09744b","title":"National Strategy for Trusted Identities in Cyberspace","citation":{"text":"National Strategy for Trusted Identities in Cyberspace"},"rlinks":[{"href":"http:\/\/www.nist.gov\/nstic"}]},{"uuid":"9cb3d8fe-2127-48ba-821e-cdd2d7aee921","title":"NIST Special Publication 800-100","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-100"}],"citation":{"text":"NIST Special Publication 800-100"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-100"}]},{"uuid":"3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","title":"NIST Special Publication 800-111","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-111"}],"citation":{"text":"NIST Special Publication 800-111"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-111"}]},{"uuid":"349fe082-502d-464a-aa0c-1443c6a5cf40","title":"NIST Special Publication 800-113","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-113"}],"citation":{"text":"NIST Special Publication 800-113"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-113"}]},{"uuid":"1201fcf3-afb1-4675-915a-fb4ae0435717","title":"NIST Special Publication 800-114 Rev. 1","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-114r1"}],"citation":{"text":"NIST Special Publication 800-114 Rev. 1"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-114r1"}]},{"uuid":"c4691b88-57d1-463b-9053-2d0087913f31","title":"NIST Special Publication 800-115","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-115"}],"citation":{"text":"NIST Special Publication 800-115"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-115"}]},{"uuid":"2157bb7e-192c-4eaa-877f-93ef6b0a3292","title":"NIST Special Publication 800-116 Rev. 1","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-116r1"}],"citation":{"text":"NIST Special Publication 800-116 Rev. 1"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-116r1"}]},{"uuid":"5c201b63-0768-417b-ac22-3f014e3941b2","title":"NIST Special Publication 800-12 Rev. 1","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-12r1"}],"citation":{"text":"NIST Special Publication 800-12 Rev. 1"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-12r1"}]},{"uuid":"d1a4e2a9-e512-4132-8795-5357aba29254","title":"NIST Special Publication 800-121","citation":{"text":"NIST Special Publication 800-121"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-121"}]},{"uuid":"0293a393-fbe8-4ed1-b0b4-f6fbd3ae1589","title":"NIST Special Publication 800-124","citation":{"text":"NIST Special Publication 800-124"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-124"}]},{"uuid":"080f8068-5e3e-435e-9790-d22ba4722693","title":"NIST Special Publication 800-128","citation":{"text":"NIST Special Publication 800-128"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-128"}]},{"uuid":"cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","title":"NIST Special Publication 800-137","citation":{"text":"NIST Special Publication 800-137"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-137"}]},{"uuid":"825438c3-248d-4e30-a51e-246473ce6ada","title":"NIST Special Publication 800-16","citation":{"text":"NIST Special Publication 800-16"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-16"}]},{"uuid":"6513e480-fada-4876-abba-1397084dfb26","title":"NIST Special Publication 800-164","citation":{"text":"NIST Special Publication 800-164"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-164"}]},{"uuid":"9c5c9e8c-dc81-4f55-a11c-d71d7487790f","title":"NIST Special Publication 800-18","citation":{"text":"NIST Special Publication 800-18"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-18"}]},{"uuid":"0a5db899-f033-467f-8631-f5a8ba971475","title":"NIST Special Publication 800-23","citation":{"text":"NIST Special Publication 800-23"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-23"}]},{"uuid":"a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","title":"NIST Special Publication 800-30","citation":{"text":"NIST Special Publication 800-30"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-30"}]},{"uuid":"748a81b9-9cad-463f-abde-8b368167e70d","title":"NIST Special Publication 800-34","citation":{"text":"NIST Special Publication 800-34"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-34"}]},{"uuid":"0c775bc3-bfc3-42c7-a382-88949f503171","title":"NIST Special Publication 800-35","citation":{"text":"NIST Special Publication 800-35"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-35"}]},{"uuid":"d818efd3-db31-4953-8afa-9e76afe83ce2","title":"NIST Special Publication 800-36","citation":{"text":"NIST Special Publication 800-36"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-36"}]},{"uuid":"0a0c26b6-fd44-4274-8b36-93442d49d998","title":"NIST Special Publication 800-37","citation":{"text":"NIST Special Publication 800-37"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-37"}]},{"uuid":"d480aa6a-7a88-424e-a10c-ad1c7870354b","title":"NIST Special Publication 800-39","citation":{"text":"NIST Special Publication 800-39"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-39"}]},{"uuid":"bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","title":"NIST Special Publication 800-40","citation":{"text":"NIST Special Publication 800-40"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-40"}]},{"uuid":"756a8e86-57d5-4701-8382-f7a40439665a","title":"NIST Special Publication 800-41","citation":{"text":"NIST Special Publication 800-41"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-41"}]},{"uuid":"5309d4d0-46f8-4213-a749-e7584164e5e8","title":"NIST Special Publication 800-46","citation":{"text":"NIST Special Publication 800-46"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-46"}]},{"uuid":"2711f068-734e-4afd-94ba-0b22247fbc88","title":"NIST Special Publication 800-47","citation":{"text":"NIST Special Publication 800-47"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-47"}]},{"uuid":"238ed479-eccb-49f6-82ec-ab74a7a428cf","title":"NIST Special Publication 800-48","citation":{"text":"NIST Special Publication 800-48"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-48"}]},{"uuid":"e12b5738-de74-4fb3-8317-a3995a8a1898","title":"NIST Special Publication 800-50","citation":{"text":"NIST Special Publication 800-50"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-50"}]},{"uuid":"cd4cf751-3312-4a55-b1a9-fad2f1db9119","title":"NIST Special Publication 800-53A","citation":{"text":"NIST Special Publication 800-53A"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-53A"}]},{"uuid":"81f09e01-d0b0-4ae2-aa6a-064ed9950070","title":"NIST Special Publication 800-56","citation":{"text":"NIST Special Publication 800-56"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-56"}]},{"uuid":"a6c774c0-bf50-4590-9841-2a5c1c91ac6f","title":"NIST Special Publication 800-57","citation":{"text":"NIST Special Publication 800-57"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-57"}]},{"uuid":"f152844f-b1ef-4836-8729-6277078ebee1","title":"NIST Special Publication 800-60","citation":{"text":"NIST Special Publication 800-60"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-60"}]},{"uuid":"be95fb85-a53f-4624-bdbb-140075500aa3","title":"NIST Special Publication 800-61","citation":{"text":"NIST Special Publication 800-61"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-61"}]},{"uuid":"644f44a9-a2de-4494-9c04-cd37fba45471","title":"NIST Special Publication 800-63","citation":{"text":"NIST Special Publication 800-63"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-63"}]},{"uuid":"abd950ae-092f-4b7a-b374-1c7c67fe9350","title":"NIST Special Publication 800-64","citation":{"text":"NIST Special Publication 800-64"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-64"}]},{"uuid":"29fcfe59-33cd-494a-8756-5907ae3a8f92","title":"NIST Special Publication 800-65","citation":{"text":"NIST Special Publication 800-65"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-65"}]},{"uuid":"84a37532-6db6-477b-9ea8-f9085ebca0fc","title":"NIST Special Publication 800-70","citation":{"text":"NIST Special Publication 800-70"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-70"}]},{"uuid":"ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","title":"NIST Special Publication 800-73","citation":{"text":"NIST Special Publication 800-73"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-73"}]},{"uuid":"2a71298a-ee90-490e-80ff-48c967173a47","title":"NIST Special Publication 800-76","citation":{"text":"NIST Special Publication 800-76"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-76"}]},{"uuid":"99f331f2-a9f0-46c2-9856-a3cbb9b89442","title":"NIST Special Publication 800-77","citation":{"text":"NIST Special Publication 800-77"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-77"}]},{"uuid":"2042d97b-f7f6-4c74-84f8-981867684659","title":"NIST Special Publication 800-78","citation":{"text":"NIST Special Publication 800-78"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-78"}]},{"uuid":"6af1e841-672c-46c4-b121-96f603d04be3","title":"NIST Special Publication 800-81","citation":{"text":"NIST Special Publication 800-81"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-81"}]},{"uuid":"6d431fee-658f-4a0e-9f2e-a38b5d398fab","title":"NIST Special Publication 800-83","citation":{"text":"NIST Special Publication 800-83"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-83"}]},{"uuid":"0243a05a-e8a3-4d51-9364-4a9d20b0dcdf","title":"NIST Special Publication 800-84","citation":{"text":"NIST Special Publication 800-84"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-84"}]},{"uuid":"263823e0-a971-4b00-959d-315b26278b22","title":"NIST Special Publication 800-88","citation":{"text":"NIST Special Publication 800-88"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-88"}]},{"uuid":"672fd561-b92b-4713-b9cf-6c9d9456728b","title":"NIST Special Publication 800-92","citation":{"text":"NIST Special Publication 800-92"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-92"}]},{"uuid":"d1b1d689-0f66-4474-9924-c81119758dc1","title":"NIST Special Publication 800-94","citation":{"text":"NIST Special Publication 800-94"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-94"}]},{"uuid":"6f336ecd-f2a0-4c84-9699-0491d81b6e0d","title":"NIST Special Publication 800-97","citation":{"text":"NIST Special Publication 800-97"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-97"}]},{"uuid":"9f77f845-e3ea-4ca4-b2c0-aa9eedc214ab","title":"OMB Circular A-130","citation":{"text":"OMB Circular A-130"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/omb\/circulars_a130_a130trans4"}]},{"uuid":"2c5884cd-7b96-425c-862a-99877e1cf909","title":"OMB Memorandum 02-01","citation":{"text":"OMB Memorandum 02-01"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/omb\/memoranda_m02-01"}]},{"uuid":"ff3bfb02-79b2-411f-8735-98dfe5af2ab0","title":"OMB Memorandum 04-04","citation":{"text":"OMB Memorandum 04-04"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy04\/m04-04.pdf"}]},{"uuid":"4da24a96-6cf8-435d-9d1f-c73247cad109","title":"OMB Memorandum 06-16","citation":{"text":"OMB Memorandum 06-16"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2006\/m06-16.pdf"}]},{"uuid":"990268bf-f4a9-4c81-91ae-dc7d3115f4b1","title":"OMB Memorandum 07-11","citation":{"text":"OMB Memorandum 07-11"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2007\/m07-11.pdf"}]},{"uuid":"0b3d8ba9-051f-498d-81ea-97f0f018c612","title":"OMB Memorandum 07-18","citation":{"text":"OMB Memorandum 07-18"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2007\/m07-18.pdf"}]},{"uuid":"0916ef02-3618-411b-a525-565c088849a6","title":"OMB Memorandum 08-22","citation":{"text":"OMB Memorandum 08-22"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2008\/m08-22.pdf"}]},{"uuid":"28115a56-da6b-4d44-b1df-51dd7f048a3e","title":"OMB Memorandum 08-23","citation":{"text":"OMB Memorandum 08-23"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2008\/m08-23.pdf"}]},{"uuid":"599fe9ba-4750-4450-9eeb-b95bd19a5e8f","title":"OMB Memorandum 10-06-2011","citation":{"text":"OMB Memorandum 10-06-2011"}},{"uuid":"74e740a4-c45d-49f3-a86e-eb747c549e01","title":"OMB Memorandum 11-11","citation":{"text":"OMB Memorandum 11-11"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/memoranda\/2011\/m11-11.pdf"}]},{"uuid":"bedb15b7-ec5c-4a68-807f-385125751fcd","title":"OMB Memorandum 11-33","citation":{"text":"OMB Memorandum 11-33"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/memoranda\/2011\/m11-33.pdf"}]},{"uuid":"dd2f5acd-08f1-435a-9837-f8203088dc1a","title":"Personal Identity Verification (PIV) in Enterprise Physical Access Control System (E-PACS)","citation":{"text":"Personal Identity Verification (PIV) in Enterprise Physical Access Control System (E-PACS)"}},{"uuid":"8ade2fbe-e468-4ca8-9a40-54d7f23c32bb","title":"US-CERT Technical Cyber Security Alerts","citation":{"text":"US-CERT Technical Cyber Security Alerts"},"rlinks":[{"href":"http:\/\/www.us-cert.gov\/ncas\/alerts"}]}]}}} \ No newline at end of file diff --git a/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_LOW-baseline-resolved-profile_catalog.json b/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_LOW-baseline-resolved-profile_catalog.json index 758e26eb..00a30fa6 100644 --- a/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_LOW-baseline-resolved-profile_catalog.json +++ b/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_LOW-baseline-resolved-profile_catalog.json @@ -1,9 +1,9 @@ { "catalog": { - "uuid": "bec68292-6541-40e5-bc3b-5fcfee922bd9", + "uuid": "90cfe612-52c5-4daa-8ec1-9a6c223fa571", "metadata": { "title": "NIST Special Publication 800-53 Revision 4 LOW IMPACT BASELINE", - "last-modified": "2023-11-02T11:49:37.69093-04:00", + "last-modified": "2023-12-05T21:54:40.489331Z", "version": "2015-01-22", "oscal-version": "1.1.1", "props": [ diff --git a/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_MODERATE-baseline-resolved-profile_catalog-min.json b/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_MODERATE-baseline-resolved-profile_catalog-min.json index 0d9833ab..4ac96299 100644 --- a/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_MODERATE-baseline-resolved-profile_catalog-min.json +++ b/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_MODERATE-baseline-resolved-profile_catalog-min.json @@ -1 +1 @@ -{"catalog":{"uuid":"975aa476-c834-4b62-9e8b-f5d28a23962c","metadata":{"title":"NIST Special Publication 800-53 Revision 4 MODERATE IMPACT BASELINE","last-modified":"2023-11-02T11:49:43.964173-04:00","version":"2015-01-22","oscal-version":"1.1.1","props":[{"name":"resolution-tool","value":"OSCAL Profile Resolver XSLT Pipeline OPRXP"}],"links":[{"href":"NIST_SP-800-53_rev4_MODERATE-baseline_profile.xml","rel":"source-profile"}],"roles":[{"id":"creator","title":"Document Creator"},{"id":"contact","title":"Contact"}],"parties":[{"uuid":"29dd471e-7206-4388-857b-47673c04c4c9","type":"organization","name":"Joint Task Force, Transformation Initiative","email-addresses":["sec-cert@nist.gov"],"addresses":[{"addr-lines":["National Institute of Standards and Technology","Attn: Computer Security Division","Information Technology Laboratory","100 Bureau Drive (Mail Stop 8930)"],"city":"Gaithersburg","state":"MD","postal-code":"20899-8930"}]}],"responsible-parties":[{"role-id":"creator","party-uuids":["316876e2-5c7b-4a60-a488-2ed977238f04"]},{"role-id":"contact","party-uuids":["316876e2-5c7b-4a60-a488-2ed977238f04"]}]},"groups":[{"id":"ac","class":"family","title":"Access Control","controls":[{"id":"ac-1","class":"SP800-53","title":"Access Control Policy and Procedures","params":[{"id":"ac-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ac-1_prm_2","label":"organization-defined frequency"},{"id":"ac-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-1"},{"name":"sort-id","value":"ac-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ac-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ac-1_prm_1 }}:","parts":[{"id":"ac-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ac-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the access control policy and associated access controls; and"}]},{"id":"ac-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ac-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Access control policy {{ insert: param, ac-1_prm_2 }}; and"},{"id":"ac-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Access control procedures {{ insert: param, ac-1_prm_3 }}."}]}]},{"id":"ac-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the AC family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ac-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-1.a_obj","name":"objective","props":[{"name":"label","value":"AC-1(a)"}],"parts":[{"id":"ac-1.a.1_obj","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)"}],"parts":[{"id":"ac-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1]"}],"prose":"develops and documents an access control policy that addresses:","parts":[{"id":"ac-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ac-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ac-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ac-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ac-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ac-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ac-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ac-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the access control policy are to be disseminated;"},{"id":"ac-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[3]"}],"prose":"disseminates the access control policy to organization-defined personnel or roles;"}]},{"id":"ac-1.a.2_obj","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)"}],"parts":[{"id":"ac-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the access control policy and associated access control controls;"},{"id":"ac-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ac-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ac-1.b_obj","name":"objective","props":[{"name":"label","value":"AC-1(b)"}],"parts":[{"id":"ac-1.b.1_obj","name":"objective","props":[{"name":"label","value":"AC-1(b)(1)"}],"parts":[{"id":"ac-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current access control policy;"},{"id":"ac-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(b)(1)[2]"}],"prose":"reviews and updates the current access control policy with the organization-defined frequency;"}]},{"id":"ac-1.b.2_obj","name":"objective","props":[{"name":"label","value":"AC-1(b)(2)"}],"parts":[{"id":"ac-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current access control procedures; and"},{"id":"ac-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(b)(2)[2]"}],"prose":"reviews and updates the current access control procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access control responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ac-2","class":"SP800-53","title":"Account Management","params":[{"id":"ac-2_prm_1","label":"organization-defined information system account types"},{"id":"ac-2_prm_2","label":"organization-defined personnel or roles"},{"id":"ac-2_prm_3","label":"organization-defined procedures or conditions"},{"id":"ac-2_prm_4","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-2"},{"name":"sort-id","value":"ac-02"}],"parts":[{"id":"ac-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Identifies and selects the following types of information system accounts to support organizational missions\/business functions: {{ insert: param, ac-2_prm_1 }};"},{"id":"ac-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Assigns account managers for information system accounts;"},{"id":"ac-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Establishes conditions for group and role membership;"},{"id":"ac-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Specifies authorized users of the information system, group and role membership, and access authorizations (i.e., privileges) and other attributes (as required) for each account;"},{"id":"ac-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Requires approvals by {{ insert: param, ac-2_prm_2 }} for requests to create information system accounts;"},{"id":"ac-2_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Creates, enables, modifies, disables, and removes information system accounts in accordance with {{ insert: param, ac-2_prm_3 }};"},{"id":"ac-2_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Monitors the use of information system accounts;"},{"id":"ac-2_smt.h","name":"item","props":[{"name":"label","value":"h."}],"prose":"Notifies account managers:","parts":[{"id":"ac-2_smt.h.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"When accounts are no longer required;"},{"id":"ac-2_smt.h.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"When users are terminated or transferred; and"},{"id":"ac-2_smt.h.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"When individual information system usage or need-to-know changes;"}]},{"id":"ac-2_smt.i","name":"item","props":[{"name":"label","value":"i."}],"prose":"Authorizes access to the information system based on:","parts":[{"id":"ac-2_smt.i.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A valid access authorization;"},{"id":"ac-2_smt.i.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Intended system usage; and"},{"id":"ac-2_smt.i.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Other attributes as required by the organization or associated missions\/business functions;"}]},{"id":"ac-2_smt.j","name":"item","props":[{"name":"label","value":"j."}],"prose":"Reviews accounts for compliance with account management requirements {{ insert: param, ac-2_prm_4 }}; and"},{"id":"ac-2_smt.k","name":"item","props":[{"name":"label","value":"k."}],"prose":"Establishes a process for reissuing shared\/group account credentials (if deployed) when individuals are removed from the group."}]},{"id":"ac-2_gdn","name":"guidance","prose":"Information system account types include, for example, individual, shared, group, system, guest\/anonymous, emergency, developer\/manufacturer\/vendor, temporary, and service. Some of the account management requirements listed above can be implemented by organizational information systems. The identification of authorized users of the information system and the specification of access privileges reflects the requirements in other security controls in the security plan. Users requiring administrative privileges on information system accounts receive additional scrutiny by appropriate organizational personnel (e.g., system owner, mission\/business owner, or chief information security officer) responsible for approving such accounts and privileged access. Organizations may choose to define access privileges or other attributes by account, by type of account, or a combination of both. Other attributes required for authorizing access include, for example, restrictions on time-of-day, day-of-week, and point-of-origin. In defining other account attributes, organizations consider system-related requirements (e.g., scheduled maintenance, system upgrades) and mission\/business requirements, (e.g., time zone differences, customer requirements, remote access to support travel requirements). Failure to consider these factors could affect information system availability. Temporary and emergency accounts are accounts intended for short-term use. Organizations establish temporary accounts as a part of normal account activation procedures when there is a need for short-term accounts without the demand for immediacy in account activation. Organizations establish emergency accounts in response to crisis situations and with the need for rapid account activation. Therefore, emergency account activation may bypass normal account authorization processes. Emergency and temporary accounts are not to be confused with infrequently used accounts (e.g., local logon accounts used for special tasks defined by organizations or when network resources are unavailable). Such accounts remain available and are not subject to automatic disabling or removal dates. Conditions for disabling or deactivating accounts include, for example: (i) when shared\/group, emergency, or temporary accounts are no longer required; or (ii) when individuals are transferred or terminated. Some types of information system accounts may require specialized training.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-5","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-10","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ma-3","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"ac-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-2.a_obj","name":"objective","props":[{"name":"label","value":"AC-2(a)"}],"parts":[{"id":"ac-2.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(a)[1]"}],"prose":"defines information system account types to be identified and selected to support organizational missions\/business functions;"},{"id":"ac-2.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(a)[2]"}],"prose":"identifies and selects organization-defined information system account types to support organizational missions\/business functions;"}]},{"id":"ac-2.b_obj","name":"objective","props":[{"name":"label","value":"AC-2(b)"}],"prose":"assigns account managers for information system accounts;"},{"id":"ac-2.c_obj","name":"objective","props":[{"name":"label","value":"AC-2(c)"}],"prose":"establishes conditions for group and role membership;"},{"id":"ac-2.d_obj","name":"objective","props":[{"name":"label","value":"AC-2(d)"}],"prose":"specifies for each account (as required):","parts":[{"id":"ac-2.d_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(d)[1]"}],"prose":"authorized users of the information system;"},{"id":"ac-2.d_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(d)[2]"}],"prose":"group and role membership;"},{"id":"ac-2.d_obj.3","name":"objective","props":[{"name":"label","value":"AC-2(d)[3]"}],"prose":"access authorizations (i.e., privileges);"},{"id":"ac-2.d_obj.4","name":"objective","props":[{"name":"label","value":"AC-2(d)[4]"}],"prose":"other attributes;"}]},{"id":"ac-2.e_obj","name":"objective","props":[{"name":"label","value":"AC-2(e)"}],"parts":[{"id":"ac-2.e_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(e)[1]"}],"prose":"defines personnel or roles required to approve requests to create information system accounts;"},{"id":"ac-2.e_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(e)[2]"}],"prose":"requires approvals by organization-defined personnel or roles for requests to create information system accounts;"}]},{"id":"ac-2.f_obj","name":"objective","props":[{"name":"label","value":"AC-2(f)"}],"parts":[{"id":"ac-2.f_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(f)[1]"}],"prose":"defines procedures or conditions to:","parts":[{"id":"ac-2.f_obj.1.a","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][a]"}],"prose":"create information system accounts;"},{"id":"ac-2.f_obj.1.b","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][b]"}],"prose":"enable information system accounts;"},{"id":"ac-2.f_obj.1.c","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][c]"}],"prose":"modify information system accounts;"},{"id":"ac-2.f_obj.1.d","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][d]"}],"prose":"disable information system accounts;"},{"id":"ac-2.f_obj.1.e","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][e]"}],"prose":"remove information system accounts;"}]},{"id":"ac-2.f_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(f)[2]"}],"prose":"in accordance with organization-defined procedures or conditions:","parts":[{"id":"ac-2.f_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][a]"}],"prose":"creates information system accounts;"},{"id":"ac-2.f_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][b]"}],"prose":"enables information system accounts;"},{"id":"ac-2.f_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][c]"}],"prose":"modifies information system accounts;"},{"id":"ac-2.f_obj.2.d","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][d]"}],"prose":"disables information system accounts;"},{"id":"ac-2.f_obj.2.e","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][e]"}],"prose":"removes information system accounts;"}]}]},{"id":"ac-2.g_obj","name":"objective","props":[{"name":"label","value":"AC-2(g)"}],"prose":"monitors the use of information system accounts;"},{"id":"ac-2.h_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)"}],"prose":"notifies account managers:","parts":[{"id":"ac-2.h.1_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)(1)"}],"prose":"when accounts are no longer required;"},{"id":"ac-2.h.2_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)(2)"}],"prose":"when users are terminated or transferred;"},{"id":"ac-2.h.3_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)(3)"}],"prose":"when individual information system usage or need to know changes;"}]},{"id":"ac-2.i_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)"}],"prose":"authorizes access to the information system based on;","parts":[{"id":"ac-2.i.1_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)(1)"}],"prose":"a valid access authorization;"},{"id":"ac-2.i.2_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)(2)"}],"prose":"intended system usage;"},{"id":"ac-2.i.3_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)(3)"}],"prose":"other attributes as required by the organization or associated missions\/business functions;"}]},{"id":"ac-2.j_obj","name":"objective","props":[{"name":"label","value":"AC-2(j)"}],"parts":[{"id":"ac-2.j_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(j)[1]"}],"prose":"defines the frequency to review accounts for compliance with account management requirements;"},{"id":"ac-2.j_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(j)[2]"}],"prose":"reviews accounts for compliance with account management requirements with the organization-defined frequency; and"}]},{"id":"ac-2.k_obj","name":"objective","props":[{"name":"label","value":"AC-2(k)"}],"prose":"establishes a process for reissuing shared\/group account credentials (if deployed) when individuals are removed from the group."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of active system accounts along with the name of the individual associated with each account\n\nlist of conditions for group and role membership\n\nnotifications or records of recently transferred, separated, or terminated employees\n\nlist of recently disabled information system accounts along with the name of the individual associated with each account\n\naccess authorization records\n\naccount management compliance reviews\n\ninformation system monitoring records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes account management on the information system\n\nautomated mechanisms for implementing account management"}]}],"controls":[{"id":"ac-2.1","class":"SP800-53-enhancement","title":"Automated System Account Management","props":[{"name":"label","value":"AC-2(1)"},{"name":"sort-id","value":"ac-02.01"}],"parts":[{"id":"ac-2.1_smt","name":"statement","prose":"The organization employs automated mechanisms to support the management of information system accounts."},{"id":"ac-2.1_gdn","name":"guidance","prose":"The use of automated mechanisms can include, for example: using email or text messaging to automatically notify account managers when users are terminated or transferred; using the information system to monitor account usage; and using telephonic notification to report atypical system account usage."},{"id":"ac-2.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to support the management of information system accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]},{"id":"ac-2.2","class":"SP800-53-enhancement","title":"Removal of Temporary \/ Emergency Accounts","params":[{"id":"ac-2.2_prm_1","select":{"choice":["removes","disables"]}},{"id":"ac-2.2_prm_2","label":"organization-defined time period for each type of account"}],"props":[{"name":"label","value":"AC-2(2)"},{"name":"sort-id","value":"ac-02.02"}],"parts":[{"id":"ac-2.2_smt","name":"statement","prose":"The information system automatically {{ insert: param, ac-2.2_prm_1 }} temporary and emergency accounts after {{ insert: param, ac-2.2_prm_2 }}."},{"id":"ac-2.2_gdn","name":"guidance","prose":"This control enhancement requires the removal of both temporary and emergency accounts automatically after a predefined period of time has elapsed, rather than at the convenience of the systems administrator."},{"id":"ac-2.2_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-2.2_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(2)[1]"}],"prose":"the organization defines the time period after which the information system automatically removes or disables temporary and emergency accounts; and"},{"id":"ac-2.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(2)[2]"}],"prose":"the information system automatically removes or disables temporary and emergency accounts after the organization-defined time period for each type of account."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system-generated list of temporary accounts removed and\/or disabled\n\ninformation system-generated list of emergency accounts removed and\/or disabled\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]},{"id":"ac-2.3","class":"SP800-53-enhancement","title":"Disable Inactive Accounts","params":[{"id":"ac-2.3_prm_1","label":"organization-defined time period"}],"props":[{"name":"label","value":"AC-2(3)"},{"name":"sort-id","value":"ac-02.03"}],"parts":[{"id":"ac-2.3_smt","name":"statement","prose":"The information system automatically disables inactive accounts after {{ insert: param, ac-2.3_prm_1 }}."},{"id":"ac-2.3_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-2.3_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(3)[1]"}],"prose":"the organization defines the time period after which the information system automatically disables inactive accounts; and"},{"id":"ac-2.3_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(3)[2]"}],"prose":"the information system automatically disables inactive accounts after the organization-defined time period."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system-generated list of temporary accounts removed and\/or disabled\n\ninformation system-generated list of emergency accounts removed and\/or disabled\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]},{"id":"ac-2.4","class":"SP800-53-enhancement","title":"Automated Audit Actions","params":[{"id":"ac-2.4_prm_1","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"AC-2(4)"},{"name":"sort-id","value":"ac-02.04"}],"parts":[{"id":"ac-2.4_smt","name":"statement","prose":"The information system automatically audits account creation, modification, enabling, disabling, and removal actions, and notifies {{ insert: param, ac-2.4_prm_1 }}."},{"id":"ac-2.4_gdn","name":"guidance","links":[{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"}]},{"id":"ac-2.4_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-2.4_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(4)[1]"}],"prose":"the information system automatically audits the following account actions:","parts":[{"id":"ac-2.4_obj.1.a","name":"objective","props":[{"name":"label","value":"AC-2(4)[1][a]"}],"prose":"creation;"},{"id":"ac-2.4_obj.1.b","name":"objective","props":[{"name":"label","value":"AC-2(4)[1][b]"}],"prose":"modification;"},{"id":"ac-2.4_obj.1.c","name":"objective","props":[{"name":"label","value":"AC-2(4)[1][c]"}],"prose":"enabling;"},{"id":"ac-2.4_obj.1.d","name":"objective","props":[{"name":"label","value":"AC-2(4)[1][d]"}],"prose":"disabling;"},{"id":"ac-2.4_obj.1.e","name":"objective","props":[{"name":"label","value":"AC-2(4)[1][e]"}],"prose":"removal;"}]},{"id":"ac-2.4_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(4)[2]"}],"prose":"the organization defines personnel or roles to be notified of the following account actions:","parts":[{"id":"ac-2.4_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-2(4)[2][a]"}],"prose":"creation;"},{"id":"ac-2.4_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-2(4)[2][b]"}],"prose":"modification;"},{"id":"ac-2.4_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-2(4)[2][c]"}],"prose":"enabling;"},{"id":"ac-2.4_obj.2.d","name":"objective","props":[{"name":"label","value":"AC-2(4)[2][d]"}],"prose":"disabling;"},{"id":"ac-2.4_obj.2.e","name":"objective","props":[{"name":"label","value":"AC-2(4)[2][e]"}],"prose":"removal;"}]},{"id":"ac-2.4_obj.3","name":"objective","props":[{"name":"label","value":"AC-2(4)[3]"}],"prose":"the information system notifies organization-defined personnel or roles of the following account actions:","parts":[{"id":"ac-2.4_obj.3.a","name":"objective","props":[{"name":"label","value":"AC-2(4)[3][a]"}],"prose":"creation;"},{"id":"ac-2.4_obj.3.b","name":"objective","props":[{"name":"label","value":"AC-2(4)[3][b]"}],"prose":"modification;"},{"id":"ac-2.4_obj.3.c","name":"objective","props":[{"name":"label","value":"AC-2(4)[3][c]"}],"prose":"enabling;"},{"id":"ac-2.4_obj.3.d","name":"objective","props":[{"name":"label","value":"AC-2(4)[3][d]"}],"prose":"disabling; and"},{"id":"ac-2.4_obj.3.e","name":"objective","props":[{"name":"label","value":"AC-2(4)[3][e]"}],"prose":"removal."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nnotifications\/alerts of account creation, modification, enabling, disabling, and removal actions\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]}]},{"id":"ac-3","class":"SP800-53","title":"Access Enforcement","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-3"},{"name":"sort-id","value":"ac-03"}],"parts":[{"id":"ac-3_smt","name":"statement","prose":"The information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies."},{"id":"ac-3_gdn","name":"guidance","prose":"Access control policies (e.g., identity-based policies, role-based policies, control matrices, cryptography) control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (e.g., devices, files, records, domains) in information systems. In addition to enforcing authorized access at the information system level and recognizing that information systems can host many applications and services in support of organizational missions and business operations, access enforcement mechanisms can also be employed at the application and service level to provide increased information security.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-5","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-16","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ac-21","rel":"related"},{"href":"#ac-22","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ma-3","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#pe-3","rel":"related"}]},{"id":"ac-3_obj","name":"objective","prose":"Determine if the information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing access enforcement\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of approved authorizations (user privileges)\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access enforcement responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing access control policy"}]}]},{"id":"ac-4","class":"SP800-53","title":"Information Flow Enforcement","params":[{"id":"ac-4_prm_1","label":"organization-defined information flow control policies"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-4"},{"name":"sort-id","value":"ac-04"}],"parts":[{"id":"ac-4_smt","name":"statement","prose":"The information system enforces approved authorizations for controlling the flow of information within the system and between interconnected systems based on {{ insert: param, ac-4_prm_1 }}."},{"id":"ac-4_gdn","name":"guidance","prose":"Information flow control regulates where information is allowed to travel within an information system and between information systems (as opposed to who is allowed to access the information) and without explicit regard to subsequent accesses to that information. Flow control restrictions include, for example, keeping export-controlled information from being transmitted in the clear to the Internet, blocking outside traffic that claims to be from within the organization, restricting web requests to the Internet that are not from the internal web proxy server, and limiting information transfers between organizations based on data structures and content. Transferring information between information systems representing different security domains with different security policies introduces risk that such transfers violate one or more domain security policies. In such situations, information owners\/stewards provide guidance at designated policy enforcement points between interconnected systems. Organizations consider mandating specific architectural solutions when required to enforce specific security policies. Enforcement includes, for example: (i) prohibiting information transfers between interconnected systems (i.e., allowing access only); (ii) employing hardware mechanisms to enforce one-way information flows; and (iii) implementing trustworthy regrading mechanisms to reassign security attributes and security labels. Organizations commonly employ information flow control policies and enforcement mechanisms to control the flow of information between designated sources and destinations (e.g., networks, individuals, and devices) within information systems and between interconnected systems. Flow control is based on the characteristics of the information and\/or the information path. Enforcement occurs, for example, in boundary protection devices (e.g., gateways, routers, guards, encrypted tunnels, firewalls) that employ rule sets or establish configuration settings that restrict information system services, provide a packet-filtering capability based on header information, or message-filtering capability based on message content (e.g., implementing key word searches or using document characteristics). Organizations also consider the trustworthiness of filtering\/inspection mechanisms (i.e., hardware, firmware, and software components) that are critical to information flow enforcement. Control enhancements 3 through 22 primarily address cross-domain solution needs which focus on more advanced filtering techniques, in-depth analysis, and stronger flow enforcement mechanisms implemented in cross-domain products, for example, high-assurance guards. Such capabilities are generally not available in commercial off-the-shelf information technology products.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-21","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sc-2","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-18","rel":"related"}]},{"id":"ac-4_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-4_obj.1","name":"objective","props":[{"name":"label","value":"AC-4[1]"}],"prose":"the organization defines information flow control policies to control the flow of information within the system and between interconnected systems; and"},{"id":"ac-4_obj.2","name":"objective","props":[{"name":"label","value":"AC-4[2]"}],"prose":"the information system enforces approved authorizations for controlling the flow of information within the system and between interconnected systems based on organization-defined information flow control policies."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\ninformation flow control policies\n\nprocedures addressing information flow enforcement\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system baseline configuration\n\nlist of information flow authorizations\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information flow enforcement policy"}]}]},{"id":"ac-5","class":"SP800-53","title":"Separation of Duties","params":[{"id":"ac-5_prm_1","label":"organization-defined duties of individuals"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-5"},{"name":"sort-id","value":"ac-05"}],"parts":[{"id":"ac-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Separates {{ insert: param, ac-5_prm_1 }};"},{"id":"ac-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents separation of duties of individuals; and"},{"id":"ac-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Defines information system access authorizations to support separation of duties."}]},{"id":"ac-5_gdn","name":"guidance","prose":"Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes, for example: (i) dividing mission functions and information system support functions among different individuals and\/or roles; (ii) conducting information system support functions with different individuals (e.g., system management, programming, configuration management, quality assurance and testing, and network security); and (iii) ensuring security personnel administering access control functions do not also administer audit functions.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#ps-2","rel":"related"}]},{"id":"ac-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-5.a_obj","name":"objective","props":[{"name":"label","value":"AC-5(a)"}],"parts":[{"id":"ac-5.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-5(a)[1]"}],"prose":"defines duties of individuals to be separated;"},{"id":"ac-5.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-5(a)[2]"}],"prose":"separates organization-defined duties of individuals;"}]},{"id":"ac-5.b_obj","name":"objective","props":[{"name":"label","value":"AC-5(b)"}],"prose":"documents separation of duties; and"},{"id":"ac-5.c_obj","name":"objective","props":[{"name":"label","value":"AC-5(c)"}],"prose":"defines information system access authorizations to support separation of duties."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing divisions of responsibility and separation of duties\n\ninformation system configuration settings and associated documentation\n\nlist of divisions of responsibility and separation of duties\n\ninformation system access authorizations\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining appropriate divisions of responsibility and separation of duties\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing separation of duties policy"}]}]},{"id":"ac-6","class":"SP800-53","title":"Least Privilege","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-6"},{"name":"sort-id","value":"ac-06"}],"parts":[{"id":"ac-6_smt","name":"statement","prose":"The organization employs the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions."},{"id":"ac-6_gdn","name":"guidance","prose":"Organizations employ least privilege for specific duties and information systems. The principle of least privilege is also applied to information system processes, ensuring that the processes operate at privilege levels no higher than necessary to accomplish required organizational missions\/business functions. Organizations consider the creation of additional processes, roles, and information system accounts as necessary, to achieve least privilege. Organizations also apply least privilege to the development, implementation, and operation of organizational information systems.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#pl-2","rel":"related"}]},{"id":"ac-6_obj","name":"objective","prose":"Determine if the organization employs the principle of least privilege, allowing only authorized access for users (and processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\nlist of assigned access authorizations (user privileges)\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions"}]}],"controls":[{"id":"ac-6.1","class":"SP800-53-enhancement","title":"Authorize Access to Security Functions","params":[{"id":"ac-6.1_prm_1","label":"organization-defined security functions (deployed in hardware, software, and firmware) and security-relevant information"}],"props":[{"name":"label","value":"AC-6(1)"},{"name":"sort-id","value":"ac-06.01"}],"parts":[{"id":"ac-6.1_smt","name":"statement","prose":"The organization explicitly authorizes access to {{ insert: param, ac-6.1_prm_1 }}."},{"id":"ac-6.1_gdn","name":"guidance","prose":"Security functions include, for example, establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters. Security-relevant information includes, for example, filtering rules for routers\/firewalls, cryptographic key management information, configuration parameters for security services, and access control lists. Explicitly authorized personnel include, for example, security administrators, system and network administrators, system security officers, system maintenance personnel, system programmers, and other privileged users.","links":[{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"}]},{"id":"ac-6.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-6.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-6(1)[1]"}],"prose":"defines security-relevant information for which access must be explicitly authorized;"},{"id":"ac-6.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-6(1)[2]"}],"prose":"defines security functions deployed in:","parts":[{"id":"ac-6.1_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-6(1)[2][a]"}],"prose":"hardware;"},{"id":"ac-6.1_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-6(1)[2][b]"}],"prose":"software;"},{"id":"ac-6.1_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-6(1)[2][c]"}],"prose":"firmware;"}]},{"id":"ac-6.1_obj.3","name":"objective","props":[{"name":"label","value":"AC-6(1)[3]"}],"prose":"explicitly authorizes access to:","parts":[{"id":"ac-6.1_obj.3.a","name":"objective","props":[{"name":"label","value":"AC-6(1)[3][a]"}],"prose":"organization-defined security functions; and"},{"id":"ac-6.1_obj.3.b","name":"objective","props":[{"name":"label","value":"AC-6(1)[3][b]"}],"prose":"security-relevant information."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\nlist of security functions (deployed in hardware, software, and firmware) and security-relevant information for which access must be explicitly authorized\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions"}]}]},{"id":"ac-6.2","class":"SP800-53-enhancement","title":"Non-privileged Access for Nonsecurity Functions","params":[{"id":"ac-6.2_prm_1","label":"organization-defined security functions or security-relevant information"}],"props":[{"name":"label","value":"AC-6(2)"},{"name":"sort-id","value":"ac-06.02"}],"parts":[{"id":"ac-6.2_smt","name":"statement","prose":"The organization requires that users of information system accounts, or roles, with access to {{ insert: param, ac-6.2_prm_1 }}, use non-privileged accounts or roles, when accessing nonsecurity functions."},{"id":"ac-6.2_gdn","name":"guidance","prose":"This control enhancement limits exposure when operating from within privileged accounts or roles. The inclusion of roles addresses situations where organizations implement access control policies such as role-based access control and where a change of role provides the same degree of assurance in the change of access authorizations for both the user and all processes acting on behalf of the user as would be provided by a change between a privileged and non-privileged account.","links":[{"href":"#pl-4","rel":"related"}]},{"id":"ac-6.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-6.2_obj.1","name":"objective","props":[{"name":"label","value":"AC-6(2)[1]"}],"prose":"defines security functions or security-relevant information to which users of information system accounts, or roles, have access; and"},{"id":"ac-6.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-6(2)[2]"}],"prose":"requires that users of information system accounts, or roles, with access to organization-defined security functions or security-relevant information, use non-privileged accounts, or roles, when accessing nonsecurity functions."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\nlist of system-generated security functions or security-relevant information assigned to information system accounts or roles\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions"}]}]},{"id":"ac-6.5","class":"SP800-53-enhancement","title":"Privileged Accounts","params":[{"id":"ac-6.5_prm_1","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"AC-6(5)"},{"name":"sort-id","value":"ac-06.05"}],"parts":[{"id":"ac-6.5_smt","name":"statement","prose":"The organization restricts privileged accounts on the information system to {{ insert: param, ac-6.5_prm_1 }}."},{"id":"ac-6.5_gdn","name":"guidance","prose":"Privileged accounts, including super user accounts, are typically described as system administrator for various types of commercial off-the-shelf operating systems. Restricting privileged accounts to specific personnel or roles prevents day-to-day users from having access to privileged information\/functions. Organizations may differentiate in the application of this control enhancement between allowed privileges for local accounts and for domain accounts provided organizations retain the ability to control information system configurations for key security parameters and as otherwise necessary to sufficiently mitigate risk.","links":[{"href":"#cm-6","rel":"related"}]},{"id":"ac-6.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-6.5_obj.1","name":"objective","props":[{"name":"label","value":"AC-6(5)[1]"}],"prose":"defines personnel or roles for which privileged accounts on the information system are to be restricted; and"},{"id":"ac-6.5_obj.2","name":"objective","props":[{"name":"label","value":"AC-6(5)[2]"}],"prose":"restricts privileged accounts on the information system to organization-defined personnel or roles."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\nlist of system-generated privileged accounts\n\nlist of system administration personnel\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions"}]}]},{"id":"ac-6.9","class":"SP800-53-enhancement","title":"Auditing Use of Privileged Functions","props":[{"name":"label","value":"AC-6(9)"},{"name":"sort-id","value":"ac-06.09"}],"parts":[{"id":"ac-6.9_smt","name":"statement","prose":"The information system audits the execution of privileged functions."},{"id":"ac-6.9_gdn","name":"guidance","prose":"Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and ongoing concern and can have significant adverse impacts on organizations. Auditing the use of privileged functions is one way to detect such misuse, and in doing so, help mitigate the risk from insider threats and the advanced persistent threat (APT).","links":[{"href":"#au-2","rel":"related"}]},{"id":"ac-6.9_obj","name":"objective","prose":"Determine if the information system audits the execution of privileged functions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of privileged functions to be audited\n\nlist of audited events\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for reviewing least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms auditing the execution of least privilege functions"}]}]},{"id":"ac-6.10","class":"SP800-53-enhancement","title":"Prohibit Non-privileged Users from Executing Privileged Functions","props":[{"name":"label","value":"AC-6(10)"},{"name":"sort-id","value":"ac-06.10"}],"parts":[{"id":"ac-6.10_smt","name":"statement","prose":"The information system prevents non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards\/countermeasures."},{"id":"ac-6.10_gdn","name":"guidance","prose":"Privileged functions include, for example, establishing information system accounts, performing system integrity checks, or administering cryptographic key management activities. Non-privileged users are individuals that do not possess appropriate authorizations. Circumventing intrusion detection and prevention mechanisms or malicious code protection mechanisms are examples of privileged functions that require protection from non-privileged users."},{"id":"ac-6.10_obj","name":"objective","prose":"Determine if the information system prevents non-privileged users from executing privileged functions to include:","parts":[{"id":"ac-6.10_obj.1","name":"objective","props":[{"name":"label","value":"AC-6(10)[1]"}],"prose":"disabling implemented security safeguards\/countermeasures;"},{"id":"ac-6.10_obj.2","name":"objective","props":[{"name":"label","value":"AC-6(10)[2]"}],"prose":"circumventing security safeguards\/countermeasures; or"},{"id":"ac-6.10_obj.3","name":"objective","props":[{"name":"label","value":"AC-6(10)[3]"}],"prose":"altering implemented security safeguards\/countermeasures."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of privileged functions and associated user account assignments\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions for non-privileged users"}]}]}]},{"id":"ac-7","class":"SP800-53","title":"Unsuccessful Logon Attempts","params":[{"id":"ac-7_prm_1","label":"organization-defined number"},{"id":"ac-7_prm_2","label":"organization-defined time period"},{"id":"ac-7_prm_3","select":{"choice":["locks the account\/node for an {{ insert: param, ac-7_prm_4 }} ","locks the account\/node until released by an administrator","delays next logon prompt according to {{ insert: param, ac-7_prm_5 }} "]}},{"id":"ac-7_prm_4","depends-on":"ac-7_prm_3","label":"organization-defined time period"},{"id":"ac-7_prm_5","depends-on":"ac-7_prm_3","label":"organization-defined delay algorithm"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"AC-7"},{"name":"sort-id","value":"ac-07"}],"parts":[{"id":"ac-7_smt","name":"statement","prose":"The information system:","parts":[{"id":"ac-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Enforces a limit of {{ insert: param, ac-7_prm_1 }} consecutive invalid logon attempts by a user during a {{ insert: param, ac-7_prm_2 }}; and"},{"id":"ac-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Automatically {{ insert: param, ac-7_prm_3 }} when the maximum number of unsuccessful attempts is exceeded."}]},{"id":"ac-7_gdn","name":"guidance","prose":"This control applies regardless of whether the logon occurs via a local or network connection. Due to the potential for denial of service, automatic lockouts initiated by information systems are usually temporary and automatically release after a predetermined time period established by organizations. If a delay algorithm is selected, organizations may choose to employ different algorithms for different information system components based on the capabilities of those components. Responses to unsuccessful logon attempts may be implemented at both the operating system and the application levels.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-9","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ia-5","rel":"related"}]},{"id":"ac-7_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-7.a_obj","name":"objective","props":[{"name":"label","value":"AC-7(a)"}],"parts":[{"id":"ac-7.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-7(a)[1]"}],"prose":"the organization defines the number of consecutive invalid logon attempts allowed to the information system by a user during an organization-defined time period;"},{"id":"ac-7.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-7(a)[2]"}],"prose":"the organization defines the time period allowed by a user of the information system for an organization-defined number of consecutive invalid logon attempts;"},{"id":"ac-7.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-7(a)[3]"}],"prose":"the information system enforces a limit of organization-defined number of consecutive invalid logon attempts by a user during an organization-defined time period;"}]},{"id":"ac-7.b_obj","name":"objective","props":[{"name":"label","value":"AC-7(b)"}],"parts":[{"id":"ac-7.b_obj.1","name":"objective","props":[{"name":"label","value":"AC-7(b)[1]"}],"prose":"the organization defines account\/node lockout time period or logon delay algorithm to be automatically enforced by the information system when the maximum number of unsuccessful logon attempts is exceeded;"},{"id":"ac-7.b_obj.2","name":"objective","props":[{"name":"label","value":"AC-7(b)[2]"}],"prose":"the information system, when the maximum number of unsuccessful logon attempts is exceeded, automatically:","parts":[{"id":"ac-7.b_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-7(b)[2][a]"}],"prose":"locks the account\/node for the organization-defined time period;"},{"id":"ac-7.b_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-7(b)[2][b]"}],"prose":"locks the account\/node until released by an administrator; or"},{"id":"ac-7.b_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-7(b)[2][c]"}],"prose":"delays next logon prompt according to the organization-defined delay algorithm."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing unsuccessful logon attempts\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem developers\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing access control policy for unsuccessful logon attempts"}]}]},{"id":"ac-8","class":"SP800-53","title":"System Use Notification","params":[{"id":"ac-8_prm_1","label":"organization-defined system use notification message or banner"},{"id":"ac-8_prm_2","label":"organization-defined conditions"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-8"},{"name":"sort-id","value":"ac-08"}],"parts":[{"id":"ac-8_smt","name":"statement","prose":"The information system:","parts":[{"id":"ac-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Displays to users {{ insert: param, ac-8_prm_1 }} before granting access to the system that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance and states that:","parts":[{"id":"ac-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Users are accessing a U.S. Government information system;"},{"id":"ac-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Information system usage may be monitored, recorded, and subject to audit;"},{"id":"ac-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Unauthorized use of the information system is prohibited and subject to criminal and civil penalties; and"},{"id":"ac-8_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Use of the information system indicates consent to monitoring and recording;"}]},{"id":"ac-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Retains the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the information system; and"},{"id":"ac-8_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"For publicly accessible systems:","parts":[{"id":"ac-8_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Displays system use information {{ insert: param, ac-8_prm_2 }}, before granting further access;"},{"id":"ac-8_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Displays references, if any, to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities; and"},{"id":"ac-8_smt.c.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Includes a description of the authorized uses of the system."}]}]},{"id":"ac-8_gdn","name":"guidance","prose":"System use notifications can be implemented using messages or warning banners displayed before individuals log in to information systems. System use notifications are used only for access via logon interfaces with human users and are not required when such human interfaces do not exist. Organizations consider system use notification messages\/banners displayed in multiple languages based on specific organizational needs and the demographics of information system users. Organizations also consult with the Office of the General Counsel for legal review and approval of warning banner content."},{"id":"ac-8_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-8.a_obj","name":"objective","props":[{"name":"label","value":"AC-8(a)"}],"parts":[{"id":"ac-8.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-8(a)[1]"}],"prose":"the organization defines a system use notification message or banner to be displayed by the information system to users before granting access to the system;"},{"id":"ac-8.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2]"}],"prose":"the information system displays to users the organization-defined system use notification message or banner before granting access to the information system that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance, and states that:","parts":[{"id":"ac-8.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](1)"}],"prose":"users are accessing a U.S. Government information system;"},{"id":"ac-8.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](2)"}],"prose":"information system usage may be monitored, recorded, and subject to audit;"},{"id":"ac-8.a.3_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](3)"}],"prose":"unauthorized use of the information system is prohibited and subject to criminal and civil penalties;"},{"id":"ac-8.a.4_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](4)"}],"prose":"use of the information system indicates consent to monitoring and recording;"}]}]},{"id":"ac-8.b_obj","name":"objective","props":[{"name":"label","value":"AC-8(b)"}],"prose":"the information system retains the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the information system;"},{"id":"ac-8.c_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)"}],"prose":"for publicly accessible systems:","parts":[{"id":"ac-8.c.1_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)(1)"}],"parts":[{"id":"ac-8.c.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-8(c)(1)[1]"}],"prose":"the organization defines conditions for system use to be displayed by the information system before granting further access;"},{"id":"ac-8.c.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(c)(1)[2]"}],"prose":"the information system displays organization-defined conditions before granting further access;"}]},{"id":"ac-8.c.2_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)(2)"}],"prose":"the information system displays references, if any, to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities; and"},{"id":"ac-8.c.3_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)(3)"}],"prose":"the information system includes a description of the authorized uses of the system."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprivacy and security policies, procedures addressing system use notification\n\ndocumented approval of information system use notification messages or banners\n\ninformation system audit records\n\nuser acknowledgements of notification message or banner\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system use notification messages\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibility for providing legal advice\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing system use notification"}]}]},{"id":"ac-11","class":"SP800-53","title":"Session Lock","params":[{"id":"ac-11_prm_1","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AC-11"},{"name":"sort-id","value":"ac-11"}],"links":[{"href":"#4da24a96-6cf8-435d-9d1f-c73247cad109","rel":"reference"}],"parts":[{"id":"ac-11_smt","name":"statement","prose":"The information system:","parts":[{"id":"ac-11_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Prevents further access to the system by initiating a session lock after {{ insert: param, ac-11_prm_1 }} of inactivity or upon receiving a request from a user; and"},{"id":"ac-11_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Retains the session lock until the user reestablishes access using established identification and authentication procedures."}]},{"id":"ac-11_gdn","name":"guidance","prose":"Session locks are temporary actions taken when users stop work and move away from the immediate vicinity of information systems but do not want to log out because of the temporary nature of their absences. Session locks are implemented where session activities can be determined. This is typically at the operating system level, but can also be at the application level. Session locks are not an acceptable substitute for logging out of information systems, for example, if organizations require users to log out at the end of workdays.","links":[{"href":"#ac-7","rel":"related"}]},{"id":"ac-11_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-11.a_obj","name":"objective","props":[{"name":"label","value":"AC-11(a)"}],"parts":[{"id":"ac-11.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-11(a)[1]"}],"prose":"the organization defines the time period of user inactivity after which the information system initiates a session lock;"},{"id":"ac-11.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-11(a)[2]"}],"prose":"the information system prevents further access to the system by initiating a session lock after organization-defined time period of user inactivity or upon receiving a request from a user; and"}]},{"id":"ac-11.b_obj","name":"objective","props":[{"name":"label","value":"AC-11(b)"}],"prose":"the information system retains the session lock until the user reestablishes access using established identification and authentication procedures."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing session lock\n\nprocedures addressing identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing access control policy for session lock"}]}],"controls":[{"id":"ac-11.1","class":"SP800-53-enhancement","title":"Pattern-hiding Displays","props":[{"name":"label","value":"AC-11(1)"},{"name":"sort-id","value":"ac-11.01"}],"parts":[{"id":"ac-11.1_smt","name":"statement","prose":"The information system conceals, via the session lock, information previously visible on the display with a publicly viewable image."},{"id":"ac-11.1_gdn","name":"guidance","prose":"Publicly viewable images can include static or dynamic images, for example, patterns used with screen savers, photographic images, solid colors, clock, battery life indicator, or a blank screen, with the additional caveat that none of the images convey sensitive information."},{"id":"ac-11.1_obj","name":"objective","prose":"Determine if the information system conceals, via the session lock, information previously visible on the display with a publicly viewable image."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing session lock\n\ndisplay screen with session lock activated\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Information system session lock mechanisms"}]}]}]},{"id":"ac-12","class":"SP800-53","title":"Session Termination","params":[{"id":"ac-12_prm_1","label":"organization-defined conditions or trigger events requiring session disconnect"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"AC-12"},{"name":"sort-id","value":"ac-12"}],"parts":[{"id":"ac-12_smt","name":"statement","prose":"The information system automatically terminates a user session after {{ insert: param, ac-12_prm_1 }}."},{"id":"ac-12_gdn","name":"guidance","prose":"This control addresses the termination of user-initiated logical sessions in contrast to SC-10 which addresses the termination of network connections that are associated with communications sessions (i.e., network disconnect). A logical session (for local, network, and remote access) is initiated whenever a user (or process acting on behalf of a user) accesses an organizational information system. Such user sessions can be terminated (and thus terminate user access) without terminating network sessions. Session termination terminates all processes associated with a user’s logical session except those processes that are specifically created by the user (i.e., session owner) to continue after the session is terminated. Conditions or trigger events requiring automatic session termination can include, for example, organization-defined periods of user inactivity, targeted responses to certain types of incidents, time-of-day restrictions on information system use.","links":[{"href":"#sc-10","rel":"related"},{"href":"#sc-23","rel":"related"}]},{"id":"ac-12_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-12_obj.1","name":"objective","props":[{"name":"label","value":"AC-12[1]"}],"prose":"the organization defines conditions or trigger events requiring session disconnect; and"},{"id":"ac-12_obj.2","name":"objective","props":[{"name":"label","value":"AC-12[2]"}],"prose":"the information system automatically terminates a user session after organization-defined conditions or trigger events requiring session disconnect occurs."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing session termination\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of conditions or trigger events requiring session disconnect\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing user session termination"}]}]},{"id":"ac-14","class":"SP800-53","title":"Permitted Actions Without Identification or Authentication","params":[{"id":"ac-14_prm_1","label":"organization-defined user actions"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AC-14"},{"name":"sort-id","value":"ac-14"}],"parts":[{"id":"ac-14_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-14_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Identifies {{ insert: param, ac-14_prm_1 }} that can be performed on the information system without identification or authentication consistent with organizational missions\/business functions; and"},{"id":"ac-14_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents and provides supporting rationale in the security plan for the information system, user actions not requiring identification or authentication."}]},{"id":"ac-14_gdn","name":"guidance","prose":"This control addresses situations in which organizations determine that no identification or authentication is required in organizational information systems. Organizations may allow a limited number of user actions without identification or authentication including, for example, when individuals access public websites or other publicly accessible federal information systems, when individuals use mobile phones to receive calls, or when facsimiles are received. Organizations also identify actions that normally require identification or authentication but may under certain circumstances (e.g., emergencies), allow identification or authentication mechanisms to be bypassed. Such bypasses may occur, for example, via a software-readable physical switch that commands bypass of the logon functionality and is protected from accidental or unmonitored use. This control does not apply to situations where identification and authentication have already occurred and are not repeated, but rather to situations where identification and authentication have not yet occurred. Organizations may decide that there are no user actions that can be performed on organizational information systems without identification and authentication and thus, the values for assignment statements can be none.","links":[{"href":"#cp-2","rel":"related"},{"href":"#ia-2","rel":"related"}]},{"id":"ac-14_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-14.a_obj","name":"objective","props":[{"name":"label","value":"AC-14(a)"}],"parts":[{"id":"ac-14.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-14(a)[1]"}],"prose":"defines user actions that can be performed on the information system without identification or authentication consistent with organizational missions\/business functions;"},{"id":"ac-14.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-14(a)[2]"}],"prose":"identifies organization-defined user actions that can be performed on the information system without identification or authentication consistent with organizational missions\/business functions; and"}]},{"id":"ac-14.b_obj","name":"objective","props":[{"name":"label","value":"AC-14(b)"}],"prose":"documents and provides supporting rationale in the security plan for the information system, user actions not requiring identification or authentication."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing permitted actions without identification or authentication\n\ninformation system configuration settings and associated documentation\n\nsecurity plan\n\nlist of user actions that can be performed without identification or authentication\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ac-17","class":"SP800-53","title":"Remote Access","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-17"},{"name":"sort-id","value":"ac-17"}],"links":[{"href":"#5309d4d0-46f8-4213-a749-e7584164e5e8","rel":"reference"},{"href":"#99f331f2-a9f0-46c2-9856-a3cbb9b89442","rel":"reference"},{"href":"#349fe082-502d-464a-aa0c-1443c6a5cf40","rel":"reference"},{"href":"#1201fcf3-afb1-4675-915a-fb4ae0435717","rel":"reference"},{"href":"#d1a4e2a9-e512-4132-8795-5357aba29254","rel":"reference"}],"parts":[{"id":"ac-17_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-17_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes and documents usage restrictions, configuration\/connection requirements, and implementation guidance for each type of remote access allowed; and"},{"id":"ac-17_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes remote access to the information system prior to allowing such connections."}]},{"id":"ac-17_gdn","name":"guidance","prose":"Remote access is access to organizational information systems by users (or processes acting on behalf of users) communicating through external networks (e.g., the Internet). Remote access methods include, for example, dial-up, broadband, and wireless. Organizations often employ encrypted virtual private networks (VPNs) to enhance confidentiality and integrity over remote connections. The use of encrypted VPNs does not make the access non-remote; however, the use of VPNs, when adequately provisioned with appropriate security controls (e.g., employing appropriate encryption techniques for confidentiality and integrity protection) may provide sufficient assurance to the organization that it can effectively treat such connections as internal networks. Still, VPN connections traverse external networks, and the encrypted VPN does not enhance the availability of remote connections. Also, VPNs with encrypted tunnels can affect the organizational capability to adequately monitor network communications traffic for malicious code. Remote access controls apply to information systems other than public web servers or systems designed for public access. This control addresses authorization prior to allowing remote access without specifying the formats for such authorization. While organizations may use interconnection security agreements to authorize remote access connections, such agreements are not required by this control. Enforcing access restrictions for remote connections is addressed in AC-3.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#pe-17","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sc-10","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ac-17_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-17.a_obj","name":"objective","props":[{"name":"label","value":"AC-17(a)"}],"parts":[{"id":"ac-17.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-17(a)[1]"}],"prose":"identifies the types of remote access allowed to the information system;"},{"id":"ac-17.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-17(a)[2]"}],"prose":"establishes for each type of remote access allowed:","parts":[{"id":"ac-17.a_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-17(a)[2][a]"}],"prose":"usage restrictions;"},{"id":"ac-17.a_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-17(a)[2][b]"}],"prose":"configuration\/connection requirements;"},{"id":"ac-17.a_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-17(a)[2][c]"}],"prose":"implementation guidance;"}]},{"id":"ac-17.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-17(a)[3]"}],"prose":"documents for each type of remote access allowed:","parts":[{"id":"ac-17.a_obj.3.a","name":"objective","props":[{"name":"label","value":"AC-17(a)[3][a]"}],"prose":"usage restrictions;"},{"id":"ac-17.a_obj.3.b","name":"objective","props":[{"name":"label","value":"AC-17(a)[3][b]"}],"prose":"configuration\/connection requirements;"},{"id":"ac-17.a_obj.3.c","name":"objective","props":[{"name":"label","value":"AC-17(a)[3][c]"}],"prose":"implementation guidance; and"}]}]},{"id":"ac-17.b_obj","name":"objective","props":[{"name":"label","value":"AC-17(b)"}],"prose":"authorizes remote access to the information system prior to allowing such connections."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access implementation and usage (including restrictions)\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\nremote access authorizations\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing remote access connections\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Remote access management capability for the information system"}]}],"controls":[{"id":"ac-17.1","class":"SP800-53-enhancement","title":"Automated Monitoring \/ Control","props":[{"name":"label","value":"AC-17(1)"},{"name":"sort-id","value":"ac-17.01"}],"parts":[{"id":"ac-17.1_smt","name":"statement","prose":"The information system monitors and controls remote access methods."},{"id":"ac-17.1_gdn","name":"guidance","prose":"Automated monitoring and control of remote access sessions allows organizations to detect cyber attacks and also ensure ongoing compliance with remote access policies by auditing connection activities of remote users on a variety of information system components (e.g., servers, workstations, notebook computers, smart phones, and tablets).","links":[{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"}]},{"id":"ac-17.1_obj","name":"objective","prose":"Determine if the information system monitors and controls remote access methods."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access to the information system\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\ninformation system monitoring records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms monitoring and controlling remote access methods"}]}]},{"id":"ac-17.2","class":"SP800-53-enhancement","title":"Protection of Confidentiality \/ Integrity Using Encryption","props":[{"name":"label","value":"AC-17(2)"},{"name":"sort-id","value":"ac-17.02"}],"parts":[{"id":"ac-17.2_smt","name":"statement","prose":"The information system implements cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions."},{"id":"ac-17.2_gdn","name":"guidance","prose":"The encryption strength of mechanism is selected based on the security categorization of the information.","links":[{"href":"#sc-8","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"ac-17.2_obj","name":"objective","prose":"Determine if the information system implements cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access to the information system\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ncryptographic mechanisms and associated configuration documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Cryptographic mechanisms protecting confidentiality and integrity of remote access sessions"}]}]},{"id":"ac-17.3","class":"SP800-53-enhancement","title":"Managed Access Control Points","params":[{"id":"ac-17.3_prm_1","label":"organization-defined number"}],"props":[{"name":"label","value":"AC-17(3)"},{"name":"sort-id","value":"ac-17.03"}],"parts":[{"id":"ac-17.3_smt","name":"statement","prose":"The information system routes all remote accesses through {{ insert: param, ac-17.3_prm_1 }} managed network access control points."},{"id":"ac-17.3_gdn","name":"guidance","prose":"Limiting the number of access control points for remote accesses reduces the attack surface for organizations. Organizations consider the Trusted Internet Connections (TIC) initiative requirements for external network connections.","links":[{"href":"#sc-7","rel":"related"}]},{"id":"ac-17.3_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-17.3_obj.1","name":"objective","props":[{"name":"label","value":"AC-17(3)[1]"}],"prose":"the organization defines the number of managed network access control points through which all remote accesses are to be routed; and"},{"id":"ac-17.3_obj.2","name":"objective","props":[{"name":"label","value":"AC-17(3)[2]"}],"prose":"the information system routes all remote accesses through the organization-defined number of managed network access control points."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access to the information system\n\ninformation system design documentation\n\nlist of all managed network access control points\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms routing all remote accesses through managed network access control points"}]}]},{"id":"ac-17.4","class":"SP800-53-enhancement","title":"Privileged Commands \/ Access","params":[{"id":"ac-17.4_prm_1","label":"organization-defined needs"}],"props":[{"name":"label","value":"AC-17(4)"},{"name":"sort-id","value":"ac-17.04"}],"parts":[{"id":"ac-17.4_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-17.4_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Authorizes the execution of privileged commands and access to security-relevant information via remote access only for {{ insert: param, ac-17.4_prm_1 }}; and"},{"id":"ac-17.4_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Documents the rationale for such access in the security plan for the information system."}]},{"id":"ac-17.4_gdn","name":"guidance","links":[{"href":"#ac-6","rel":"related"}]},{"id":"ac-17.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-17.4.a_obj","name":"objective","props":[{"name":"label","value":"AC-17(4)(a)"}],"parts":[{"id":"ac-17.4.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-17(4)(a)[1]"}],"prose":"defines needs to authorize the execution of privileged commands and access to security-relevant information via remote access;"},{"id":"ac-17.4.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-17(4)(a)[2]"}],"prose":"authorizes the execution of privileged commands and access to security-relevant information via remote access only for organization-defined needs; and"}],"links":[{"href":"#ac-17.4_smt.a","rel":"corresp"}]},{"id":"ac-17.4.b_obj","name":"objective","props":[{"name":"label","value":"AC-17(4)(b)"}],"prose":"documents the rationale for such access in the information system security plan.","links":[{"href":"#ac-17.4_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access to the information system\n\ninformation system configuration settings and associated documentation\n\nsecurity plan\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing remote access management"}]}]}]},{"id":"ac-18","class":"SP800-53","title":"Wireless Access","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-18"},{"name":"sort-id","value":"ac-18"}],"links":[{"href":"#238ed479-eccb-49f6-82ec-ab74a7a428cf","rel":"reference"},{"href":"#d1b1d689-0f66-4474-9924-c81119758dc1","rel":"reference"},{"href":"#6f336ecd-f2a0-4c84-9699-0491d81b6e0d","rel":"reference"}],"parts":[{"id":"ac-18_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-18_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes usage restrictions, configuration\/connection requirements, and implementation guidance for wireless access; and"},{"id":"ac-18_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes wireless access to the information system prior to allowing such connections."}]},{"id":"ac-18_gdn","name":"guidance","prose":"Wireless technologies include, for example, microwave, packet radio (UHF\/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP\/TLS, PEAP), which provide credential protection and mutual authentication.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ac-18_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-18.a_obj","name":"objective","props":[{"name":"label","value":"AC-18(a)"}],"prose":"establishes for wireless access:","parts":[{"id":"ac-18.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-18(a)[1]"}],"prose":"usage restrictions;"},{"id":"ac-18.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-18(a)[2]"}],"prose":"configuration\/connection requirement;"},{"id":"ac-18.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-18(a)[3]"}],"prose":"implementation guidance; and"}]},{"id":"ac-18.b_obj","name":"objective","props":[{"name":"label","value":"AC-18(b)"}],"prose":"authorizes wireless access to the information system prior to allowing such connections."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing wireless access implementation and usage (including restrictions)\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nwireless access authorizations\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing wireless access connections\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Wireless access management capability for the information system"}]}],"controls":[{"id":"ac-18.1","class":"SP800-53-enhancement","title":"Authentication and Encryption","params":[{"id":"ac-18.1_prm_1","select":{"how-many":"one-or-more","choice":["users","devices"]}}],"props":[{"name":"label","value":"AC-18(1)"},{"name":"sort-id","value":"ac-18.01"}],"parts":[{"id":"ac-18.1_smt","name":"statement","prose":"The information system protects wireless access to the system using authentication of {{ insert: param, ac-18.1_prm_1 }} and encryption."},{"id":"ac-18.1_gdn","name":"guidance","links":[{"href":"#sc-8","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"ac-18.1_obj","name":"objective","prose":"Determine if the information system protects wireless access to the system using encryption and one or more of the following:","parts":[{"id":"ac-18.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-18(1)[1]"}],"prose":"authentication of users; and\/or"},{"id":"ac-18.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-18(1)[2]"}],"prose":"authentication of devices."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing wireless implementation and usage (including restrictions)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing wireless access protections to the information system"}]}]}]},{"id":"ac-19","class":"SP800-53","title":"Access Control for Mobile Devices","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-19"},{"name":"sort-id","value":"ac-19"}],"links":[{"href":"#4da24a96-6cf8-435d-9d1f-c73247cad109","rel":"reference"},{"href":"#1201fcf3-afb1-4675-915a-fb4ae0435717","rel":"reference"},{"href":"#0293a393-fbe8-4ed1-b0b4-f6fbd3ae1589","rel":"reference"},{"href":"#6513e480-fada-4876-abba-1397084dfb26","rel":"reference"}],"parts":[{"id":"ac-19_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-19_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes usage restrictions, configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices; and"},{"id":"ac-19_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes the connection of mobile devices to organizational information systems."}]},{"id":"ac-19_gdn","name":"guidance","prose":"A mobile device is a computing device that: (i) has a small form factor such that it can easily be carried by a single individual; (ii) is designed to operate without a physical connection (e.g., wirelessly transmit or receive information); (iii) possesses local, non-removable or removable data storage; and (iv) includes a self-contained power source. Mobile devices may also include voice communication capabilities, on-board sensors that allow the device to capture information, and\/or built-in features for synchronizing local data with remote locations. Examples include smart phones, E-readers, and tablets. Mobile devices are typically associated with a single individual and the device is usually in close proximity to the individual; however, the degree of proximity can vary depending upon on the form factor and size of the device. The processing, storage, and transmission capability of the mobile device may be comparable to or merely a subset of desktop systems, depending upon the nature and intended purpose of the device. Due to the large variety of mobile devices with different technical characteristics and capabilities, organizational restrictions may vary for the different classes\/types of such devices. Usage restrictions and specific implementation guidance for mobile devices include, for example, configuration management, device identification and authentication, implementation of mandatory protective software (e.g., malicious code detection, firewall), scanning devices for malicious code, updating virus protection software, scanning for critical software updates and patches, conducting primary operating system (and possibly other resident software) integrity checks, and disabling unnecessary hardware (e.g., wireless, infrared). Organizations are cautioned that the need to provide adequate security for mobile devices goes beyond the requirements in this control. Many safeguards and countermeasures for mobile devices are reflected in other security controls in the catalog allocated in the initial control baselines as starting points for the development of security plans and overlays using the tailoring process. There may also be some degree of overlap in the requirements articulated by the security controls within the different families of controls. AC-20 addresses mobile devices that are not organization-controlled.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-7","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ca-9","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-43","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ac-19_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-19.a_obj","name":"objective","props":[{"name":"label","value":"AC-19(a)"}],"prose":"establishes for organization-controlled mobile devices:","parts":[{"id":"ac-19.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-19(a)[1]"}],"prose":"usage restrictions;"},{"id":"ac-19.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-19(a)[2]"}],"prose":"configuration\/connection requirement;"},{"id":"ac-19.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-19(a)[3]"}],"prose":"implementation guidance; and"}]},{"id":"ac-19.b_obj","name":"objective","props":[{"name":"label","value":"AC-19(b)"}],"prose":"authorizes the connection of mobile devices to organizational information systems."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing access control for mobile device usage (including restrictions)\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nauthorizations for mobile device connections to organizational information systems\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel using mobile devices to access organizational information systems\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Access control capability authorizing mobile device connections to organizational information systems"}]}],"controls":[{"id":"ac-19.5","class":"SP800-53-enhancement","title":"Full Device \/ Container-based Encryption","params":[{"id":"ac-19.5_prm_1","select":{"choice":["full-device encryption","container encryption"]}},{"id":"ac-19.5_prm_2","label":"organization-defined mobile devices"}],"props":[{"name":"label","value":"AC-19(5)"},{"name":"sort-id","value":"ac-19.05"}],"parts":[{"id":"ac-19.5_smt","name":"statement","prose":"The organization employs {{ insert: param, ac-19.5_prm_1 }} to protect the confidentiality and integrity of information on {{ insert: param, ac-19.5_prm_2 }}."},{"id":"ac-19.5_gdn","name":"guidance","prose":"Container-based encryption provides a more fine-grained approach to the encryption of data\/information on mobile devices, including for example, encrypting selected data structures such as files, records, or fields.","links":[{"href":"#mp-5","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-28","rel":"related"}]},{"id":"ac-19.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-19.5_obj.1","name":"objective","props":[{"name":"label","value":"AC-19(5)[1]"}],"prose":"defines mobile devices for which full-device encryption or container encryption is required to protect the confidentiality and integrity of information on such devices; and"},{"id":"ac-19.5_obj.2","name":"objective","props":[{"name":"label","value":"AC-19(5)[2]"}],"prose":"employs full-device encryption or container encryption to protect the confidentiality and integrity of information on organization-defined mobile devices."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing access control for mobile devices\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nencryption mechanism s and associated configuration documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access control responsibilities for mobile devices\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Encryption mechanisms protecting confidentiality and integrity of information on mobile devices"}]}]}]},{"id":"ac-20","class":"SP800-53","title":"Use of External Information Systems","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-20"},{"name":"sort-id","value":"ac-20"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"}],"parts":[{"id":"ac-20_smt","name":"statement","prose":"The organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and\/or maintaining external information systems, allowing authorized individuals to:","parts":[{"id":"ac-20_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Access the information system from external information systems; and"},{"id":"ac-20_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Process, store, or transmit organization-controlled information using external information systems."}]},{"id":"ac-20_gdn","name":"guidance","prose":"External information systems are information systems or components of information systems that are outside of the authorization boundary established by organizations and for which organizations typically have no direct supervision and authority over the application of required security controls or the assessment of control effectiveness. External information systems include, for example: (i) personally owned information systems\/devices (e.g., notebook computers, smart phones, tablets, personal digital assistants); (ii) privately owned computing and communications devices resident in commercial or public facilities (e.g., hotels, train stations, convention centers, shopping malls, or airports); (iii) information systems owned or controlled by nonfederal governmental organizations; and (iv) federal information systems that are not owned by, operated by, or under the direct supervision and authority of organizations. This control also addresses the use of external information systems for the processing, storage, or transmission of organizational information, including, for example, accessing cloud services (e.g., infrastructure as a service, platform as a service, or software as a service) from organizational information systems. For some external information systems (i.e., information systems operated by other federal agencies, including organizations subordinate to those agencies), the trust relationships that have been established between those organizations and the originating organization may be such, that no explicit terms and conditions are required. Information systems within these organizations would not be considered external. These situations occur when, for example, there are pre-existing sharing\/trust agreements (either implicit or explicit) established between federal agencies or organizations subordinate to those agencies, or when such trust agreements are specified by applicable laws, Executive Orders, directives, or policies. Authorized individuals include, for example, organizational personnel, contractors, or other individuals with authorized access to organizational information systems and over which organizations have the authority to impose rules of behavior with regard to system access. Restrictions that organizations impose on authorized individuals need not be uniform, as those restrictions may vary depending upon the trust relationships between organizations. Therefore, organizations may choose to impose different security restrictions on contractors than on state, local, or tribal governments. This control does not apply to the use of external information systems to access public interfaces to organizational information systems (e.g., individuals accessing federal information through www.usa.gov). Organizations establish terms and conditions for the use of external information systems in accordance with organizational security policies and procedures. Terms and conditions address as a minimum: types of applications that can be accessed on organizational information systems from external information systems; and the highest security category of information that can be processed, stored, or transmitted on external information systems. If terms and conditions with the owners of external information systems cannot be established, organizations may impose restrictions on organizational personnel using those external systems.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sa-9","rel":"related"}]},{"id":"ac-20_obj","name":"objective","prose":"Determine if the organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and\/or maintaining external information systems, allowing authorized individuals to:","parts":[{"id":"ac-20.a_obj","name":"objective","props":[{"name":"label","value":"AC-20(a)"}],"prose":"access the information system from the external information systems; and"},{"id":"ac-20.b_obj","name":"objective","props":[{"name":"label","value":"AC-20(b)"}],"prose":"process, store, or transmit organization-controlled information using external information systems."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing the use of external information systems\n\nexternal information systems terms and conditions\n\nlist of types of applications accessible from external information systems\n\nmaximum security categorization for information processed, stored, or transmitted on external information systems\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining terms and conditions for use of external information systems to access organizational systems\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing terms and conditions on use of external information systems"}]}],"controls":[{"id":"ac-20.1","class":"SP800-53-enhancement","title":"Limits On Authorized Use","props":[{"name":"label","value":"AC-20(1)"},{"name":"sort-id","value":"ac-20.01"}],"parts":[{"id":"ac-20.1_smt","name":"statement","prose":"The organization permits authorized individuals to use an external information system to access the information system or to process, store, or transmit organization-controlled information only when the organization:","parts":[{"id":"ac-20.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Verifies the implementation of required security controls on the external system as specified in the organization’s information security policy and security plan; or"},{"id":"ac-20.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Retains approved information system connection or processing agreements with the organizational entity hosting the external information system."}]},{"id":"ac-20.1_gdn","name":"guidance","prose":"This control enhancement recognizes that there are circumstances where individuals using external information systems (e.g., contractors, coalition partners) need to access organizational information systems. In those situations, organizations need confidence that the external information systems contain the necessary security safeguards (i.e., security controls), so as not to compromise, damage, or otherwise harm organizational information systems. Verification that the required security controls have been implemented can be achieved, for example, by third-party, independent assessments, attestations, or other means, depending on the confidence level required by organizations.","links":[{"href":"#ca-2","rel":"related"}]},{"id":"ac-20.1_obj","name":"objective","prose":"Determine if the organization permits authorized individuals to use an external information system to access the information system or to process, store, or transmit organization-controlled information only when the organization:","parts":[{"id":"ac-20.1.a_obj","name":"objective","props":[{"name":"label","value":"AC-20(1)(a)"}],"prose":"verifies the implementation of required security controls on the external system as specified in the organization’s information security policy and security plan; or","links":[{"href":"#ac-20.1_smt.a","rel":"corresp"}]},{"id":"ac-20.1.b_obj","name":"objective","props":[{"name":"label","value":"AC-20(1)(b)"}],"prose":"retains approved information system connection or processing agreements with the organizational entity hosting the external information system.","links":[{"href":"#ac-20.1_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing the use of external information systems\n\nsecurity plan\n\ninformation system connection or processing agreements\n\naccount management documents\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing limits on use of external information systems"}]}]},{"id":"ac-20.2","class":"SP800-53-enhancement","title":"Portable Storage Devices","params":[{"id":"ac-20.2_prm_1","select":{"choice":["restricts","prohibits"]}}],"props":[{"name":"label","value":"AC-20(2)"},{"name":"sort-id","value":"ac-20.02"}],"parts":[{"id":"ac-20.2_smt","name":"statement","prose":"The organization {{ insert: param, ac-20.2_prm_1 }} the use of organization-controlled portable storage devices by authorized individuals on external information systems."},{"id":"ac-20.2_gdn","name":"guidance","prose":"Limits on the use of organization-controlled portable storage devices in external information systems include, for example, complete prohibition of the use of such devices or restrictions on how the devices may be used and under what conditions the devices may be used."},{"id":"ac-20.2_obj","name":"objective","prose":"Determine if the organization restricts or prohibits the use of organization-controlled portable storage devices by authorized individuals on external information systems."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing the use of external information systems\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\ninformation system connection or processing agreements\n\naccount management documents\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for restricting or prohibiting use of organization-controlled storage devices on external information systems\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing restrictions on use of portable storage devices"}]}]}]},{"id":"ac-21","class":"SP800-53","title":"Information Sharing","params":[{"id":"ac-21_prm_1","label":"organization-defined information sharing circumstances where user discretion is required"},{"id":"ac-21_prm_2","label":"organization-defined automated mechanisms or manual processes"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"AC-21"},{"name":"sort-id","value":"ac-21"}],"parts":[{"id":"ac-21_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-21_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Facilitates information sharing by enabling authorized users to determine whether access authorizations assigned to the sharing partner match the access restrictions on the information for {{ insert: param, ac-21_prm_1 }}; and"},{"id":"ac-21_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Employs {{ insert: param, ac-21_prm_2 }} to assist users in making information sharing\/collaboration decisions."}]},{"id":"ac-21_gdn","name":"guidance","prose":"This control applies to information that may be restricted in some manner (e.g., privileged medical information, contract-sensitive information, proprietary information, personally identifiable information, classified information related to special access programs or compartments) based on some formal or administrative determination. Depending on the particular information-sharing circumstances, sharing partners may be defined at the individual, group, or organizational level. Information may be defined by content, type, security category, or special access program\/compartment.","links":[{"href":"#ac-3","rel":"related"}]},{"id":"ac-21_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-21.a_obj","name":"objective","props":[{"name":"label","value":"AC-21(a)"}],"parts":[{"id":"ac-21.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-21(a)[1]"}],"prose":"defines information sharing circumstances where user discretion is required;"},{"id":"ac-21.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-21(a)[2]"}],"prose":"facilitates information sharing by enabling authorized users to determine whether access authorizations assigned to the sharing partner match the access restrictions on the information for organization-defined information sharing circumstances;"}]},{"id":"ac-21.b_obj","name":"objective","props":[{"name":"label","value":"AC-21(b)"}],"parts":[{"id":"ac-21.b_obj.1","name":"objective","props":[{"name":"label","value":"AC-21(b)[1]"}],"prose":"defines automated mechanisms or manual processes to be employed to assist users in making information sharing\/collaboration decisions; and"},{"id":"ac-21.b_obj.2","name":"objective","props":[{"name":"label","value":"AC-21(b)[2]"}],"prose":"employs organization-defined automated mechanisms or manual processes to assist users in making information sharing\/collaboration decisions."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing user-based collaboration and information sharing (including restrictions)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of users authorized to make information sharing\/collaboration decisions\n\nlist of information sharing circumstances requiring user discretion\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel responsible for making information sharing\/collaboration decisions\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms or manual process implementing access authorizations supporting information sharing\/user collaboration decisions"}]}]},{"id":"ac-22","class":"SP800-53","title":"Publicly Accessible Content","params":[{"id":"ac-22_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AC-22"},{"name":"sort-id","value":"ac-22"}],"parts":[{"id":"ac-22_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-22_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Designates individuals authorized to post information onto a publicly accessible information system;"},{"id":"ac-22_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Trains authorized individuals to ensure that publicly accessible information does not contain nonpublic information;"},{"id":"ac-22_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included; and"},{"id":"ac-22_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Reviews the content on the publicly accessible information system for nonpublic information {{ insert: param, ac-22_prm_1 }} and removes such information, if discovered."}]},{"id":"ac-22_gdn","name":"guidance","prose":"In accordance with federal laws, Executive Orders, directives, policies, regulations, standards, and\/or guidance, the general public is not authorized access to nonpublic information (e.g., information protected under the Privacy Act and proprietary information). This control addresses information systems that are controlled by the organization and accessible to the general public, typically without identification or authentication. The posting of information on non-organization information systems is covered by organizational policy.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#au-13","rel":"related"}]},{"id":"ac-22_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-22.a_obj","name":"objective","props":[{"name":"label","value":"AC-22(a)"}],"prose":"designates individuals authorized to post information onto a publicly accessible information system;"},{"id":"ac-22.b_obj","name":"objective","props":[{"name":"label","value":"AC-22(b)"}],"prose":"trains authorized individuals to ensure that publicly accessible information does not contain nonpublic information;"},{"id":"ac-22.c_obj","name":"objective","props":[{"name":"label","value":"AC-22(c)"}],"prose":"reviews the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included;"},{"id":"ac-22.d_obj","name":"objective","props":[{"name":"label","value":"AC-22(d)"}],"parts":[{"id":"ac-22.d_obj.1","name":"objective","props":[{"name":"label","value":"AC-22(d)[1]"}],"prose":"defines the frequency to review the content on the publicly accessible information system for nonpublic information;"},{"id":"ac-22.d_obj.2","name":"objective","props":[{"name":"label","value":"AC-22(d)[2]"}],"prose":"reviews the content on the publicly accessible information system for nonpublic information with the organization-defined frequency; and"},{"id":"ac-22.d_obj.3","name":"objective","props":[{"name":"label","value":"AC-22(d)[3]"}],"prose":"removes nonpublic information from the publicly accessible information system, if discovered."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing publicly accessible content\n\nlist of users authorized to post publicly accessible content on organizational information systems\n\ntraining materials and\/or records\n\nrecords of publicly accessible information reviews\n\nrecords of response to nonpublic information on public websites\n\nsystem audit logs\n\nsecurity awareness training records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing publicly accessible information posted on organizational information systems\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing management of publicly accessible content"}]}]}]},{"id":"at","class":"family","title":"Awareness and Training","controls":[{"id":"at-1","class":"SP800-53","title":"Security Awareness and Training Policy and Procedures","params":[{"id":"at-1_prm_1","label":"organization-defined personnel or roles"},{"id":"at-1_prm_2","label":"organization-defined frequency"},{"id":"at-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AT-1"},{"name":"sort-id","value":"at-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"at-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"at-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, at-1_prm_1 }}:","parts":[{"id":"at-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A security awareness and training policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"at-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the security awareness and training policy and associated security awareness and training controls; and"}]},{"id":"at-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"at-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security awareness and training policy {{ insert: param, at-1_prm_2 }}; and"},{"id":"at-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Security awareness and training procedures {{ insert: param, at-1_prm_3 }}."}]}]},{"id":"at-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the AT family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"at-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-1.a_obj","name":"objective","props":[{"name":"label","value":"AT-1(a)"}],"parts":[{"id":"at-1.a.1_obj","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)"}],"parts":[{"id":"at-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1]"}],"prose":"develops and documents an security awareness and training policy that addresses:","parts":[{"id":"at-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"at-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"at-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"at-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"at-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"at-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"at-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"at-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the security awareness and training policy are to be disseminated;"},{"id":"at-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[3]"}],"prose":"disseminates the security awareness and training policy to organization-defined personnel or roles;"}]},{"id":"at-1.a.2_obj","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)"}],"parts":[{"id":"at-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the security awareness and training policy and associated awareness and training controls;"},{"id":"at-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"at-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"at-1.b_obj","name":"objective","props":[{"name":"label","value":"AT-1(b)"}],"parts":[{"id":"at-1.b.1_obj","name":"objective","props":[{"name":"label","value":"AT-1(b)(1)"}],"parts":[{"id":"at-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current security awareness and training policy;"},{"id":"at-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(b)(1)[2]"}],"prose":"reviews and updates the current security awareness and training policy with the organization-defined frequency;"}]},{"id":"at-1.b.2_obj","name":"objective","props":[{"name":"label","value":"AT-1(b)(2)"}],"parts":[{"id":"at-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current security awareness and training procedures; and"},{"id":"at-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(b)(2)[2]"}],"prose":"reviews and updates the current security awareness and training procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security awareness and training responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"at-2","class":"SP800-53","title":"Security Awareness Training","params":[{"id":"at-2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AT-2"},{"name":"sort-id","value":"at-02"}],"links":[{"href":"#bb61234b-46c3-4211-8c2b-9869222a720d","rel":"reference"},{"href":"#c5034e0c-eba6-4ecd-a541-79f0678f4ba4","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"at-2_smt","name":"statement","prose":"The organization provides basic security awareness training to information system users (including managers, senior executives, and contractors):","parts":[{"id":"at-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"As part of initial training for new users;"},{"id":"at-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"at-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, at-2_prm_1 }} thereafter."}]},{"id":"at-2_gdn","name":"guidance","prose":"Organizations determine the appropriate content of security awareness training and security awareness techniques based on the specific organizational requirements and the information systems to which personnel have authorized access. The content includes a basic understanding of the need for information security and user actions to maintain security and to respond to suspected security incidents. The content also addresses awareness of the need for operations security. Security awareness techniques can include, for example, displaying posters, offering supplies inscribed with security reminders, generating email advisories\/notices from senior organizational officials, displaying logon screen messages, and conducting information security awareness events.","links":[{"href":"#at-3","rel":"related"},{"href":"#at-4","rel":"related"},{"href":"#pl-4","rel":"related"}]},{"id":"at-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-2.a_obj","name":"objective","props":[{"name":"label","value":"AT-2(a)"}],"prose":"provides basic security awareness training to information system users (including managers, senior executives, and contractors) as part of initial training for new users;"},{"id":"at-2.b_obj","name":"objective","props":[{"name":"label","value":"AT-2(b)"}],"prose":"provides basic security awareness training to information system users (including managers, senior executives, and contractors) when required by information system changes; and"},{"id":"at-2.c_obj","name":"objective","props":[{"name":"label","value":"AT-2(c)"}],"parts":[{"id":"at-2.c_obj.1","name":"objective","props":[{"name":"label","value":"AT-2(c)[1]"}],"prose":"defines the frequency to provide refresher security awareness training thereafter to information system users (including managers, senior executives, and contractors); and"},{"id":"at-2.c_obj.2","name":"objective","props":[{"name":"label","value":"AT-2(c)[2]"}],"prose":"provides refresher security awareness training to information users (including managers, senior executives, and contractors) with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security awareness training implementation\n\nappropriate codes of federal regulations\n\nsecurity awareness training curriculum\n\nsecurity awareness training materials\n\nsecurity plan\n\ntraining records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for security awareness training\n\norganizational personnel with information security responsibilities\n\norganizational personnel comprising the general information system user community"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms managing security awareness training"}]}],"controls":[{"id":"at-2.2","class":"SP800-53-enhancement","title":"Insider Threat","props":[{"name":"label","value":"AT-2(2)"},{"name":"sort-id","value":"at-02.02"}],"parts":[{"id":"at-2.2_smt","name":"statement","prose":"The organization includes security awareness training on recognizing and reporting potential indicators of insider threat."},{"id":"at-2.2_gdn","name":"guidance","prose":"Potential indicators and possible precursors of insider threat can include behaviors such as inordinate, long-term job dissatisfaction, attempts to gain access to information not required for job performance, unexplained access to financial resources, bullying or sexual harassment of fellow employees, workplace violence, and other serious violations of organizational policies, procedures, directives, rules, or practices. Security awareness training includes how to communicate employee and management concerns regarding potential indicators of insider threat through appropriate organizational channels in accordance with established organizational policies and procedures.","links":[{"href":"#pl-4","rel":"related"},{"href":"#pm-12","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ps-6","rel":"related"}]},{"id":"at-2.2_obj","name":"objective","prose":"Determine if the organization includes security awareness training on recognizing and reporting potential indicators of insider threat."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security awareness training implementation\n\nsecurity awareness training curriculum\n\nsecurity awareness training materials\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel that participate in security awareness training\n\norganizational personnel with responsibilities for basic security awareness training\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"at-3","class":"SP800-53","title":"Role-based Security Training","params":[{"id":"at-3_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AT-3"},{"name":"sort-id","value":"at-03"}],"links":[{"href":"#bb61234b-46c3-4211-8c2b-9869222a720d","rel":"reference"},{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"at-3_smt","name":"statement","prose":"The organization provides role-based security training to personnel with assigned security roles and responsibilities:","parts":[{"id":"at-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Before authorizing access to the information system or performing assigned duties;"},{"id":"at-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"at-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, at-3_prm_1 }} thereafter."}]},{"id":"at-3_gdn","name":"guidance","prose":"Organizations determine the appropriate content of security training based on the assigned roles and responsibilities of individuals and the specific security requirements of organizations and the information systems to which personnel have authorized access. In addition, organizations provide enterprise architects, information system developers, software developers, acquisition\/procurement officials, information system managers, system\/network administrators, personnel conducting configuration management and auditing activities, personnel performing independent verification and validation activities, security control assessors, and other personnel having access to system-level software, adequate security-related technical training specifically tailored for their assigned duties. Comprehensive role-based training addresses management, operational, and technical roles and responsibilities covering physical, personnel, and technical safeguards and countermeasures. Such training can include for example, policies, procedures, tools, and artifacts for the organizational security roles defined. Organizations also provide the training necessary for individuals to carry out their responsibilities related to operations and supply chain security within the context of organizational information security programs. Role-based security training also applies to contractors providing services to federal agencies.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-4","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#ps-7","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#sa-16","rel":"related"}]},{"id":"at-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-3.a_obj","name":"objective","props":[{"name":"label","value":"AT-3(a)"}],"prose":"provides role-based security training to personnel with assigned security roles and responsibilities before authorizing access to the information system or performing assigned duties;"},{"id":"at-3.b_obj","name":"objective","props":[{"name":"label","value":"AT-3(b)"}],"prose":"provides role-based security training to personnel with assigned security roles and responsibilities when required by information system changes; and"},{"id":"at-3.c_obj","name":"objective","props":[{"name":"label","value":"AT-3(c)"}],"parts":[{"id":"at-3.c_obj.1","name":"objective","props":[{"name":"label","value":"AT-3(c)[1]"}],"prose":"defines the frequency to provide refresher role-based security training thereafter to personnel with assigned security roles and responsibilities; and"},{"id":"at-3.c_obj.2","name":"objective","props":[{"name":"label","value":"AT-3(c)[2]"}],"prose":"provides refresher role-based security training to personnel with assigned security roles and responsibilities with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security training implementation\n\ncodes of federal regulations\n\nsecurity training curriculum\n\nsecurity training materials\n\nsecurity plan\n\ntraining records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for role-based security training\n\norganizational personnel with assigned information system security roles and responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms managing role-based security training"}]}]},{"id":"at-4","class":"SP800-53","title":"Security Training Records","params":[{"id":"at-4_prm_1","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AT-4"},{"name":"sort-id","value":"at-04"}],"parts":[{"id":"at-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"at-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Documents and monitors individual information system security training activities including basic security awareness training and specific information system security training; and"},{"id":"at-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Retains individual training records for {{ insert: param, at-4_prm_1 }}."}]},{"id":"at-4_gdn","name":"guidance","prose":"Documentation for specialized training may be maintained by individual supervisors at the option of the organization.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#pm-14","rel":"related"}]},{"id":"at-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-4.a_obj","name":"objective","props":[{"name":"label","value":"AT-4(a)"}],"parts":[{"id":"at-4.a_obj.1","name":"objective","props":[{"name":"label","value":"AT-4(a)[1]"}],"prose":"documents individual information system security training activities including:","parts":[{"id":"at-4.a_obj.1.a","name":"objective","props":[{"name":"label","value":"AT-4(a)[1][a]"}],"prose":"basic security awareness training;"},{"id":"at-4.a_obj.1.b","name":"objective","props":[{"name":"label","value":"AT-4(a)[1][b]"}],"prose":"specific role-based information system security training;"}]},{"id":"at-4.a_obj.2","name":"objective","props":[{"name":"label","value":"AT-4(a)[2]"}],"prose":"monitors individual information system security training activities including:","parts":[{"id":"at-4.a_obj.2.a","name":"objective","props":[{"name":"label","value":"AT-4(a)[2][a]"}],"prose":"basic security awareness training;"},{"id":"at-4.a_obj.2.b","name":"objective","props":[{"name":"label","value":"AT-4(a)[2][b]"}],"prose":"specific role-based information system security training;"}]}]},{"id":"at-4.b_obj","name":"objective","props":[{"name":"label","value":"AT-4(b)"}],"parts":[{"id":"at-4.b_obj.1","name":"objective","props":[{"name":"label","value":"AT-4(b)[1]"}],"prose":"defines a time period to retain individual training records; and"},{"id":"at-4.b_obj.2","name":"objective","props":[{"name":"label","value":"AT-4(b)[2]"}],"prose":"retains individual training records for the organization-defined time period."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security training records\n\nsecurity awareness and training records\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security training record retention responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting management of security training records"}]}]}]},{"id":"au","class":"family","title":"Audit and Accountability","controls":[{"id":"au-1","class":"SP800-53","title":"Audit and Accountability Policy and Procedures","params":[{"id":"au-1_prm_1","label":"organization-defined personnel or roles"},{"id":"au-1_prm_2","label":"organization-defined frequency"},{"id":"au-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-1"},{"name":"sort-id","value":"au-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"au-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"au-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, au-1_prm_1 }}:","parts":[{"id":"au-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An audit and accountability policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"au-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls; and"}]},{"id":"au-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"au-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Audit and accountability policy {{ insert: param, au-1_prm_2 }}; and"},{"id":"au-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Audit and accountability procedures {{ insert: param, au-1_prm_3 }}."}]}]},{"id":"au-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the AU family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"au-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-1.a_obj","name":"objective","props":[{"name":"label","value":"AU-1(a)"}],"parts":[{"id":"au-1.a.1_obj","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)"}],"parts":[{"id":"au-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1]"}],"prose":"develops and documents an audit and accountability policy that addresses:","parts":[{"id":"au-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"au-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"au-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"au-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"au-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"au-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"au-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"au-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the audit and accountability policy are to be disseminated;"},{"id":"au-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[3]"}],"prose":"disseminates the audit and accountability policy to organization-defined personnel or roles;"}]},{"id":"au-1.a.2_obj","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)"}],"parts":[{"id":"au-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls;"},{"id":"au-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"au-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"au-1.b_obj","name":"objective","props":[{"name":"label","value":"AU-1(b)"}],"parts":[{"id":"au-1.b.1_obj","name":"objective","props":[{"name":"label","value":"AU-1(b)(1)"}],"parts":[{"id":"au-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current audit and accountability policy;"},{"id":"au-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(b)(1)[2]"}],"prose":"reviews and updates the current audit and accountability policy with the organization-defined frequency;"}]},{"id":"au-1.b.2_obj","name":"objective","props":[{"name":"label","value":"AU-1(b)(2)"}],"parts":[{"id":"au-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current audit and accountability procedures; and"},{"id":"au-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(b)(2)[2]"}],"prose":"reviews and updates the current audit and accountability procedures in accordance with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"au-2","class":"SP800-53","title":"Audit Events","params":[{"id":"au-2_prm_1","label":"organization-defined auditable events"},{"id":"au-2_prm_2","label":"organization-defined audited events (the subset of the auditable events defined in AU-2 a.) along with the frequency of (or situation requiring) auditing for each identified event"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-2"},{"name":"sort-id","value":"au-02"}],"links":[{"href":"#672fd561-b92b-4713-b9cf-6c9d9456728b","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"au-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"au-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Determines that the information system is capable of auditing the following events: {{ insert: param, au-2_prm_1 }};"},{"id":"au-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events;"},{"id":"au-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Provides a rationale for why the auditable events are deemed to be adequate to support after-the-fact investigations of security incidents; and"},{"id":"au-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Determines that the following events are to be audited within the information system: {{ insert: param, au-2_prm_2 }}."}]},{"id":"au-2_gdn","name":"guidance","prose":"An event is any observable occurrence in an organizational information system. Organizations identify audit events as those events which are significant and relevant to the security of information systems and the environments in which those systems operate in order to meet specific and ongoing audit needs. Audit events can include, for example, password changes, failed logons, or failed accesses related to information systems, administrative privilege usage, PIV credential usage, or third-party credential usage. In determining the set of auditable events, organizations consider the auditing appropriate for each of the security controls to be implemented. To balance auditing requirements with other information system needs, this control also requires identifying that subset of auditable events that are audited at a given point in time. For example, organizations may determine that information systems must have the capability to log every file access both successful and unsuccessful, but not activate that capability except for specific circumstances due to the potential burden on system performance. Auditing requirements, including the need for auditable events, may be referenced in other security controls and control enhancements. Organizations also include auditable events that are required by applicable federal laws, Executive Orders, directives, policies, regulations, and standards. Audit records can be generated at various levels of abstraction, including at the packet level as information traverses the network. Selecting the appropriate level of abstraction is a critical aspect of an audit capability and can facilitate the identification of root causes to problems. Organizations consider in the definition of auditable events, the auditing necessary to cover related events such as the steps in distributed, transaction-based processes (e.g., processes that are distributed across multiple organizations) and actions that occur in service-oriented architectures.","links":[{"href":"#ac-6","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"au-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-2.a_obj","name":"objective","props":[{"name":"label","value":"AU-2(a)"}],"parts":[{"id":"au-2.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-2(a)[1]"}],"prose":"defines the auditable events that the information system must be capable of auditing;"},{"id":"au-2.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-2(a)[2]"}],"prose":"determines that the information system is capable of auditing organization-defined auditable events;"}]},{"id":"au-2.b_obj","name":"objective","props":[{"name":"label","value":"AU-2(b)"}],"prose":"coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events;"},{"id":"au-2.c_obj","name":"objective","props":[{"name":"label","value":"AU-2(c)"}],"prose":"provides a rationale for why the auditable events are deemed to be adequate to support after-the-fact investigations of security incidents;"},{"id":"au-2.d_obj","name":"objective","props":[{"name":"label","value":"AU-2(d)"}],"parts":[{"id":"au-2.d_obj.1","name":"objective","props":[{"name":"label","value":"AU-2(d)[1]"}],"prose":"defines the subset of auditable events defined in AU-2a that are to be audited within the information system;"},{"id":"au-2.d_obj.2","name":"objective","props":[{"name":"label","value":"AU-2(d)[2]"}],"prose":"determines that the subset of auditable events defined in AU-2a are to be audited within the information system; and"},{"id":"au-2.d_obj.3","name":"objective","props":[{"name":"label","value":"AU-2(d)[3]"}],"prose":"determines the frequency of (or situation requiring) auditing for each identified event."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing auditable events\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\ninformation system auditable events\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information system auditing"}]}],"controls":[{"id":"au-2.3","class":"SP800-53-enhancement","title":"Reviews and Updates","params":[{"id":"au-2.3_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"AU-2(3)"},{"name":"sort-id","value":"au-02.03"}],"parts":[{"id":"au-2.3_smt","name":"statement","prose":"The organization reviews and updates the audited events {{ insert: param, au-2.3_prm_1 }}."},{"id":"au-2.3_gdn","name":"guidance","prose":"Over time, the events that organizations believe should be audited may change. Reviewing and updating the set of audited events periodically is necessary to ensure that the current set is still necessary and sufficient."},{"id":"au-2.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-2.3_obj.1","name":"objective","props":[{"name":"label","value":"AU-2(3)[1]"}],"prose":"defines the frequency to review and update the audited events; and"},{"id":"au-2.3_obj.2","name":"objective","props":[{"name":"label","value":"AU-2(3)[2]"}],"prose":"reviews and updates the auditable events with organization-defined frequency."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing auditable events\n\nsecurity plan\n\nlist of organization-defined auditable events\n\nauditable events review and update records\n\ninformation system audit records\n\ninformation system incident reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting review and update of auditable events"}]}]}]},{"id":"au-3","class":"SP800-53","title":"Content of Audit Records","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-3"},{"name":"sort-id","value":"au-03"}],"parts":[{"id":"au-3_smt","name":"statement","prose":"The information system generates audit records containing information that establishes what type of event occurred, when the event occurred, where the event occurred, the source of the event, the outcome of the event, and the identity of any individuals or subjects associated with the event."},{"id":"au-3_gdn","name":"guidance","prose":"Audit record content that may be necessary to satisfy the requirement of this control, includes, for example, time stamps, source and destination addresses, user\/process identifiers, event descriptions, success\/fail indications, filenames involved, and access control or flow control rules invoked. Event outcomes can include indicators of event success or failure and event-specific results (e.g., the security state of the information system after the event occurred).","links":[{"href":"#au-2","rel":"related"},{"href":"#au-8","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#si-11","rel":"related"}]},{"id":"au-3_obj","name":"objective","prose":"Determine if the information system generates audit records containing information that establishes:","parts":[{"id":"au-3_obj.1","name":"objective","props":[{"name":"label","value":"AU-3[1]"}],"prose":"what type of event occurred;"},{"id":"au-3_obj.2","name":"objective","props":[{"name":"label","value":"AU-3[2]"}],"prose":"when the event occurred;"},{"id":"au-3_obj.3","name":"objective","props":[{"name":"label","value":"AU-3[3]"}],"prose":"where the event occurred;"},{"id":"au-3_obj.4","name":"objective","props":[{"name":"label","value":"AU-3[4]"}],"prose":"the source of the event;"},{"id":"au-3_obj.5","name":"objective","props":[{"name":"label","value":"AU-3[5]"}],"prose":"the outcome of the event; and"},{"id":"au-3_obj.6","name":"objective","props":[{"name":"label","value":"AU-3[6]"}],"prose":"the identity of any individuals or subjects associated with the event."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing content of audit records\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of organization-defined auditable events\n\ninformation system audit records\n\ninformation system incident reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information system auditing of auditable events"}]}],"controls":[{"id":"au-3.1","class":"SP800-53-enhancement","title":"Additional Audit Information","params":[{"id":"au-3.1_prm_1","label":"organization-defined additional, more detailed information"}],"props":[{"name":"label","value":"AU-3(1)"},{"name":"sort-id","value":"au-03.01"}],"parts":[{"id":"au-3.1_smt","name":"statement","prose":"The information system generates audit records containing the following additional information: {{ insert: param, au-3.1_prm_1 }}."},{"id":"au-3.1_gdn","name":"guidance","prose":"Detailed information that organizations may consider in audit records includes, for example, full text recording of privileged commands or the individual identities of group account users. Organizations consider limiting the additional audit information to only that information explicitly needed for specific audit requirements. This facilitates the use of audit trails and audit logs by not including information that could potentially be misleading or could make it more difficult to locate information of interest."},{"id":"au-3.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-3.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-3(1)[1]"}],"prose":"the organization defines additional, more detailed information to be contained in audit records that the information system generates; and"},{"id":"au-3.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-3(1)[2]"}],"prose":"the information system generates audit records containing the organization-defined additional, more detailed information."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing content of audit records\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of organization-defined auditable events\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Information system audit capability"}]}]}]},{"id":"au-4","class":"SP800-53","title":"Audit Storage Capacity","params":[{"id":"au-4_prm_1","label":"organization-defined audit record storage requirements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-4"},{"name":"sort-id","value":"au-04"}],"parts":[{"id":"au-4_smt","name":"statement","prose":"The organization allocates audit record storage capacity in accordance with {{ insert: param, au-4_prm_1 }}."},{"id":"au-4_gdn","name":"guidance","prose":"Organizations consider the types of auditing to be performed and the audit processing requirements when allocating audit storage capacity. Allocating sufficient audit storage capacity reduces the likelihood of such capacity being exceeded and resulting in the potential loss or reduction of auditing capability.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-5","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"},{"href":"#au-11","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"au-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-4_obj.1","name":"objective","props":[{"name":"label","value":"AU-4[1]"}],"prose":"defines audit record storage requirements; and"},{"id":"au-4_obj.2","name":"objective","props":[{"name":"label","value":"AU-4[2]"}],"prose":"allocates audit record storage capacity in accordance with the organization-defined audit record storage requirements."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit storage capacity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit record storage requirements\n\naudit record storage capability for information system components\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Audit record storage capacity and related configuration settings"}]}]},{"id":"au-5","class":"SP800-53","title":"Response to Audit Processing Failures","params":[{"id":"au-5_prm_1","label":"organization-defined personnel or roles"},{"id":"au-5_prm_2","label":"organization-defined actions to be taken (e.g., shut down information system, overwrite oldest audit records, stop generating audit records)"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-5"},{"name":"sort-id","value":"au-05"}],"parts":[{"id":"au-5_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Alerts {{ insert: param, au-5_prm_1 }} in the event of an audit processing failure; and"},{"id":"au-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Takes the following additional actions: {{ insert: param, au-5_prm_2 }}."}]},{"id":"au-5_gdn","name":"guidance","prose":"Audit processing failures include, for example, software\/hardware errors, failures in the audit capturing mechanisms, and audit storage capacity being reached or exceeded. Organizations may choose to define additional actions for different audit processing failures (e.g., by type, by location, by severity, or a combination of such factors). This control applies to each audit data storage repository (i.e., distinct information system component where audit records are stored), the total audit storage capacity of organizations (i.e., all audit data storage repositories combined), or both.","links":[{"href":"#au-4","rel":"related"},{"href":"#si-12","rel":"related"}]},{"id":"au-5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-5.a_obj","name":"objective","props":[{"name":"label","value":"AU-5(a)"}],"parts":[{"id":"au-5.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-5(a)[1]"}],"prose":"the organization defines the personnel or roles to be alerted in the event of an audit processing failure;"},{"id":"au-5.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-5(a)[2]"}],"prose":"the information system alerts the organization-defined personnel or roles in the event of an audit processing failure;"}]},{"id":"au-5.b_obj","name":"objective","props":[{"name":"label","value":"AU-5(b)"}],"parts":[{"id":"au-5.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-5(b)[1]"}],"prose":"the organization defines additional actions to be taken (e.g., shutdown information system, overwrite oldest audit records, stop generating audit records) in the event of an audit processing failure; and"},{"id":"au-5.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-5(b)[2]"}],"prose":"the information system takes the additional organization-defined actions in the event of an audit processing failure."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing response to audit processing failures\n\ninformation system design documentation\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\nlist of personnel to be notified in case of an audit processing failure\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information system response to audit processing failures"}]}]},{"id":"au-6","class":"SP800-53","title":"Audit Review, Analysis, and Reporting","params":[{"id":"au-6_prm_1","label":"organization-defined frequency"},{"id":"au-6_prm_2","label":"organization-defined inappropriate or unusual activity"},{"id":"au-6_prm_3","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-6"},{"name":"sort-id","value":"au-06"}],"parts":[{"id":"au-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"au-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Reviews and analyzes information system audit records {{ insert: param, au-6_prm_1 }} for indications of {{ insert: param, au-6_prm_2 }}; and"},{"id":"au-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reports findings to {{ insert: param, au-6_prm_3 }}."}]},{"id":"au-6_gdn","name":"guidance","prose":"Audit review, analysis, and reporting covers information security-related auditing performed by organizations including, for example, auditing that results from monitoring of account usage, remote access, wireless connectivity, mobile device connection, configuration settings, system component inventory, use of maintenance tools and nonlocal maintenance, physical access, temperature and humidity, equipment delivery and removal, communications at the information system boundaries, use of mobile code, and use of VoIP. Findings can be reported to organizational entities that include, for example, incident response team, help desk, information security group\/department. If organizations are prohibited from reviewing and analyzing audit information or unable to conduct such activities (e.g., in certain national security applications or systems), the review\/analysis may be carried out by other organizations granted such authority.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#au-7","rel":"related"},{"href":"#au-16","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-10","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ir-5","rel":"related"},{"href":"#ir-6","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-6","rel":"related"},{"href":"#pe-14","rel":"related"},{"href":"#pe-16","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-18","rel":"related"},{"href":"#sc-19","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"au-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-6.a_obj","name":"objective","props":[{"name":"label","value":"AU-6(a)"}],"parts":[{"id":"au-6.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-6(a)[1]"}],"prose":"defines the types of inappropriate or unusual activity to look for when information system audit records are reviewed and analyzed;"},{"id":"au-6.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-6(a)[2]"}],"prose":"defines the frequency to review and analyze information system audit records for indications of organization-defined inappropriate or unusual activity;"},{"id":"au-6.a_obj.3","name":"objective","props":[{"name":"label","value":"AU-6(a)[3]"}],"prose":"reviews and analyzes information system audit records for indications of organization-defined inappropriate or unusual activity with the organization-defined frequency;"}]},{"id":"au-6.b_obj","name":"objective","props":[{"name":"label","value":"AU-6(b)"}],"parts":[{"id":"au-6.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-6(b)[1]"}],"prose":"defines personnel or roles to whom findings resulting from reviews and analysis of information system audit records are to be reported; and"},{"id":"au-6.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-6(b)[2]"}],"prose":"reports findings to organization-defined personnel or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit review, analysis, and reporting\n\nreports of audit findings\n\nrecords of actions taken in response to reviews\/analyses of audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit review, analysis, and reporting responsibilities\n\norganizational personnel with information security responsibilities"}]}],"controls":[{"id":"au-6.1","class":"SP800-53-enhancement","title":"Process Integration","props":[{"name":"label","value":"AU-6(1)"},{"name":"sort-id","value":"au-06.01"}],"parts":[{"id":"au-6.1_smt","name":"statement","prose":"The organization employs automated mechanisms to integrate audit review, analysis, and reporting processes to support organizational processes for investigation and response to suspicious activities."},{"id":"au-6.1_gdn","name":"guidance","prose":"Organizational processes benefiting from integrated audit review, analysis, and reporting include, for example, incident response, continuous monitoring, contingency planning, and Inspector General audits.","links":[{"href":"#au-12","rel":"related"},{"href":"#pm-7","rel":"related"}]},{"id":"au-6.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-6.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-6(1)[1]"}],"prose":"employs automated mechanisms to integrate:","parts":[{"id":"au-6.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AU-6(1)[1][a]"}],"prose":"audit review;"},{"id":"au-6.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AU-6(1)[1][b]"}],"prose":"analysis;"},{"id":"au-6.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AU-6(1)[1][c]"}],"prose":"reporting processes;"}]},{"id":"au-6.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-6(1)[2]"}],"prose":"uses integrated audit review, analysis and reporting processes to support organizational processes for:","parts":[{"id":"au-6.1_obj.2.a","name":"objective","props":[{"name":"label","value":"AU-6(1)[2][a]"}],"prose":"investigation of suspicious activities; and"},{"id":"au-6.1_obj.2.b","name":"objective","props":[{"name":"label","value":"AU-6(1)[2][b]"}],"prose":"response to suspicious activities."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit review, analysis, and reporting\n\nprocedures addressing investigation and response to suspicious activities\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit review, analysis, and reporting responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms integrating audit review, analysis, and reporting processes"}]}]},{"id":"au-6.3","class":"SP800-53-enhancement","title":"Correlate Audit Repositories","props":[{"name":"label","value":"AU-6(3)"},{"name":"sort-id","value":"au-06.03"}],"parts":[{"id":"au-6.3_smt","name":"statement","prose":"The organization analyzes and correlates audit records across different repositories to gain organization-wide situational awareness."},{"id":"au-6.3_gdn","name":"guidance","prose":"Organization-wide situational awareness includes awareness across all three tiers of risk management (i.e., organizational, mission\/business process, and information system) and supports cross-organization awareness.","links":[{"href":"#au-12","rel":"related"},{"href":"#ir-4","rel":"related"}]},{"id":"au-6.3_obj","name":"objective","prose":"Determine if the organization analyzes and correlates audit records across different repositories to gain organization-wide situational awareness."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit review, analysis, and reporting\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records across different repositories\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit review, analysis, and reporting responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting analysis and correlation of audit records"}]}]}]},{"id":"au-7","class":"SP800-53","title":"Audit Reduction and Report Generation","props":[{"name":"priority","value":"P2"},{"name":"label","value":"AU-7"},{"name":"sort-id","value":"au-07"}],"parts":[{"id":"au-7_smt","name":"statement","prose":"The information system provides an audit reduction and report generation capability that:","parts":[{"id":"au-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Supports on-demand audit review, analysis, and reporting requirements and after-the-fact investigations of security incidents; and"},{"id":"au-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Does not alter the original content or time ordering of audit records."}]},{"id":"au-7_gdn","name":"guidance","prose":"Audit reduction is a process that manipulates collected audit information and organizes such information in a summary format that is more meaningful to analysts. Audit reduction and report generation capabilities do not always emanate from the same information system or from the same organizational entities conducting auditing activities. Audit reduction capability can include, for example, modern data mining techniques with advanced data filters to identify anomalous behavior in audit records. The report generation capability provided by the information system can generate customizable reports. Time ordering of audit records can be a significant issue if the granularity of the timestamp in the record is insufficient.","links":[{"href":"#au-6","rel":"related"}]},{"id":"au-7_obj","name":"objective","prose":"Determine if the information system provides an audit reduction and report generation capability that supports:","parts":[{"id":"au-7.a_obj","name":"objective","props":[{"name":"label","value":"AU-7(a)"}],"parts":[{"id":"au-7.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-7(a)[1]"}],"prose":"on-demand audit review;"},{"id":"au-7.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-7(a)[2]"}],"prose":"analysis;"},{"id":"au-7.a_obj.3","name":"objective","props":[{"name":"label","value":"AU-7(a)[3]"}],"prose":"reporting requirements;"},{"id":"au-7.a_obj.4","name":"objective","props":[{"name":"label","value":"AU-7(a)[4]"}],"prose":"after-the-fact investigations of security incidents; and"}]},{"id":"au-7.b_obj","name":"objective","props":[{"name":"label","value":"AU-7(b)"}],"prose":"does not alter the original content or time ordering of audit records."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit reduction and report generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit reduction, review, analysis, and reporting tools\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit reduction and report generation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Audit reduction and report generation capability"}]}],"controls":[{"id":"au-7.1","class":"SP800-53-enhancement","title":"Automatic Processing","params":[{"id":"au-7.1_prm_1","label":"organization-defined audit fields within audit records"}],"props":[{"name":"label","value":"AU-7(1)"},{"name":"sort-id","value":"au-07.01"}],"parts":[{"id":"au-7.1_smt","name":"statement","prose":"The information system provides the capability to process audit records for events of interest based on {{ insert: param, au-7.1_prm_1 }}."},{"id":"au-7.1_gdn","name":"guidance","prose":"Events of interest can be identified by the content of specific audit record fields including, for example, identities of individuals, event types, event locations, event times, event dates, system resources involved, IP addresses involved, or information objects accessed. Organizations may define audit event criteria to any degree of granularity required, for example, locations selectable by general networking location (e.g., by network or subnetwork) or selectable by specific information system component.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"}]},{"id":"au-7.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-7.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-7(1)[1]"}],"prose":"the organization defines audit fields within audit records in order to process audit records for events of interest; and"},{"id":"au-7.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-7(1)[2]"}],"prose":"the information system provides the capability to process audit records for events of interest based on the organization-defined audit fields within audit records."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit reduction and report generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit reduction, review, analysis, and reporting tools\n\naudit record criteria (fields) establishing events of interest\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit reduction and report generation responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Audit reduction and report generation capability"}]}]}]},{"id":"au-8","class":"SP800-53","title":"Time Stamps","params":[{"id":"au-8_prm_1","label":"organization-defined granularity of time measurement"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-8"},{"name":"sort-id","value":"au-08"}],"parts":[{"id":"au-8_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Uses internal system clocks to generate time stamps for audit records; and"},{"id":"au-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT) and meets {{ insert: param, au-8_prm_1 }}."}]},{"id":"au-8_gdn","name":"guidance","prose":"Time stamps generated by the information system include date and time. Time is commonly expressed in Coordinated Universal Time (UTC), a modern continuation of Greenwich Mean Time (GMT), or local time with an offset from UTC. Granularity of time measurements refers to the degree of synchronization between information system clocks and reference clocks, for example, clocks synchronizing within hundreds of milliseconds or within tens of milliseconds. Organizations may define different time granularities for different system components. Time service can also be critical to other security capabilities such as access control and identification and authentication, depending on the nature of the mechanisms used to support those capabilities.","links":[{"href":"#au-3","rel":"related"},{"href":"#au-12","rel":"related"}]},{"id":"au-8_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-8.a_obj","name":"objective","props":[{"name":"label","value":"AU-8(a)"}],"prose":"the information system uses internal system clocks to generate time stamps for audit records;"},{"id":"au-8.b_obj","name":"objective","props":[{"name":"label","value":"AU-8(b)"}],"parts":[{"id":"au-8.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-8(b)[1]"}],"prose":"the information system records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT);"},{"id":"au-8.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-8(b)[2]"}],"prose":"the organization defines the granularity of time measurement to be met when recording time stamps for audit records; and"},{"id":"au-8.b_obj.3","name":"objective","props":[{"name":"label","value":"AU-8(b)[3]"}],"prose":"the organization records time stamps for audit records that meet the organization-defined granularity of time measurement."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing time stamp generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing time stamp generation"}]}],"controls":[{"id":"au-8.1","class":"SP800-53-enhancement","title":"Synchronization with Authoritative Time Source","params":[{"id":"au-8.1_prm_1","label":"organization-defined frequency"},{"id":"au-8.1_prm_2","label":"organization-defined authoritative time source"},{"id":"au-8.1_prm_3","label":"organization-defined time period"}],"props":[{"name":"label","value":"AU-8(1)"},{"name":"sort-id","value":"au-08.01"}],"parts":[{"id":"au-8.1_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-8.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Compares the internal information system clocks {{ insert: param, au-8.1_prm_1 }} with {{ insert: param, au-8.1_prm_2 }}; and"},{"id":"au-8.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Synchronizes the internal system clocks to the authoritative time source when the time difference is greater than {{ insert: param, au-8.1_prm_3 }}."}]},{"id":"au-8.1_gdn","name":"guidance","prose":"This control enhancement provides uniformity of time stamps for information systems with multiple system clocks and systems connected over a network."},{"id":"au-8.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-8.1.a_obj","name":"objective","props":[{"name":"label","value":"AU-8(1)(a)"}],"parts":[{"id":"au-8.1.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-8(1)(a)[1]"}],"prose":"the organization defines the authoritative time source to which internal information system clocks are to be compared;"},{"id":"au-8.1.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-8(1)(a)[2]"}],"prose":"the organization defines the frequency to compare the internal information system clocks with the organization-defined authoritative time source; and"},{"id":"au-8.1.a_obj.3","name":"objective","props":[{"name":"label","value":"AU-8(1)(a)[3]"}],"prose":"the information system compares the internal information system clocks with the organization-defined authoritative time source with organization-defined frequency; and"}],"links":[{"href":"#au-8.1_smt.a","rel":"corresp"}]},{"id":"au-8.1.b_obj","name":"objective","props":[{"name":"label","value":"AU-8(1)(b)"}],"parts":[{"id":"au-8.1.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-8(1)(b)[1]"}],"prose":"the organization defines the time period that, if exceeded by the time difference between the internal system clocks and the authoritative time source, will result in the internal system clocks being synchronized to the authoritative time source; and"},{"id":"au-8.1.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-8(1)(b)[2]"}],"prose":"the information system synchronizes the internal information system clocks to the authoritative time source when the time difference is greater than the organization-defined time period."}],"links":[{"href":"#au-8.1_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing time stamp generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing internal information system clock synchronization"}]}]}]},{"id":"au-9","class":"SP800-53","title":"Protection of Audit Information","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-9"},{"name":"sort-id","value":"au-09"}],"parts":[{"id":"au-9_smt","name":"statement","prose":"The information system protects audit information and audit tools from unauthorized access, modification, and deletion."},{"id":"au-9_gdn","name":"guidance","prose":"Audit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully audit information system activity. This control focuses on technical protection of audit information. Physical protection of audit information is addressed by media protection controls and physical and environmental protection controls.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-6","rel":"related"}]},{"id":"au-9_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-9_obj.1","name":"objective","props":[{"name":"label","value":"AU-9[1]"}],"prose":"the information system protects audit information from unauthorized:","parts":[{"id":"au-9_obj.1.a","name":"objective","props":[{"name":"label","value":"AU-9[1][a]"}],"prose":"access;"},{"id":"au-9_obj.1.b","name":"objective","props":[{"name":"label","value":"AU-9[1][b]"}],"prose":"modification;"},{"id":"au-9_obj.1.c","name":"objective","props":[{"name":"label","value":"AU-9[1][c]"}],"prose":"deletion;"}]},{"id":"au-9_obj.2","name":"objective","props":[{"name":"label","value":"AU-9[2]"}],"prose":"the information system protects audit tools from unauthorized:","parts":[{"id":"au-9_obj.2.a","name":"objective","props":[{"name":"label","value":"AU-9[2][a]"}],"prose":"access;"},{"id":"au-9_obj.2.b","name":"objective","props":[{"name":"label","value":"AU-9[2][b]"}],"prose":"modification; and"},{"id":"au-9_obj.2.c","name":"objective","props":[{"name":"label","value":"AU-9[2][c]"}],"prose":"deletion."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\naccess control policy and procedures\n\nprocedures addressing protection of audit information\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation, information system audit records\n\naudit tools\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing audit information protection"}]}],"controls":[{"id":"au-9.4","class":"SP800-53-enhancement","title":"Access by Subset of Privileged Users","params":[{"id":"au-9.4_prm_1","label":"organization-defined subset of privileged users"}],"props":[{"name":"label","value":"AU-9(4)"},{"name":"sort-id","value":"au-09.04"}],"parts":[{"id":"au-9.4_smt","name":"statement","prose":"The organization authorizes access to management of audit functionality to only {{ insert: param, au-9.4_prm_1 }}."},{"id":"au-9.4_gdn","name":"guidance","prose":"Individuals with privileged access to an information system and who are also the subject of an audit by that system, may affect the reliability of audit information by inhibiting audit activities or modifying audit records. This control enhancement requires that privileged access be further defined between audit-related privileges and other privileges, thus limiting the users with audit-related privileges.","links":[{"href":"#ac-5","rel":"related"}]},{"id":"au-9.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-9.4_obj.1","name":"objective","props":[{"name":"label","value":"AU-9(4)[1]"}],"prose":"defines a subset of privileged users to be authorized access to management of audit functionality; and"},{"id":"au-9.4_obj.2","name":"objective","props":[{"name":"label","value":"AU-9(4)[2]"}],"prose":"authorizes access to management of audit functionality to only the organization-defined subset of privileged users."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\naccess control policy and procedures\n\nprocedures addressing protection of audit information\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation, system-generated list of privileged users with access to management of audit functionality\n\naccess authorizations\n\naccess control list\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms managing access to audit functionality"}]}]}]},{"id":"au-11","class":"SP800-53","title":"Audit Record Retention","params":[{"id":"au-11_prm_1","label":"organization-defined time period consistent with records retention policy"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AU-11"},{"name":"sort-id","value":"au-11"}],"parts":[{"id":"au-11_smt","name":"statement","prose":"The organization retains audit records for {{ insert: param, au-11_prm_1 }} to provide support for after-the-fact investigations of security incidents and to meet regulatory and organizational information retention requirements."},{"id":"au-11_gdn","name":"guidance","prose":"Organizations retain audit records until it is determined that they are no longer needed for administrative, legal, audit, or other operational purposes. This includes, for example, retention and availability of audit records relative to Freedom of Information Act (FOIA) requests, subpoenas, and law enforcement actions. Organizations develop standard categories of audit records relative to such types of actions and standard response processes for each type of action. The National Archives and Records Administration (NARA) General Records Schedules provide federal policy on record retention.","links":[{"href":"#au-4","rel":"related"},{"href":"#au-5","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#mp-6","rel":"related"}]},{"id":"au-11_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-11_obj.1","name":"objective","props":[{"name":"label","value":"AU-11[1]"}],"prose":"defines a time period to retain audit records that is consistent with records retention policy;"},{"id":"au-11_obj.2","name":"objective","props":[{"name":"label","value":"AU-11[2]"}],"prose":"retains audit records for the organization-defined time period consistent with records retention policy to:","parts":[{"id":"au-11_obj.2.a","name":"objective","props":[{"name":"label","value":"AU-11[2][a]"}],"prose":"provide support for after-the-fact investigations of security incidents; and"},{"id":"au-11_obj.2.b","name":"objective","props":[{"name":"label","value":"AU-11[2][b]"}],"prose":"meet regulatory and organizational information retention requirements."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\naudit record retention policy and procedures\n\nsecurity plan\n\norganization-defined retention period for audit records\n\naudit record archives\n\naudit logs\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit record retention responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]}]},{"id":"au-12","class":"SP800-53","title":"Audit Generation","params":[{"id":"au-12_prm_1","label":"organization-defined information system components"},{"id":"au-12_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-12"},{"name":"sort-id","value":"au-12"}],"parts":[{"id":"au-12_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-12_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Provides audit record generation capability for the auditable events defined in AU-2 a. at {{ insert: param, au-12_prm_1 }};"},{"id":"au-12_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Allows {{ insert: param, au-12_prm_2 }} to select which auditable events are to be audited by specific components of the information system; and"},{"id":"au-12_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Generates audit records for the events defined in AU-2 d. with the content defined in AU-3."}]},{"id":"au-12_gdn","name":"guidance","prose":"Audit records can be generated from many different information system components. The list of audited events is the set of events for which audits are to be generated. These events are typically a subset of all events for which the information system is capable of generating audit records.","links":[{"href":"#ac-3","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"}]},{"id":"au-12_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-12.a_obj","name":"objective","props":[{"name":"label","value":"AU-12(a)"}],"parts":[{"id":"au-12.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-12(a)[1]"}],"prose":"the organization defines the information system components which are to provide audit record generation capability for the auditable events defined in AU-2a;"},{"id":"au-12.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-12(a)[2]"}],"prose":"the information system provides audit record generation capability, for the auditable events defined in AU-2a, at organization-defined information system components;"}]},{"id":"au-12.b_obj","name":"objective","props":[{"name":"label","value":"AU-12(b)"}],"parts":[{"id":"au-12.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-12(b)[1]"}],"prose":"the organization defines the personnel or roles allowed to select which auditable events are to be audited by specific components of the information system;"},{"id":"au-12.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-12(b)[2]"}],"prose":"the information system allows the organization-defined personnel or roles to select which auditable events are to be audited by specific components of the system; and"}]},{"id":"au-12.c_obj","name":"objective","props":[{"name":"label","value":"AU-12(c)"}],"prose":"the information system generates audit records for the events defined in AU-2d with the content in defined in AU-3."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit record generation\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of auditable events\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit record generation responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing audit record generation capability"}]}]}]},{"id":"ca","class":"family","title":"Security Assessment and Authorization","controls":[{"id":"ca-1","class":"SP800-53","title":"Security Assessment and Authorization Policy and Procedures","params":[{"id":"ca-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ca-1_prm_2","label":"organization-defined frequency"},{"id":"ca-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CA-1"},{"name":"sort-id","value":"ca-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ca-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ca-1_prm_1 }}:","parts":[{"id":"ca-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ca-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the security assessment and authorization policy and associated security assessment and authorization controls; and"}]},{"id":"ca-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ca-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security assessment and authorization policy {{ insert: param, ca-1_prm_2 }}; and"},{"id":"ca-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Security assessment and authorization procedures {{ insert: param, ca-1_prm_3 }}."}]}]},{"id":"ca-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the CA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ca-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-1.a_obj","name":"objective","props":[{"name":"label","value":"CA-1(a)"}],"parts":[{"id":"ca-1.a.1_obj","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)"}],"parts":[{"id":"ca-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1]"}],"prose":"develops and documents a security assessment and authorization policy that addresses:","parts":[{"id":"ca-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ca-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ca-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ca-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ca-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ca-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ca-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ca-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the security assessment and authorization policy is to be disseminated;"},{"id":"ca-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[3]"}],"prose":"disseminates the security assessment and authorization policy to organization-defined personnel or roles;"}]},{"id":"ca-1.a.2_obj","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)"}],"parts":[{"id":"ca-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the security assessment and authorization policy and associated assessment and authorization controls;"},{"id":"ca-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ca-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ca-1.b_obj","name":"objective","props":[{"name":"label","value":"CA-1(b)"}],"parts":[{"id":"ca-1.b.1_obj","name":"objective","props":[{"name":"label","value":"CA-1(b)(1)"}],"parts":[{"id":"ca-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current security assessment and authorization policy;"},{"id":"ca-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(b)(1)[2]"}],"prose":"reviews and updates the current security assessment and authorization policy with the organization-defined frequency;"}]},{"id":"ca-1.b.2_obj","name":"objective","props":[{"name":"label","value":"CA-1(b)(2)"}],"parts":[{"id":"ca-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current security assessment and authorization procedures; and"},{"id":"ca-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(b)(2)[2]"}],"prose":"reviews and updates the current security assessment and authorization procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security assessment and authorization responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ca-2","class":"SP800-53","title":"Security Assessments","params":[{"id":"ca-2_prm_1","label":"organization-defined frequency"},{"id":"ca-2_prm_2","label":"organization-defined individuals or roles"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-2"},{"name":"sort-id","value":"ca-02"}],"links":[{"href":"#c5034e0c-eba6-4ecd-a541-79f0678f4ba4","rel":"reference"},{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"}],"parts":[{"id":"ca-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a security assessment plan that describes the scope of the assessment including:","parts":[{"id":"ca-2_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security controls and control enhancements under assessment;"},{"id":"ca-2_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Assessment procedures to be used to determine security control effectiveness; and"},{"id":"ca-2_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Assessment environment, assessment team, and assessment roles and responsibilities;"}]},{"id":"ca-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Assesses the security controls in the information system and its environment of operation {{ insert: param, ca-2_prm_1 }} to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;"},{"id":"ca-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Produces a security assessment report that documents the results of the assessment; and"},{"id":"ca-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Provides the results of the security control assessment to {{ insert: param, ca-2_prm_2 }}."}]},{"id":"ca-2_gdn","name":"guidance","prose":"Organizations assess security controls in organizational information systems and the environments in which those systems operate as part of: (i) initial and ongoing security authorizations; (ii) FISMA annual assessments; (iii) continuous monitoring; and (iv) system development life cycle activities. Security assessments: (i) ensure that information security is built into organizational information systems; (ii) identify weaknesses and deficiencies early in the development process; (iii) provide essential information needed to make risk-based decisions as part of security authorization processes; and (iv) ensure compliance to vulnerability mitigation procedures. Assessments are conducted on the implemented security controls from Appendix F (main catalog) and Appendix G (Program Management controls) as documented in System Security Plans and Information Security Program Plans. Organizations can use other types of assessment activities such as vulnerability scanning and system monitoring to maintain the security posture of information systems during the entire life cycle. Security assessment reports document assessment results in sufficient detail as deemed necessary by organizations, to determine the accuracy and completeness of the reports and whether the security controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting security requirements. The FISMA requirement for assessing security controls at least annually does not require additional assessment activities to those activities already in place in organizational security authorization processes. Security assessment results are provided to the individuals or roles appropriate for the types of assessments being conducted. For example, assessments conducted in support of security authorization decisions are provided to authorizing officials or authorizing official designated representatives. To satisfy annual assessment requirements, organizations can use assessment results from the following sources: (i) initial or ongoing information system authorizations; (ii) continuous monitoring; or (iii) system development life cycle activities. Organizations ensure that security assessment results are current, relevant to the determination of security control effectiveness, and obtained with the appropriate level of assessor independence. Existing security control assessment results can be reused to the extent that the results are still valid and can also be supplemented with additional assessments as needed. Subsequent to initial authorizations and in accordance with OMB policy, organizations assess security controls during continuous monitoring. Organizations establish the frequency for ongoing security control assessments in accordance with organizational continuous monitoring strategies. Information Assurance Vulnerability Alerts provide useful examples of vulnerability mitigation procedures. External audits (e.g., audits by external entities such as regulatory agencies) are outside the scope of this control.","links":[{"href":"#ca-5","rel":"related"},{"href":"#ca-6","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-2.a_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)"}],"prose":"develops a security assessment plan that describes the scope of the assessment including:","parts":[{"id":"ca-2.a.1_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)(1)"}],"prose":"security controls and control enhancements under assessment;"},{"id":"ca-2.a.2_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)(2)"}],"prose":"assessment procedures to be used to determine security control effectiveness;"},{"id":"ca-2.a.3_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)"}],"parts":[{"id":"ca-2.a.3_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)[1]"}],"prose":"assessment environment;"},{"id":"ca-2.a.3_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)[2]"}],"prose":"assessment team;"},{"id":"ca-2.a.3_obj.3","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)[3]"}],"prose":"assessment roles and responsibilities;"}]}]},{"id":"ca-2.b_obj","name":"objective","props":[{"name":"label","value":"CA-2(b)"}],"parts":[{"id":"ca-2.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(b)[1]"}],"prose":"defines the frequency to assess the security controls in the information system and its environment of operation;"},{"id":"ca-2.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(b)[2]"}],"prose":"assesses the security controls in the information system with the organization-defined frequency to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;"}]},{"id":"ca-2.c_obj","name":"objective","props":[{"name":"label","value":"CA-2(c)"}],"prose":"produces a security assessment report that documents the results of the assessment;"},{"id":"ca-2.d_obj","name":"objective","props":[{"name":"label","value":"CA-2(d)"}],"parts":[{"id":"ca-2.d_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(d)[1]"}],"prose":"defines individuals or roles to whom the results of the security control assessment are to be provided; and"},{"id":"ca-2.d_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(d)[2]"}],"prose":"provides the results of the security control assessment to organization-defined individuals or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing security assessment planning\n\nprocedures addressing security assessments\n\nsecurity assessment plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security assessment responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting security assessment, security assessment plan development, and\/or security assessment reporting"}]}],"controls":[{"id":"ca-2.1","class":"SP800-53-enhancement","title":"Independent Assessors","params":[{"id":"ca-2.1_prm_1","label":"organization-defined level of independence"}],"props":[{"name":"label","value":"CA-2(1)"},{"name":"sort-id","value":"ca-02.01"}],"parts":[{"id":"ca-2.1_smt","name":"statement","prose":"The organization employs assessors or assessment teams with {{ insert: param, ca-2.1_prm_1 }} to conduct security control assessments."},{"id":"ca-2.1_gdn","name":"guidance","prose":"Independent assessors or assessment teams are individuals or groups who conduct impartial assessments of organizational information systems. Impartiality implies that assessors are free from any perceived or actual conflicts of interest with regard to the development, operation, or management of the organizational information systems under assessment or to the determination of security control effectiveness. To achieve impartiality, assessors should not: (i) create a mutual or conflicting interest with the organizations where the assessments are being conducted; (ii) assess their own work; (iii) act as management or employees of the organizations they are serving; or (iv) place themselves in positions of advocacy for the organizations acquiring their services. Independent assessments can be obtained from elements within organizations or can be contracted to public or private sector entities outside of organizations. Authorizing officials determine the required level of independence based on the security categories of information systems and\/or the ultimate risk to organizational operations, organizational assets, or individuals. Authorizing officials also determine if the level of assessor independence provides sufficient assurance that the results are sound and can be used to make credible, risk-based decisions. This includes determining whether contracted security assessment services have sufficient independence, for example, when information system owners are not directly involved in contracting processes or cannot unduly influence the impartiality of assessors conducting assessments. In special situations, for example, when organizations that own the information systems are small or organizational structures require that assessments are conducted by individuals that are in the developmental, operational, or management chain of system owners, independence in assessment processes can be achieved by ensuring that assessment results are carefully reviewed and analyzed by independent teams of experts to validate the completeness, accuracy, integrity, and reliability of the results. Organizations recognize that assessments performed for purposes other than direct support to authorization decisions are, when performed by assessors with sufficient independence, more likely to be useable for such decisions, thereby reducing the need to repeat assessments."},{"id":"ca-2.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-2.1_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(1)[1]"}],"prose":"defines the level of independence to be employed to conduct security control assessments; and"},{"id":"ca-2.1_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(1)[2]"}],"prose":"employs assessors or assessment teams with the organization-defined level of independence to conduct security control assessments."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing security assessments\n\nsecurity authorization package (including security plan, security assessment plan, security assessment report, plan of action and milestones, authorization statement)\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security assessment responsibilities\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"ca-3","class":"SP800-53","title":"System Interconnections","params":[{"id":"ca-3_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CA-3"},{"name":"sort-id","value":"ca-03"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#2711f068-734e-4afd-94ba-0b22247fbc88","rel":"reference"}],"parts":[{"id":"ca-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;"},{"id":"ca-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents, for each interconnection, the interface characteristics, security requirements, and the nature of the information communicated; and"},{"id":"ca-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews and updates Interconnection Security Agreements {{ insert: param, ca-3_prm_1 }}."}]},{"id":"ca-3_gdn","name":"guidance","prose":"This control applies to dedicated connections between information systems (i.e., system interconnections) and does not apply to transitory, user-controlled connections such as email and website browsing. Organizations carefully consider the risks that may be introduced when information systems are connected to other systems with different security requirements and security controls, both within organizations and external to organizations. Authorizing officials determine the risk associated with information system connections and the appropriate controls employed. If interconnecting systems have the same authorizing official, organizations do not need to develop Interconnection Security Agreements. Instead, organizations can describe the interface characteristics between those interconnecting systems in their respective security plans. If interconnecting systems have different authorizing officials within the same organization, organizations can either develop Interconnection Security Agreements or describe the interface characteristics between systems in the security plans for the respective systems. Organizations may also incorporate Interconnection Security Agreement information into formal contracts, especially for interconnections established between federal agencies and nonfederal (i.e., private sector) organizations. Risk considerations also include information systems sharing the same networks. For certain technologies (e.g., space, unmanned aerial vehicles, and medical devices), there may be specialized connections in place during preoperational testing. Such connections may require Interconnection Security Agreements and be subject to additional security controls.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#au-16","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#sa-9","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-3.a_obj","name":"objective","props":[{"name":"label","value":"CA-3(a)"}],"prose":"authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;"},{"id":"ca-3.b_obj","name":"objective","props":[{"name":"label","value":"CA-3(b)"}],"prose":"documents, for each interconnection:","parts":[{"id":"ca-3.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-3(b)[1]"}],"prose":"the interface characteristics;"},{"id":"ca-3.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-3(b)[2]"}],"prose":"the security requirements;"},{"id":"ca-3.b_obj.3","name":"objective","props":[{"name":"label","value":"CA-3(b)[3]"}],"prose":"the nature of the information communicated;"}]},{"id":"ca-3.c_obj","name":"objective","props":[{"name":"label","value":"CA-3(c)"}],"parts":[{"id":"ca-3.c_obj.1","name":"objective","props":[{"name":"label","value":"CA-3(c)[1]"}],"prose":"defines the frequency to review and update Interconnection Security Agreements; and"},{"id":"ca-3.c_obj.2","name":"objective","props":[{"name":"label","value":"CA-3(c)[2]"}],"prose":"reviews and updates Interconnection Security Agreements with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing information system connections\n\nsystem and communications protection policy\n\ninformation system Interconnection Security Agreements\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for developing, implementing, or approving information system interconnection agreements\n\norganizational personnel with information security responsibilities\n\npersonnel managing the system(s) to which the Interconnection Security Agreement applies"}]}],"controls":[{"id":"ca-3.5","class":"SP800-53-enhancement","title":"Restrictions On External System Connections","params":[{"id":"ca-3.5_prm_1","select":{"choice":["allow-all, deny-by-exception","deny-all, permit-by-exception"]}},{"id":"ca-3.5_prm_2","label":"organization-defined information systems"}],"props":[{"name":"label","value":"CA-3(5)"},{"name":"sort-id","value":"ca-03.05"}],"parts":[{"id":"ca-3.5_smt","name":"statement","prose":"The organization employs {{ insert: param, ca-3.5_prm_1 }} policy for allowing {{ insert: param, ca-3.5_prm_2 }} to connect to external information systems."},{"id":"ca-3.5_gdn","name":"guidance","prose":"Organizations can constrain information system connectivity to external domains (e.g., websites) by employing one of two policies with regard to such connectivity: (i) allow-all, deny by exception, also known as blacklisting (the weaker of the two policies); or (ii) deny-all, allow by exception, also known as whitelisting (the stronger of the two policies). For either policy, organizations determine what exceptions, if any, are acceptable.","links":[{"href":"#cm-7","rel":"related"}]},{"id":"ca-3.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-3.5_obj.1","name":"objective","props":[{"name":"label","value":"CA-3(5)[1]"}],"prose":"defines information systems to be allowed to connect to external information systems;"},{"id":"ca-3.5_obj.2","name":"objective","props":[{"name":"label","value":"CA-3(5)[2]"}],"prose":"employs one of the following policies for allowing organization-defined information systems to connect to external information systems:","parts":[{"id":"ca-3.5_obj.2.a","name":"objective","props":[{"name":"label","value":"CA-3(5)[2][a]"}],"prose":"allow-all policy;"},{"id":"ca-3.5_obj.2.b","name":"objective","props":[{"name":"label","value":"CA-3(5)[2][b]"}],"prose":"deny-by-exception policy;"},{"id":"ca-3.5_obj.2.c","name":"objective","props":[{"name":"label","value":"CA-3(5)[2][c]"}],"prose":"deny-all policy; or"},{"id":"ca-3.5_obj.2.d","name":"objective","props":[{"name":"label","value":"CA-3(5)[2][d]"}],"prose":"permit-by-exception policy."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing information system connections\n\nsystem and communications protection policy\n\ninformation system interconnection agreements\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity assessment report\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for managing connections to external information systems\n\nnetwork administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing restrictions on external system connections"}]}]}]},{"id":"ca-5","class":"SP800-53","title":"Plan of Action and Milestones","params":[{"id":"ca-5_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"CA-5"},{"name":"sort-id","value":"ca-05"}],"links":[{"href":"#2c5884cd-7b96-425c-862a-99877e1cf909","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"}],"parts":[{"id":"ca-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a plan of action and milestones for the information system to document the organization’s planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls and to reduce or eliminate known vulnerabilities in the system; and"},{"id":"ca-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Updates existing plan of action and milestones {{ insert: param, ca-5_prm_1 }} based on the findings from security controls assessments, security impact analyses, and continuous monitoring activities."}]},{"id":"ca-5_gdn","name":"guidance","prose":"Plans of action and milestones are key documents in security authorization packages and are subject to federal reporting requirements established by OMB.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#pm-4","rel":"related"}]},{"id":"ca-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-5.a_obj","name":"objective","props":[{"name":"label","value":"CA-5(a)"}],"prose":"develops a plan of action and milestones for the information system to:","parts":[{"id":"ca-5.a_obj.1","name":"objective","props":[{"name":"label","value":"CA-5(a)[1]"}],"prose":"document the organization’s planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls;"},{"id":"ca-5.a_obj.2","name":"objective","props":[{"name":"label","value":"CA-5(a)[2]"}],"prose":"reduce or eliminate known vulnerabilities in the system;"}]},{"id":"ca-5.b_obj","name":"objective","props":[{"name":"label","value":"CA-5(b)"}],"parts":[{"id":"ca-5.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-5(b)[1]"}],"prose":"defines the frequency to update the existing plan of action and milestones;"},{"id":"ca-5.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-5(b)[2]"}],"prose":"updates the existing plan of action and milestones with the organization-defined frequency based on the findings from:","parts":[{"id":"ca-5.b_obj.2.a","name":"objective","props":[{"name":"label","value":"CA-5(b)[2][a]"}],"prose":"security controls assessments;"},{"id":"ca-5.b_obj.2.b","name":"objective","props":[{"name":"label","value":"CA-5(b)[2][b]"}],"prose":"security impact analyses; and"},{"id":"ca-5.b_obj.2.c","name":"objective","props":[{"name":"label","value":"CA-5(b)[2][c]"}],"prose":"continuous monitoring activities."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing plan of action and milestones\n\nsecurity plan\n\nsecurity assessment plan\n\nsecurity assessment report\n\nsecurity assessment evidence\n\nplan of action and milestones\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with plan of action and milestones development and implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms for developing, implementing, and maintaining plan of action and milestones"}]}]},{"id":"ca-6","class":"SP800-53","title":"Security Authorization","params":[{"id":"ca-6_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-6"},{"name":"sort-id","value":"ca-06"}],"links":[{"href":"#9f77f845-e3ea-4ca4-b2c0-aa9eedc214ab","rel":"reference"},{"href":"#bedb15b7-ec5c-4a68-807f-385125751fcd","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"}],"parts":[{"id":"ca-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Assigns a senior-level executive or manager as the authorizing official for the information system;"},{"id":"ca-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Ensures that the authorizing official authorizes the information system for processing before commencing operations; and"},{"id":"ca-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Updates the security authorization {{ insert: param, ca-6_prm_1 }}."}]},{"id":"ca-6_gdn","name":"guidance","prose":"Security authorizations are official management decisions, conveyed through authorization decision documents, by senior organizational officials or executives (i.e., authorizing officials) to authorize operation of information systems and to explicitly accept the risk to organizational operations and assets, individuals, other organizations, and the Nation based on the implementation of agreed-upon security controls. Authorizing officials provide budgetary oversight for organizational information systems or assume responsibility for the mission\/business operations supported by those systems. The security authorization process is an inherently federal responsibility and therefore, authorizing officials must be federal employees. Through the security authorization process, authorizing officials assume responsibility and are accountable for security risks associated with the operation and use of organizational information systems. Accordingly, authorizing officials are in positions with levels of authority commensurate with understanding and accepting such information security-related risks. OMB policy requires that organizations conduct ongoing authorizations of information systems by implementing continuous monitoring programs. Continuous monitoring programs can satisfy three-year reauthorization requirements, so separate reauthorization processes are not necessary. Through the employment of comprehensive continuous monitoring processes, critical information contained in authorization packages (i.e., security plans, security assessment reports, and plans of action and milestones) is updated on an ongoing basis, providing authorizing officials and information system owners with an up-to-date status of the security state of organizational information systems and environments of operation. To reduce the administrative cost of security reauthorization, authorizing officials use the results of continuous monitoring processes to the maximum extent possible as the basis for rendering reauthorization decisions.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#pm-10","rel":"related"}]},{"id":"ca-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-6.a_obj","name":"objective","props":[{"name":"label","value":"CA-6(a)"}],"prose":"assigns a senior-level executive or manager as the authorizing official for the information system;"},{"id":"ca-6.b_obj","name":"objective","props":[{"name":"label","value":"CA-6(b)"}],"prose":"ensures that the authorizing official authorizes the information system for processing before commencing operations;"},{"id":"ca-6.c_obj","name":"objective","props":[{"name":"label","value":"CA-6(c)"}],"parts":[{"id":"ca-6.c_obj.1","name":"objective","props":[{"name":"label","value":"CA-6(c)[1]"}],"prose":"defines the frequency to update the security authorization; and"},{"id":"ca-6.c_obj.2","name":"objective","props":[{"name":"label","value":"CA-6(c)[2]"}],"prose":"updates the security authorization with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing security authorization\n\nsecurity authorization package (including security plan\n\nsecurity assessment report\n\nplan of action and milestones\n\nauthorization statement)\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security authorization responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms that facilitate security authorizations and updates"}]}]},{"id":"ca-7","class":"SP800-53","title":"Continuous Monitoring","params":[{"id":"ca-7_prm_1","label":"organization-defined metrics"},{"id":"ca-7_prm_2","label":"organization-defined frequencies"},{"id":"ca-7_prm_3","label":"organization-defined frequencies"},{"id":"ca-7_prm_4","label":"organization-defined personnel or roles"},{"id":"ca-7_prm_5","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-7"},{"name":"sort-id","value":"ca-07"}],"links":[{"href":"#bedb15b7-ec5c-4a68-807f-385125751fcd","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"},{"href":"#8ade2fbe-e468-4ca8-9a40-54d7f23c32bb","rel":"reference"},{"href":"#2d8b14e9-c8b5-4d3d-8bdc-155078f3281b","rel":"reference"}],"parts":[{"id":"ca-7_smt","name":"statement","prose":"The organization develops a continuous monitoring strategy and implements a continuous monitoring program that includes:","parts":[{"id":"ca-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishment of {{ insert: param, ca-7_prm_1 }} to be monitored;"},{"id":"ca-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishment of {{ insert: param, ca-7_prm_2 }} for monitoring and {{ insert: param, ca-7_prm_3 }} for assessments supporting such monitoring;"},{"id":"ca-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ongoing security control assessments in accordance with the organizational continuous monitoring strategy;"},{"id":"ca-7_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;"},{"id":"ca-7_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Correlation and analysis of security-related information generated by assessments and monitoring;"},{"id":"ca-7_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Response actions to address results of the analysis of security-related information; and"},{"id":"ca-7_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Reporting the security status of organization and the information system to {{ insert: param, ca-7_prm_4 }} {{ insert: param, ca-7_prm_5 }}."}]},{"id":"ca-7_gdn","name":"guidance","prose":"Continuous monitoring programs facilitate ongoing awareness of threats, vulnerabilities, and information security to support organizational risk management decisions. The terms continuous and ongoing imply that organizations assess\/analyze security controls and information security-related risks at a frequency sufficient to support organizational risk-based decisions. The results of continuous monitoring programs generate appropriate risk response actions by organizations. Continuous monitoring programs also allow organizations to maintain the security authorizations of information systems and common controls over time in highly dynamic environments of operation with changing mission\/business needs, threats, vulnerabilities, and technologies. Having access to security-related information on a continuing basis through reports\/dashboards gives organizational officials the capability to make more effective and timely risk management decisions, including ongoing security authorization decisions. Automation supports more frequent updates to security authorization packages, hardware\/software\/firmware inventories, and other system information. Effectiveness is further enhanced when continuous monitoring outputs are formatted to provide information that is specific, measurable, actionable, relevant, and timely. Continuous monitoring activities are scaled in accordance with the security categories of information systems.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-5","rel":"related"},{"href":"#ca-6","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#pm-6","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-2","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-7.a_obj","name":"objective","props":[{"name":"label","value":"CA-7(a)"}],"parts":[{"id":"ca-7.a_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(a)[1]"}],"prose":"develops a continuous monitoring strategy that defines metrics to be monitored;"},{"id":"ca-7.a_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(a)[2]"}],"prose":"develops a continuous monitoring strategy that includes monitoring of organization-defined metrics;"},{"id":"ca-7.a_obj.3","name":"objective","props":[{"name":"label","value":"CA-7(a)[3]"}],"prose":"implements a continuous monitoring program that includes monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.b_obj","name":"objective","props":[{"name":"label","value":"CA-7(b)"}],"parts":[{"id":"ca-7.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(b)[1]"}],"prose":"develops a continuous monitoring strategy that defines frequencies for monitoring;"},{"id":"ca-7.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(b)[2]"}],"prose":"defines frequencies for assessments supporting monitoring;"},{"id":"ca-7.b_obj.3","name":"objective","props":[{"name":"label","value":"CA-7(b)[3]"}],"prose":"develops a continuous monitoring strategy that includes establishment of the organization-defined frequencies for monitoring and for assessments supporting monitoring;"},{"id":"ca-7.b_obj.4","name":"objective","props":[{"name":"label","value":"CA-7(b)[4]"}],"prose":"implements a continuous monitoring program that includes establishment of organization-defined frequencies for monitoring and for assessments supporting such monitoring in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.c_obj","name":"objective","props":[{"name":"label","value":"CA-7(c)"}],"parts":[{"id":"ca-7.c_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(c)[1]"}],"prose":"develops a continuous monitoring strategy that includes ongoing security control assessments;"},{"id":"ca-7.c_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(c)[2]"}],"prose":"implements a continuous monitoring program that includes ongoing security control assessments in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.d_obj","name":"objective","props":[{"name":"label","value":"CA-7(d)"}],"parts":[{"id":"ca-7.d_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(d)[1]"}],"prose":"develops a continuous monitoring strategy that includes ongoing security status monitoring of organization-defined metrics;"},{"id":"ca-7.d_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(d)[2]"}],"prose":"implements a continuous monitoring program that includes ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.e_obj","name":"objective","props":[{"name":"label","value":"CA-7(e)"}],"parts":[{"id":"ca-7.e_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(e)[1]"}],"prose":"develops a continuous monitoring strategy that includes correlation and analysis of security-related information generated by assessments and monitoring;"},{"id":"ca-7.e_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(e)[2]"}],"prose":"implements a continuous monitoring program that includes correlation and analysis of security-related information generated by assessments and monitoring in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.f_obj","name":"objective","props":[{"name":"label","value":"CA-7(f)"}],"parts":[{"id":"ca-7.f_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(f)[1]"}],"prose":"develops a continuous monitoring strategy that includes response actions to address results of the analysis of security-related information;"},{"id":"ca-7.f_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(f)[2]"}],"prose":"implements a continuous monitoring program that includes response actions to address results of the analysis of security-related information in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.g_obj","name":"objective","props":[{"name":"label","value":"CA-7(g)"}],"parts":[{"id":"ca-7.g_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(g)[1]"}],"prose":"develops a continuous monitoring strategy that defines the personnel or roles to whom the security status of the organization and information system are to be reported;"},{"id":"ca-7.g_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(g)[2]"}],"prose":"develops a continuous monitoring strategy that defines the frequency to report the security status of the organization and information system to organization-defined personnel or roles;"},{"id":"ca-7.g_obj.3","name":"objective","props":[{"name":"label","value":"CA-7(g)[3]"}],"prose":"develops a continuous monitoring strategy that includes reporting the security status of the organization or information system to organizational-defined personnel or roles with the organization-defined frequency; and"},{"id":"ca-7.g_obj.4","name":"objective","props":[{"name":"label","value":"CA-7(g)[4]"}],"prose":"implements a continuous monitoring program that includes reporting the security status of the organization and information system to organization-defined personnel or roles with the organization-defined frequency in accordance with the organizational continuous monitoring strategy."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing continuous monitoring of information system security controls\n\nprocedures addressing configuration management\n\nsecurity plan\n\nsecurity assessment report\n\nplan of action and milestones\n\ninformation system monitoring records\n\nconfiguration management records, security impact analyses\n\nstatus reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with continuous monitoring responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Mechanisms implementing continuous monitoring"}]}],"controls":[{"id":"ca-7.1","class":"SP800-53-enhancement","title":"Independent Assessment","params":[{"id":"ca-7.1_prm_1","label":"organization-defined level of independence"}],"props":[{"name":"label","value":"CA-7(1)"},{"name":"sort-id","value":"ca-07.01"}],"parts":[{"id":"ca-7.1_smt","name":"statement","prose":"The organization employs assessors or assessment teams with {{ insert: param, ca-7.1_prm_1 }} to monitor the security controls in the information system on an ongoing basis."},{"id":"ca-7.1_gdn","name":"guidance","prose":"Organizations can maximize the value of assessments of security controls during the continuous monitoring process by requiring that such assessments be conducted by assessors or assessment teams with appropriate levels of independence based on continuous monitoring strategies. Assessor independence provides a degree of impartiality to the monitoring process. To achieve such impartiality, assessors should not: (i) create a mutual or conflicting interest with the organizations where the assessments are being conducted; (ii) assess their own work; (iii) act as management or employees of the organizations they are serving; or (iv) place themselves in advocacy positions for the organizations acquiring their services."},{"id":"ca-7.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-7.1_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(1)[1]"}],"prose":"defines a level of independence to be employed to monitor the security controls in the information system on an ongoing basis; and"},{"id":"ca-7.1_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(1)[2]"}],"prose":"employs assessors or assessment teams with the organization-defined level of independence to monitor the security controls in the information system on an ongoing basis."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing continuous monitoring of information system security controls\n\nsecurity plan\n\nsecurity assessment report\n\nplan of action and milestones\n\ninformation system monitoring records\n\nsecurity impact analyses\n\nstatus reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with continuous monitoring responsibilities\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"ca-9","class":"SP800-53","title":"Internal System Connections","params":[{"id":"ca-9_prm_1","label":"organization-defined information system components or classes of components"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-9"},{"name":"sort-id","value":"ca-09"}],"parts":[{"id":"ca-9_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Authorizes internal connections of {{ insert: param, ca-9_prm_1 }} to the information system; and"},{"id":"ca-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents, for each internal connection, the interface characteristics, security requirements, and the nature of the information communicated."}]},{"id":"ca-9_gdn","name":"guidance","prose":"This control applies to connections between organizational information systems and (separate) constituent system components (i.e., intra-system connections) including, for example, system connections with mobile devices, notebook\/desktop computers, printers, copiers, facsimile machines, scanners, sensors, and servers. Instead of authorizing each individual internal connection, organizations can authorize internal connections for a class of components with common characteristics and\/or configurations, for example, all digital printers, scanners, and copiers with a specified processing, storage, and transmission capability or all smart phones with a specific baseline configuration.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-9_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-9.a_obj","name":"objective","props":[{"name":"label","value":"CA-9(a)"}],"parts":[{"id":"ca-9.a_obj.1","name":"objective","props":[{"name":"label","value":"CA-9(a)[1]"}],"prose":"defines information system components or classes of components to be authorized as internal connections to the information system;"},{"id":"ca-9.a_obj.2","name":"objective","props":[{"name":"label","value":"CA-9(a)[2]"}],"prose":"authorizes internal connections of organization-defined information system components or classes of components to the information system;"}]},{"id":"ca-9.b_obj","name":"objective","props":[{"name":"label","value":"CA-9(b)"}],"prose":"documents, for each internal connection:","parts":[{"id":"ca-9.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-9(b)[1]"}],"prose":"the interface characteristics;"},{"id":"ca-9.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-9(b)[2]"}],"prose":"the security requirements; and"},{"id":"ca-9.b_obj.3","name":"objective","props":[{"name":"label","value":"CA-9(b)[3]"}],"prose":"the nature of the information communicated."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing information system connections\n\nsystem and communications protection policy\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of components or classes of components authorized as internal system connections\n\nsecurity assessment report\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for developing, implementing, or authorizing internal system connections\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"cm","class":"family","title":"Configuration Management","controls":[{"id":"cm-1","class":"SP800-53","title":"Configuration Management Policy and Procedures","params":[{"id":"cm-1_prm_1","label":"organization-defined personnel or roles"},{"id":"cm-1_prm_2","label":"organization-defined frequency"},{"id":"cm-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-1"},{"name":"sort-id","value":"cm-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"cm-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, cm-1_prm_1 }}:","parts":[{"id":"cm-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"cm-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the configuration management policy and associated configuration management controls; and"}]},{"id":"cm-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"cm-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Configuration management policy {{ insert: param, cm-1_prm_2 }}; and"},{"id":"cm-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Configuration management procedures {{ insert: param, cm-1_prm_3 }}."}]}]},{"id":"cm-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the CM family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"cm-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-1.a_obj","name":"objective","props":[{"name":"label","value":"CM-1(a)"}],"parts":[{"id":"cm-1.a.1_obj","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)"}],"parts":[{"id":"cm-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1]"}],"prose":"develops and documents a configuration management policy that addresses:","parts":[{"id":"cm-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"cm-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"cm-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"cm-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"cm-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"cm-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"cm-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"cm-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the configuration management policy is to be disseminated;"},{"id":"cm-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[3]"}],"prose":"disseminates the configuration management policy to organization-defined personnel or roles;"}]},{"id":"cm-1.a.2_obj","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)"}],"parts":[{"id":"cm-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the configuration management policy and associated configuration management controls;"},{"id":"cm-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"cm-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"cm-1.b_obj","name":"objective","props":[{"name":"label","value":"CM-1(b)"}],"parts":[{"id":"cm-1.b.1_obj","name":"objective","props":[{"name":"label","value":"CM-1(b)(1)"}],"parts":[{"id":"cm-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current configuration management policy;"},{"id":"cm-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(b)(1)[2]"}],"prose":"reviews and updates the current configuration management policy with the organization-defined frequency;"}]},{"id":"cm-1.b.2_obj","name":"objective","props":[{"name":"label","value":"CM-1(b)(2)"}],"parts":[{"id":"cm-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current configuration management procedures; and"},{"id":"cm-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(b)(2)[2]"}],"prose":"reviews and updates the current configuration management procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]}]},{"id":"cm-2","class":"SP800-53","title":"Baseline Configuration","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-2"},{"name":"sort-id","value":"cm-02"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-2_smt","name":"statement","prose":"The organization develops, documents, and maintains under configuration control, a current baseline configuration of the information system."},{"id":"cm-2_gdn","name":"guidance","prose":"This control establishes baseline configurations for information systems and system components including communications and connectivity-related aspects of systems. Baseline configurations are documented, formally reviewed and agreed-upon sets of specifications for information systems or configuration items within those systems. Baseline configurations serve as a basis for future builds, releases, and\/or changes to information systems. Baseline configurations include information about information system components (e.g., standard software packages installed on workstations, notebook computers, servers, network components, or mobile devices; current version numbers and patch information on operating systems and applications; and configuration settings\/parameters), network topology, and the logical placement of those components within the system architecture. Maintaining baseline configurations requires creating new baselines as organizational information systems change over time. Baseline configurations of information systems reflect the current enterprise architecture.","links":[{"href":"#cm-3","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#pm-5","rel":"related"},{"href":"#pm-7","rel":"related"}]},{"id":"cm-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-2_obj.1","name":"objective","props":[{"name":"label","value":"CM-2[1]"}],"prose":"develops and documents a current baseline configuration of the information system; and"},{"id":"cm-2_obj.2","name":"objective","props":[{"name":"label","value":"CM-2[2]"}],"prose":"maintains, under configuration control, a current baseline configuration of the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing the baseline configuration of the information system\n\nconfiguration management plan\n\nenterprise architecture documentation\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nchange control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing baseline configurations\n\nautomated mechanisms supporting configuration control of the baseline configuration"}]}],"controls":[{"id":"cm-2.1","class":"SP800-53-enhancement","title":"Reviews and Updates","params":[{"id":"cm-2.1_prm_1","label":"organization-defined frequency"},{"id":"cm-2.1_prm_2","label":"Assignment organization-defined circumstances"}],"props":[{"name":"label","value":"CM-2(1)"},{"name":"sort-id","value":"cm-02.01"}],"parts":[{"id":"cm-2.1_smt","name":"statement","prose":"The organization reviews and updates the baseline configuration of the information system:","parts":[{"id":"cm-2.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":" {{ insert: param, cm-2.1_prm_1 }};"},{"id":"cm-2.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"When required due to {{ insert: param, cm-2.1_prm_2 }}; and"},{"id":"cm-2.1_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"As an integral part of information system component installations and upgrades."}]},{"id":"cm-2.1_gdn","name":"guidance","links":[{"href":"#cm-5","rel":"related"}]},{"id":"cm-2.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-2.1.a_obj","name":"objective","props":[{"name":"label","value":"CM-2(1)(a)"}],"parts":[{"id":"cm-2.1.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(1)(a)[1]"}],"prose":"defines the frequency to review and update the baseline configuration of the information system;"},{"id":"cm-2.1.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(1)(a)[2]"}],"prose":"reviews and updates the baseline configuration of the information system with the organization-defined frequency;"}],"links":[{"href":"#cm-2.1_smt.a","rel":"corresp"}]},{"id":"cm-2.1.b_obj","name":"objective","props":[{"name":"label","value":"CM-2(1)(b)"}],"parts":[{"id":"cm-2.1.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(1)(b)[1]"}],"prose":"defines circumstances that require the baseline configuration of the information system to be reviewed and updated;"},{"id":"cm-2.1.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(1)(b)[2]"}],"prose":"reviews and updates the baseline configuration of the information system when required due to organization-defined circumstances; and"}],"links":[{"href":"#cm-2.1_smt.b","rel":"corresp"}]},{"id":"cm-2.1.c_obj","name":"objective","props":[{"name":"label","value":"CM-2(1)(c)"}],"prose":"reviews and updates the baseline configuration of the information system as an integral part of information system component installations and upgrades.","links":[{"href":"#cm-2.1_smt.c","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nconfiguration management plan\n\nprocedures addressing the baseline configuration of the information system\n\nprocedures addressing information system component installations and upgrades\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nrecords of information system baseline configuration reviews and updates\n\ninformation system component installations\/upgrades and associated records\n\nchange control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing baseline configurations\n\nautomated mechanisms supporting review and update of the baseline configuration"}]}]},{"id":"cm-2.3","class":"SP800-53-enhancement","title":"Retention of Previous Configurations","params":[{"id":"cm-2.3_prm_1","label":"organization-defined previous versions of baseline configurations of the information system"}],"props":[{"name":"label","value":"CM-2(3)"},{"name":"sort-id","value":"cm-02.03"}],"parts":[{"id":"cm-2.3_smt","name":"statement","prose":"The organization retains {{ insert: param, cm-2.3_prm_1 }} to support rollback."},{"id":"cm-2.3_gdn","name":"guidance","prose":"Retaining previous versions of baseline configurations to support rollback may include, for example, hardware, software, firmware, configuration files, and configuration records."},{"id":"cm-2.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-2.3_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(3)[1]"}],"prose":"defines previous versions of baseline configurations of the information system to be retained to support rollback; and"},{"id":"cm-2.3_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(3)[2]"}],"prose":"retains organization-defined previous versions of baseline configurations of the information system to support rollback."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing the baseline configuration of the information system\n\nconfiguration management plan\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\ncopies of previous baseline configuration versions\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing baseline configurations"}]}]},{"id":"cm-2.7","class":"SP800-53-enhancement","title":"Configure Systems, Components, or Devices for High-risk Areas","params":[{"id":"cm-2.7_prm_1","label":"organization-defined information systems, system components, or devices"},{"id":"cm-2.7_prm_2","label":"organization-defined configurations"},{"id":"cm-2.7_prm_3","label":"organization-defined security safeguards"}],"props":[{"name":"label","value":"CM-2(7)"},{"name":"sort-id","value":"cm-02.07"}],"parts":[{"id":"cm-2.7_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-2.7_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Issues {{ insert: param, cm-2.7_prm_1 }} with {{ insert: param, cm-2.7_prm_2 }} to individuals traveling to locations that the organization deems to be of significant risk; and"},{"id":"cm-2.7_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Applies {{ insert: param, cm-2.7_prm_3 }} to the devices when the individuals return."}]},{"id":"cm-2.7_gdn","name":"guidance","prose":"When it is known that information systems, system components, or devices (e.g., notebook computers, mobile devices) will be located in high-risk areas, additional security controls may be implemented to counter the greater threat in such areas coupled with the lack of physical security relative to organizational-controlled areas. For example, organizational policies and procedures for notebook computers used by individuals departing on and returning from travel include, for example, determining which locations are of concern, defining required configurations for the devices, ensuring that the devices are configured as intended before travel is initiated, and applying specific safeguards to the device after travel is completed. Specially configured notebook computers include, for example, computers with sanitized hard drives, limited applications, and additional hardening (e.g., more stringent configuration settings). Specified safeguards applied to mobile devices upon return from travel include, for example, examining the device for signs of physical tampering and purging\/reimaging the hard disk drive. Protecting information residing on mobile devices is covered in the media protection family."},{"id":"cm-2.7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-2.7.a_obj","name":"objective","props":[{"name":"label","value":"CM-2(7)(a)"}],"parts":[{"id":"cm-2.7.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(7)(a)[1]"}],"prose":"defines information systems, system components, or devices to be issued to individuals traveling to locations that the organization deems to be of significant risk;"},{"id":"cm-2.7.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(7)(a)[2]"}],"prose":"defines configurations to be employed on organization-defined information systems, system components, or devices issued to individuals traveling to such locations;"},{"id":"cm-2.7.a_obj.3","name":"objective","props":[{"name":"label","value":"CM-2(7)(a)[3]"}],"prose":"issues organization-defined information systems, system components, or devices with organization-defined configurations to individuals traveling to locations that the organization deems to be of significant risk;"}],"links":[{"href":"#cm-2.7_smt.a","rel":"corresp"}]},{"id":"cm-2.7.b_obj","name":"objective","props":[{"name":"label","value":"CM-2(7)(b)"}],"parts":[{"id":"cm-2.7.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(7)(b)[1]"}],"prose":"defines security safeguards to be applied to the devices when the individuals return; and"},{"id":"cm-2.7.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(7)(b)[2]"}],"prose":"applies organization-defined safeguards to the devices when the individuals return."}],"links":[{"href":"#cm-2.7_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nconfiguration management plan\n\nprocedures addressing the baseline configuration of the information system\n\nprocedures addressing information system component installations and upgrades\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nrecords of information system baseline configuration reviews and updates\n\ninformation system component installations\/upgrades and associated records\n\nchange control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing baseline configurations"}]}]}]},{"id":"cm-3","class":"SP800-53","title":"Configuration Change Control","params":[{"id":"cm-3_prm_1","label":"organization-defined time period"},{"id":"cm-3_prm_2","label":"organization-defined configuration change control element (e.g., committee, board)"},{"id":"cm-3_prm_3","select":{"how-many":"one-or-more","choice":[" {{ insert: param, cm-3_prm_4 }} "," {{ insert: param, cm-3_prm_5 }} "]}},{"id":"cm-3_prm_4","depends-on":"cm-3_prm_3","label":"organization-defined frequency"},{"id":"cm-3_prm_5","depends-on":"cm-3_prm_3","label":"organization-defined configuration change conditions"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-3"},{"name":"sort-id","value":"cm-03"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Determines the types of changes to the information system that are configuration-controlled;"},{"id":"cm-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews proposed configuration-controlled changes to the information system and approves or disapproves such changes with explicit consideration for security impact analyses;"},{"id":"cm-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Documents configuration change decisions associated with the information system;"},{"id":"cm-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Implements approved configuration-controlled changes to the information system;"},{"id":"cm-3_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Retains records of configuration-controlled changes to the information system for {{ insert: param, cm-3_prm_1 }};"},{"id":"cm-3_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Audits and reviews activities associated with configuration-controlled changes to the information system; and"},{"id":"cm-3_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Coordinates and provides oversight for configuration change control activities through {{ insert: param, cm-3_prm_2 }} that convenes {{ insert: param, cm-3_prm_3 }}."}]},{"id":"cm-3_gdn","name":"guidance","prose":"Configuration change controls for organizational information systems involve the systematic proposal, justification, implementation, testing, review, and disposition of changes to the systems, including system upgrades and modifications. Configuration change control includes changes to baseline configurations for components and configuration items of information systems, changes to configuration settings for information technology products (e.g., operating systems, applications, firewalls, routers, and mobile devices), unscheduled\/unauthorized changes, and changes to remediate vulnerabilities. Typical processes for managing configuration changes to information systems include, for example, Configuration Control Boards that approve proposed changes to systems. For new development information systems or systems undergoing major upgrades, organizations consider including representatives from development organizations on the Configuration Control Boards. Auditing of changes includes activities before and after changes are made to organizational information systems and the auditing activities required to implement such changes.","links":[{"href":"#ca-7","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#si-2","rel":"related"},{"href":"#si-12","rel":"related"}]},{"id":"cm-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-3.a_obj","name":"objective","props":[{"name":"label","value":"CM-3(a)"}],"prose":"determines the type of changes to the information system that must be configuration-controlled;"},{"id":"cm-3.b_obj","name":"objective","props":[{"name":"label","value":"CM-3(b)"}],"prose":"reviews proposed configuration-controlled changes to the information system and approves or disapproves such changes with explicit consideration for security impact analyses;"},{"id":"cm-3.c_obj","name":"objective","props":[{"name":"label","value":"CM-3(c)"}],"prose":"documents configuration change decisions associated with the information system;"},{"id":"cm-3.d_obj","name":"objective","props":[{"name":"label","value":"CM-3(d)"}],"prose":"implements approved configuration-controlled changes to the information system;"},{"id":"cm-3.e_obj","name":"objective","props":[{"name":"label","value":"CM-3(e)"}],"parts":[{"id":"cm-3.e_obj.1","name":"objective","props":[{"name":"label","value":"CM-3(e)[1]"}],"prose":"defines a time period to retain records of configuration-controlled changes to the information system;"},{"id":"cm-3.e_obj.2","name":"objective","props":[{"name":"label","value":"CM-3(e)[2]"}],"prose":"retains records of configuration-controlled changes to the information system for the organization-defined time period;"}]},{"id":"cm-3.f_obj","name":"objective","props":[{"name":"label","value":"CM-3(f)"}],"prose":"audits and reviews activities associated with configuration-controlled changes to the information system;"},{"id":"cm-3.g_obj","name":"objective","props":[{"name":"label","value":"CM-3(g)"}],"parts":[{"id":"cm-3.g_obj.1","name":"objective","props":[{"name":"label","value":"CM-3(g)[1]"}],"prose":"defines a configuration change control element (e.g., committee, board) responsible for coordinating and providing oversight for configuration change control activities;"},{"id":"cm-3.g_obj.2","name":"objective","props":[{"name":"label","value":"CM-3(g)[2]"}],"prose":"defines the frequency with which the configuration change control element must convene; and\/or"},{"id":"cm-3.g_obj.3","name":"objective","props":[{"name":"label","value":"CM-3(g)[3]"}],"prose":"defines configuration change conditions that prompt the configuration change control element to convene; and"},{"id":"cm-3.g_obj.4","name":"objective","props":[{"name":"label","value":"CM-3(g)[4]"}],"prose":"coordinates and provides oversight for configuration change control activities through organization-defined configuration change control element that convenes at organization-defined frequency and\/or for any organization-defined configuration change conditions."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system configuration change control\n\nconfiguration management plan\n\ninformation system architecture and configuration documentation\n\nsecurity plan\n\nchange control records\n\ninformation system audit records\n\nchange control audit and review reports\n\nagenda \/minutes from configuration change control oversight meetings\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration change control responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nmembers of change control board or similar"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for configuration change control\n\nautomated mechanisms that implement configuration change control"}]}],"controls":[{"id":"cm-3.2","class":"SP800-53-enhancement","title":"Test \/ Validate \/ Document Changes","props":[{"name":"label","value":"CM-3(2)"},{"name":"sort-id","value":"cm-03.02"}],"parts":[{"id":"cm-3.2_smt","name":"statement","prose":"The organization tests, validates, and documents changes to the information system before implementing the changes on the operational system."},{"id":"cm-3.2_gdn","name":"guidance","prose":"Changes to information systems include modifications to hardware, software, or firmware components and configuration settings defined in CM-6. Organizations ensure that testing does not interfere with information system operations. Individuals\/groups conducting tests understand organizational security policies and procedures, information system security policies and procedures, and the specific health, safety, and environmental risks associated with particular facilities\/processes. Operational systems may need to be taken off-line, or replicated to the extent feasible, before testing can be conducted. If information systems must be taken off-line for testing, the tests are scheduled to occur during planned system outages whenever possible. If testing cannot be conducted on operational systems, organizations employ compensating controls (e.g., testing on replicated systems)."},{"id":"cm-3.2_obj","name":"objective","prose":"Determine if the organization, before implementing changes on the operational system:","parts":[{"id":"cm-3.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-3(2)[1]"}],"prose":"tests changes to the information system;"},{"id":"cm-3.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-3(2)[2]"}],"prose":"validates changes to the information system; and"},{"id":"cm-3.2_obj.3","name":"objective","props":[{"name":"label","value":"CM-3(2)[3]"}],"prose":"documents changes to the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nconfiguration management plan\n\nprocedures addressing information system configuration change control\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\ntest records\n\nvalidation records\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration change control responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for configuration change control\n\nautomated mechanisms supporting and\/or implementing testing, validating, and documenting information system changes"}]}]}]},{"id":"cm-4","class":"SP800-53","title":"Security Impact Analysis","props":[{"name":"priority","value":"P2"},{"name":"label","value":"CM-4"},{"name":"sort-id","value":"cm-04"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-4_smt","name":"statement","prose":"The organization analyzes changes to the information system to determine potential security impacts prior to change implementation."},{"id":"cm-4_gdn","name":"guidance","prose":"Organizational personnel with information security responsibilities (e.g., Information System Administrators, Information System Security Officers, Information System Security Managers, and Information System Security Engineers) conduct security impact analyses. Individuals conducting security impact analyses possess the necessary skills\/technical expertise to analyze the changes to information systems and the associated security ramifications. Security impact analysis may include, for example, reviewing security plans to understand security control requirements and reviewing system design documentation to understand control implementation and how specific changes might affect the controls. Security impact analyses may also include assessments of risk to better understand the impact of the changes and to determine if additional security controls are required. Security impact analyses are scaled in accordance with the security categories of the information systems.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"cm-4_obj","name":"objective","prose":"Determine if the organization analyzes changes to the information system to determine potential security impacts prior to change implementation."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing security impact analysis for changes to the information system\n\nconfiguration management plan\n\nsecurity impact analysis documentation\n\nanalysis tools and associated outputs\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for conducting security impact analysis\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security impact analysis"}]}]},{"id":"cm-5","class":"SP800-53","title":"Access Restrictions for Change","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-5"},{"name":"sort-id","value":"cm-05"}],"parts":[{"id":"cm-5_smt","name":"statement","prose":"The organization defines, documents, approves, and enforces physical and logical access restrictions associated with changes to the information system."},{"id":"cm-5_gdn","name":"guidance","prose":"Any changes to the hardware, software, and\/or firmware components of information systems can potentially have significant effects on the overall security of the systems. Therefore, organizations permit only qualified and authorized individuals to access information systems for purposes of initiating changes, including upgrades and modifications. Organizations maintain records of access to ensure that configuration change control is implemented and to support after-the-fact actions should organizations discover any unauthorized changes. Access restrictions for change also include software libraries. Access restrictions include, for example, physical and logical access controls (see AC-3 and PE-3), workflow automation, media libraries, abstract layers (e.g., changes implemented into third-party interfaces rather than directly into information systems), and change windows (e.g., changes occur only during specified times, making unauthorized changes easy to discover).","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#pe-3","rel":"related"}]},{"id":"cm-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-5_obj.1","name":"objective","props":[{"name":"label","value":"CM-5[1]"}],"prose":"defines physical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.2","name":"objective","props":[{"name":"label","value":"CM-5[2]"}],"prose":"documents physical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.3","name":"objective","props":[{"name":"label","value":"CM-5[3]"}],"prose":"approves physical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.4","name":"objective","props":[{"name":"label","value":"CM-5[4]"}],"prose":"enforces physical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.5","name":"objective","props":[{"name":"label","value":"CM-5[5]"}],"prose":"defines logical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.6","name":"objective","props":[{"name":"label","value":"CM-5[6]"}],"prose":"documents logical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.7","name":"objective","props":[{"name":"label","value":"CM-5[7]"}],"prose":"approves logical access restrictions associated with changes to the information system; and"},{"id":"cm-5_obj.8","name":"objective","props":[{"name":"label","value":"CM-5[8]"}],"prose":"enforces logical access restrictions associated with changes to the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing access restrictions for changes to the information system\n\nconfiguration management plan\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nlogical access approvals\n\nphysical access approvals\n\naccess credentials\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with logical access control responsibilities\n\norganizational personnel with physical access control responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing access restrictions to change\n\nautomated mechanisms supporting\/implementing\/enforcing access restrictions associated with changes to the information system"}]}]},{"id":"cm-6","class":"SP800-53","title":"Configuration Settings","params":[{"id":"cm-6_prm_1","label":"organization-defined security configuration checklists"},{"id":"cm-6_prm_2","label":"organization-defined information system components"},{"id":"cm-6_prm_3","label":"organization-defined operational requirements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-6"},{"name":"sort-id","value":"cm-06"}],"links":[{"href":"#990268bf-f4a9-4c81-91ae-dc7d3115f4b1","rel":"reference"},{"href":"#0b3d8ba9-051f-498d-81ea-97f0f018c612","rel":"reference"},{"href":"#0916ef02-3618-411b-a525-565c088849a6","rel":"reference"},{"href":"#84a37532-6db6-477b-9ea8-f9085ebca0fc","rel":"reference"},{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"},{"href":"#275cc052-0f7f-423c-bdb6-ed503dc36228","rel":"reference"},{"href":"#e95dd121-2733-413e-bf1e-f1eb49f20a98","rel":"reference"},{"href":"#647b6de3-81d0-4d22-bec1-5f1333e34380","rel":"reference"}],"parts":[{"id":"cm-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes and documents configuration settings for information technology products employed within the information system using {{ insert: param, cm-6_prm_1 }} that reflect the most restrictive mode consistent with operational requirements;"},{"id":"cm-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Implements the configuration settings;"},{"id":"cm-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Identifies, documents, and approves any deviations from established configuration settings for {{ insert: param, cm-6_prm_2 }} based on {{ insert: param, cm-6_prm_3 }}; and"},{"id":"cm-6_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Monitors and controls changes to the configuration settings in accordance with organizational policies and procedures."}]},{"id":"cm-6_gdn","name":"guidance","prose":"Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the information system that affect the security posture and\/or functionality of the system. Information technology products for which security-related configuration settings can be defined include, for example, mainframe computers, servers (e.g., database, electronic mail, authentication, web, proxy, file, domain name), workstations, input\/output devices (e.g., scanners, copiers, and printers), network components (e.g., firewalls, routers, gateways, voice and data switches, wireless access points, network appliances, sensors), operating systems, middleware, and applications. Security-related parameters are those parameters impacting the security state of information systems including the parameters required to satisfy other security control requirements. Security-related parameters include, for example: (i) registry settings; (ii) account, file, directory permission settings; and (iii) settings for functions, ports, protocols, services, and remote connections. Organizations establish organization-wide configuration settings and subsequently derive specific settings for information systems. The established settings become part of the systems configuration baseline. Common secure configurations (also referred to as security configuration checklists, lockdown and hardening guides, security reference guides, security technical implementation guides) provide recognized, standardized, and established benchmarks that stipulate secure configuration settings for specific information technology platforms\/products and instructions for configuring those information system components to meet operational requirements. Common secure configurations can be developed by a variety of organizations including, for example, information technology product developers, manufacturers, vendors, consortia, academia, industry, federal agencies, and other organizations in the public and private sectors. Common secure configurations include the United States Government Configuration Baseline (USGCB) which affects the implementation of CM-6 and other controls such as AC-19 and CM-7. The Security Content Automation Protocol (SCAP) and the defined standards within the protocol (e.g., Common Configuration Enumeration) provide an effective method to uniquely identify, track, and control configuration settings. OMB establishes federal policy on configuration requirements for federal information systems.","links":[{"href":"#ac-19","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"cm-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-6.a_obj","name":"objective","props":[{"name":"label","value":"CM-6(a)"}],"parts":[{"id":"cm-6.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(a)[1]"}],"prose":"defines security configuration checklists to be used to establish and document configuration settings for the information technology products employed;"},{"id":"cm-6.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(a)[2]"}],"prose":"ensures the defined security configuration checklists reflect the most restrictive mode consistent with operational requirements;"},{"id":"cm-6.a_obj.3","name":"objective","props":[{"name":"label","value":"CM-6(a)[3]"}],"prose":"establishes and documents configuration settings for information technology products employed within the information system using organization-defined security configuration checklists;"}]},{"id":"cm-6.b_obj","name":"objective","props":[{"name":"label","value":"CM-6(b)"}],"prose":"implements the configuration settings established\/documented in CM-6(a);;"},{"id":"cm-6.c_obj","name":"objective","props":[{"name":"label","value":"CM-6(c)"}],"parts":[{"id":"cm-6.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(c)[1]"}],"prose":"defines information system components for which any deviations from established configuration settings must be:","parts":[{"id":"cm-6.c_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-6(c)[1][a]"}],"prose":"identified;"},{"id":"cm-6.c_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-6(c)[1][b]"}],"prose":"documented;"},{"id":"cm-6.c_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-6(c)[1][c]"}],"prose":"approved;"}]},{"id":"cm-6.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(c)[2]"}],"prose":"defines operational requirements to support:","parts":[{"id":"cm-6.c_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-6(c)[2][a]"}],"prose":"the identification of any deviations from established configuration settings;"},{"id":"cm-6.c_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-6(c)[2][b]"}],"prose":"the documentation of any deviations from established configuration settings;"},{"id":"cm-6.c_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-6(c)[2][c]"}],"prose":"the approval of any deviations from established configuration settings;"}]},{"id":"cm-6.c_obj.3","name":"objective","props":[{"name":"label","value":"CM-6(c)[3]"}],"prose":"identifies any deviations from established configuration settings for organization-defined information system components based on organizational-defined operational requirements;"},{"id":"cm-6.c_obj.4","name":"objective","props":[{"name":"label","value":"CM-6(c)[4]"}],"prose":"documents any deviations from established configuration settings for organization-defined information system components based on organizational-defined operational requirements;"},{"id":"cm-6.c_obj.5","name":"objective","props":[{"name":"label","value":"CM-6(c)[5]"}],"prose":"approves any deviations from established configuration settings for organization-defined information system components based on organizational-defined operational requirements;"}]},{"id":"cm-6.d_obj","name":"objective","props":[{"name":"label","value":"CM-6(d)"}],"parts":[{"id":"cm-6.d_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(d)[1]"}],"prose":"monitors changes to the configuration settings in accordance with organizational policies and procedures; and"},{"id":"cm-6.d_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(d)[2]"}],"prose":"controls changes to the configuration settings in accordance with organizational policies and procedures."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing configuration settings for the information system\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity configuration checklists\n\nevidence supporting approved deviations from established configuration settings\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing configuration settings\n\nautomated mechanisms that implement, monitor, and\/or control information system configuration settings\n\nautomated mechanisms that identify and\/or document deviations from established configuration settings"}]}]},{"id":"cm-7","class":"SP800-53","title":"Least Functionality","params":[{"id":"cm-7_prm_1","label":"organization-defined prohibited or restricted functions, ports, protocols, and\/or services"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-7"},{"name":"sort-id","value":"cm-07"}],"links":[{"href":"#e42b2099-3e1c-415b-952c-61c96533c12e","rel":"reference"}],"parts":[{"id":"cm-7_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Configures the information system to provide only essential capabilities; and"},{"id":"cm-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Prohibits or restricts the use of the following functions, ports, protocols, and\/or services: {{ insert: param, cm-7_prm_1 }}."}]},{"id":"cm-7_gdn","name":"guidance","prose":"Information systems can provide a wide variety of functions and services. Some of the functions and services, provided by default, may not be necessary to support essential organizational operations (e.g., key missions, functions). Additionally, it is sometimes convenient to provide multiple services from single information system components, but doing so increases risk over limiting the services provided by any one component. Where feasible, organizations limit component functionality to a single function per device (e.g., email servers or web servers, but not both). Organizations review functions and services provided by information systems or individual components of information systems, to determine which functions and services are candidates for elimination (e.g., Voice Over Internet Protocol, Instant Messaging, auto-execute, and file sharing). Organizations consider disabling unused or unnecessary physical and logical ports\/protocols (e.g., Universal Serial Bus, File Transfer Protocol, and Hyper Text Transfer Protocol) on information systems to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling. Organizations can utilize network scanning tools, intrusion detection and prevention systems, and end-point protections such as firewalls and host-based intrusion detection systems to identify and prevent the use of prohibited functions, ports, protocols, and services.","links":[{"href":"#ac-6","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"cm-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-7.a_obj","name":"objective","props":[{"name":"label","value":"CM-7(a)"}],"prose":"configures the information system to provide only essential capabilities;"},{"id":"cm-7.b_obj","name":"objective","props":[{"name":"label","value":"CM-7(b)"}],"parts":[{"id":"cm-7.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(b)[1]"}],"prose":"defines prohibited or restricted:","parts":[{"id":"cm-7.b_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][a]"}],"prose":"functions;"},{"id":"cm-7.b_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][b]"}],"prose":"ports;"},{"id":"cm-7.b_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.b_obj.1.d","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][d]"}],"prose":"services;"}]},{"id":"cm-7.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(b)[2]"}],"prose":"prohibits or restricts the use of organization-defined:","parts":[{"id":"cm-7.b_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][a]"}],"prose":"functions;"},{"id":"cm-7.b_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][b]"}],"prose":"ports;"},{"id":"cm-7.b_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.b_obj.2.d","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][d]"}],"prose":"services."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nconfiguration management plan\n\nprocedures addressing least functionality in the information system\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity configuration checklists\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes prohibiting or restricting functions, ports, protocols, and\/or services\n\nautomated mechanisms implementing restrictions or prohibition of functions, ports, protocols, and\/or services"}]}],"controls":[{"id":"cm-7.1","class":"SP800-53-enhancement","title":"Periodic Review","params":[{"id":"cm-7.1_prm_1","label":"organization-defined frequency"},{"id":"cm-7.1_prm_2","label":"organization-defined functions, ports, protocols, and services within the information system deemed to be unnecessary and\/or nonsecure"}],"props":[{"name":"label","value":"CM-7(1)"},{"name":"sort-id","value":"cm-07.01"}],"parts":[{"id":"cm-7.1_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-7.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Reviews the information system {{ insert: param, cm-7.1_prm_1 }} to identify unnecessary and\/or nonsecure functions, ports, protocols, and services; and"},{"id":"cm-7.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Disables {{ insert: param, cm-7.1_prm_2 }}."}]},{"id":"cm-7.1_gdn","name":"guidance","prose":"The organization can either make a determination of the relative security of the function, port, protocol, and\/or service or base the security decision on the assessment of other entities. Bluetooth, FTP, and peer-to-peer networking are examples of less than secure protocols.","links":[{"href":"#ac-18","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#ia-2","rel":"related"}]},{"id":"cm-7.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-7.1.a_obj","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)"}],"parts":[{"id":"cm-7.1.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[1]"}],"prose":"defines the frequency to review the information system to identify unnecessary and\/or nonsecure:","parts":[{"id":"cm-7.1.a_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[1][a]"}],"prose":"functions;"},{"id":"cm-7.1.a_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[1][b]"}],"prose":"ports;"},{"id":"cm-7.1.a_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[1][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.1.a_obj.1.d","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[1][d]"}],"prose":"services;"}]},{"id":"cm-7.1.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[2]"}],"prose":"reviews the information system with the organization-defined frequency to identify unnecessary and\/or nonsecure:","parts":[{"id":"cm-7.1.a_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[2][a]"}],"prose":"functions;"},{"id":"cm-7.1.a_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[2][b]"}],"prose":"ports;"},{"id":"cm-7.1.a_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[2][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.1.a_obj.2.d","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[2][d]"}],"prose":"services;"}]}],"links":[{"href":"#cm-7.1_smt.a","rel":"corresp"}]},{"id":"cm-7.1.b_obj","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)"}],"parts":[{"id":"cm-7.1.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[1]"}],"prose":"defines, within the information system, unnecessary and\/or nonsecure:","parts":[{"id":"cm-7.1.b_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[1][a]"}],"prose":"functions;"},{"id":"cm-7.1.b_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[1][b]"}],"prose":"ports;"},{"id":"cm-7.1.b_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[1][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.1.b_obj.1.d","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[1][d]"}],"prose":"services;"}]},{"id":"cm-7.1.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[2]"}],"prose":"disables organization-defined unnecessary and\/or nonsecure:","parts":[{"id":"cm-7.1.b_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[2][a]"}],"prose":"functions;"},{"id":"cm-7.1.b_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[2][b]"}],"prose":"ports;"},{"id":"cm-7.1.b_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[2][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.1.b_obj.2.d","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[2][d]"}],"prose":"services."}]}],"links":[{"href":"#cm-7.1_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing least functionality in the information system\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity configuration checklists\n\ndocumented reviews of functions, ports, protocols, and\/or services\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for reviewing functions, ports, protocols, and services on the information system\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for reviewing\/disabling nonsecure functions, ports, protocols, and\/or services\n\nautomated mechanisms implementing review and disabling of nonsecure functions, ports, protocols, and\/or services"}]}]},{"id":"cm-7.2","class":"SP800-53-enhancement","title":"Prevent Program Execution","params":[{"id":"cm-7.2_prm_1","select":{"how-many":"one-or-more","choice":[" {{ insert: param, cm-7.2_prm_2 }} ","rules authorizing the terms and conditions of software program usage"]}},{"id":"cm-7.2_prm_2","depends-on":"cm-7.2_prm_1","label":"organization-defined policies regarding software program usage and restrictions"}],"props":[{"name":"label","value":"CM-7(2)"},{"name":"sort-id","value":"cm-07.02"}],"parts":[{"id":"cm-7.2_smt","name":"statement","prose":"The information system prevents program execution in accordance with {{ insert: param, cm-7.2_prm_1 }}."},{"id":"cm-7.2_gdn","name":"guidance","links":[{"href":"#cm-8","rel":"related"},{"href":"#pm-5","rel":"related"}]},{"id":"cm-7.2_obj","name":"objective","prose":"Determine if:","parts":[{"id":"cm-7.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(2)[1]"}],"prose":"the organization defines policies regarding software program usage and restrictions;"},{"id":"cm-7.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(2)[2]"}],"prose":"the information system prevents program execution in accordance with one or more of the following:","parts":[{"id":"cm-7.2_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-7(2)[2][a]"}],"prose":"organization-defined policies regarding program usage and restrictions; and\/or"},{"id":"cm-7.2_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-7(2)[2][b]"}],"prose":"rules authorizing the terms and conditions of software program usage."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing least functionality in the information system\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\nspecifications for preventing software program execution\n\ninformation system configuration settings and associated documentation\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes preventing program execution on the information system\n\norganizational processes for software program usage and restrictions\n\nautomated mechanisms preventing program execution on the information system\n\nautomated mechanisms supporting and\/or implementing software program usage and restrictions"}]}]},{"id":"cm-7.4","class":"SP800-53-enhancement","title":"Unauthorized Software \/ Blacklisting","params":[{"id":"cm-7.4_prm_1","label":"organization-defined software programs not authorized to execute on the information system"},{"id":"cm-7.4_prm_2","label":"organization-defined frequency"}],"props":[{"name":"label","value":"CM-7(4)"},{"name":"sort-id","value":"cm-07.04"}],"parts":[{"id":"cm-7.4_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-7.4_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Identifies {{ insert: param, cm-7.4_prm_1 }};"},{"id":"cm-7.4_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Employs an allow-all, deny-by-exception policy to prohibit the execution of unauthorized software programs on the information system; and"},{"id":"cm-7.4_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Reviews and updates the list of unauthorized software programs {{ insert: param, cm-7.4_prm_2 }}."}]},{"id":"cm-7.4_gdn","name":"guidance","prose":"The process used to identify software programs that are not authorized to execute on organizational information systems is commonly referred to as blacklisting. Organizations can implement CM-7 (5) instead of this control enhancement if whitelisting (the stronger of the two policies) is the preferred approach for restricting software program execution.","links":[{"href":"#cm-6","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#pm-5","rel":"related"}]},{"id":"cm-7.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-7.4.a_obj","name":"objective","props":[{"name":"label","value":"CM-7(4)(a)"}],"prose":"Identifies\/defines software programs not authorized to execute on the information system;","links":[{"href":"#cm-7.4_smt.a","rel":"corresp"}]},{"id":"cm-7.4.b_obj","name":"objective","props":[{"name":"label","value":"CM-7(4)(b)"}],"prose":"employs an allow-all, deny-by-exception policy to prohibit the execution of unauthorized software programs on the information system;","links":[{"href":"#cm-7.4_smt.b","rel":"corresp"}]},{"id":"cm-7.4.c_obj","name":"objective","props":[{"name":"label","value":"CM-7(4)(c)"}],"parts":[{"id":"cm-7.4.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(4)(c)[1]"}],"prose":"defines the frequency to review and update the list of unauthorized software programs on the information system; and"},{"id":"cm-7.4.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(4)(c)[2]"}],"prose":"reviews and updates the list of unauthorized software programs with the organization-defined frequency."}],"links":[{"href":"#cm-7.4_smt.c","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing least functionality in the information system\n\nconfiguration management plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of software programs not authorized to execute on the information system\n\nsecurity configuration checklists\n\nreview and update records associated with list of unauthorized software programs\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for identifying software not authorized to execute on the information system\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for identifying, reviewing, and updating programs not authorized to execute on the information system\n\norganizational process for implementing blacklisting\n\nautomated mechanisms supporting and\/or implementing blacklisting"}]}]}]},{"id":"cm-8","class":"SP800-53","title":"Information System Component Inventory","params":[{"id":"cm-8_prm_1","label":"organization-defined information deemed necessary to achieve effective information system component accountability"},{"id":"cm-8_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-8"},{"name":"sort-id","value":"cm-08"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops and documents an inventory of information system components that:","parts":[{"id":"cm-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Accurately reflects the current information system;"},{"id":"cm-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Includes all components within the authorization boundary of the information system;"},{"id":"cm-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Is at the level of granularity deemed necessary for tracking and reporting; and"},{"id":"cm-8_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Includes {{ insert: param, cm-8_prm_1 }}; and"}]},{"id":"cm-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the information system component inventory {{ insert: param, cm-8_prm_2 }}."}]},{"id":"cm-8_gdn","name":"guidance","prose":"Organizations may choose to implement centralized information system component inventories that include components from all organizational information systems. In such situations, organizations ensure that the resulting inventories include system-specific information required for proper component accountability (e.g., information system association, information system owner). Information deemed necessary for effective accountability of information system components includes, for example, hardware inventory specifications, software license information, software version numbers, component owners, and for networked components or devices, machine names and network addresses. Inventory specifications include, for example, manufacturer, device type, model, serial number, and physical location.","links":[{"href":"#cm-2","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#pm-5","rel":"related"}]},{"id":"cm-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-8.a_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)"}],"parts":[{"id":"cm-8.a.1_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(1)"}],"prose":"develops and documents an inventory of information system components that accurately reflects the current information system;"},{"id":"cm-8.a.2_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(2)"}],"prose":"develops and documents an inventory of information system components that includes all components within the authorization boundary of the information system;"},{"id":"cm-8.a.3_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(3)"}],"prose":"develops and documents an inventory of information system components that is at the level of granularity deemed necessary for tracking and reporting;"},{"id":"cm-8.a.4_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(4)"}],"parts":[{"id":"cm-8.a.4_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(a)(4)[1]"}],"prose":"defines the information deemed necessary to achieve effective information system component accountability;"},{"id":"cm-8.a.4_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(a)(4)[2]"}],"prose":"develops and documents an inventory of information system components that includes organization-defined information deemed necessary to achieve effective information system component accountability;"}]}]},{"id":"cm-8.b_obj","name":"objective","props":[{"name":"label","value":"CM-8(b)"}],"parts":[{"id":"cm-8.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(b)[1]"}],"prose":"defines the frequency to review and update the information system component inventory; and"},{"id":"cm-8.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(b)[2]"}],"prose":"reviews and updates the information system component inventory with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system component inventory\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system inventory records\n\ninventory reviews and update records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for information system component inventory\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for developing and documenting an inventory of information system components\n\nautomated mechanisms supporting and\/or implementing the information system component inventory"}]}],"controls":[{"id":"cm-8.1","class":"SP800-53-enhancement","title":"Updates During Installations \/ Removals","props":[{"name":"label","value":"CM-8(1)"},{"name":"sort-id","value":"cm-08.01"}],"parts":[{"id":"cm-8.1_smt","name":"statement","prose":"The organization updates the inventory of information system components as an integral part of component installations, removals, and information system updates."},{"id":"cm-8.1_obj","name":"objective","prose":"Determine if the organization updates the inventory of information system components as an integral part of:","parts":[{"id":"cm-8.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(1)[1]"}],"prose":"component installations;"},{"id":"cm-8.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(1)[2]"}],"prose":"component removals; and"},{"id":"cm-8.1_obj.3","name":"objective","props":[{"name":"label","value":"CM-8(1)[3]"}],"prose":"information system updates."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system component inventory\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system inventory records\n\ninventory reviews and update records\n\ncomponent installation records\n\ncomponent removal records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for updating the information system component inventory\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for updating inventory of information system components\n\nautomated mechanisms implementing updating of the information system component inventory"}]}]},{"id":"cm-8.3","class":"SP800-53-enhancement","title":"Automated Unauthorized Component Detection","params":[{"id":"cm-8.3_prm_1","label":"organization-defined frequency"},{"id":"cm-8.3_prm_2","select":{"how-many":"one-or-more","choice":["disables network access by such components","isolates the components","notifies {{ insert: param, cm-8.3_prm_3 }} "]}},{"id":"cm-8.3_prm_3","depends-on":"cm-8.3_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"CM-8(3)"},{"name":"sort-id","value":"cm-08.03"}],"parts":[{"id":"cm-8.3_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-8.3_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Employs automated mechanisms {{ insert: param, cm-8.3_prm_1 }} to detect the presence of unauthorized hardware, software, and firmware components within the information system; and"},{"id":"cm-8.3_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Takes the following actions when unauthorized components are detected: {{ insert: param, cm-8.3_prm_2 }}."}]},{"id":"cm-8.3_gdn","name":"guidance","prose":"This control enhancement is applied in addition to the monitoring for unauthorized remote connections and mobile devices. Monitoring for unauthorized system components may be accomplished on an ongoing basis or by the periodic scanning of systems for that purpose. Automated mechanisms can be implemented within information systems or in other separate devices. Isolation can be achieved, for example, by placing unauthorized information system components in separate domains or subnets or otherwise quarantining such components. This type of component isolation is commonly referred to as sandboxing.","links":[{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"},{"href":"#ra-5","rel":"related"}]},{"id":"cm-8.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-8.3.a_obj","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)"}],"parts":[{"id":"cm-8.3.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[1]"}],"prose":"defines the frequency to employ automated mechanisms to detect the presence of unauthorized:","parts":[{"id":"cm-8.3.a_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[1][a]"}],"prose":"hardware components within the information system;"},{"id":"cm-8.3.a_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[1][b]"}],"prose":"software components within the information system;"},{"id":"cm-8.3.a_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[1][c]"}],"prose":"firmware components within the information system;"}]},{"id":"cm-8.3.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[2]"}],"prose":"employs automated mechanisms with the organization-defined frequency to detect the presence of unauthorized:","parts":[{"id":"cm-8.3.a_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[2][a]"}],"prose":"hardware components within the information system;"},{"id":"cm-8.3.a_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[2][b]"}],"prose":"software components within the information system;"},{"id":"cm-8.3.a_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[2][c]"}],"prose":"firmware components within the information system;"}]}],"links":[{"href":"#cm-8.3_smt.a","rel":"corresp"}]},{"id":"cm-8.3.b_obj","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)"}],"parts":[{"id":"cm-8.3.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)[1]"}],"prose":"defines personnel or roles to be notified when unauthorized components are detected;"},{"id":"cm-8.3.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)[2]"}],"prose":"takes one or more of the following actions when unauthorized components are detected:","parts":[{"id":"cm-8.3.b_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)[2][a]"}],"prose":"disables network access by such components;"},{"id":"cm-8.3.b_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)[2][b]"}],"prose":"isolates the components; and\/or"},{"id":"cm-8.3.b_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)[2][c]"}],"prose":"notifies organization-defined personnel or roles."}]}],"links":[{"href":"#cm-8.3_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system component inventory\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system inventory records\n\nalerts\/notifications of unauthorized components within the information system\n\ninformation system monitoring records\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing the automated mechanisms implementing unauthorized information system component detection\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for detection of unauthorized information system components\n\nautomated mechanisms implementing the detection of unauthorized information system components"}]}]},{"id":"cm-8.5","class":"SP800-53-enhancement","title":"No Duplicate Accounting of Components","props":[{"name":"label","value":"CM-8(5)"},{"name":"sort-id","value":"cm-08.05"}],"parts":[{"id":"cm-8.5_smt","name":"statement","prose":"The organization verifies that all components within the authorization boundary of the information system are not duplicated in other information system component inventories."},{"id":"cm-8.5_gdn","name":"guidance","prose":"This control enhancement addresses the potential problem of duplicate accounting of information system components in large or complex interconnected systems."},{"id":"cm-8.5_obj","name":"objective","prose":"Determine if the organization verifies that all components within the authorization boundary of the information system are not duplicated in other information system inventories."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system component inventory\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system inventory records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system inventory responsibilities\n\norganizational personnel with responsibilities for defining information system components within the authorization boundary of the system\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for maintaining the inventory of information system components\n\nautomated mechanisms implementing the information system component inventory"}]}]}]},{"id":"cm-9","class":"SP800-53","title":"Configuration Management Plan","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-9"},{"name":"sort-id","value":"cm-09"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-9_smt","name":"statement","prose":"The organization develops, documents, and implements a configuration management plan for the information system that:","parts":[{"id":"cm-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Addresses roles, responsibilities, and configuration management processes and procedures;"},{"id":"cm-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishes a process for identifying configuration items throughout the system development life cycle and for managing the configuration of the configuration items;"},{"id":"cm-9_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Defines the configuration items for the information system and places the configuration items under configuration management; and"},{"id":"cm-9_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects the configuration management plan from unauthorized disclosure and modification."}]},{"id":"cm-9_gdn","name":"guidance","prose":"Configuration management plans satisfy the requirements in configuration management policies while being tailored to individual information systems. Such plans define detailed processes and procedures for how configuration management is used to support system development life cycle activities at the information system level. Configuration management plans are typically developed during the development\/acquisition phase of the system development life cycle. The plans describe how to move changes through change management processes, how to update configuration settings and baselines, how to maintain information system component inventories, how to control development, test, and operational environments, and how to develop, release, and update key documents. Organizations can employ templates to help ensure consistent and timely development and implementation of configuration management plans. Such templates can represent a master configuration management plan for the organization at large with subsets of the plan implemented on a system by system basis. Configuration management approval processes include designation of key management stakeholders responsible for reviewing and approving proposed changes to information systems, and personnel that conduct security impact analyses prior to the implementation of changes to the systems. Configuration items are the information system items (hardware, software, firmware, and documentation) to be configuration-managed. As information systems continue through the system development life cycle, new configuration items may be identified and some existing configuration items may no longer need to be under configuration control.","links":[{"href":"#cm-2","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#sa-10","rel":"related"}]},{"id":"cm-9_obj","name":"objective","prose":"Determine if the organization develops, documents, and implements a configuration management plan for the information system that:","parts":[{"id":"cm-9.a_obj","name":"objective","props":[{"name":"label","value":"CM-9(a)"}],"parts":[{"id":"cm-9.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-9(a)[1]"}],"prose":"addresses roles;"},{"id":"cm-9.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-9(a)[2]"}],"prose":"addresses responsibilities;"},{"id":"cm-9.a_obj.3","name":"objective","props":[{"name":"label","value":"CM-9(a)[3]"}],"prose":"addresses configuration management processes and procedures;"}]},{"id":"cm-9.b_obj","name":"objective","props":[{"name":"label","value":"CM-9(b)"}],"prose":"establishes a process for:","parts":[{"id":"cm-9.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-9(b)[1]"}],"prose":"identifying configuration items throughout the SDLC;"},{"id":"cm-9.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-9(b)[2]"}],"prose":"managing the configuration of the configuration items;"}]},{"id":"cm-9.c_obj","name":"objective","props":[{"name":"label","value":"CM-9(c)"}],"parts":[{"id":"cm-9.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-9(c)[1]"}],"prose":"defines the configuration items for the information system;"},{"id":"cm-9.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-9(c)[2]"}],"prose":"places the configuration items under configuration management;"}]},{"id":"cm-9.d_obj","name":"objective","props":[{"name":"label","value":"CM-9(d)"}],"prose":"protects the configuration management plan from unauthorized:","parts":[{"id":"cm-9.d_obj.1","name":"objective","props":[{"name":"label","value":"CM-9(d)[1]"}],"prose":"disclosure; and"},{"id":"cm-9.d_obj.2","name":"objective","props":[{"name":"label","value":"CM-9(d)[2]"}],"prose":"modification."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing configuration management planning\n\nconfiguration management plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for developing the configuration management plan\n\norganizational personnel with responsibilities for implementing and managing processes defined in the configuration management plan\n\norganizational personnel with responsibilities for protecting the configuration management plan\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for developing and documenting the configuration management plan\n\norganizational processes for identifying and managing configuration items\n\norganizational processes for protecting the configuration management plan\n\nautomated mechanisms implementing the configuration management plan\n\nautomated mechanisms for managing configuration items\n\nautomated mechanisms for protecting the configuration management plan"}]}]},{"id":"cm-10","class":"SP800-53","title":"Software Usage Restrictions","props":[{"name":"priority","value":"P2"},{"name":"label","value":"CM-10"},{"name":"sort-id","value":"cm-10"}],"parts":[{"id":"cm-10_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-10_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Uses software and associated documentation in accordance with contract agreements and copyright laws;"},{"id":"cm-10_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Tracks the use of software and associated documentation protected by quantity licenses to control copying and distribution; and"},{"id":"cm-10_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Controls and documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work."}]},{"id":"cm-10_gdn","name":"guidance","prose":"Software license tracking can be accomplished by manual methods (e.g., simple spreadsheets) or automated methods (e.g., specialized tracking applications) depending on organizational needs.","links":[{"href":"#ac-17","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"cm-10_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-10.a_obj","name":"objective","props":[{"name":"label","value":"CM-10(a)"}],"prose":"uses software and associated documentation in accordance with contract agreements and copyright laws;"},{"id":"cm-10.b_obj","name":"objective","props":[{"name":"label","value":"CM-10(b)"}],"prose":"tracks the use of software and associated documentation protected by quantity licenses to control copying and distribution; and"},{"id":"cm-10.c_obj","name":"objective","props":[{"name":"label","value":"CM-10(c)"}],"prose":"controls and documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing software usage restrictions\n\nconfiguration management plan\n\nsecurity plan\n\nsoftware contract agreements and copyright laws\n\nsite license documentation\n\nlist of software usage restrictions\n\nsoftware license tracking reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\norganizational personnel operating, using, and\/or maintaining the information system\n\norganizational personnel with software license management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for tracking the use of software protected by quantity licenses\n\norganization process for controlling\/documenting the use of peer-to-peer file sharing technology\n\nautomated mechanisms implementing software license tracking\n\nautomated mechanisms implementing and controlling the use of peer-to-peer files sharing technology"}]}]},{"id":"cm-11","class":"SP800-53","title":"User-installed Software","params":[{"id":"cm-11_prm_1","label":"organization-defined policies"},{"id":"cm-11_prm_2","label":"organization-defined methods"},{"id":"cm-11_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-11"},{"name":"sort-id","value":"cm-11"}],"parts":[{"id":"cm-11_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-11_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes {{ insert: param, cm-11_prm_1 }} governing the installation of software by users;"},{"id":"cm-11_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Enforces software installation policies through {{ insert: param, cm-11_prm_2 }}; and"},{"id":"cm-11_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Monitors policy compliance at {{ insert: param, cm-11_prm_3 }}."}]},{"id":"cm-11_gdn","name":"guidance","prose":"If provided the necessary privileges, users have the ability to install software in organizational information systems. To maintain control over the types of software installed, organizations identify permitted and prohibited actions regarding software installation. Permitted software installations may include, for example, updates and security patches to existing software and downloading applications from organization-approved “app stores” Prohibited software installations may include, for example, software with unknown or suspect pedigrees or software that organizations consider potentially malicious. The policies organizations select governing user-installed software may be organization-developed or provided by some external entity. Policy enforcement methods include procedural methods (e.g., periodic examination of user accounts), automated methods (e.g., configuration settings implemented on organizational information systems), or both.","links":[{"href":"#ac-3","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#pl-4","rel":"related"}]},{"id":"cm-11_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-11.a_obj","name":"objective","props":[{"name":"label","value":"CM-11(a)"}],"parts":[{"id":"cm-11.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-11(a)[1]"}],"prose":"defines policies to govern the installation of software by users;"},{"id":"cm-11.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-11(a)[2]"}],"prose":"establishes organization-defined policies governing the installation of software by users;"}]},{"id":"cm-11.b_obj","name":"objective","props":[{"name":"label","value":"CM-11(b)"}],"parts":[{"id":"cm-11.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-11(b)[1]"}],"prose":"defines methods to enforce software installation policies;"},{"id":"cm-11.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-11(b)[2]"}],"prose":"enforces software installation policies through organization-defined methods;"}]},{"id":"cm-11.c_obj","name":"objective","props":[{"name":"label","value":"CM-11(c)"}],"parts":[{"id":"cm-11.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-11(c)[1]"}],"prose":"defines frequency to monitor policy compliance; and"},{"id":"cm-11.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-11(c)[2]"}],"prose":"monitors policy compliance at organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing user installed software\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of rules governing user installed software\n\ninformation system monitoring records\n\ninformation system audit records\n\nother relevant documents or records\n\ncontinuous monitoring strategy"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for governing user-installed software\n\norganizational personnel operating, using, and\/or maintaining the information system\n\norganizational personnel monitoring compliance with user-installed software policy\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes governing user-installed software on the information system\n\nautomated mechanisms enforcing rules\/methods for governing the installation of software by users\n\nautomated mechanisms monitoring policy compliance"}]}]}]},{"id":"cp","class":"family","title":"Contingency Planning","controls":[{"id":"cp-1","class":"SP800-53","title":"Contingency Planning Policy and Procedures","params":[{"id":"cp-1_prm_1","label":"organization-defined personnel or roles"},{"id":"cp-1_prm_2","label":"organization-defined frequency"},{"id":"cp-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-1"},{"name":"sort-id","value":"cp-01"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"cp-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, cp-1_prm_1 }}:","parts":[{"id":"cp-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A contingency planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"cp-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls; and"}]},{"id":"cp-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"cp-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Contingency planning policy {{ insert: param, cp-1_prm_2 }}; and"},{"id":"cp-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Contingency planning procedures {{ insert: param, cp-1_prm_3 }}."}]}]},{"id":"cp-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the CP family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"cp-1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"cp-1.a_obj","name":"objective","props":[{"name":"label","value":"CP-1(a)"}],"parts":[{"id":"cp-1.a.1_obj","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)"}],"parts":[{"id":"cp-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1]"}],"prose":"the organization develops and documents a contingency planning policy that addresses:","parts":[{"id":"cp-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"cp-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"cp-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"cp-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"cp-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"cp-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"cp-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"cp-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[2]"}],"prose":"the organization defines personnel or roles to whom the contingency planning policy is to be disseminated;"},{"id":"cp-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[3]"}],"prose":"the organization disseminates the contingency planning policy to organization-defined personnel or roles;"}]},{"id":"cp-1.a.2_obj","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)"}],"parts":[{"id":"cp-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)[1]"}],"prose":"the organization develops and documents procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls;"},{"id":"cp-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)[2]"}],"prose":"the organization defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"cp-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)[3]"}],"prose":"the organization disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"cp-1.b_obj","name":"objective","props":[{"name":"label","value":"CP-1(b)"}],"parts":[{"id":"cp-1.b.1_obj","name":"objective","props":[{"name":"label","value":"CP-1(b)(1)"}],"parts":[{"id":"cp-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(b)(1)[1]"}],"prose":"the organization defines the frequency to review and update the current contingency planning policy;"},{"id":"cp-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(b)(1)[2]"}],"prose":"the organization reviews and updates the current contingency planning with the organization-defined frequency;"}]},{"id":"cp-1.b.2_obj","name":"objective","props":[{"name":"label","value":"CP-1(b)(2)"}],"parts":[{"id":"cp-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(b)(2)[1]"}],"prose":"the organization defines the frequency to review and update the current contingency planning procedures; and"},{"id":"cp-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(b)(2)[2]"}],"prose":"the organization reviews and updates the current contingency planning procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-2","class":"SP800-53","title":"Contingency Plan","params":[{"id":"cp-2_prm_1","label":"organization-defined personnel or roles"},{"id":"cp-2_prm_2","label":"organization-defined key contingency personnel (identified by name and\/or by role) and organizational elements"},{"id":"cp-2_prm_3","label":"organization-defined frequency"},{"id":"cp-2_prm_4","label":"organization-defined key contingency personnel (identified by name and\/or by role) and organizational elements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-2"},{"name":"sort-id","value":"cp-02"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a contingency plan for the information system that:","parts":[{"id":"cp-2_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Identifies essential missions and business functions and associated contingency requirements;"},{"id":"cp-2_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Provides recovery objectives, restoration priorities, and metrics;"},{"id":"cp-2_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Addresses contingency roles, responsibilities, assigned individuals with contact information;"},{"id":"cp-2_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Addresses maintaining essential missions and business functions despite an information system disruption, compromise, or failure;"},{"id":"cp-2_smt.a.5","name":"item","props":[{"name":"label","value":"5."}],"prose":"Addresses eventual, full information system restoration without deterioration of the security safeguards originally planned and implemented; and"},{"id":"cp-2_smt.a.6","name":"item","props":[{"name":"label","value":"6."}],"prose":"Is reviewed and approved by {{ insert: param, cp-2_prm_1 }};"}]},{"id":"cp-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Distributes copies of the contingency plan to {{ insert: param, cp-2_prm_2 }};"},{"id":"cp-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Coordinates contingency planning activities with incident handling activities;"},{"id":"cp-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Reviews the contingency plan for the information system {{ insert: param, cp-2_prm_3 }};"},{"id":"cp-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Updates the contingency plan to address changes to the organization, information system, or environment of operation and problems encountered during contingency plan implementation, execution, or testing;"},{"id":"cp-2_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Communicates contingency plan changes to {{ insert: param, cp-2_prm_4 }}; and"},{"id":"cp-2_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Protects the contingency plan from unauthorized disclosure and modification."}]},{"id":"cp-2_gdn","name":"guidance","prose":"Contingency planning for information systems is part of an overall organizational program for achieving continuity of operations for mission\/business functions. Contingency planning addresses both information system restoration and implementation of alternative mission\/business processes when systems are compromised. The effectiveness of contingency planning is maximized by considering such planning throughout the phases of the system development life cycle. Performing contingency planning on hardware, software, and firmware development can be an effective means of achieving information system resiliency. Contingency plans reflect the degree of restoration required for organizational information systems since not all systems may need to fully recover to achieve the level of continuity of operations desired. Information system recovery objectives reflect applicable laws, Executive Orders, directives, policies, standards, regulations, and guidelines. In addition to information system availability, contingency plans also address other security-related events resulting in a reduction in mission and\/or business effectiveness, such as malicious attacks compromising the confidentiality or integrity of information systems. Actions addressed in contingency plans include, for example, orderly\/graceful degradation, information system shutdown, fallback to a manual mode, alternate information flows, and operating in modes reserved for when systems are under attack. By closely coordinating contingency planning with incident handling activities, organizations can ensure that the necessary contingency planning activities are in place and activated in the event of a security incident.","links":[{"href":"#ac-14","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#cp-7","rel":"related"},{"href":"#cp-8","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#cp-10","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#pm-8","rel":"related"},{"href":"#pm-11","rel":"related"}]},{"id":"cp-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-2.a_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)"}],"prose":"develops and documents a contingency plan for the information system that:","parts":[{"id":"cp-2.a.1_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(1)"}],"prose":"identifies essential missions and business functions and associated contingency requirements;"},{"id":"cp-2.a.2_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)"}],"parts":[{"id":"cp-2.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)[1]"}],"prose":"provides recovery objectives;"},{"id":"cp-2.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)[2]"}],"prose":"provides restoration priorities;"},{"id":"cp-2.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)[3]"}],"prose":"provides metrics;"}]},{"id":"cp-2.a.3_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)"}],"parts":[{"id":"cp-2.a.3_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)[1]"}],"prose":"addresses contingency roles;"},{"id":"cp-2.a.3_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)[2]"}],"prose":"addresses contingency responsibilities;"},{"id":"cp-2.a.3_obj.3","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)[3]"}],"prose":"addresses assigned individuals with contact information;"}]},{"id":"cp-2.a.4_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(4)"}],"prose":"addresses maintaining essential missions and business functions despite an information system disruption, compromise, or failure;"},{"id":"cp-2.a.5_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(5)"}],"prose":"addresses eventual, full information system restoration without deterioration of the security safeguards originally planned and implemented;"},{"id":"cp-2.a.6_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(6)"}],"parts":[{"id":"cp-2.a.6_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(a)(6)[1]"}],"prose":"defines personnel or roles to review and approve the contingency plan for the information system;"},{"id":"cp-2.a.6_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(a)(6)[2]"}],"prose":"is reviewed and approved by organization-defined personnel or roles;"}]}]},{"id":"cp-2.b_obj","name":"objective","props":[{"name":"label","value":"CP-2(b)"}],"parts":[{"id":"cp-2.b_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(b)[1]"}],"prose":"defines key contingency personnel (identified by name and\/or by role) and organizational elements to whom copies of the contingency plan are to be distributed;"},{"id":"cp-2.b_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(b)[2]"}],"prose":"distributes copies of the contingency plan to organization-defined key contingency personnel and organizational elements;"}]},{"id":"cp-2.c_obj","name":"objective","props":[{"name":"label","value":"CP-2(c)"}],"prose":"coordinates contingency planning activities with incident handling activities;"},{"id":"cp-2.d_obj","name":"objective","props":[{"name":"label","value":"CP-2(d)"}],"parts":[{"id":"cp-2.d_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(d)[1]"}],"prose":"defines a frequency to review the contingency plan for the information system;"},{"id":"cp-2.d_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(d)[2]"}],"prose":"reviews the contingency plan with the organization-defined frequency;"}]},{"id":"cp-2.e_obj","name":"objective","props":[{"name":"label","value":"CP-2(e)"}],"prose":"updates the contingency plan to address:","parts":[{"id":"cp-2.e_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(e)[1]"}],"prose":"changes to the organization, information system, or environment of operation;"},{"id":"cp-2.e_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(e)[2]"}],"prose":"problems encountered during plan implementation, execution, and testing;"}]},{"id":"cp-2.f_obj","name":"objective","props":[{"name":"label","value":"CP-2(f)"}],"parts":[{"id":"cp-2.f_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(f)[1]"}],"prose":"defines key contingency personnel (identified by name and\/or by role) and organizational elements to whom contingency plan changes are to be communicated;"},{"id":"cp-2.f_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(f)[2]"}],"prose":"communicates contingency plan changes to organization-defined key contingency personnel and organizational elements; and"}]},{"id":"cp-2.g_obj","name":"objective","props":[{"name":"label","value":"CP-2(g)"}],"prose":"protects the contingency plan from unauthorized disclosure and modification."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nsecurity plan\n\nevidence of contingency plan reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with incident handling responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency plan development, review, update, and protection\n\nautomated mechanisms for developing, reviewing, updating and\/or protecting the contingency plan"}]}],"controls":[{"id":"cp-2.1","class":"SP800-53-enhancement","title":"Coordinate with Related Plans","props":[{"name":"label","value":"CP-2(1)"},{"name":"sort-id","value":"cp-02.01"}],"parts":[{"id":"cp-2.1_smt","name":"statement","prose":"The organization coordinates contingency plan development with organizational elements responsible for related plans."},{"id":"cp-2.1_gdn","name":"guidance","prose":"Plans related to contingency plans for organizational information systems include, for example, Business Continuity Plans, Disaster Recovery Plans, Continuity of Operations Plans, Crisis Communications Plans, Critical Infrastructure Plans, Cyber Incident Response Plans, Insider Threat Implementation Plan, and Occupant Emergency Plans."},{"id":"cp-2.1_obj","name":"objective","prose":"Determine if the organization coordinates contingency plan development with organizational elements responsible for related plans."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nbusiness contingency plans\n\ndisaster recovery plans\n\ncontinuity of operations plans\n\ncrisis communications plans\n\ncritical infrastructure plans\n\ncyber incident response plan\n\ninsider threat implementation plans\n\noccupant emergency plans\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities\n\npersonnel with responsibility for related plans"}]}]},{"id":"cp-2.3","class":"SP800-53-enhancement","title":"Resume Essential Missions \/ Business Functions","params":[{"id":"cp-2.3_prm_1","label":"organization-defined time period"}],"props":[{"name":"label","value":"CP-2(3)"},{"name":"sort-id","value":"cp-02.03"}],"parts":[{"id":"cp-2.3_smt","name":"statement","prose":"The organization plans for the resumption of essential missions and business functions within {{ insert: param, cp-2.3_prm_1 }} of contingency plan activation."},{"id":"cp-2.3_gdn","name":"guidance","prose":"Organizations may choose to carry out the contingency planning activities in this control enhancement as part of organizational business continuity planning including, for example, as part of business impact analyses. The time period for resumption of essential missions\/business functions may be dependent on the severity\/extent of disruptions to the information system and its supporting infrastructure.","links":[{"href":"#pe-12","rel":"related"}]},{"id":"cp-2.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-2.3_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(3)[1]"}],"prose":"defines the time period to plan for the resumption of essential missions and business functions as a result of contingency plan activation; and"},{"id":"cp-2.3_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(3)[2]"}],"prose":"plans for the resumption of essential missions and business functions within organization-defined time period of contingency plan activation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nsecurity plan\n\nbusiness impact assessment\n\nother related plans\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for resumption of missions and business functions"}]}]},{"id":"cp-2.8","class":"SP800-53-enhancement","title":"Identify Critical Assets","props":[{"name":"label","value":"CP-2(8)"},{"name":"sort-id","value":"cp-02.08"}],"parts":[{"id":"cp-2.8_smt","name":"statement","prose":"The organization identifies critical information system assets supporting essential missions and business functions."},{"id":"cp-2.8_gdn","name":"guidance","prose":"Organizations may choose to carry out the contingency planning activities in this control enhancement as part of organizational business continuity planning including, for example, as part of business impact analyses. Organizations identify critical information system assets so that additional safeguards and countermeasures can be employed (above and beyond those safeguards and countermeasures routinely implemented) to help ensure that organizational missions\/business functions can continue to be conducted during contingency operations. In addition, the identification of critical information assets facilitates the prioritization of organizational resources. Critical information system assets include technical and operational aspects. Technical aspects include, for example, information technology services, information system components, information technology products, and mechanisms. Operational aspects include, for example, procedures (manually executed operations) and personnel (individuals operating technical safeguards and\/or executing manual procedures). Organizational program protection plans can provide assistance in identifying critical assets.","links":[{"href":"#sa-14","rel":"related"},{"href":"#sa-15","rel":"related"}]},{"id":"cp-2.8_obj","name":"objective","prose":"Determine if the organization identifies critical information system assets supporting essential missions and business functions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nbusiness impact assessment\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"cp-3","class":"SP800-53","title":"Contingency Training","params":[{"id":"cp-3_prm_1","label":"organization-defined time period"},{"id":"cp-3_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CP-3"},{"name":"sort-id","value":"cp-03"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"cp-3_smt","name":"statement","prose":"The organization provides contingency training to information system users consistent with assigned roles and responsibilities:","parts":[{"id":"cp-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Within {{ insert: param, cp-3_prm_1 }} of assuming a contingency role or responsibility;"},{"id":"cp-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"cp-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, cp-3_prm_2 }} thereafter."}]},{"id":"cp-3_gdn","name":"guidance","prose":"Contingency training provided by organizations is linked to the assigned roles and responsibilities of organizational personnel to ensure that the appropriate content and level of detail is included in such training. For example, regular users may only need to know when and where to report for duty during contingency operations and if normal duties are affected; system administrators may require additional training on how to set up information systems at alternate processing and storage sites; and managers\/senior leaders may receive more specific training on how to conduct mission-essential functions in designated off-site locations and how to establish communications with other governmental entities for purposes of coordination on contingency-related activities. Training for contingency roles\/responsibilities reflects the specific continuity requirements in the contingency plan.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#ir-2","rel":"related"}]},{"id":"cp-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-3.a_obj","name":"objective","props":[{"name":"label","value":"CP-3(a)"}],"parts":[{"id":"cp-3.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-3(a)[1]"}],"prose":"defines a time period within which contingency training is to be provided to information system users assuming a contingency role or responsibility;"},{"id":"cp-3.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-3(a)[2]"}],"prose":"provides contingency training to information system users consistent with assigned roles and responsibilities within the organization-defined time period of assuming a contingency role or responsibility;"}]},{"id":"cp-3.b_obj","name":"objective","props":[{"name":"label","value":"CP-3(b)"}],"prose":"provides contingency training to information system users consistent with assigned roles and responsibilities when required by information system changes;"},{"id":"cp-3.c_obj","name":"objective","props":[{"name":"label","value":"CP-3(c)"}],"parts":[{"id":"cp-3.c_obj.1","name":"objective","props":[{"name":"label","value":"CP-3(c)[1]"}],"prose":"defines the frequency for contingency training thereafter; and"},{"id":"cp-3.c_obj.2","name":"objective","props":[{"name":"label","value":"CP-3(c)[2]"}],"prose":"provides contingency training to information system users consistent with assigned roles and responsibilities with the organization-defined frequency thereafter."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency training\n\ncontingency plan\n\ncontingency training curriculum\n\ncontingency training material\n\nsecurity plan\n\ncontingency training records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning, plan implementation, and training responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency training"}]}]},{"id":"cp-4","class":"SP800-53","title":"Contingency Plan Testing","params":[{"id":"cp-4_prm_1","label":"organization-defined frequency"},{"id":"cp-4_prm_2","label":"organization-defined tests"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CP-4"},{"name":"sort-id","value":"cp-04"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"},{"href":"#0243a05a-e8a3-4d51-9364-4a9d20b0dcdf","rel":"reference"}],"parts":[{"id":"cp-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Tests the contingency plan for the information system {{ insert: param, cp-4_prm_1 }} using {{ insert: param, cp-4_prm_2 }} to determine the effectiveness of the plan and the organizational readiness to execute the plan;"},{"id":"cp-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews the contingency plan test results; and"},{"id":"cp-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Initiates corrective actions, if needed."}]},{"id":"cp-4_gdn","name":"guidance","prose":"Methods for testing contingency plans to determine the effectiveness of the plans and to identify potential weaknesses in the plans include, for example, walk-through and tabletop exercises, checklists, simulations (parallel, full interrupt), and comprehensive exercises. Organizations conduct testing based on the continuity requirements in contingency plans and include a determination of the effects on organizational operations, assets, and individuals arising due to contingency operations. Organizations have flexibility and discretion in the breadth, depth, and timelines of corrective actions.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-3","rel":"related"},{"href":"#ir-3","rel":"related"}]},{"id":"cp-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-4.a_obj","name":"objective","props":[{"name":"label","value":"CP-4(a)"}],"parts":[{"id":"cp-4.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-4(a)[1]"}],"prose":"defines tests to determine the effectiveness of the contingency plan and the organizational readiness to execute the plan;"},{"id":"cp-4.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-4(a)[2]"}],"prose":"defines a frequency to test the contingency plan for the information system;"},{"id":"cp-4.a_obj.3","name":"objective","props":[{"name":"label","value":"CP-4(a)[3]"}],"prose":"tests the contingency plan for the information system with the organization-defined frequency, using organization-defined tests to determine the effectiveness of the plan and the organizational readiness to execute the plan;"}]},{"id":"cp-4.b_obj","name":"objective","props":[{"name":"label","value":"CP-4(b)"}],"prose":"reviews the contingency plan test results; and"},{"id":"cp-4.c_obj","name":"objective","props":[{"name":"label","value":"CP-4(c)"}],"prose":"initiates corrective actions, if needed."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency plan testing\n\ncontingency plan\n\nsecurity plan\n\ncontingency plan test documentation\n\ncontingency plan test results\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for contingency plan testing, reviewing or responding to contingency plan tests\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency plan testing\n\nautomated mechanisms supporting the contingency plan and\/or contingency plan testing"}]}],"controls":[{"id":"cp-4.1","class":"SP800-53-enhancement","title":"Coordinate with Related Plans","props":[{"name":"label","value":"CP-4(1)"},{"name":"sort-id","value":"cp-04.01"}],"parts":[{"id":"cp-4.1_smt","name":"statement","prose":"The organization coordinates contingency plan testing with organizational elements responsible for related plans."},{"id":"cp-4.1_gdn","name":"guidance","prose":"Plans related to contingency plans for organizational information systems include, for example, Business Continuity Plans, Disaster Recovery Plans, Continuity of Operations Plans, Crisis Communications Plans, Critical Infrastructure Plans, Cyber Incident Response Plans, and Occupant Emergency Plans. This control enhancement does not require organizations to create organizational elements to handle related plans or to align such elements with specific plans. It does require, however, that if such organizational elements are responsible for related plans, organizations should coordinate with those elements.","links":[{"href":"#ir-8","rel":"related"},{"href":"#pm-8","rel":"related"}]},{"id":"cp-4.1_obj","name":"objective","prose":"Determine if the organization coordinates contingency plan testing with organizational elements responsible for related plans."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nincident response policy\n\nprocedures addressing contingency plan testing\n\ncontingency plan testing documentation\n\ncontingency plan\n\nbusiness continuity plans\n\ndisaster recovery plans\n\ncontinuity of operations plans\n\ncrisis communications plans\n\ncritical infrastructure plans\n\ncyber incident response plans\n\noccupant emergency plans\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan testing responsibilities\n\norganizational personnel\n\npersonnel with responsibilities for related plans\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"cp-6","class":"SP800-53","title":"Alternate Storage Site","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-6"},{"name":"sort-id","value":"cp-06"}],"links":[{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes an alternate storage site including necessary agreements to permit the storage and retrieval of information system backup information; and"},{"id":"cp-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Ensures that the alternate storage site provides information security safeguards equivalent to that of the primary site."}]},{"id":"cp-6_gdn","name":"guidance","prose":"Alternate storage sites are sites that are geographically distinct from primary storage sites. An alternate storage site maintains duplicate copies of information and data in the event that the primary storage site is not available. Items covered by alternate storage site agreements include, for example, environmental conditions at alternate sites, access rules, physical and environmental protection requirements, and coordination of delivery\/retrieval of backup media. Alternate storage sites reflect the requirements in contingency plans so that organizations can maintain essential missions\/business functions despite disruption, compromise, or failure in organizational information systems.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-7","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#cp-10","rel":"related"},{"href":"#mp-4","rel":"related"}]},{"id":"cp-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-6_obj.1","name":"objective","props":[{"name":"label","value":"CP-6[1]"}],"prose":"establishes an alternate storage site including necessary agreements to permit the storage and retrieval of information system backup information; and"},{"id":"cp-6_obj.2","name":"objective","props":[{"name":"label","value":"CP-6[2]"}],"prose":"ensures that the alternate storage site provides information security safeguards equivalent to that of the primary site."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate storage sites\n\ncontingency plan\n\nalternate storage site agreements\n\nprimary storage site agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate storage site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for storing and retrieving information system backup information at the alternate storage site\n\nautomated mechanisms supporting and\/or implementing storage and retrieval of information system backup information at the alternate storage site"}]}],"controls":[{"id":"cp-6.1","class":"SP800-53-enhancement","title":"Separation from Primary Site","props":[{"name":"label","value":"CP-6(1)"},{"name":"sort-id","value":"cp-06.01"}],"parts":[{"id":"cp-6.1_smt","name":"statement","prose":"The organization identifies an alternate storage site that is separated from the primary storage site to reduce susceptibility to the same threats."},{"id":"cp-6.1_gdn","name":"guidance","prose":"Threats that affect alternate storage sites are typically defined in organizational assessments of risk and include, for example, natural disasters, structural failures, hostile cyber attacks, and errors of omission\/commission. Organizations determine what is considered a sufficient degree of separation between primary and alternate storage sites based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber attack), the degree of separation between sites is less relevant.","links":[{"href":"#ra-3","rel":"related"}]},{"id":"cp-6.1_obj","name":"objective","prose":"Determine if the organization identifies an alternate storage site that is separated from the primary storage site to reduce susceptibility to the same threats."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate storage sites\n\ncontingency plan\n\nalternate storage site\n\nalternate storage site agreements\n\nprimary storage site agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate storage site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-6.3","class":"SP800-53-enhancement","title":"Accessibility","props":[{"name":"label","value":"CP-6(3)"},{"name":"sort-id","value":"cp-06.03"}],"parts":[{"id":"cp-6.3_smt","name":"statement","prose":"The organization identifies potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions."},{"id":"cp-6.3_gdn","name":"guidance","prose":"Area-wide disruptions refer to those types of disruptions that are broad in geographic scope (e.g., hurricane, regional power outage) with such determinations made by organizations based on organizational assessments of risk. Explicit mitigation actions include, for example: (i) duplicating backup information at other alternate storage sites if access problems occur at originally designated alternate sites; or (ii) planning for physical access to retrieve backup information if electronic accessibility to the alternate site is disrupted.","links":[{"href":"#ra-3","rel":"related"}]},{"id":"cp-6.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-6.3_obj.1","name":"objective","props":[{"name":"label","value":"CP-6(3)[1]"}],"prose":"identifies potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster; and"},{"id":"cp-6.3_obj.2","name":"objective","props":[{"name":"label","value":"CP-6(3)[2]"}],"prose":"outlines explicit mitigation actions for such potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate storage sites\n\ncontingency plan\n\nalternate storage site\n\nlist of potential accessibility problems to alternate storage site\n\nmitigation actions for accessibility problems to alternate storage site\n\norganizational risk assessments\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate storage site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"cp-7","class":"SP800-53","title":"Alternate Processing Site","params":[{"id":"cp-7_prm_1","label":"organization-defined information system operations"},{"id":"cp-7_prm_2","label":"organization-defined time period consistent with recovery time and recovery point objectives"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-7"},{"name":"sort-id","value":"cp-07"}],"links":[{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-7_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes an alternate processing site including necessary agreements to permit the transfer and resumption of {{ insert: param, cp-7_prm_1 }} for essential missions\/business functions within {{ insert: param, cp-7_prm_2 }} when the primary processing capabilities are unavailable;"},{"id":"cp-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Ensures that equipment and supplies required to transfer and resume operations are available at the alternate processing site or contracts are in place to support delivery to the site within the organization-defined time period for transfer\/resumption; and"},{"id":"cp-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensures that the alternate processing site provides information security safeguards equivalent to those of the primary site."}]},{"id":"cp-7_gdn","name":"guidance","prose":"Alternate processing sites are sites that are geographically distinct from primary processing sites. An alternate processing site provides processing capability in the event that the primary processing site is not available. Items covered by alternate processing site agreements include, for example, environmental conditions at alternate sites, access rules, physical and environmental protection requirements, and coordination for the transfer\/assignment of personnel. Requirements are specifically allocated to alternate processing sites that reflect the requirements in contingency plans to maintain essential missions\/business functions despite disruption, compromise, or failure in organizational information systems.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#cp-8","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#cp-10","rel":"related"},{"href":"#ma-6","rel":"related"}]},{"id":"cp-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-7.a_obj","name":"objective","props":[{"name":"label","value":"CP-7(a)"}],"parts":[{"id":"cp-7.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-7(a)[1]"}],"prose":"defines information system operations requiring an alternate processing site to be established to permit the transfer and resumption of such operations;"},{"id":"cp-7.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-7(a)[2]"}],"prose":"defines the time period consistent with recovery time objectives and recovery point objectives (as specified in the information system contingency plan) for transfer\/resumption of organization-defined information system operations for essential missions\/business functions;"},{"id":"cp-7.a_obj.3","name":"objective","props":[{"name":"label","value":"CP-7(a)[3]"}],"prose":"establishes an alternate processing site including necessary agreements to permit the transfer and resumption of organization-defined information system operations for essential missions\/business functions, within the organization-defined time period, when the primary processing capabilities are unavailable;"}]},{"id":"cp-7.b_obj","name":"objective","props":[{"name":"label","value":"CP-7(b)"}],"parts":[{"id":"cp-7.b_obj.1","name":"objective","props":[{"name":"label","value":"CP-7(b)[1]"}],"prose":"ensures that equipment and supplies required to transfer and resume operations are available at the alternate processing site; or"},{"id":"cp-7.b_obj.2","name":"objective","props":[{"name":"label","value":"CP-7(b)[2]"}],"prose":"ensures that contracts are in place to support delivery to the site within the organization-defined time period for transfer\/resumption; and"}]},{"id":"cp-7.c_obj","name":"objective","props":[{"name":"label","value":"CP-7(c)"}],"prose":"ensures that the alternate processing site provides information security safeguards equivalent to those of the primary site."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate processing sites\n\ncontingency plan\n\nalternate processing site agreements\n\nprimary processing site agreements\n\nspare equipment and supplies inventory at alternate processing site\n\nequipment and supply contracts\n\nservice-level agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for contingency planning and\/or alternate site arrangements\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for recovery at the alternate site\n\nautomated mechanisms supporting and\/or implementing recovery at the alternate processing site"}]}],"controls":[{"id":"cp-7.1","class":"SP800-53-enhancement","title":"Separation from Primary Site","props":[{"name":"label","value":"CP-7(1)"},{"name":"sort-id","value":"cp-07.01"}],"parts":[{"id":"cp-7.1_smt","name":"statement","prose":"The organization identifies an alternate processing site that is separated from the primary processing site to reduce susceptibility to the same threats."},{"id":"cp-7.1_gdn","name":"guidance","prose":"Threats that affect alternate processing sites are typically defined in organizational assessments of risk and include, for example, natural disasters, structural failures, hostile cyber attacks, and errors of omission\/commission. Organizations determine what is considered a sufficient degree of separation between primary and alternate processing sites based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber attack), the degree of separation between sites is less relevant.","links":[{"href":"#ra-3","rel":"related"}]},{"id":"cp-7.1_obj","name":"objective","prose":"Determine if the organization identifies an alternate processing site that is separated from the primary storage site to reduce susceptibility to the same threats."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate processing sites\n\ncontingency plan\n\nalternate processing site\n\nalternate processing site agreements\n\nprimary processing site agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate processing site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-7.2","class":"SP800-53-enhancement","title":"Accessibility","props":[{"name":"label","value":"CP-7(2)"},{"name":"sort-id","value":"cp-07.02"}],"parts":[{"id":"cp-7.2_smt","name":"statement","prose":"The organization identifies potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions."},{"id":"cp-7.2_gdn","name":"guidance","prose":"Area-wide disruptions refer to those types of disruptions that are broad in geographic scope (e.g., hurricane, regional power outage) with such determinations made by organizations based on organizational assessments of risk.","links":[{"href":"#ra-3","rel":"related"}]},{"id":"cp-7.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-7.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-7(2)[1]"}],"prose":"identifies potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster; and"},{"id":"cp-7.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-7(2)[2]"}],"prose":"outlines explicit mitigation actions for such potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate processing sites\n\ncontingency plan\n\nalternate processing site\n\nalternate processing site agreements\n\nprimary processing site agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate processing site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-7.3","class":"SP800-53-enhancement","title":"Priority of Service","props":[{"name":"label","value":"CP-7(3)"},{"name":"sort-id","value":"cp-07.03"}],"parts":[{"id":"cp-7.3_smt","name":"statement","prose":"The organization develops alternate processing site agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives)."},{"id":"cp-7.3_gdn","name":"guidance","prose":"Priority-of-service agreements refer to negotiated agreements with service providers that ensure that organizations receive priority treatment consistent with their availability requirements and the availability of information resources at the alternate processing site."},{"id":"cp-7.3_obj","name":"objective","prose":"Determine if the organization develops alternate processing site agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives as specified in the information system contingency plan)."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate processing sites\n\ncontingency plan\n\nalternate processing site agreements\n\nservice-level agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate processing site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibility for acquisitions\/contractual agreements"}]}]}]},{"id":"cp-8","class":"SP800-53","title":"Telecommunications Services","params":[{"id":"cp-8_prm_1","label":"organization-defined information system operations"},{"id":"cp-8_prm_2","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-8"},{"name":"sort-id","value":"cp-08"}],"links":[{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"},{"href":"#fb5844de-ff96-47c0-b258-4f52bcc2f30d","rel":"reference"},{"href":"#3ac12e79-f54f-4a63-9f4b-ee4bcd4df604","rel":"reference"}],"parts":[{"id":"cp-8_smt","name":"statement","prose":"The organization establishes alternate telecommunications services including necessary agreements to permit the resumption of {{ insert: param, cp-8_prm_1 }} for essential missions and business functions within {{ insert: param, cp-8_prm_2 }} when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites."},{"id":"cp-8_gdn","name":"guidance","prose":"This control applies to telecommunications services (data and voice) for primary and alternate processing and storage sites. Alternate telecommunications services reflect the continuity requirements in contingency plans to maintain essential missions\/business functions despite the loss of primary telecommunications services. Organizations may specify different time periods for primary\/alternate sites. Alternate telecommunications services include, for example, additional organizational or commercial ground-based circuits\/lines or satellites in lieu of ground-based communications. Organizations consider factors such as availability, quality of service, and access when entering into alternate telecommunications agreements.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#cp-7","rel":"related"}]},{"id":"cp-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-8_obj.1","name":"objective","props":[{"name":"label","value":"CP-8[1]"}],"prose":"defines information system operations requiring alternate telecommunications services to be established to permit the resumption of such operations;"},{"id":"cp-8_obj.2","name":"objective","props":[{"name":"label","value":"CP-8[2]"}],"prose":"defines the time period to permit resumption of organization-defined information system operations for essential missions and business functions; and"},{"id":"cp-8_obj.3","name":"objective","props":[{"name":"label","value":"CP-8[3]"}],"prose":"establishes alternate telecommunications services including necessary agreements to permit the resumption of organization-defined information system operations for essential missions and business functions, within the organization-defined time period, when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate telecommunications services\n\ncontingency plan\n\nprimary and alternate telecommunications service agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan telecommunications responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibility for acquisitions\/contractual agreements"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting telecommunications"}]}],"controls":[{"id":"cp-8.1","class":"SP800-53-enhancement","title":"Priority of Service Provisions","props":[{"name":"label","value":"CP-8(1)"},{"name":"sort-id","value":"cp-08.01"}],"parts":[{"id":"cp-8.1_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-8.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Develops primary and alternate telecommunications service agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives); and"},{"id":"cp-8.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Requests Telecommunications Service Priority for all telecommunications services used for national security emergency preparedness in the event that the primary and\/or alternate telecommunications services are provided by a common carrier."}]},{"id":"cp-8.1_gdn","name":"guidance","prose":"Organizations consider the potential mission\/business impact in situations where telecommunications service providers are servicing other organizations with similar priority-of-service provisions."},{"id":"cp-8.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-8.1_obj.1","name":"objective","props":[{"name":"label","value":"CP-8(1)[1]"}],"prose":"develops primary and alternate telecommunications service agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives as specified in the information system contingency plan); and"},{"id":"cp-8.1_obj.2","name":"objective","props":[{"name":"label","value":"CP-8(1)[2]"}],"prose":"requests Telecommunications Service Priority for all telecommunications services used for national security emergency preparedness in the event that the primary and\/or alternate telecommunications services are provided by a common carrier."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing primary and alternate telecommunications services\n\ncontingency plan\n\nprimary and alternate telecommunications service agreements\n\nTelecommunications Service Priority documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan telecommunications responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibility for acquisitions\/contractual agreements"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting telecommunications"}]}]},{"id":"cp-8.2","class":"SP800-53-enhancement","title":"Single Points of Failure","props":[{"name":"label","value":"CP-8(2)"},{"name":"sort-id","value":"cp-08.02"}],"parts":[{"id":"cp-8.2_smt","name":"statement","prose":"The organization obtains alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services."},{"id":"cp-8.2_obj","name":"objective","prose":"Determine if the organization obtains alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing primary and alternate telecommunications services\n\ncontingency plan\n\nprimary and alternate telecommunications service agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan telecommunications responsibilities\n\norganizational personnel with information system recovery responsibilities\n\nprimary and alternate telecommunications service providers\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"cp-9","class":"SP800-53","title":"Information System Backup","params":[{"id":"cp-9_prm_1","label":"organization-defined frequency consistent with recovery time and recovery point objectives"},{"id":"cp-9_prm_2","label":"organization-defined frequency consistent with recovery time and recovery point objectives"},{"id":"cp-9_prm_3","label":"organization-defined frequency consistent with recovery time and recovery point objectives"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-9"},{"name":"sort-id","value":"cp-09"}],"links":[{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-9_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Conducts backups of user-level information contained in the information system {{ insert: param, cp-9_prm_1 }};"},{"id":"cp-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Conducts backups of system-level information contained in the information system {{ insert: param, cp-9_prm_2 }};"},{"id":"cp-9_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Conducts backups of information system documentation including security-related documentation {{ insert: param, cp-9_prm_3 }}; and"},{"id":"cp-9_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects the confidentiality, integrity, and availability of backup information at storage locations."}]},{"id":"cp-9_gdn","name":"guidance","prose":"System-level information includes, for example, system-state information, operating system and application software, and licenses. User-level information includes any information other than system-level information. Mechanisms employed by organizations to protect the integrity of information system backups include, for example, digital signatures and cryptographic hashes. Protection of system backup information while in transit is beyond the scope of this control. Information system backups reflect the requirements in contingency plans as well as other organizational requirements for backing up information.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"cp-9_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-9.a_obj","name":"objective","props":[{"name":"label","value":"CP-9(a)"}],"parts":[{"id":"cp-9.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(a)[1]"}],"prose":"defines a frequency, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to conduct backups of user-level information contained in the information system;"},{"id":"cp-9.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(a)[2]"}],"prose":"conducts backups of user-level information contained in the information system with the organization-defined frequency;"}]},{"id":"cp-9.b_obj","name":"objective","props":[{"name":"label","value":"CP-9(b)"}],"parts":[{"id":"cp-9.b_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(b)[1]"}],"prose":"defines a frequency, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to conduct backups of system-level information contained in the information system;"},{"id":"cp-9.b_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(b)[2]"}],"prose":"conducts backups of system-level information contained in the information system with the organization-defined frequency;"}]},{"id":"cp-9.c_obj","name":"objective","props":[{"name":"label","value":"CP-9(c)"}],"parts":[{"id":"cp-9.c_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(c)[1]"}],"prose":"defines a frequency, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to conduct backups of information system documentation including security-related documentation;"},{"id":"cp-9.c_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(c)[2]"}],"prose":"conducts backups of information system documentation, including security-related documentation, with the organization-defined frequency; and"}]},{"id":"cp-9.d_obj","name":"objective","props":[{"name":"label","value":"CP-9(d)"}],"prose":"protects the confidentiality, integrity, and availability of backup information at storage locations."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\nbackup storage location(s)\n\ninformation system backup logs or records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system backup responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for conducting information system backups\n\nautomated mechanisms supporting and\/or implementing information system backups"}]}],"controls":[{"id":"cp-9.1","class":"SP800-53-enhancement","title":"Testing for Reliability \/ Integrity","params":[{"id":"cp-9.1_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"CP-9(1)"},{"name":"sort-id","value":"cp-09.01"}],"parts":[{"id":"cp-9.1_smt","name":"statement","prose":"The organization tests backup information {{ insert: param, cp-9.1_prm_1 }} to verify media reliability and information integrity."},{"id":"cp-9.1_gdn","name":"guidance","links":[{"href":"#cp-4","rel":"related"}]},{"id":"cp-9.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-9.1_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(1)[1]"}],"prose":"defines the frequency to test backup information to verify media reliability and information integrity; and"},{"id":"cp-9.1_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(1)[2]"}],"prose":"tests backup information with the organization-defined frequency to verify media reliability and information integrity."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\ninformation system backup test results\n\ncontingency plan test documentation\n\ncontingency plan test results\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system backup responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for conducting information system backups\n\nautomated mechanisms supporting and\/or implementing information system backups"}]}]}]},{"id":"cp-10","class":"SP800-53","title":"Information System Recovery and Reconstitution","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-10"},{"name":"sort-id","value":"cp-10"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-10_smt","name":"statement","prose":"The organization provides for the recovery and reconstitution of the information system to a known state after a disruption, compromise, or failure."},{"id":"cp-10_gdn","name":"guidance","prose":"Recovery is executing information system contingency plan activities to restore organizational missions\/business functions. Reconstitution takes place following recovery and includes activities for returning organizational information systems to fully operational states. Recovery and reconstitution operations reflect mission and business priorities, recovery point\/time and reconstitution objectives, and established organizational metrics consistent with contingency plan requirements. Reconstitution includes the deactivation of any interim information system capabilities that may have been needed during recovery operations. Reconstitution also includes assessments of fully restored information system capabilities, reestablishment of continuous monitoring activities, potential information system reauthorizations, and activities to prepare the systems against future disruptions, compromises, or failures. Recovery\/reconstitution capabilities employed by organizations can include both automated mechanisms and manual procedures.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-6","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#cp-7","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#sc-24","rel":"related"}]},{"id":"cp-10_obj","name":"objective","prose":"Determine if the organization provides for:","parts":[{"id":"cp-10_obj.1","name":"objective","props":[{"name":"label","value":"CP-10[1]"}],"prose":"the recovery of the information system to a known state after:","parts":[{"id":"cp-10_obj.1.a","name":"objective","props":[{"name":"label","value":"CP-10[1][a]"}],"prose":"a disruption;"},{"id":"cp-10_obj.1.b","name":"objective","props":[{"name":"label","value":"CP-10[1][b]"}],"prose":"a compromise; or"},{"id":"cp-10_obj.1.c","name":"objective","props":[{"name":"label","value":"CP-10[1][c]"}],"prose":"a failure;"}]},{"id":"cp-10_obj.2","name":"objective","props":[{"name":"label","value":"CP-10[2]"}],"prose":"the reconstitution of the information system to a known state after:","parts":[{"id":"cp-10_obj.2.a","name":"objective","props":[{"name":"label","value":"CP-10[2][a]"}],"prose":"a disruption;"},{"id":"cp-10_obj.2.b","name":"objective","props":[{"name":"label","value":"CP-10[2][b]"}],"prose":"a compromise; or"},{"id":"cp-10_obj.2.c","name":"objective","props":[{"name":"label","value":"CP-10[2][c]"}],"prose":"a failure."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\ninformation system backup test results\n\ncontingency plan test results\n\ncontingency plan test documentation\n\nredundant secondary system for information system backups\n\nlocation(s) of redundant secondary backup system(s)\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning, recovery, and\/or reconstitution responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes implementing information system recovery and reconstitution operations\n\nautomated mechanisms supporting and\/or implementing information system recovery and reconstitution operations"}]}],"controls":[{"id":"cp-10.2","class":"SP800-53-enhancement","title":"Transaction Recovery","props":[{"name":"label","value":"CP-10(2)"},{"name":"sort-id","value":"cp-10.02"}],"parts":[{"id":"cp-10.2_smt","name":"statement","prose":"The information system implements transaction recovery for systems that are transaction-based."},{"id":"cp-10.2_gdn","name":"guidance","prose":"Transaction-based information systems include, for example, database management systems and transaction processing systems. Mechanisms supporting transaction recovery include, for example, transaction rollback and transaction journaling."},{"id":"cp-10.2_obj","name":"objective","prose":"Determine if the information system implements transaction recovery for systems that are transaction-based."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system recovery and reconstitution\n\ncontingency plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ncontingency plan test documentation\n\ncontingency plan test results\n\ninformation system transaction recovery records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for transaction recovery\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing transaction recovery capability"}]}]}]}]},{"id":"ia","class":"family","title":"Identification and Authentication","controls":[{"id":"ia-1","class":"SP800-53","title":"Identification and Authentication Policy and Procedures","params":[{"id":"ia-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ia-1_prm_2","label":"organization-defined frequency"},{"id":"ia-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-1"},{"name":"sort-id","value":"ia-01"}],"links":[{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ia-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ia-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ia-1_prm_1 }}:","parts":[{"id":"ia-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ia-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls; and"}]},{"id":"ia-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ia-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Identification and authentication policy {{ insert: param, ia-1_prm_2 }}; and"},{"id":"ia-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Identification and authentication procedures {{ insert: param, ia-1_prm_3 }}."}]}]},{"id":"ia-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the IA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ia-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ia-1.a_obj","name":"objective","props":[{"name":"label","value":"IA-1(a)"}],"parts":[{"id":"ia-1.a.1_obj","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)"}],"parts":[{"id":"ia-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1]"}],"prose":"develops and documents an identification and authentication policy that addresses:","parts":[{"id":"ia-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ia-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ia-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ia-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ia-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ia-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ia-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ia-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the identification and authentication policy is to be disseminated; and"},{"id":"ia-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[3]"}],"prose":"disseminates the identification and authentication policy to organization-defined personnel or roles;"}]},{"id":"ia-1.a.2_obj","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)"}],"parts":[{"id":"ia-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls;"},{"id":"ia-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ia-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ia-1.b_obj","name":"objective","props":[{"name":"label","value":"IA-1(b)"}],"parts":[{"id":"ia-1.b.1_obj","name":"objective","props":[{"name":"label","value":"IA-1(b)(1)"}],"parts":[{"id":"ia-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current identification and authentication policy;"},{"id":"ia-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(b)(1)[2]"}],"prose":"reviews and updates the current identification and authentication policy with the organization-defined frequency; and"}]},{"id":"ia-1.b.2_obj","name":"objective","props":[{"name":"label","value":"IA-1(b)(2)"}],"parts":[{"id":"ia-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current identification and authentication procedures; and"},{"id":"ia-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(b)(2)[2]"}],"prose":"reviews and updates the current identification and authentication procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with identification and authentication responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ia-2","class":"SP800-53","title":"Identification and Authentication (organizational Users)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-2"},{"name":"sort-id","value":"ia-02"}],"links":[{"href":"#ad733a42-a7ed-4774-b988-4930c28852f3","rel":"reference"},{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#4da24a96-6cf8-435d-9d1f-c73247cad109","rel":"reference"},{"href":"#74e740a4-c45d-49f3-a86e-eb747c549e01","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#ba557c91-ba3e-4792-adc6-a4ae479b39ff","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ia-2_smt","name":"statement","prose":"The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users)."},{"id":"ia-2_gdn","name":"guidance","prose":"Organizational users include employees or individuals that organizations deem to have equivalent status of employees (e.g., contractors, guest researchers). This control applies to all accesses other than: (i) accesses that are explicitly identified and documented in AC-14; and (ii) accesses that occur through authorized use of group authenticators without individual authentication. Organizations may require unique identification of individuals in group accounts (e.g., shared privilege accounts) or for detailed accountability of individual activity. Organizations employ passwords, tokens, or biometrics to authenticate user identities, or in the case multifactor authentication, or some combination thereof. Access to organizational information systems is defined as either local access or network access. Local access is any access to organizational information systems by users (or processes acting on behalf of users) where such access is obtained by direct connections without the use of networks. Network access is access to organizational information systems by users (or processes acting on behalf of users) where such access is obtained through network connections (i.e., nonlocal accesses). Remote access is a type of network access that involves communication through external networks (e.g., the Internet). Internal networks include local area networks and wide area networks. In addition, the use of encrypted virtual private networks (VPNs) for network connections between organization-controlled endpoints and non-organization controlled endpoints may be treated as internal networks from the perspective of protecting the confidentiality and integrity of information traversing the network. Organizations can satisfy the identification and authentication requirements in this control by complying with the requirements in Homeland Security Presidential Directive 12 consistent with the specific organizational implementation plans. Multifactor authentication requires the use of two or more different factors to achieve authentication. The factors are defined as: (i) something you know (e.g., password, personal identification number [PIN]); (ii) something you have (e.g., cryptographic identification device, token); or (iii) something you are (e.g., biometric). Multifactor solutions that require devices separate from information systems gaining access include, for example, hardware tokens providing time-based or challenge-response authenticators and smart cards such as the U.S. Government Personal Identity Verification card and the DoD common access card. In addition to identifying and authenticating users at the information system level (i.e., at logon), organizations also employ identification and authentication mechanisms at the application level, when necessary, to provide increased information security. Identification and authentication requirements for other than organizational users are described in IA-8.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"}]},{"id":"ia-2_obj","name":"objective","prose":"Determine if the information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users)."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for uniquely identifying and authenticating users\n\nautomated mechanisms supporting and\/or implementing identification and authentication capability"}]}],"controls":[{"id":"ia-2.1","class":"SP800-53-enhancement","title":"Network Access to Privileged Accounts","props":[{"name":"label","value":"IA-2(1)"},{"name":"sort-id","value":"ia-02.01"}],"parts":[{"id":"ia-2.1_smt","name":"statement","prose":"The information system implements multifactor authentication for network access to privileged accounts."},{"id":"ia-2.1_gdn","name":"guidance","links":[{"href":"#ac-6","rel":"related"}]},{"id":"ia-2.1_obj","name":"objective","prose":"Determine if the information system implements multifactor authentication for network access to privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing multifactor authentication capability"}]}]},{"id":"ia-2.2","class":"SP800-53-enhancement","title":"Network Access to Non-privileged Accounts","props":[{"name":"label","value":"IA-2(2)"},{"name":"sort-id","value":"ia-02.02"}],"parts":[{"id":"ia-2.2_smt","name":"statement","prose":"The information system implements multifactor authentication for network access to non-privileged accounts."},{"id":"ia-2.2_obj","name":"objective","prose":"Determine if the information system implements multifactor authentication for network access to non-privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing multifactor authentication capability"}]}]},{"id":"ia-2.3","class":"SP800-53-enhancement","title":"Local Access to Privileged Accounts","props":[{"name":"label","value":"IA-2(3)"},{"name":"sort-id","value":"ia-02.03"}],"parts":[{"id":"ia-2.3_smt","name":"statement","prose":"The information system implements multifactor authentication for local access to privileged accounts."},{"id":"ia-2.3_gdn","name":"guidance","links":[{"href":"#ac-6","rel":"related"}]},{"id":"ia-2.3_obj","name":"objective","prose":"Determine if the information system implements multifactor authentication for local access to privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing multifactor authentication capability"}]}]},{"id":"ia-2.8","class":"SP800-53-enhancement","title":"Network Access to Privileged Accounts - Replay Resistant","props":[{"name":"label","value":"IA-2(8)"},{"name":"sort-id","value":"ia-02.08"}],"parts":[{"id":"ia-2.8_smt","name":"statement","prose":"The information system implements replay-resistant authentication mechanisms for network access to privileged accounts."},{"id":"ia-2.8_gdn","name":"guidance","prose":"Authentication processes resist replay attacks if it is impractical to achieve successful authentications by replaying previous authentication messages. Replay-resistant techniques include, for example, protocols that use nonces or challenges such as Transport Layer Security (TLS) and time synchronous or challenge-response one-time authenticators."},{"id":"ia-2.8_obj","name":"objective","prose":"Determine if the information system implements replay-resistant authentication mechanisms for network access to privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of privileged information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms supporting and\/or implementing replay resistant authentication mechanisms"}]}]},{"id":"ia-2.11","class":"SP800-53-enhancement","title":"Remote Access - Separate Device","params":[{"id":"ia-2.11_prm_1","label":"organization-defined strength of mechanism requirements"}],"props":[{"name":"label","value":"IA-2(11)"},{"name":"sort-id","value":"ia-02.11"}],"parts":[{"id":"ia-2.11_smt","name":"statement","prose":"The information system implements multifactor authentication for remote access to privileged and non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets {{ insert: param, ia-2.11_prm_1 }}."},{"id":"ia-2.11_gdn","name":"guidance","prose":"For remote access to privileged\/non-privileged accounts, the purpose of requiring a device that is separate from the information system gaining access for one of the factors during multifactor authentication is to reduce the likelihood of compromising authentication credentials stored on the system. For example, adversaries deploying malicious code on organizational information systems can potentially compromise such credentials resident on the system and subsequently impersonate authorized users.","links":[{"href":"#ac-6","rel":"related"}]},{"id":"ia-2.11_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ia-2.11_obj.1","name":"objective","props":[{"name":"label","value":"IA-2(11)[1]"}],"prose":"the information system implements multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access;"},{"id":"ia-2.11_obj.2","name":"objective","props":[{"name":"label","value":"IA-2(11)[2]"}],"prose":"the information system implements multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access;"},{"id":"ia-2.11_obj.3","name":"objective","props":[{"name":"label","value":"IA-2(11)[3]"}],"prose":"the organization defines strength of mechanism requirements to be enforced by a device separate from the system gaining remote access to privileged accounts;"},{"id":"ia-2.11_obj.4","name":"objective","props":[{"name":"label","value":"IA-2(11)[4]"}],"prose":"the organization defines strength of mechanism requirements to be enforced by a device separate from the system gaining remote access to non-privileged accounts;"},{"id":"ia-2.11_obj.5","name":"objective","props":[{"name":"label","value":"IA-2(11)[5]"}],"prose":"the information system implements multifactor authentication for remote access to privileged accounts such that a device, separate from the system gaining access, meets organization-defined strength of mechanism requirements; and"},{"id":"ia-2.11_obj.6","name":"objective","props":[{"name":"label","value":"IA-2(11)[6]"}],"prose":"the information system implements multifactor authentication for remote access to non-privileged accounts such that a device, separate from the system gaining access, meets organization-defined strength of mechanism requirements."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of privileged and non-privileged information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability"}]}]},{"id":"ia-2.12","class":"SP800-53-enhancement","title":"Acceptance of PIV Credentials","props":[{"name":"label","value":"IA-2(12)"},{"name":"sort-id","value":"ia-02.12"}],"parts":[{"id":"ia-2.12_smt","name":"statement","prose":"The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials."},{"id":"ia-2.12_gdn","name":"guidance","prose":"This control enhancement applies to organizations implementing logical access control systems (LACS) and physical access control systems (PACS). Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11 requires federal agencies to continue implementing the requirements specified in HSPD-12 to enable agency-wide use of PIV credentials.","links":[{"href":"#au-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#sa-4","rel":"related"}]},{"id":"ia-2.12_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"ia-2.12_obj.1","name":"objective","props":[{"name":"label","value":"IA-2(12)[1]"}],"prose":"accepts Personal Identity Verification (PIV) credentials; and"},{"id":"ia-2.12_obj.2","name":"objective","props":[{"name":"label","value":"IA-2(12)[2]"}],"prose":"electronically verifies Personal Identity Verification (PIV) credentials."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nPIV verification records\n\nevidence of PIV credentials\n\nPIV credential authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing acceptance and verification of PIV credentials"}]}]}]},{"id":"ia-3","class":"SP800-53","title":"Device Identification and Authentication","params":[{"id":"ia-3_prm_1","label":"organization-defined specific and\/or types of devices"},{"id":"ia-3_prm_2","select":{"how-many":"one-or-more","choice":["local","remote","network"]}}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-3"},{"name":"sort-id","value":"ia-03"}],"parts":[{"id":"ia-3_smt","name":"statement","prose":"The information system uniquely identifies and authenticates {{ insert: param, ia-3_prm_1 }} before establishing a {{ insert: param, ia-3_prm_2 }} connection."},{"id":"ia-3_gdn","name":"guidance","prose":"Organizational devices requiring unique device-to-device identification and authentication may be defined by type, by device, or by a combination of type\/device. Information systems typically use either shared known information (e.g., Media Access Control [MAC] or Transmission Control Protocol\/Internet Protocol [TCP\/IP] addresses) for device identification or organizational authentication solutions (e.g., IEEE 802.1x and Extensible Authentication Protocol [EAP], Radius server with EAP-Transport Layer Security [TLS] authentication, Kerberos) to identify\/authenticate devices on local and\/or wide area networks. Organizations determine the required strength of authentication mechanisms by the security categories of information systems. Because of the challenges of applying this control on large scale, organizations are encouraged to only apply the control to those limited number (and type) of devices that truly need to support this capability.","links":[{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"}]},{"id":"ia-3_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ia-3_obj.1","name":"objective","props":[{"name":"label","value":"IA-3[1]"}],"prose":"the organization defines specific and\/or types of devices that the information system uniquely identifies and authenticates before establishing one or more of the following:","parts":[{"id":"ia-3_obj.1.a","name":"objective","props":[{"name":"label","value":"IA-3[1][a]"}],"prose":"a local connection;"},{"id":"ia-3_obj.1.b","name":"objective","props":[{"name":"label","value":"IA-3[1][b]"}],"prose":"a remote connection; and\/or"},{"id":"ia-3_obj.1.c","name":"objective","props":[{"name":"label","value":"IA-3[1][c]"}],"prose":"a network connection; and"}]},{"id":"ia-3_obj.2","name":"objective","props":[{"name":"label","value":"IA-3[2]"}],"prose":"the information system uniquely identifies and authenticates organization-defined devices before establishing one or more of the following:","parts":[{"id":"ia-3_obj.2.a","name":"objective","props":[{"name":"label","value":"IA-3[2][a]"}],"prose":"a local connection;"},{"id":"ia-3_obj.2.b","name":"objective","props":[{"name":"label","value":"IA-3[2][b]"}],"prose":"a remote connection; and\/or"},{"id":"ia-3_obj.2.c","name":"objective","props":[{"name":"label","value":"IA-3[2][c]"}],"prose":"a network connection."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing device identification and authentication\n\ninformation system design documentation\n\nlist of devices requiring unique identification and authentication\n\ndevice connection reports\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with operational responsibilities for device identification and authentication\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing device identification and authentication capability"}]}]},{"id":"ia-4","class":"SP800-53","title":"Identifier Management","params":[{"id":"ia-4_prm_1","label":"organization-defined personnel or roles"},{"id":"ia-4_prm_2","label":"organization-defined time period"},{"id":"ia-4_prm_3","label":"organization-defined time period of inactivity"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-4"},{"name":"sort-id","value":"ia-04"}],"links":[{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"}],"parts":[{"id":"ia-4_smt","name":"statement","prose":"The organization manages information system identifiers by:","parts":[{"id":"ia-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Receiving authorization from {{ insert: param, ia-4_prm_1 }} to assign an individual, group, role, or device identifier;"},{"id":"ia-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Selecting an identifier that identifies an individual, group, role, or device;"},{"id":"ia-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Assigning the identifier to the intended individual, group, role, or device;"},{"id":"ia-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Preventing reuse of identifiers for {{ insert: param, ia-4_prm_2 }}; and"},{"id":"ia-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Disabling the identifier after {{ insert: param, ia-4_prm_3 }}."}]},{"id":"ia-4_gdn","name":"guidance","prose":"Common device identifiers include, for example, media access control (MAC), Internet protocol (IP) addresses, or device-unique token identifiers. Management of individual identifiers is not applicable to shared information system accounts (e.g., guest and anonymous accounts). Typically, individual identifiers are the user names of the information system accounts assigned to those individuals. In such instances, the account management activities of AC-2 use account names provided by IA-4. This control also addresses individual identifiers not necessarily associated with information system accounts (e.g., identifiers used in physical security control databases accessed by badge reader systems for access to information systems). Preventing reuse of identifiers implies preventing the assignment of previously used individual, group, role, or device identifiers to different individuals, groups, roles, or devices.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#sc-37","rel":"related"}]},{"id":"ia-4_obj","name":"objective","prose":"Determine if the organization manages information system identifiers by:","parts":[{"id":"ia-4.a_obj","name":"objective","props":[{"name":"label","value":"IA-4(a)"}],"parts":[{"id":"ia-4.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(a)[1]"}],"prose":"defining personnel or roles from whom authorization must be received to assign:","parts":[{"id":"ia-4.a_obj.1.a","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][a]"}],"prose":"an individual identifier;"},{"id":"ia-4.a_obj.1.b","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][b]"}],"prose":"a group identifier;"},{"id":"ia-4.a_obj.1.c","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][c]"}],"prose":"a role identifier; and\/or"},{"id":"ia-4.a_obj.1.d","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][d]"}],"prose":"a device identifier;"}]},{"id":"ia-4.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(a)[2]"}],"prose":"receiving authorization from organization-defined personnel or roles to assign:","parts":[{"id":"ia-4.a_obj.2.a","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][a]"}],"prose":"an individual identifier;"},{"id":"ia-4.a_obj.2.b","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][b]"}],"prose":"a group identifier;"},{"id":"ia-4.a_obj.2.c","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][c]"}],"prose":"a role identifier; and\/or"},{"id":"ia-4.a_obj.2.d","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][d]"}],"prose":"a device identifier;"}]}]},{"id":"ia-4.b_obj","name":"objective","props":[{"name":"label","value":"IA-4(b)"}],"prose":"selecting an identifier that identifies:","parts":[{"id":"ia-4.b_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(b)[1]"}],"prose":"an individual;"},{"id":"ia-4.b_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(b)[2]"}],"prose":"a group;"},{"id":"ia-4.b_obj.3","name":"objective","props":[{"name":"label","value":"IA-4(b)[3]"}],"prose":"a role; and\/or"},{"id":"ia-4.b_obj.4","name":"objective","props":[{"name":"label","value":"IA-4(b)[4]"}],"prose":"a device;"}]},{"id":"ia-4.c_obj","name":"objective","props":[{"name":"label","value":"IA-4(c)"}],"prose":"assigning the identifier to the intended:","parts":[{"id":"ia-4.c_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(c)[1]"}],"prose":"individual;"},{"id":"ia-4.c_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(c)[2]"}],"prose":"group;"},{"id":"ia-4.c_obj.3","name":"objective","props":[{"name":"label","value":"IA-4(c)[3]"}],"prose":"role; and\/or"},{"id":"ia-4.c_obj.4","name":"objective","props":[{"name":"label","value":"IA-4(c)[4]"}],"prose":"device;"}]},{"id":"ia-4.d_obj","name":"objective","props":[{"name":"label","value":"IA-4(d)"}],"parts":[{"id":"ia-4.d_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(d)[1]"}],"prose":"defining a time period for preventing reuse of identifiers;"},{"id":"ia-4.d_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(d)[2]"}],"prose":"preventing reuse of identifiers for the organization-defined time period;"}]},{"id":"ia-4.e_obj","name":"objective","props":[{"name":"label","value":"IA-4(e)"}],"parts":[{"id":"ia-4.e_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(e)[1]"}],"prose":"defining a time period of inactivity to disable the identifier; and"},{"id":"ia-4.e_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(e)[2]"}],"prose":"disabling the identifier after the organization-defined time period of inactivity."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing identifier management\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of information system accounts\n\nlist of identifiers generated from physical access control devices\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with identifier management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identifier management"}]}]},{"id":"ia-5","class":"SP800-53","title":"Authenticator Management","params":[{"id":"ia-5_prm_1","label":"organization-defined time period by authenticator type"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-5"},{"name":"sort-id","value":"ia-05"}],"links":[{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#74e740a4-c45d-49f3-a86e-eb747c549e01","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#ba557c91-ba3e-4792-adc6-a4ae479b39ff","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ia-5_smt","name":"statement","prose":"The organization manages information system authenticators by:","parts":[{"id":"ia-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, or device receiving the authenticator;"},{"id":"ia-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishing initial authenticator content for authenticators defined by the organization;"},{"id":"ia-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensuring that authenticators have sufficient strength of mechanism for their intended use;"},{"id":"ia-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Establishing and implementing administrative procedures for initial authenticator distribution, for lost\/compromised or damaged authenticators, and for revoking authenticators;"},{"id":"ia-5_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Changing default content of authenticators prior to information system installation;"},{"id":"ia-5_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Establishing minimum and maximum lifetime restrictions and reuse conditions for authenticators;"},{"id":"ia-5_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Changing\/refreshing authenticators {{ insert: param, ia-5_prm_1 }};"},{"id":"ia-5_smt.h","name":"item","props":[{"name":"label","value":"h."}],"prose":"Protecting authenticator content from unauthorized disclosure and modification;"},{"id":"ia-5_smt.i","name":"item","props":[{"name":"label","value":"i."}],"prose":"Requiring individuals to take, and having devices implement, specific security safeguards to protect authenticators; and"},{"id":"ia-5_smt.j","name":"item","props":[{"name":"label","value":"j."}],"prose":"Changing authenticators for group\/role accounts when membership to those accounts changes."}]},{"id":"ia-5_gdn","name":"guidance","prose":"Individual authenticators include, for example, passwords, tokens, biometrics, PKI certificates, and key cards. Initial authenticator content is the actual content (e.g., the initial password) as opposed to requirements about authenticator content (e.g., minimum password length). In many cases, developers ship information system components with factory default authentication credentials to allow for initial installation and configuration. Default authentication credentials are often well known, easily discoverable, and present a significant security risk. The requirement to protect individual authenticators may be implemented via control PL-4 or PS-6 for authenticators in the possession of individuals and by controls AC-3, AC-6, and SC-28 for authenticators stored within organizational information systems (e.g., passwords stored in hashed or encrypted formats, files containing encrypted or hashed passwords accessible with administrator privileges). Information systems support individual authenticator management by organization-defined settings and restrictions for various authenticator characteristics including, for example, minimum password length, password composition, validation time window for time synchronous one-time tokens, and number of allowed rejections during the verification stage of biometric authentication. Specific actions that can be taken to safeguard authenticators include, for example, maintaining possession of individual authenticators, not loaning or sharing individual authenticators with others, and reporting lost, stolen, or compromised authenticators immediately. Authenticator management includes issuing and revoking, when no longer needed, authenticators for temporary access such as that required for remote maintenance. Device authenticators include, for example, certificates and passwords.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#ps-5","rel":"related"},{"href":"#ps-6","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-17","rel":"related"},{"href":"#sc-28","rel":"related"}]},{"id":"ia-5_obj","name":"objective","prose":"Determine if the organization manages information system authenticators by:","parts":[{"id":"ia-5.a_obj","name":"objective","props":[{"name":"label","value":"IA-5(a)"}],"prose":"verifying, as part of the initial authenticator distribution, the identity of:","parts":[{"id":"ia-5.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(a)[1]"}],"prose":"the individual receiving the authenticator;"},{"id":"ia-5.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(a)[2]"}],"prose":"the group receiving the authenticator;"},{"id":"ia-5.a_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(a)[3]"}],"prose":"the role receiving the authenticator; and\/or"},{"id":"ia-5.a_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(a)[4]"}],"prose":"the device receiving the authenticator;"}]},{"id":"ia-5.b_obj","name":"objective","props":[{"name":"label","value":"IA-5(b)"}],"prose":"establishing initial authenticator content for authenticators defined by the organization;"},{"id":"ia-5.c_obj","name":"objective","props":[{"name":"label","value":"IA-5(c)"}],"prose":"ensuring that authenticators have sufficient strength of mechanism for their intended use;"},{"id":"ia-5.d_obj","name":"objective","props":[{"name":"label","value":"IA-5(d)"}],"parts":[{"id":"ia-5.d_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(d)[1]"}],"prose":"establishing and implementing administrative procedures for initial authenticator distribution;"},{"id":"ia-5.d_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(d)[2]"}],"prose":"establishing and implementing administrative procedures for lost\/compromised or damaged authenticators;"},{"id":"ia-5.d_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(d)[3]"}],"prose":"establishing and implementing administrative procedures for revoking authenticators;"}]},{"id":"ia-5.e_obj","name":"objective","props":[{"name":"label","value":"IA-5(e)"}],"prose":"changing default content of authenticators prior to information system installation;"},{"id":"ia-5.f_obj","name":"objective","props":[{"name":"label","value":"IA-5(f)"}],"parts":[{"id":"ia-5.f_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(f)[1]"}],"prose":"establishing minimum lifetime restrictions for authenticators;"},{"id":"ia-5.f_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(f)[2]"}],"prose":"establishing maximum lifetime restrictions for authenticators;"},{"id":"ia-5.f_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(f)[3]"}],"prose":"establishing reuse conditions for authenticators;"}]},{"id":"ia-5.g_obj","name":"objective","props":[{"name":"label","value":"IA-5(g)"}],"parts":[{"id":"ia-5.g_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(g)[1]"}],"prose":"defining a time period (by authenticator type) for changing\/refreshing authenticators;"},{"id":"ia-5.g_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(g)[2]"}],"prose":"changing\/refreshing authenticators with the organization-defined time period by authenticator type;"}]},{"id":"ia-5.h_obj","name":"objective","props":[{"name":"label","value":"IA-5(h)"}],"prose":"protecting authenticator content from unauthorized:","parts":[{"id":"ia-5.h_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(h)[1]"}],"prose":"disclosure;"},{"id":"ia-5.h_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(h)[2]"}],"prose":"modification;"}]},{"id":"ia-5.i_obj","name":"objective","props":[{"name":"label","value":"IA-5(i)"}],"parts":[{"id":"ia-5.i_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(i)[1]"}],"prose":"requiring individuals to take specific security safeguards to protect authenticators;"},{"id":"ia-5.i_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(i)[2]"}],"prose":"having devices implement specific security safeguards to protect authenticators; and"}]},{"id":"ia-5.j_obj","name":"objective","props":[{"name":"label","value":"IA-5(j)"}],"prose":"changing authenticators for group\/role accounts when membership to those accounts changes."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator management\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of information system authenticator types\n\nchange control records associated with managing information system authenticators\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing authenticator management capability"}]}],"controls":[{"id":"ia-5.1","class":"SP800-53-enhancement","title":"Password-based Authentication","params":[{"id":"ia-5.1_prm_1","label":"organization-defined requirements for case sensitivity, number of characters, mix of upper-case letters, lower-case letters, numbers, and special characters, including minimum requirements for each type"},{"id":"ia-5.1_prm_2","label":"organization-defined number"},{"id":"ia-5.1_prm_3","label":"organization-defined numbers for lifetime minimum, lifetime maximum"},{"id":"ia-5.1_prm_4","label":"organization-defined number"}],"props":[{"name":"label","value":"IA-5(1)"},{"name":"sort-id","value":"ia-05.01"}],"parts":[{"id":"ia-5.1_smt","name":"statement","prose":"The information system, for password-based authentication:","parts":[{"id":"ia-5.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Enforces minimum password complexity of {{ insert: param, ia-5.1_prm_1 }};"},{"id":"ia-5.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Enforces at least the following number of changed characters when new passwords are created: {{ insert: param, ia-5.1_prm_2 }};"},{"id":"ia-5.1_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Stores and transmits only cryptographically-protected passwords;"},{"id":"ia-5.1_smt.d","name":"item","props":[{"name":"label","value":"(d)"}],"prose":"Enforces password minimum and maximum lifetime restrictions of {{ insert: param, ia-5.1_prm_3 }};"},{"id":"ia-5.1_smt.e","name":"item","props":[{"name":"label","value":"(e)"}],"prose":"Prohibits password reuse for {{ insert: param, ia-5.1_prm_4 }} generations; and"},{"id":"ia-5.1_smt.f","name":"item","props":[{"name":"label","value":"(f)"}],"prose":"Allows the use of a temporary password for system logons with an immediate change to a permanent password."}]},{"id":"ia-5.1_gdn","name":"guidance","prose":"This control enhancement applies to single-factor authentication of individuals using passwords as individual or group authenticators, and in a similar manner, when passwords are part of multifactor authenticators. This control enhancement does not apply when passwords are used to unlock hardware authenticators (e.g., Personal Identity Verification cards). The implementation of such password mechanisms may not meet all of the requirements in the enhancement. Cryptographically-protected passwords include, for example, encrypted versions of passwords and one-way cryptographic hashes of passwords. The number of changed characters refers to the number of changes required with respect to the total number of positions in the current password. Password lifetime restrictions do not apply to temporary passwords. To mitigate certain brute force attacks against passwords, organizations may also consider salting passwords.","links":[{"href":"#ia-6","rel":"related"}]},{"id":"ia-5.1_obj","name":"objective","prose":"Determine if, for password-based authentication:","parts":[{"id":"ia-5.1.a_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)"}],"parts":[{"id":"ia-5.1.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[1]"}],"prose":"the organization defines requirements for case sensitivity;"},{"id":"ia-5.1.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[2]"}],"prose":"the organization defines requirements for number of characters;"},{"id":"ia-5.1.a_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[3]"}],"prose":"the organization defines requirements for the mix of upper-case letters, lower-case letters, numbers and special characters;"},{"id":"ia-5.1.a_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[4]"}],"prose":"the organization defines minimum requirements for each type of character;"},{"id":"ia-5.1.a_obj.5","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[5]"}],"prose":"the information system enforces minimum password complexity of organization-defined requirements for case sensitivity, number of characters, mix of upper-case letters, lower-case letters, numbers, and special characters, including minimum requirements for each type;"}],"links":[{"href":"#ia-5.1_smt.a","rel":"corresp"}]},{"id":"ia-5.1.b_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(b)"}],"parts":[{"id":"ia-5.1.b_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(b)[1]"}],"prose":"the organization defines a minimum number of changed characters to be enforced when new passwords are created;"},{"id":"ia-5.1.b_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(b)[2]"}],"prose":"the information system enforces at least the organization-defined minimum number of characters that must be changed when new passwords are created;"}],"links":[{"href":"#ia-5.1_smt.b","rel":"corresp"}]},{"id":"ia-5.1.c_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(c)"}],"prose":"the information system stores and transmits only encrypted representations of passwords;","links":[{"href":"#ia-5.1_smt.c","rel":"corresp"}]},{"id":"ia-5.1.d_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)"}],"parts":[{"id":"ia-5.1.d_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[1]"}],"prose":"the organization defines numbers for password minimum lifetime restrictions to be enforced for passwords;"},{"id":"ia-5.1.d_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[2]"}],"prose":"the organization defines numbers for password maximum lifetime restrictions to be enforced for passwords;"},{"id":"ia-5.1.d_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[3]"}],"prose":"the information system enforces password minimum lifetime restrictions of organization-defined numbers for lifetime minimum;"},{"id":"ia-5.1.d_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[4]"}],"prose":"the information system enforces password maximum lifetime restrictions of organization-defined numbers for lifetime maximum;"}],"links":[{"href":"#ia-5.1_smt.d","rel":"corresp"}]},{"id":"ia-5.1.e_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(e)"}],"parts":[{"id":"ia-5.1.e_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(e)[1]"}],"prose":"the organization defines the number of password generations to be prohibited from password reuse;"},{"id":"ia-5.1.e_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(e)[2]"}],"prose":"the information system prohibits password reuse for the organization-defined number of generations; and"}],"links":[{"href":"#ia-5.1_smt.e","rel":"corresp"}]},{"id":"ia-5.1.f_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(f)"}],"prose":"the information system allows the use of a temporary password for system logons with an immediate change to a permanent password.","links":[{"href":"#ia-5.1_smt.f","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\npassword policy\n\nprocedures addressing authenticator management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\npassword configurations and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing password-based authenticator management capability"}]}]},{"id":"ia-5.2","class":"SP800-53-enhancement","title":"Pki-based Authentication","props":[{"name":"label","value":"IA-5(2)"},{"name":"sort-id","value":"ia-05.02"}],"parts":[{"id":"ia-5.2_smt","name":"statement","prose":"The information system, for PKI-based authentication:","parts":[{"id":"ia-5.2_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Validates certifications by constructing and verifying a certification path to an accepted trust anchor including checking certificate status information;"},{"id":"ia-5.2_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Enforces authorized access to the corresponding private key;"},{"id":"ia-5.2_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Maps the authenticated identity to the account of the individual or group; and"},{"id":"ia-5.2_smt.d","name":"item","props":[{"name":"label","value":"(d)"}],"prose":"Implements a local cache of revocation data to support path discovery and validation in case of inability to access revocation information via the network."}]},{"id":"ia-5.2_gdn","name":"guidance","prose":"Status information for certification paths includes, for example, certificate revocation lists or certificate status protocol responses. For PIV cards, validation of certifications involves the construction and verification of a certification path to the Common Policy Root trust anchor including certificate policy processing.","links":[{"href":"#ia-6","rel":"related"}]},{"id":"ia-5.2_obj","name":"objective","prose":"Determine if the information system, for PKI-based authentication:","parts":[{"id":"ia-5.2.a_obj","name":"objective","props":[{"name":"label","value":"IA-5(2)(a)"}],"parts":[{"id":"ia-5.2.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(2)(a)[1]"}],"prose":"validates certifications by constructing a certification path to an accepted trust anchor;"},{"id":"ia-5.2.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(2)(a)[2]"}],"prose":"validates certifications by verifying a certification path to an accepted trust anchor;"},{"id":"ia-5.2.a_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(2)(a)[3]"}],"prose":"includes checking certificate status information when constructing and verifying the certification path;"}],"links":[{"href":"#ia-5.2_smt.a","rel":"corresp"}]},{"id":"ia-5.2.b_obj","name":"objective","props":[{"name":"label","value":"IA-5(2)(b)"}],"prose":"enforces authorized access to the corresponding private key;","links":[{"href":"#ia-5.2_smt.b","rel":"corresp"}]},{"id":"ia-5.2.c_obj","name":"objective","props":[{"name":"label","value":"IA-5(2)(c)"}],"prose":"maps the authenticated identity to the account of the individual or group; and","links":[{"href":"#ia-5.2_smt.c","rel":"corresp"}]},{"id":"ia-5.2.d_obj","name":"objective","props":[{"name":"label","value":"IA-5(2)(d)"}],"prose":"implements a local cache of revocation data to support path discovery and validation in case of inability to access revocation information via the network.","links":[{"href":"#ia-5.2_smt.d","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nPKI certification validation records\n\nPKI certification revocation lists\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with PKI-based, authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing PKI-based, authenticator management capability"}]}]},{"id":"ia-5.3","class":"SP800-53-enhancement","title":"In-person or Trusted Third-party Registration","params":[{"id":"ia-5.3_prm_1","label":"organization-defined types of and\/or specific authenticators"},{"id":"ia-5.3_prm_2","select":{"choice":["in person","by a trusted third party"]}},{"id":"ia-5.3_prm_3","label":"organization-defined registration authority"},{"id":"ia-5.3_prm_4","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"IA-5(3)"},{"name":"sort-id","value":"ia-05.03"}],"parts":[{"id":"ia-5.3_smt","name":"statement","prose":"The organization requires that the registration process to receive {{ insert: param, ia-5.3_prm_1 }} be conducted {{ insert: param, ia-5.3_prm_2 }} before {{ insert: param, ia-5.3_prm_3 }} with authorization by {{ insert: param, ia-5.3_prm_4 }}."},{"id":"ia-5.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ia-5.3_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(3)[1]"}],"prose":"defines types of and\/or specific authenticators to be received in person or by a trusted third party;"},{"id":"ia-5.3_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(3)[2]"}],"prose":"defines the registration authority with oversight of the registration process for receipt of organization-defined types of and\/or specific authenticators;"},{"id":"ia-5.3_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(3)[3]"}],"prose":"defines personnel or roles responsible for authorizing organization-defined registration authority;"},{"id":"ia-5.3_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(3)[4]"}],"prose":"defines if the registration process is to be conducted:","parts":[{"id":"ia-5.3_obj.4.a","name":"objective","props":[{"name":"label","value":"IA-5(3)[4][a]"}],"prose":"in person; or"},{"id":"ia-5.3_obj.4.b","name":"objective","props":[{"name":"label","value":"IA-5(3)[4][b]"}],"prose":"by a trusted third party; and"}]},{"id":"ia-5.3_obj.5","name":"objective","props":[{"name":"label","value":"IA-5(3)[5]"}],"prose":"requires that the registration process to receive organization-defined types of and\/or specific authenticators be conducted in person or by a trusted third party before organization-defined registration authority with authorization by organization-defined personnel or roles."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator management\n\nregistration process for receiving information system authenticators\n\nlist of authenticators requiring in-person registration\n\nlist of authenticators requiring trusted third party registration\n\nauthenticator registration documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\nregistration authority\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ia-5.11","class":"SP800-53-enhancement","title":"Hardware Token-based Authentication","params":[{"id":"ia-5.11_prm_1","label":"organization-defined token quality requirements"}],"props":[{"name":"label","value":"IA-5(11)"},{"name":"sort-id","value":"ia-05.11"}],"parts":[{"id":"ia-5.11_smt","name":"statement","prose":"The information system, for hardware token-based authentication, employs mechanisms that satisfy {{ insert: param, ia-5.11_prm_1 }}."},{"id":"ia-5.11_gdn","name":"guidance","prose":"Hardware token-based authentication typically refers to the use of PKI-based tokens, such as the U.S. Government Personal Identity Verification (PIV) card. Organizations define specific requirements for tokens, such as working with a particular PKI."},{"id":"ia-5.11_obj","name":"objective","prose":"Determine if, for hardware token-based authentication:","parts":[{"id":"ia-5.11_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(11)[1]"}],"prose":"the organization defines token quality requirements to be satisfied; and"},{"id":"ia-5.11_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(11)[2]"}],"prose":"the information system employs mechanisms that satisfy organization-defined token quality requirements."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator management\n\nsecurity plan\n\ninformation system design documentation\n\nautomated mechanisms employing hardware token-based authentication for the information system\n\nlist of token quality requirements\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing hardware token-based authenticator management capability"}]}]}]},{"id":"ia-6","class":"SP800-53","title":"Authenticator Feedback","props":[{"name":"priority","value":"P2"},{"name":"label","value":"IA-6"},{"name":"sort-id","value":"ia-06"}],"parts":[{"id":"ia-6_smt","name":"statement","prose":"The information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation\/use by unauthorized individuals."},{"id":"ia-6_gdn","name":"guidance","prose":"The feedback from information systems does not provide information that would allow unauthorized individuals to compromise authentication mechanisms. For some types of information systems or system components, for example, desktops\/notebooks with relatively large monitors, the threat (often referred to as shoulder surfing) may be significant. For other types of systems or components, for example, mobile devices with 2-4 inch screens, this threat may be less significant, and may need to be balanced against the increased likelihood of typographic input errors due to the small keyboards. Therefore, the means for obscuring the authenticator feedback is selected accordingly. Obscuring the feedback of authentication information includes, for example, displaying asterisks when users type passwords into input devices, or displaying feedback for a very limited time before fully obscuring it.","links":[{"href":"#pe-18","rel":"related"}]},{"id":"ia-6_obj","name":"objective","prose":"Determine if the information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation\/use by unauthorized individuals."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator feedback\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing the obscuring of feedback of authentication information during authentication"}]}]},{"id":"ia-7","class":"SP800-53","title":"Cryptographic Module Authentication","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-7"},{"name":"sort-id","value":"ia-07"}],"links":[{"href":"#39f9087d-7687-46d2-8eda-b6f4b7a4d8a9","rel":"reference"},{"href":"#b09d1a31-d3c9-4138-a4f4-4c63816afd7d","rel":"reference"}],"parts":[{"id":"ia-7_smt","name":"statement","prose":"The information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication."},{"id":"ia-7_gdn","name":"guidance","prose":"Authentication mechanisms may be required within a cryptographic module to authenticate an operator accessing the module and to verify that the operator is authorized to assume the requested role and perform services within that role.","links":[{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"ia-7_obj","name":"objective","prose":"Determine if the information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing cryptographic module authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for cryptographic module authentication\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing cryptographic module authentication"}]}]},{"id":"ia-8","class":"SP800-53","title":"Identification and Authentication (non-organizational Users)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-8"},{"name":"sort-id","value":"ia-08"}],"links":[{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#74e740a4-c45d-49f3-a86e-eb747c549e01","rel":"reference"},{"href":"#599fe9ba-4750-4450-9eeb-b95bd19a5e8f","rel":"reference"},{"href":"#ba557c91-ba3e-4792-adc6-a4ae479b39ff","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#2157bb7e-192c-4eaa-877f-93ef6b0a3292","rel":"reference"},{"href":"#654f21e2-f3bc-43b2-abdc-60ab8d09744b","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ia-8_smt","name":"statement","prose":"The information system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users)."},{"id":"ia-8_gdn","name":"guidance","prose":"Non-organizational users include information system users other than organizational users explicitly covered by IA-2. These individuals are uniquely identified and authenticated for accesses other than those accesses explicitly identified and documented in AC-14. In accordance with the E-Authentication E-Government initiative, authentication of non-organizational users accessing federal information systems may be required to protect federal, proprietary, or privacy-related information (with exceptions noted for national security systems). Organizations use risk assessments to determine authentication needs and consider scalability, practicality, and security in balancing the need to ensure ease of use for access to federal information and information systems with the need to protect and adequately mitigate risk. IA-2 addresses identification and authentication requirements for access to information systems by organizational users.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#sc-8","rel":"related"}]},{"id":"ia-8_obj","name":"objective","prose":"Determine if the information system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users)."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability"}]}],"controls":[{"id":"ia-8.1","class":"SP800-53-enhancement","title":"Acceptance of PIV Credentials from Other Agencies","props":[{"name":"label","value":"IA-8(1)"},{"name":"sort-id","value":"ia-08.01"}],"parts":[{"id":"ia-8.1_smt","name":"statement","prose":"The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials from other federal agencies."},{"id":"ia-8.1_gdn","name":"guidance","prose":"This control enhancement applies to logical access control systems (LACS) and physical access control systems (PACS). Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11 requires federal agencies to continue implementing the requirements specified in HSPD-12 to enable agency-wide use of PIV credentials.","links":[{"href":"#au-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#sa-4","rel":"related"}]},{"id":"ia-8.1_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"ia-8.1_obj.1","name":"objective","props":[{"name":"label","value":"IA-8(1)[1]"}],"prose":"accepts Personal Identity Verification (PIV) credentials from other agencies; and"},{"id":"ia-8.1_obj.2","name":"objective","props":[{"name":"label","value":"IA-8(1)[2]"}],"prose":"electronically verifies Personal Identity Verification (PIV) credentials from other agencies."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nPIV verification records\n\nevidence of PIV credentials\n\nPIV credential authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms that accept and verify PIV credentials"}]}]},{"id":"ia-8.2","class":"SP800-53-enhancement","title":"Acceptance of Third-party Credentials","props":[{"name":"label","value":"IA-8(2)"},{"name":"sort-id","value":"ia-08.02"}],"parts":[{"id":"ia-8.2_smt","name":"statement","prose":"The information system accepts only FICAM-approved third-party credentials."},{"id":"ia-8.2_gdn","name":"guidance","prose":"This control enhancement typically applies to organizational information systems that are accessible to the general public, for example, public-facing websites. Third-party credentials are those credentials issued by nonfederal government entities approved by the Federal Identity, Credential, and Access Management (FICAM) Trust Framework Solutions initiative. Approved third-party credentials meet or exceed the set of minimum federal government-wide technical, security, privacy, and organizational maturity requirements. This allows federal government relying parties to trust such credentials at their approved assurance levels.","links":[{"href":"#au-2","rel":"related"}]},{"id":"ia-8.2_obj","name":"objective","prose":"Determine if the information system accepts only FICAM-approved third-party credentials."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of FICAM-approved, third-party credentialing products, components, or services procured and implemented by organization\n\nthird-party credential verification records\n\nevidence of FICAM-approved third-party credentials\n\nthird-party credential authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms that accept FICAM-approved credentials"}]}]},{"id":"ia-8.3","class":"SP800-53-enhancement","title":"Use of Ficam-approved Products","params":[{"id":"ia-8.3_prm_1","label":"organization-defined information systems"}],"props":[{"name":"label","value":"IA-8(3)"},{"name":"sort-id","value":"ia-08.03"}],"parts":[{"id":"ia-8.3_smt","name":"statement","prose":"The organization employs only FICAM-approved information system components in {{ insert: param, ia-8.3_prm_1 }} to accept third-party credentials."},{"id":"ia-8.3_gdn","name":"guidance","prose":"This control enhancement typically applies to information systems that are accessible to the general public, for example, public-facing websites. FICAM-approved information system components include, for example, information technology products and software libraries that have been approved by the Federal Identity, Credential, and Access Management conformance program.","links":[{"href":"#sa-4","rel":"related"}]},{"id":"ia-8.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ia-8.3_obj.1","name":"objective","props":[{"name":"label","value":"IA-8(3)[1]"}],"prose":"defines information systems in which only FICAM-approved information system components are to be employed to accept third-party credentials; and"},{"id":"ia-8.3_obj.2","name":"objective","props":[{"name":"label","value":"IA-8(3)[2]"}],"prose":"employs only FICAM-approved information system components in organization-defined information systems to accept third-party credentials."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nsystem and services acquisition policy\n\nprocedures addressing user identification and authentication\n\nprocedures addressing the integration of security requirements into the acquisition process\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nthird-party credential validations\n\nthird-party credential authorizations\n\nthird-party credential records\n\nlist of FICAM-approved information system components procured and implemented by organization\n\nacquisition documentation\n\nacquisition contracts for information system procurements or services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information system security, acquisition, and contracting responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability"}]}]},{"id":"ia-8.4","class":"SP800-53-enhancement","title":"Use of Ficam-issued Profiles","props":[{"name":"label","value":"IA-8(4)"},{"name":"sort-id","value":"ia-08.04"}],"parts":[{"id":"ia-8.4_smt","name":"statement","prose":"The information system conforms to FICAM-issued profiles."},{"id":"ia-8.4_gdn","name":"guidance","prose":"This control enhancement addresses open identity management standards. To ensure that these standards are viable, robust, reliable, sustainable (e.g., available in commercial information technology products), and interoperable as documented, the United States Government assesses and scopes identity management standards and technology implementations against applicable federal legislation, directives, policies, and requirements. The result is FICAM-issued implementation profiles of approved protocols (e.g., FICAM authentication protocols such as SAML 2.0 and OpenID 2.0, as well as other protocols such as the FICAM Backend Attribute Exchange).","links":[{"href":"#sa-4","rel":"related"}]},{"id":"ia-8.4_obj","name":"objective","prose":"Determine if the information system conforms to FICAM-issued profiles."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nsystem and services acquisition policy\n\nprocedures addressing user identification and authentication\n\nprocedures addressing the integration of security requirements into the acquisition process\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of FICAM-issued profiles and associated, approved protocols\n\nacquisition documentation\n\nacquisition contracts for information system procurements or services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms supporting and\/or implementing conformance with FICAM-issued profiles"}]}]}]}]},{"id":"ir","class":"family","title":"Incident Response","controls":[{"id":"ir-1","class":"SP800-53","title":"Incident Response Policy and Procedures","params":[{"id":"ir-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ir-1_prm_2","label":"organization-defined frequency"},{"id":"ir-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-1"},{"name":"sort-id","value":"ir-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"},{"href":"#6d431fee-658f-4a0e-9f2e-a38b5d398fab","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ir-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ir-1_prm_1 }}:","parts":[{"id":"ir-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An incident response policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ir-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the incident response policy and associated incident response controls; and"}]},{"id":"ir-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ir-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Incident response policy {{ insert: param, ir-1_prm_2 }}; and"},{"id":"ir-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Incident response procedures {{ insert: param, ir-1_prm_3 }}."}]}]},{"id":"ir-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the IR family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ir-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-1.a_obj","name":"objective","props":[{"name":"label","value":"IR-1(a)"}],"parts":[{"id":"ir-1.a.1_obj","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)"}],"parts":[{"id":"ir-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1]"}],"prose":"develops and documents an incident response policy that addresses:","parts":[{"id":"ir-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ir-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ir-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ir-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ir-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ir-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ir-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ir-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the incident response policy is to be disseminated;"},{"id":"ir-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[3]"}],"prose":"disseminates the incident response policy to organization-defined personnel or roles;"}]},{"id":"ir-1.a.2_obj","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)"}],"parts":[{"id":"ir-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the incident response policy and associated incident response controls;"},{"id":"ir-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ir-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ir-1.b_obj","name":"objective","props":[{"name":"label","value":"IR-1(b)"}],"parts":[{"id":"ir-1.b.1_obj","name":"objective","props":[{"name":"label","value":"IR-1(b)(1)"}],"parts":[{"id":"ir-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current incident response policy;"},{"id":"ir-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(b)(1)[2]"}],"prose":"reviews and updates the current incident response policy with the organization-defined frequency;"}]},{"id":"ir-1.b.2_obj","name":"objective","props":[{"name":"label","value":"IR-1(b)(2)"}],"parts":[{"id":"ir-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current incident response procedures; and"},{"id":"ir-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(b)(2)[2]"}],"prose":"reviews and updates the current incident response procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ir-2","class":"SP800-53","title":"Incident Response Training","params":[{"id":"ir-2_prm_1","label":"organization-defined time period"},{"id":"ir-2_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"IR-2"},{"name":"sort-id","value":"ir-02"}],"links":[{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"ir-2_smt","name":"statement","prose":"The organization provides incident response training to information system users consistent with assigned roles and responsibilities:","parts":[{"id":"ir-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Within {{ insert: param, ir-2_prm_1 }} of assuming an incident response role or responsibility;"},{"id":"ir-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"ir-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, ir-2_prm_2 }} thereafter."}]},{"id":"ir-2_gdn","name":"guidance","prose":"Incident response training provided by organizations is linked to the assigned roles and responsibilities of organizational personnel to ensure the appropriate content and level of detail is included in such training. For example, regular users may only need to know who to call or how to recognize an incident on the information system; system administrators may require additional training on how to handle\/remediate incidents; and incident responders may receive more specific training on forensics, reporting, system recovery, and restoration. Incident response training includes user training in the identification and reporting of suspicious activities, both from external and internal sources.","links":[{"href":"#at-3","rel":"related"},{"href":"#cp-3","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"ir-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-2.a_obj","name":"objective","props":[{"name":"label","value":"IR-2(a)"}],"parts":[{"id":"ir-2.a_obj.1","name":"objective","props":[{"name":"label","value":"IR-2(a)[1]"}],"prose":"defines a time period within which incident response training is to be provided to information system users assuming an incident response role or responsibility;"},{"id":"ir-2.a_obj.2","name":"objective","props":[{"name":"label","value":"IR-2(a)[2]"}],"prose":"provides incident response training to information system users consistent with assigned roles and responsibilities within the organization-defined time period of assuming an incident response role or responsibility;"}]},{"id":"ir-2.b_obj","name":"objective","props":[{"name":"label","value":"IR-2(b)"}],"prose":"provides incident response training to information system users consistent with assigned roles and responsibilities when required by information system changes;"},{"id":"ir-2.c_obj","name":"objective","props":[{"name":"label","value":"IR-2(c)"}],"parts":[{"id":"ir-2.c_obj.1","name":"objective","props":[{"name":"label","value":"IR-2(c)[1]"}],"prose":"defines the frequency to provide refresher incident response training to information system users consistent with assigned roles or responsibilities; and"},{"id":"ir-2.c_obj.2","name":"objective","props":[{"name":"label","value":"IR-2(c)[2]"}],"prose":"after the initial incident response training, provides refresher incident response training to information system users consistent with assigned roles and responsibilities in accordance with the organization-defined frequency to provide refresher training."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response training\n\nincident response training curriculum\n\nincident response training materials\n\nsecurity plan\n\nincident response plan\n\nsecurity plan\n\nincident response training records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response training and operational responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ir-3","class":"SP800-53","title":"Incident Response Testing","params":[{"id":"ir-3_prm_1","label":"organization-defined frequency"},{"id":"ir-3_prm_2","label":"organization-defined tests"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"IR-3"},{"name":"sort-id","value":"ir-03"}],"links":[{"href":"#0243a05a-e8a3-4d51-9364-4a9d20b0dcdf","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"}],"parts":[{"id":"ir-3_smt","name":"statement","prose":"The organization tests the incident response capability for the information system {{ insert: param, ir-3_prm_1 }} using {{ insert: param, ir-3_prm_2 }} to determine the incident response effectiveness and documents the results."},{"id":"ir-3_gdn","name":"guidance","prose":"Organizations test incident response capabilities to determine the overall effectiveness of the capabilities and to identify potential weaknesses or deficiencies. Incident response testing includes, for example, the use of checklists, walk-through or tabletop exercises, simulations (parallel\/full interrupt), and comprehensive exercises. Incident response testing can also include a determination of the effects on organizational operations (e.g., reduction in mission capabilities), organizational assets, and individuals due to incident response.","links":[{"href":"#cp-4","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"ir-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-3_obj.1","name":"objective","props":[{"name":"label","value":"IR-3[1]"}],"prose":"defines incident response tests to test the incident response capability for the information system;"},{"id":"ir-3_obj.2","name":"objective","props":[{"name":"label","value":"IR-3[2]"}],"prose":"defines the frequency to test the incident response capability for the information system; and"},{"id":"ir-3_obj.3","name":"objective","props":[{"name":"label","value":"IR-3[3]"}],"prose":"tests the incident response capability for the information system with the organization-defined frequency, using organization-defined tests to determine the incident response effectiveness and documents the results."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\ncontingency planning policy\n\nprocedures addressing incident response testing\n\nprocedures addressing contingency plan testing\n\nincident response testing material\n\nincident response test results\n\nincident response test plan\n\nincident response plan\n\ncontingency plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response testing responsibilities\n\norganizational personnel with information security responsibilities"}]}],"controls":[{"id":"ir-3.2","class":"SP800-53-enhancement","title":"Coordination with Related Plans","props":[{"name":"label","value":"IR-3(2)"},{"name":"sort-id","value":"ir-03.02"}],"parts":[{"id":"ir-3.2_smt","name":"statement","prose":"The organization coordinates incident response testing with organizational elements responsible for related plans."},{"id":"ir-3.2_gdn","name":"guidance","prose":"Organizational plans related to incident response testing include, for example, Business Continuity Plans, Contingency Plans, Disaster Recovery Plans, Continuity of Operations Plans, Crisis Communications Plans, Critical Infrastructure Plans, and Occupant Emergency Plans."},{"id":"ir-3.2_obj","name":"objective","prose":"Determine if the organization coordinates incident response testing with organizational elements responsible for related plans."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\ncontingency planning policy\n\nprocedures addressing incident response testing\n\nincident response testing documentation\n\nincident response plan\n\nbusiness continuity plans\n\ncontingency plans\n\ndisaster recovery plans\n\ncontinuity of operations plans\n\ncrisis communications plans\n\ncritical infrastructure plans\n\noccupant emergency plans\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response testing responsibilities\n\norganizational personnel with responsibilities for testing organizational plans related to incident response testing\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"ir-4","class":"SP800-53","title":"Incident Handling","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-4"},{"name":"sort-id","value":"ir-04"}],"links":[{"href":"#c5034e0c-eba6-4ecd-a541-79f0678f4ba4","rel":"reference"},{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"}],"parts":[{"id":"ir-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Implements an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery;"},{"id":"ir-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Coordinates incident handling activities with contingency planning activities; and"},{"id":"ir-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Incorporates lessons learned from ongoing incident handling activities into incident response procedures, training, and testing, and implements the resulting changes accordingly."}]},{"id":"ir-4_gdn","name":"guidance","prose":"Organizations recognize that incident response capability is dependent on the capabilities of organizational information systems and the mission\/business processes being supported by those systems. Therefore, organizations consider incident response as part of the definition, design, and development of mission\/business processes and information systems. Incident-related information can be obtained from a variety of sources including, for example, audit monitoring, network monitoring, physical access monitoring, user\/administrator reports, and reported supply chain events. Effective incident handling capability includes coordination among many organizational entities including, for example, mission\/business owners, information system owners, authorizing officials, human resources offices, physical and personnel security offices, legal departments, operations personnel, procurement offices, and the risk executive (function).","links":[{"href":"#au-6","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#cp-4","rel":"related"},{"href":"#ir-2","rel":"related"},{"href":"#ir-3","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#pe-6","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"ir-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-4.a_obj","name":"objective","props":[{"name":"label","value":"IR-4(a)"}],"prose":"implements an incident handling capability for security incidents that includes:","parts":[{"id":"ir-4.a_obj.1","name":"objective","props":[{"name":"label","value":"IR-4(a)[1]"}],"prose":"preparation;"},{"id":"ir-4.a_obj.2","name":"objective","props":[{"name":"label","value":"IR-4(a)[2]"}],"prose":"detection and analysis;"},{"id":"ir-4.a_obj.3","name":"objective","props":[{"name":"label","value":"IR-4(a)[3]"}],"prose":"containment;"},{"id":"ir-4.a_obj.4","name":"objective","props":[{"name":"label","value":"IR-4(a)[4]"}],"prose":"eradication;"},{"id":"ir-4.a_obj.5","name":"objective","props":[{"name":"label","value":"IR-4(a)[5]"}],"prose":"recovery;"}]},{"id":"ir-4.b_obj","name":"objective","props":[{"name":"label","value":"IR-4(b)"}],"prose":"coordinates incident handling activities with contingency planning activities;"},{"id":"ir-4.c_obj","name":"objective","props":[{"name":"label","value":"IR-4(c)"}],"parts":[{"id":"ir-4.c_obj.1","name":"objective","props":[{"name":"label","value":"IR-4(c)[1]"}],"prose":"incorporates lessons learned from ongoing incident handling activities into:","parts":[{"id":"ir-4.c_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-4(c)[1][a]"}],"prose":"incident response procedures;"},{"id":"ir-4.c_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-4(c)[1][b]"}],"prose":"training;"},{"id":"ir-4.c_obj.1.c","name":"objective","props":[{"name":"label","value":"IR-4(c)[1][c]"}],"prose":"testing\/exercises;"}]},{"id":"ir-4.c_obj.2","name":"objective","props":[{"name":"label","value":"IR-4(c)[2]"}],"prose":"implements the resulting changes accordingly to:","parts":[{"id":"ir-4.c_obj.2.a","name":"objective","props":[{"name":"label","value":"IR-4(c)[2][a]"}],"prose":"incident response procedures;"},{"id":"ir-4.c_obj.2.b","name":"objective","props":[{"name":"label","value":"IR-4(c)[2][b]"}],"prose":"training; and"},{"id":"ir-4.c_obj.2.c","name":"objective","props":[{"name":"label","value":"IR-4(c)[2][c]"}],"prose":"testing\/exercises."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\ncontingency planning policy\n\nprocedures addressing incident handling\n\nincident response plan\n\ncontingency plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident handling responsibilities\n\norganizational personnel with contingency planning responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Incident handling capability for the organization"}]}],"controls":[{"id":"ir-4.1","class":"SP800-53-enhancement","title":"Automated Incident Handling Processes","props":[{"name":"label","value":"IR-4(1)"},{"name":"sort-id","value":"ir-04.01"}],"parts":[{"id":"ir-4.1_smt","name":"statement","prose":"The organization employs automated mechanisms to support the incident handling process."},{"id":"ir-4.1_gdn","name":"guidance","prose":"Automated mechanisms supporting incident handling processes include, for example, online incident management systems."},{"id":"ir-4.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to support the incident handling process."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident handling\n\nautomated mechanisms supporting incident handling\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident handling responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms that support and\/or implement the incident handling process"}]}]}]},{"id":"ir-5","class":"SP800-53","title":"Incident Monitoring","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-5"},{"name":"sort-id","value":"ir-05"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"}],"parts":[{"id":"ir-5_smt","name":"statement","prose":"The organization tracks and documents information system security incidents."},{"id":"ir-5_gdn","name":"guidance","prose":"Documenting information system security incidents includes, for example, maintaining records about each incident, the status of the incident, and other pertinent information necessary for forensics, evaluating incident details, trends, and handling. Incident information can be obtained from a variety of sources including, for example, incident reports, incident response teams, audit monitoring, network monitoring, physical access monitoring, and user\/administrator reports.","links":[{"href":"#au-6","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#pe-6","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"ir-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-5_obj.1","name":"objective","props":[{"name":"label","value":"IR-5[1]"}],"prose":"tracks information system security incidents; and"},{"id":"ir-5_obj.2","name":"objective","props":[{"name":"label","value":"IR-5[2]"}],"prose":"documents information system security incidents."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident monitoring\n\nincident response records and documentation\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident monitoring responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Incident monitoring capability for the organization\n\nautomated mechanisms supporting and\/or implementing tracking and documenting of system security incidents"}]}]},{"id":"ir-6","class":"SP800-53","title":"Incident Reporting","params":[{"id":"ir-6_prm_1","label":"organization-defined time period"},{"id":"ir-6_prm_2","label":"organization-defined authorities"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-6"},{"name":"sort-id","value":"ir-06"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"},{"href":"#02631467-668b-4233-989b-3dfded2fd184","rel":"reference"}],"parts":[{"id":"ir-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Requires personnel to report suspected security incidents to the organizational incident response capability within {{ insert: param, ir-6_prm_1 }}; and"},{"id":"ir-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reports security incident information to {{ insert: param, ir-6_prm_2 }}."}]},{"id":"ir-6_gdn","name":"guidance","prose":"The intent of this control is to address both specific incident reporting requirements within an organization and the formal incident reporting requirements for federal agencies and their subordinate organizations. Suspected security incidents include, for example, the receipt of suspicious email communications that can potentially contain malicious code. The types of security incidents reported, the content and timeliness of the reports, and the designated reporting authorities reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Current federal policy requires that all federal agencies (unless specifically exempted from such requirements) report security incidents to the United States Computer Emergency Readiness Team (US-CERT) within specified time frames designated in the US-CERT Concept of Operations for Federal Cyber Security Incident Handling.","links":[{"href":"#ir-4","rel":"related"},{"href":"#ir-5","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"ir-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-6.a_obj","name":"objective","props":[{"name":"label","value":"IR-6(a)"}],"parts":[{"id":"ir-6.a_obj.1","name":"objective","props":[{"name":"label","value":"IR-6(a)[1]"}],"prose":"defines the time period within which personnel report suspected security incidents to the organizational incident response capability;"},{"id":"ir-6.a_obj.2","name":"objective","props":[{"name":"label","value":"IR-6(a)[2]"}],"prose":"requires personnel to report suspected security incidents to the organizational incident response capability within the organization-defined time period;"}]},{"id":"ir-6.b_obj","name":"objective","props":[{"name":"label","value":"IR-6(b)"}],"parts":[{"id":"ir-6.b_obj.1","name":"objective","props":[{"name":"label","value":"IR-6(b)[1]"}],"prose":"defines authorities to whom security incident information is to be reported; and"},{"id":"ir-6.b_obj.2","name":"objective","props":[{"name":"label","value":"IR-6(b)[2]"}],"prose":"reports security incident information to organization-defined authorities."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident reporting\n\nincident reporting records and documentation\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident reporting responsibilities\n\norganizational personnel with information security responsibilities\n\npersonnel who have\/should have reported incidents\n\npersonnel (authorities) to whom incident information is to be reported"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incident reporting\n\nautomated mechanisms supporting and\/or implementing incident reporting"}]}],"controls":[{"id":"ir-6.1","class":"SP800-53-enhancement","title":"Automated Reporting","props":[{"name":"label","value":"IR-6(1)"},{"name":"sort-id","value":"ir-06.01"}],"parts":[{"id":"ir-6.1_smt","name":"statement","prose":"The organization employs automated mechanisms to assist in the reporting of security incidents."},{"id":"ir-6.1_gdn","name":"guidance","links":[{"href":"#ir-7","rel":"related"}]},{"id":"ir-6.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to assist in the reporting of security incidents."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident reporting\n\nautomated mechanisms supporting incident reporting\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident reporting responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incident reporting\n\nautomated mechanisms supporting and\/or implementing reporting of security incidents"}]}]}]},{"id":"ir-7","class":"SP800-53","title":"Incident Response Assistance","props":[{"name":"priority","value":"P2"},{"name":"label","value":"IR-7"},{"name":"sort-id","value":"ir-07"}],"parts":[{"id":"ir-7_smt","name":"statement","prose":"The organization provides an incident response support resource, integral to the organizational incident response capability that offers advice and assistance to users of the information system for the handling and reporting of security incidents."},{"id":"ir-7_gdn","name":"guidance","prose":"Incident response support resources provided by organizations include, for example, help desks, assistance groups, and access to forensics services, when required.","links":[{"href":"#at-2","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ir-6","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#sa-9","rel":"related"}]},{"id":"ir-7_obj","name":"objective","prose":"Determine if the organization provides an incident response support resource:","parts":[{"id":"ir-7_obj.1","name":"objective","props":[{"name":"label","value":"IR-7[1]"}],"prose":"that is integral to the organizational incident response capability; and"},{"id":"ir-7_obj.2","name":"objective","props":[{"name":"label","value":"IR-7[2]"}],"prose":"that offers advice and assistance to users of the information system for the handling and reporting of security incidents."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response assistance\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response assistance and support responsibilities\n\norganizational personnel with access to incident response support and assistance capability\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incident response assistance\n\nautomated mechanisms supporting and\/or implementing incident response assistance"}]}],"controls":[{"id":"ir-7.1","class":"SP800-53-enhancement","title":"Automation Support for Availability of Information \/ Support","props":[{"name":"label","value":"IR-7(1)"},{"name":"sort-id","value":"ir-07.01"}],"parts":[{"id":"ir-7.1_smt","name":"statement","prose":"The organization employs automated mechanisms to increase the availability of incident response-related information and support."},{"id":"ir-7.1_gdn","name":"guidance","prose":"Automated mechanisms can provide a push and\/or pull capability for users to obtain incident response assistance. For example, individuals might have access to a website to query the assistance capability, or conversely, the assistance capability may have the ability to proactively send information to users (general distribution or targeted) as part of increasing understanding of current response capabilities and support."},{"id":"ir-7.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to increase the availability of incident response-related information and support."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response assistance\n\nautomated mechanisms supporting incident response support and assistance\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response support and assistance responsibilities\n\norganizational personnel with access to incident response support and assistance capability\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incident response assistance\n\nautomated mechanisms supporting and\/or implementing an increase in the availability of incident response information and support"}]}]}]},{"id":"ir-8","class":"SP800-53","title":"Incident Response Plan","params":[{"id":"ir-8_prm_1","label":"organization-defined personnel or roles"},{"id":"ir-8_prm_2","label":"organization-defined incident response personnel (identified by name and\/or by role) and organizational elements"},{"id":"ir-8_prm_3","label":"organization-defined frequency"},{"id":"ir-8_prm_4","label":"organization-defined incident response personnel (identified by name and\/or by role) and organizational elements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-8"},{"name":"sort-id","value":"ir-08"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"}],"parts":[{"id":"ir-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops an incident response plan that:","parts":[{"id":"ir-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Provides the organization with a roadmap for implementing its incident response capability;"},{"id":"ir-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Describes the structure and organization of the incident response capability;"},{"id":"ir-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Provides a high-level approach for how the incident response capability fits into the overall organization;"},{"id":"ir-8_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Meets the unique requirements of the organization, which relate to mission, size, structure, and functions;"},{"id":"ir-8_smt.a.5","name":"item","props":[{"name":"label","value":"5."}],"prose":"Defines reportable incidents;"},{"id":"ir-8_smt.a.6","name":"item","props":[{"name":"label","value":"6."}],"prose":"Provides metrics for measuring the incident response capability within the organization;"},{"id":"ir-8_smt.a.7","name":"item","props":[{"name":"label","value":"7."}],"prose":"Defines the resources and management support needed to effectively maintain and mature an incident response capability; and"},{"id":"ir-8_smt.a.8","name":"item","props":[{"name":"label","value":"8."}],"prose":"Is reviewed and approved by {{ insert: param, ir-8_prm_1 }};"}]},{"id":"ir-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Distributes copies of the incident response plan to {{ insert: param, ir-8_prm_2 }};"},{"id":"ir-8_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the incident response plan {{ insert: param, ir-8_prm_3 }};"},{"id":"ir-8_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Updates the incident response plan to address system\/organizational changes or problems encountered during plan implementation, execution, or testing;"},{"id":"ir-8_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Communicates incident response plan changes to {{ insert: param, ir-8_prm_4 }}; and"},{"id":"ir-8_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Protects the incident response plan from unauthorized disclosure and modification."}]},{"id":"ir-8_gdn","name":"guidance","prose":"It is important that organizations develop and implement a coordinated approach to incident response. Organizational missions, business functions, strategies, goals, and objectives for incident response help to determine the structure of incident response capabilities. As part of a comprehensive incident response capability, organizations consider the coordination and sharing of information with external organizations, including, for example, external service providers and organizations involved in the supply chain for organizational information systems.","links":[{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"}]},{"id":"ir-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-8.a_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)"}],"prose":"develops an incident response plan that:","parts":[{"id":"ir-8.a.1_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(1)"}],"prose":"provides the organization with a roadmap for implementing its incident response capability;"},{"id":"ir-8.a.2_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(2)"}],"prose":"describes the structure and organization of the incident response capability;"},{"id":"ir-8.a.3_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(3)"}],"prose":"provides a high-level approach for how the incident response capability fits into the overall organization;"},{"id":"ir-8.a.4_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)"}],"prose":"meets the unique requirements of the organization, which relate to:","parts":[{"id":"ir-8.a.4_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[1]"}],"prose":"mission;"},{"id":"ir-8.a.4_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[2]"}],"prose":"size;"},{"id":"ir-8.a.4_obj.3","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[3]"}],"prose":"structure;"},{"id":"ir-8.a.4_obj.4","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[4]"}],"prose":"functions;"}]},{"id":"ir-8.a.5_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(5)"}],"prose":"defines reportable incidents;"},{"id":"ir-8.a.6_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(6)"}],"prose":"provides metrics for measuring the incident response capability within the organization;"},{"id":"ir-8.a.7_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(7)"}],"prose":"defines the resources and management support needed to effectively maintain and mature an incident response capability;"},{"id":"ir-8.a.8_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(8)"}],"parts":[{"id":"ir-8.a.8_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(a)(8)[1]"}],"prose":"defines personnel or roles to review and approve the incident response plan;"},{"id":"ir-8.a.8_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(a)(8)[2]"}],"prose":"is reviewed and approved by organization-defined personnel or roles;"}]}]},{"id":"ir-8.b_obj","name":"objective","props":[{"name":"label","value":"IR-8(b)"}],"parts":[{"id":"ir-8.b_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(b)[1]"}],"parts":[{"id":"ir-8.b_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-8(b)[1][a]"}],"prose":"defines incident response personnel (identified by name and\/or by role) to whom copies of the incident response plan are to be distributed;"},{"id":"ir-8.b_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-8(b)[1][b]"}],"prose":"defines organizational elements to whom copies of the incident response plan are to be distributed;"}]},{"id":"ir-8.b_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(b)[2]"}],"prose":"distributes copies of the incident response plan to organization-defined incident response personnel (identified by name and\/or by role) and organizational elements;"}]},{"id":"ir-8.c_obj","name":"objective","props":[{"name":"label","value":"IR-8(c)"}],"parts":[{"id":"ir-8.c_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(c)[1]"}],"prose":"defines the frequency to review the incident response plan;"},{"id":"ir-8.c_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(c)[2]"}],"prose":"reviews the incident response plan with the organization-defined frequency;"}]},{"id":"ir-8.d_obj","name":"objective","props":[{"name":"label","value":"IR-8(d)"}],"prose":"updates the incident response plan to address system\/organizational changes or problems encountered during plan:","parts":[{"id":"ir-8.d_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(d)[1]"}],"prose":"implementation;"},{"id":"ir-8.d_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(d)[2]"}],"prose":"execution; or"},{"id":"ir-8.d_obj.3","name":"objective","props":[{"name":"label","value":"IR-8(d)[3]"}],"prose":"testing;"}]},{"id":"ir-8.e_obj","name":"objective","props":[{"name":"label","value":"IR-8(e)"}],"parts":[{"id":"ir-8.e_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(e)[1]"}],"parts":[{"id":"ir-8.e_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-8(e)[1][a]"}],"prose":"defines incident response personnel (identified by name and\/or by role) to whom incident response plan changes are to be communicated;"},{"id":"ir-8.e_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-8(e)[1][b]"}],"prose":"defines organizational elements to whom incident response plan changes are to be communicated;"}]},{"id":"ir-8.e_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(e)[2]"}],"prose":"communicates incident response plan changes to organization-defined incident response personnel (identified by name and\/or by role) and organizational elements; and"}]},{"id":"ir-8.f_obj","name":"objective","props":[{"name":"label","value":"IR-8(f)"}],"prose":"protects the incident response plan from unauthorized disclosure and modification."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response planning\n\nincident response plan\n\nrecords of incident response plan reviews and approvals\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response planning responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational incident response plan and related organizational processes"}]}]}]},{"id":"ma","class":"family","title":"Maintenance","controls":[{"id":"ma-1","class":"SP800-53","title":"System Maintenance Policy and Procedures","params":[{"id":"ma-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ma-1_prm_2","label":"organization-defined frequency"},{"id":"ma-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MA-1"},{"name":"sort-id","value":"ma-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ma-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ma-1_prm_1 }}:","parts":[{"id":"ma-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system maintenance policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ma-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system maintenance policy and associated system maintenance controls; and"}]},{"id":"ma-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ma-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System maintenance policy {{ insert: param, ma-1_prm_2 }}; and"},{"id":"ma-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System maintenance procedures {{ insert: param, ma-1_prm_3 }}."}]}]},{"id":"ma-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the MA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ma-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-1.a_obj","name":"objective","props":[{"name":"label","value":"MA-1(a)"}],"parts":[{"id":"ma-1.a.1_obj","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)"}],"parts":[{"id":"ma-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1]"}],"prose":"develops and documents a system maintenance policy that addresses:","parts":[{"id":"ma-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ma-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ma-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ma-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ma-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ma-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ma-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ma-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system maintenance policy is to be disseminated;"},{"id":"ma-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[3]"}],"prose":"disseminates the system maintenance policy to organization-defined personnel or roles;"}]},{"id":"ma-1.a.2_obj","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)"}],"parts":[{"id":"ma-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the maintenance policy and associated system maintenance controls;"},{"id":"ma-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ma-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ma-1.b_obj","name":"objective","props":[{"name":"label","value":"MA-1(b)"}],"parts":[{"id":"ma-1.b.1_obj","name":"objective","props":[{"name":"label","value":"MA-1(b)(1)"}],"parts":[{"id":"ma-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system maintenance policy;"},{"id":"ma-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(b)(1)[2]"}],"prose":"reviews and updates the current system maintenance policy with the organization-defined frequency;"}]},{"id":"ma-1.b.2_obj","name":"objective","props":[{"name":"label","value":"MA-1(b)(2)"}],"parts":[{"id":"ma-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system maintenance procedures; and"},{"id":"ma-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(b)(2)[2]"}],"prose":"reviews and updates the current system maintenance procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Maintenance policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ma-2","class":"SP800-53","title":"Controlled Maintenance","params":[{"id":"ma-2_prm_1","label":"organization-defined personnel or roles"},{"id":"ma-2_prm_2","label":"organization-defined maintenance-related information"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-2"},{"name":"sort-id","value":"ma-02"}],"parts":[{"id":"ma-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Schedules, performs, documents, and reviews records of maintenance and repairs on information system components in accordance with manufacturer or vendor specifications and\/or organizational requirements;"},{"id":"ma-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Approves and monitors all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;"},{"id":"ma-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Requires that {{ insert: param, ma-2_prm_1 }} explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions; and"},{"id":"ma-2_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Includes {{ insert: param, ma-2_prm_2 }} in organizational maintenance records."}]},{"id":"ma-2_gdn","name":"guidance","prose":"This control addresses the information security aspects of the information system maintenance program and applies to all types of maintenance to any system component (including applications) conducted by any local or nonlocal entity (e.g., in-contract, warranty, in-house, software maintenance agreement). System maintenance also includes those components not directly associated with information processing and\/or data\/information retention such as scanners, copiers, and printers. Information necessary for creating effective maintenance records includes, for example: (i) date and time of maintenance; (ii) name of individuals or group performing the maintenance; (iii) name of escort, if necessary; (iv) a description of the maintenance performed; and (v) information system components\/equipment removed or replaced (including identification numbers, if applicable). The level of detail included in maintenance records can be informed by the security categories of organizational information systems. Organizations consider supply chain issues associated with replacement components for information systems.","links":[{"href":"#cm-3","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-6","rel":"related"},{"href":"#pe-16","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"ma-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-2.a_obj","name":"objective","props":[{"name":"label","value":"MA-2(a)"}],"parts":[{"id":"ma-2.a_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(a)[1]"}],"prose":"schedules maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.1.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[1][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.1.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[1][b]"}],"prose":"organizational requirements;"}]},{"id":"ma-2.a_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(a)[2]"}],"prose":"performs maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.2.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[2][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.2.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[2][b]"}],"prose":"organizational requirements;"}]},{"id":"ma-2.a_obj.3","name":"objective","props":[{"name":"label","value":"MA-2(a)[3]"}],"prose":"documents maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.3.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[3][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.3.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[3][b]"}],"prose":"organizational requirements;"}]},{"id":"ma-2.a_obj.4","name":"objective","props":[{"name":"label","value":"MA-2(a)[4]"}],"prose":"reviews records of maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.4.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[4][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.4.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[4][b]"}],"prose":"organizational requirements;"}]}]},{"id":"ma-2.b_obj","name":"objective","props":[{"name":"label","value":"MA-2(b)"}],"parts":[{"id":"ma-2.b_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(b)[1]"}],"prose":"approves all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;"},{"id":"ma-2.b_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(b)[2]"}],"prose":"monitors all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;"}]},{"id":"ma-2.c_obj","name":"objective","props":[{"name":"label","value":"MA-2(c)"}],"parts":[{"id":"ma-2.c_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(c)[1]"}],"prose":"defines personnel or roles required to explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2.c_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(c)[2]"}],"prose":"requires that organization-defined personnel or roles explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;"}]},{"id":"ma-2.d_obj","name":"objective","props":[{"name":"label","value":"MA-2(d)"}],"prose":"sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2.e_obj","name":"objective","props":[{"name":"label","value":"MA-2(e)"}],"prose":"checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions;"},{"id":"ma-2.f_obj","name":"objective","props":[{"name":"label","value":"MA-2(f)"}],"parts":[{"id":"ma-2.f_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(f)[1]"}],"prose":"defines maintenance-related information to be included in organizational maintenance records; and"},{"id":"ma-2.f_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(f)[2]"}],"prose":"includes organization-defined maintenance-related information in organizational maintenance records."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing controlled information system maintenance\n\nmaintenance records\n\nmanufacturer\/vendor maintenance specifications\n\nequipment sanitization records\n\nmedia sanitization records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel responsible for media sanitization\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for scheduling, performing, documenting, reviewing, approving, and monitoring maintenance and repairs for the information system\n\norganizational processes for sanitizing information system components\n\nautomated mechanisms supporting and\/or implementing controlled maintenance\n\nautomated mechanisms implementing sanitization of information system components"}]}]},{"id":"ma-3","class":"SP800-53","title":"Maintenance Tools","props":[{"name":"priority","value":"P3"},{"name":"label","value":"MA-3"},{"name":"sort-id","value":"ma-03"}],"links":[{"href":"#263823e0-a971-4b00-959d-315b26278b22","rel":"reference"}],"parts":[{"id":"ma-3_smt","name":"statement","prose":"The organization approves, controls, and monitors information system maintenance tools."},{"id":"ma-3_gdn","name":"guidance","prose":"This control addresses security-related issues associated with maintenance tools used specifically for diagnostic and repair actions on organizational information systems. Maintenance tools can include hardware, software, and firmware items. Maintenance tools are potential vehicles for transporting malicious code, either intentionally or unintentionally, into a facility and subsequently into organizational information systems. Maintenance tools can include, for example, hardware\/software diagnostic test equipment and hardware\/software packet sniffers. This control does not cover hardware\/software components that may support information system maintenance, yet are a part of the system, for example, the software implementing “ping,” “ls,” “ipconfig, or the hardware and software implementing the monitoring port of an Ethernet switch.","links":[{"href":"#ma-2","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#mp-6","rel":"related"}]},{"id":"ma-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-3_obj.1","name":"objective","props":[{"name":"label","value":"MA-3[1]"}],"prose":"approves information system maintenance tools;"},{"id":"ma-3_obj.2","name":"objective","props":[{"name":"label","value":"MA-3[2]"}],"prose":"controls information system maintenance tools; and"},{"id":"ma-3_obj.3","name":"objective","props":[{"name":"label","value":"MA-3[3]"}],"prose":"monitors information system maintenance tools."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing information system maintenance tools\n\ninformation system maintenance tools and associated documentation\n\nmaintenance records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for approving, controlling, and monitoring maintenance tools\n\nautomated mechanisms supporting and\/or implementing approval, control, and\/or monitoring of maintenance tools"}]}],"controls":[{"id":"ma-3.1","class":"SP800-53-enhancement","title":"Inspect Tools","props":[{"name":"label","value":"MA-3(1)"},{"name":"sort-id","value":"ma-03.01"}],"parts":[{"id":"ma-3.1_smt","name":"statement","prose":"The organization inspects the maintenance tools carried into a facility by maintenance personnel for improper or unauthorized modifications."},{"id":"ma-3.1_gdn","name":"guidance","prose":"If, upon inspection of maintenance tools, organizations determine that the tools have been modified in an improper\/unauthorized manner or contain malicious code, the incident is handled consistent with organizational policies and procedures for incident handling.","links":[{"href":"#si-7","rel":"related"}]},{"id":"ma-3.1_obj","name":"objective","prose":"Determine if the organization inspects the maintenance tools carried into a facility by maintenance personnel for improper or unauthorized modifications."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing information system maintenance tools\n\ninformation system maintenance tools and associated documentation\n\nmaintenance tool inspection records\n\nmaintenance records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for inspecting maintenance tools\n\nautomated mechanisms supporting and\/or implementing inspection of maintenance tools"}]}]},{"id":"ma-3.2","class":"SP800-53-enhancement","title":"Inspect Media","props":[{"name":"label","value":"MA-3(2)"},{"name":"sort-id","value":"ma-03.02"}],"parts":[{"id":"ma-3.2_smt","name":"statement","prose":"The organization checks media containing diagnostic and test programs for malicious code before the media are used in the information system."},{"id":"ma-3.2_gdn","name":"guidance","prose":"If, upon inspection of media containing maintenance diagnostic and test programs, organizations determine that the media contain malicious code, the incident is handled consistent with organizational incident handling policies and procedures.","links":[{"href":"#si-3","rel":"related"}]},{"id":"ma-3.2_obj","name":"objective","prose":"Determine if the organization checks media containing diagnostic and test programs for malicious code before the media are used in the information system."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing information system maintenance tools\n\ninformation system maintenance tools and associated documentation\n\nmaintenance records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for inspecting media for malicious code\n\nautomated mechanisms supporting and\/or implementing inspection of media used for maintenance"}]}]}]},{"id":"ma-4","class":"SP800-53","title":"Nonlocal Maintenance","props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-4"},{"name":"sort-id","value":"ma-04"}],"links":[{"href":"#d715b234-9b5b-4e07-b1ed-99836727664d","rel":"reference"},{"href":"#f2dbd4ec-c413-4714-b85b-6b7184d1c195","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#263823e0-a971-4b00-959d-315b26278b22","rel":"reference"},{"href":"#a4aa9645-9a8a-4b51-90a9-e223250f9a75","rel":"reference"}],"parts":[{"id":"ma-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Approves and monitors nonlocal maintenance and diagnostic activities;"},{"id":"ma-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Allows the use of nonlocal maintenance and diagnostic tools only as consistent with organizational policy and documented in the security plan for the information system;"},{"id":"ma-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions;"},{"id":"ma-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Maintains records for nonlocal maintenance and diagnostic activities; and"},{"id":"ma-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Terminates session and network connections when nonlocal maintenance is completed."}]},{"id":"ma-4_gdn","name":"guidance","prose":"Nonlocal maintenance and diagnostic activities are those activities conducted by individuals communicating through a network, either an external network (e.g., the Internet) or an internal network. Local maintenance and diagnostic activities are those activities carried out by individuals physically present at the information system or information system component and not communicating across a network connection. Authentication techniques used in the establishment of nonlocal maintenance and diagnostic sessions reflect the network access requirements in IA-2. Typically, strong authentication requires authenticators that are resistant to replay attacks and employ multifactor authentication. Strong authenticators include, for example, PKI where certificates are stored on a token protected by a password, passphrase, or biometric. Enforcing requirements in MA-4 is accomplished in part by other controls.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#ma-2","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#mp-6","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-10","rel":"related"},{"href":"#sc-17","rel":"related"}]},{"id":"ma-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-4.a_obj","name":"objective","props":[{"name":"label","value":"MA-4(a)"}],"parts":[{"id":"ma-4.a_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(a)[1]"}],"prose":"approves nonlocal maintenance and diagnostic activities;"},{"id":"ma-4.a_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(a)[2]"}],"prose":"monitors nonlocal maintenance and diagnostic activities;"}]},{"id":"ma-4.b_obj","name":"objective","props":[{"name":"label","value":"MA-4(b)"}],"prose":"allows the use of nonlocal maintenance and diagnostic tools only:","parts":[{"id":"ma-4.b_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(b)[1]"}],"prose":"as consistent with organizational policy;"},{"id":"ma-4.b_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(b)[2]"}],"prose":"as documented in the security plan for the information system;"}]},{"id":"ma-4.c_obj","name":"objective","props":[{"name":"label","value":"MA-4(c)"}],"prose":"employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions;"},{"id":"ma-4.d_obj","name":"objective","props":[{"name":"label","value":"MA-4(d)"}],"prose":"maintains records for nonlocal maintenance and diagnostic activities;"},{"id":"ma-4.e_obj","name":"objective","props":[{"name":"label","value":"MA-4(e)"}],"parts":[{"id":"ma-4.e_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(e)[1]"}],"prose":"terminates sessions when nonlocal maintenance or diagnostics is completed; and"},{"id":"ma-4.e_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(e)[2]"}],"prose":"terminates network connections when nonlocal maintenance or diagnostics is completed."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing nonlocal information system maintenance\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nmaintenance records\n\ndiagnostic records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing nonlocal maintenance\n\nautomated mechanisms implementing, supporting, and\/or managing nonlocal maintenance\n\nautomated mechanisms for strong authentication of nonlocal maintenance diagnostic sessions\n\nautomated mechanisms for terminating nonlocal maintenance sessions and network connections"}]}],"controls":[{"id":"ma-4.2","class":"SP800-53-enhancement","title":"Document Nonlocal Maintenance","props":[{"name":"label","value":"MA-4(2)"},{"name":"sort-id","value":"ma-04.02"}],"parts":[{"id":"ma-4.2_smt","name":"statement","prose":"The organization documents in the security plan for the information system, the policies and procedures for the establishment and use of nonlocal maintenance and diagnostic connections."},{"id":"ma-4.2_obj","name":"objective","prose":"Determine if the organization documents in the security plan for the information system:","parts":[{"id":"ma-4.2_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(2)[1]"}],"prose":"the policies for the establishment and use of nonlocal maintenance and diagnostic connections; and"},{"id":"ma-4.2_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(2)[2]"}],"prose":"the procedures for the establishment and use of nonlocal maintenance and diagnostic connections."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing non-local information system maintenance\n\nsecurity plan\n\nmaintenance records\n\ndiagnostic records\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"ma-5","class":"SP800-53","title":"Maintenance Personnel","props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-5"},{"name":"sort-id","value":"ma-05"}],"parts":[{"id":"ma-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes a process for maintenance personnel authorization and maintains a list of authorized maintenance organizations or personnel;"},{"id":"ma-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and"},{"id":"ma-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations."}]},{"id":"ma-5_gdn","name":"guidance","prose":"This control applies to individuals performing hardware or software maintenance on organizational information systems, while PE-2 addresses physical access for individuals whose maintenance duties place them within the physical protection perimeter of the systems (e.g., custodial staff, physical plant maintenance personnel). Technical competence of supervising individuals relates to the maintenance performed on the information systems while having required access authorizations refers to maintenance on and near the systems. Individuals not previously identified as authorized maintenance personnel, such as information technology manufacturers, vendors, systems integrators, and consultants, may require privileged access to organizational information systems, for example, when required to conduct maintenance activities with little or no notice. Based on organizational assessments of risk, organizations may issue temporary credentials to these individuals. Temporary credentials may be for one-time use or for very limited time periods.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#ra-3","rel":"related"}]},{"id":"ma-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-5.a_obj","name":"objective","props":[{"name":"label","value":"MA-5(a)"}],"parts":[{"id":"ma-5.a_obj.1","name":"objective","props":[{"name":"label","value":"MA-5(a)[1]"}],"prose":"establishes a process for maintenance personnel authorization;"},{"id":"ma-5.a_obj.2","name":"objective","props":[{"name":"label","value":"MA-5(a)[2]"}],"prose":"maintains a list of authorized maintenance organizations or personnel;"}]},{"id":"ma-5.b_obj","name":"objective","props":[{"name":"label","value":"MA-5(b)"}],"prose":"ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and"},{"id":"ma-5.c_obj","name":"objective","props":[{"name":"label","value":"MA-5(c)"}],"prose":"designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing maintenance personnel\n\nservice provider contracts\n\nservice-level agreements\n\nlist of authorized personnel\n\nmaintenance records\n\naccess control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for authorizing and managing maintenance personnel\n\nautomated mechanisms supporting and\/or implementing authorization of maintenance personnel"}]}]},{"id":"ma-6","class":"SP800-53","title":"Timely Maintenance","params":[{"id":"ma-6_prm_1","label":"organization-defined information system components"},{"id":"ma-6_prm_2","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-6"},{"name":"sort-id","value":"ma-06"}],"parts":[{"id":"ma-6_smt","name":"statement","prose":"The organization obtains maintenance support and\/or spare parts for {{ insert: param, ma-6_prm_1 }} within {{ insert: param, ma-6_prm_2 }} of failure."},{"id":"ma-6_gdn","name":"guidance","prose":"Organizations specify the information system components that result in increased risk to organizational operations and assets, individuals, other organizations, or the Nation when the functionality provided by those components is not operational. Organizational actions to obtain maintenance support typically include having appropriate contracts in place.","links":[{"href":"#cm-8","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#cp-7","rel":"related"},{"href":"#sa-14","rel":"related"},{"href":"#sa-15","rel":"related"}]},{"id":"ma-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-6_obj.1","name":"objective","props":[{"name":"label","value":"MA-6[1]"}],"prose":"defines information system components for which maintenance support and\/or spare parts are to be obtained;"},{"id":"ma-6_obj.2","name":"objective","props":[{"name":"label","value":"MA-6[2]"}],"prose":"defines the time period within which maintenance support and\/or spare parts are to be obtained after a failure;"},{"id":"ma-6_obj.3","name":"objective","props":[{"name":"label","value":"MA-6[3]"}],"parts":[{"id":"ma-6_obj.3.a","name":"objective","props":[{"name":"label","value":"MA-6[3][a]"}],"prose":"obtains maintenance support for organization-defined information system components within the organization-defined time period of failure; and\/or"},{"id":"ma-6_obj.3.b","name":"objective","props":[{"name":"label","value":"MA-6[3][b]"}],"prose":"obtains spare parts for organization-defined information system components within the organization-defined time period of failure."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing information system maintenance\n\nservice provider contracts\n\nservice-level agreements\n\ninventory and availability of spare parts\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for ensuring timely maintenance"}]}]}]},{"id":"mp","class":"family","title":"Media Protection","controls":[{"id":"mp-1","class":"SP800-53","title":"Media Protection Policy and Procedures","params":[{"id":"mp-1_prm_1","label":"organization-defined personnel or roles"},{"id":"mp-1_prm_2","label":"organization-defined frequency"},{"id":"mp-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-1"},{"name":"sort-id","value":"mp-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"mp-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, mp-1_prm_1 }}:","parts":[{"id":"mp-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A media protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"mp-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the media protection policy and associated media protection controls; and"}]},{"id":"mp-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"mp-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Media protection policy {{ insert: param, mp-1_prm_2 }}; and"},{"id":"mp-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Media protection procedures {{ insert: param, mp-1_prm_3 }}."}]}]},{"id":"mp-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the MP family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"mp-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-1.a_obj","name":"objective","props":[{"name":"label","value":"MP-1(a)"}],"parts":[{"id":"mp-1.a.1_obj","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)"}],"parts":[{"id":"mp-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1]"}],"prose":"develops and documents a media protection policy that addresses:","parts":[{"id":"mp-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"mp-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"mp-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"mp-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"mp-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"mp-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"mp-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"mp-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the media protection policy is to be disseminated;"},{"id":"mp-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[3]"}],"prose":"disseminates the media protection policy to organization-defined personnel or roles;"}]},{"id":"mp-1.a.2_obj","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)"}],"parts":[{"id":"mp-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the media protection policy and associated media protection controls;"},{"id":"mp-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"mp-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"mp-1.b_obj","name":"objective","props":[{"name":"label","value":"MP-1(b)"}],"parts":[{"id":"mp-1.b.1_obj","name":"objective","props":[{"name":"label","value":"MP-1(b)(1)"}],"parts":[{"id":"mp-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current media protection policy;"},{"id":"mp-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(b)(1)[2]"}],"prose":"reviews and updates the current media protection policy with the organization-defined frequency;"}]},{"id":"mp-1.b.2_obj","name":"objective","props":[{"name":"label","value":"MP-1(b)(2)"}],"parts":[{"id":"mp-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current media protection procedures; and"},{"id":"mp-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(b)(2)[2]"}],"prose":"reviews and updates the current media protection procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Media protection policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with media protection responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"mp-2","class":"SP800-53","title":"Media Access","params":[{"id":"mp-2_prm_1","label":"organization-defined types of digital and\/or non-digital media"},{"id":"mp-2_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-2"},{"name":"sort-id","value":"mp-02"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","rel":"reference"}],"parts":[{"id":"mp-2_smt","name":"statement","prose":"The organization restricts access to {{ insert: param, mp-2_prm_1 }} to {{ insert: param, mp-2_prm_2 }}."},{"id":"mp-2_gdn","name":"guidance","prose":"Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. Restricting non-digital media access includes, for example, denying access to patient medical records in a community hospital unless the individuals seeking access to such records are authorized healthcare providers. Restricting access to digital media includes, for example, limiting access to design specifications stored on compact disks in the media library to the project leader and the individuals on the development team.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pl-2","rel":"related"}]},{"id":"mp-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-2_obj.1","name":"objective","props":[{"name":"label","value":"MP-2[1]"}],"prose":"defines types of digital and\/or non-digital media requiring restricted access;"},{"id":"mp-2_obj.2","name":"objective","props":[{"name":"label","value":"MP-2[2]"}],"prose":"defines personnel or roles authorized to access organization-defined types of digital and\/or non-digital media; and"},{"id":"mp-2_obj.3","name":"objective","props":[{"name":"label","value":"MP-2[3]"}],"prose":"restricts access to organization-defined types of digital and\/or non-digital media to organization-defined personnel or roles."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media access restrictions\n\naccess control policy and procedures\n\nphysical and environmental protection policy and procedures\n\nmedia storage facilities\n\naccess control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media protection responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for restricting information media\n\nautomated mechanisms supporting and\/or implementing media access restrictions"}]}]},{"id":"mp-3","class":"SP800-53","title":"Media Marking","params":[{"id":"mp-3_prm_1","label":"organization-defined types of information system media"},{"id":"mp-3_prm_2","label":"organization-defined controlled areas"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"MP-3"},{"name":"sort-id","value":"mp-03"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"}],"parts":[{"id":"mp-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Marks information system media indicating the distribution limitations, handling caveats, and applicable security markings (if any) of the information; and"},{"id":"mp-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Exempts {{ insert: param, mp-3_prm_1 }} from marking as long as the media remain within {{ insert: param, mp-3_prm_2 }}."}]},{"id":"mp-3_gdn","name":"guidance","prose":"The term security marking refers to the application\/use of human-readable security attributes. The term security labeling refers to the application\/use of security attributes with regard to internal data structures within information systems (see AC-16). Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. Security marking is generally not required for media containing information determined by organizations to be in the public domain or to be publicly releasable. However, some organizations may require markings for public information indicating that the information is publicly releasable. Marking of information system media reflects applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.","links":[{"href":"#ac-16","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#ra-3","rel":"related"}]},{"id":"mp-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-3.a_obj","name":"objective","props":[{"name":"label","value":"MP-3(a)"}],"prose":"marks information system media indicating the:","parts":[{"id":"mp-3.a_obj.1","name":"objective","props":[{"name":"label","value":"MP-3(a)[1]"}],"prose":"distribution limitations of the information;"},{"id":"mp-3.a_obj.2","name":"objective","props":[{"name":"label","value":"MP-3(a)[2]"}],"prose":"handling caveats of the information;"},{"id":"mp-3.a_obj.3","name":"objective","props":[{"name":"label","value":"MP-3(a)[3]"}],"prose":"applicable security markings (if any) of the information;"}]},{"id":"mp-3.b_obj","name":"objective","props":[{"name":"label","value":"MP-3(b)"}],"parts":[{"id":"mp-3.b_obj.1","name":"objective","props":[{"name":"label","value":"MP-3(b)[1]"}],"prose":"defines types of information system media to be exempted from marking as long as the media remain in designated controlled areas;"},{"id":"mp-3.b_obj.2","name":"objective","props":[{"name":"label","value":"MP-3(b)[2]"}],"prose":"defines controlled areas where organization-defined types of information system media exempt from marking are to be retained; and"},{"id":"mp-3.b_obj.3","name":"objective","props":[{"name":"label","value":"MP-3(b)[3]"}],"prose":"exempts organization-defined types of information system media from marking as long as the media remain within organization-defined controlled areas."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media marking\n\nphysical and environmental protection policy and procedures\n\nsecurity plan\n\nlist of information system media marking security attributes\n\ndesignated controlled areas\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media protection and marking responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for marking information media\n\nautomated mechanisms supporting and\/or implementing media marking"}]}]},{"id":"mp-4","class":"SP800-53","title":"Media Storage","params":[{"id":"mp-4_prm_1","label":"organization-defined types of digital and\/or non-digital media"},{"id":"mp-4_prm_2","label":"organization-defined controlled areas"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-4"},{"name":"sort-id","value":"mp-04"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#81f09e01-d0b0-4ae2-aa6a-064ed9950070","rel":"reference"},{"href":"#a6c774c0-bf50-4590-9841-2a5c1c91ac6f","rel":"reference"},{"href":"#3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","rel":"reference"}],"parts":[{"id":"mp-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Physically controls and securely stores {{ insert: param, mp-4_prm_1 }} within {{ insert: param, mp-4_prm_2 }}; and"},{"id":"mp-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Protects information system media until the media are destroyed or sanitized using approved equipment, techniques, and procedures."}]},{"id":"mp-4_gdn","name":"guidance","prose":"Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. Physically controlling information system media includes, for example, conducting inventories, ensuring procedures are in place to allow individuals to check out and return media to the media library, and maintaining accountability for all stored media. Secure storage includes, for example, a locked drawer, desk, or cabinet, or a controlled media library. The type of media storage is commensurate with the security category and\/or classification of the information residing on the media. Controlled areas are areas for which organizations provide sufficient physical and procedural safeguards to meet the requirements established for protecting information and\/or information systems. For media containing information determined by organizations to be in the public domain, to be publicly releasable, or to have limited or no adverse impact on organizations or individuals if accessed by other than authorized personnel, fewer safeguards may be needed. In these situations, physical access controls provide adequate protection.","links":[{"href":"#cp-6","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-7","rel":"related"},{"href":"#pe-3","rel":"related"}]},{"id":"mp-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-4.a_obj","name":"objective","props":[{"name":"label","value":"MP-4(a)"}],"parts":[{"id":"mp-4.a_obj.1","name":"objective","props":[{"name":"label","value":"MP-4(a)[1]"}],"prose":"defines types of digital and\/or non-digital media to be physically controlled and securely stored within designated controlled areas;"},{"id":"mp-4.a_obj.2","name":"objective","props":[{"name":"label","value":"MP-4(a)[2]"}],"prose":"defines controlled areas designated to physically control and securely store organization-defined types of digital and\/or non-digital media;"},{"id":"mp-4.a_obj.3","name":"objective","props":[{"name":"label","value":"MP-4(a)[3]"}],"prose":"physically controls organization-defined types of digital and\/or non-digital media within organization-defined controlled areas;"},{"id":"mp-4.a_obj.4","name":"objective","props":[{"name":"label","value":"MP-4(a)[4]"}],"prose":"securely stores organization-defined types of digital and\/or non-digital media within organization-defined controlled areas; and"}]},{"id":"mp-4.b_obj","name":"objective","props":[{"name":"label","value":"MP-4(b)"}],"prose":"protects information system media until the media are destroyed or sanitized using approved equipment, techniques, and procedures."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media storage\n\nphysical and environmental protection policy and procedures\n\naccess control policy and procedures\n\nsecurity plan\n\ninformation system media\n\ndesignated controlled areas\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media protection and storage responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for storing information media\n\nautomated mechanisms supporting and\/or implementing secure media storage\/media protection"}]}]},{"id":"mp-5","class":"SP800-53","title":"Media Transport","params":[{"id":"mp-5_prm_1","label":"organization-defined types of information system media"},{"id":"mp-5_prm_2","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-5"},{"name":"sort-id","value":"mp-05"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"}],"parts":[{"id":"mp-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Protects and controls {{ insert: param, mp-5_prm_1 }} during transport outside of controlled areas using {{ insert: param, mp-5_prm_2 }};"},{"id":"mp-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Maintains accountability for information system media during transport outside of controlled areas;"},{"id":"mp-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Documents activities associated with the transport of information system media; and"},{"id":"mp-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Restricts the activities associated with the transport of information system media to authorized personnel."}]},{"id":"mp-5_gdn","name":"guidance","prose":"Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. This control also applies to mobile devices with information storage capability (e.g., smart phones, tablets, E-readers), that are transported outside of controlled areas. Controlled areas are areas or spaces for which organizations provide sufficient physical and\/or procedural safeguards to meet the requirements established for protecting information and\/or information systems. Physical and technical safeguards for media are commensurate with the security category or classification of the information residing on the media. Safeguards to protect media during transport include, for example, locked containers and cryptography. Cryptographic mechanisms can provide confidentiality and integrity protections depending upon the mechanisms used. Activities associated with transport include the actual transport as well as those activities such as releasing media for transport and ensuring that media enters the appropriate transport processes. For the actual transport, authorized transport and courier personnel may include individuals from outside the organization (e.g., U.S. Postal Service or a commercial transport or delivery service). Maintaining accountability of media during transport includes, for example, restricting transport activities to authorized personnel, and tracking and\/or obtaining explicit records of transport activities as the media moves through the transportation system to prevent and detect loss, destruction, or tampering. Organizations establish documentation requirements for activities associated with the transport of information system media in accordance with organizational assessments of risk to include the flexibility to define different record-keeping methods for the different types of media transport as part of an overall system of transport-related records.","links":[{"href":"#ac-19","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#mp-3","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-28","rel":"related"}]},{"id":"mp-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-5.a_obj","name":"objective","props":[{"name":"label","value":"MP-5(a)"}],"parts":[{"id":"mp-5.a_obj.1","name":"objective","props":[{"name":"label","value":"MP-5(a)[1]"}],"prose":"defines types of information system media to be protected and controlled during transport outside of controlled areas;"},{"id":"mp-5.a_obj.2","name":"objective","props":[{"name":"label","value":"MP-5(a)[2]"}],"prose":"defines security safeguards to protect and control organization-defined information system media during transport outside of controlled areas;"},{"id":"mp-5.a_obj.3","name":"objective","props":[{"name":"label","value":"MP-5(a)[3]"}],"prose":"protects and controls organization-defined information system media during transport outside of controlled areas using organization-defined security safeguards;"}]},{"id":"mp-5.b_obj","name":"objective","props":[{"name":"label","value":"MP-5(b)"}],"prose":"maintains accountability for information system media during transport outside of controlled areas;"},{"id":"mp-5.c_obj","name":"objective","props":[{"name":"label","value":"MP-5(c)"}],"prose":"documents activities associated with the transport of information system media; and"},{"id":"mp-5.d_obj","name":"objective","props":[{"name":"label","value":"MP-5(d)"}],"prose":"restricts the activities associated with transport of information system media to authorized personnel."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media storage\n\nphysical and environmental protection policy and procedures\n\naccess control policy and procedures\n\nsecurity plan\n\ninformation system media\n\ndesignated controlled areas\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media protection and storage responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for storing information media\n\nautomated mechanisms supporting and\/or implementing media storage\/media protection"}]}],"controls":[{"id":"mp-5.4","class":"SP800-53-enhancement","title":"Cryptographic Protection","props":[{"name":"label","value":"MP-5(4)"},{"name":"sort-id","value":"mp-05.04"}],"parts":[{"id":"mp-5.4_smt","name":"statement","prose":"The information system implements cryptographic mechanisms to protect the confidentiality and integrity of information stored on digital media during transport outside of controlled areas."},{"id":"mp-5.4_gdn","name":"guidance","prose":"This control enhancement applies to both portable storage devices (e.g., USB memory sticks, compact disks, digital video disks, external\/removable hard disk drives) and mobile devices with storage capability (e.g., smart phones, tablets, E-readers).","links":[{"href":"#mp-2","rel":"related"}]},{"id":"mp-5.4_obj","name":"objective","prose":"Determine if the organization employs cryptographic mechanisms to protect the confidentiality and integrity of information stored on digital media during transport outside of controlled areas."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media transport\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system media transport records\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media transport responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Cryptographic mechanisms protecting information on digital media during transportation outside controlled areas"}]}]}]},{"id":"mp-6","class":"SP800-53","title":"Media Sanitization","params":[{"id":"mp-6_prm_1","label":"organization-defined information system media"},{"id":"mp-6_prm_2","label":"organization-defined sanitization techniques and procedures"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-6"},{"name":"sort-id","value":"mp-06"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"},{"href":"#263823e0-a971-4b00-959d-315b26278b22","rel":"reference"},{"href":"#a47466c4-c837-4f06-a39f-e68412a5f73d","rel":"reference"}],"parts":[{"id":"mp-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Sanitizes {{ insert: param, mp-6_prm_1 }} prior to disposal, release out of organizational control, or release for reuse using {{ insert: param, mp-6_prm_2 }} in accordance with applicable federal and organizational standards and policies; and"},{"id":"mp-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Employs sanitization mechanisms with the strength and integrity commensurate with the security category or classification of the information."}]},{"id":"mp-6_gdn","name":"guidance","prose":"This control applies to all information system media, both digital and non-digital, subject to disposal or reuse, whether or not the media is considered removable. Examples include media found in scanners, copiers, printers, notebook computers, workstations, network components, and mobile devices. The sanitization process removes information from the media such that the information cannot be retrieved or reconstructed. Sanitization techniques, including clearing, purging, cryptographic erase, and destruction, prevent the disclosure of information to unauthorized individuals when such media is reused or released for disposal. Organizations determine the appropriate sanitization methods recognizing that destruction is sometimes necessary when other methods cannot be applied to media requiring sanitization. Organizations use discretion on the employment of approved sanitization techniques and procedures for media containing information deemed to be in the public domain or publicly releasable, or deemed to have no adverse impact on organizations or individuals if released for reuse or disposal. Sanitization of non-digital media includes, for example, removing a classified appendix from an otherwise unclassified document, or redacting selected sections or words from a document by obscuring the redacted sections\/words in a manner equivalent in effectiveness to removing them from the document. NSA standards and policies control the sanitization process for media containing classified information.","links":[{"href":"#ma-2","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-4","rel":"related"}]},{"id":"mp-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-6.a_obj","name":"objective","props":[{"name":"label","value":"MP-6(a)"}],"parts":[{"id":"mp-6.a_obj.1","name":"objective","props":[{"name":"label","value":"MP-6(a)[1]"}],"prose":"defines information system media to be sanitized prior to:","parts":[{"id":"mp-6.a_obj.1.a","name":"objective","props":[{"name":"label","value":"MP-6(a)[1][a]"}],"prose":"disposal;"},{"id":"mp-6.a_obj.1.b","name":"objective","props":[{"name":"label","value":"MP-6(a)[1][b]"}],"prose":"release out of organizational control; or"},{"id":"mp-6.a_obj.1.c","name":"objective","props":[{"name":"label","value":"MP-6(a)[1][c]"}],"prose":"release for reuse;"}]},{"id":"mp-6.a_obj.2","name":"objective","props":[{"name":"label","value":"MP-6(a)[2]"}],"prose":"defines sanitization techniques or procedures to be used for sanitizing organization-defined information system media prior to:","parts":[{"id":"mp-6.a_obj.2.a","name":"objective","props":[{"name":"label","value":"MP-6(a)[2][a]"}],"prose":"disposal;"},{"id":"mp-6.a_obj.2.b","name":"objective","props":[{"name":"label","value":"MP-6(a)[2][b]"}],"prose":"release out of organizational control; or"},{"id":"mp-6.a_obj.2.c","name":"objective","props":[{"name":"label","value":"MP-6(a)[2][c]"}],"prose":"release for reuse;"}]},{"id":"mp-6.a_obj.3","name":"objective","props":[{"name":"label","value":"MP-6(a)[3]"}],"prose":"sanitizes organization-defined information system media prior to disposal, release out of organizational control, or release for reuse using organization-defined sanitization techniques or procedures in accordance with applicable federal and organizational standards and policies; and"}]},{"id":"mp-6.b_obj","name":"objective","props":[{"name":"label","value":"MP-6(b)"}],"prose":"employs sanitization mechanisms with strength and integrity commensurate with the security category or classification of the information."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media sanitization and disposal\n\napplicable federal standards and policies addressing media sanitization\n\nmedia sanitization records\n\naudit records\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with media sanitization responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media sanitization\n\nautomated mechanisms supporting and\/or implementing media sanitization"}]}]},{"id":"mp-7","class":"SP800-53","title":"Media Use","params":[{"id":"mp-7_prm_1","select":{"choice":["restricts","prohibits"]}},{"id":"mp-7_prm_2","label":"organization-defined types of information system media"},{"id":"mp-7_prm_3","label":"organization-defined information systems or system components"},{"id":"mp-7_prm_4","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-7"},{"name":"sort-id","value":"mp-07"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","rel":"reference"}],"parts":[{"id":"mp-7_smt","name":"statement","prose":"The organization {{ insert: param, mp-7_prm_1 }} the use of {{ insert: param, mp-7_prm_2 }} on {{ insert: param, mp-7_prm_3 }} using {{ insert: param, mp-7_prm_4 }}."},{"id":"mp-7_gdn","name":"guidance","prose":"Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. This control also applies to mobile devices with information storage capability (e.g., smart phones, tablets, E-readers). In contrast to MP-2, which restricts user access to media, this control restricts the use of certain types of media on information systems, for example, restricting\/prohibiting the use of flash drives or external hard disk drives. Organizations can employ technical and nontechnical safeguards (e.g., policies, procedures, rules of behavior) to restrict the use of information system media. Organizations may restrict the use of portable storage devices, for example, by using physical cages on workstations to prohibit access to certain external ports, or disabling\/removing the ability to insert, read or write to such devices. Organizations may also limit the use of portable storage devices to only approved devices including, for example, devices provided by the organization, devices provided by other approved organizations, and devices that are not personally owned. Finally, organizations may restrict the use of portable storage devices based on the type of device, for example, prohibiting the use of writeable, portable storage devices, and implementing this restriction by disabling or removing the capability to write to such devices.","links":[{"href":"#ac-19","rel":"related"},{"href":"#pl-4","rel":"related"}]},{"id":"mp-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-7_obj.1","name":"objective","props":[{"name":"label","value":"MP-7[1]"}],"prose":"defines types of information system media to be:","parts":[{"id":"mp-7_obj.1.a","name":"objective","props":[{"name":"label","value":"MP-7[1][a]"}],"prose":"restricted on information systems or system components; or"},{"id":"mp-7_obj.1.b","name":"objective","props":[{"name":"label","value":"MP-7[1][b]"}],"prose":"prohibited from use on information systems or system components;"}]},{"id":"mp-7_obj.2","name":"objective","props":[{"name":"label","value":"MP-7[2]"}],"prose":"defines information systems or system components on which the use of organization-defined types of information system media is to be one of the following:","parts":[{"id":"mp-7_obj.2.a","name":"objective","props":[{"name":"label","value":"MP-7[2][a]"}],"prose":"restricted; or"},{"id":"mp-7_obj.2.b","name":"objective","props":[{"name":"label","value":"MP-7[2][b]"}],"prose":"prohibited;"}]},{"id":"mp-7_obj.3","name":"objective","props":[{"name":"label","value":"MP-7[3]"}],"prose":"defines security safeguards to be employed to restrict or prohibit the use of organization-defined types of information system media on organization-defined information systems or system components; and"},{"id":"mp-7_obj.4","name":"objective","props":[{"name":"label","value":"MP-7[4]"}],"prose":"restricts or prohibits the use of organization-defined information system media on organization-defined information systems or system components using organization-defined security safeguards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nsystem use policy\n\nprocedures addressing media usage restrictions\n\nsecurity plan\n\nrules of behavior\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media use responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media use\n\nautomated mechanisms restricting or prohibiting use of information system media on information systems or system components"}]}],"controls":[{"id":"mp-7.1","class":"SP800-53-enhancement","title":"Prohibit Use Without Owner","props":[{"name":"label","value":"MP-7(1)"},{"name":"sort-id","value":"mp-07.01"}],"parts":[{"id":"mp-7.1_smt","name":"statement","prose":"The organization prohibits the use of portable storage devices in organizational information systems when such devices have no identifiable owner."},{"id":"mp-7.1_gdn","name":"guidance","prose":"Requiring identifiable owners (e.g., individuals, organizations, or projects) for portable storage devices reduces the risk of using such technologies by allowing organizations to assign responsibility and accountability for addressing known vulnerabilities in the devices (e.g., malicious code insertion).","links":[{"href":"#pl-4","rel":"related"}]},{"id":"mp-7.1_obj","name":"objective","prose":"Determine if the organization prohibits the use of portable storage devices in organizational information systems when such devices have no identifiable owner."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nsystem use policy\n\nprocedures addressing media usage restrictions\n\nsecurity plan\n\nrules of behavior\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media use responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media use\n\nautomated mechanisms prohibiting use of media on information systems or system components"}]}]}]}]},{"id":"pe","class":"family","title":"Physical and Environmental Protection","controls":[{"id":"pe-1","class":"SP800-53","title":"Physical and Environmental Protection Policy and Procedures","params":[{"id":"pe-1_prm_1","label":"organization-defined personnel or roles"},{"id":"pe-1_prm_2","label":"organization-defined frequency"},{"id":"pe-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-1"},{"name":"sort-id","value":"pe-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"pe-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, pe-1_prm_1 }}:","parts":[{"id":"pe-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A physical and environmental protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"pe-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls; and"}]},{"id":"pe-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"pe-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Physical and environmental protection policy {{ insert: param, pe-1_prm_2 }}; and"},{"id":"pe-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Physical and environmental protection procedures {{ insert: param, pe-1_prm_3 }}."}]}]},{"id":"pe-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the PE family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"pe-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-1.a_obj","name":"objective","props":[{"name":"label","value":"PE-1(a)"}],"parts":[{"id":"pe-1.a.1_obj","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)"}],"parts":[{"id":"pe-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1]"}],"prose":"develops and documents a physical and environmental protection policy that addresses:","parts":[{"id":"pe-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"pe-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"pe-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"pe-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"pe-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"pe-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"pe-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"pe-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the physical and environmental protection policy is to be disseminated;"},{"id":"pe-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[3]"}],"prose":"disseminates the physical and environmental protection policy to organization-defined personnel or roles;"}]},{"id":"pe-1.a.2_obj","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)"}],"parts":[{"id":"pe-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls;"},{"id":"pe-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"pe-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"pe-1.b_obj","name":"objective","props":[{"name":"label","value":"PE-1(b)"}],"parts":[{"id":"pe-1.b.1_obj","name":"objective","props":[{"name":"label","value":"PE-1(b)(1)"}],"parts":[{"id":"pe-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current physical and environmental protection policy;"},{"id":"pe-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(b)(1)[2]"}],"prose":"reviews and updates the current physical and environmental protection policy with the organization-defined frequency;"}]},{"id":"pe-1.b.2_obj","name":"objective","props":[{"name":"label","value":"PE-1(b)(2)"}],"parts":[{"id":"pe-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current physical and environmental protection procedures; and"},{"id":"pe-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(b)(2)[2]"}],"prose":"reviews and updates the current physical and environmental protection procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical and environmental protection responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"pe-2","class":"SP800-53","title":"Physical Access Authorizations","params":[{"id":"pe-2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-2"},{"name":"sort-id","value":"pe-02"}],"parts":[{"id":"pe-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, approves, and maintains a list of individuals with authorized access to the facility where the information system resides;"},{"id":"pe-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Issues authorization credentials for facility access;"},{"id":"pe-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the access list detailing authorized facility access by individuals {{ insert: param, pe-2_prm_1 }}; and"},{"id":"pe-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Removes individuals from the facility access list when access is no longer required."}]},{"id":"pe-2_gdn","name":"guidance","prose":"This control applies to organizational employees and visitors. Individuals (e.g., employees, contractors, and others) with permanent physical access authorization credentials are not considered visitors. Authorization credentials include, for example, badges, identification cards, and smart cards. Organizations determine the strength of authorization credentials needed (including level of forge-proof badges, smart cards, or identification cards) consistent with federal standards, policies, and procedures. This control only applies to areas within facilities that have not been designated as publicly accessible.","links":[{"href":"#pe-3","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#ps-3","rel":"related"}]},{"id":"pe-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-2.a_obj","name":"objective","props":[{"name":"label","value":"PE-2(a)"}],"parts":[{"id":"pe-2.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-2(a)[1]"}],"prose":"develops a list of individuals with authorized access to the facility where the information system resides;"},{"id":"pe-2.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-2(a)[2]"}],"prose":"approves a list of individuals with authorized access to the facility where the information system resides;"},{"id":"pe-2.a_obj.3","name":"objective","props":[{"name":"label","value":"PE-2(a)[3]"}],"prose":"maintains a list of individuals with authorized access to the facility where the information system resides;"}]},{"id":"pe-2.b_obj","name":"objective","props":[{"name":"label","value":"PE-2(b)"}],"prose":"issues authorization credentials for facility access;"},{"id":"pe-2.c_obj","name":"objective","props":[{"name":"label","value":"PE-2(c)"}],"parts":[{"id":"pe-2.c_obj.1","name":"objective","props":[{"name":"label","value":"PE-2(c)[1]"}],"prose":"defines the frequency to review the access list detailing authorized facility access by individuals;"},{"id":"pe-2.c_obj.2","name":"objective","props":[{"name":"label","value":"PE-2(c)[2]"}],"prose":"reviews the access list detailing authorized facility access by individuals with the organization-defined frequency; and"}]},{"id":"pe-2.d_obj","name":"objective","props":[{"name":"label","value":"PE-2(d)"}],"prose":"removes individuals from the facility access list when access is no longer required."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access authorizations\n\nsecurity plan\n\nauthorized personnel access list\n\nauthorization credentials\n\nphysical access list reviews\n\nphysical access termination records and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access authorization responsibilities\n\norganizational personnel with physical access to information system facility\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for physical access authorizations\n\nautomated mechanisms supporting and\/or implementing physical access authorizations"}]}]},{"id":"pe-3","class":"SP800-53","title":"Physical Access Control","params":[{"id":"pe-3_prm_1","label":"organization-defined entry\/exit points to the facility where the information system resides"},{"id":"pe-3_prm_2","select":{"how-many":"one-or-more","choice":[" {{ insert: param, pe-3_prm_3 }} ","guards"]}},{"id":"pe-3_prm_3","depends-on":"pe-3_prm_2","label":"organization-defined physical access control systems\/devices"},{"id":"pe-3_prm_4","label":"organization-defined entry\/exit points"},{"id":"pe-3_prm_5","label":"organization-defined security safeguards"},{"id":"pe-3_prm_6","label":"organization-defined circumstances requiring visitor escorts and monitoring"},{"id":"pe-3_prm_7","label":"organization-defined physical access devices"},{"id":"pe-3_prm_8","label":"organization-defined frequency"},{"id":"pe-3_prm_9","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-3"},{"name":"sort-id","value":"pe-03"}],"links":[{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#2157bb7e-192c-4eaa-877f-93ef6b0a3292","rel":"reference"},{"href":"#6caa237b-531b-43ac-9711-d8f6b97b0377","rel":"reference"},{"href":"#398e33fd-f404-4e5c-b90e-2d50d3181244","rel":"reference"},{"href":"#61081e7f-041d-4033-96a7-44a439071683","rel":"reference"},{"href":"#dd2f5acd-08f1-435a-9837-f8203088dc1a","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"},{"href":"#5ed1f4d5-1494-421b-97ed-39d3c88ab51f","rel":"reference"}],"parts":[{"id":"pe-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Enforces physical access authorizations at {{ insert: param, pe-3_prm_1 }} by;","parts":[{"id":"pe-3_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Verifying individual access authorizations before granting access to the facility; and"},{"id":"pe-3_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Controlling ingress\/egress to the facility using {{ insert: param, pe-3_prm_2 }};"}]},{"id":"pe-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Maintains physical access audit logs for {{ insert: param, pe-3_prm_4 }};"},{"id":"pe-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Provides {{ insert: param, pe-3_prm_5 }} to control access to areas within the facility officially designated as publicly accessible;"},{"id":"pe-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Escorts visitors and monitors visitor activity {{ insert: param, pe-3_prm_6 }};"},{"id":"pe-3_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Secures keys, combinations, and other physical access devices;"},{"id":"pe-3_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Inventories {{ insert: param, pe-3_prm_7 }} every {{ insert: param, pe-3_prm_8 }}; and"},{"id":"pe-3_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Changes combinations and keys {{ insert: param, pe-3_prm_9 }} and\/or when keys are lost, combinations are compromised, or individuals are transferred or terminated."}]},{"id":"pe-3_gdn","name":"guidance","prose":"This control applies to organizational employees and visitors. Individuals (e.g., employees, contractors, and others) with permanent physical access authorization credentials are not considered visitors. Organizations determine the types of facility guards needed including, for example, professional physical security staff or other personnel such as administrative staff or information system users. Physical access devices include, for example, keys, locks, combinations, and card readers. Safeguards for publicly accessible areas within organizational facilities include, for example, cameras, monitoring by guards, and isolating selected information systems and\/or system components in secured areas. Physical access control systems comply with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. The Federal Identity, Credential, and Access Management Program provides implementation guidance for identity, credential, and access management capabilities for physical access control systems. Organizations have flexibility in the types of audit logs employed. Audit logs can be procedural (e.g., a written log of individuals accessing the facility and when such access occurred), automated (e.g., capturing ID provided by a PIV card), or some combination thereof. Physical access points can include facility access points, interior access points to information systems and\/or components requiring supplemental access controls, or both. Components of organizational information systems (e.g., workstations, terminals) may be located in areas designated as publicly accessible with organizations safeguarding access to such devices.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#pe-5","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ra-3","rel":"related"}]},{"id":"pe-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-3.a_obj","name":"objective","props":[{"name":"label","value":"PE-3(a)"}],"parts":[{"id":"pe-3.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(a)[1]"}],"prose":"defines entry\/exit points to the facility where the information system resides;"},{"id":"pe-3.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2]"}],"prose":"enforces physical access authorizations at organization-defined entry\/exit points to the facility where the information system resides by:","parts":[{"id":"pe-3.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](1)"}],"prose":"verifying individual access authorizations before granting access to the facility;"},{"id":"pe-3.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)"}],"parts":[{"id":"pe-3.a.2_obj.2.a","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[a]"}],"prose":"defining physical access control systems\/devices to be employed to control ingress\/egress to the facility where the information system resides;"},{"id":"pe-3.a.2_obj.2.b","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[b]"}],"prose":"using one or more of the following ways to control ingress\/egress to the facility:","parts":[{"id":"pe-3.a.2_obj.2.b.1","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[b][1]"}],"prose":"organization-defined physical access control systems\/devices; and\/or"},{"id":"pe-3.a.2_obj.2.b.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[b][2]"}],"prose":"guards;"}]}]}]}]},{"id":"pe-3.b_obj","name":"objective","props":[{"name":"label","value":"PE-3(b)"}],"parts":[{"id":"pe-3.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(b)[1]"}],"prose":"defines entry\/exit points for which physical access audit logs are to be maintained;"},{"id":"pe-3.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(b)[2]"}],"prose":"maintains physical access audit logs for organization-defined entry\/exit points;"}]},{"id":"pe-3.c_obj","name":"objective","props":[{"name":"label","value":"PE-3(c)"}],"parts":[{"id":"pe-3.c_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(c)[1]"}],"prose":"defines security safeguards to be employed to control access to areas within the facility officially designated as publicly accessible;"},{"id":"pe-3.c_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(c)[2]"}],"prose":"provides organization-defined security safeguards to control access to areas within the facility officially designated as publicly accessible;"}]},{"id":"pe-3.d_obj","name":"objective","props":[{"name":"label","value":"PE-3(d)"}],"parts":[{"id":"pe-3.d_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(d)[1]"}],"prose":"defines circumstances requiring visitor:","parts":[{"id":"pe-3.d_obj.1.a","name":"objective","props":[{"name":"label","value":"PE-3(d)[1][a]"}],"prose":"escorts;"},{"id":"pe-3.d_obj.1.b","name":"objective","props":[{"name":"label","value":"PE-3(d)[1][b]"}],"prose":"monitoring;"}]},{"id":"pe-3.d_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(d)[2]"}],"prose":"in accordance with organization-defined circumstances requiring visitor escorts and monitoring:","parts":[{"id":"pe-3.d_obj.2.a","name":"objective","props":[{"name":"label","value":"PE-3(d)[2][a]"}],"prose":"escorts visitors;"},{"id":"pe-3.d_obj.2.b","name":"objective","props":[{"name":"label","value":"PE-3(d)[2][b]"}],"prose":"monitors visitor activities;"}]}]},{"id":"pe-3.e_obj","name":"objective","props":[{"name":"label","value":"PE-3(e)"}],"parts":[{"id":"pe-3.e_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(e)[1]"}],"prose":"secures keys;"},{"id":"pe-3.e_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(e)[2]"}],"prose":"secures combinations;"},{"id":"pe-3.e_obj.3","name":"objective","props":[{"name":"label","value":"PE-3(e)[3]"}],"prose":"secures other physical access devices;"}]},{"id":"pe-3.f_obj","name":"objective","props":[{"name":"label","value":"PE-3(f)"}],"parts":[{"id":"pe-3.f_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(f)[1]"}],"prose":"defines physical access devices to be inventoried;"},{"id":"pe-3.f_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(f)[2]"}],"prose":"defines the frequency to inventory organization-defined physical access devices;"},{"id":"pe-3.f_obj.3","name":"objective","props":[{"name":"label","value":"PE-3(f)[3]"}],"prose":"inventories the organization-defined physical access devices with the organization-defined frequency;"}]},{"id":"pe-3.g_obj","name":"objective","props":[{"name":"label","value":"PE-3(g)"}],"parts":[{"id":"pe-3.g_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(g)[1]"}],"prose":"defines the frequency to change combinations and keys; and"},{"id":"pe-3.g_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(g)[2]"}],"prose":"changes combinations and keys with the organization-defined frequency and\/or when:","parts":[{"id":"pe-3.g_obj.2.a","name":"objective","props":[{"name":"label","value":"PE-3(g)[2][a]"}],"prose":"keys are lost;"},{"id":"pe-3.g_obj.2.b","name":"objective","props":[{"name":"label","value":"PE-3(g)[2][b]"}],"prose":"combinations are compromised;"},{"id":"pe-3.g_obj.2.c","name":"objective","props":[{"name":"label","value":"PE-3(g)[2][c]"}],"prose":"individuals are transferred or terminated."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access control\n\nsecurity plan\n\nphysical access control logs or records\n\ninventory records of physical access control devices\n\ninformation system entry and exit points\n\nrecords of key and lock combination changes\n\nstorage locations for physical access control devices\n\nphysical access control devices\n\nlist of security safeguards controlling access to designated publicly accessible areas within facility\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access control responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for physical access control\n\nautomated mechanisms supporting and\/or implementing physical access control\n\nphysical access control devices"}]}]},{"id":"pe-4","class":"SP800-53","title":"Access Control for Transmission Medium","params":[{"id":"pe-4_prm_1","label":"organization-defined information system distribution and transmission lines"},{"id":"pe-4_prm_2","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-4"},{"name":"sort-id","value":"pe-04"}],"links":[{"href":"#06dff0ea-3848-4945-8d91-e955ee69f05d","rel":"reference"}],"parts":[{"id":"pe-4_smt","name":"statement","prose":"The organization controls physical access to {{ insert: param, pe-4_prm_1 }} within organizational facilities using {{ insert: param, pe-4_prm_2 }}."},{"id":"pe-4_gdn","name":"guidance","prose":"Physical security safeguards applied to information system distribution and transmission lines help to prevent accidental damage, disruption, and physical tampering. In addition, physical safeguards may be necessary to help prevent eavesdropping or in transit modification of unencrypted transmissions. Security safeguards to control physical access to system distribution and transmission lines include, for example: (i) locked wiring closets; (ii) disconnected or locked spare jacks; and\/or (iii) protection of cabling by conduit or cable trays.","links":[{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-8","rel":"related"}]},{"id":"pe-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-4_obj.1","name":"objective","props":[{"name":"label","value":"PE-4[1]"}],"prose":"defines information system distribution and transmission lines requiring physical access controls;"},{"id":"pe-4_obj.2","name":"objective","props":[{"name":"label","value":"PE-4[2]"}],"prose":"defines security safeguards to be employed to control physical access to organization-defined information system distribution and transmission lines within organizational facilities; and"},{"id":"pe-4_obj.3","name":"objective","props":[{"name":"label","value":"PE-4[3]"}],"prose":"controls physical access to organization-defined information system distribution and transmission lines within organizational facilities using organization-defined security safeguards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing access control for transmission medium\n\ninformation system design documentation\n\nfacility communications and wiring diagrams\n\nlist of physical security safeguards applied to information system distribution and transmission lines\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access control responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for access control to distribution and transmission lines\n\nautomated mechanisms\/security safeguards supporting and\/or implementing access control to distribution and transmission lines"}]}]},{"id":"pe-5","class":"SP800-53","title":"Access Control for Output Devices","props":[{"name":"priority","value":"P2"},{"name":"label","value":"PE-5"},{"name":"sort-id","value":"pe-05"}],"parts":[{"id":"pe-5_smt","name":"statement","prose":"The organization controls physical access to information system output devices to prevent unauthorized individuals from obtaining the output."},{"id":"pe-5_gdn","name":"guidance","prose":"Controlling physical access to output devices includes, for example, placing output devices in locked rooms or other secured areas and allowing access to authorized individuals only, and placing output devices in locations that can be monitored by organizational personnel. Monitors, printers, copiers, scanners, facsimile machines, and audio devices are examples of information system output devices.","links":[{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#pe-18","rel":"related"}]},{"id":"pe-5_obj","name":"objective","prose":"Determine if the organization controls physical access to information system output devices to prevent unauthorized individuals from obtaining the output."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing access control for display medium\n\nfacility layout of information system components\n\nactual displays from information system components\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access control responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for access control to output devices\n\nautomated mechanisms supporting and\/or implementing access control to output devices"}]}]},{"id":"pe-6","class":"SP800-53","title":"Monitoring Physical Access","params":[{"id":"pe-6_prm_1","label":"organization-defined frequency"},{"id":"pe-6_prm_2","label":"organization-defined events or potential indications of events"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-6"},{"name":"sort-id","value":"pe-06"}],"parts":[{"id":"pe-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Monitors physical access to the facility where the information system resides to detect and respond to physical security incidents;"},{"id":"pe-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews physical access logs {{ insert: param, pe-6_prm_1 }} and upon occurrence of {{ insert: param, pe-6_prm_2 }}; and"},{"id":"pe-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Coordinates results of reviews and investigations with the organizational incident response capability."}]},{"id":"pe-6_gdn","name":"guidance","prose":"Organizational incident response capabilities include investigations of and responses to detected physical security incidents. Security incidents include, for example, apparent security violations or suspicious physical access activities. Suspicious physical access activities include, for example: (i) accesses outside of normal work hours; (ii) repeated accesses to areas not normally accessed; (iii) accesses for unusual lengths of time; and (iv) out-of-sequence accesses.","links":[{"href":"#ca-7","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"pe-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-6.a_obj","name":"objective","props":[{"name":"label","value":"PE-6(a)"}],"prose":"monitors physical access to the facility where the information system resides to detect and respond to physical security incidents;"},{"id":"pe-6.b_obj","name":"objective","props":[{"name":"label","value":"PE-6(b)"}],"parts":[{"id":"pe-6.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-6(b)[1]"}],"prose":"defines the frequency to review physical access logs;"},{"id":"pe-6.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-6(b)[2]"}],"prose":"defines events or potential indication of events requiring physical access logs to be reviewed;"},{"id":"pe-6.b_obj.3","name":"objective","props":[{"name":"label","value":"PE-6(b)[3]"}],"prose":"reviews physical access logs with the organization-defined frequency and upon occurrence of organization-defined events or potential indications of events; and"}]},{"id":"pe-6.c_obj","name":"objective","props":[{"name":"label","value":"PE-6(c)"}],"prose":"coordinates results of reviews and investigations with the organizational incident response capability."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access monitoring\n\nsecurity plan\n\nphysical access logs or records\n\nphysical access monitoring records\n\nphysical access log reviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access monitoring responsibilities\n\norganizational personnel with incident response responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring physical access\n\nautomated mechanisms supporting and\/or implementing physical access monitoring\n\nautomated mechanisms supporting and\/or implementing reviewing of physical access logs"}]}],"controls":[{"id":"pe-6.1","class":"SP800-53-enhancement","title":"Intrusion Alarms \/ Surveillance Equipment","props":[{"name":"label","value":"PE-6(1)"},{"name":"sort-id","value":"pe-06.01"}],"parts":[{"id":"pe-6.1_smt","name":"statement","prose":"The organization monitors physical intrusion alarms and surveillance equipment."},{"id":"pe-6.1_obj","name":"objective","prose":"Determine if the organization monitors physical intrusion alarms and surveillance equipment."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access monitoring\n\nsecurity plan\n\nphysical access logs or records\n\nphysical access monitoring records\n\nphysical access log reviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access monitoring responsibilities\n\norganizational personnel with incident response responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring physical intrusion alarms and surveillance equipment\n\nautomated mechanisms supporting and\/or implementing physical access monitoring\n\nautomated mechanisms supporting and\/or implementing physical intrusion alarms and surveillance equipment"}]}]}]},{"id":"pe-8","class":"SP800-53","title":"Visitor Access Records","params":[{"id":"pe-8_prm_1","label":"organization-defined time period"},{"id":"pe-8_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"PE-8"},{"name":"sort-id","value":"pe-08"}],"parts":[{"id":"pe-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Maintains visitor access records to the facility where the information system resides for {{ insert: param, pe-8_prm_1 }}; and"},{"id":"pe-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews visitor access records {{ insert: param, pe-8_prm_2 }}."}]},{"id":"pe-8_gdn","name":"guidance","prose":"Visitor access records include, for example, names and organizations of persons visiting, visitor signatures, forms of identification, dates of access, entry and departure times, purposes of visits, and names and organizations of persons visited. Visitor access records are not required for publicly accessible areas."},{"id":"pe-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-8.a_obj","name":"objective","props":[{"name":"label","value":"PE-8(a)"}],"parts":[{"id":"pe-8.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-8(a)[1]"}],"prose":"defines the time period to maintain visitor access records to the facility where the information system resides;"},{"id":"pe-8.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-8(a)[2]"}],"prose":"maintains visitor access records to the facility where the information system resides for the organization-defined time period;"}]},{"id":"pe-8.b_obj","name":"objective","props":[{"name":"label","value":"PE-8(b)"}],"parts":[{"id":"pe-8.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-8(b)[1]"}],"prose":"defines the frequency to review visitor access records; and"},{"id":"pe-8.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-8(b)[2]"}],"prose":"reviews visitor access records with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing visitor access records\n\nsecurity plan\n\nvisitor access control logs or records\n\nvisitor access record or log reviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with visitor access records responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for maintaining and reviewing visitor access records\n\nautomated mechanisms supporting and\/or implementing maintenance and review of visitor access records"}]}]},{"id":"pe-9","class":"SP800-53","title":"Power Equipment and Cabling","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-9"},{"name":"sort-id","value":"pe-09"}],"parts":[{"id":"pe-9_smt","name":"statement","prose":"The organization protects power equipment and power cabling for the information system from damage and destruction."},{"id":"pe-9_gdn","name":"guidance","prose":"Organizations determine the types of protection necessary for power equipment and cabling employed at different locations both internal and external to organizational facilities and environments of operation. This includes, for example, generators and power cabling outside of buildings, internal cabling and uninterruptable power sources within an office or data center, and power sources for self-contained entities such as vehicles and satellites.","links":[{"href":"#pe-4","rel":"related"}]},{"id":"pe-9_obj","name":"objective","prose":"Determine if the organization protects power equipment and power cabling for the information system from damage and destruction."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing power equipment\/cabling protection\n\nfacilities housing power equipment\/cabling\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for protecting power equipment\/cabling\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing protection of power equipment\/cabling"}]}]},{"id":"pe-10","class":"SP800-53","title":"Emergency Shutoff","params":[{"id":"pe-10_prm_1","label":"organization-defined location by information system or system component"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-10"},{"name":"sort-id","value":"pe-10"}],"parts":[{"id":"pe-10_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-10_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Provides the capability of shutting off power to the information system or individual system components in emergency situations;"},{"id":"pe-10_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Places emergency shutoff switches or devices in {{ insert: param, pe-10_prm_1 }} to facilitate safe and easy access for personnel; and"},{"id":"pe-10_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Protects emergency power shutoff capability from unauthorized activation."}]},{"id":"pe-10_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms.","links":[{"href":"#pe-15","rel":"related"}]},{"id":"pe-10_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-10.a_obj","name":"objective","props":[{"name":"label","value":"PE-10(a)"}],"prose":"provides the capability of shutting off power to the information system or individual system components in emergency situations;"},{"id":"pe-10.b_obj","name":"objective","props":[{"name":"label","value":"PE-10(b)"}],"parts":[{"id":"pe-10.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-10(b)[1]"}],"prose":"defines the location of emergency shutoff switches or devices by information system or system component;"},{"id":"pe-10.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-10(b)[2]"}],"prose":"places emergency shutoff switches or devices in the organization-defined location by information system or system component to facilitate safe and easy access for personnel; and"}]},{"id":"pe-10.c_obj","name":"objective","props":[{"name":"label","value":"PE-10(c)"}],"prose":"protects emergency power shutoff capability from unauthorized activation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing power source emergency shutoff\n\nsecurity plan\n\nemergency shutoff controls or switches\n\nlocations housing emergency shutoff switches and devices\n\nsecurity safeguards protecting emergency power shutoff capability from unauthorized activation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for emergency power shutoff capability (both implementing and using the capability)\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing emergency power shutoff"}]}]},{"id":"pe-11","class":"SP800-53","title":"Emergency Power","params":[{"id":"pe-11_prm_1","select":{"how-many":"one-or-more","choice":["an orderly shutdown of the information system","transition of the information system to long-term alternate power"]}}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-11"},{"name":"sort-id","value":"pe-11"}],"parts":[{"id":"pe-11_smt","name":"statement","prose":"The organization provides a short-term uninterruptible power supply to facilitate {{ insert: param, pe-11_prm_1 }} in the event of a primary power source loss."},{"id":"pe-11_gdn","name":"guidance","links":[{"href":"#at-3","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#cp-7","rel":"related"}]},{"id":"pe-11_obj","name":"objective","prose":"Determine if the organization provides a short-term uninterruptible power supply to facilitate one or more of the following in the event of a primary power source loss:","parts":[{"id":"pe-11_obj.1","name":"objective","props":[{"name":"label","value":"PE-11[1]"}],"prose":"an orderly shutdown of the information system; and\/or"},{"id":"pe-11_obj.2","name":"objective","props":[{"name":"label","value":"PE-11[2]"}],"prose":"transition of the information system to long-term alternate power."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing emergency power\n\nuninterruptible power supply\n\nuninterruptible power supply documentation\n\nuninterruptible power supply test records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for emergency power and\/or planning\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing uninterruptible power supply\n\nthe uninterruptable power supply"}]}]},{"id":"pe-12","class":"SP800-53","title":"Emergency Lighting","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-12"},{"name":"sort-id","value":"pe-12"}],"parts":[{"id":"pe-12_smt","name":"statement","prose":"The organization employs and maintains automatic emergency lighting for the information system that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility."},{"id":"pe-12_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-7","rel":"related"}]},{"id":"pe-12_obj","name":"objective","prose":"Determine if the organization employs and maintains automatic emergency lighting for the information system that:","parts":[{"id":"pe-12_obj.1","name":"objective","props":[{"name":"label","value":"PE-12[1]"}],"prose":"activates in the event of a power outage or disruption; and"},{"id":"pe-12_obj.2","name":"objective","props":[{"name":"label","value":"PE-12[2]"}],"prose":"covers emergency exits and evacuation routes within the facility."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing emergency lighting\n\nemergency lighting documentation\n\nemergency lighting test records\n\nemergency exits and evacuation routes\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for emergency lighting and\/or planning\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing emergency lighting capability"}]}]},{"id":"pe-13","class":"SP800-53","title":"Fire Protection","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-13"},{"name":"sort-id","value":"pe-13"}],"parts":[{"id":"pe-13_smt","name":"statement","prose":"The organization employs and maintains fire suppression and detection devices\/systems for the information system that are supported by an independent energy source."},{"id":"pe-13_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms. Fire suppression and detection devices\/systems include, for example, sprinkler systems, handheld fire extinguishers, fixed fire hoses, and smoke detectors."},{"id":"pe-13_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-13_obj.1","name":"objective","props":[{"name":"label","value":"PE-13[1]"}],"prose":"employs fire suppression and detection devices\/systems for the information system that are supported by an independent energy source; and"},{"id":"pe-13_obj.2","name":"objective","props":[{"name":"label","value":"PE-13[2]"}],"prose":"maintains fire suppression and detection devices\/systems for the information system that are supported by an independent energy source."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing fire protection\n\nfire suppression and detection devices\/systems\n\nfire suppression and detection devices\/systems documentation\n\ntest records of fire suppression and detection devices\/systems\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for fire detection and suppression devices\/systems\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing fire suppression\/detection devices\/systems"}]}],"controls":[{"id":"pe-13.3","class":"SP800-53-enhancement","title":"Automatic Fire Suppression","props":[{"name":"label","value":"PE-13(3)"},{"name":"sort-id","value":"pe-13.03"}],"parts":[{"id":"pe-13.3_smt","name":"statement","prose":"The organization employs an automatic fire suppression capability for the information system when the facility is not staffed on a continuous basis."},{"id":"pe-13.3_obj","name":"objective","prose":"Determine if the organization employs an automatic fire suppression capability for the information system when the facility is not staffed on a continuous basis."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing fire protection\n\nfire suppression and detection devices\/systems documentation\n\nfacility housing the information system\n\nalarm service-level agreements\n\ntest records of fire suppression and detection devices\/systems\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for fire detection and suppression devices\/systems\n\norganizational personnel with responsibilities for providing automatic notifications of any activation of fire suppression devices\/systems to appropriate personnel, roles, and emergency responders\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing fire suppression devices\/systems\n\nactivation of fire suppression devices\/systems (simulated)"}]}]}]},{"id":"pe-14","class":"SP800-53","title":"Temperature and Humidity Controls","params":[{"id":"pe-14_prm_1","label":"organization-defined acceptable levels"},{"id":"pe-14_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-14"},{"name":"sort-id","value":"pe-14"}],"parts":[{"id":"pe-14_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-14_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Maintains temperature and humidity levels within the facility where the information system resides at {{ insert: param, pe-14_prm_1 }}; and"},{"id":"pe-14_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Monitors temperature and humidity levels {{ insert: param, pe-14_prm_2 }}."}]},{"id":"pe-14_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources, for example, data centers, server rooms, and mainframe computer rooms.","links":[{"href":"#at-3","rel":"related"}]},{"id":"pe-14_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-14.a_obj","name":"objective","props":[{"name":"label","value":"PE-14(a)"}],"parts":[{"id":"pe-14.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-14(a)[1]"}],"prose":"defines acceptable temperature levels to be maintained within the facility where the information system resides;"},{"id":"pe-14.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-14(a)[2]"}],"prose":"defines acceptable humidity levels to be maintained within the facility where the information system resides;"},{"id":"pe-14.a_obj.3","name":"objective","props":[{"name":"label","value":"PE-14(a)[3]"}],"prose":"maintains temperature levels within the facility where the information system resides at the organization-defined levels;"},{"id":"pe-14.a_obj.4","name":"objective","props":[{"name":"label","value":"PE-14(a)[4]"}],"prose":"maintains humidity levels within the facility where the information system resides at the organization-defined levels;"}]},{"id":"pe-14.b_obj","name":"objective","props":[{"name":"label","value":"PE-14(b)"}],"parts":[{"id":"pe-14.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-14(b)[1]"}],"prose":"defines the frequency to monitor temperature levels;"},{"id":"pe-14.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-14(b)[2]"}],"prose":"defines the frequency to monitor humidity levels;"},{"id":"pe-14.b_obj.3","name":"objective","props":[{"name":"label","value":"PE-14(b)[3]"}],"prose":"monitors temperature levels with the organization-defined frequency; and"},{"id":"pe-14.b_obj.4","name":"objective","props":[{"name":"label","value":"PE-14(b)[4]"}],"prose":"monitors humidity levels with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing temperature and humidity control\n\nsecurity plan\n\ntemperature and humidity controls\n\nfacility housing the information system\n\ntemperature and humidity controls documentation\n\ntemperature and humidity records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for information system environmental controls\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing maintenance and monitoring of temperature and humidity levels"}]}]},{"id":"pe-15","class":"SP800-53","title":"Water Damage Protection","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-15"},{"name":"sort-id","value":"pe-15"}],"parts":[{"id":"pe-15_smt","name":"statement","prose":"The organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are accessible, working properly, and known to key personnel."},{"id":"pe-15_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms. Isolation valves can be employed in addition to or in lieu of master shutoff valves to shut off water supplies in specific areas of concern, without affecting entire organizations.","links":[{"href":"#at-3","rel":"related"}]},{"id":"pe-15_obj","name":"objective","prose":"Determine if the organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are:","parts":[{"id":"pe-15_obj.1","name":"objective","props":[{"name":"label","value":"PE-15[1]"}],"prose":"accessible;"},{"id":"pe-15_obj.2","name":"objective","props":[{"name":"label","value":"PE-15[2]"}],"prose":"working properly; and"},{"id":"pe-15_obj.3","name":"objective","props":[{"name":"label","value":"PE-15[3]"}],"prose":"known to key personnel."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing water damage protection\n\nfacility housing the information system\n\nmaster shutoff valves\n\nlist of key personnel with knowledge of location and activation procedures for master shutoff valves for the plumbing system\n\nmaster shutoff valve documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for information system environmental controls\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Master water-shutoff valves\n\norganizational process for activating master water-shutoff"}]}]},{"id":"pe-16","class":"SP800-53","title":"Delivery and Removal","params":[{"id":"pe-16_prm_1","label":"organization-defined types of information system components"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PE-16"},{"name":"sort-id","value":"pe-16"}],"parts":[{"id":"pe-16_smt","name":"statement","prose":"The organization authorizes, monitors, and controls {{ insert: param, pe-16_prm_1 }} entering and exiting the facility and maintains records of those items."},{"id":"pe-16_gdn","name":"guidance","prose":"Effectively enforcing authorizations for entry and exit of information system components may require restricting access to delivery areas and possibly isolating the areas from the information system and media libraries.","links":[{"href":"#cm-3","rel":"related"},{"href":"#ma-2","rel":"related"},{"href":"#ma-3","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#sa-12","rel":"related"}]},{"id":"pe-16_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-16_obj.1","name":"objective","props":[{"name":"label","value":"PE-16[1]"}],"prose":"defines types of information system components to be authorized, monitored, and controlled as such components are entering and exiting the facility;"},{"id":"pe-16_obj.2","name":"objective","props":[{"name":"label","value":"PE-16[2]"}],"prose":"authorizes organization-defined information system components entering the facility;"},{"id":"pe-16_obj.3","name":"objective","props":[{"name":"label","value":"PE-16[3]"}],"prose":"monitors organization-defined information system components entering the facility;"},{"id":"pe-16_obj.4","name":"objective","props":[{"name":"label","value":"PE-16[4]"}],"prose":"controls organization-defined information system components entering the facility;"},{"id":"pe-16_obj.5","name":"objective","props":[{"name":"label","value":"PE-16[5]"}],"prose":"authorizes organization-defined information system components exiting the facility;"},{"id":"pe-16_obj.6","name":"objective","props":[{"name":"label","value":"PE-16[6]"}],"prose":"monitors organization-defined information system components exiting the facility;"},{"id":"pe-16_obj.7","name":"objective","props":[{"name":"label","value":"PE-16[7]"}],"prose":"controls organization-defined information system components exiting the facility;"},{"id":"pe-16_obj.8","name":"objective","props":[{"name":"label","value":"PE-16[8]"}],"prose":"maintains records of information system components entering the facility; and"},{"id":"pe-16_obj.9","name":"objective","props":[{"name":"label","value":"PE-16[9]"}],"prose":"maintains records of information system components exiting the facility."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing delivery and removal of information system components from the facility\n\nsecurity plan\n\nfacility housing the information system\n\nrecords of items entering and exiting the facility\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for controlling information system components entering and exiting the facility\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for authorizing, monitoring, and controlling information system-related items entering and exiting the facility\n\nautomated mechanisms supporting and\/or implementing authorizing, monitoring, and controlling information system-related items entering and exiting the facility"}]}]},{"id":"pe-17","class":"SP800-53","title":"Alternate Work Site","params":[{"id":"pe-17_prm_1","label":"organization-defined security controls"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PE-17"},{"name":"sort-id","value":"pe-17"}],"links":[{"href":"#5309d4d0-46f8-4213-a749-e7584164e5e8","rel":"reference"}],"parts":[{"id":"pe-17_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-17_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Employs {{ insert: param, pe-17_prm_1 }} at alternate work sites;"},{"id":"pe-17_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Assesses as feasible, the effectiveness of security controls at alternate work sites; and"},{"id":"pe-17_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Provides a means for employees to communicate with information security personnel in case of security incidents or problems."}]},{"id":"pe-17_gdn","name":"guidance","prose":"Alternate work sites may include, for example, government facilities or private residences of employees. While commonly distinct from alternative processing sites, alternate work sites may provide readily available alternate locations as part of contingency operations. Organizations may define different sets of security controls for specific alternate work sites or types of sites depending on the work-related activities conducted at those sites. This control supports the contingency planning activities of organizations and the federal telework initiative.","links":[{"href":"#ac-17","rel":"related"},{"href":"#cp-7","rel":"related"}]},{"id":"pe-17_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-17.a_obj","name":"objective","props":[{"name":"label","value":"PE-17(a)"}],"parts":[{"id":"pe-17.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-17(a)[1]"}],"prose":"defines security controls to be employed at alternate work sites;"},{"id":"pe-17.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-17(a)[2]"}],"prose":"employs organization-defined security controls at alternate work sites;"}]},{"id":"pe-17.b_obj","name":"objective","props":[{"name":"label","value":"PE-17(b)"}],"prose":"assesses, as feasible, the effectiveness of security controls at alternate work sites; and"},{"id":"pe-17.c_obj","name":"objective","props":[{"name":"label","value":"PE-17(c)"}],"prose":"provides a means for employees to communicate with information security personnel in case of security incidents or problems."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing alternate work sites for organizational personnel\n\nsecurity plan\n\nlist of security controls required for alternate work sites\n\nassessments of security controls at alternate work sites\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel approving use of alternate work sites\n\norganizational personnel using alternate work sites\n\norganizational personnel assessing controls at alternate work sites\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security at alternate work sites\n\nautomated mechanisms supporting alternate work sites\n\nsecurity controls employed at alternate work sites\n\nmeans of communications between personnel at alternate work sites and security personnel"}]}]}]},{"id":"pl","class":"family","title":"Planning","controls":[{"id":"pl-1","class":"SP800-53","title":"Security Planning Policy and Procedures","params":[{"id":"pl-1_prm_1","label":"organization-defined personnel or roles"},{"id":"pl-1_prm_2","label":"organization-defined frequency"},{"id":"pl-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PL-1"},{"name":"sort-id","value":"pl-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9c5c9e8c-dc81-4f55-a11c-d71d7487790f","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"pl-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, pl-1_prm_1 }}:","parts":[{"id":"pl-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A security planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"pl-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the security planning policy and associated security planning controls; and"}]},{"id":"pl-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"pl-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security planning policy {{ insert: param, pl-1_prm_2 }}; and"},{"id":"pl-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Security planning procedures {{ insert: param, pl-1_prm_3 }}."}]}]},{"id":"pl-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the PL family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"pl-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-1.a_obj","name":"objective","props":[{"name":"label","value":"PL-1(a)"}],"parts":[{"id":"pl-1.a.1_obj","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)"}],"parts":[{"id":"pl-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1]"}],"prose":"develops and documents a planning policy that addresses:","parts":[{"id":"pl-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"pl-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"pl-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"pl-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"pl-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"pl-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"pl-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"pl-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the planning policy is to be disseminated;"},{"id":"pl-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[3]"}],"prose":"disseminates the planning policy to organization-defined personnel or roles;"}]},{"id":"pl-1.a.2_obj","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)"}],"parts":[{"id":"pl-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the planning policy and associated planning controls;"},{"id":"pl-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"pl-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"pl-1.b_obj","name":"objective","props":[{"name":"label","value":"PL-1(b)"}],"parts":[{"id":"pl-1.b.1_obj","name":"objective","props":[{"name":"label","value":"PL-1(b)(1)"}],"parts":[{"id":"pl-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current planning policy;"},{"id":"pl-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(b)(1)[2]"}],"prose":"reviews and updates the current planning policy with the organization-defined frequency;"}]},{"id":"pl-1.b.2_obj","name":"objective","props":[{"name":"label","value":"PL-1(b)(2)"}],"parts":[{"id":"pl-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current planning procedures; and"},{"id":"pl-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(b)(2)[2]"}],"prose":"reviews and updates the current planning procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Planning policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with planning responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"pl-2","class":"SP800-53","title":"System Security Plan","params":[{"id":"pl-2_prm_1","label":"organization-defined personnel or roles"},{"id":"pl-2_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PL-2"},{"name":"sort-id","value":"pl-02"}],"links":[{"href":"#9c5c9e8c-dc81-4f55-a11c-d71d7487790f","rel":"reference"}],"parts":[{"id":"pl-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a security plan for the information system that:","parts":[{"id":"pl-2_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Is consistent with the organization’s enterprise architecture;"},{"id":"pl-2_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Explicitly defines the authorization boundary for the system;"},{"id":"pl-2_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Describes the operational context of the information system in terms of missions and business processes;"},{"id":"pl-2_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Provides the security categorization of the information system including supporting rationale;"},{"id":"pl-2_smt.a.5","name":"item","props":[{"name":"label","value":"5."}],"prose":"Describes the operational environment for the information system and relationships with or connections to other information systems;"},{"id":"pl-2_smt.a.6","name":"item","props":[{"name":"label","value":"6."}],"prose":"Provides an overview of the security requirements for the system;"},{"id":"pl-2_smt.a.7","name":"item","props":[{"name":"label","value":"7."}],"prose":"Identifies any relevant overlays, if applicable;"},{"id":"pl-2_smt.a.8","name":"item","props":[{"name":"label","value":"8."}],"prose":"Describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring decisions; and"},{"id":"pl-2_smt.a.9","name":"item","props":[{"name":"label","value":"9."}],"prose":"Is reviewed and approved by the authorizing official or designated representative prior to plan implementation;"}]},{"id":"pl-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Distributes copies of the security plan and communicates subsequent changes to the plan to {{ insert: param, pl-2_prm_1 }};"},{"id":"pl-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the security plan for the information system {{ insert: param, pl-2_prm_2 }};"},{"id":"pl-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Updates the plan to address changes to the information system\/environment of operation or problems identified during plan implementation or security control assessments; and"},{"id":"pl-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Protects the security plan from unauthorized disclosure and modification."}]},{"id":"pl-2_gdn","name":"guidance","prose":"Security plans relate security requirements to a set of security controls and control enhancements. Security plans also describe, at a high level, how the security controls and control enhancements meet those security requirements, but do not provide detailed, technical descriptions of the specific design or implementation of the controls\/enhancements. Security plans contain sufficient information (including the specification of parameter values for assignment and selection statements either explicitly or by reference) to enable a design and implementation that is unambiguously compliant with the intent of the plans and subsequent determinations of risk to organizational operations and assets, individuals, other organizations, and the Nation if the plan is implemented as intended. Organizations can also apply tailoring guidance to the security control baselines in Appendix D and CNSS Instruction 1253 to develop overlays for community-wide use or to address specialized requirements, technologies, or missions\/environments of operation (e.g., DoD-tactical, Federal Public Key Infrastructure, or Federal Identity, Credential, and Access Management, space operations). Appendix I provides guidance on developing overlays. Security plans need not be single documents; the plans can be a collection of various documents including documents that already exist. Effective security plans make extensive use of references to policies, procedures, and additional documents (e.g., design and implementation specifications) where more detailed information can be obtained. This reduces the documentation requirements associated with security programs and maintains security-related information in other established management\/operational areas related to enterprise architecture, system development life cycle, systems engineering, and acquisition. For example, security plans do not contain detailed contingency plan or incident response plan information but instead provide explicitly or by reference, sufficient information to define what needs to be accomplished by those plans.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ca-2","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#pl-7","rel":"related"},{"href":"#pm-1","rel":"related"},{"href":"#pm-7","rel":"related"},{"href":"#pm-8","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#pm-11","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-17","rel":"related"}]},{"id":"pl-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-2.a_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)"}],"prose":"develops a security plan for the information system that:","parts":[{"id":"pl-2.a.1_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(1)"}],"prose":"is consistent with the organization’s enterprise architecture;"},{"id":"pl-2.a.2_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(2)"}],"prose":"explicitly defines the authorization boundary for the system;"},{"id":"pl-2.a.3_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(3)"}],"prose":"describes the operational context of the information system in terms of missions and business processes;"},{"id":"pl-2.a.4_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(4)"}],"prose":"provides the security categorization of the information system including supporting rationale;"},{"id":"pl-2.a.5_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(5)"}],"prose":"describes the operational environment for the information system and relationships with or connections to other information systems;"},{"id":"pl-2.a.6_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(6)"}],"prose":"provides an overview of the security requirements for the system;"},{"id":"pl-2.a.7_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(7)"}],"prose":"identifies any relevant overlays, if applicable;"},{"id":"pl-2.a.8_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(8)"}],"prose":"describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring and supplemental decisions;"},{"id":"pl-2.a.9_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(9)"}],"prose":"is reviewed and approved by the authorizing official or designated representative prior to plan implementation;"}]},{"id":"pl-2.b_obj","name":"objective","props":[{"name":"label","value":"PL-2(b)"}],"parts":[{"id":"pl-2.b_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(b)[1]"}],"prose":"defines personnel or roles to whom copies of the security plan are to be distributed and subsequent changes to the plan are to be communicated;"},{"id":"pl-2.b_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(b)[2]"}],"prose":"distributes copies of the security plan and communicates subsequent changes to the plan to organization-defined personnel or roles;"}]},{"id":"pl-2.c_obj","name":"objective","props":[{"name":"label","value":"PL-2(c)"}],"parts":[{"id":"pl-2.c_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(c)[1]"}],"prose":"defines the frequency to review the security plan for the information system;"},{"id":"pl-2.c_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(c)[2]"}],"prose":"reviews the security plan for the information system with the organization-defined frequency;"}]},{"id":"pl-2.d_obj","name":"objective","props":[{"name":"label","value":"PL-2(d)"}],"prose":"updates the plan to address:","parts":[{"id":"pl-2.d_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(d)[1]"}],"prose":"changes to the information system\/environment of operation;"},{"id":"pl-2.d_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(d)[2]"}],"prose":"problems identified during plan implementation;"},{"id":"pl-2.d_obj.3","name":"objective","props":[{"name":"label","value":"PL-2(d)[3]"}],"prose":"problems identified during security control assessments;"}]},{"id":"pl-2.e_obj","name":"objective","props":[{"name":"label","value":"PL-2(e)"}],"prose":"protects the security plan from unauthorized:","parts":[{"id":"pl-2.e_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(e)[1]"}],"prose":"disclosure; and"},{"id":"pl-2.e_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(e)[2]"}],"prose":"modification."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\nprocedures addressing security plan development and implementation\n\nprocedures addressing security plan reviews and updates\n\nenterprise architecture documentation\n\nsecurity plan for the information system\n\nrecords of security plan reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security plan development\/review\/update\/approval\n\nautomated mechanisms supporting the information system security plan"}]}],"controls":[{"id":"pl-2.3","class":"SP800-53-enhancement","title":"Plan \/ Coordinate with Other Organizational Entities","params":[{"id":"pl-2.3_prm_1","label":"organization-defined individuals or groups"}],"props":[{"name":"label","value":"PL-2(3)"},{"name":"sort-id","value":"pl-02.03"}],"parts":[{"id":"pl-2.3_smt","name":"statement","prose":"The organization plans and coordinates security-related activities affecting the information system with {{ insert: param, pl-2.3_prm_1 }} before conducting such activities in order to reduce the impact on other organizational entities."},{"id":"pl-2.3_gdn","name":"guidance","prose":"Security-related activities include, for example, security assessments, audits, hardware and software maintenance, patch management, and contingency plan testing. Advance planning and coordination includes emergency and nonemergency (i.e., planned or nonurgent unplanned) situations. The process defined by organizations to plan and coordinate security-related activities can be included in security plans for information systems or other documents, as appropriate.","links":[{"href":"#cp-4","rel":"related"},{"href":"#ir-4","rel":"related"}]},{"id":"pl-2.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-2.3_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(3)[1]"}],"prose":"defines individuals or groups with whom security-related activities affecting the information system are to be planned and coordinated before conducting such activities in order to reduce the impact on other organizational entities; and"},{"id":"pl-2.3_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(3)[2]"}],"prose":"plans and coordinates security-related activities affecting the information system with organization-defined individuals or groups before conducting such activities in order to reduce the impact on other organizational entities."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\naccess control policy\n\ncontingency planning policy\n\nprocedures addressing security-related activity planning for the information system\n\nsecurity plan for the information system\n\ncontingency plan for the information system\n\ninformation system design documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security planning and plan implementation responsibilities\n\norganizational individuals or groups with whom security-related activities are to be planned and coordinated\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"pl-4","class":"SP800-53","title":"Rules of Behavior","params":[{"id":"pl-4_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PL-4"},{"name":"sort-id","value":"pl-04"}],"links":[{"href":"#9c5c9e8c-dc81-4f55-a11c-d71d7487790f","rel":"reference"}],"parts":[{"id":"pl-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes and makes readily available to individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;"},{"id":"pl-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Receives a signed acknowledgment from such individuals, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the information system;"},{"id":"pl-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews and updates the rules of behavior {{ insert: param, pl-4_prm_1 }}; and"},{"id":"pl-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Requires individuals who have signed a previous version of the rules of behavior to read and re-sign when the rules of behavior are revised\/updated."}]},{"id":"pl-4_gdn","name":"guidance","prose":"This control enhancement applies to organizational users. Organizations consider rules of behavior based on individual user roles and responsibilities, differentiating, for example, between rules that apply to privileged users and rules that apply to general users. Establishing rules of behavior for some types of non-organizational users including, for example, individuals who simply receive data\/information from federal information systems, is often not feasible given the large number of such users and the limited nature of their interactions with the systems. Rules of behavior for both organizational and non-organizational users can also be established in AC-8, System Use Notification. PL-4 b. (the signed acknowledgment portion of this control) may be satisfied by the security awareness training and role-based security training programs conducted by organizations if such training includes rules of behavior. Organizations can use electronic signatures for acknowledging rules of behavior.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-8","rel":"related"},{"href":"#ac-9","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#mp-7","rel":"related"},{"href":"#ps-6","rel":"related"},{"href":"#ps-8","rel":"related"},{"href":"#sa-5","rel":"related"}]},{"id":"pl-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-4.a_obj","name":"objective","props":[{"name":"label","value":"PL-4(a)"}],"parts":[{"id":"pl-4.a_obj.1","name":"objective","props":[{"name":"label","value":"PL-4(a)[1]"}],"prose":"establishes, for individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;"},{"id":"pl-4.a_obj.2","name":"objective","props":[{"name":"label","value":"PL-4(a)[2]"}],"prose":"makes readily available to individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;"}]},{"id":"pl-4.b_obj","name":"objective","props":[{"name":"label","value":"PL-4(b)"}],"prose":"receives a signed acknowledgement from such individuals, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the information system;"},{"id":"pl-4.c_obj","name":"objective","props":[{"name":"label","value":"PL-4(c)"}],"parts":[{"id":"pl-4.c_obj.1","name":"objective","props":[{"name":"label","value":"PL-4(c)[1]"}],"prose":"defines the frequency to review and update the rules of behavior;"},{"id":"pl-4.c_obj.2","name":"objective","props":[{"name":"label","value":"PL-4(c)[2]"}],"prose":"reviews and updates the rules of behavior with the organization-defined frequency; and"}]},{"id":"pl-4.d_obj","name":"objective","props":[{"name":"label","value":"PL-4(d)"}],"prose":"requires individuals who have signed a previous version of the rules of behavior to read and resign when the rules of behavior are revised\/updated."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\nprocedures addressing rules of behavior for information system users\n\nrules of behavior\n\nsigned acknowledgements\n\nrecords for rules of behavior reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for establishing, reviewing, and updating rules of behavior\n\norganizational personnel who are authorized users of the information system and have signed and resigned rules of behavior\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for establishing, reviewing, disseminating, and updating rules of behavior\n\nautomated mechanisms supporting and\/or implementing the establishment, review, dissemination, and update of rules of behavior"}]}],"controls":[{"id":"pl-4.1","class":"SP800-53-enhancement","title":"Social Media and Networking Restrictions","props":[{"name":"label","value":"PL-4(1)"},{"name":"sort-id","value":"pl-04.01"}],"parts":[{"id":"pl-4.1_smt","name":"statement","prose":"The organization includes in the rules of behavior, explicit restrictions on the use of social media\/networking sites and posting organizational information on public websites."},{"id":"pl-4.1_gdn","name":"guidance","prose":"This control enhancement addresses rules of behavior related to the use of social media\/networking sites: (i) when organizational personnel are using such sites for official duties or in the conduct of official business; (ii) when organizational information is involved in social media\/networking transactions; and (iii) when personnel are accessing social media\/networking sites from organizational information systems. Organizations also address specific rules that prevent unauthorized entities from obtaining and\/or inferring non-public organizational information (e.g., system account information, personally identifiable information) from social media\/networking sites."},{"id":"pl-4.1_obj","name":"objective","prose":"Determine if the organization includes the following in the rules of behavior:","parts":[{"id":"pl-4.1_obj.1","name":"objective","props":[{"name":"label","value":"PL-4(1)[1]"}],"prose":"explicit restrictions on the use of social media\/networking sites; and"},{"id":"pl-4.1_obj.2","name":"objective","props":[{"name":"label","value":"PL-4(1)[2]"}],"prose":"posting organizational information on public websites."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\nprocedures addressing rules of behavior for information system users\n\nrules of behavior\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for establishing, reviewing, and updating rules of behavior\n\norganizational personnel who are authorized users of the information system and have signed rules of behavior\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for establishing rules of behavior\n\nautomated mechanisms supporting and\/or implementing the establishment of rules of behavior"}]}]}]},{"id":"pl-8","class":"SP800-53","title":"Information Security Architecture","params":[{"id":"pl-8_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PL-8"},{"name":"sort-id","value":"pl-08"}],"parts":[{"id":"pl-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops an information security architecture for the information system that:","parts":[{"id":"pl-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Describes the overall philosophy, requirements, and approach to be taken with regard to protecting the confidentiality, integrity, and availability of organizational information;"},{"id":"pl-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Describes how the information security architecture is integrated into and supports the enterprise architecture; and"},{"id":"pl-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Describes any information security assumptions about, and dependencies on, external services;"}]},{"id":"pl-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the information security architecture {{ insert: param, pl-8_prm_1 }} to reflect updates in the enterprise architecture; and"},{"id":"pl-8_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensures that planned information security architecture changes are reflected in the security plan, the security Concept of Operations (CONOPS), and organizational procurements\/acquisitions."}]},{"id":"pl-8_gdn","name":"guidance","prose":"This control addresses actions taken by organizations in the design and development of information systems. The information security architecture at the individual information system level is consistent with and complements the more global, organization-wide information security architecture described in PM-7 that is integral to and developed as part of the enterprise architecture. The information security architecture includes an architectural description, the placement\/allocation of security functionality (including security controls), security-related information for external interfaces, information being exchanged across the interfaces, and the protection mechanisms associated with each interface. In addition, the security architecture can include other important security-related information, for example, user roles and access privileges assigned to each role, unique security requirements, the types of information processed, stored, and transmitted by the information system, restoration priorities of information and information system services, and any other specific protection needs. In today’s modern architecture, it is becoming less common for organizations to control all information resources. There are going to be key dependencies on external information services and service providers. Describing such dependencies in the information security architecture is important to developing a comprehensive mission\/business protection strategy. Establishing, developing, documenting, and maintaining under configuration control, a baseline configuration for organizational information systems is critical to implementing and maintaining an effective information security architecture. The development of the information security architecture is coordinated with the Senior Agency Official for Privacy (SAOP)\/Chief Privacy Officer (CPO) to ensure that security controls needed to support privacy requirements are identified and effectively implemented. PL-8 is primarily directed at organizations (i.e., internally focused) to help ensure that organizations develop an information security architecture for the information system, and that the security architecture is integrated with or tightly coupled to the enterprise architecture through the organization-wide information security architecture. In contrast, SA-17 is primarily directed at external information technology product\/system developers and integrators (although SA-17 could be used internally within organizations for in-house system development). SA-17, which is complementary to PL-8, is selected when organizations outsource the development of information systems or information system components to external entities, and there is a need to demonstrate\/show consistency with the organization’s enterprise architecture and information security architecture.","links":[{"href":"#cm-2","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#pm-7","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-17","rel":"related"},{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-53r4","rel":"related"}]},{"id":"pl-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-8.a_obj","name":"objective","props":[{"name":"label","value":"PL-8(a)"}],"prose":"develops an information security architecture for the information system that describes:","parts":[{"id":"pl-8.a.1_obj","name":"objective","props":[{"name":"label","value":"PL-8(a)(1)"}],"prose":"the overall philosophy, requirements, and approach to be taken with regard to protecting the confidentiality, integrity, and availability of organizational information;"},{"id":"pl-8.a.2_obj","name":"objective","props":[{"name":"label","value":"PL-8(a)(2)"}],"prose":"how the information security architecture is integrated into and supports the enterprise architecture;"},{"id":"pl-8.a.3_obj","name":"objective","props":[{"name":"label","value":"PL-8(a)(3)"}],"prose":"any information security assumptions about, and dependencies on, external services;"}]},{"id":"pl-8.b_obj","name":"objective","props":[{"name":"label","value":"PL-8(b)"}],"parts":[{"id":"pl-8.b_obj.1","name":"objective","props":[{"name":"label","value":"PL-8(b)[1]"}],"prose":"defines the frequency to review and update the information security architecture;"},{"id":"pl-8.b_obj.2","name":"objective","props":[{"name":"label","value":"PL-8(b)[2]"}],"prose":"reviews and updates the information security architecture with the organization-defined frequency to reflect updates in the enterprise architecture;"}]},{"id":"pl-8.c_obj","name":"objective","props":[{"name":"label","value":"PL-8(c)"}],"prose":"ensures that planned information security architecture changes are reflected in:","parts":[{"id":"pl-8.c_obj.1","name":"objective","props":[{"name":"label","value":"PL-8(c)[1]"}],"prose":"the security plan;"},{"id":"pl-8.c_obj.2","name":"objective","props":[{"name":"label","value":"PL-8(c)[2]"}],"prose":"the security Concept of Operations (CONOPS); and"},{"id":"pl-8.c_obj.3","name":"objective","props":[{"name":"label","value":"PL-8(c)[3]"}],"prose":"the organizational procurements\/acquisitions."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\nprocedures addressing information security architecture development\n\nprocedures addressing information security architecture reviews and updates\n\nenterprise architecture documentation\n\ninformation security architecture documentation\n\nsecurity plan for the information system\n\nsecurity CONOPS for the information system\n\nrecords of information security architecture reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security planning and plan implementation responsibilities\n\norganizational personnel with information security architecture development responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for developing, reviewing, and updating the information security architecture\n\nautomated mechanisms supporting and\/or implementing the development, review, and update of the information security architecture"}]}]}]},{"id":"ps","class":"family","title":"Personnel Security","controls":[{"id":"ps-1","class":"SP800-53","title":"Personnel Security Policy and Procedures","params":[{"id":"ps-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ps-1_prm_2","label":"organization-defined frequency"},{"id":"ps-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-1"},{"name":"sort-id","value":"ps-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ps-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ps-1_prm_1 }}:","parts":[{"id":"ps-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A personnel security policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ps-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the personnel security policy and associated personnel security controls; and"}]},{"id":"ps-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ps-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Personnel security policy {{ insert: param, ps-1_prm_2 }}; and"},{"id":"ps-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Personnel security procedures {{ insert: param, ps-1_prm_3 }}."}]}]},{"id":"ps-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the PS family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ps-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-1.a_obj","name":"objective","props":[{"name":"label","value":"PS-1(a)"}],"parts":[{"id":"ps-1.a.1_obj","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)"}],"parts":[{"id":"ps-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1]"}],"prose":"develops and documents an personnel security policy that addresses:","parts":[{"id":"ps-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ps-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ps-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ps-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ps-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ps-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ps-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ps-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the personnel security policy is to be disseminated;"},{"id":"ps-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[3]"}],"prose":"disseminates the personnel security policy to organization-defined personnel or roles;"}]},{"id":"ps-1.a.2_obj","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)"}],"parts":[{"id":"ps-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the personnel security policy and associated personnel security controls;"},{"id":"ps-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ps-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ps-1.b_obj","name":"objective","props":[{"name":"label","value":"PS-1(b)"}],"parts":[{"id":"ps-1.b.1_obj","name":"objective","props":[{"name":"label","value":"PS-1(b)(1)"}],"parts":[{"id":"ps-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current personnel security policy;"},{"id":"ps-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(b)(1)[2]"}],"prose":"reviews and updates the current personnel security policy with the organization-defined frequency;"}]},{"id":"ps-1.b.2_obj","name":"objective","props":[{"name":"label","value":"PS-1(b)(2)"}],"parts":[{"id":"ps-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current personnel security procedures; and"},{"id":"ps-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(b)(2)[2]"}],"prose":"reviews and updates the current personnel security procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access control responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ps-2","class":"SP800-53","title":"Position Risk Designation","params":[{"id":"ps-2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-2"},{"name":"sort-id","value":"ps-02"}],"links":[{"href":"#0c97e60b-325a-4efa-ba2b-90f20ccd5abc","rel":"reference"}],"parts":[{"id":"ps-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Assigns a risk designation to all organizational positions;"},{"id":"ps-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishes screening criteria for individuals filling those positions; and"},{"id":"ps-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews and updates position risk designations {{ insert: param, ps-2_prm_1 }}."}]},{"id":"ps-2_gdn","name":"guidance","prose":"Position risk designations reflect Office of Personnel Management policy and guidance. Risk designations can guide and inform the types of authorizations individuals receive when accessing organizational information and information systems. Position screening criteria include explicit information security role appointment requirements (e.g., training, security clearances).","links":[{"href":"#at-3","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#ps-3","rel":"related"}]},{"id":"ps-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-2.a_obj","name":"objective","props":[{"name":"label","value":"PS-2(a)"}],"prose":"assigns a risk designation to all organizational positions;"},{"id":"ps-2.b_obj","name":"objective","props":[{"name":"label","value":"PS-2(b)"}],"prose":"establishes screening criteria for individuals filling those positions;"},{"id":"ps-2.c_obj","name":"objective","props":[{"name":"label","value":"PS-2(c)"}],"parts":[{"id":"ps-2.c_obj.1","name":"objective","props":[{"name":"label","value":"PS-2(c)[1]"}],"prose":"defines the frequency to review and update position risk designations; and"},{"id":"ps-2.c_obj.2","name":"objective","props":[{"name":"label","value":"PS-2(c)[2]"}],"prose":"reviews and updates position risk designations with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing position categorization\n\nappropriate codes of federal regulations\n\nlist of risk designations for organizational positions\n\nsecurity plan\n\nrecords of position risk designation reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for assigning, reviewing, and updating position risk designations\n\norganizational processes for establishing screening criteria"}]}]},{"id":"ps-3","class":"SP800-53","title":"Personnel Screening","params":[{"id":"ps-3_prm_1","label":"organization-defined conditions requiring rescreening and, where rescreening is so indicated, the frequency of such rescreening"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-3"},{"name":"sort-id","value":"ps-03"}],"links":[{"href":"#0c97e60b-325a-4efa-ba2b-90f20ccd5abc","rel":"reference"},{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#6caa237b-531b-43ac-9711-d8f6b97b0377","rel":"reference"}],"parts":[{"id":"ps-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Screens individuals prior to authorizing access to the information system; and"},{"id":"ps-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Rescreens individuals according to {{ insert: param, ps-3_prm_1 }}."}]},{"id":"ps-3_gdn","name":"guidance","prose":"Personnel screening and rescreening activities reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, guidance, and specific criteria established for the risk designations of assigned positions. Organizations may define different rescreening conditions and frequencies for personnel accessing information systems based on types of information processed, stored, or transmitted by the systems.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#ps-2","rel":"related"}]},{"id":"ps-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-3.a_obj","name":"objective","props":[{"name":"label","value":"PS-3(a)"}],"prose":"screens individuals prior to authorizing access to the information system;"},{"id":"ps-3.b_obj","name":"objective","props":[{"name":"label","value":"PS-3(b)"}],"parts":[{"id":"ps-3.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-3(b)[1]"}],"prose":"defines conditions requiring re-screening;"},{"id":"ps-3.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-3(b)[2]"}],"prose":"defines the frequency of re-screening where it is so indicated; and"},{"id":"ps-3.b_obj.3","name":"objective","props":[{"name":"label","value":"PS-3(b)[3]"}],"prose":"re-screens individuals in accordance with organization-defined conditions requiring re-screening and, where re-screening is so indicated, with the organization-defined frequency of such re-screening."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel screening\n\nrecords of screened personnel\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for personnel screening"}]}]},{"id":"ps-4","class":"SP800-53","title":"Personnel Termination","params":[{"id":"ps-4_prm_1","label":"organization-defined time period"},{"id":"ps-4_prm_2","label":"organization-defined information security topics"},{"id":"ps-4_prm_3","label":"organization-defined personnel or roles"},{"id":"ps-4_prm_4","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-4"},{"name":"sort-id","value":"ps-04"}],"parts":[{"id":"ps-4_smt","name":"statement","prose":"The organization, upon termination of individual employment:","parts":[{"id":"ps-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Disables information system access within {{ insert: param, ps-4_prm_1 }};"},{"id":"ps-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Terminates\/revokes any authenticators\/credentials associated with the individual;"},{"id":"ps-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Conducts exit interviews that include a discussion of {{ insert: param, ps-4_prm_2 }};"},{"id":"ps-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Retrieves all security-related organizational information system-related property;"},{"id":"ps-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Retains access to organizational information and information systems formerly controlled by terminated individual; and"},{"id":"ps-4_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Notifies {{ insert: param, ps-4_prm_3 }} within {{ insert: param, ps-4_prm_4 }}."}]},{"id":"ps-4_gdn","name":"guidance","prose":"Information system-related property includes, for example, hardware authentication tokens, system administration technical manuals, keys, identification cards, and building passes. Exit interviews ensure that terminated individuals understand the security constraints imposed by being former employees and that proper accountability is achieved for information system-related property. Security topics of interest at exit interviews can include, for example, reminding terminated individuals of nondisclosure agreements and potential limitations on future employment. Exit interviews may not be possible for some terminated individuals, for example, in cases related to job abandonment, illnesses, and nonavailability of supervisors. Exit interviews are important for individuals with security clearances. Timely execution of termination actions is essential for individuals terminated for cause. In certain situations, organizations consider disabling the information system accounts of individuals that are being terminated prior to the individuals being notified.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#ps-5","rel":"related"},{"href":"#ps-6","rel":"related"}]},{"id":"ps-4_obj","name":"objective","prose":"Determine if the organization, upon termination of individual employment,:","parts":[{"id":"ps-4.a_obj","name":"objective","props":[{"name":"label","value":"PS-4(a)"}],"parts":[{"id":"ps-4.a_obj.1","name":"objective","props":[{"name":"label","value":"PS-4(a)[1]"}],"prose":"defines a time period within which to disable information system access;"},{"id":"ps-4.a_obj.2","name":"objective","props":[{"name":"label","value":"PS-4(a)[2]"}],"prose":"disables information system access within the organization-defined time period;"}]},{"id":"ps-4.b_obj","name":"objective","props":[{"name":"label","value":"PS-4(b)"}],"prose":"terminates\/revokes any authenticators\/credentials associated with the individual;"},{"id":"ps-4.c_obj","name":"objective","props":[{"name":"label","value":"PS-4(c)"}],"parts":[{"id":"ps-4.c_obj.1","name":"objective","props":[{"name":"label","value":"PS-4(c)[1]"}],"prose":"defines information security topics to be discussed when conducting exit interviews;"},{"id":"ps-4.c_obj.2","name":"objective","props":[{"name":"label","value":"PS-4(c)[2]"}],"prose":"conducts exit interviews that include a discussion of organization-defined information security topics;"}]},{"id":"ps-4.d_obj","name":"objective","props":[{"name":"label","value":"PS-4(d)"}],"prose":"retrieves all security-related organizational information system-related property;"},{"id":"ps-4.e_obj","name":"objective","props":[{"name":"label","value":"PS-4(e)"}],"prose":"retains access to organizational information and information systems formerly controlled by the terminated individual;"},{"id":"ps-4.f_obj","name":"objective","props":[{"name":"label","value":"PS-4(f)"}],"parts":[{"id":"ps-4.f_obj.1","name":"objective","props":[{"name":"label","value":"PS-4(f)[1]"}],"prose":"defines personnel or roles to be notified of the termination;"},{"id":"ps-4.f_obj.2","name":"objective","props":[{"name":"label","value":"PS-4(f)[2]"}],"prose":"defines the time period within which to notify organization-defined personnel or roles; and"},{"id":"ps-4.f_obj.3","name":"objective","props":[{"name":"label","value":"PS-4(f)[3]"}],"prose":"notifies organization-defined personnel or roles within the organization-defined time period."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel termination\n\nrecords of personnel termination actions\n\nlist of information system accounts\n\nrecords of terminated or revoked authenticators\/credentials\n\nrecords of exit interviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for personnel termination\n\nautomated mechanisms supporting and\/or implementing personnel termination notifications\n\nautomated mechanisms for disabling information system access\/revoking authenticators"}]}]},{"id":"ps-5","class":"SP800-53","title":"Personnel Transfer","params":[{"id":"ps-5_prm_1","label":"organization-defined transfer or reassignment actions"},{"id":"ps-5_prm_2","label":"organization-defined time period following the formal transfer action"},{"id":"ps-5_prm_3","label":"organization-defined personnel or roles"},{"id":"ps-5_prm_4","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PS-5"},{"name":"sort-id","value":"ps-05"}],"parts":[{"id":"ps-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Reviews and confirms ongoing operational need for current logical and physical access authorizations to information systems\/facilities when individuals are reassigned or transferred to other positions within the organization;"},{"id":"ps-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Initiates {{ insert: param, ps-5_prm_1 }} within {{ insert: param, ps-5_prm_2 }};"},{"id":"ps-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Modifies access authorization as needed to correspond with any changes in operational need due to reassignment or transfer; and"},{"id":"ps-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Notifies {{ insert: param, ps-5_prm_3 }} within {{ insert: param, ps-5_prm_4 }}."}]},{"id":"ps-5_gdn","name":"guidance","prose":"This control applies when reassignments or transfers of individuals are permanent or of such extended durations as to make the actions warranted. Organizations define actions appropriate for the types of reassignments or transfers, whether permanent or extended. Actions that may be required for personnel transfers or reassignments to other positions within organizations include, for example: (i) returning old and issuing new keys, identification cards, and building passes; (ii) closing information system accounts and establishing new accounts; (iii) changing information system access authorizations (i.e., privileges); and (iv) providing for access to official records to which individuals had access at previous work locations and in previous information system accounts.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#ps-4","rel":"related"}]},{"id":"ps-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-5.a_obj","name":"objective","props":[{"name":"label","value":"PS-5(a)"}],"prose":"when individuals are reassigned or transferred to other positions within the organization, reviews and confirms ongoing operational need for current:","parts":[{"id":"ps-5.a_obj.1","name":"objective","props":[{"name":"label","value":"PS-5(a)[1]"}],"prose":"logical access authorizations to information systems;"},{"id":"ps-5.a_obj.2","name":"objective","props":[{"name":"label","value":"PS-5(a)[2]"}],"prose":"physical access authorizations to information systems and facilities;"}]},{"id":"ps-5.b_obj","name":"objective","props":[{"name":"label","value":"PS-5(b)"}],"parts":[{"id":"ps-5.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-5(b)[1]"}],"prose":"defines transfer or reassignment actions to be initiated following transfer or reassignment;"},{"id":"ps-5.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-5(b)[2]"}],"prose":"defines the time period within which transfer or reassignment actions must occur following transfer or reassignment;"},{"id":"ps-5.b_obj.3","name":"objective","props":[{"name":"label","value":"PS-5(b)[3]"}],"prose":"initiates organization-defined transfer or reassignment actions within the organization-defined time period following transfer or reassignment;"}]},{"id":"ps-5.c_obj","name":"objective","props":[{"name":"label","value":"PS-5(c)"}],"prose":"modifies access authorization as needed to correspond with any changes in operational need due to reassignment or transfer;"},{"id":"ps-5.d_obj","name":"objective","props":[{"name":"label","value":"PS-5(d)"}],"parts":[{"id":"ps-5.d_obj.1","name":"objective","props":[{"name":"label","value":"PS-5(d)[1]"}],"prose":"defines personnel or roles to be notified when individuals are reassigned or transferred to other positions within the organization;"},{"id":"ps-5.d_obj.2","name":"objective","props":[{"name":"label","value":"PS-5(d)[2]"}],"prose":"defines the time period within which to notify organization-defined personnel or roles when individuals are reassigned or transferred to other positions within the organization; and"},{"id":"ps-5.d_obj.3","name":"objective","props":[{"name":"label","value":"PS-5(d)[3]"}],"prose":"notifies organization-defined personnel or roles within the organization-defined time period when individuals are reassigned or transferred to other positions within the organization."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel transfer\n\nsecurity plan\n\nrecords of personnel transfer actions\n\nlist of information system and facility access authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for personnel transfer\n\nautomated mechanisms supporting and\/or implementing personnel transfer notifications\n\nautomated mechanisms for disabling information system access\/revoking authenticators"}]}]},{"id":"ps-6","class":"SP800-53","title":"Access Agreements","params":[{"id":"ps-6_prm_1","label":"organization-defined frequency"},{"id":"ps-6_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"PS-6"},{"name":"sort-id","value":"ps-06"}],"parts":[{"id":"ps-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops and documents access agreements for organizational information systems;"},{"id":"ps-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the access agreements {{ insert: param, ps-6_prm_1 }}; and"},{"id":"ps-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensures that individuals requiring access to organizational information and information systems:","parts":[{"id":"ps-6_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Sign appropriate access agreements prior to being granted access; and"},{"id":"ps-6_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Re-sign access agreements to maintain access to organizational information systems when access agreements have been updated or {{ insert: param, ps-6_prm_2 }}."}]}]},{"id":"ps-6_gdn","name":"guidance","prose":"Access agreements include, for example, nondisclosure agreements, acceptable use agreements, rules of behavior, and conflict-of-interest agreements. Signed access agreements include an acknowledgement that individuals have read, understand, and agree to abide by the constraints associated with organizational information systems to which access is authorized. Organizations can use electronic signatures to acknowledge access agreements unless specifically prohibited by organizational policy.","links":[{"href":"#pl-4","rel":"related"},{"href":"#ps-2","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ps-4","rel":"related"},{"href":"#ps-8","rel":"related"}]},{"id":"ps-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-6.a_obj","name":"objective","props":[{"name":"label","value":"PS-6(a)"}],"prose":"develops and documents access agreements for organizational information systems;"},{"id":"ps-6.b_obj","name":"objective","props":[{"name":"label","value":"PS-6(b)"}],"parts":[{"id":"ps-6.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-6(b)[1]"}],"prose":"defines the frequency to review and update the access agreements;"},{"id":"ps-6.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-6(b)[2]"}],"prose":"reviews and updates the access agreements with the organization-defined frequency;"}]},{"id":"ps-6.c_obj","name":"objective","props":[{"name":"label","value":"PS-6(c)"}],"parts":[{"id":"ps-6.c.1_obj","name":"objective","props":[{"name":"label","value":"PS-6(c)(1)"}],"prose":"ensures that individuals requiring access to organizational information and information systems sign appropriate access agreements prior to being granted access;"},{"id":"ps-6.c.2_obj","name":"objective","props":[{"name":"label","value":"PS-6(c)(2)"}],"parts":[{"id":"ps-6.c.2_obj.1","name":"objective","props":[{"name":"label","value":"PS-6(c)(2)[1]"}],"prose":"defines the frequency to re-sign access agreements to maintain access to organizational information systems when access agreements have been updated;"},{"id":"ps-6.c.2_obj.2","name":"objective","props":[{"name":"label","value":"PS-6(c)(2)[2]"}],"prose":"ensures that individuals requiring access to organizational information and information systems re-sign access agreements to maintain access to organizational information systems when access agreements have been updated or with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing access agreements for organizational information and information systems\n\nsecurity plan\n\naccess agreements\n\nrecords of access agreement reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel who have signed\/resigned access agreements\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for access agreements\n\nautomated mechanisms supporting access agreements"}]}]},{"id":"ps-7","class":"SP800-53","title":"Third-party Personnel Security","params":[{"id":"ps-7_prm_1","label":"organization-defined personnel or roles"},{"id":"ps-7_prm_2","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-7"},{"name":"sort-id","value":"ps-07"}],"links":[{"href":"#0c775bc3-bfc3-42c7-a382-88949f503171","rel":"reference"}],"parts":[{"id":"ps-7_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes personnel security requirements including security roles and responsibilities for third-party providers;"},{"id":"ps-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Requires third-party providers to comply with personnel security policies and procedures established by the organization;"},{"id":"ps-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Documents personnel security requirements;"},{"id":"ps-7_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Requires third-party providers to notify {{ insert: param, ps-7_prm_1 }} of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges within {{ insert: param, ps-7_prm_2 }}; and"},{"id":"ps-7_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Monitors provider compliance."}]},{"id":"ps-7_gdn","name":"guidance","prose":"Third-party providers include, for example, service bureaus, contractors, and other organizations providing information system development, information technology services, outsourced applications, and network and security management. Organizations explicitly include personnel security requirements in acquisition-related documents. Third-party providers may have personnel working at organizational facilities with credentials, badges, or information system privileges issued by organizations. Notifications of third-party personnel changes ensure appropriate termination of privileges and credentials. Organizations define the transfers and terminations deemed reportable by security-related characteristics that include, for example, functions, roles, and nature of credentials\/privileges associated with individuals transferred or terminated.","links":[{"href":"#ps-2","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ps-4","rel":"related"},{"href":"#ps-5","rel":"related"},{"href":"#ps-6","rel":"related"},{"href":"#sa-9","rel":"related"},{"href":"#sa-21","rel":"related"}]},{"id":"ps-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-7.a_obj","name":"objective","props":[{"name":"label","value":"PS-7(a)"}],"prose":"establishes personnel security requirements, including security roles and responsibilities, for third-party providers;"},{"id":"ps-7.b_obj","name":"objective","props":[{"name":"label","value":"PS-7(b)"}],"prose":"requires third-party providers to comply with personnel security policies and procedures established by the organization;"},{"id":"ps-7.c_obj","name":"objective","props":[{"name":"label","value":"PS-7(c)"}],"prose":"documents personnel security requirements;"},{"id":"ps-7.d_obj","name":"objective","props":[{"name":"label","value":"PS-7(d)"}],"parts":[{"id":"ps-7.d_obj.1","name":"objective","props":[{"name":"label","value":"PS-7(d)[1]"}],"prose":"defines personnel or roles to be notified of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges;"},{"id":"ps-7.d_obj.2","name":"objective","props":[{"name":"label","value":"PS-7(d)[2]"}],"prose":"defines the time period within which third-party providers are required to notify organization-defined personnel or roles of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges;"},{"id":"ps-7.d_obj.3","name":"objective","props":[{"name":"label","value":"PS-7(d)[3]"}],"prose":"requires third-party providers to notify organization-defined personnel or roles within the organization-defined time period of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges; and"}]},{"id":"ps-7.e_obj","name":"objective","props":[{"name":"label","value":"PS-7(e)"}],"prose":"monitors provider compliance."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing third-party personnel security\n\nlist of personnel security requirements\n\nacquisition documents\n\nservice-level agreements\n\ncompliance monitoring process\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\nthird-party providers\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing and monitoring third-party personnel security\n\nautomated mechanisms supporting and\/or implementing monitoring of provider compliance"}]}]},{"id":"ps-8","class":"SP800-53","title":"Personnel Sanctions","params":[{"id":"ps-8_prm_1","label":"organization-defined personnel or roles"},{"id":"ps-8_prm_2","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"PS-8"},{"name":"sort-id","value":"ps-08"}],"parts":[{"id":"ps-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Employs a formal sanctions process for individuals failing to comply with established information security policies and procedures; and"},{"id":"ps-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Notifies {{ insert: param, ps-8_prm_1 }} within {{ insert: param, ps-8_prm_2 }} when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction."}]},{"id":"ps-8_gdn","name":"guidance","prose":"Organizational sanctions processes reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Sanctions processes are described in access agreements and can be included as part of general personnel policies and procedures for organizations. Organizations consult with the Office of the General Counsel regarding matters of employee sanctions.","links":[{"href":"#pl-4","rel":"related"},{"href":"#ps-6","rel":"related"}]},{"id":"ps-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-8.a_obj","name":"objective","props":[{"name":"label","value":"PS-8(a)"}],"prose":"employs a formal sanctions process for individuals failing to comply with established information security policies and procedures;"},{"id":"ps-8.b_obj","name":"objective","props":[{"name":"label","value":"PS-8(b)"}],"parts":[{"id":"ps-8.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-8(b)[1]"}],"prose":"defines personnel or roles to be notified when a formal employee sanctions process is initiated;"},{"id":"ps-8.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-8(b)[2]"}],"prose":"defines the time period within which organization-defined personnel or roles must be notified when a formal employee sanctions process is initiated; and"},{"id":"ps-8.b_obj.3","name":"objective","props":[{"name":"label","value":"PS-8(b)[3]"}],"prose":"notifies organization-defined personnel or roles within the organization-defined time period when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel sanctions\n\nrules of behavior\n\nrecords of formal sanctions\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing personnel sanctions\n\nautomated mechanisms supporting and\/or implementing notifications"}]}]}]},{"id":"ra","class":"family","title":"Risk Assessment","controls":[{"id":"ra-1","class":"SP800-53","title":"Risk Assessment Policy and Procedures","params":[{"id":"ra-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ra-1_prm_2","label":"organization-defined frequency"},{"id":"ra-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-1"},{"name":"sort-id","value":"ra-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ra-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ra-1_prm_1 }}:","parts":[{"id":"ra-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ra-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls; and"}]},{"id":"ra-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ra-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Risk assessment policy {{ insert: param, ra-1_prm_2 }}; and"},{"id":"ra-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Risk assessment procedures {{ insert: param, ra-1_prm_3 }}."}]}]},{"id":"ra-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the RA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ra-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-1.a_obj","name":"objective","props":[{"name":"label","value":"RA-1(a)"}],"parts":[{"id":"ra-1.a.1_obj","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)"}],"parts":[{"id":"ra-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1]"}],"prose":"develops and documents a risk assessment policy that addresses:","parts":[{"id":"ra-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ra-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ra-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ra-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ra-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ra-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ra-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ra-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the risk assessment policy is to be disseminated;"},{"id":"ra-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[3]"}],"prose":"disseminates the risk assessment policy to organization-defined personnel or roles;"}]},{"id":"ra-1.a.2_obj","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)"}],"parts":[{"id":"ra-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls;"},{"id":"ra-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ra-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ra-1.b_obj","name":"objective","props":[{"name":"label","value":"RA-1(b)"}],"parts":[{"id":"ra-1.b.1_obj","name":"objective","props":[{"name":"label","value":"RA-1(b)(1)"}],"parts":[{"id":"ra-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current risk assessment policy;"},{"id":"ra-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(b)(1)[2]"}],"prose":"reviews and updates the current risk assessment policy with the organization-defined frequency;"}]},{"id":"ra-1.b.2_obj","name":"objective","props":[{"name":"label","value":"RA-1(b)(2)"}],"parts":[{"id":"ra-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current risk assessment procedures; and"},{"id":"ra-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(b)(2)[2]"}],"prose":"reviews and updates the current risk assessment procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"risk assessment policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with risk assessment responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ra-2","class":"SP800-53","title":"Security Categorization","props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-2"},{"name":"sort-id","value":"ra-02"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"}],"parts":[{"id":"ra-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Categorizes information and the information system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"},{"id":"ra-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents the security categorization results (including supporting rationale) in the security plan for the information system; and"},{"id":"ra-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensures that the authorizing official or authorizing official designated representative reviews and approves the security categorization decision."}]},{"id":"ra-2_gdn","name":"guidance","prose":"Clearly defined authorization boundaries are a prerequisite for effective security categorization decisions. Security categories describe the potential adverse impacts to organizational operations, organizational assets, and individuals if organizational information and information systems are comprised through a loss of confidentiality, integrity, or availability. Organizations conduct the security categorization process as an organization-wide activity with the involvement of chief information officers, senior information security officers, information system owners, mission\/business owners, and information owners\/stewards. Organizations also consider the potential adverse impacts to other organizations and, in accordance with the USA PATRIOT Act of 2001 and Homeland Security Presidential Directives, potential national-level adverse impacts. Security categorization processes carried out by organizations facilitate the development of inventories of information assets, and along with CM-8, mappings to specific information system components where information is processed, stored, or transmitted.","links":[{"href":"#cm-8","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"ra-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-2.a_obj","name":"objective","props":[{"name":"label","value":"RA-2(a)"}],"prose":"categorizes information and the information system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"},{"id":"ra-2.b_obj","name":"objective","props":[{"name":"label","value":"RA-2(b)"}],"prose":"documents the security categorization results (including supporting rationale) in the security plan for the information system; and"},{"id":"ra-2.c_obj","name":"objective","props":[{"name":"label","value":"RA-2(c)"}],"prose":"ensures the authorizing official or authorizing official designated representative reviews and approves the security categorization decision."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nsecurity planning policy and procedures\n\nprocedures addressing security categorization of organizational information and information systems\n\nsecurity plan\n\nsecurity categorization documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security categorization and risk assessment responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security categorization"}]}]},{"id":"ra-3","class":"SP800-53","title":"Risk Assessment","params":[{"id":"ra-3_prm_1","select":{"choice":["security plan","risk assessment report"," {{ insert: param, ra-3_prm_2 }} "]}},{"id":"ra-3_prm_2","depends-on":"ra-3_prm_1","label":"organization-defined document"},{"id":"ra-3_prm_3","label":"organization-defined frequency"},{"id":"ra-3_prm_4","label":"organization-defined personnel or roles"},{"id":"ra-3_prm_5","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-3"},{"name":"sort-id","value":"ra-03"}],"links":[{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ra-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Conducts an assessment of risk, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, disruption, modification, or destruction of the information system and the information it processes, stores, or transmits;"},{"id":"ra-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents risk assessment results in {{ insert: param, ra-3_prm_1 }};"},{"id":"ra-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews risk assessment results {{ insert: param, ra-3_prm_3 }};"},{"id":"ra-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Disseminates risk assessment results to {{ insert: param, ra-3_prm_4 }}; and"},{"id":"ra-3_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Updates the risk assessment {{ insert: param, ra-3_prm_5 }} or whenever there are significant changes to the information system or environment of operation (including the identification of new threats and vulnerabilities), or other conditions that may impact the security state of the system."}]},{"id":"ra-3_gdn","name":"guidance","prose":"Clearly defined authorization boundaries are a prerequisite for effective risk assessments. Risk assessments take into account threats, vulnerabilities, likelihood, and impact to organizational operations and assets, individuals, other organizations, and the Nation based on the operation and use of information systems. Risk assessments also take into account risk from external parties (e.g., service providers, contractors operating information systems on behalf of the organization, individuals accessing organizational information systems, outsourcing entities). In accordance with OMB policy and related E-authentication initiatives, authentication of public users accessing federal information systems may also be required to protect nonpublic or privacy-related information. As such, organizational assessments of risk also address public access to federal information systems. Risk assessments (either formal or informal) can be conducted at all three tiers in the risk management hierarchy (i.e., organization level, mission\/business process level, or information system level) and at any phase in the system development life cycle. Risk assessments can also be conducted at various steps in the Risk Management Framework, including categorization, security control selection, security control implementation, security control assessment, information system authorization, and security control monitoring. RA-3 is noteworthy in that the control must be partially implemented prior to the implementation of other controls in order to complete the first two steps in the Risk Management Framework. Risk assessments can play an important role in security control selection processes, particularly during the application of tailoring guidance, which includes security control supplementation.","links":[{"href":"#ra-2","rel":"related"},{"href":"#pm-9","rel":"related"}]},{"id":"ra-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-3.a_obj","name":"objective","props":[{"name":"label","value":"RA-3(a)"}],"prose":"conducts an assessment of risk, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, disruption, modification, or destruction of:","parts":[{"id":"ra-3.a_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(a)[1]"}],"prose":"the information system;"},{"id":"ra-3.a_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(a)[2]"}],"prose":"the information the system processes, stores, or transmits;"}]},{"id":"ra-3.b_obj","name":"objective","props":[{"name":"label","value":"RA-3(b)"}],"parts":[{"id":"ra-3.b_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(b)[1]"}],"prose":"defines a document in which risk assessment results are to be documented (if not documented in the security plan or risk assessment report);"},{"id":"ra-3.b_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(b)[2]"}],"prose":"documents risk assessment results in one of the following:","parts":[{"id":"ra-3.b_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-3(b)[2][a]"}],"prose":"the security plan;"},{"id":"ra-3.b_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-3(b)[2][b]"}],"prose":"the risk assessment report; or"},{"id":"ra-3.b_obj.2.c","name":"objective","props":[{"name":"label","value":"RA-3(b)[2][c]"}],"prose":"the organization-defined document;"}]}]},{"id":"ra-3.c_obj","name":"objective","props":[{"name":"label","value":"RA-3(c)"}],"parts":[{"id":"ra-3.c_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(c)[1]"}],"prose":"defines the frequency to review risk assessment results;"},{"id":"ra-3.c_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(c)[2]"}],"prose":"reviews risk assessment results with the organization-defined frequency;"}]},{"id":"ra-3.d_obj","name":"objective","props":[{"name":"label","value":"RA-3(d)"}],"parts":[{"id":"ra-3.d_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(d)[1]"}],"prose":"defines personnel or roles to whom risk assessment results are to be disseminated;"},{"id":"ra-3.d_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(d)[2]"}],"prose":"disseminates risk assessment results to organization-defined personnel or roles;"}]},{"id":"ra-3.e_obj","name":"objective","props":[{"name":"label","value":"RA-3(e)"}],"parts":[{"id":"ra-3.e_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(e)[1]"}],"prose":"defines the frequency to update the risk assessment;"},{"id":"ra-3.e_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(e)[2]"}],"prose":"updates the risk assessment:","parts":[{"id":"ra-3.e_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-3(e)[2][a]"}],"prose":"with the organization-defined frequency;"},{"id":"ra-3.e_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-3(e)[2][b]"}],"prose":"whenever there are significant changes to the information system or environment of operation (including the identification of new threats and vulnerabilities); and"},{"id":"ra-3.e_obj.2.c","name":"objective","props":[{"name":"label","value":"RA-3(e)[2][c]"}],"prose":"whenever there are other conditions that may impact the security state of the system."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nsecurity planning policy and procedures\n\nprocedures addressing organizational assessments of risk\n\nsecurity plan\n\nrisk assessment\n\nrisk assessment results\n\nrisk assessment reviews\n\nrisk assessment updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with risk assessment responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for risk assessment\n\nautomated mechanisms supporting and\/or for conducting, documenting, reviewing, disseminating, and updating the risk assessment"}]}]},{"id":"ra-5","class":"SP800-53","title":"Vulnerability Scanning","params":[{"id":"ra-5_prm_1","label":"organization-defined frequency and\/or randomly in accordance with organization-defined process"},{"id":"ra-5_prm_2","label":"organization-defined response times"},{"id":"ra-5_prm_3","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-5"},{"name":"sort-id","value":"ra-05"}],"links":[{"href":"#bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","rel":"reference"},{"href":"#84a37532-6db6-477b-9ea8-f9085ebca0fc","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"},{"href":"#15522e92-9192-463d-9646-6a01982db8ca","rel":"reference"},{"href":"#275cc052-0f7f-423c-bdb6-ed503dc36228","rel":"reference"}],"parts":[{"id":"ra-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Scans for vulnerabilities in the information system and hosted applications {{ insert: param, ra-5_prm_1 }} and when new vulnerabilities potentially affecting the system\/applications are identified and reported;"},{"id":"ra-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for:","parts":[{"id":"ra-5_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Enumerating platforms, software flaws, and improper configurations;"},{"id":"ra-5_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Formatting checklists and test procedures; and"},{"id":"ra-5_smt.b.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Measuring vulnerability impact;"}]},{"id":"ra-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Analyzes vulnerability scan reports and results from security control assessments;"},{"id":"ra-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Remediates legitimate vulnerabilities {{ insert: param, ra-5_prm_2 }} in accordance with an organizational assessment of risk; and"},{"id":"ra-5_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Shares information obtained from the vulnerability scanning process and security control assessments with {{ insert: param, ra-5_prm_3 }} to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies)."}]},{"id":"ra-5_gdn","name":"guidance","prose":"Security categorization of information systems guides the frequency and comprehensiveness of vulnerability scans. Organizations determine the required vulnerability scanning for all information system components, ensuring that potential sources of vulnerabilities such as networked printers, scanners, and copiers are not overlooked. Vulnerability analyses for custom software applications may require additional approaches such as static analysis, dynamic analysis, binary analysis, or a hybrid of the three approaches. Organizations can employ these analysis approaches in a variety of tools (e.g., web-based application scanners, static analysis tools, binary analyzers) and in source code reviews. Vulnerability scanning includes, for example: (i) scanning for patch levels; (ii) scanning for functions, ports, protocols, and services that should not be accessible to users or devices; and (iii) scanning for improperly configured or incorrectly operating information flow control mechanisms. Organizations consider using tools that express vulnerabilities in the Common Vulnerabilities and Exposures (CVE) naming convention and that use the Open Vulnerability Assessment Language (OVAL) to determine\/test for the presence of vulnerabilities. Suggested sources for vulnerability information include the Common Weakness Enumeration (CWE) listing and the National Vulnerability Database (NVD). In addition, security control assessments such as red team exercises provide other sources of potential vulnerabilities for which to scan. Organizations also consider using tools that express vulnerability impact by the Common Vulnerability Scoring System (CVSS).","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#ra-2","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"ra-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-5.a_obj","name":"objective","props":[{"name":"label","value":"RA-5(a)"}],"parts":[{"id":"ra-5.a_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(a)[1]"}],"parts":[{"id":"ra-5.a_obj.1.a","name":"objective","props":[{"name":"label","value":"RA-5(a)[1][a]"}],"prose":"defines the frequency for conducting vulnerability scans on the information system and hosted applications; and\/or"},{"id":"ra-5.a_obj.1.b","name":"objective","props":[{"name":"label","value":"RA-5(a)[1][b]"}],"prose":"defines the process for conducting random vulnerability scans on the information system and hosted applications;"}]},{"id":"ra-5.a_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(a)[2]"}],"prose":"in accordance with the organization-defined frequency and\/or organization-defined process for conducting random scans, scans for vulnerabilities in:","parts":[{"id":"ra-5.a_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-5(a)[2][a]"}],"prose":"the information system;"},{"id":"ra-5.a_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-5(a)[2][b]"}],"prose":"hosted applications;"}]},{"id":"ra-5.a_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(a)[3]"}],"prose":"when new vulnerabilities potentially affecting the system\/applications are identified and reported, scans for vulnerabilities in:","parts":[{"id":"ra-5.a_obj.3.a","name":"objective","props":[{"name":"label","value":"RA-5(a)[3][a]"}],"prose":"the information system;"},{"id":"ra-5.a_obj.3.b","name":"objective","props":[{"name":"label","value":"RA-5(a)[3][b]"}],"prose":"hosted applications;"}]}]},{"id":"ra-5.b_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)"}],"prose":"employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for:","parts":[{"id":"ra-5.b.1_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)"}],"parts":[{"id":"ra-5.b.1_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)[1]"}],"prose":"enumerating platforms;"},{"id":"ra-5.b.1_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)[2]"}],"prose":"enumerating software flaws;"},{"id":"ra-5.b.1_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)[3]"}],"prose":"enumerating improper configurations;"}]},{"id":"ra-5.b.2_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)(2)"}],"parts":[{"id":"ra-5.b.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(b)(2)[1]"}],"prose":"formatting checklists;"},{"id":"ra-5.b.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(b)(2)[2]"}],"prose":"formatting test procedures;"}]},{"id":"ra-5.b.3_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)(3)"}],"prose":"measuring vulnerability impact;"}]},{"id":"ra-5.c_obj","name":"objective","props":[{"name":"label","value":"RA-5(c)"}],"parts":[{"id":"ra-5.c_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(c)[1]"}],"prose":"analyzes vulnerability scan reports;"},{"id":"ra-5.c_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(c)[2]"}],"prose":"analyzes results from security control assessments;"}]},{"id":"ra-5.d_obj","name":"objective","props":[{"name":"label","value":"RA-5(d)"}],"parts":[{"id":"ra-5.d_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(d)[1]"}],"prose":"defines response times to remediate legitimate vulnerabilities in accordance with an organizational assessment of risk;"},{"id":"ra-5.d_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(d)[2]"}],"prose":"remediates legitimate vulnerabilities within the organization-defined response times in accordance with an organizational assessment of risk;"}]},{"id":"ra-5.e_obj","name":"objective","props":[{"name":"label","value":"RA-5(e)"}],"parts":[{"id":"ra-5.e_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(e)[1]"}],"prose":"defines personnel or roles with whom information obtained from the vulnerability scanning process and security control assessments is to be shared;"},{"id":"ra-5.e_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(e)[2]"}],"prose":"shares information obtained from the vulnerability scanning process with organization-defined personnel or roles to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies); and"},{"id":"ra-5.e_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(e)[3]"}],"prose":"shares information obtained from security control assessments with organization-defined personnel or roles to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies)."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nprocedures addressing vulnerability scanning\n\nrisk assessment\n\nsecurity plan\n\nsecurity assessment report\n\nvulnerability scanning tools and associated configuration documentation\n\nvulnerability scanning results\n\npatch and vulnerability management records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with risk assessment, security control assessment and vulnerability scanning responsibilities\n\norganizational personnel with vulnerability scan analysis responsibilities\n\norganizational personnel with vulnerability remediation responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for vulnerability scanning, analysis, remediation, and information sharing\n\nautomated mechanisms supporting and\/or implementing vulnerability scanning, analysis, remediation, and information sharing"}]}],"controls":[{"id":"ra-5.1","class":"SP800-53-enhancement","title":"Update Tool Capability","props":[{"name":"label","value":"RA-5(1)"},{"name":"sort-id","value":"ra-05.01"}],"parts":[{"id":"ra-5.1_smt","name":"statement","prose":"The organization employs vulnerability scanning tools that include the capability to readily update the information system vulnerabilities to be scanned."},{"id":"ra-5.1_gdn","name":"guidance","prose":"The vulnerabilities to be scanned need to be readily updated as new vulnerabilities are discovered, announced, and scanning methods developed. This updating process helps to ensure that potential vulnerabilities in the information system are identified and addressed as quickly as possible.","links":[{"href":"#si-3","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"ra-5.1_obj","name":"objective","prose":"Determine if the organization employs vulnerability scanning tools that include the capability to readily update the information system vulnerabilities to be scanned."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Procedures addressing vulnerability scanning\n\nsecurity plan\n\nsecurity assessment report\n\nvulnerability scanning tools and associated configuration documentation\n\nvulnerability scanning results\n\npatch and vulnerability management records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with vulnerability scanning responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for vulnerability scanning\n\nautomated mechanisms\/tools supporting and\/or implementing vulnerability scanning"}]}]},{"id":"ra-5.2","class":"SP800-53-enhancement","title":"Update by Frequency \/ Prior to New Scan \/ When Identified","params":[{"id":"ra-5.2_prm_1","select":{"how-many":"one-or-more","choice":[" {{ insert: param, ra-5.2_prm_2 }} ","prior to a new scan","when new vulnerabilities are identified and reported"]}},{"id":"ra-5.2_prm_2","depends-on":"ra-5.2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"RA-5(2)"},{"name":"sort-id","value":"ra-05.02"}],"parts":[{"id":"ra-5.2_smt","name":"statement","prose":"The organization updates the information system vulnerabilities scanned {{ insert: param, ra-5.2_prm_1 }}."},{"id":"ra-5.2_gdn","name":"guidance","links":[{"href":"#si-3","rel":"related"},{"href":"#si-5","rel":"related"}]},{"id":"ra-5.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-5.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(2)[1]"}],"prose":"defines the frequency to update the information system vulnerabilities scanned;"},{"id":"ra-5.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(2)[2]"}],"prose":"updates the information system vulnerabilities scanned one or more of the following:","parts":[{"id":"ra-5.2_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-5(2)[2][a]"}],"prose":"with the organization-defined frequency;"},{"id":"ra-5.2_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-5(2)[2][b]"}],"prose":"prior to a new scan; and\/or"},{"id":"ra-5.2_obj.2.c","name":"objective","props":[{"name":"label","value":"RA-5(2)[2][c]"}],"prose":"when new vulnerabilities are identified and reported."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Procedures addressing vulnerability scanning\n\nsecurity plan\n\nsecurity assessment report\n\nvulnerability scanning tools and associated configuration documentation\n\nvulnerability scanning results\n\npatch and vulnerability management records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with vulnerability scanning responsibilities\n\norganizational personnel with vulnerability scan analysis responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for vulnerability scanning\n\nautomated mechanisms\/tools supporting and\/or implementing vulnerability scanning"}]}]},{"id":"ra-5.5","class":"SP800-53-enhancement","title":"Privileged Access","params":[{"id":"ra-5.5_prm_1","label":"organization-identified information system components"},{"id":"ra-5.5_prm_2","label":"organization-defined vulnerability scanning activities"}],"props":[{"name":"label","value":"RA-5(5)"},{"name":"sort-id","value":"ra-05.05"}],"parts":[{"id":"ra-5.5_smt","name":"statement","prose":"The information system implements privileged access authorization to {{ insert: param, ra-5.5_prm_1 }} for selected {{ insert: param, ra-5.5_prm_2 }}."},{"id":"ra-5.5_gdn","name":"guidance","prose":"In certain situations, the nature of the vulnerability scanning may be more intrusive or the information system component that is the subject of the scanning may contain highly sensitive information. Privileged access authorization to selected system components facilitates more thorough vulnerability scanning and also protects the sensitive nature of such scanning."},{"id":"ra-5.5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ra-5.5_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(5)[1]"}],"prose":"the organization defines information system components to which privileged access is authorized for selected vulnerability scanning activities;"},{"id":"ra-5.5_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(5)[2]"}],"prose":"the organization defines vulnerability scanning activities selected for privileged access authorization to organization-defined information system components; and"},{"id":"ra-5.5_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(5)[3]"}],"prose":"the information system implements privileged access authorization to organization-defined information system components for selected organization-defined vulnerability scanning activities."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nprocedures addressing vulnerability scanning\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of information system components for vulnerability scanning\n\npersonnel access authorization list\n\nauthorization credentials\n\naccess authorization records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with vulnerability scanning responsibilities\n\nsystem\/network administrators\n\norganizational personnel responsible for access control to the information system\n\norganizational personnel responsible for configuration management of the information system\n\nsystem developers\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for vulnerability scanning\n\norganizational processes for access control\n\nautomated mechanisms supporting and\/or implementing access control\n\nautomated mechanisms\/tools supporting and\/or implementing vulnerability scanning"}]}]}]}]},{"id":"sa","class":"family","title":"System and Services Acquisition","controls":[{"id":"sa-1","class":"SP800-53","title":"System and Services Acquisition Policy and Procedures","params":[{"id":"sa-1_prm_1","label":"organization-defined personnel or roles"},{"id":"sa-1_prm_2","label":"organization-defined frequency"},{"id":"sa-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-1"},{"name":"sort-id","value":"sa-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"sa-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, sa-1_prm_1 }}:","parts":[{"id":"sa-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system and services acquisition policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"sa-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls; and"}]},{"id":"sa-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"sa-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System and services acquisition policy {{ insert: param, sa-1_prm_2 }}; and"},{"id":"sa-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System and services acquisition procedures {{ insert: param, sa-1_prm_3 }}."}]}]},{"id":"sa-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the SA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"sa-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-1.a_obj","name":"objective","props":[{"name":"label","value":"SA-1(a)"}],"parts":[{"id":"sa-1.a.1_obj","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)"}],"parts":[{"id":"sa-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1]"}],"prose":"develops and documents a system and services acquisition policy that addresses:","parts":[{"id":"sa-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"sa-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"sa-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"sa-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"sa-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"sa-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"sa-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"sa-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system and services acquisition policy is to be disseminated;"},{"id":"sa-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[3]"}],"prose":"disseminates the system and services acquisition policy to organization-defined personnel or roles;"}]},{"id":"sa-1.a.2_obj","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)"}],"parts":[{"id":"sa-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls;"},{"id":"sa-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"sa-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"sa-1.b_obj","name":"objective","props":[{"name":"label","value":"SA-1(b)"}],"parts":[{"id":"sa-1.b.1_obj","name":"objective","props":[{"name":"label","value":"SA-1(b)(1)"}],"parts":[{"id":"sa-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system and services acquisition policy;"},{"id":"sa-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(b)(1)[2]"}],"prose":"reviews and updates the current system and services acquisition policy with the organization-defined frequency;"}]},{"id":"sa-1.b.2_obj","name":"objective","props":[{"name":"label","value":"SA-1(b)(2)"}],"parts":[{"id":"sa-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system and services acquisition procedures; and"},{"id":"sa-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(b)(2)[2]"}],"prose":"reviews and updates the current system and services acquisition procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"sa-2","class":"SP800-53","title":"Allocation of Resources","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-2"},{"name":"sort-id","value":"sa-02"}],"links":[{"href":"#29fcfe59-33cd-494a-8756-5907ae3a8f92","rel":"reference"}],"parts":[{"id":"sa-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Determines information security requirements for the information system or information system service in mission\/business process planning;"},{"id":"sa-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Determines, documents, and allocates the resources required to protect the information system or information system service as part of its capital planning and investment control process; and"},{"id":"sa-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Establishes a discrete line item for information security in organizational programming and budgeting documentation."}]},{"id":"sa-2_gdn","name":"guidance","prose":"Resource allocation for information security includes funding for the initial information system or information system service acquisition and funding for the sustainment of the system\/service.","links":[{"href":"#pm-3","rel":"related"},{"href":"#pm-11","rel":"related"}]},{"id":"sa-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-2.a_obj","name":"objective","props":[{"name":"label","value":"SA-2(a)"}],"prose":"determines information security requirements for the information system or information system service in mission\/business process planning;"},{"id":"sa-2.b_obj","name":"objective","props":[{"name":"label","value":"SA-2(b)"}],"prose":"to protect the information system or information system service as part of its capital planning and investment control process:","parts":[{"id":"sa-2.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-2(b)[1]"}],"prose":"determines the resources required;"},{"id":"sa-2.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-2(b)[2]"}],"prose":"documents the resources required;"},{"id":"sa-2.b_obj.3","name":"objective","props":[{"name":"label","value":"SA-2(b)[3]"}],"prose":"allocates the resources required; and"}]},{"id":"sa-2.c_obj","name":"objective","props":[{"name":"label","value":"SA-2(c)"}],"prose":"establishes a discrete line item for information security in organizational programming and budgeting documentation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the allocation of resources to information security requirements\n\nprocedures addressing capital planning and investment control\n\norganizational programming and budgeting documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with capital planning, investment control, organizational programming and budgeting responsibilities\n\norganizational personnel responsible for determining information security requirements for information systems\/services\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for determining information security requirements\n\norganizational processes for capital planning, programming, and budgeting\n\nautomated mechanisms supporting and\/or implementing organizational capital planning, programming, and budgeting"}]}]},{"id":"sa-3","class":"SP800-53","title":"System Development Life Cycle","params":[{"id":"sa-3_prm_1","label":"organization-defined system development life cycle"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-3"},{"name":"sort-id","value":"sa-03"}],"links":[{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#abd950ae-092f-4b7a-b374-1c7c67fe9350","rel":"reference"}],"parts":[{"id":"sa-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Manages the information system using {{ insert: param, sa-3_prm_1 }} that incorporates information security considerations;"},{"id":"sa-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Defines and documents information security roles and responsibilities throughout the system development life cycle;"},{"id":"sa-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Identifies individuals having information security roles and responsibilities; and"},{"id":"sa-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Integrates the organizational information security risk management process into system development life cycle activities."}]},{"id":"sa-3_gdn","name":"guidance","prose":"A well-defined system development life cycle provides the foundation for the successful development, implementation, and operation of organizational information systems. To apply the required security controls within the system development life cycle requires a basic understanding of information security, threats, vulnerabilities, adverse impacts, and risk to critical missions\/business functions. The security engineering principles in SA-8 cannot be properly applied if individuals that design, code, and test information systems and system components (including information technology products) do not understand security. Therefore, organizations include qualified personnel, for example, chief information security officers, security architects, security engineers, and information system security officers in system development life cycle activities to ensure that security requirements are incorporated into organizational information systems. It is equally important that developers include individuals on the development team that possess the requisite security expertise and skills to ensure that needed security capabilities are effectively integrated into the information system. Security awareness and training programs can help ensure that individuals having key security roles and responsibilities have the appropriate experience, skills, and expertise to conduct assigned system development life cycle activities. The effective integration of security requirements into enterprise architecture also helps to ensure that important security considerations are addressed early in the system development life cycle and that those considerations are directly related to the organizational mission\/business processes. This process also facilitates the integration of the information security architecture into the enterprise architecture, consistent with organizational risk management and information security strategies.","links":[{"href":"#at-3","rel":"related"},{"href":"#pm-7","rel":"related"},{"href":"#sa-8","rel":"related"}]},{"id":"sa-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-3.a_obj","name":"objective","props":[{"name":"label","value":"SA-3(a)"}],"parts":[{"id":"sa-3.a_obj.1","name":"objective","props":[{"name":"label","value":"SA-3(a)[1]"}],"prose":"defines a system development life cycle that incorporates information security considerations to be used to manage the information system;"},{"id":"sa-3.a_obj.2","name":"objective","props":[{"name":"label","value":"SA-3(a)[2]"}],"prose":"manages the information system using the organization-defined system development life cycle;"}]},{"id":"sa-3.b_obj","name":"objective","props":[{"name":"label","value":"SA-3(b)"}],"prose":"defines and documents information security roles and responsibilities throughout the system development life cycle;"},{"id":"sa-3.c_obj","name":"objective","props":[{"name":"label","value":"SA-3(c)"}],"prose":"identifies individuals having information security roles and responsibilities; and"},{"id":"sa-3.d_obj","name":"objective","props":[{"name":"label","value":"SA-3(d)"}],"prose":"integrates the organizational information security risk management process into system development life cycle activities."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security into the system development life cycle process\n\ninformation system development life cycle documentation\n\ninformation security risk management strategy\/program documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security and system life cycle development responsibilities\n\norganizational personnel with information security risk management responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for defining and documenting the SDLC\n\norganizational processes for identifying SDLC roles and responsibilities\n\norganizational process for integrating information security risk management into the SDLC\n\nautomated mechanisms supporting and\/or implementing the SDLC"}]}]},{"id":"sa-4","class":"SP800-53","title":"Acquisition Process","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-4"},{"name":"sort-id","value":"sa-04"}],"links":[{"href":"#ad733a42-a7ed-4774-b988-4930c28852f3","rel":"reference"},{"href":"#1737a687-52fb-4008-b900-cbfa836f7b65","rel":"reference"},{"href":"#d715b234-9b5b-4e07-b1ed-99836727664d","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#0a5db899-f033-467f-8631-f5a8ba971475","rel":"reference"},{"href":"#0c775bc3-bfc3-42c7-a382-88949f503171","rel":"reference"},{"href":"#d818efd3-db31-4953-8afa-9e76afe83ce2","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#abd950ae-092f-4b7a-b374-1c7c67fe9350","rel":"reference"},{"href":"#84a37532-6db6-477b-9ea8-f9085ebca0fc","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"},{"href":"#56d671da-6b7b-4abf-8296-84b61980390a","rel":"reference"},{"href":"#c95a9986-3cd6-4a98-931b-ccfc56cb11e5","rel":"reference"},{"href":"#5ed1f4d5-1494-421b-97ed-39d3c88ab51f","rel":"reference"},{"href":"#bbd50dd1-54ce-4432-959d-63ea564b1bb4","rel":"reference"}],"parts":[{"id":"sa-4_smt","name":"statement","prose":"The organization includes the following requirements, descriptions, and criteria, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission\/business needs:","parts":[{"id":"sa-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Security functional requirements;"},{"id":"sa-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Security strength requirements;"},{"id":"sa-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Security assurance requirements;"},{"id":"sa-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Security-related documentation requirements;"},{"id":"sa-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Requirements for protecting security-related documentation;"},{"id":"sa-4_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Description of the information system development environment and environment in which the system is intended to operate; and"},{"id":"sa-4_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Acceptance criteria."}]},{"id":"sa-4_gdn","name":"guidance","prose":"Information system components are discrete, identifiable information technology assets (e.g., hardware, software, or firmware) that represent the building blocks of an information system. Information system components include commercial information technology products. Security functional requirements include security capabilities, security functions, and security mechanisms. Security strength requirements associated with such capabilities, functions, and mechanisms include degree of correctness, completeness, resistance to direct attack, and resistance to tampering or bypass. Security assurance requirements include: (i) development processes, procedures, practices, and methodologies; and (ii) evidence from development and assessment activities providing grounds for confidence that the required security functionality has been implemented and the required security strength has been achieved. Security documentation requirements address all phases of the system development life cycle. Security functionality, assurance, and documentation requirements are expressed in terms of security controls and control enhancements that have been selected through the tailoring process. The security control tailoring process includes, for example, the specification of parameter values through the use of assignment and selection statements and the specification of platform dependencies and implementation information. Security documentation provides user and administrator guidance regarding the implementation and operation of security controls. The level of detail required in security documentation is based on the security category or classification level of the information system and the degree to which organizations depend on the stated security capability, functions, or mechanisms to meet overall risk response expectations (as defined in the organizational risk management strategy). Security requirements can also include organizationally mandated configuration settings specifying allowed functions, ports, protocols, and services. Acceptance criteria for information systems, information system components, and information system services are defined in the same manner as such criteria for any organizational acquisition or procurement. The Federal Acquisition Regulation (FAR) Section 7.103 contains information security requirements from FISMA.","links":[{"href":"#cm-6","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#ps-7","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#sa-12","rel":"related"}]},{"id":"sa-4_obj","name":"objective","prose":"Determine if the organization includes the following requirements, descriptions, and criteria, explicitly or by reference, in the acquisition contracts for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission\/business needs:","parts":[{"id":"sa-4.a_obj","name":"objective","props":[{"name":"label","value":"SA-4(a)"}],"prose":"security functional requirements;"},{"id":"sa-4.b_obj","name":"objective","props":[{"name":"label","value":"SA-4(b)"}],"prose":"security strength requirements;"},{"id":"sa-4.c_obj","name":"objective","props":[{"name":"label","value":"SA-4(c)"}],"prose":"security assurance requirements;"},{"id":"sa-4.d_obj","name":"objective","props":[{"name":"label","value":"SA-4(d)"}],"prose":"security-related documentation requirements;"},{"id":"sa-4.e_obj","name":"objective","props":[{"name":"label","value":"SA-4(e)"}],"prose":"requirements for protecting security-related documentation;"},{"id":"sa-4.f_obj","name":"objective","props":[{"name":"label","value":"SA-4(f)"}],"prose":"description of:","parts":[{"id":"sa-4.f_obj.1","name":"objective","props":[{"name":"label","value":"SA-4(f)[1]"}],"prose":"the information system development environment;"},{"id":"sa-4.f_obj.2","name":"objective","props":[{"name":"label","value":"SA-4(f)[2]"}],"prose":"the environment in which the system is intended to operate; and"}]},{"id":"sa-4.g_obj","name":"objective","props":[{"name":"label","value":"SA-4(g)"}],"prose":"acceptance criteria."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\nacquisition contracts for the information system, system component, or information system service\n\ninformation system design documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security functional, strength, and assurance requirements\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for determining information system security functional, strength, and assurance requirements\n\norganizational processes for developing acquisition contracts\n\nautomated mechanisms supporting and\/or implementing acquisitions and inclusion of security requirements in contracts"}]}],"controls":[{"id":"sa-4.1","class":"SP800-53-enhancement","title":"Functional Properties of Security Controls","props":[{"name":"label","value":"SA-4(1)"},{"name":"sort-id","value":"sa-04.01"}],"parts":[{"id":"sa-4.1_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to provide a description of the functional properties of the security controls to be employed."},{"id":"sa-4.1_gdn","name":"guidance","prose":"Functional properties of security controls describe the functionality (i.e., security capability, functions, or mechanisms) visible at the interfaces of the controls and specifically exclude functionality and data structures internal to the operation of the controls.","links":[{"href":"#sa-5","rel":"related"}]},{"id":"sa-4.1_obj","name":"objective","prose":"Determine if the organization requires the developer of the information system, system component, or information system service to provide a description of the functional properties of the security controls to be employed."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\nsolicitation documents\n\nacquisition documentation\n\nacquisition contracts for the information system, system component, or information system services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security functional requirements\n\ninformation system developer or service provider\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for determining information system security functional, requirements\n\norganizational processes for developing acquisition contracts\n\nautomated mechanisms supporting and\/or implementing acquisitions and inclusion of security requirements in contracts"}]}]},{"id":"sa-4.2","class":"SP800-53-enhancement","title":"Design \/ Implementation Information for Security Controls","params":[{"id":"sa-4.2_prm_1","select":{"how-many":"one-or-more","choice":["security-relevant external system interfaces","high-level design","low-level design","source code or hardware schematics"," {{ insert: param, sa-4.2_prm_2 }} "]}},{"id":"sa-4.2_prm_2","depends-on":"sa-4.2_prm_1","label":"organization-defined design\/implementation information"},{"id":"sa-4.2_prm_3","label":"organization-defined level of detail"}],"props":[{"name":"label","value":"SA-4(2)"},{"name":"sort-id","value":"sa-04.02"}],"parts":[{"id":"sa-4.2_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to provide design and implementation information for the security controls to be employed that includes: {{ insert: param, sa-4.2_prm_1 }} at {{ insert: param, sa-4.2_prm_3 }}."},{"id":"sa-4.2_gdn","name":"guidance","prose":"Organizations may require different levels of detail in design and implementation documentation for security controls employed in organizational information systems, system components, or information system services based on mission\/business requirements, requirements for trustworthiness\/resiliency, and requirements for analysis and testing. Information systems can be partitioned into multiple subsystems. Each subsystem within the system can contain one or more modules. The high-level design for the system is expressed in terms of multiple subsystems and the interfaces between subsystems providing security-relevant functionality. The low-level design for the system is expressed in terms of modules with particular emphasis on software and firmware (but not excluding hardware) and the interfaces between modules providing security-relevant functionality. Source code and hardware schematics are typically referred to as the implementation representation of the information system.","links":[{"href":"#sa-5","rel":"related"}]},{"id":"sa-4.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-4.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-4(2)[1]"}],"prose":"defines level of detail that the developer is required to provide in design and implementation information for the security controls to be employed in the information system, system component, or information system service;"},{"id":"sa-4.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-4(2)[2]"}],"prose":"defines design\/implementation information that the developer is to provide for the security controls to be employed (if selected);"},{"id":"sa-4.2_obj.3","name":"objective","props":[{"name":"label","value":"SA-4(2)[3]"}],"prose":"requires the developer of the information system, system component, or information system service to provide design and implementation information for the security controls to be employed that includes, at the organization-defined level of detail, one or more of the following:","parts":[{"id":"sa-4.2_obj.3.a","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][a]"}],"prose":"security-relevant external system interfaces;"},{"id":"sa-4.2_obj.3.b","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][b]"}],"prose":"high-level design;"},{"id":"sa-4.2_obj.3.c","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][c]"}],"prose":"low-level design;"},{"id":"sa-4.2_obj.3.d","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][d]"}],"prose":"source code;"},{"id":"sa-4.2_obj.3.e","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][e]"}],"prose":"hardware schematics; and\/or"},{"id":"sa-4.2_obj.3.f","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][f]"}],"prose":"organization-defined design\/implementation information."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\nsolicitation documents\n\nacquisition documentation\n\nacquisition contracts for the information system, system components, or information system services\n\ndesign and implementation information for security controls employed in the information system, system component, or information system service\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\ninformation system developer or service provider\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for determining level of detail for system design and security controls\n\norganizational processes for developing acquisition contracts\n\nautomated mechanisms supporting and\/or implementing development of system design details"}]}]},{"id":"sa-4.9","class":"SP800-53-enhancement","title":"Functions \/ Ports \/ Protocols \/ Services in Use","props":[{"name":"label","value":"SA-4(9)"},{"name":"sort-id","value":"sa-04.09"}],"parts":[{"id":"sa-4.9_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to identify early in the system development life cycle, the functions, ports, protocols, and services intended for organizational use."},{"id":"sa-4.9_gdn","name":"guidance","prose":"The identification of functions, ports, protocols, and services early in the system development life cycle (e.g., during the initial requirements definition and design phases) allows organizations to influence the design of the information system, information system component, or information system service. This early involvement in the life cycle helps organizations to avoid or minimize the use of functions, ports, protocols, or services that pose unnecessarily high risks and understand the trade-offs involved in blocking specific ports, protocols, or services (or when requiring information system service providers to do so). Early identification of functions, ports, protocols, and services avoids costly retrofitting of security controls after the information system, system component, or information system service has been implemented. SA-9 describes requirements for external information system services with organizations identifying which functions, ports, protocols, and services are provided from external sources.","links":[{"href":"#cm-7","rel":"related"},{"href":"#sa-9","rel":"related"}]},{"id":"sa-4.9_obj","name":"objective","prose":"Determine if the organization requires the developer of the information system, system component, or information system service to identify early in the system development life cycle:","parts":[{"id":"sa-4.9_obj.1","name":"objective","props":[{"name":"label","value":"SA-4(9)[1]"}],"prose":"the functions intended for organizational use;"},{"id":"sa-4.9_obj.2","name":"objective","props":[{"name":"label","value":"SA-4(9)[2]"}],"prose":"the ports intended for organizational use;"},{"id":"sa-4.9_obj.3","name":"objective","props":[{"name":"label","value":"SA-4(9)[3]"}],"prose":"the protocols intended for organizational use; and"},{"id":"sa-4.9_obj.4","name":"objective","props":[{"name":"label","value":"SA-4(9)[4]"}],"prose":"the services intended for organizational use."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\ninformation system design documentation\n\ninformation system documentation including functions, ports, protocols, and services intended for organizational use\n\nacquisition contracts for information systems or services\n\nacquisition documentation\n\nsolicitation documentation\n\nservice-level agreements\n\norganizational security requirements, descriptions, and criteria for developers of information systems, system components, and information system services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\nsystem\/network administrators\n\norganizational personnel operating, using, and\/or maintaining the information system\n\ninformation system developers\n\norganizational personnel with information security responsibilities"}]}]},{"id":"sa-4.10","class":"SP800-53-enhancement","title":"Use of Approved PIV Products","props":[{"name":"label","value":"SA-4(10)"},{"name":"sort-id","value":"sa-04.10"}],"parts":[{"id":"sa-4.10_smt","name":"statement","prose":"The organization employs only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational information systems."},{"id":"sa-4.10_gdn","name":"guidance","links":[{"href":"#ia-2","rel":"related"},{"href":"#ia-8","rel":"related"}]},{"id":"sa-4.10_obj","name":"objective","prose":"Determine if the organization employs only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational information systems."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\nsolicitation documentation\n\nacquisition documentation\n\nacquisition contracts for the information system, system component, or information system service\n\nservice-level agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\norganizational personnel with responsibility for ensuring only FIPS 201-approved products are implemented\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for selecting and employing FIPS 201-approved products"}]}]}]},{"id":"sa-5","class":"SP800-53","title":"Information System Documentation","params":[{"id":"sa-5_prm_1","label":"organization-defined actions"},{"id":"sa-5_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"SA-5"},{"name":"sort-id","value":"sa-05"}],"parts":[{"id":"sa-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Obtains administrator documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Secure configuration, installation, and operation of the system, component, or service;"},{"id":"sa-5_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Effective use and maintenance of security functions\/mechanisms; and"},{"id":"sa-5_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Known vulnerabilities regarding configuration and use of administrative (i.e., privileged) functions;"}]},{"id":"sa-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Obtains user documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"User-accessible security functions\/mechanisms and how to effectively use those security functions\/mechanisms;"},{"id":"sa-5_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and"},{"id":"sa-5_smt.b.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"User responsibilities in maintaining the security of the system, component, or service;"}]},{"id":"sa-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent and takes {{ insert: param, sa-5_prm_1 }} in response;"},{"id":"sa-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects documentation as required, in accordance with the risk management strategy; and"},{"id":"sa-5_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Distributes documentation to {{ insert: param, sa-5_prm_2 }}."}]},{"id":"sa-5_gdn","name":"guidance","prose":"This control helps organizational personnel understand the implementation and operation of security controls associated with information systems, system components, and information system services. Organizations consider establishing specific measures to determine the quality\/completeness of the content provided. The inability to obtain needed documentation may occur, for example, due to the age of the information system\/component or lack of support from developers and contractors. In those situations, organizations may need to recreate selected documentation if such documentation is essential to the effective implementation or operation of security controls. The level of protection provided for selected information system, component, or service documentation is commensurate with the security category or classification of the system. For example, documentation associated with a key DoD weapons system or command and control system would typically require a higher level of protection than a routine administrative system. Documentation that addresses information system vulnerabilities may also require an increased level of protection. Secure operation of the information system, includes, for example, initially starting the system and resuming secure system operation after any lapse in system operation.","links":[{"href":"#cm-6","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#ps-2","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-4","rel":"related"}]},{"id":"sa-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-5.a_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)"}],"prose":"obtains administrator documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5.a.1_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)"}],"parts":[{"id":"sa-5.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)[1]"}],"prose":"secure configuration of the system, system component, or service;"},{"id":"sa-5.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)[2]"}],"prose":"secure installation of the system, system component, or service;"},{"id":"sa-5.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)[3]"}],"prose":"secure operation of the system, system component, or service;"}]},{"id":"sa-5.a.2_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)(2)"}],"parts":[{"id":"sa-5.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(a)(2)[1]"}],"prose":"effective use of the security features\/mechanisms;"},{"id":"sa-5.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(a)(2)[2]"}],"prose":"effective maintenance of the security features\/mechanisms;"}]},{"id":"sa-5.a.3_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)(3)"}],"prose":"known vulnerabilities regarding configuration and use of administrative (i.e., privileged) functions;"}]},{"id":"sa-5.b_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)"}],"prose":"obtains user documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5.b.1_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)(1)"}],"parts":[{"id":"sa-5.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(b)(1)[1]"}],"prose":"user-accessible security functions\/mechanisms;"},{"id":"sa-5.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(b)(1)[2]"}],"prose":"how to effectively use those functions\/mechanisms;"}]},{"id":"sa-5.b.2_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)(2)"}],"prose":"methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner;"},{"id":"sa-5.b.3_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)(3)"}],"prose":"user responsibilities in maintaining the security of the system, component, or service;"}]},{"id":"sa-5.c_obj","name":"objective","props":[{"name":"label","value":"SA-5(c)"}],"parts":[{"id":"sa-5.c_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(c)[1]"}],"prose":"defines actions to be taken after documented attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent;"},{"id":"sa-5.c_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(c)[2]"}],"prose":"documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent;"},{"id":"sa-5.c_obj.3","name":"objective","props":[{"name":"label","value":"SA-5(c)[3]"}],"prose":"takes organization-defined actions in response;"}]},{"id":"sa-5.d_obj","name":"objective","props":[{"name":"label","value":"SA-5(d)"}],"prose":"protects documentation as required, in accordance with the risk management strategy;"},{"id":"sa-5.e_obj","name":"objective","props":[{"name":"label","value":"SA-5(e)"}],"parts":[{"id":"sa-5.e_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(e)[1]"}],"prose":"defines personnel or roles to whom documentation is to be distributed; and"},{"id":"sa-5.e_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(e)[2]"}],"prose":"distributes documentation to organization-defined personnel or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing information system documentation\n\ninformation system documentation including administrator and user guides\n\nrecords documenting attempts to obtain unavailable or nonexistent information system documentation\n\nlist of actions to be taken in response to documented attempts to obtain information system, system component, or information system service documentation\n\nrisk management strategy documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\nsystem administrators\n\norganizational personnel operating, using, and\/or maintaining the information system\n\ninformation system developers\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for obtaining, protecting, and distributing information system administrator and user documentation"}]}]},{"id":"sa-8","class":"SP800-53","title":"Security Engineering Principles","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-8"},{"name":"sort-id","value":"sa-08"}],"links":[{"href":"#21b1ed35-56d2-40a8-bdfe-b461fffe322f","rel":"reference"}],"parts":[{"id":"sa-8_smt","name":"statement","prose":"The organization applies information system security engineering principles in the specification, design, development, implementation, and modification of the information system."},{"id":"sa-8_gdn","name":"guidance","prose":"Organizations apply security engineering principles primarily to new development information systems or systems undergoing major upgrades. For legacy systems, organizations apply security engineering principles to system upgrades and modifications to the extent feasible, given the current state of hardware, software, and firmware within those systems. Security engineering principles include, for example: (i) developing layered protections; (ii) establishing sound security policy, architecture, and controls as the foundation for design; (iii) incorporating security requirements into the system development life cycle; (iv) delineating physical and logical security boundaries; (v) ensuring that system developers are trained on how to build secure software; (vi) tailoring security controls to meet organizational and operational needs; (vii) performing threat modeling to identify use cases, threat agents, attack vectors, and attack patterns as well as compensating controls and design patterns needed to mitigate risk; and (viii) reducing risk to acceptable levels, thus enabling informed risk management decisions.","links":[{"href":"#pm-7","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-17","rel":"related"},{"href":"#sc-2","rel":"related"},{"href":"#sc-3","rel":"related"}]},{"id":"sa-8_obj","name":"objective","prose":"Determine if the organization applies information system security engineering principles in:","parts":[{"id":"sa-8_obj.1","name":"objective","props":[{"name":"label","value":"SA-8[1]"}],"prose":"the specification of the information system;"},{"id":"sa-8_obj.2","name":"objective","props":[{"name":"label","value":"SA-8[2]"}],"prose":"the design of the information system;"},{"id":"sa-8_obj.3","name":"objective","props":[{"name":"label","value":"SA-8[3]"}],"prose":"the development of the information system;"},{"id":"sa-8_obj.4","name":"objective","props":[{"name":"label","value":"SA-8[4]"}],"prose":"the implementation of the information system; and"},{"id":"sa-8_obj.5","name":"objective","props":[{"name":"label","value":"SA-8[5]"}],"prose":"the modification of the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing security engineering principles used in the specification, design, development, implementation, and modification of the information system\n\ninformation system design documentation\n\ninformation security requirements and specifications for the information system\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\norganizational personnel with information system specification, design, development, implementation, and modification responsibilities\n\ninformation system developers\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for applying security engineering principles in information system specification, design, development, implementation, and modification\n\nautomated mechanisms supporting the application of security engineering principles in information system specification, design, development, implementation, and modification"}]}]},{"id":"sa-9","class":"SP800-53","title":"External Information System Services","params":[{"id":"sa-9_prm_1","label":"organization-defined security controls"},{"id":"sa-9_prm_2","label":"organization-defined processes, methods, and techniques"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-9"},{"name":"sort-id","value":"sa-09"}],"links":[{"href":"#0c775bc3-bfc3-42c7-a382-88949f503171","rel":"reference"}],"parts":[{"id":"sa-9_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Requires that providers of external information system services comply with organizational information security requirements and employ {{ insert: param, sa-9_prm_1 }} in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"},{"id":"sa-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Defines and documents government oversight and user roles and responsibilities with regard to external information system services; and"},{"id":"sa-9_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Employs {{ insert: param, sa-9_prm_2 }} to monitor security control compliance by external service providers on an ongoing basis."}]},{"id":"sa-9_gdn","name":"guidance","prose":"External information system services are services that are implemented outside of the authorization boundaries of organizational information systems. This includes services that are used by, but not a part of, organizational information systems. FISMA and OMB policy require that organizations using external service providers that are processing, storing, or transmitting federal information or operating information systems on behalf of the federal government ensure that such providers meet the same security requirements that federal agencies are required to meet. Organizations establish relationships with external service providers in a variety of ways including, for example, through joint ventures, business partnerships, contracts, interagency agreements, lines of business arrangements, licensing agreements, and supply chain exchanges. The responsibility for managing risks from the use of external information system services remains with authorizing officials. For services external to organizations, a chain of trust requires that organizations establish and retain a level of confidence that each participating provider in the potentially complex consumer-provider relationship provides adequate protection for the services rendered. The extent and nature of this chain of trust varies based on the relationships between organizations and the external providers. Organizations document the basis for trust relationships so the relationships can be monitored over time. External information system services documentation includes government, service providers, end user security roles and responsibilities, and service-level agreements. Service-level agreements define expectations of performance for security controls, describe measurable outcomes, and identify remedies and response requirements for identified instances of noncompliance.","links":[{"href":"#ca-3","rel":"related"},{"href":"#ir-7","rel":"related"},{"href":"#ps-7","rel":"related"}]},{"id":"sa-9_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-9.a_obj","name":"objective","props":[{"name":"label","value":"SA-9(a)"}],"parts":[{"id":"sa-9.a_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(a)[1]"}],"prose":"defines security controls to be employed by providers of external information system services;"},{"id":"sa-9.a_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(a)[2]"}],"prose":"requires that providers of external information system services comply with organizational information security requirements;"},{"id":"sa-9.a_obj.3","name":"objective","props":[{"name":"label","value":"SA-9(a)[3]"}],"prose":"requires that providers of external information system services employ organization-defined security controls in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"}]},{"id":"sa-9.b_obj","name":"objective","props":[{"name":"label","value":"SA-9(b)"}],"parts":[{"id":"sa-9.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(b)[1]"}],"prose":"defines and documents government oversight with regard to external information system services;"},{"id":"sa-9.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(b)[2]"}],"prose":"defines and documents user roles and responsibilities with regard to external information system services;"}]},{"id":"sa-9.c_obj","name":"objective","props":[{"name":"label","value":"SA-9(c)"}],"parts":[{"id":"sa-9.c_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(c)[1]"}],"prose":"defines processes, methods, and techniques to be employed to monitor security control compliance by external service providers; and"},{"id":"sa-9.c_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(c)[2]"}],"prose":"employs organization-defined processes, methods, and techniques to monitor security control compliance by external service providers on an ongoing basis."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing external information system services\n\nprocedures addressing methods and techniques for monitoring security control compliance by external service providers of information system services\n\nacquisition contracts, service-level agreements\n\norganizational security requirements and security specifications for external provider services\n\nsecurity control assessment evidence from external providers of information system services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\nexternal providers of information system services\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring security control compliance by external service providers on an ongoing basis\n\nautomated mechanisms for monitoring security control compliance by external service providers on an ongoing basis"}]}],"controls":[{"id":"sa-9.2","class":"SP800-53-enhancement","title":"Identification of Functions \/ Ports \/ Protocols \/ Services","params":[{"id":"sa-9.2_prm_1","label":"organization-defined external information system services"}],"props":[{"name":"label","value":"SA-9(2)"},{"name":"sort-id","value":"sa-09.02"}],"parts":[{"id":"sa-9.2_smt","name":"statement","prose":"The organization requires providers of {{ insert: param, sa-9.2_prm_1 }} to identify the functions, ports, protocols, and other services required for the use of such services."},{"id":"sa-9.2_gdn","name":"guidance","prose":"Information from external service providers regarding the specific functions, ports, protocols, and services used in the provision of such services can be particularly useful when the need arises to understand the trade-offs involved in restricting certain functions\/services or blocking certain ports\/protocols.","links":[{"href":"#cm-7","rel":"related"}]},{"id":"sa-9.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-9.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(2)[1]"}],"prose":"defines external information system services for which providers of such services are to identify the functions, ports, protocols, and other services required for the use of such services;"},{"id":"sa-9.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(2)[2]"}],"prose":"requires providers of organization-defined external information system services to identify:","parts":[{"id":"sa-9.2_obj.2.a","name":"objective","props":[{"name":"label","value":"SA-9(2)[2][a]"}],"prose":"the functions required for the use of such services;"},{"id":"sa-9.2_obj.2.b","name":"objective","props":[{"name":"label","value":"SA-9(2)[2][b]"}],"prose":"the ports required for the use of such services;"},{"id":"sa-9.2_obj.2.c","name":"objective","props":[{"name":"label","value":"SA-9(2)[2][c]"}],"prose":"the protocols required for the use of such services; and"},{"id":"sa-9.2_obj.2.d","name":"objective","props":[{"name":"label","value":"SA-9(2)[2][d]"}],"prose":"the other services required for the use of such services."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing external information system services\n\nacquisition contracts for the information system, system component, or information system service\n\nacquisition documentation\n\nsolicitation documentation, service-level agreements\n\norganizational security requirements and security specifications for external service providers\n\nlist of required functions, ports, protocols, and other services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nexternal providers of information system services"}]}]}]},{"id":"sa-10","class":"SP800-53","title":"Developer Configuration Management","params":[{"id":"sa-10_prm_1","select":{"how-many":"one-or-more","choice":["design","development","implementation","operation"]}},{"id":"sa-10_prm_2","label":"organization-defined configuration items under configuration management"},{"id":"sa-10_prm_3","label":"organization-defined personnel"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-10"},{"name":"sort-id","value":"sa-10"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"sa-10_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to:","parts":[{"id":"sa-10_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Perform configuration management during system, component, or service {{ insert: param, sa-10_prm_1 }};"},{"id":"sa-10_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Document, manage, and control the integrity of changes to {{ insert: param, sa-10_prm_2 }};"},{"id":"sa-10_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Implement only organization-approved changes to the system, component, or service;"},{"id":"sa-10_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Document approved changes to the system, component, or service and the potential security impacts of such changes; and"},{"id":"sa-10_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Track security flaws and flaw resolution within the system, component, or service and report findings to {{ insert: param, sa-10_prm_3 }}."}]},{"id":"sa-10_gdn","name":"guidance","prose":"This control also applies to organizations conducting internal information systems development and integration. Organizations consider the quality and completeness of the configuration management activities conducted by developers as evidence of applying effective security safeguards. Safeguards include, for example, protecting from unauthorized modification or destruction, the master copies of all material used to generate security-relevant portions of the system hardware, software, and firmware. Maintaining the integrity of changes to the information system, information system component, or information system service requires configuration control throughout the system development life cycle to track authorized changes and prevent unauthorized changes. Configuration items that are placed under configuration management (if existence\/use is required by other security controls) include: the formal model; the functional, high-level, and low-level design specifications; other design data; implementation documentation; source code and hardware schematics; the running version of the object code; tools for comparing new versions of security-relevant hardware descriptions and software\/firmware source code with previous versions; and test fixtures and documentation. Depending on the mission\/business needs of organizations and the nature of the contractual relationships in place, developers may provide configuration management support during the operations and maintenance phases of the life cycle.","links":[{"href":"#cm-3","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"sa-10_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-10.a_obj","name":"objective","props":[{"name":"label","value":"SA-10(a)"}],"prose":"requires the developer of the information system, system component, or information system service to perform configuration management during one or more of the following:","parts":[{"id":"sa-10.a_obj.1","name":"objective","props":[{"name":"label","value":"SA-10(a)[1]"}],"prose":"system, component, or service design;"},{"id":"sa-10.a_obj.2","name":"objective","props":[{"name":"label","value":"SA-10(a)[2]"}],"prose":"system, component, or service development;"},{"id":"sa-10.a_obj.3","name":"objective","props":[{"name":"label","value":"SA-10(a)[3]"}],"prose":"system, component, or service implementation; and\/or"},{"id":"sa-10.a_obj.4","name":"objective","props":[{"name":"label","value":"SA-10(a)[4]"}],"prose":"system, component, or service operation;"}]},{"id":"sa-10.b_obj","name":"objective","props":[{"name":"label","value":"SA-10(b)"}],"parts":[{"id":"sa-10.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-10(b)[1]"}],"prose":"defines configuration items to be placed under configuration management;"},{"id":"sa-10.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-10(b)[2]"}],"prose":"requires the developer of the information system, system component, or information system service to:","parts":[{"id":"sa-10.b_obj.2.a","name":"objective","props":[{"name":"label","value":"SA-10(b)[2][a]"}],"prose":"document the integrity of changes to organization-defined items under configuration management;"},{"id":"sa-10.b_obj.2.b","name":"objective","props":[{"name":"label","value":"SA-10(b)[2][b]"}],"prose":"manage the integrity of changes to organization-defined items under configuration management;"},{"id":"sa-10.b_obj.2.c","name":"objective","props":[{"name":"label","value":"SA-10(b)[2][c]"}],"prose":"control the integrity of changes to organization-defined items under configuration management;"}]}]},{"id":"sa-10.c_obj","name":"objective","props":[{"name":"label","value":"SA-10(c)"}],"prose":"requires the developer of the information system, system component, or information system service to implement only organization-approved changes to the system, component, or service;"},{"id":"sa-10.d_obj","name":"objective","props":[{"name":"label","value":"SA-10(d)"}],"prose":"requires the developer of the information system, system component, or information system service to document:","parts":[{"id":"sa-10.d_obj.1","name":"objective","props":[{"name":"label","value":"SA-10(d)[1]"}],"prose":"approved changes to the system, component, or service;"},{"id":"sa-10.d_obj.2","name":"objective","props":[{"name":"label","value":"SA-10(d)[2]"}],"prose":"the potential security impacts of such changes;"}]},{"id":"sa-10.e_obj","name":"objective","props":[{"name":"label","value":"SA-10(e)"}],"parts":[{"id":"sa-10.e_obj.1","name":"objective","props":[{"name":"label","value":"SA-10(e)[1]"}],"prose":"defines personnel to whom findings, resulting from security flaws and flaw resolution tracked within the system, component, or service, are to be reported;"},{"id":"sa-10.e_obj.2","name":"objective","props":[{"name":"label","value":"SA-10(e)[2]"}],"prose":"requires the developer of the information system, system component, or information system service to:","parts":[{"id":"sa-10.e_obj.2.a","name":"objective","props":[{"name":"label","value":"SA-10(e)[2][a]"}],"prose":"track security flaws within the system, component, or service;"},{"id":"sa-10.e_obj.2.b","name":"objective","props":[{"name":"label","value":"SA-10(e)[2][b]"}],"prose":"track security flaw resolution within the system, component, or service; and"},{"id":"sa-10.e_obj.2.c","name":"objective","props":[{"name":"label","value":"SA-10(e)[2][c]"}],"prose":"report findings to organization-defined personnel."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing system developer configuration management\n\nsolicitation documentation\n\nacquisition documentation\n\nservice-level agreements\n\nacquisition contracts for the information system, system component, or information system service\n\nsystem developer configuration management plan\n\nsecurity flaw and flaw resolution tracking records\n\nsystem change authorization records\n\nchange control records\n\nconfiguration management records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with configuration management responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring developer configuration management\n\nautomated mechanisms supporting and\/or implementing the monitoring of developer configuration management"}]}]},{"id":"sa-11","class":"SP800-53","title":"Developer Security Testing and Evaluation","params":[{"id":"sa-11_prm_1","select":{"how-many":"one-or-more","choice":["unit","integration","system","regression"]}},{"id":"sa-11_prm_2","label":"organization-defined depth and coverage"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-11"},{"name":"sort-id","value":"sa-11"}],"links":[{"href":"#1737a687-52fb-4008-b900-cbfa836f7b65","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#275cc052-0f7f-423c-bdb6-ed503dc36228","rel":"reference"},{"href":"#15522e92-9192-463d-9646-6a01982db8ca","rel":"reference"},{"href":"#0931209f-00ae-4132-b92c-bc645847e8f9","rel":"reference"},{"href":"#4ef539ba-b767-4666-b0d3-168c53005fa3","rel":"reference"}],"parts":[{"id":"sa-11_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to:","parts":[{"id":"sa-11_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Create and implement a security assessment plan;"},{"id":"sa-11_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Perform {{ insert: param, sa-11_prm_1 }} testing\/evaluation at {{ insert: param, sa-11_prm_2 }};"},{"id":"sa-11_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Produce evidence of the execution of the security assessment plan and the results of the security testing\/evaluation;"},{"id":"sa-11_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Implement a verifiable flaw remediation process; and"},{"id":"sa-11_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Correct flaws identified during security testing\/evaluation."}]},{"id":"sa-11_gdn","name":"guidance","prose":"Developmental security testing\/evaluation occurs at all post-design phases of the system development life cycle. Such testing\/evaluation confirms that the required security controls are implemented correctly, operating as intended, enforcing the desired security policy, and meeting established security requirements. Security properties of information systems may be affected by the interconnection of system components or changes to those components. These interconnections or changes (e.g., upgrading or replacing applications and operating systems) may adversely affect previously implemented security controls. This control provides additional types of security testing\/evaluation that developers can conduct to reduce or eliminate potential flaws. Testing custom software applications may require approaches such as static analysis, dynamic analysis, binary analysis, or a hybrid of the three approaches. Developers can employ these analysis approaches in a variety of tools (e.g., web-based application scanners, static analysis tools, binary analyzers) and in source code reviews. Security assessment plans provide the specific activities that developers plan to carry out including the types of analyses, testing, evaluation, and reviews of software and firmware components, the degree of rigor to be applied, and the types of artifacts produced during those processes. The depth of security testing\/evaluation refers to the rigor and level of detail associated with the assessment process (e.g., black box, gray box, or white box testing). The coverage of security testing\/evaluation refers to the scope (i.e., number and type) of the artifacts included in the assessment process. Contracts specify the acceptance criteria for security assessment plans, flaw remediation processes, and the evidence that the plans\/processes have been diligently applied. Methods for reviewing and protecting assessment plans, evidence, and documentation are commensurate with the security category or classification level of the information system. Contracts may specify documentation protection requirements.","links":[{"href":"#ca-2","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"sa-11_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-11.a_obj","name":"objective","props":[{"name":"label","value":"SA-11(a)"}],"prose":"requires the developer of the information system, system component, or information system service to create and implement a security plan;"},{"id":"sa-11.b_obj","name":"objective","props":[{"name":"label","value":"SA-11(b)"}],"parts":[{"id":"sa-11.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-11(b)[1]"}],"prose":"defines the depth of testing\/evaluation to be performed by the developer of the information system, system component, or information system service;"},{"id":"sa-11.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-11(b)[2]"}],"prose":"defines the coverage of testing\/evaluation to be performed by the developer of the information system, system component, or information system service;"},{"id":"sa-11.b_obj.3","name":"objective","props":[{"name":"label","value":"SA-11(b)[3]"}],"prose":"requires the developer of the information system, system component, or information system service to perform one or more of the following testing\/evaluation at the organization-defined depth and coverage:","parts":[{"id":"sa-11.b_obj.3.a","name":"objective","props":[{"name":"label","value":"SA-11(b)[3][a]"}],"prose":"unit testing\/evaluation;"},{"id":"sa-11.b_obj.3.b","name":"objective","props":[{"name":"label","value":"SA-11(b)[3][b]"}],"prose":"integration testing\/evaluation;"},{"id":"sa-11.b_obj.3.c","name":"objective","props":[{"name":"label","value":"SA-11(b)[3][c]"}],"prose":"system testing\/evaluation; and\/or"},{"id":"sa-11.b_obj.3.d","name":"objective","props":[{"name":"label","value":"SA-11(b)[3][d]"}],"prose":"regression testing\/evaluation;"}]}]},{"id":"sa-11.c_obj","name":"objective","props":[{"name":"label","value":"SA-11(c)"}],"prose":"requires the developer of the information system, system component, or information system service to produce evidence of:","parts":[{"id":"sa-11.c_obj.1","name":"objective","props":[{"name":"label","value":"SA-11(c)[1]"}],"prose":"the execution of the security assessment plan;"},{"id":"sa-11.c_obj.2","name":"objective","props":[{"name":"label","value":"SA-11(c)[2]"}],"prose":"the results of the security testing\/evaluation;"}]},{"id":"sa-11.d_obj","name":"objective","props":[{"name":"label","value":"SA-11(d)"}],"prose":"requires the developer of the information system, system component, or information system service to implement a verifiable flaw remediation process; and"},{"id":"sa-11.e_obj","name":"objective","props":[{"name":"label","value":"SA-11(e)"}],"prose":"requires the developer of the information system, system component, or information system service to correct flaws identified during security testing\/evaluation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing system developer security testing\n\nprocedures addressing flaw remediation\n\nsolicitation documentation\n\nacquisition documentation\n\nservice-level agreements\n\nacquisition contracts for the information system, system component, or information system service\n\nsystem developer security test plans\n\nrecords of developer security testing results for the information system, system component, or information system service\n\nsecurity flaw and remediation tracking records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with developer security testing responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring developer security testing and evaluation\n\nautomated mechanisms supporting and\/or implementing the monitoring of developer security testing and evaluation"}]}]}]},{"id":"sc","class":"family","title":"System and Communications Protection","controls":[{"id":"sc-1","class":"SP800-53","title":"System and Communications Protection Policy and Procedures","params":[{"id":"sc-1_prm_1","label":"organization-defined personnel or roles"},{"id":"sc-1_prm_2","label":"organization-defined frequency"},{"id":"sc-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-1"},{"name":"sort-id","value":"sc-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"sc-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"sc-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, sc-1_prm_1 }}:","parts":[{"id":"sc-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"sc-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls; and"}]},{"id":"sc-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"sc-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System and communications protection policy {{ insert: param, sc-1_prm_2 }}; and"},{"id":"sc-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System and communications protection procedures {{ insert: param, sc-1_prm_3 }}."}]}]},{"id":"sc-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the SC family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"sc-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-1.a_obj","name":"objective","props":[{"name":"label","value":"SC-1(a)"}],"parts":[{"id":"sc-1.a.1_obj","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)"}],"parts":[{"id":"sc-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1]"}],"prose":"develops and documents a system and communications protection policy that addresses:","parts":[{"id":"sc-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"sc-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"sc-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"sc-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"sc-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"sc-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"sc-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"sc-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system and communications protection policy is to be disseminated;"},{"id":"sc-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[3]"}],"prose":"disseminates the system and communications protection policy to organization-defined personnel or roles;"}]},{"id":"sc-1.a.2_obj","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)"}],"parts":[{"id":"sc-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls;"},{"id":"sc-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"sc-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"sc-1.b_obj","name":"objective","props":[{"name":"label","value":"SC-1(b)"}],"parts":[{"id":"sc-1.b.1_obj","name":"objective","props":[{"name":"label","value":"SC-1(b)(1)"}],"parts":[{"id":"sc-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system and communications protection policy;"},{"id":"sc-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(b)(1)[2]"}],"prose":"reviews and updates the current system and communications protection policy with the organization-defined frequency;"}]},{"id":"sc-1.b.2_obj","name":"objective","props":[{"name":"label","value":"SC-1(b)(2)"}],"parts":[{"id":"sc-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system and communications protection procedures; and"},{"id":"sc-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(b)(2)[2]"}],"prose":"reviews and updates the current system and communications protection procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and communications protection responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"sc-2","class":"SP800-53","title":"Application Partitioning","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-2"},{"name":"sort-id","value":"sc-02"}],"parts":[{"id":"sc-2_smt","name":"statement","prose":"The information system separates user functionality (including user interface services) from information system management functionality."},{"id":"sc-2_gdn","name":"guidance","prose":"Information system management functionality includes, for example, functions necessary to administer databases, network components, workstations, or servers, and typically requires privileged user access. The separation of user functionality from information system management functionality is either physical or logical. Organizations implement separation of system management-related functionality from user functionality by using different computers, different central processing units, different instances of operating systems, different network addresses, virtualization techniques, or combinations of these or other methods, as appropriate. This type of separation includes, for example, web administrative interfaces that use separate authentication methods for users of any other information system resources. Separation of system and user functionality may include isolating administrative interfaces on different domains and with additional access controls.","links":[{"href":"#sa-4","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sc-3","rel":"related"}]},{"id":"sc-2_obj","name":"objective","prose":"Determine if the information system separates user functionality (including user interface services) from information system management functionality."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing application partitioning\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Separation of user functionality from information system management functionality"}]}]},{"id":"sc-4","class":"SP800-53","title":"Information in Shared Resources","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-4"},{"name":"sort-id","value":"sc-04"}],"parts":[{"id":"sc-4_smt","name":"statement","prose":"The information system prevents unauthorized and unintended information transfer via shared system resources."},{"id":"sc-4_gdn","name":"guidance","prose":"This control prevents information, including encrypted representations of information, produced by the actions of prior users\/roles (or the actions of processes acting on behalf of prior users\/roles) from being available to any current users\/roles (or current processes) that obtain access to shared system resources (e.g., registers, main memory, hard disks) after those resources have been released back to information systems. The control of information in shared resources is also commonly referred to as object reuse and residual information protection. This control does not address: (i) information remanence which refers to residual representation of data that has been nominally erased or removed; (ii) covert channels (including storage and\/or timing channels) where shared resources are manipulated to violate information flow restrictions; or (iii) components within information systems for which there are only single users\/roles.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#mp-6","rel":"related"}]},{"id":"sc-4_obj","name":"objective","prose":"Determine if the information system prevents unauthorized and unintended information transfer via shared system resources."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing information protection in shared system resources\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms preventing unauthorized and unintended transfer of information via shared system resources"}]}]},{"id":"sc-5","class":"SP800-53","title":"Denial of Service Protection","params":[{"id":"sc-5_prm_1","label":"organization-defined types of denial of service attacks or references to sources for such information"},{"id":"sc-5_prm_2","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-5"},{"name":"sort-id","value":"sc-05"}],"parts":[{"id":"sc-5_smt","name":"statement","prose":"The information system protects against or limits the effects of the following types of denial of service attacks: {{ insert: param, sc-5_prm_1 }} by employing {{ insert: param, sc-5_prm_2 }}."},{"id":"sc-5_gdn","name":"guidance","prose":"A variety of technologies exist to limit, or in some cases, eliminate the effects of denial of service attacks. For example, boundary protection devices can filter certain types of packets to protect information system components on internal organizational networks from being directly affected by denial of service attacks. Employing increased capacity and bandwidth combined with service redundancy may also reduce the susceptibility to denial of service attacks.","links":[{"href":"#sc-6","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"sc-5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-5_obj.1","name":"objective","props":[{"name":"label","value":"SC-5[1]"}],"prose":"the organization defines types of denial of service attacks or reference to source of such information for the information system to protect against or limit the effects;"},{"id":"sc-5_obj.2","name":"objective","props":[{"name":"label","value":"SC-5[2]"}],"prose":"the organization defines security safeguards to be employed by the information system to protect against or limit the effects of organization-defined types of denial of service attacks; and"},{"id":"sc-5_obj.3","name":"objective","props":[{"name":"label","value":"SC-5[3]"}],"prose":"the information system protects against or limits the effects of the organization-defined denial or service attacks (or reference to source for such information) by employing organization-defined security safeguards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing denial of service protection\n\ninformation system design documentation\n\nsecurity plan\n\nlist of denial of services attacks requiring employment of security safeguards to protect against or limit effects of such attacks\n\nlist of security safeguards protecting against or limiting the effects of denial of service attacks\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with incident response responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms protecting against or limiting the effects of denial of service attacks"}]}]},{"id":"sc-7","class":"SP800-53","title":"Boundary Protection","params":[{"id":"sc-7_prm_1","select":{"choice":["physically","logically"]}}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-7"},{"name":"sort-id","value":"sc-07"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#756a8e86-57d5-4701-8382-f7a40439665a","rel":"reference"},{"href":"#99f331f2-a9f0-46c2-9856-a3cbb9b89442","rel":"reference"}],"parts":[{"id":"sc-7_smt","name":"statement","prose":"The information system:","parts":[{"id":"sc-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Monitors and controls communications at the external boundary of the system and at key internal boundaries within the system;"},{"id":"sc-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Implements subnetworks for publicly accessible system components that are {{ insert: param, sc-7_prm_1 }} separated from internal organizational networks; and"},{"id":"sc-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture."}]},{"id":"sc-7_gdn","name":"guidance","prose":"Managed interfaces include, for example, gateways, routers, firewalls, guards, network-based malicious code analysis and virtualization systems, or encrypted tunnels implemented within a security architecture (e.g., routers protecting firewalls or application gateways residing on protected subnetworks). Subnetworks that are physically or logically separated from internal networks are referred to as demilitarized zones or DMZs. Restricting or prohibiting interfaces within organizational information systems includes, for example, restricting external web traffic to designated web servers within managed interfaces and prohibiting external traffic that appears to be spoofing internal addresses. Organizations consider the shared nature of commercial telecommunications services in the implementation of security controls associated with the use of such services. Commercial telecommunications services are commonly based on network components and consolidated management systems shared by all attached commercial customers, and may also include third party-provided access lines and other service elements. Such transmission services may represent sources of increased risk despite contract security provisions.","links":[{"href":"#ac-4","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#cp-8","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"sc-7_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"sc-7.a_obj","name":"objective","props":[{"name":"label","value":"SC-7(a)"}],"parts":[{"id":"sc-7.a_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(a)[1]"}],"prose":"monitors communications at the external boundary of the information system;"},{"id":"sc-7.a_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(a)[2]"}],"prose":"monitors communications at key internal boundaries within the system;"},{"id":"sc-7.a_obj.3","name":"objective","props":[{"name":"label","value":"SC-7(a)[3]"}],"prose":"controls communications at the external boundary of the information system;"},{"id":"sc-7.a_obj.4","name":"objective","props":[{"name":"label","value":"SC-7(a)[4]"}],"prose":"controls communications at key internal boundaries within the system;"}]},{"id":"sc-7.b_obj","name":"objective","props":[{"name":"label","value":"SC-7(b)"}],"prose":"implements subnetworks for publicly accessible system components that are either:","parts":[{"id":"sc-7.b_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(b)[1]"}],"prose":"physically separated from internal organizational networks; and\/or"},{"id":"sc-7.b_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(b)[2]"}],"prose":"logically separated from internal organizational networks; and"}]},{"id":"sc-7.c_obj","name":"objective","props":[{"name":"label","value":"SC-7(c)"}],"prose":"connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\nlist of key internal boundaries of the information system\n\ninformation system design documentation\n\nboundary protection hardware and software\n\ninformation system configuration settings and associated documentation\n\nenterprise security architecture documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing boundary protection capability"}]}],"controls":[{"id":"sc-7.3","class":"SP800-53-enhancement","title":"Access Points","props":[{"name":"label","value":"SC-7(3)"},{"name":"sort-id","value":"sc-07.03"}],"parts":[{"id":"sc-7.3_smt","name":"statement","prose":"The organization limits the number of external network connections to the information system."},{"id":"sc-7.3_gdn","name":"guidance","prose":"Limiting the number of external network connections facilitates more comprehensive monitoring of inbound and outbound communications traffic. The Trusted Internet Connection (TIC) initiative is an example of limiting the number of external network connections."},{"id":"sc-7.3_obj","name":"objective","prose":"Determine if the organization limits the number of external network connections to the information system."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\ninformation system design documentation\n\nboundary protection hardware and software\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\ncommunications and network traffic monitoring logs\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing boundary protection capability\n\nautomated mechanisms limiting the number of external network connections to the information system"}]}]},{"id":"sc-7.4","class":"SP800-53-enhancement","title":"External Telecommunications Services","params":[{"id":"sc-7.4_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"SC-7(4)"},{"name":"sort-id","value":"sc-07.04"}],"parts":[{"id":"sc-7.4_smt","name":"statement","prose":"The organization:","parts":[{"id":"sc-7.4_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Implements a managed interface for each external telecommunication service;"},{"id":"sc-7.4_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Establishes a traffic flow policy for each managed interface;"},{"id":"sc-7.4_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Protects the confidentiality and integrity of the information being transmitted across each interface;"},{"id":"sc-7.4_smt.d","name":"item","props":[{"name":"label","value":"(d)"}],"prose":"Documents each exception to the traffic flow policy with a supporting mission\/business need and duration of that need; and"},{"id":"sc-7.4_smt.e","name":"item","props":[{"name":"label","value":"(e)"}],"prose":"Reviews exceptions to the traffic flow policy {{ insert: param, sc-7.4_prm_1 }} and removes exceptions that are no longer supported by an explicit mission\/business need."}]},{"id":"sc-7.4_gdn","name":"guidance","links":[{"href":"#sc-8","rel":"related"}]},{"id":"sc-7.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-7.4.a_obj","name":"objective","props":[{"name":"label","value":"SC-7(4)(a)"}],"prose":"implements a managed interface for each external telecommunication service;","links":[{"href":"#sc-7.4_smt.a","rel":"corresp"}]},{"id":"sc-7.4.b_obj","name":"objective","props":[{"name":"label","value":"SC-7(4)(b)"}],"prose":"establishes a traffic flow policy for each managed interface;","links":[{"href":"#sc-7.4_smt.b","rel":"corresp"}]},{"id":"sc-7.4.c_obj","name":"objective","props":[{"name":"label","value":"SC-7(4)(c)"}],"prose":"protects the confidentiality and integrity of the information being transmitted across each interface;","links":[{"href":"#sc-7.4_smt.c","rel":"corresp"}]},{"id":"sc-7.4.d_obj","name":"objective","props":[{"name":"label","value":"SC-7(4)(d)"}],"prose":"documents each exception to the traffic flow policy with:","parts":[{"id":"sc-7.4.d_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(4)(d)[1]"}],"prose":"a supporting mission\/business need;"},{"id":"sc-7.4.d_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(4)(d)[2]"}],"prose":"duration of that need;"}],"links":[{"href":"#sc-7.4_smt.d","rel":"corresp"}]},{"id":"sc-7.4.e_obj","name":"objective","props":[{"name":"label","value":"SC-7(4)(e)"}],"parts":[{"id":"sc-7.4.e_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(4)(e)[1]"}],"prose":"defines a frequency to review exceptions to traffic flow policy;"},{"id":"sc-7.4.e_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(4)(e)[2]"}],"prose":"reviews exceptions to the traffic flow policy with the organization-defined frequency; and"},{"id":"sc-7.4.e_obj.3","name":"objective","props":[{"name":"label","value":"SC-7(4)(e)[3]"}],"prose":"removes traffic flow policy exceptions that are no longer supported by an explicit mission\/business need"}],"links":[{"href":"#sc-7.4_smt.e","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\ntraffic flow policy\n\ninformation flow control policy\n\nprocedures addressing boundary protection\n\ninformation system security architecture\n\ninformation system design documentation\n\nboundary protection hardware and software\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nrecords of traffic flow policy exceptions\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for documenting and reviewing exceptions to the traffic flow policy\n\norganizational processes for removing exceptions to the traffic flow policy\n\nautomated mechanisms implementing boundary protection capability\n\nmanaged interfaces implementing traffic flow policy"}]}]},{"id":"sc-7.5","class":"SP800-53-enhancement","title":"Deny by Default \/ Allow by Exception","props":[{"name":"label","value":"SC-7(5)"},{"name":"sort-id","value":"sc-07.05"}],"parts":[{"id":"sc-7.5_smt","name":"statement","prose":"The information system at managed interfaces denies network communications traffic by default and allows network communications traffic by exception (i.e., deny all, permit by exception)."},{"id":"sc-7.5_gdn","name":"guidance","prose":"This control enhancement applies to both inbound and outbound network communications traffic. A deny-all, permit-by-exception network communications traffic policy ensures that only those connections which are essential and approved are allowed."},{"id":"sc-7.5_obj","name":"objective","prose":"Determine if the information system, at managed interfaces:","parts":[{"id":"sc-7.5_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(5)[1]"}],"prose":"denies network traffic by default; and"},{"id":"sc-7.5_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(5)[2]"}],"prose":"allows network traffic by exception."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing traffic management at managed interfaces"}]}]},{"id":"sc-7.7","class":"SP800-53-enhancement","title":"Prevent Split Tunneling for Remote Devices","props":[{"name":"label","value":"SC-7(7)"},{"name":"sort-id","value":"sc-07.07"}],"parts":[{"id":"sc-7.7_smt","name":"statement","prose":"The information system, in conjunction with a remote device, prevents the device from simultaneously establishing non-remote connections with the system and communicating via some other connection to resources in external networks."},{"id":"sc-7.7_gdn","name":"guidance","prose":"This control enhancement is implemented within remote devices (e.g., notebook computers) through configuration settings to disable split tunneling in those devices, and by preventing those configuration settings from being readily configurable by users. This control enhancement is implemented within the information system by the detection of split tunneling (or of configuration settings that allow split tunneling) in the remote device, and by prohibiting the connection if the remote device is using split tunneling. Split tunneling might be desirable by remote users to communicate with local information system resources such as printers\/file servers. However, split tunneling would in effect allow unauthorized external connections, making the system more vulnerable to attack and to exfiltration of organizational information. The use of VPNs for remote connections, when adequately provisioned with appropriate security controls, may provide the organization with sufficient assurance that it can effectively treat such connections as non-remote connections from the confidentiality and integrity perspective. VPNs thus provide a means for allowing non-remote communications paths from remote devices. The use of an adequately provisioned VPN does not eliminate the need for preventing split tunneling."},{"id":"sc-7.7_obj","name":"objective","prose":"Determine if the information system, in conjunction with a remote device, prevents the device from simultaneously establishing non-remote connections with the system and communicating via some other connection to resources in external networks."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\ninformation system design documentation\n\ninformation system hardware and software\n\ninformation system architecture\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing boundary protection capability\n\nautomated mechanisms supporting\/restricting non-remote connections"}]}]}]},{"id":"sc-8","class":"SP800-53","title":"Transmission Confidentiality and Integrity","params":[{"id":"sc-8_prm_1","select":{"how-many":"one-or-more","choice":["confidentiality","integrity"]}}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-8"},{"name":"sort-id","value":"sc-08"}],"links":[{"href":"#d715b234-9b5b-4e07-b1ed-99836727664d","rel":"reference"},{"href":"#f2dbd4ec-c413-4714-b85b-6b7184d1c195","rel":"reference"},{"href":"#90c5bc98-f9c4-44c9-98b7-787422f0999c","rel":"reference"},{"href":"#99f331f2-a9f0-46c2-9856-a3cbb9b89442","rel":"reference"},{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"},{"href":"#349fe082-502d-464a-aa0c-1443c6a5cf40","rel":"reference"},{"href":"#a4aa9645-9a8a-4b51-90a9-e223250f9a75","rel":"reference"},{"href":"#06dff0ea-3848-4945-8d91-e955ee69f05d","rel":"reference"}],"parts":[{"id":"sc-8_smt","name":"statement","prose":"The information system protects the {{ insert: param, sc-8_prm_1 }} of transmitted information."},{"id":"sc-8_gdn","name":"guidance","prose":"This control applies to both internal and external networks and all types of information system components from which information can be transmitted (e.g., servers, mobile devices, notebook computers, printers, copiers, scanners, facsimile machines). Communication paths outside the physical protection of a controlled boundary are exposed to the possibility of interception and modification. Protecting the confidentiality and\/or integrity of organizational information can be accomplished by physical means (e.g., by employing protected distribution systems) or by logical means (e.g., employing encryption techniques). Organizations relying on commercial providers offering transmission services as commodity services rather than as fully dedicated services (i.e., services which can be highly specialized to individual customer needs), may find it difficult to obtain the necessary assurances regarding the implementation of needed security controls for transmission confidentiality\/integrity. In such situations, organizations determine what types of confidentiality\/integrity services are available in standard, commercial telecommunication service packages. If it is infeasible or impractical to obtain the necessary security controls and assurances of control effectiveness through appropriate contracting vehicles, organizations implement appropriate compensating security controls or explicitly accept the additional risk.","links":[{"href":"#ac-17","rel":"related"},{"href":"#pe-4","rel":"related"}]},{"id":"sc-8_obj","name":"objective","prose":"Determine if the information system protects one or more of the following:","parts":[{"id":"sc-8_obj.1","name":"objective","props":[{"name":"label","value":"SC-8[1]"}],"prose":"confidentiality of transmitted information; and\/or"},{"id":"sc-8_obj.2","name":"objective","props":[{"name":"label","value":"SC-8[2]"}],"prose":"integrity of transmitted information."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing transmission confidentiality and integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing transmission confidentiality and\/or integrity"}]}],"controls":[{"id":"sc-8.1","class":"SP800-53-enhancement","title":"Cryptographic or Alternate Physical Protection","params":[{"id":"sc-8.1_prm_1","select":{"how-many":"one-or-more","choice":["prevent unauthorized disclosure of information","detect changes to information"]}},{"id":"sc-8.1_prm_2","label":"organization-defined alternative physical safeguards"}],"props":[{"name":"label","value":"SC-8(1)"},{"name":"sort-id","value":"sc-08.01"}],"parts":[{"id":"sc-8.1_smt","name":"statement","prose":"The information system implements cryptographic mechanisms to {{ insert: param, sc-8.1_prm_1 }} during transmission unless otherwise protected by {{ insert: param, sc-8.1_prm_2 }}."},{"id":"sc-8.1_gdn","name":"guidance","prose":"Encrypting information for transmission protects information from unauthorized disclosure and modification. Cryptographic mechanisms implemented to protect information integrity include, for example, cryptographic hash functions which have common application in digital signatures, checksums, and message authentication codes. Alternative physical security safeguards include, for example, protected distribution systems.","links":[{"href":"#sc-13","rel":"related"}]},{"id":"sc-8.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-8.1_obj.1","name":"objective","props":[{"name":"label","value":"SC-8(1)[1]"}],"prose":"the organization defines physical safeguards to be implemented to protect information during transmission when cryptographic mechanisms are not implemented; and"},{"id":"sc-8.1_obj.2","name":"objective","props":[{"name":"label","value":"SC-8(1)[2]"}],"prose":"the information system implements cryptographic mechanisms to do one or more of the following during transmission unless otherwise protected by organization-defined alternative physical safeguards:","parts":[{"id":"sc-8.1_obj.2.a","name":"objective","props":[{"name":"label","value":"SC-8(1)[2][a]"}],"prose":"prevent unauthorized disclosure of information; and\/or"},{"id":"sc-8.1_obj.2.b","name":"objective","props":[{"name":"label","value":"SC-8(1)[2][b]"}],"prose":"detect changes to information."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing transmission confidentiality and integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Cryptographic mechanisms supporting and\/or implementing transmission confidentiality and\/or integrity\n\nautomated mechanisms supporting and\/or implementing alternative physical safeguards\n\norganizational processes for defining and implementing alternative physical safeguards"}]}]}]},{"id":"sc-10","class":"SP800-53","title":"Network Disconnect","params":[{"id":"sc-10_prm_1","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"SC-10"},{"name":"sort-id","value":"sc-10"}],"parts":[{"id":"sc-10_smt","name":"statement","prose":"The information system terminates the network connection associated with a communications session at the end of the session or after {{ insert: param, sc-10_prm_1 }} of inactivity."},{"id":"sc-10_gdn","name":"guidance","prose":"This control applies to both internal and external networks. Terminating network connections associated with communications sessions include, for example, de-allocating associated TCP\/IP address\/port pairs at the operating system level, or de-allocating networking assignments at the application level if multiple application sessions are using a single, operating system-level network connection. Time periods of inactivity may be established by organizations and include, for example, time periods by type of network access or for specific network accesses."},{"id":"sc-10_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-10_obj.1","name":"objective","props":[{"name":"label","value":"SC-10[1]"}],"prose":"the organization defines a time period of inactivity after which the information system terminates a network connection associated with a communications session; and"},{"id":"sc-10_obj.2","name":"objective","props":[{"name":"label","value":"SC-10[2]"}],"prose":"the information system terminates the network connection associated with a communication session at the end of the session or after the organization-defined time period of inactivity."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing network disconnect\n\ninformation system design documentation\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing network disconnect capability"}]}]},{"id":"sc-12","class":"SP800-53","title":"Cryptographic Key Establishment and Management","params":[{"id":"sc-12_prm_1","label":"organization-defined requirements for key generation, distribution, storage, access, and destruction"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-12"},{"name":"sort-id","value":"sc-12"}],"links":[{"href":"#81f09e01-d0b0-4ae2-aa6a-064ed9950070","rel":"reference"},{"href":"#a6c774c0-bf50-4590-9841-2a5c1c91ac6f","rel":"reference"}],"parts":[{"id":"sc-12_smt","name":"statement","prose":"The organization establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with {{ insert: param, sc-12_prm_1 }}."},{"id":"sc-12_gdn","name":"guidance","prose":"Cryptographic key management and establishment can be performed using manual procedures or automated mechanisms with supporting manual procedures. Organizations define key management requirements in accordance with applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance, specifying appropriate options, levels, and parameters. Organizations manage trust stores to ensure that only approved trust anchors are in such trust stores. This includes certificates with visibility external to organizational information systems and certificates related to the internal operations of systems.","links":[{"href":"#sc-13","rel":"related"},{"href":"#sc-17","rel":"related"}]},{"id":"sc-12_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-12_obj.1","name":"objective","props":[{"name":"label","value":"SC-12[1]"}],"prose":"defines requirements for cryptographic key:","parts":[{"id":"sc-12_obj.1.a","name":"objective","props":[{"name":"label","value":"SC-12[1][a]"}],"prose":"generation;"},{"id":"sc-12_obj.1.b","name":"objective","props":[{"name":"label","value":"SC-12[1][b]"}],"prose":"distribution;"},{"id":"sc-12_obj.1.c","name":"objective","props":[{"name":"label","value":"SC-12[1][c]"}],"prose":"storage;"},{"id":"sc-12_obj.1.d","name":"objective","props":[{"name":"label","value":"SC-12[1][d]"}],"prose":"access;"},{"id":"sc-12_obj.1.e","name":"objective","props":[{"name":"label","value":"SC-12[1][e]"}],"prose":"destruction; and"}]},{"id":"sc-12_obj.2","name":"objective","props":[{"name":"label","value":"SC-12[2]"}],"prose":"establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key generation, distribution, storage, access, and destruction."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing cryptographic key establishment and management\n\ninformation system design documentation\n\ncryptographic mechanisms\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for cryptographic key establishment and\/or management"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing cryptographic key establishment and management"}]}]},{"id":"sc-13","class":"SP800-53","title":"Cryptographic Protection","params":[{"id":"sc-13_prm_1","label":"organization-defined cryptographic uses and type of cryptography required for each use"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-13"},{"name":"sort-id","value":"sc-13"}],"links":[{"href":"#39f9087d-7687-46d2-8eda-b6f4b7a4d8a9","rel":"reference"},{"href":"#6a1041fc-054e-4230-946b-2e6f4f3731bb","rel":"reference"},{"href":"#9b97ed27-3dd6-4f9a-ade5-1b43e9669794","rel":"reference"}],"parts":[{"id":"sc-13_smt","name":"statement","prose":"The information system implements {{ insert: param, sc-13_prm_1 }} in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards."},{"id":"sc-13_gdn","name":"guidance","prose":"Cryptography can be employed to support a variety of security solutions including, for example, the protection of classified and Controlled Unclassified Information, the provision of digital signatures, and the enforcement of information separation when authorized individuals have the necessary clearances for such information but lack the necessary formal access approvals. Cryptography can also be used to support random number generation and hash generation. Generally applicable cryptographic standards include FIPS-validated cryptography and NSA-approved cryptography. This control does not impose any requirements on organizations to use cryptography. However, if cryptography is required based on the selection of other security controls, organizations define each type of cryptographic use and the type of cryptography required (e.g., protection of classified information: NSA-approved cryptography; provision of digital signatures: FIPS-validated cryptography).","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-7","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#au-10","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-7","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-28","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"sc-13_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-13_obj.1","name":"objective","props":[{"name":"label","value":"SC-13[1]"}],"prose":"the organization defines cryptographic uses; and"},{"id":"sc-13_obj.2","name":"objective","props":[{"name":"label","value":"SC-13[2]"}],"prose":"the organization defines the type of cryptography required for each use; and"},{"id":"sc-13_obj.3","name":"objective","props":[{"name":"label","value":"SC-13[3]"}],"prose":"the information system implements the organization-defined cryptographic uses and type of cryptography required for each use in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing cryptographic protection\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ncryptographic module validation certificates\n\nlist of FIPS validated cryptographic modules\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with responsibilities for cryptographic protection"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing cryptographic protection"}]}]},{"id":"sc-15","class":"SP800-53","title":"Collaborative Computing Devices","params":[{"id":"sc-15_prm_1","label":"organization-defined exceptions where remote activation is to be allowed"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-15"},{"name":"sort-id","value":"sc-15"}],"parts":[{"id":"sc-15_smt","name":"statement","prose":"The information system:","parts":[{"id":"sc-15_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Prohibits remote activation of collaborative computing devices with the following exceptions: {{ insert: param, sc-15_prm_1 }}; and"},{"id":"sc-15_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Provides an explicit indication of use to users physically present at the devices."}]},{"id":"sc-15_gdn","name":"guidance","prose":"Collaborative computing devices include, for example, networked white boards, cameras, and microphones. Explicit indication of use includes, for example, signals to users when collaborative computing devices are activated.","links":[{"href":"#ac-21","rel":"related"}]},{"id":"sc-15_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-15.a_obj","name":"objective","props":[{"name":"label","value":"SC-15(a)"}],"parts":[{"id":"sc-15.a_obj.1","name":"objective","props":[{"name":"label","value":"SC-15(a)[1]"}],"prose":"the organization defines exceptions where remote activation of collaborative computing devices is to be allowed;"},{"id":"sc-15.a_obj.2","name":"objective","props":[{"name":"label","value":"SC-15(a)[2]"}],"prose":"the information system prohibits remote activation of collaborative computing devices, except for organization-defined exceptions where remote activation is to be allowed; and"}]},{"id":"sc-15.b_obj","name":"objective","props":[{"name":"label","value":"SC-15(b)"}],"prose":"the information system provides an explicit indication of use to users physically present at the devices."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing collaborative computing\n\naccess control policy and procedures\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with responsibilities for managing collaborative computing devices"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing management of remote activation of collaborative computing devices\n\nautomated mechanisms providing an indication of use of collaborative computing devices"}]}]},{"id":"sc-17","class":"SP800-53","title":"Public Key Infrastructure Certificates","params":[{"id":"sc-17_prm_1","label":"organization-defined certificate policy"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-17"},{"name":"sort-id","value":"sc-17"}],"links":[{"href":"#58ad6f27-af99-429f-86a8-8bb767b014b9","rel":"reference"},{"href":"#8f174e91-844e-4cf1-a72a-45c119a3a8dd","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"}],"parts":[{"id":"sc-17_smt","name":"statement","prose":"The organization issues public key certificates under an {{ insert: param, sc-17_prm_1 }} or obtains public key certificates from an approved service provider."},{"id":"sc-17_gdn","name":"guidance","prose":"For all certificates, organizations manage information system trust stores to ensure only approved trust anchors are in the trust stores. This control addresses both certificates with visibility external to organizational information systems and certificates related to the internal operations of systems, for example, application-specific time services.","links":[{"href":"#sc-12","rel":"related"}]},{"id":"sc-17_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-17_obj.1","name":"objective","props":[{"name":"label","value":"SC-17[1]"}],"prose":"defines a certificate policy for issuing public key certificates;"},{"id":"sc-17_obj.2","name":"objective","props":[{"name":"label","value":"SC-17[2]"}],"prose":"issues public key certificates:","parts":[{"id":"sc-17_obj.2.a","name":"objective","props":[{"name":"label","value":"SC-17[2][a]"}],"prose":"under an organization-defined certificate policy: or"},{"id":"sc-17_obj.2.b","name":"objective","props":[{"name":"label","value":"SC-17[2][b]"}],"prose":"obtains public key certificates from an approved service provider."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing public key infrastructure certificates\n\npublic key certificate policy or policies\n\npublic key issuing process\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for issuing public key certificates\n\nservice providers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing the management of public key infrastructure certificates"}]}]},{"id":"sc-18","class":"SP800-53","title":"Mobile Code","props":[{"name":"priority","value":"P2"},{"name":"label","value":"SC-18"},{"name":"sort-id","value":"sc-18"}],"links":[{"href":"#e716cd51-d1d5-4c6a-967a-22e9fbbc42f1","rel":"reference"},{"href":"#e6522953-6714-435d-a0d3-140df554c186","rel":"reference"}],"parts":[{"id":"sc-18_smt","name":"statement","prose":"The organization:","parts":[{"id":"sc-18_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Defines acceptable and unacceptable mobile code and mobile code technologies;"},{"id":"sc-18_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishes usage restrictions and implementation guidance for acceptable mobile code and mobile code technologies; and"},{"id":"sc-18_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Authorizes, monitors, and controls the use of mobile code within the information system."}]},{"id":"sc-18_gdn","name":"guidance","prose":"Decisions regarding the employment of mobile code within organizational information systems are based on the potential for the code to cause damage to the systems if used maliciously. Mobile code technologies include, for example, Java, JavaScript, ActiveX, Postscript, PDF, Shockwave movies, Flash animations, and VBScript. Usage restrictions and implementation guidance apply to both the selection and use of mobile code installed on servers and mobile code downloaded and executed on individual workstations and devices (e.g., smart phones). Mobile code policy and procedures address preventing the development, acquisition, or introduction of unacceptable mobile code within organizational information systems.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#si-3","rel":"related"}]},{"id":"sc-18_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-18.a_obj","name":"objective","props":[{"name":"label","value":"SC-18(a)"}],"prose":"defines acceptable and unacceptable mobile code and mobile code technologies;"},{"id":"sc-18.b_obj","name":"objective","props":[{"name":"label","value":"SC-18(b)"}],"parts":[{"id":"sc-18.b_obj.1","name":"objective","props":[{"name":"label","value":"SC-18(b)[1]"}],"prose":"establishes usage restrictions for acceptable mobile code and mobile code technologies;"},{"id":"sc-18.b_obj.2","name":"objective","props":[{"name":"label","value":"SC-18(b)[2]"}],"prose":"establishes implementation guidance for acceptable mobile code and mobile code technologies;"}]},{"id":"sc-18.c_obj","name":"objective","props":[{"name":"label","value":"SC-18(c)"}],"parts":[{"id":"sc-18.c_obj.1","name":"objective","props":[{"name":"label","value":"SC-18(c)[1]"}],"prose":"authorizes the use of mobile code within the information system;"},{"id":"sc-18.c_obj.2","name":"objective","props":[{"name":"label","value":"SC-18(c)[2]"}],"prose":"monitors the use of mobile code within the information system; and"},{"id":"sc-18.c_obj.3","name":"objective","props":[{"name":"label","value":"SC-18(c)[3]"}],"prose":"controls the use of mobile code within the information system."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing mobile code\n\nmobile code usage restrictions, mobile code implementation policy and procedures\n\nlist of acceptable mobile code and mobile code technologies\n\nlist of unacceptable mobile code and mobile technologies\n\nauthorization records\n\ninformation system monitoring records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing mobile code"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for controlling, authorizing, monitoring, and restricting mobile code\n\nautomated mechanisms supporting and\/or implementing the management of mobile code\n\nautomated mechanisms supporting and\/or implementing the monitoring of mobile code"}]}]},{"id":"sc-19","class":"SP800-53","title":"Voice Over Internet Protocol","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-19"},{"name":"sort-id","value":"sc-19"}],"links":[{"href":"#7783f3e7-09b3-478b-9aa2-4a76dfd0ea90","rel":"reference"}],"parts":[{"id":"sc-19_smt","name":"statement","prose":"The organization:","parts":[{"id":"sc-19_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously; and"},{"id":"sc-19_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes, monitors, and controls the use of VoIP within the information system."}]},{"id":"sc-19_gdn","name":"guidance","links":[{"href":"#cm-6","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-15","rel":"related"}]},{"id":"sc-19_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-19.a_obj","name":"objective","props":[{"name":"label","value":"SC-19(a)"}],"parts":[{"id":"sc-19.a_obj.1","name":"objective","props":[{"name":"label","value":"SC-19(a)[1]"}],"prose":"establishes usage restrictions for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously;"},{"id":"sc-19.a_obj.2","name":"objective","props":[{"name":"label","value":"SC-19(a)[2]"}],"prose":"establishes implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously;"}]},{"id":"sc-19.b_obj","name":"objective","props":[{"name":"label","value":"SC-19(b)"}],"parts":[{"id":"sc-19.b_obj.1","name":"objective","props":[{"name":"label","value":"SC-19(b)[1]"}],"prose":"authorizes the use of VoIP within the information system;"},{"id":"sc-19.b_obj.2","name":"objective","props":[{"name":"label","value":"SC-19(b)[2]"}],"prose":"monitors the use of VoIP within the information system; and"},{"id":"sc-19.b_obj.3","name":"objective","props":[{"name":"label","value":"SC-19(b)[3]"}],"prose":"controls the use of VoIP within the information system."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing VoIP\n\nVoIP usage restrictions\n\nVoIP implementation guidance\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system monitoring records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing VoIP"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for authorizing, monitoring, and controlling VoIP\n\nautomated mechanisms supporting and\/or implementing authorizing, monitoring, and controlling VoIP"}]}]},{"id":"sc-20","class":"SP800-53","title":"Secure Name \/ Address Resolution Service (authoritative Source)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-20"},{"name":"sort-id","value":"sc-20"}],"links":[{"href":"#28115a56-da6b-4d44-b1df-51dd7f048a3e","rel":"reference"},{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"}],"parts":[{"id":"sc-20_smt","name":"statement","prose":"The information system:","parts":[{"id":"sc-20_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Provides additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name\/address resolution queries; and"},{"id":"sc-20_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Provides the means to indicate the security status of child zones and (if the child supports secure resolution services) to enable verification of a chain of trust among parent and child domains, when operating as part of a distributed, hierarchical namespace."}]},{"id":"sc-20_gdn","name":"guidance","prose":"This control enables external clients including, for example, remote Internet clients, to obtain origin authentication and integrity verification assurances for the host\/service name to network address resolution information obtained through the service. Information systems that provide name and address resolution services include, for example, domain name system (DNS) servers. Additional artifacts include, for example, DNS Security (DNSSEC) digital signatures and cryptographic keys. DNS resource records are examples of authoritative data. The means to indicate the security status of child zones includes, for example, the use of delegation signer resource records in the DNS. The DNS security controls reflect (and are referenced from) OMB Memorandum 08-23. Information systems that use technologies other than the DNS to map between host\/service names and network addresses provide other means to assure the authenticity and integrity of response data.","links":[{"href":"#au-10","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-21","rel":"related"},{"href":"#sc-22","rel":"related"}]},{"id":"sc-20_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"sc-20.a_obj","name":"objective","props":[{"name":"label","value":"SC-20(a)"}],"prose":"provides additional data origin and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name\/address resolution queries;"},{"id":"sc-20.b_obj","name":"objective","props":[{"name":"label","value":"SC-20(b)"}],"prose":"provides the means to, when operating as part of a distributed, hierarchical namespace:","parts":[{"id":"sc-20.b_obj.1","name":"objective","props":[{"name":"label","value":"SC-20(b)[1]"}],"prose":"indicate the security status of child zones; and"},{"id":"sc-20.b_obj.2","name":"objective","props":[{"name":"label","value":"SC-20(b)[2]"}],"prose":"enable verification of a chain of trust among parent and child domains (if the child supports secure resolution services)."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing secure name\/address resolution service (authoritative source)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing DNS"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing secure name\/address resolution service"}]}]},{"id":"sc-21","class":"SP800-53","title":"Secure Name \/ Address Resolution Service (recursive or Caching Resolver)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-21"},{"name":"sort-id","value":"sc-21"}],"links":[{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"}],"parts":[{"id":"sc-21_smt","name":"statement","prose":"The information system requests and performs data origin authentication and data integrity verification on the name\/address resolution responses the system receives from authoritative sources."},{"id":"sc-21_gdn","name":"guidance","prose":"Each client of name resolution services either performs this validation on its own, or has authenticated channels to trusted validation providers. Information systems that provide name and address resolution services for local clients include, for example, recursive resolving or caching domain name system (DNS) servers. DNS client resolvers either perform validation of DNSSEC signatures, or clients use authenticated channels to recursive resolvers that perform such validations. Information systems that use technologies other than the DNS to map between host\/service names and network addresses provide other means to enable clients to verify the authenticity and integrity of response data.","links":[{"href":"#sc-20","rel":"related"},{"href":"#sc-22","rel":"related"}]},{"id":"sc-21_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"sc-21_obj.1","name":"objective","props":[{"name":"label","value":"SC-21[1]"}],"prose":"requests data origin authentication on the name\/address resolution responses the system receives from authoritative sources;"},{"id":"sc-21_obj.2","name":"objective","props":[{"name":"label","value":"SC-21[2]"}],"prose":"requests data integrity verification on the name\/address resolution responses the system receives from authoritative sources;"},{"id":"sc-21_obj.3","name":"objective","props":[{"name":"label","value":"SC-21[3]"}],"prose":"performs data origin authentication on the name\/address resolution responses the system receives from authoritative sources; and"},{"id":"sc-21_obj.4","name":"objective","props":[{"name":"label","value":"SC-21[4]"}],"prose":"performs data integrity verification on the name\/address resolution responses the system receives from authoritative sources."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing secure name\/address resolution service (recursive or caching resolver)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing DNS"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing data origin authentication and data integrity verification for name\/address resolution services"}]}]},{"id":"sc-22","class":"SP800-53","title":"Architecture and Provisioning for Name \/ Address Resolution Service","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-22"},{"name":"sort-id","value":"sc-22"}],"links":[{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"}],"parts":[{"id":"sc-22_smt","name":"statement","prose":"The information systems that collectively provide name\/address resolution service for an organization are fault-tolerant and implement internal\/external role separation."},{"id":"sc-22_gdn","name":"guidance","prose":"Information systems that provide name and address resolution services include, for example, domain name system (DNS) servers. To eliminate single points of failure and to enhance redundancy, organizations employ at least two authoritative domain name system servers, one configured as the primary server and the other configured as the secondary server. Additionally, organizations typically deploy the servers in two geographically separated network subnetworks (i.e., not located in the same physical facility). For role separation, DNS servers with internal roles only process name and address resolution requests from within organizations (i.e., from internal clients). DNS servers with external roles only process name and address resolution information requests from clients external to organizations (i.e., on external networks including the Internet). Organizations specify clients that can access authoritative DNS servers in particular roles (e.g., by address ranges, explicit lists).","links":[{"href":"#sc-2","rel":"related"},{"href":"#sc-20","rel":"related"},{"href":"#sc-21","rel":"related"},{"href":"#sc-24","rel":"related"}]},{"id":"sc-22_obj","name":"objective","prose":"Determine if the information systems that collectively provide name\/address resolution service for an organization:","parts":[{"id":"sc-22_obj.1","name":"objective","props":[{"name":"label","value":"SC-22[1]"}],"prose":"are fault tolerant; and"},{"id":"sc-22_obj.2","name":"objective","props":[{"name":"label","value":"SC-22[2]"}],"prose":"implement internal\/external role separation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing architecture and provisioning for name\/address resolution service\n\naccess control policy and procedures\n\ninformation system design documentation\n\nassessment results from independent, testing organizations\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing DNS"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing name\/address resolution service for fault tolerance and role separation"}]}]},{"id":"sc-23","class":"SP800-53","title":"Session Authenticity","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-23"},{"name":"sort-id","value":"sc-23"}],"links":[{"href":"#90c5bc98-f9c4-44c9-98b7-787422f0999c","rel":"reference"},{"href":"#99f331f2-a9f0-46c2-9856-a3cbb9b89442","rel":"reference"},{"href":"#1ebdf782-d95d-4a7b-8ec7-ee860951eced","rel":"reference"}],"parts":[{"id":"sc-23_smt","name":"statement","prose":"The information system protects the authenticity of communications sessions."},{"id":"sc-23_gdn","name":"guidance","prose":"This control addresses communications protection at the session, versus packet level (e.g., sessions in service-oriented architectures providing web-based services) and establishes grounds for confidence at both ends of communications sessions in ongoing identities of other parties and in the validity of information transmitted. Authenticity protection includes, for example, protecting against man-in-the-middle attacks\/session hijacking and the insertion of false information into sessions.","links":[{"href":"#sc-8","rel":"related"},{"href":"#sc-10","rel":"related"},{"href":"#sc-11","rel":"related"}]},{"id":"sc-23_obj","name":"objective","prose":"Determine if the information system protects the authenticity of communications sessions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing session authenticity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing session authenticity"}]}]},{"id":"sc-28","class":"SP800-53","title":"Protection of Information at Rest","params":[{"id":"sc-28_prm_1","select":{"how-many":"one-or-more","choice":["confidentiality","integrity"]}},{"id":"sc-28_prm_2","label":"organization-defined information at rest"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-28"},{"name":"sort-id","value":"sc-28"}],"links":[{"href":"#81f09e01-d0b0-4ae2-aa6a-064ed9950070","rel":"reference"},{"href":"#a6c774c0-bf50-4590-9841-2a5c1c91ac6f","rel":"reference"},{"href":"#3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","rel":"reference"}],"parts":[{"id":"sc-28_smt","name":"statement","prose":"The information system protects the {{ insert: param, sc-28_prm_1 }} of {{ insert: param, sc-28_prm_2 }}."},{"id":"sc-28_gdn","name":"guidance","prose":"This control addresses the confidentiality and integrity of information at rest and covers user information and system information. Information at rest refers to the state of information when it is located on storage devices as specific components of information systems. System-related information requiring protection includes, for example, configurations or rule sets for firewalls, gateways, intrusion detection\/prevention systems, filtering routers, and authenticator content. Organizations may employ different mechanisms to achieve confidentiality and integrity protections, including the use of cryptographic mechanisms and file share scanning. Integrity protection can be achieved, for example, by implementing Write-Once-Read-Many (WORM) technologies. Organizations may also employ other security controls including, for example, secure off-line storage in lieu of online storage when adequate protection of information at rest cannot otherwise be achieved and\/or continuous monitoring to identify malicious code at rest.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"sc-28_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-28_obj.1","name":"objective","props":[{"name":"label","value":"SC-28[1]"}],"prose":"the organization defines information at rest requiring one or more of the following:","parts":[{"id":"sc-28_obj.1.a","name":"objective","props":[{"name":"label","value":"SC-28[1][a]"}],"prose":"confidentiality protection; and\/or"},{"id":"sc-28_obj.1.b","name":"objective","props":[{"name":"label","value":"SC-28[1][b]"}],"prose":"integrity protection;"}]},{"id":"sc-28_obj.2","name":"objective","props":[{"name":"label","value":"SC-28[2]"}],"prose":"the information system protects:","parts":[{"id":"sc-28_obj.2.a","name":"objective","props":[{"name":"label","value":"SC-28[2][a]"}],"prose":"the confidentiality of organization-defined information at rest; and\/or"},{"id":"sc-28_obj.2.b","name":"objective","props":[{"name":"label","value":"SC-28[2][b]"}],"prose":"the integrity of organization-defined information at rest."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing protection of information at rest\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ncryptographic mechanisms and associated configuration documentation\n\nlist of information at rest requiring confidentiality and integrity protections\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing confidentiality and integrity protections for information at rest"}]}]},{"id":"sc-39","class":"SP800-53","title":"Process Isolation","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-39"},{"name":"sort-id","value":"sc-39"}],"parts":[{"id":"sc-39_smt","name":"statement","prose":"The information system maintains a separate execution domain for each executing process."},{"id":"sc-39_gdn","name":"guidance","prose":"Information systems can maintain separate execution domains for each executing process by assigning each process a separate address space. Each information system process has a distinct address space so that communication between processes is performed in a manner controlled through the security functions, and one process cannot modify the executing code of another process. Maintaining separate execution domains for executing processes can be achieved, for example, by implementing separate address spaces. This capability is available in most commercial operating systems that employ multi-state processor technologies.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sc-2","rel":"related"},{"href":"#sc-3","rel":"related"}]},{"id":"sc-39_obj","name":"objective","prose":"Determine if the information system maintains a separate execution domain for each executing process."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system design documentation\n\ninformation system architecture\n\nindependent verification and validation documentation\n\ntesting and evaluation documentation, other relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Information system developers\/integrators\n\ninformation system security architect"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing separate execution domains for each executing process"}]}]}]},{"id":"si","class":"family","title":"System and Information Integrity","controls":[{"id":"si-1","class":"SP800-53","title":"System and Information Integrity Policy and Procedures","params":[{"id":"si-1_prm_1","label":"organization-defined personnel or roles"},{"id":"si-1_prm_2","label":"organization-defined frequency"},{"id":"si-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-1"},{"name":"sort-id","value":"si-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"si-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, si-1_prm_1 }}:","parts":[{"id":"si-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system and information integrity policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"si-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system and information integrity policy and associated system and information integrity controls; and"}]},{"id":"si-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"si-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System and information integrity policy {{ insert: param, si-1_prm_2 }}; and"},{"id":"si-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System and information integrity procedures {{ insert: param, si-1_prm_3 }}."}]}]},{"id":"si-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the SI family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"si-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-1.a_obj","name":"objective","props":[{"name":"label","value":"SI-1(a)"}],"parts":[{"id":"si-1.a.1_obj","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)"}],"parts":[{"id":"si-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1]"}],"prose":"develops and documents a system and information integrity policy that addresses:","parts":[{"id":"si-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"si-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"si-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"si-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"si-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"si-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"si-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"si-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system and information integrity policy is to be disseminated;"},{"id":"si-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[3]"}],"prose":"disseminates the system and information integrity policy to organization-defined personnel or roles;"}]},{"id":"si-1.a.2_obj","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)"}],"parts":[{"id":"si-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the system and information integrity policy and associated system and information integrity controls;"},{"id":"si-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"si-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"si-1.b_obj","name":"objective","props":[{"name":"label","value":"SI-1(b)"}],"parts":[{"id":"si-1.b.1_obj","name":"objective","props":[{"name":"label","value":"SI-1(b)(1)"}],"parts":[{"id":"si-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system and information integrity policy;"},{"id":"si-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(b)(1)[2]"}],"prose":"reviews and updates the current system and information integrity policy with the organization-defined frequency;"}]},{"id":"si-1.b.2_obj","name":"objective","props":[{"name":"label","value":"SI-1(b)(2)"}],"parts":[{"id":"si-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system and information integrity procedures; and"},{"id":"si-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(b)(2)[2]"}],"prose":"reviews and updates the current system and information integrity procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and information integrity responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"si-2","class":"SP800-53","title":"Flaw Remediation","params":[{"id":"si-2_prm_1","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-2"},{"name":"sort-id","value":"si-02"}],"links":[{"href":"#bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","rel":"reference"},{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"si-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Identifies, reports, and corrects information system flaws;"},{"id":"si-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Tests software and firmware updates related to flaw remediation for effectiveness and potential side effects before installation;"},{"id":"si-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Installs security-relevant software and firmware updates within {{ insert: param, si-2_prm_1 }} of the release of the updates; and"},{"id":"si-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Incorporates flaw remediation into the organizational configuration management process."}]},{"id":"si-2_gdn","name":"guidance","prose":"Organizations identify information systems affected by announced software flaws including potential vulnerabilities resulting from those flaws, and report this information to designated organizational personnel with information security responsibilities. Security-relevant software updates include, for example, patches, service packs, hot fixes, and anti-virus signatures. Organizations also address flaws discovered during security assessments, continuous monitoring, incident response activities, and system error handling. Organizations take advantage of available resources such as the Common Weakness Enumeration (CWE) or Common Vulnerabilities and Exposures (CVE) databases in remediating flaws discovered in organizational information systems. By incorporating flaw remediation into ongoing configuration management processes, required\/anticipated remediation actions can be tracked and verified. Flaw remediation actions that can be tracked and verified include, for example, determining whether organizations follow US-CERT guidance and Information Assurance Vulnerability Alerts. Organization-defined time periods for updating security-relevant software and firmware may vary based on a variety of factors including, for example, the security category of the information system or the criticality of the update (i.e., severity of the vulnerability related to the discovered flaw). Some types of flaw remediation may require more testing than other types. Organizations determine the degree and type of testing needed for the specific type of flaw remediation activity under consideration and also the types of changes that are to be configuration-managed. In some situations, organizations may determine that the testing of software and\/or firmware updates is not necessary or practical, for example, when implementing simple anti-virus signature updates. Organizations may also consider in testing decisions, whether security-relevant software or firmware updates are obtained from authorized sources with appropriate digital signatures.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#ma-2","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#si-11","rel":"related"}]},{"id":"si-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-2.a_obj","name":"objective","props":[{"name":"label","value":"SI-2(a)"}],"parts":[{"id":"si-2.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(a)[1]"}],"prose":"identifies information system flaws;"},{"id":"si-2.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(a)[2]"}],"prose":"reports information system flaws;"},{"id":"si-2.a_obj.3","name":"objective","props":[{"name":"label","value":"SI-2(a)[3]"}],"prose":"corrects information system flaws;"}]},{"id":"si-2.b_obj","name":"objective","props":[{"name":"label","value":"SI-2(b)"}],"parts":[{"id":"si-2.b_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(b)[1]"}],"prose":"tests software updates related to flaw remediation for effectiveness and potential side effects before installation;"},{"id":"si-2.b_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(b)[2]"}],"prose":"tests firmware updates related to flaw remediation for effectiveness and potential side effects before installation;"}]},{"id":"si-2.c_obj","name":"objective","props":[{"name":"label","value":"SI-2(c)"}],"parts":[{"id":"si-2.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(c)[1]"}],"prose":"defines the time period within which to install security-relevant software updates after the release of the updates;"},{"id":"si-2.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(c)[2]"}],"prose":"defines the time period within which to install security-relevant firmware updates after the release of the updates;"},{"id":"si-2.c_obj.3","name":"objective","props":[{"name":"label","value":"SI-2(c)[3]"}],"prose":"installs software updates within the organization-defined time period of the release of the updates;"},{"id":"si-2.c_obj.4","name":"objective","props":[{"name":"label","value":"SI-2(c)[4]"}],"prose":"installs firmware updates within the organization-defined time period of the release of the updates; and"}]},{"id":"si-2.d_obj","name":"objective","props":[{"name":"label","value":"SI-2(d)"}],"prose":"incorporates flaw remediation into the organizational configuration management process."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing flaw remediation\n\nprocedures addressing configuration management\n\nlist of flaws and vulnerabilities potentially affecting the information system\n\nlist of recent security flaw remediation actions performed on the information system (e.g., list of installed patches, service packs, hot fixes, and other software updates to correct information system flaws)\n\ntest results from the installation of software and firmware updates to correct information system flaws\n\ninstallation\/change control records for security-relevant software and firmware updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for flaw remediation\n\norganizational personnel with configuration management responsibility"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for identifying, reporting, and correcting information system flaws\n\norganizational process for installing software and firmware updates\n\nautomated mechanisms supporting and\/or implementing reporting, and correcting information system flaws\n\nautomated mechanisms supporting and\/or implementing testing software and firmware updates"}]}],"controls":[{"id":"si-2.2","class":"SP800-53-enhancement","title":"Automated Flaw Remediation Status","params":[{"id":"si-2.2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"SI-2(2)"},{"name":"sort-id","value":"si-02.02"}],"parts":[{"id":"si-2.2_smt","name":"statement","prose":"The organization employs automated mechanisms {{ insert: param, si-2.2_prm_1 }} to determine the state of information system components with regard to flaw remediation."},{"id":"si-2.2_gdn","name":"guidance","links":[{"href":"#cm-6","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"si-2.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-2.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(2)[1]"}],"prose":"defines a frequency to employ automated mechanisms to determine the state of information system components with regard to flaw remediation; and"},{"id":"si-2.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(2)[2]"}],"prose":"employs automated mechanisms with the organization-defined frequency to determine the state of information system components with regard to flaw remediation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing flaw remediation\n\nautomated mechanisms supporting centralized management of flaw remediation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for flaw remediation"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms used to determine the state of information system components with regard to flaw remediation"}]}]}]},{"id":"si-3","class":"SP800-53","title":"Malicious Code Protection","params":[{"id":"si-3_prm_1","label":"organization-defined frequency"},{"id":"si-3_prm_2","select":{"how-many":"one-or-more","choice":["endpoint","network entry\/exit points"]}},{"id":"si-3_prm_3","select":{"how-many":"one-or-more","choice":["block malicious code","quarantine malicious code","send alert to administrator"," {{ insert: param, si-3_prm_4 }} "]}},{"id":"si-3_prm_4","depends-on":"si-3_prm_3","label":"organization-defined action"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-3"},{"name":"sort-id","value":"si-03"}],"links":[{"href":"#6d431fee-658f-4a0e-9f2e-a38b5d398fab","rel":"reference"}],"parts":[{"id":"si-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code;"},{"id":"si-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures;"},{"id":"si-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Configures malicious code protection mechanisms to:","parts":[{"id":"si-3_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Perform periodic scans of the information system {{ insert: param, si-3_prm_1 }} and real-time scans of files from external sources at {{ insert: param, si-3_prm_2 }} as the files are downloaded, opened, or executed in accordance with organizational security policy; and"},{"id":"si-3_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":" {{ insert: param, si-3_prm_3 }} in response to malicious code detection; and"}]},{"id":"si-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Addresses the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the information system."}]},{"id":"si-3_gdn","name":"guidance","prose":"Information system entry and exit points include, for example, firewalls, electronic mail servers, web servers, proxy servers, remote-access servers, workstations, notebook computers, and mobile devices. Malicious code includes, for example, viruses, worms, Trojan horses, and spyware. Malicious code can also be encoded in various formats (e.g., UUENCODE, Unicode), contained within compressed or hidden files, or hidden in files using steganography. Malicious code can be transported by different means including, for example, web accesses, electronic mail, electronic mail attachments, and portable storage devices. Malicious code insertions occur through the exploitation of information system vulnerabilities. Malicious code protection mechanisms include, for example, anti-virus signature definitions and reputation-based technologies. A variety of technologies and methods exist to limit or eliminate the effects of malicious code. Pervasive configuration management and comprehensive software integrity controls may be effective in preventing execution of unauthorized code. In addition to commercial off-the-shelf software, malicious code may also be present in custom-built software. This could include, for example, logic bombs, back doors, and other types of cyber attacks that could affect organizational missions\/business functions. Traditional malicious code protection mechanisms cannot always detect such code. In these situations, organizations rely instead on other safeguards including, for example, secure coding practices, configuration management and control, trusted procurement processes, and monitoring practices to help ensure that software does not perform functions other than the functions intended. Organizations may determine that in response to the detection of malicious code, different actions may be warranted. For example, organizations can define actions in response to malicious code detection during periodic scans, actions in response to detection of malicious downloads, and\/or actions in response to detection of maliciousness when attempting to open or execute files.","links":[{"href":"#cm-3","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#sa-13","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-26","rel":"related"},{"href":"#sc-44","rel":"related"},{"href":"#si-2","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"si-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-3.a_obj","name":"objective","props":[{"name":"label","value":"SI-3(a)"}],"prose":"employs malicious code protection mechanisms to detect and eradicate malicious code at information system:","parts":[{"id":"si-3.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-3(a)[1]"}],"prose":"entry points;"},{"id":"si-3.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-3(a)[2]"}],"prose":"exit points;"}]},{"id":"si-3.b_obj","name":"objective","props":[{"name":"label","value":"SI-3(b)"}],"prose":"updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures (as identified in CM-1);"},{"id":"si-3.c_obj","name":"objective","props":[{"name":"label","value":"SI-3(c)"}],"parts":[{"id":"si-3.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-3(c)[1]"}],"prose":"defines a frequency for malicious code protection mechanisms to perform periodic scans of the information system;"},{"id":"si-3.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-3(c)[2]"}],"prose":"defines action to be initiated by malicious protection mechanisms in response to malicious code detection;"},{"id":"si-3.c_obj.3","name":"objective","props":[{"name":"label","value":"SI-3(c)[3]"}],"parts":[{"id":"si-3.c.1_obj.3","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](1)"}],"prose":"configures malicious code protection mechanisms to:","parts":[{"id":"si-3.c.1_obj.3.a","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](1)[a]"}],"prose":"perform periodic scans of the information system with the organization-defined frequency;"},{"id":"si-3.c.1_obj.3.b","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](1)[b]"}],"prose":"perform real-time scans of files from external sources at endpoint and\/or network entry\/exit points as the files are downloaded, opened, or executed in accordance with organizational security policy;"}]},{"id":"si-3.c.2_obj.3","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)"}],"prose":"configures malicious code protection mechanisms to do one or more of the following:","parts":[{"id":"si-3.c.2_obj.3.a","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[a]"}],"prose":"block malicious code in response to malicious code detection;"},{"id":"si-3.c.2_obj.3.b","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[b]"}],"prose":"quarantine malicious code in response to malicious code detection;"},{"id":"si-3.c.2_obj.3.c","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[c]"}],"prose":"send alert to administrator in response to malicious code detection; and\/or"},{"id":"si-3.c.2_obj.3.d","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[d]"}],"prose":"initiate organization-defined action in response to malicious code detection;"}]}]}]},{"id":"si-3.d_obj","name":"objective","props":[{"name":"label","value":"SI-3(d)"}],"parts":[{"id":"si-3.d_obj.1","name":"objective","props":[{"name":"label","value":"SI-3(d)[1]"}],"prose":"addresses the receipt of false positives during malicious code detection and eradication; and"},{"id":"si-3.d_obj.2","name":"objective","props":[{"name":"label","value":"SI-3(d)[2]"}],"prose":"addresses the resulting potential impact on the availability of the information system."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nconfiguration management policy and procedures\n\nprocedures addressing malicious code protection\n\nmalicious code protection mechanisms\n\nrecords of malicious code protection updates\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nscan results from malicious code protection mechanisms\n\nrecord of actions initiated by malicious code protection mechanisms in response to malicious code detection\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for malicious code protection\n\norganizational personnel with configuration management responsibility"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for employing, updating, and configuring malicious code protection mechanisms\n\norganizational process for addressing false positives and resulting potential impact\n\nautomated mechanisms supporting and\/or implementing employing, updating, and configuring malicious code protection mechanisms\n\nautomated mechanisms supporting and\/or implementing malicious code scanning and subsequent actions"}]}],"controls":[{"id":"si-3.1","class":"SP800-53-enhancement","title":"Central Management","props":[{"name":"label","value":"SI-3(1)"},{"name":"sort-id","value":"si-03.01"}],"parts":[{"id":"si-3.1_smt","name":"statement","prose":"The organization centrally manages malicious code protection mechanisms."},{"id":"si-3.1_gdn","name":"guidance","prose":"Central management is the organization-wide management and implementation of malicious code protection mechanisms. Central management includes planning, implementing, assessing, authorizing, and monitoring the organization-defined, centrally managed flaw malicious code protection security controls.","links":[{"href":"#au-2","rel":"related"},{"href":"#si-8","rel":"related"}]},{"id":"si-3.1_obj","name":"objective","prose":"Determine if the organization centrally manages malicious code protection mechanisms."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing malicious code protection\n\nautomated mechanisms supporting centralized management of malicious code protection mechanisms\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for malicious code protection"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for central management of malicious code protection mechanisms\n\nautomated mechanisms supporting and\/or implementing central management of malicious code protection mechanisms"}]}]},{"id":"si-3.2","class":"SP800-53-enhancement","title":"Automatic Updates","props":[{"name":"label","value":"SI-3(2)"},{"name":"sort-id","value":"si-03.02"}],"parts":[{"id":"si-3.2_smt","name":"statement","prose":"The information system automatically updates malicious code protection mechanisms."},{"id":"si-3.2_gdn","name":"guidance","prose":"Malicious code protection mechanisms include, for example, signature definitions. Due to information system integrity and availability concerns, organizations give careful consideration to the methodology used to carry out automatic updates.","links":[{"href":"#si-8","rel":"related"}]},{"id":"si-3.2_obj","name":"objective","prose":"Determine if the information system automatically updates malicious code protection mechanisms."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing malicious code protection\n\nautomated mechanisms supporting centralized management of malicious code protection mechanisms\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for malicious code protection"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing automatic updates to malicious code protection capability"}]}]}]},{"id":"si-4","class":"SP800-53","title":"Information System Monitoring","params":[{"id":"si-4_prm_1","label":"organization-defined monitoring objectives"},{"id":"si-4_prm_2","label":"organization-defined techniques and methods"},{"id":"si-4_prm_3","label":"organization-defined information system monitoring information"},{"id":"si-4_prm_4","label":"organization-defined personnel or roles"},{"id":"si-4_prm_5","select":{"how-many":"one-or-more","choice":["as needed"," {{ insert: param, si-4_prm_6 }} "]}},{"id":"si-4_prm_6","depends-on":"si-4_prm_5","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-4"},{"name":"sort-id","value":"si-04"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"},{"href":"#6d431fee-658f-4a0e-9f2e-a38b5d398fab","rel":"reference"},{"href":"#672fd561-b92b-4713-b9cf-6c9d9456728b","rel":"reference"},{"href":"#d1b1d689-0f66-4474-9924-c81119758dc1","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"}],"parts":[{"id":"si-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Monitors the information system to detect:","parts":[{"id":"si-4_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Attacks and indicators of potential attacks in accordance with {{ insert: param, si-4_prm_1 }}; and"},{"id":"si-4_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Unauthorized local, network, and remote connections;"}]},{"id":"si-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Identifies unauthorized use of the information system through {{ insert: param, si-4_prm_2 }};"},{"id":"si-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Deploys monitoring devices:","parts":[{"id":"si-4_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Strategically within the information system to collect organization-determined essential information; and"},{"id":"si-4_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"At ad hoc locations within the system to track specific types of transactions of interest to the organization;"}]},{"id":"si-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects information obtained from intrusion-monitoring tools from unauthorized access, modification, and deletion;"},{"id":"si-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information;"},{"id":"si-4_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations; and"},{"id":"si-4_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Provides {{ insert: param, si-4_prm_3 }} to {{ insert: param, si-4_prm_4 }} {{ insert: param, si-4_prm_5 }}."}]},{"id":"si-4_gdn","name":"guidance","prose":"Information system monitoring includes external and internal monitoring. External monitoring includes the observation of events occurring at the information system boundary (i.e., part of perimeter defense and boundary protection). Internal monitoring includes the observation of events occurring within the information system. Organizations can monitor information systems, for example, by observing audit activities in real time or by observing other system aspects such as access patterns, characteristics of access, and other actions. The monitoring objectives may guide determination of the events. Information system monitoring capability is achieved through a variety of tools and techniques (e.g., intrusion detection systems, intrusion prevention systems, malicious code protection software, scanning tools, audit record monitoring software, network monitoring software). Strategic locations for monitoring devices include, for example, selected perimeter locations and near server farms supporting critical applications, with such devices typically being employed at the managed interfaces associated with controls SC-7 and AC-17. Einstein network monitoring devices from the Department of Homeland Security can also be included as monitoring devices. The granularity of monitoring information collected is based on organizational monitoring objectives and the capability of information systems to support such objectives. Specific types of transactions of interest include, for example, Hyper Text Transfer Protocol (HTTP) traffic that bypasses HTTP proxies. Information system monitoring is an integral part of organizational continuous monitoring and incident response programs. Output from system monitoring serves as input to continuous monitoring and incident response programs. A network connection is any connection with a device that communicates through a network (e.g., local area network, Internet). A remote connection is any connection with a device communicating through an external network (e.g., the Internet). Local, network, and remote connections can be either wired or wireless.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-8","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-26","rel":"related"},{"href":"#sc-35","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"si-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-4.a_obj","name":"objective","props":[{"name":"label","value":"SI-4(a)"}],"parts":[{"id":"si-4.a.1_obj","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)"}],"parts":[{"id":"si-4.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[1]"}],"prose":"defines monitoring objectives to detect attacks and indicators of potential attacks on the information system;"},{"id":"si-4.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[2]"}],"prose":"monitors the information system to detect, in accordance with organization-defined monitoring objectives,:","parts":[{"id":"si-4.a.1_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[2][a]"}],"prose":"attacks;"},{"id":"si-4.a.1_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[2][b]"}],"prose":"indicators of potential attacks;"}]}]},{"id":"si-4.a.2_obj","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)"}],"prose":"monitors the information system to detect unauthorized:","parts":[{"id":"si-4.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)[1]"}],"prose":"local connections;"},{"id":"si-4.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)[2]"}],"prose":"network connections;"},{"id":"si-4.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)[3]"}],"prose":"remote connections;"}]}]},{"id":"si-4.b_obj","name":"objective","props":[{"name":"label","value":"SI-4(b)"}],"parts":[{"id":"si-4.b.1_obj","name":"objective","props":[{"name":"label","value":"SI-4(b)(1)"}],"prose":"defines techniques and methods to identify unauthorized use of the information system;"},{"id":"si-4.b.2_obj","name":"objective","props":[{"name":"label","value":"SI-4(b)(2)"}],"prose":"identifies unauthorized use of the information system through organization-defined techniques and methods;"}]},{"id":"si-4.c_obj","name":"objective","props":[{"name":"label","value":"SI-4(c)"}],"prose":"deploys monitoring devices:","parts":[{"id":"si-4.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(c)[1]"}],"prose":"strategically within the information system to collect organization-determined essential information;"},{"id":"si-4.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(c)[2]"}],"prose":"at ad hoc locations within the system to track specific types of transactions of interest to the organization;"}]},{"id":"si-4.d_obj","name":"objective","props":[{"name":"label","value":"SI-4(d)"}],"prose":"protects information obtained from intrusion-monitoring tools from unauthorized:","parts":[{"id":"si-4.d_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(d)[1]"}],"prose":"access;"},{"id":"si-4.d_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(d)[2]"}],"prose":"modification;"},{"id":"si-4.d_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(d)[3]"}],"prose":"deletion;"}]},{"id":"si-4.e_obj","name":"objective","props":[{"name":"label","value":"SI-4(e)"}],"prose":"heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information;"},{"id":"si-4.f_obj","name":"objective","props":[{"name":"label","value":"SI-4(f)"}],"prose":"obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations;"},{"id":"si-4.g_obj","name":"objective","props":[{"name":"label","value":"SI-4(g)"}],"parts":[{"id":"si-4.g_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(g)[1]"}],"prose":"defines personnel or roles to whom information system monitoring information is to be provided;"},{"id":"si-4.g_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(g)[2]"}],"prose":"defines information system monitoring information to be provided to organization-defined personnel or roles;"},{"id":"si-4.g_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(g)[3]"}],"prose":"defines a frequency to provide organization-defined information system monitoring to organization-defined personnel or roles;"},{"id":"si-4.g_obj.4","name":"objective","props":[{"name":"label","value":"SI-4(g)[4]"}],"prose":"provides organization-defined information system monitoring information to organization-defined personnel or roles one or more of the following:","parts":[{"id":"si-4.g_obj.4.a","name":"objective","props":[{"name":"label","value":"SI-4(g)[4][a]"}],"prose":"as needed; and\/or"},{"id":"si-4.g_obj.4.b","name":"objective","props":[{"name":"label","value":"SI-4(g)[4][b]"}],"prose":"with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Continuous monitoring strategy\n\nsystem and information integrity policy\n\nprocedures addressing information system monitoring tools and techniques\n\nfacility diagram\/layout\n\ninformation system design documentation\n\ninformation system monitoring tools and techniques documentation\n\nlocations within information system where monitoring devices are deployed\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility monitoring the information system"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for information system monitoring\n\nautomated mechanisms supporting and\/or implementing information system monitoring capability"}]}],"controls":[{"id":"si-4.2","class":"SP800-53-enhancement","title":"Automated Tools for Real-time Analysis","props":[{"name":"label","value":"SI-4(2)"},{"name":"sort-id","value":"si-04.02"}],"parts":[{"id":"si-4.2_smt","name":"statement","prose":"The organization employs automated tools to support near real-time analysis of events."},{"id":"si-4.2_gdn","name":"guidance","prose":"Automated tools include, for example, host-based, network-based, transport-based, or storage-based event monitoring tools or Security Information and Event Management (SIEM) technologies that provide real time analysis of alerts and\/or notifications generated by organizational information systems."},{"id":"si-4.2_obj","name":"objective","prose":"Determine if the organization employs automated tools to support near real-time analysis of events."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing information system monitoring tools and techniques\n\ninformation system design documentation\n\ninformation system monitoring tools and techniques documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for monitoring the information system\n\norganizational personnel with responsibility for incident response\/management"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for near real-time analysis of events\n\norganizational processes for information system monitoring\n\nautomated mechanisms supporting and\/or implementing information system monitoring\n\nautomated mechanisms\/tools supporting and\/or implementing analysis of events"}]}]},{"id":"si-4.4","class":"SP800-53-enhancement","title":"Inbound and Outbound Communications Traffic","params":[{"id":"si-4.4_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"SI-4(4)"},{"name":"sort-id","value":"si-04.04"}],"parts":[{"id":"si-4.4_smt","name":"statement","prose":"The information system monitors inbound and outbound communications traffic {{ insert: param, si-4.4_prm_1 }} for unusual or unauthorized activities or conditions."},{"id":"si-4.4_gdn","name":"guidance","prose":"Unusual\/unauthorized activities or conditions related to information system inbound and outbound communications traffic include, for example, internal traffic that indicates the presence of malicious code within organizational information systems or propagating among system components, the unauthorized exporting of information, or signaling to external information systems. Evidence of malicious code is used to identify potentially compromised information systems or information system components."},{"id":"si-4.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-4.4_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(4)[1]"}],"prose":"defines a frequency to monitor:","parts":[{"id":"si-4.4_obj.1.a","name":"objective","props":[{"name":"label","value":"SI-4(4)[1][a]"}],"prose":"inbound communications traffic for unusual or unauthorized activities or conditions;"},{"id":"si-4.4_obj.1.b","name":"objective","props":[{"name":"label","value":"SI-4(4)[1][b]"}],"prose":"outbound communications traffic for unusual or unauthorized activities or conditions;"}]},{"id":"si-4.4_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(4)[2]"}],"prose":"monitors, with the organization-defined frequency:","parts":[{"id":"si-4.4_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-4(4)[2][a]"}],"prose":"inbound communications traffic for unusual or unauthorized activities or conditions; and"},{"id":"si-4.4_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-4(4)[2][b]"}],"prose":"outbound communications traffic for unusual or unauthorized activities or conditions."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing information system monitoring tools and techniques\n\ninformation system design documentation\n\ninformation system monitoring tools and techniques documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system protocols\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for monitoring the information system\n\norganizational personnel with responsibility for the intrusion detection system"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for intrusion detection\/information system monitoring\n\nautomated mechanisms supporting and\/or implementing intrusion detection capability\/information system monitoring\n\nautomated mechanisms supporting and\/or implementing monitoring of inbound\/outbound communications traffic"}]}]},{"id":"si-4.5","class":"SP800-53-enhancement","title":"System-generated Alerts","params":[{"id":"si-4.5_prm_1","label":"organization-defined personnel or roles"},{"id":"si-4.5_prm_2","label":"organization-defined compromise indicators"}],"props":[{"name":"label","value":"SI-4(5)"},{"name":"sort-id","value":"si-04.05"}],"parts":[{"id":"si-4.5_smt","name":"statement","prose":"The information system alerts {{ insert: param, si-4.5_prm_1 }} when the following indications of compromise or potential compromise occur: {{ insert: param, si-4.5_prm_2 }}."},{"id":"si-4.5_gdn","name":"guidance","prose":"Alerts may be generated from a variety of sources, including, for example, audit records or inputs from malicious code protection mechanisms, intrusion detection or prevention mechanisms, or boundary protection devices such as firewalls, gateways, and routers. Alerts can be transmitted, for example, telephonically, by electronic mail messages, or by text messaging. Organizational personnel on the notification list can include, for example, system administrators, mission\/business owners, system owners, or information system security officers.","links":[{"href":"#au-5","rel":"related"},{"href":"#pe-6","rel":"related"}]},{"id":"si-4.5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-4.5_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(5)[1]"}],"prose":"the organization defines compromise indicators for the information system;"},{"id":"si-4.5_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(5)[2]"}],"prose":"the organization defines personnel or roles to be alerted when indications of compromise or potential compromise occur; and"},{"id":"si-4.5_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(5)[3]"}],"prose":"the information system alerts organization-defined personnel or roles when organization-defined compromise indicators occur."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing information system monitoring tools and techniques\n\ninformation system monitoring tools and techniques documentation\n\ninformation system configuration settings and associated documentation\n\nalerts\/notifications generated based on compromise indicators\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for monitoring the information system\n\norganizational personnel with responsibility for the intrusion detection system"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for intrusion detection\/information system monitoring\n\nautomated mechanisms supporting and\/or implementing intrusion detection\/information system monitoring capability\n\nautomated mechanisms supporting and\/or implementing alerts for compromise indicators"}]}]}]},{"id":"si-5","class":"SP800-53","title":"Security Alerts, Advisories, and Directives","params":[{"id":"si-5_prm_1","label":"organization-defined external organizations"},{"id":"si-5_prm_2","select":{"how-many":"one-or-more","choice":[" {{ insert: param, si-5_prm_3 }} "," {{ insert: param, si-5_prm_4 }} "," {{ insert: param, si-5_prm_5 }} "]}},{"id":"si-5_prm_3","depends-on":"si-5_prm_2","label":"organization-defined personnel or roles"},{"id":"si-5_prm_4","depends-on":"si-5_prm_2","label":"organization-defined elements within the organization"},{"id":"si-5_prm_5","depends-on":"si-5_prm_2","label":"organization-defined external organizations"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-5"},{"name":"sort-id","value":"si-05"}],"links":[{"href":"#bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","rel":"reference"}],"parts":[{"id":"si-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Receives information system security alerts, advisories, and directives from {{ insert: param, si-5_prm_1 }} on an ongoing basis;"},{"id":"si-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Generates internal security alerts, advisories, and directives as deemed necessary;"},{"id":"si-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Disseminates security alerts, advisories, and directives to: {{ insert: param, si-5_prm_2 }}; and"},{"id":"si-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Implements security directives in accordance with established time frames, or notifies the issuing organization of the degree of noncompliance."}]},{"id":"si-5_gdn","name":"guidance","prose":"The United States Computer Emergency Readiness Team (US-CERT) generates security alerts and advisories to maintain situational awareness across the federal government. Security directives are issued by OMB or other designated organizations with the responsibility and authority to issue such directives. Compliance to security directives is essential due to the critical nature of many of these directives and the potential immediate adverse effects on organizational operations and assets, individuals, other organizations, and the Nation should the directives not be implemented in a timely manner. External organizations include, for example, external mission\/business partners, supply chain partners, external service providers, and other peer\/supporting organizations.","links":[{"href":"#si-2","rel":"related"}]},{"id":"si-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-5.a_obj","name":"objective","props":[{"name":"label","value":"SI-5(a)"}],"parts":[{"id":"si-5.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-5(a)[1]"}],"prose":"defines external organizations from whom information system security alerts, advisories and directives are to be received;"},{"id":"si-5.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-5(a)[2]"}],"prose":"receives information system security alerts, advisories, and directives from organization-defined external organizations on an ongoing basis;"}]},{"id":"si-5.b_obj","name":"objective","props":[{"name":"label","value":"SI-5(b)"}],"prose":"generates internal security alerts, advisories, and directives as deemed necessary;"},{"id":"si-5.c_obj","name":"objective","props":[{"name":"label","value":"SI-5(c)"}],"parts":[{"id":"si-5.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-5(c)[1]"}],"prose":"defines personnel or roles to whom security alerts, advisories, and directives are to be provided;"},{"id":"si-5.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-5(c)[2]"}],"prose":"defines elements within the organization to whom security alerts, advisories, and directives are to be provided;"},{"id":"si-5.c_obj.3","name":"objective","props":[{"name":"label","value":"SI-5(c)[3]"}],"prose":"defines external organizations to whom security alerts, advisories, and directives are to be provided;"},{"id":"si-5.c_obj.4","name":"objective","props":[{"name":"label","value":"SI-5(c)[4]"}],"prose":"disseminates security alerts, advisories, and directives to one or more of the following:","parts":[{"id":"si-5.c_obj.4.a","name":"objective","props":[{"name":"label","value":"SI-5(c)[4][a]"}],"prose":"organization-defined personnel or roles;"},{"id":"si-5.c_obj.4.b","name":"objective","props":[{"name":"label","value":"SI-5(c)[4][b]"}],"prose":"organization-defined elements within the organization; and\/or"},{"id":"si-5.c_obj.4.c","name":"objective","props":[{"name":"label","value":"SI-5(c)[4][c]"}],"prose":"organization-defined external organizations; and"}]}]},{"id":"si-5.d_obj","name":"objective","props":[{"name":"label","value":"SI-5(d)"}],"parts":[{"id":"si-5.d_obj.1","name":"objective","props":[{"name":"label","value":"SI-5(d)[1]"}],"prose":"implements security directives in accordance with established time frames; or"},{"id":"si-5.d_obj.2","name":"objective","props":[{"name":"label","value":"SI-5(d)[2]"}],"prose":"notifies the issuing organization of the degree of noncompliance."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing security alerts, advisories, and directives\n\nrecords of security alerts and advisories\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security alert and advisory responsibilities\n\norganizational personnel implementing, operating, maintaining, and using the information system\n\norganizational personnel, organizational elements, and\/or external organizations to whom alerts, advisories, and directives are to be disseminated\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for defining, receiving, generating, disseminating, and complying with security alerts, advisories, and directives\n\nautomated mechanisms supporting and\/or implementing definition, receipt, generation, and dissemination of security alerts, advisories, and directives\n\nautomated mechanisms supporting and\/or implementing security directives"}]}]},{"id":"si-7","class":"SP800-53","title":"Software, Firmware, and Information Integrity","params":[{"id":"si-7_prm_1","label":"organization-defined software, firmware, and information"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-7"},{"name":"sort-id","value":"si-07"}],"links":[{"href":"#6bf8d24a-78dc-4727-a2ac-0e64d71c495c","rel":"reference"},{"href":"#3878cc04-144a-483e-af62-8fe6f4ad6c7a","rel":"reference"}],"parts":[{"id":"si-7_smt","name":"statement","prose":"The organization employs integrity verification tools to detect unauthorized changes to {{ insert: param, si-7_prm_1 }}."},{"id":"si-7_gdn","name":"guidance","prose":"Unauthorized changes to software, firmware, and information can occur due to errors or malicious activity (e.g., tampering). Software includes, for example, operating systems (with key internal components such as kernels, drivers), middleware, and applications. Firmware includes, for example, the Basic Input Output System (BIOS). Information includes metadata such as security attributes associated with information. State-of-the-practice integrity-checking mechanisms (e.g., parity checks, cyclical redundancy checks, cryptographic hashes) and associated tools can automatically monitor the integrity of information systems and hosted applications.","links":[{"href":"#sa-12","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#si-3","rel":"related"}]},{"id":"si-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-7_obj.1","name":"objective","props":[{"name":"label","value":"SI-7[1]"}],"parts":[{"id":"si-7_obj.1.a","name":"objective","props":[{"name":"label","value":"SI-7[1][a]"}],"prose":"defines software requiring integrity verification tools to be employed to detect unauthorized changes;"},{"id":"si-7_obj.1.b","name":"objective","props":[{"name":"label","value":"SI-7[1][b]"}],"prose":"defines firmware requiring integrity verification tools to be employed to detect unauthorized changes;"},{"id":"si-7_obj.1.c","name":"objective","props":[{"name":"label","value":"SI-7[1][c]"}],"prose":"defines information requiring integrity verification tools to be employed to detect unauthorized changes;"}]},{"id":"si-7_obj.2","name":"objective","props":[{"name":"label","value":"SI-7[2]"}],"prose":"employs integrity verification tools to detect unauthorized changes to organization-defined:","parts":[{"id":"si-7_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-7[2][a]"}],"prose":"software;"},{"id":"si-7_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-7[2][b]"}],"prose":"firmware; and"},{"id":"si-7_obj.2.c","name":"objective","props":[{"name":"label","value":"SI-7[2][c]"}],"prose":"information."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing software, firmware, and information integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nintegrity verification tools and associated documentation\n\nrecords generated\/triggered from integrity verification tools regarding unauthorized software, firmware, and information changes\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for software, firmware, and\/or information integrity\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Software, firmware, and information integrity verification tools"}]}],"controls":[{"id":"si-7.1","class":"SP800-53-enhancement","title":"Integrity Checks","params":[{"id":"si-7.1_prm_1","label":"organization-defined software, firmware, and information"},{"id":"si-7.1_prm_2","select":{"how-many":"one-or-more","choice":["at startup","at {{ insert: param, si-7.1_prm_3 }} "," {{ insert: param, si-7.1_prm_4 }} "]}},{"id":"si-7.1_prm_3","depends-on":"si-7.1_prm_2","label":"organization-defined transitional states or security-relevant events"},{"id":"si-7.1_prm_4","depends-on":"si-7.1_prm_2","label":"organization-defined frequency"}],"props":[{"name":"label","value":"SI-7(1)"},{"name":"sort-id","value":"si-07.01"}],"parts":[{"id":"si-7.1_smt","name":"statement","prose":"The information system performs an integrity check of {{ insert: param, si-7.1_prm_1 }} {{ insert: param, si-7.1_prm_2 }}."},{"id":"si-7.1_gdn","name":"guidance","prose":"Security-relevant events include, for example, the identification of a new threat to which organizational information systems are susceptible, and the installation of new hardware, software, or firmware. Transitional states include, for example, system startup, restart, shutdown, and abort."},{"id":"si-7.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-7.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-7(1)[1]"}],"prose":"the organization defines:","parts":[{"id":"si-7.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SI-7(1)[1][a]"}],"prose":"software requiring integrity checks to be performed;"},{"id":"si-7.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SI-7(1)[1][b]"}],"prose":"firmware requiring integrity checks to be performed;"},{"id":"si-7.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SI-7(1)[1][c]"}],"prose":"information requiring integrity checks to be performed;"}]},{"id":"si-7.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-7(1)[2]"}],"prose":"the organization defines transitional states or security-relevant events requiring integrity checks of organization-defined:","parts":[{"id":"si-7.1_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-7(1)[2][a]"}],"prose":"software;"},{"id":"si-7.1_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-7(1)[2][b]"}],"prose":"firmware;"},{"id":"si-7.1_obj.2.c","name":"objective","props":[{"name":"label","value":"SI-7(1)[2][c]"}],"prose":"information;"}]},{"id":"si-7.1_obj.3","name":"objective","props":[{"name":"label","value":"SI-7(1)[3]"}],"prose":"the organization defines a frequency with which to perform an integrity check of organization-defined:","parts":[{"id":"si-7.1_obj.3.a","name":"objective","props":[{"name":"label","value":"SI-7(1)[3][a]"}],"prose":"software;"},{"id":"si-7.1_obj.3.b","name":"objective","props":[{"name":"label","value":"SI-7(1)[3][b]"}],"prose":"firmware;"},{"id":"si-7.1_obj.3.c","name":"objective","props":[{"name":"label","value":"SI-7(1)[3][c]"}],"prose":"information;"}]},{"id":"si-7.1_obj.4","name":"objective","props":[{"name":"label","value":"SI-7(1)[4]"}],"prose":"the information system performs an integrity check of organization-defined software, firmware, and information one or more of the following:","parts":[{"id":"si-7.1_obj.4.a","name":"objective","props":[{"name":"label","value":"SI-7(1)[4][a]"}],"prose":"at startup;"},{"id":"si-7.1_obj.4.b","name":"objective","props":[{"name":"label","value":"SI-7(1)[4][b]"}],"prose":"at organization-defined transitional states or security-relevant events; and\/or"},{"id":"si-7.1_obj.4.c","name":"objective","props":[{"name":"label","value":"SI-7(1)[4][c]"}],"prose":"with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing software, firmware, and information integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nintegrity verification tools and associated documentation\n\nrecords of integrity scans\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for software, firmware, and\/or information integrity\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Software, firmware, and information integrity verification tools"}]}]},{"id":"si-7.7","class":"SP800-53-enhancement","title":"Integration of Detection and Response","params":[{"id":"si-7.7_prm_1","label":"organization-defined security-relevant changes to the information system"}],"props":[{"name":"label","value":"SI-7(7)"},{"name":"sort-id","value":"si-07.07"}],"parts":[{"id":"si-7.7_smt","name":"statement","prose":"The organization incorporates the detection of unauthorized {{ insert: param, si-7.7_prm_1 }} into the organizational incident response capability."},{"id":"si-7.7_gdn","name":"guidance","prose":"This control enhancement helps to ensure that detected events are tracked, monitored, corrected, and available for historical purposes. Maintaining historical records is important both for being able to identify and discern adversary actions over an extended period of time and for possible legal actions. Security-relevant changes include, for example, unauthorized changes to established configuration settings or unauthorized elevation of information system privileges.","links":[{"href":"#ir-4","rel":"related"},{"href":"#ir-5","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"si-7.7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-7.7_obj.1","name":"objective","props":[{"name":"label","value":"SI-7(7)[1]"}],"prose":"defines unauthorized security-relevant changes to the information system; and"},{"id":"si-7.7_obj.2","name":"objective","props":[{"name":"label","value":"SI-7(7)[2]"}],"prose":"incorporates the detection of unauthorized organization-defined security-relevant changes to the information system into the organizational incident response capability."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing software, firmware, and information integrity\n\nprocedures addressing incident response\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nincident response records\n\ninformation audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for software, firmware, and\/or information integrity\n\norganizational personnel with information security responsibilities\n\norganizational personnel with incident response responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incorporating detection of unauthorized security-relevant changes into the incident response capability\n\nsoftware, firmware, and information integrity verification tools\n\nautomated mechanisms supporting and\/or implementing incorporation of detection of unauthorized security-relevant changes into the incident response capability"}]}]}]},{"id":"si-8","class":"SP800-53","title":"Spam Protection","props":[{"name":"priority","value":"P2"},{"name":"label","value":"SI-8"},{"name":"sort-id","value":"si-08"}],"links":[{"href":"#c6e95ca0-5828-420e-b095-00895b72b5e8","rel":"reference"}],"parts":[{"id":"si-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Employs spam protection mechanisms at information system entry and exit points to detect and take action on unsolicited messages; and"},{"id":"si-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Updates spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures."}]},{"id":"si-8_gdn","name":"guidance","prose":"Information system entry and exit points include, for example, firewalls, electronic mail servers, web servers, proxy servers, remote-access servers, workstations, mobile devices, and notebook\/laptop computers. Spam can be transported by different means including, for example, electronic mail, electronic mail attachments, and web accesses. Spam protection mechanisms include, for example, signature definitions.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-3","rel":"related"}]},{"id":"si-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-8.a_obj","name":"objective","props":[{"name":"label","value":"SI-8(a)"}],"prose":"employs spam protection mechanisms:","parts":[{"id":"si-8.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-8(a)[1]"}],"prose":"at information system entry points to detect unsolicited messages;"},{"id":"si-8.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-8(a)[2]"}],"prose":"at information system entry points to take action on unsolicited messages;"},{"id":"si-8.a_obj.3","name":"objective","props":[{"name":"label","value":"SI-8(a)[3]"}],"prose":"at information system exit points to detect unsolicited messages;"},{"id":"si-8.a_obj.4","name":"objective","props":[{"name":"label","value":"SI-8(a)[4]"}],"prose":"at information system exit points to take action on unsolicited messages; and"}]},{"id":"si-8.b_obj","name":"objective","props":[{"name":"label","value":"SI-8(b)"}],"prose":"updates spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nconfiguration management policy and procedures (CM-1)\n\nprocedures addressing spam protection\n\nspam protection mechanisms\n\nrecords of spam protection updates\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for spam protection\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for implementing spam protection\n\nautomated mechanisms supporting and\/or implementing spam protection"}]}],"controls":[{"id":"si-8.1","class":"SP800-53-enhancement","title":"Central Management","props":[{"name":"label","value":"SI-8(1)"},{"name":"sort-id","value":"si-08.01"}],"parts":[{"id":"si-8.1_smt","name":"statement","prose":"The organization centrally manages spam protection mechanisms."},{"id":"si-8.1_gdn","name":"guidance","prose":"Central management is the organization-wide management and implementation of spam protection mechanisms. Central management includes planning, implementing, assessing, authorizing, and monitoring the organization-defined, centrally managed spam protection security controls.","links":[{"href":"#au-3","rel":"related"},{"href":"#si-2","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"si-8.1_obj","name":"objective","prose":"Determine if the organization centrally manages spam protection mechanisms."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing spam protection\n\nspam protection mechanisms\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for spam protection\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for central management of spam protection\n\nautomated mechanisms supporting and\/or implementing central management of spam protection"}]}]},{"id":"si-8.2","class":"SP800-53-enhancement","title":"Automatic Updates","props":[{"name":"label","value":"SI-8(2)"},{"name":"sort-id","value":"si-08.02"}],"parts":[{"id":"si-8.2_smt","name":"statement","prose":"The information system automatically updates spam protection mechanisms."},{"id":"si-8.2_obj","name":"objective","prose":"Determine if the information system automatically updates spam protection mechanisms."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing spam protection\n\nspam protection mechanisms\n\nrecords of spam protection updates\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for spam protection\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for spam protection\n\nautomated mechanisms supporting and\/or implementing automatic updates to spam protection mechanisms"}]}]}]},{"id":"si-10","class":"SP800-53","title":"Information Input Validation","params":[{"id":"si-10_prm_1","label":"organization-defined information inputs"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-10"},{"name":"sort-id","value":"si-10"}],"parts":[{"id":"si-10_smt","name":"statement","prose":"The information system checks the validity of {{ insert: param, si-10_prm_1 }}."},{"id":"si-10_gdn","name":"guidance","prose":"Checking the valid syntax and semantics of information system inputs (e.g., character set, length, numerical range, and acceptable values) verifies that inputs match specified definitions for format and content. Software applications typically follow well-defined protocols that use structured messages (i.e., commands or queries) to communicate between software modules or system components. Structured messages can contain raw or unstructured data interspersed with metadata or control information. If software applications use attacker-supplied inputs to construct structured messages without properly encoding such messages, then the attacker could insert malicious commands or special characters that can cause the data to be interpreted as control information or metadata. Consequently, the module or component that receives the tainted output will perform the wrong operations or otherwise interpret the data incorrectly. Prescreening inputs prior to passing to interpreters prevents the content from being unintentionally interpreted as commands. Input validation helps to ensure accurate and correct inputs and prevent attacks such as cross-site scripting and a variety of injection attacks."},{"id":"si-10_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-10_obj.1","name":"objective","props":[{"name":"label","value":"SI-10[1]"}],"prose":"the organization defines information inputs requiring validity checks; and"},{"id":"si-10_obj.2","name":"objective","props":[{"name":"label","value":"SI-10[2]"}],"prose":"the information system checks the validity of organization-defined information inputs."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\naccess control policy and procedures\n\nseparation of duties policy and procedures\n\nprocedures addressing information input validation\n\ndocumentation for automated tools and applications to verify validity of information\n\nlist of information inputs requiring validity checks\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for information input validation\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing validity checks on information inputs"}]}]},{"id":"si-11","class":"SP800-53","title":"Error Handling","params":[{"id":"si-11_prm_1","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"SI-11"},{"name":"sort-id","value":"si-11"}],"parts":[{"id":"si-11_smt","name":"statement","prose":"The information system:","parts":[{"id":"si-11_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Generates error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries; and"},{"id":"si-11_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reveals error messages only to {{ insert: param, si-11_prm_1 }}."}]},{"id":"si-11_gdn","name":"guidance","prose":"Organizations carefully consider the structure\/content of error messages. The extent to which information systems are able to identify and handle error conditions is guided by organizational policy and operational requirements. Information that could be exploited by adversaries includes, for example, erroneous logon attempts with passwords entered by mistake as the username, mission\/business information that can be derived from (if not stated explicitly by) information recorded, and personal information such as account numbers, social security numbers, and credit card numbers. In addition, error messages may provide a covert channel for transmitting information.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#sc-31","rel":"related"}]},{"id":"si-11_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-11.a_obj","name":"objective","props":[{"name":"label","value":"SI-11(a)"}],"prose":"the information system generates error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries;"},{"id":"si-11.b_obj","name":"objective","props":[{"name":"label","value":"SI-11(b)"}],"parts":[{"id":"si-11.b_obj.1","name":"objective","props":[{"name":"label","value":"SI-11(b)[1]"}],"prose":"the organization defines personnel or roles to whom error messages are to be revealed; and"},{"id":"si-11.b_obj.2","name":"objective","props":[{"name":"label","value":"SI-11(b)[2]"}],"prose":"the information system reveals error messages only to organization-defined personnel or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing information system error handling\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ndocumentation providing structure\/content of error messages\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for information input validation\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for error handling\n\nautomated mechanisms supporting and\/or implementing error handling\n\nautomated mechanisms supporting and\/or implementing management of error messages"}]}]},{"id":"si-12","class":"SP800-53","title":"Information Handling and Retention","props":[{"name":"priority","value":"P2"},{"name":"label","value":"SI-12"},{"name":"sort-id","value":"si-12"}],"parts":[{"id":"si-12_smt","name":"statement","prose":"The organization handles and retains information within the information system and information output from the system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements."},{"id":"si-12_gdn","name":"guidance","prose":"Information handling and retention requirements cover the full life cycle of information, in some cases extending beyond the disposal of information systems. The National Archives and Records Administration provides guidance on records retention.","links":[{"href":"#ac-16","rel":"related"},{"href":"#au-5","rel":"related"},{"href":"#au-11","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"}]},{"id":"si-12_obj","name":"objective","prose":"Determine if the organization, in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements:","parts":[{"id":"si-12_obj.1","name":"objective","props":[{"name":"label","value":"SI-12[1]"}],"prose":"handles information within the information system;"},{"id":"si-12_obj.2","name":"objective","props":[{"name":"label","value":"SI-12[2]"}],"prose":"handles output from the information system;"},{"id":"si-12_obj.3","name":"objective","props":[{"name":"label","value":"SI-12[3]"}],"prose":"retains information within the information system; and"},{"id":"si-12_obj.4","name":"objective","props":[{"name":"label","value":"SI-12[4]"}],"prose":"retains output from the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nfederal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements applicable to information handling and retention\n\nmedia protection policy and procedures\n\nprocedures addressing information system output handling and retention\n\ninformation retention records, other relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for information handling and retention\n\norganizational personnel with information security responsibilities\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for information handling and retention\n\nautomated mechanisms supporting and\/or implementing information handling and retention"}]}]},{"id":"si-16","class":"SP800-53","title":"Memory Protection","params":[{"id":"si-16_prm_1","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-16"},{"name":"sort-id","value":"si-16"}],"parts":[{"id":"si-16_smt","name":"statement","prose":"The information system implements {{ insert: param, si-16_prm_1 }} to protect its memory from unauthorized code execution."},{"id":"si-16_gdn","name":"guidance","prose":"Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory include, for example, data execution prevention and address space layout randomization. Data execution prevention safeguards can either be hardware-enforced or software-enforced with hardware providing the greater strength of mechanism.","links":[{"href":"#ac-25","rel":"related"},{"href":"#sc-3","rel":"related"}]},{"id":"si-16_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-16_obj.1","name":"objective","props":[{"name":"label","value":"SI-16[1]"}],"prose":"the organization defines security safeguards to be implemented to protect information system memory from unauthorized code execution; and"},{"id":"si-16_obj.2","name":"objective","props":[{"name":"label","value":"SI-16[2]"}],"prose":"the information system implements organization-defined security safeguards to protect its memory from unauthorized code execution."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing memory protection for the information system\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of security safeguards protecting information system memory from unauthorized code execution\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for memory protection\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing safeguards to protect information system memory from unauthorized code execution"}]}]}]}],"back-matter":{"resources":[{"uuid":"0c97e60b-325a-4efa-ba2b-90f20ccd5abc","title":"5 C.F.R. 731.106","citation":{"text":"Code of Federal Regulations, Title 5, Administrative Personnel, Section 731.106, Designation of Public Trust Positions and Investigative Requirements (5 C.F.R. 731.106)."},"rlinks":[{"href":"http:\/\/www.gpo.gov\/fdsys\/granule\/CFR-2012-title5-vol2\/CFR-2012-title5-vol2-sec731-106\/content-detail.html"}]},{"uuid":"bb61234b-46c3-4211-8c2b-9869222a720d","title":"C.F.R. Part 5 Subpart C (5 C.F.R. 930.301)","citation":{"text":"C.F.R. Part 5 Subpart C (5 C.F.R. 930.301)"},"rlinks":[{"href":"http:\/\/www.gpo.gov\/fdsys\/granule\/CFR-2009-title5-vol2\/CFR-2009-title5-vol2-sec930-301\/content-detail.html"}]},{"uuid":"a4aa9645-9a8a-4b51-90a9-e223250f9a75","title":"CNSS Policy 15","citation":{"text":"CNSS Policy 15"},"rlinks":[{"href":"https:\/\/www.cnss.gov\/policies.html"}]},{"uuid":"2d8b14e9-c8b5-4d3d-8bdc-155078f3281b","title":"DoD Information Assurance Vulnerability Alerts","citation":{"text":"DoD Information Assurance Vulnerability Alerts"}},{"uuid":"61081e7f-041d-4033-96a7-44a439071683","title":"DoD Instruction 5200.39","citation":{"text":"DoD Instruction 5200.39"},"rlinks":[{"href":"http:\/\/www.dtic.mil\/whs\/directives\/corres\/ins1.html"}]},{"uuid":"e42b2099-3e1c-415b-952c-61c96533c12e","title":"DoD Instruction 8551.01","citation":{"text":"DoD Instruction 8551.01"},"rlinks":[{"href":"http:\/\/www.dtic.mil\/whs\/directives\/corres\/ins1.html"}]},{"uuid":"e6522953-6714-435d-a0d3-140df554c186","title":"DoD Instruction 8552.01","citation":{"text":"DoD Instruction 8552.01"},"rlinks":[{"href":"http:\/\/www.dtic.mil\/whs\/directives\/corres\/ins1.html"}]},{"uuid":"c5034e0c-eba6-4ecd-a541-79f0678f4ba4","title":"Executive Order 13587","citation":{"text":"Executive Order 13587"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/the-press-office\/2011\/10\/07\/executive-order-13587-structural-reforms-improve-security-classified-net"}]},{"uuid":"56d671da-6b7b-4abf-8296-84b61980390a","title":"Federal Acquisition Regulation","citation":{"text":"Federal Acquisition Regulation"},"rlinks":[{"href":"https:\/\/acquisition.gov\/far"}]},{"uuid":"023104bc-6f75-4cd5-b7d0-fc92326f8007","title":"Federal Continuity Directive 1","citation":{"text":"Federal Continuity Directive 1"},"rlinks":[{"href":"http:\/\/www.fema.gov\/pdf\/about\/offices\/fcd1.pdf"}]},{"uuid":"ba557c91-ba3e-4792-adc6-a4ae479b39ff","title":"FICAM Roadmap and Implementation Guidance","citation":{"text":"FICAM Roadmap and Implementation Guidance"},"rlinks":[{"href":"http:\/\/www.idmanagement.gov\/documents\/ficam-roadmap-and-implementation-guidance"}]},{"uuid":"39f9087d-7687-46d2-8eda-b6f4b7a4d8a9","title":"FIPS Publication 140","citation":{"text":"FIPS Publication 140"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html"}]},{"uuid":"d715b234-9b5b-4e07-b1ed-99836727664d","title":"FIPS Publication 140-2","citation":{"text":"FIPS Publication 140-2"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#140-2"}]},{"uuid":"f2dbd4ec-c413-4714-b85b-6b7184d1c195","title":"FIPS Publication 197","citation":{"text":"FIPS Publication 197"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#197"}]},{"uuid":"e85cdb3f-7f0a-4083-8639-f13f70d3760b","title":"FIPS Publication 199","citation":{"text":"FIPS Publication 199"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#199"}]},{"uuid":"c80c10b3-1294-4984-a4cc-d1733ca432b9","title":"FIPS Publication 201","citation":{"text":"FIPS Publication 201"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#201"}]},{"uuid":"ad733a42-a7ed-4774-b988-4930c28852f3","title":"HSPD-12","citation":{"text":"HSPD-12"},"rlinks":[{"href":"http:\/\/www.dhs.gov\/homeland-security-presidential-directive-12"}]},{"uuid":"4ef539ba-b767-4666-b0d3-168c53005fa3","title":"http:\/\/capec.mitre.org","citation":{"text":"http:\/\/capec.mitre.org"},"rlinks":[{"href":"http:\/\/capec.mitre.org"}]},{"uuid":"e95dd121-2733-413e-bf1e-f1eb49f20a98","title":"http:\/\/checklists.nist.gov","citation":{"text":"http:\/\/checklists.nist.gov"},"rlinks":[{"href":"http:\/\/checklists.nist.gov"}]},{"uuid":"6a1041fc-054e-4230-946b-2e6f4f3731bb","title":"http:\/\/csrc.nist.gov\/cryptval","citation":{"text":"http:\/\/csrc.nist.gov\/cryptval"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/cryptval"}]},{"uuid":"b09d1a31-d3c9-4138-a4f4-4c63816afd7d","title":"http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/index.html","citation":{"text":"http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/index.html"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/index.html"}]},{"uuid":"0931209f-00ae-4132-b92c-bc645847e8f9","title":"http:\/\/cve.mitre.org","citation":{"text":"http:\/\/cve.mitre.org"},"rlinks":[{"href":"http:\/\/cve.mitre.org"}]},{"uuid":"15522e92-9192-463d-9646-6a01982db8ca","title":"http:\/\/cwe.mitre.org","citation":{"text":"http:\/\/cwe.mitre.org"},"rlinks":[{"href":"http:\/\/cwe.mitre.org"}]},{"uuid":"5ed1f4d5-1494-421b-97ed-39d3c88ab51f","title":"http:\/\/fips201ep.cio.gov","citation":{"text":"http:\/\/fips201ep.cio.gov"},"rlinks":[{"href":"http:\/\/fips201ep.cio.gov"}]},{"uuid":"85280698-0417-489d-b214-12bb935fb939","title":"http:\/\/idmanagement.gov","citation":{"text":"http:\/\/idmanagement.gov"},"rlinks":[{"href":"http:\/\/idmanagement.gov"}]},{"uuid":"275cc052-0f7f-423c-bdb6-ed503dc36228","title":"http:\/\/nvd.nist.gov","citation":{"text":"http:\/\/nvd.nist.gov"},"rlinks":[{"href":"http:\/\/nvd.nist.gov"}]},{"uuid":"bbd50dd1-54ce-4432-959d-63ea564b1bb4","title":"http:\/\/www.acquisition.gov\/far","citation":{"text":"http:\/\/www.acquisition.gov\/far"},"rlinks":[{"href":"http:\/\/www.acquisition.gov\/far"}]},{"uuid":"9b97ed27-3dd6-4f9a-ade5-1b43e9669794","title":"http:\/\/www.cnss.gov","citation":{"text":"http:\/\/www.cnss.gov"},"rlinks":[{"href":"http:\/\/www.cnss.gov"}]},{"uuid":"3ac12e79-f54f-4a63-9f4b-ee4bcd4df604","title":"http:\/\/www.dhs.gov\/telecommunications-service-priority-tsp","citation":{"text":"http:\/\/www.dhs.gov\/telecommunications-service-priority-tsp"},"rlinks":[{"href":"http:\/\/www.dhs.gov\/telecommunications-service-priority-tsp"}]},{"uuid":"c95a9986-3cd6-4a98-931b-ccfc56cb11e5","title":"http:\/\/www.niap-ccevs.org","citation":{"text":"http:\/\/www.niap-ccevs.org"},"rlinks":[{"href":"http:\/\/www.niap-ccevs.org"}]},{"uuid":"647b6de3-81d0-4d22-bec1-5f1333e34380","title":"http:\/\/www.nsa.gov","citation":{"text":"http:\/\/www.nsa.gov"},"rlinks":[{"href":"http:\/\/www.nsa.gov"}]},{"uuid":"a47466c4-c837-4f06-a39f-e68412a5f73d","title":"http:\/\/www.nsa.gov\/ia\/mitigation_guidance\/media_destruction_guidance\/index.shtml","citation":{"text":"http:\/\/www.nsa.gov\/ia\/mitigation_guidance\/media_destruction_guidance\/index.shtml"},"rlinks":[{"href":"http:\/\/www.nsa.gov\/ia\/mitigation_guidance\/media_destruction_guidance\/index.shtml"}]},{"uuid":"02631467-668b-4233-989b-3dfded2fd184","title":"http:\/\/www.us-cert.gov","citation":{"text":"http:\/\/www.us-cert.gov"},"rlinks":[{"href":"http:\/\/www.us-cert.gov"}]},{"uuid":"6caa237b-531b-43ac-9711-d8f6b97b0377","title":"ICD 704","citation":{"text":"ICD 704"},"rlinks":[{"href":"http:\/\/www.dni.gov\/index.php\/intelligence-community\/ic-policies-reports\/intelligence-community-directives"}]},{"uuid":"398e33fd-f404-4e5c-b90e-2d50d3181244","title":"ICD 705","citation":{"text":"ICD 705"},"rlinks":[{"href":"http:\/\/www.dni.gov\/index.php\/intelligence-community\/ic-policies-reports\/intelligence-community-directives"}]},{"uuid":"1737a687-52fb-4008-b900-cbfa836f7b65","title":"ISO\/IEC 15408","citation":{"text":"ISO\/IEC 15408"},"rlinks":[{"href":"http:\/\/www.iso.org\/iso\/iso_catalog\/catalog_tc\/catalog_detail.htm?csnumber=50341"}]},{"uuid":"fb5844de-ff96-47c0-b258-4f52bcc2f30d","title":"National Communications Systems Directive 3-10","citation":{"text":"National Communications Systems Directive 3-10"}},{"uuid":"654f21e2-f3bc-43b2-abdc-60ab8d09744b","title":"National Strategy for Trusted Identities in Cyberspace","citation":{"text":"National Strategy for Trusted Identities in Cyberspace"},"rlinks":[{"href":"http:\/\/www.nist.gov\/nstic"}]},{"uuid":"9cb3d8fe-2127-48ba-821e-cdd2d7aee921","title":"NIST Special Publication 800-100","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-100"}],"citation":{"text":"NIST Special Publication 800-100"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-100"}]},{"uuid":"3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","title":"NIST Special Publication 800-111","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-111"}],"citation":{"text":"NIST Special Publication 800-111"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-111"}]},{"uuid":"349fe082-502d-464a-aa0c-1443c6a5cf40","title":"NIST Special Publication 800-113","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-113"}],"citation":{"text":"NIST Special Publication 800-113"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-113"}]},{"uuid":"1201fcf3-afb1-4675-915a-fb4ae0435717","title":"NIST Special Publication 800-114 Rev. 1","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-114r1"}],"citation":{"text":"NIST Special Publication 800-114 Rev. 1"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-114r1"}]},{"uuid":"c4691b88-57d1-463b-9053-2d0087913f31","title":"NIST Special Publication 800-115","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-115"}],"citation":{"text":"NIST Special Publication 800-115"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-115"}]},{"uuid":"2157bb7e-192c-4eaa-877f-93ef6b0a3292","title":"NIST Special Publication 800-116 Rev. 1","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-116r1"}],"citation":{"text":"NIST Special Publication 800-116 Rev. 1"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-116r1"}]},{"uuid":"5c201b63-0768-417b-ac22-3f014e3941b2","title":"NIST Special Publication 800-12 Rev. 1","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-12r1"}],"citation":{"text":"NIST Special Publication 800-12 Rev. 1"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-12r1"}]},{"uuid":"d1a4e2a9-e512-4132-8795-5357aba29254","title":"NIST Special Publication 800-121","citation":{"text":"NIST Special Publication 800-121"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-121"}]},{"uuid":"0293a393-fbe8-4ed1-b0b4-f6fbd3ae1589","title":"NIST Special Publication 800-124","citation":{"text":"NIST Special Publication 800-124"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-124"}]},{"uuid":"080f8068-5e3e-435e-9790-d22ba4722693","title":"NIST Special Publication 800-128","citation":{"text":"NIST Special Publication 800-128"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-128"}]},{"uuid":"cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","title":"NIST Special Publication 800-137","citation":{"text":"NIST Special Publication 800-137"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-137"}]},{"uuid":"6bf8d24a-78dc-4727-a2ac-0e64d71c495c","title":"NIST Special Publication 800-147","citation":{"text":"NIST Special Publication 800-147"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-147"}]},{"uuid":"3878cc04-144a-483e-af62-8fe6f4ad6c7a","title":"NIST Special Publication 800-155","citation":{"text":"NIST Special Publication 800-155"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-155"}]},{"uuid":"825438c3-248d-4e30-a51e-246473ce6ada","title":"NIST Special Publication 800-16","citation":{"text":"NIST Special Publication 800-16"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-16"}]},{"uuid":"6513e480-fada-4876-abba-1397084dfb26","title":"NIST Special Publication 800-164","citation":{"text":"NIST Special Publication 800-164"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-164"}]},{"uuid":"9c5c9e8c-dc81-4f55-a11c-d71d7487790f","title":"NIST Special Publication 800-18","citation":{"text":"NIST Special Publication 800-18"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-18"}]},{"uuid":"0a5db899-f033-467f-8631-f5a8ba971475","title":"NIST Special Publication 800-23","citation":{"text":"NIST Special Publication 800-23"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-23"}]},{"uuid":"21b1ed35-56d2-40a8-bdfe-b461fffe322f","title":"NIST Special Publication 800-27","citation":{"text":"NIST Special Publication 800-27"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-27"}]},{"uuid":"e716cd51-d1d5-4c6a-967a-22e9fbbc42f1","title":"NIST Special Publication 800-28","citation":{"text":"NIST Special Publication 800-28"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-28"}]},{"uuid":"a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","title":"NIST Special Publication 800-30","citation":{"text":"NIST Special Publication 800-30"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-30"}]},{"uuid":"8f174e91-844e-4cf1-a72a-45c119a3a8dd","title":"NIST Special Publication 800-32","citation":{"text":"NIST Special Publication 800-32"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-32"}]},{"uuid":"748a81b9-9cad-463f-abde-8b368167e70d","title":"NIST Special Publication 800-34","citation":{"text":"NIST Special Publication 800-34"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-34"}]},{"uuid":"0c775bc3-bfc3-42c7-a382-88949f503171","title":"NIST Special Publication 800-35","citation":{"text":"NIST Special Publication 800-35"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-35"}]},{"uuid":"d818efd3-db31-4953-8afa-9e76afe83ce2","title":"NIST Special Publication 800-36","citation":{"text":"NIST Special Publication 800-36"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-36"}]},{"uuid":"0a0c26b6-fd44-4274-8b36-93442d49d998","title":"NIST Special Publication 800-37","citation":{"text":"NIST Special Publication 800-37"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-37"}]},{"uuid":"d480aa6a-7a88-424e-a10c-ad1c7870354b","title":"NIST Special Publication 800-39","citation":{"text":"NIST Special Publication 800-39"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-39"}]},{"uuid":"bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","title":"NIST Special Publication 800-40","citation":{"text":"NIST Special Publication 800-40"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-40"}]},{"uuid":"756a8e86-57d5-4701-8382-f7a40439665a","title":"NIST Special Publication 800-41","citation":{"text":"NIST Special Publication 800-41"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-41"}]},{"uuid":"c6e95ca0-5828-420e-b095-00895b72b5e8","title":"NIST Special Publication 800-45","citation":{"text":"NIST Special Publication 800-45"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-45"}]},{"uuid":"5309d4d0-46f8-4213-a749-e7584164e5e8","title":"NIST Special Publication 800-46","citation":{"text":"NIST Special Publication 800-46"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-46"}]},{"uuid":"2711f068-734e-4afd-94ba-0b22247fbc88","title":"NIST Special Publication 800-47","citation":{"text":"NIST Special Publication 800-47"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-47"}]},{"uuid":"238ed479-eccb-49f6-82ec-ab74a7a428cf","title":"NIST Special Publication 800-48","citation":{"text":"NIST Special Publication 800-48"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-48"}]},{"uuid":"e12b5738-de74-4fb3-8317-a3995a8a1898","title":"NIST Special Publication 800-50","citation":{"text":"NIST Special Publication 800-50"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-50"}]},{"uuid":"90c5bc98-f9c4-44c9-98b7-787422f0999c","title":"NIST Special Publication 800-52","citation":{"text":"NIST Special Publication 800-52"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-52"}]},{"uuid":"cd4cf751-3312-4a55-b1a9-fad2f1db9119","title":"NIST Special Publication 800-53A","citation":{"text":"NIST Special Publication 800-53A"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-53A"}]},{"uuid":"81f09e01-d0b0-4ae2-aa6a-064ed9950070","title":"NIST Special Publication 800-56","citation":{"text":"NIST Special Publication 800-56"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-56"}]},{"uuid":"a6c774c0-bf50-4590-9841-2a5c1c91ac6f","title":"NIST Special Publication 800-57","citation":{"text":"NIST Special Publication 800-57"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-57"}]},{"uuid":"7783f3e7-09b3-478b-9aa2-4a76dfd0ea90","title":"NIST Special Publication 800-58","citation":{"text":"NIST Special Publication 800-58"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-58"}]},{"uuid":"f152844f-b1ef-4836-8729-6277078ebee1","title":"NIST Special Publication 800-60","citation":{"text":"NIST Special Publication 800-60"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-60"}]},{"uuid":"be95fb85-a53f-4624-bdbb-140075500aa3","title":"NIST Special Publication 800-61","citation":{"text":"NIST Special Publication 800-61"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-61"}]},{"uuid":"644f44a9-a2de-4494-9c04-cd37fba45471","title":"NIST Special Publication 800-63","citation":{"text":"NIST Special Publication 800-63"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-63"}]},{"uuid":"abd950ae-092f-4b7a-b374-1c7c67fe9350","title":"NIST Special Publication 800-64","citation":{"text":"NIST Special Publication 800-64"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-64"}]},{"uuid":"29fcfe59-33cd-494a-8756-5907ae3a8f92","title":"NIST Special Publication 800-65","citation":{"text":"NIST Special Publication 800-65"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-65"}]},{"uuid":"84a37532-6db6-477b-9ea8-f9085ebca0fc","title":"NIST Special Publication 800-70","citation":{"text":"NIST Special Publication 800-70"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-70"}]},{"uuid":"ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","title":"NIST Special Publication 800-73","citation":{"text":"NIST Special Publication 800-73"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-73"}]},{"uuid":"2a71298a-ee90-490e-80ff-48c967173a47","title":"NIST Special Publication 800-76","citation":{"text":"NIST Special Publication 800-76"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-76"}]},{"uuid":"99f331f2-a9f0-46c2-9856-a3cbb9b89442","title":"NIST Special Publication 800-77","citation":{"text":"NIST Special Publication 800-77"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-77"}]},{"uuid":"2042d97b-f7f6-4c74-84f8-981867684659","title":"NIST Special Publication 800-78","citation":{"text":"NIST Special Publication 800-78"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-78"}]},{"uuid":"6af1e841-672c-46c4-b121-96f603d04be3","title":"NIST Special Publication 800-81","citation":{"text":"NIST Special Publication 800-81"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-81"}]},{"uuid":"6d431fee-658f-4a0e-9f2e-a38b5d398fab","title":"NIST Special Publication 800-83","citation":{"text":"NIST Special Publication 800-83"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-83"}]},{"uuid":"0243a05a-e8a3-4d51-9364-4a9d20b0dcdf","title":"NIST Special Publication 800-84","citation":{"text":"NIST Special Publication 800-84"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-84"}]},{"uuid":"263823e0-a971-4b00-959d-315b26278b22","title":"NIST Special Publication 800-88","citation":{"text":"NIST Special Publication 800-88"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-88"}]},{"uuid":"672fd561-b92b-4713-b9cf-6c9d9456728b","title":"NIST Special Publication 800-92","citation":{"text":"NIST Special Publication 800-92"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-92"}]},{"uuid":"d1b1d689-0f66-4474-9924-c81119758dc1","title":"NIST Special Publication 800-94","citation":{"text":"NIST Special Publication 800-94"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-94"}]},{"uuid":"1ebdf782-d95d-4a7b-8ec7-ee860951eced","title":"NIST Special Publication 800-95","citation":{"text":"NIST Special Publication 800-95"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-95"}]},{"uuid":"6f336ecd-f2a0-4c84-9699-0491d81b6e0d","title":"NIST Special Publication 800-97","citation":{"text":"NIST Special Publication 800-97"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-97"}]},{"uuid":"06dff0ea-3848-4945-8d91-e955ee69f05d","title":"NSTISSI No. 7003","citation":{"text":"NSTISSI No. 7003"},"rlinks":[{"href":"http:\/\/www.cnss.gov\/Assets\/pdf\/nstissi_7003.pdf"}]},{"uuid":"9f77f845-e3ea-4ca4-b2c0-aa9eedc214ab","title":"OMB Circular A-130","citation":{"text":"OMB Circular A-130"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/omb\/circulars_a130_a130trans4"}]},{"uuid":"2c5884cd-7b96-425c-862a-99877e1cf909","title":"OMB Memorandum 02-01","citation":{"text":"OMB Memorandum 02-01"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/omb\/memoranda_m02-01"}]},{"uuid":"ff3bfb02-79b2-411f-8735-98dfe5af2ab0","title":"OMB Memorandum 04-04","citation":{"text":"OMB Memorandum 04-04"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy04\/m04-04.pdf"}]},{"uuid":"58ad6f27-af99-429f-86a8-8bb767b014b9","title":"OMB Memorandum 05-24","citation":{"text":"OMB Memorandum 05-24"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2005\/m05-24.pdf"}]},{"uuid":"4da24a96-6cf8-435d-9d1f-c73247cad109","title":"OMB Memorandum 06-16","citation":{"text":"OMB Memorandum 06-16"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2006\/m06-16.pdf"}]},{"uuid":"990268bf-f4a9-4c81-91ae-dc7d3115f4b1","title":"OMB Memorandum 07-11","citation":{"text":"OMB Memorandum 07-11"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2007\/m07-11.pdf"}]},{"uuid":"0b3d8ba9-051f-498d-81ea-97f0f018c612","title":"OMB Memorandum 07-18","citation":{"text":"OMB Memorandum 07-18"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2007\/m07-18.pdf"}]},{"uuid":"0916ef02-3618-411b-a525-565c088849a6","title":"OMB Memorandum 08-22","citation":{"text":"OMB Memorandum 08-22"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2008\/m08-22.pdf"}]},{"uuid":"28115a56-da6b-4d44-b1df-51dd7f048a3e","title":"OMB Memorandum 08-23","citation":{"text":"OMB Memorandum 08-23"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2008\/m08-23.pdf"}]},{"uuid":"599fe9ba-4750-4450-9eeb-b95bd19a5e8f","title":"OMB Memorandum 10-06-2011","citation":{"text":"OMB Memorandum 10-06-2011"}},{"uuid":"74e740a4-c45d-49f3-a86e-eb747c549e01","title":"OMB Memorandum 11-11","citation":{"text":"OMB Memorandum 11-11"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/memoranda\/2011\/m11-11.pdf"}]},{"uuid":"bedb15b7-ec5c-4a68-807f-385125751fcd","title":"OMB Memorandum 11-33","citation":{"text":"OMB Memorandum 11-33"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/memoranda\/2011\/m11-33.pdf"}]},{"uuid":"dd2f5acd-08f1-435a-9837-f8203088dc1a","title":"Personal Identity Verification (PIV) in Enterprise Physical Access Control System (E-PACS)","citation":{"text":"Personal Identity Verification (PIV) in Enterprise Physical Access Control System (E-PACS)"}},{"uuid":"8ade2fbe-e468-4ca8-9a40-54d7f23c32bb","title":"US-CERT Technical Cyber Security Alerts","citation":{"text":"US-CERT Technical Cyber Security Alerts"},"rlinks":[{"href":"http:\/\/www.us-cert.gov\/ncas\/alerts"}]}]}}} \ No newline at end of file +{"catalog":{"uuid":"4f3ed81e-6a9c-4b14-ac07-7d02ec09f643","metadata":{"title":"NIST Special Publication 800-53 Revision 4 MODERATE IMPACT BASELINE","last-modified":"2023-12-05T21:54:48.24154Z","version":"2015-01-22","oscal-version":"1.1.1","props":[{"name":"resolution-tool","value":"OSCAL Profile Resolver XSLT Pipeline OPRXP"}],"links":[{"href":"NIST_SP-800-53_rev4_MODERATE-baseline_profile.xml","rel":"source-profile"}],"roles":[{"id":"creator","title":"Document Creator"},{"id":"contact","title":"Contact"}],"parties":[{"uuid":"29dd471e-7206-4388-857b-47673c04c4c9","type":"organization","name":"Joint Task Force, Transformation Initiative","email-addresses":["sec-cert@nist.gov"],"addresses":[{"addr-lines":["National Institute of Standards and Technology","Attn: Computer Security Division","Information Technology Laboratory","100 Bureau Drive (Mail Stop 8930)"],"city":"Gaithersburg","state":"MD","postal-code":"20899-8930"}]}],"responsible-parties":[{"role-id":"creator","party-uuids":["316876e2-5c7b-4a60-a488-2ed977238f04"]},{"role-id":"contact","party-uuids":["316876e2-5c7b-4a60-a488-2ed977238f04"]}]},"groups":[{"id":"ac","class":"family","title":"Access Control","controls":[{"id":"ac-1","class":"SP800-53","title":"Access Control Policy and Procedures","params":[{"id":"ac-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ac-1_prm_2","label":"organization-defined frequency"},{"id":"ac-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-1"},{"name":"sort-id","value":"ac-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ac-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ac-1_prm_1 }}:","parts":[{"id":"ac-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ac-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the access control policy and associated access controls; and"}]},{"id":"ac-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ac-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Access control policy {{ insert: param, ac-1_prm_2 }}; and"},{"id":"ac-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Access control procedures {{ insert: param, ac-1_prm_3 }}."}]}]},{"id":"ac-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the AC family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ac-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-1.a_obj","name":"objective","props":[{"name":"label","value":"AC-1(a)"}],"parts":[{"id":"ac-1.a.1_obj","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)"}],"parts":[{"id":"ac-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1]"}],"prose":"develops and documents an access control policy that addresses:","parts":[{"id":"ac-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ac-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ac-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ac-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ac-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ac-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ac-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ac-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the access control policy are to be disseminated;"},{"id":"ac-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"AC-1(a)(1)[3]"}],"prose":"disseminates the access control policy to organization-defined personnel or roles;"}]},{"id":"ac-1.a.2_obj","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)"}],"parts":[{"id":"ac-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the access control policy and associated access control controls;"},{"id":"ac-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ac-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"AC-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ac-1.b_obj","name":"objective","props":[{"name":"label","value":"AC-1(b)"}],"parts":[{"id":"ac-1.b.1_obj","name":"objective","props":[{"name":"label","value":"AC-1(b)(1)"}],"parts":[{"id":"ac-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current access control policy;"},{"id":"ac-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(b)(1)[2]"}],"prose":"reviews and updates the current access control policy with the organization-defined frequency;"}]},{"id":"ac-1.b.2_obj","name":"objective","props":[{"name":"label","value":"AC-1(b)(2)"}],"parts":[{"id":"ac-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"AC-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current access control procedures; and"},{"id":"ac-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-1(b)(2)[2]"}],"prose":"reviews and updates the current access control procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access control responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ac-2","class":"SP800-53","title":"Account Management","params":[{"id":"ac-2_prm_1","label":"organization-defined information system account types"},{"id":"ac-2_prm_2","label":"organization-defined personnel or roles"},{"id":"ac-2_prm_3","label":"organization-defined procedures or conditions"},{"id":"ac-2_prm_4","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-2"},{"name":"sort-id","value":"ac-02"}],"parts":[{"id":"ac-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Identifies and selects the following types of information system accounts to support organizational missions\/business functions: {{ insert: param, ac-2_prm_1 }};"},{"id":"ac-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Assigns account managers for information system accounts;"},{"id":"ac-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Establishes conditions for group and role membership;"},{"id":"ac-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Specifies authorized users of the information system, group and role membership, and access authorizations (i.e., privileges) and other attributes (as required) for each account;"},{"id":"ac-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Requires approvals by {{ insert: param, ac-2_prm_2 }} for requests to create information system accounts;"},{"id":"ac-2_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Creates, enables, modifies, disables, and removes information system accounts in accordance with {{ insert: param, ac-2_prm_3 }};"},{"id":"ac-2_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Monitors the use of information system accounts;"},{"id":"ac-2_smt.h","name":"item","props":[{"name":"label","value":"h."}],"prose":"Notifies account managers:","parts":[{"id":"ac-2_smt.h.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"When accounts are no longer required;"},{"id":"ac-2_smt.h.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"When users are terminated or transferred; and"},{"id":"ac-2_smt.h.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"When individual information system usage or need-to-know changes;"}]},{"id":"ac-2_smt.i","name":"item","props":[{"name":"label","value":"i."}],"prose":"Authorizes access to the information system based on:","parts":[{"id":"ac-2_smt.i.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A valid access authorization;"},{"id":"ac-2_smt.i.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Intended system usage; and"},{"id":"ac-2_smt.i.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Other attributes as required by the organization or associated missions\/business functions;"}]},{"id":"ac-2_smt.j","name":"item","props":[{"name":"label","value":"j."}],"prose":"Reviews accounts for compliance with account management requirements {{ insert: param, ac-2_prm_4 }}; and"},{"id":"ac-2_smt.k","name":"item","props":[{"name":"label","value":"k."}],"prose":"Establishes a process for reissuing shared\/group account credentials (if deployed) when individuals are removed from the group."}]},{"id":"ac-2_gdn","name":"guidance","prose":"Information system account types include, for example, individual, shared, group, system, guest\/anonymous, emergency, developer\/manufacturer\/vendor, temporary, and service. Some of the account management requirements listed above can be implemented by organizational information systems. The identification of authorized users of the information system and the specification of access privileges reflects the requirements in other security controls in the security plan. Users requiring administrative privileges on information system accounts receive additional scrutiny by appropriate organizational personnel (e.g., system owner, mission\/business owner, or chief information security officer) responsible for approving such accounts and privileged access. Organizations may choose to define access privileges or other attributes by account, by type of account, or a combination of both. Other attributes required for authorizing access include, for example, restrictions on time-of-day, day-of-week, and point-of-origin. In defining other account attributes, organizations consider system-related requirements (e.g., scheduled maintenance, system upgrades) and mission\/business requirements, (e.g., time zone differences, customer requirements, remote access to support travel requirements). Failure to consider these factors could affect information system availability. Temporary and emergency accounts are accounts intended for short-term use. Organizations establish temporary accounts as a part of normal account activation procedures when there is a need for short-term accounts without the demand for immediacy in account activation. Organizations establish emergency accounts in response to crisis situations and with the need for rapid account activation. Therefore, emergency account activation may bypass normal account authorization processes. Emergency and temporary accounts are not to be confused with infrequently used accounts (e.g., local logon accounts used for special tasks defined by organizations or when network resources are unavailable). Such accounts remain available and are not subject to automatic disabling or removal dates. Conditions for disabling or deactivating accounts include, for example: (i) when shared\/group, emergency, or temporary accounts are no longer required; or (ii) when individuals are transferred or terminated. Some types of information system accounts may require specialized training.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-5","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-10","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ma-3","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"ac-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-2.a_obj","name":"objective","props":[{"name":"label","value":"AC-2(a)"}],"parts":[{"id":"ac-2.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(a)[1]"}],"prose":"defines information system account types to be identified and selected to support organizational missions\/business functions;"},{"id":"ac-2.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(a)[2]"}],"prose":"identifies and selects organization-defined information system account types to support organizational missions\/business functions;"}]},{"id":"ac-2.b_obj","name":"objective","props":[{"name":"label","value":"AC-2(b)"}],"prose":"assigns account managers for information system accounts;"},{"id":"ac-2.c_obj","name":"objective","props":[{"name":"label","value":"AC-2(c)"}],"prose":"establishes conditions for group and role membership;"},{"id":"ac-2.d_obj","name":"objective","props":[{"name":"label","value":"AC-2(d)"}],"prose":"specifies for each account (as required):","parts":[{"id":"ac-2.d_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(d)[1]"}],"prose":"authorized users of the information system;"},{"id":"ac-2.d_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(d)[2]"}],"prose":"group and role membership;"},{"id":"ac-2.d_obj.3","name":"objective","props":[{"name":"label","value":"AC-2(d)[3]"}],"prose":"access authorizations (i.e., privileges);"},{"id":"ac-2.d_obj.4","name":"objective","props":[{"name":"label","value":"AC-2(d)[4]"}],"prose":"other attributes;"}]},{"id":"ac-2.e_obj","name":"objective","props":[{"name":"label","value":"AC-2(e)"}],"parts":[{"id":"ac-2.e_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(e)[1]"}],"prose":"defines personnel or roles required to approve requests to create information system accounts;"},{"id":"ac-2.e_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(e)[2]"}],"prose":"requires approvals by organization-defined personnel or roles for requests to create information system accounts;"}]},{"id":"ac-2.f_obj","name":"objective","props":[{"name":"label","value":"AC-2(f)"}],"parts":[{"id":"ac-2.f_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(f)[1]"}],"prose":"defines procedures or conditions to:","parts":[{"id":"ac-2.f_obj.1.a","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][a]"}],"prose":"create information system accounts;"},{"id":"ac-2.f_obj.1.b","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][b]"}],"prose":"enable information system accounts;"},{"id":"ac-2.f_obj.1.c","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][c]"}],"prose":"modify information system accounts;"},{"id":"ac-2.f_obj.1.d","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][d]"}],"prose":"disable information system accounts;"},{"id":"ac-2.f_obj.1.e","name":"objective","props":[{"name":"label","value":"AC-2(f)[1][e]"}],"prose":"remove information system accounts;"}]},{"id":"ac-2.f_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(f)[2]"}],"prose":"in accordance with organization-defined procedures or conditions:","parts":[{"id":"ac-2.f_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][a]"}],"prose":"creates information system accounts;"},{"id":"ac-2.f_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][b]"}],"prose":"enables information system accounts;"},{"id":"ac-2.f_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][c]"}],"prose":"modifies information system accounts;"},{"id":"ac-2.f_obj.2.d","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][d]"}],"prose":"disables information system accounts;"},{"id":"ac-2.f_obj.2.e","name":"objective","props":[{"name":"label","value":"AC-2(f)[2][e]"}],"prose":"removes information system accounts;"}]}]},{"id":"ac-2.g_obj","name":"objective","props":[{"name":"label","value":"AC-2(g)"}],"prose":"monitors the use of information system accounts;"},{"id":"ac-2.h_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)"}],"prose":"notifies account managers:","parts":[{"id":"ac-2.h.1_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)(1)"}],"prose":"when accounts are no longer required;"},{"id":"ac-2.h.2_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)(2)"}],"prose":"when users are terminated or transferred;"},{"id":"ac-2.h.3_obj","name":"objective","props":[{"name":"label","value":"AC-2(h)(3)"}],"prose":"when individual information system usage or need to know changes;"}]},{"id":"ac-2.i_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)"}],"prose":"authorizes access to the information system based on;","parts":[{"id":"ac-2.i.1_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)(1)"}],"prose":"a valid access authorization;"},{"id":"ac-2.i.2_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)(2)"}],"prose":"intended system usage;"},{"id":"ac-2.i.3_obj","name":"objective","props":[{"name":"label","value":"AC-2(i)(3)"}],"prose":"other attributes as required by the organization or associated missions\/business functions;"}]},{"id":"ac-2.j_obj","name":"objective","props":[{"name":"label","value":"AC-2(j)"}],"parts":[{"id":"ac-2.j_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(j)[1]"}],"prose":"defines the frequency to review accounts for compliance with account management requirements;"},{"id":"ac-2.j_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(j)[2]"}],"prose":"reviews accounts for compliance with account management requirements with the organization-defined frequency; and"}]},{"id":"ac-2.k_obj","name":"objective","props":[{"name":"label","value":"AC-2(k)"}],"prose":"establishes a process for reissuing shared\/group account credentials (if deployed) when individuals are removed from the group."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of active system accounts along with the name of the individual associated with each account\n\nlist of conditions for group and role membership\n\nnotifications or records of recently transferred, separated, or terminated employees\n\nlist of recently disabled information system accounts along with the name of the individual associated with each account\n\naccess authorization records\n\naccount management compliance reviews\n\ninformation system monitoring records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes account management on the information system\n\nautomated mechanisms for implementing account management"}]}],"controls":[{"id":"ac-2.1","class":"SP800-53-enhancement","title":"Automated System Account Management","props":[{"name":"label","value":"AC-2(1)"},{"name":"sort-id","value":"ac-02.01"}],"parts":[{"id":"ac-2.1_smt","name":"statement","prose":"The organization employs automated mechanisms to support the management of information system accounts."},{"id":"ac-2.1_gdn","name":"guidance","prose":"The use of automated mechanisms can include, for example: using email or text messaging to automatically notify account managers when users are terminated or transferred; using the information system to monitor account usage; and using telephonic notification to report atypical system account usage."},{"id":"ac-2.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to support the management of information system accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]},{"id":"ac-2.2","class":"SP800-53-enhancement","title":"Removal of Temporary \/ Emergency Accounts","params":[{"id":"ac-2.2_prm_1","select":{"choice":["removes","disables"]}},{"id":"ac-2.2_prm_2","label":"organization-defined time period for each type of account"}],"props":[{"name":"label","value":"AC-2(2)"},{"name":"sort-id","value":"ac-02.02"}],"parts":[{"id":"ac-2.2_smt","name":"statement","prose":"The information system automatically {{ insert: param, ac-2.2_prm_1 }} temporary and emergency accounts after {{ insert: param, ac-2.2_prm_2 }}."},{"id":"ac-2.2_gdn","name":"guidance","prose":"This control enhancement requires the removal of both temporary and emergency accounts automatically after a predefined period of time has elapsed, rather than at the convenience of the systems administrator."},{"id":"ac-2.2_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-2.2_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(2)[1]"}],"prose":"the organization defines the time period after which the information system automatically removes or disables temporary and emergency accounts; and"},{"id":"ac-2.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(2)[2]"}],"prose":"the information system automatically removes or disables temporary and emergency accounts after the organization-defined time period for each type of account."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system-generated list of temporary accounts removed and\/or disabled\n\ninformation system-generated list of emergency accounts removed and\/or disabled\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]},{"id":"ac-2.3","class":"SP800-53-enhancement","title":"Disable Inactive Accounts","params":[{"id":"ac-2.3_prm_1","label":"organization-defined time period"}],"props":[{"name":"label","value":"AC-2(3)"},{"name":"sort-id","value":"ac-02.03"}],"parts":[{"id":"ac-2.3_smt","name":"statement","prose":"The information system automatically disables inactive accounts after {{ insert: param, ac-2.3_prm_1 }}."},{"id":"ac-2.3_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-2.3_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(3)[1]"}],"prose":"the organization defines the time period after which the information system automatically disables inactive accounts; and"},{"id":"ac-2.3_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(3)[2]"}],"prose":"the information system automatically disables inactive accounts after the organization-defined time period."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system-generated list of temporary accounts removed and\/or disabled\n\ninformation system-generated list of emergency accounts removed and\/or disabled\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]},{"id":"ac-2.4","class":"SP800-53-enhancement","title":"Automated Audit Actions","params":[{"id":"ac-2.4_prm_1","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"AC-2(4)"},{"name":"sort-id","value":"ac-02.04"}],"parts":[{"id":"ac-2.4_smt","name":"statement","prose":"The information system automatically audits account creation, modification, enabling, disabling, and removal actions, and notifies {{ insert: param, ac-2.4_prm_1 }}."},{"id":"ac-2.4_gdn","name":"guidance","links":[{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"}]},{"id":"ac-2.4_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-2.4_obj.1","name":"objective","props":[{"name":"label","value":"AC-2(4)[1]"}],"prose":"the information system automatically audits the following account actions:","parts":[{"id":"ac-2.4_obj.1.a","name":"objective","props":[{"name":"label","value":"AC-2(4)[1][a]"}],"prose":"creation;"},{"id":"ac-2.4_obj.1.b","name":"objective","props":[{"name":"label","value":"AC-2(4)[1][b]"}],"prose":"modification;"},{"id":"ac-2.4_obj.1.c","name":"objective","props":[{"name":"label","value":"AC-2(4)[1][c]"}],"prose":"enabling;"},{"id":"ac-2.4_obj.1.d","name":"objective","props":[{"name":"label","value":"AC-2(4)[1][d]"}],"prose":"disabling;"},{"id":"ac-2.4_obj.1.e","name":"objective","props":[{"name":"label","value":"AC-2(4)[1][e]"}],"prose":"removal;"}]},{"id":"ac-2.4_obj.2","name":"objective","props":[{"name":"label","value":"AC-2(4)[2]"}],"prose":"the organization defines personnel or roles to be notified of the following account actions:","parts":[{"id":"ac-2.4_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-2(4)[2][a]"}],"prose":"creation;"},{"id":"ac-2.4_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-2(4)[2][b]"}],"prose":"modification;"},{"id":"ac-2.4_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-2(4)[2][c]"}],"prose":"enabling;"},{"id":"ac-2.4_obj.2.d","name":"objective","props":[{"name":"label","value":"AC-2(4)[2][d]"}],"prose":"disabling;"},{"id":"ac-2.4_obj.2.e","name":"objective","props":[{"name":"label","value":"AC-2(4)[2][e]"}],"prose":"removal;"}]},{"id":"ac-2.4_obj.3","name":"objective","props":[{"name":"label","value":"AC-2(4)[3]"}],"prose":"the information system notifies organization-defined personnel or roles of the following account actions:","parts":[{"id":"ac-2.4_obj.3.a","name":"objective","props":[{"name":"label","value":"AC-2(4)[3][a]"}],"prose":"creation;"},{"id":"ac-2.4_obj.3.b","name":"objective","props":[{"name":"label","value":"AC-2(4)[3][b]"}],"prose":"modification;"},{"id":"ac-2.4_obj.3.c","name":"objective","props":[{"name":"label","value":"AC-2(4)[3][c]"}],"prose":"enabling;"},{"id":"ac-2.4_obj.3.d","name":"objective","props":[{"name":"label","value":"AC-2(4)[3][d]"}],"prose":"disabling; and"},{"id":"ac-2.4_obj.3.e","name":"objective","props":[{"name":"label","value":"AC-2(4)[3][e]"}],"prose":"removal."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing account management\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nnotifications\/alerts of account creation, modification, enabling, disabling, and removal actions\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing account management functions"}]}]}]},{"id":"ac-3","class":"SP800-53","title":"Access Enforcement","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-3"},{"name":"sort-id","value":"ac-03"}],"parts":[{"id":"ac-3_smt","name":"statement","prose":"The information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies."},{"id":"ac-3_gdn","name":"guidance","prose":"Access control policies (e.g., identity-based policies, role-based policies, control matrices, cryptography) control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (e.g., devices, files, records, domains) in information systems. In addition to enforcing authorized access at the information system level and recognizing that information systems can host many applications and services in support of organizational missions and business operations, access enforcement mechanisms can also be employed at the application and service level to provide increased information security.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-5","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-16","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ac-21","rel":"related"},{"href":"#ac-22","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ma-3","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#pe-3","rel":"related"}]},{"id":"ac-3_obj","name":"objective","prose":"Determine if the information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing access enforcement\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of approved authorizations (user privileges)\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access enforcement responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing access control policy"}]}]},{"id":"ac-4","class":"SP800-53","title":"Information Flow Enforcement","params":[{"id":"ac-4_prm_1","label":"organization-defined information flow control policies"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-4"},{"name":"sort-id","value":"ac-04"}],"parts":[{"id":"ac-4_smt","name":"statement","prose":"The information system enforces approved authorizations for controlling the flow of information within the system and between interconnected systems based on {{ insert: param, ac-4_prm_1 }}."},{"id":"ac-4_gdn","name":"guidance","prose":"Information flow control regulates where information is allowed to travel within an information system and between information systems (as opposed to who is allowed to access the information) and without explicit regard to subsequent accesses to that information. Flow control restrictions include, for example, keeping export-controlled information from being transmitted in the clear to the Internet, blocking outside traffic that claims to be from within the organization, restricting web requests to the Internet that are not from the internal web proxy server, and limiting information transfers between organizations based on data structures and content. Transferring information between information systems representing different security domains with different security policies introduces risk that such transfers violate one or more domain security policies. In such situations, information owners\/stewards provide guidance at designated policy enforcement points between interconnected systems. Organizations consider mandating specific architectural solutions when required to enforce specific security policies. Enforcement includes, for example: (i) prohibiting information transfers between interconnected systems (i.e., allowing access only); (ii) employing hardware mechanisms to enforce one-way information flows; and (iii) implementing trustworthy regrading mechanisms to reassign security attributes and security labels. Organizations commonly employ information flow control policies and enforcement mechanisms to control the flow of information between designated sources and destinations (e.g., networks, individuals, and devices) within information systems and between interconnected systems. Flow control is based on the characteristics of the information and\/or the information path. Enforcement occurs, for example, in boundary protection devices (e.g., gateways, routers, guards, encrypted tunnels, firewalls) that employ rule sets or establish configuration settings that restrict information system services, provide a packet-filtering capability based on header information, or message-filtering capability based on message content (e.g., implementing key word searches or using document characteristics). Organizations also consider the trustworthiness of filtering\/inspection mechanisms (i.e., hardware, firmware, and software components) that are critical to information flow enforcement. Control enhancements 3 through 22 primarily address cross-domain solution needs which focus on more advanced filtering techniques, in-depth analysis, and stronger flow enforcement mechanisms implemented in cross-domain products, for example, high-assurance guards. Such capabilities are generally not available in commercial off-the-shelf information technology products.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-21","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sc-2","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-18","rel":"related"}]},{"id":"ac-4_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-4_obj.1","name":"objective","props":[{"name":"label","value":"AC-4[1]"}],"prose":"the organization defines information flow control policies to control the flow of information within the system and between interconnected systems; and"},{"id":"ac-4_obj.2","name":"objective","props":[{"name":"label","value":"AC-4[2]"}],"prose":"the information system enforces approved authorizations for controlling the flow of information within the system and between interconnected systems based on organization-defined information flow control policies."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\ninformation flow control policies\n\nprocedures addressing information flow enforcement\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system baseline configuration\n\nlist of information flow authorizations\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information flow enforcement policy"}]}]},{"id":"ac-5","class":"SP800-53","title":"Separation of Duties","params":[{"id":"ac-5_prm_1","label":"organization-defined duties of individuals"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-5"},{"name":"sort-id","value":"ac-05"}],"parts":[{"id":"ac-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Separates {{ insert: param, ac-5_prm_1 }};"},{"id":"ac-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents separation of duties of individuals; and"},{"id":"ac-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Defines information system access authorizations to support separation of duties."}]},{"id":"ac-5_gdn","name":"guidance","prose":"Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes, for example: (i) dividing mission functions and information system support functions among different individuals and\/or roles; (ii) conducting information system support functions with different individuals (e.g., system management, programming, configuration management, quality assurance and testing, and network security); and (iii) ensuring security personnel administering access control functions do not also administer audit functions.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#ps-2","rel":"related"}]},{"id":"ac-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-5.a_obj","name":"objective","props":[{"name":"label","value":"AC-5(a)"}],"parts":[{"id":"ac-5.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-5(a)[1]"}],"prose":"defines duties of individuals to be separated;"},{"id":"ac-5.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-5(a)[2]"}],"prose":"separates organization-defined duties of individuals;"}]},{"id":"ac-5.b_obj","name":"objective","props":[{"name":"label","value":"AC-5(b)"}],"prose":"documents separation of duties; and"},{"id":"ac-5.c_obj","name":"objective","props":[{"name":"label","value":"AC-5(c)"}],"prose":"defines information system access authorizations to support separation of duties."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing divisions of responsibility and separation of duties\n\ninformation system configuration settings and associated documentation\n\nlist of divisions of responsibility and separation of duties\n\ninformation system access authorizations\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining appropriate divisions of responsibility and separation of duties\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing separation of duties policy"}]}]},{"id":"ac-6","class":"SP800-53","title":"Least Privilege","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-6"},{"name":"sort-id","value":"ac-06"}],"parts":[{"id":"ac-6_smt","name":"statement","prose":"The organization employs the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions."},{"id":"ac-6_gdn","name":"guidance","prose":"Organizations employ least privilege for specific duties and information systems. The principle of least privilege is also applied to information system processes, ensuring that the processes operate at privilege levels no higher than necessary to accomplish required organizational missions\/business functions. Organizations consider the creation of additional processes, roles, and information system accounts as necessary, to achieve least privilege. Organizations also apply least privilege to the development, implementation, and operation of organizational information systems.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#pl-2","rel":"related"}]},{"id":"ac-6_obj","name":"objective","prose":"Determine if the organization employs the principle of least privilege, allowing only authorized access for users (and processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\nlist of assigned access authorizations (user privileges)\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions"}]}],"controls":[{"id":"ac-6.1","class":"SP800-53-enhancement","title":"Authorize Access to Security Functions","params":[{"id":"ac-6.1_prm_1","label":"organization-defined security functions (deployed in hardware, software, and firmware) and security-relevant information"}],"props":[{"name":"label","value":"AC-6(1)"},{"name":"sort-id","value":"ac-06.01"}],"parts":[{"id":"ac-6.1_smt","name":"statement","prose":"The organization explicitly authorizes access to {{ insert: param, ac-6.1_prm_1 }}."},{"id":"ac-6.1_gdn","name":"guidance","prose":"Security functions include, for example, establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters. Security-relevant information includes, for example, filtering rules for routers\/firewalls, cryptographic key management information, configuration parameters for security services, and access control lists. Explicitly authorized personnel include, for example, security administrators, system and network administrators, system security officers, system maintenance personnel, system programmers, and other privileged users.","links":[{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"}]},{"id":"ac-6.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-6.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-6(1)[1]"}],"prose":"defines security-relevant information for which access must be explicitly authorized;"},{"id":"ac-6.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-6(1)[2]"}],"prose":"defines security functions deployed in:","parts":[{"id":"ac-6.1_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-6(1)[2][a]"}],"prose":"hardware;"},{"id":"ac-6.1_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-6(1)[2][b]"}],"prose":"software;"},{"id":"ac-6.1_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-6(1)[2][c]"}],"prose":"firmware;"}]},{"id":"ac-6.1_obj.3","name":"objective","props":[{"name":"label","value":"AC-6(1)[3]"}],"prose":"explicitly authorizes access to:","parts":[{"id":"ac-6.1_obj.3.a","name":"objective","props":[{"name":"label","value":"AC-6(1)[3][a]"}],"prose":"organization-defined security functions; and"},{"id":"ac-6.1_obj.3.b","name":"objective","props":[{"name":"label","value":"AC-6(1)[3][b]"}],"prose":"security-relevant information."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\nlist of security functions (deployed in hardware, software, and firmware) and security-relevant information for which access must be explicitly authorized\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions"}]}]},{"id":"ac-6.2","class":"SP800-53-enhancement","title":"Non-privileged Access for Nonsecurity Functions","params":[{"id":"ac-6.2_prm_1","label":"organization-defined security functions or security-relevant information"}],"props":[{"name":"label","value":"AC-6(2)"},{"name":"sort-id","value":"ac-06.02"}],"parts":[{"id":"ac-6.2_smt","name":"statement","prose":"The organization requires that users of information system accounts, or roles, with access to {{ insert: param, ac-6.2_prm_1 }}, use non-privileged accounts or roles, when accessing nonsecurity functions."},{"id":"ac-6.2_gdn","name":"guidance","prose":"This control enhancement limits exposure when operating from within privileged accounts or roles. The inclusion of roles addresses situations where organizations implement access control policies such as role-based access control and where a change of role provides the same degree of assurance in the change of access authorizations for both the user and all processes acting on behalf of the user as would be provided by a change between a privileged and non-privileged account.","links":[{"href":"#pl-4","rel":"related"}]},{"id":"ac-6.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-6.2_obj.1","name":"objective","props":[{"name":"label","value":"AC-6(2)[1]"}],"prose":"defines security functions or security-relevant information to which users of information system accounts, or roles, have access; and"},{"id":"ac-6.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-6(2)[2]"}],"prose":"requires that users of information system accounts, or roles, with access to organization-defined security functions or security-relevant information, use non-privileged accounts, or roles, when accessing nonsecurity functions."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\nlist of system-generated security functions or security-relevant information assigned to information system accounts or roles\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions"}]}]},{"id":"ac-6.5","class":"SP800-53-enhancement","title":"Privileged Accounts","params":[{"id":"ac-6.5_prm_1","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"AC-6(5)"},{"name":"sort-id","value":"ac-06.05"}],"parts":[{"id":"ac-6.5_smt","name":"statement","prose":"The organization restricts privileged accounts on the information system to {{ insert: param, ac-6.5_prm_1 }}."},{"id":"ac-6.5_gdn","name":"guidance","prose":"Privileged accounts, including super user accounts, are typically described as system administrator for various types of commercial off-the-shelf operating systems. Restricting privileged accounts to specific personnel or roles prevents day-to-day users from having access to privileged information\/functions. Organizations may differentiate in the application of this control enhancement between allowed privileges for local accounts and for domain accounts provided organizations retain the ability to control information system configurations for key security parameters and as otherwise necessary to sufficiently mitigate risk.","links":[{"href":"#cm-6","rel":"related"}]},{"id":"ac-6.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-6.5_obj.1","name":"objective","props":[{"name":"label","value":"AC-6(5)[1]"}],"prose":"defines personnel or roles for which privileged accounts on the information system are to be restricted; and"},{"id":"ac-6.5_obj.2","name":"objective","props":[{"name":"label","value":"AC-6(5)[2]"}],"prose":"restricts privileged accounts on the information system to organization-defined personnel or roles."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\nlist of system-generated privileged accounts\n\nlist of system administration personnel\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions"}]}]},{"id":"ac-6.9","class":"SP800-53-enhancement","title":"Auditing Use of Privileged Functions","props":[{"name":"label","value":"AC-6(9)"},{"name":"sort-id","value":"ac-06.09"}],"parts":[{"id":"ac-6.9_smt","name":"statement","prose":"The information system audits the execution of privileged functions."},{"id":"ac-6.9_gdn","name":"guidance","prose":"Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and ongoing concern and can have significant adverse impacts on organizations. Auditing the use of privileged functions is one way to detect such misuse, and in doing so, help mitigate the risk from insider threats and the advanced persistent threat (APT).","links":[{"href":"#au-2","rel":"related"}]},{"id":"ac-6.9_obj","name":"objective","prose":"Determine if the information system audits the execution of privileged functions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of privileged functions to be audited\n\nlist of audited events\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for reviewing least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms auditing the execution of least privilege functions"}]}]},{"id":"ac-6.10","class":"SP800-53-enhancement","title":"Prohibit Non-privileged Users from Executing Privileged Functions","props":[{"name":"label","value":"AC-6(10)"},{"name":"sort-id","value":"ac-06.10"}],"parts":[{"id":"ac-6.10_smt","name":"statement","prose":"The information system prevents non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards\/countermeasures."},{"id":"ac-6.10_gdn","name":"guidance","prose":"Privileged functions include, for example, establishing information system accounts, performing system integrity checks, or administering cryptographic key management activities. Non-privileged users are individuals that do not possess appropriate authorizations. Circumventing intrusion detection and prevention mechanisms or malicious code protection mechanisms are examples of privileged functions that require protection from non-privileged users."},{"id":"ac-6.10_obj","name":"objective","prose":"Determine if the information system prevents non-privileged users from executing privileged functions to include:","parts":[{"id":"ac-6.10_obj.1","name":"objective","props":[{"name":"label","value":"AC-6(10)[1]"}],"prose":"disabling implemented security safeguards\/countermeasures;"},{"id":"ac-6.10_obj.2","name":"objective","props":[{"name":"label","value":"AC-6(10)[2]"}],"prose":"circumventing security safeguards\/countermeasures; or"},{"id":"ac-6.10_obj.3","name":"objective","props":[{"name":"label","value":"AC-6(10)[3]"}],"prose":"altering implemented security safeguards\/countermeasures."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing least privilege\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of privileged functions and associated user account assignments\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining least privileges necessary to accomplish specified tasks\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing least privilege functions for non-privileged users"}]}]}]},{"id":"ac-7","class":"SP800-53","title":"Unsuccessful Logon Attempts","params":[{"id":"ac-7_prm_1","label":"organization-defined number"},{"id":"ac-7_prm_2","label":"organization-defined time period"},{"id":"ac-7_prm_3","select":{"choice":["locks the account\/node for an {{ insert: param, ac-7_prm_4 }} ","locks the account\/node until released by an administrator","delays next logon prompt according to {{ insert: param, ac-7_prm_5 }} "]}},{"id":"ac-7_prm_4","depends-on":"ac-7_prm_3","label":"organization-defined time period"},{"id":"ac-7_prm_5","depends-on":"ac-7_prm_3","label":"organization-defined delay algorithm"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"AC-7"},{"name":"sort-id","value":"ac-07"}],"parts":[{"id":"ac-7_smt","name":"statement","prose":"The information system:","parts":[{"id":"ac-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Enforces a limit of {{ insert: param, ac-7_prm_1 }} consecutive invalid logon attempts by a user during a {{ insert: param, ac-7_prm_2 }}; and"},{"id":"ac-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Automatically {{ insert: param, ac-7_prm_3 }} when the maximum number of unsuccessful attempts is exceeded."}]},{"id":"ac-7_gdn","name":"guidance","prose":"This control applies regardless of whether the logon occurs via a local or network connection. Due to the potential for denial of service, automatic lockouts initiated by information systems are usually temporary and automatically release after a predetermined time period established by organizations. If a delay algorithm is selected, organizations may choose to employ different algorithms for different information system components based on the capabilities of those components. Responses to unsuccessful logon attempts may be implemented at both the operating system and the application levels.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-9","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ia-5","rel":"related"}]},{"id":"ac-7_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-7.a_obj","name":"objective","props":[{"name":"label","value":"AC-7(a)"}],"parts":[{"id":"ac-7.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-7(a)[1]"}],"prose":"the organization defines the number of consecutive invalid logon attempts allowed to the information system by a user during an organization-defined time period;"},{"id":"ac-7.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-7(a)[2]"}],"prose":"the organization defines the time period allowed by a user of the information system for an organization-defined number of consecutive invalid logon attempts;"},{"id":"ac-7.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-7(a)[3]"}],"prose":"the information system enforces a limit of organization-defined number of consecutive invalid logon attempts by a user during an organization-defined time period;"}]},{"id":"ac-7.b_obj","name":"objective","props":[{"name":"label","value":"AC-7(b)"}],"parts":[{"id":"ac-7.b_obj.1","name":"objective","props":[{"name":"label","value":"AC-7(b)[1]"}],"prose":"the organization defines account\/node lockout time period or logon delay algorithm to be automatically enforced by the information system when the maximum number of unsuccessful logon attempts is exceeded;"},{"id":"ac-7.b_obj.2","name":"objective","props":[{"name":"label","value":"AC-7(b)[2]"}],"prose":"the information system, when the maximum number of unsuccessful logon attempts is exceeded, automatically:","parts":[{"id":"ac-7.b_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-7(b)[2][a]"}],"prose":"locks the account\/node for the organization-defined time period;"},{"id":"ac-7.b_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-7(b)[2][b]"}],"prose":"locks the account\/node until released by an administrator; or"},{"id":"ac-7.b_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-7(b)[2][c]"}],"prose":"delays next logon prompt according to the organization-defined delay algorithm."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing unsuccessful logon attempts\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem developers\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing access control policy for unsuccessful logon attempts"}]}]},{"id":"ac-8","class":"SP800-53","title":"System Use Notification","params":[{"id":"ac-8_prm_1","label":"organization-defined system use notification message or banner"},{"id":"ac-8_prm_2","label":"organization-defined conditions"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-8"},{"name":"sort-id","value":"ac-08"}],"parts":[{"id":"ac-8_smt","name":"statement","prose":"The information system:","parts":[{"id":"ac-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Displays to users {{ insert: param, ac-8_prm_1 }} before granting access to the system that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance and states that:","parts":[{"id":"ac-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Users are accessing a U.S. Government information system;"},{"id":"ac-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Information system usage may be monitored, recorded, and subject to audit;"},{"id":"ac-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Unauthorized use of the information system is prohibited and subject to criminal and civil penalties; and"},{"id":"ac-8_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Use of the information system indicates consent to monitoring and recording;"}]},{"id":"ac-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Retains the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the information system; and"},{"id":"ac-8_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"For publicly accessible systems:","parts":[{"id":"ac-8_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Displays system use information {{ insert: param, ac-8_prm_2 }}, before granting further access;"},{"id":"ac-8_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Displays references, if any, to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities; and"},{"id":"ac-8_smt.c.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Includes a description of the authorized uses of the system."}]}]},{"id":"ac-8_gdn","name":"guidance","prose":"System use notifications can be implemented using messages or warning banners displayed before individuals log in to information systems. System use notifications are used only for access via logon interfaces with human users and are not required when such human interfaces do not exist. Organizations consider system use notification messages\/banners displayed in multiple languages based on specific organizational needs and the demographics of information system users. Organizations also consult with the Office of the General Counsel for legal review and approval of warning banner content."},{"id":"ac-8_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-8.a_obj","name":"objective","props":[{"name":"label","value":"AC-8(a)"}],"parts":[{"id":"ac-8.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-8(a)[1]"}],"prose":"the organization defines a system use notification message or banner to be displayed by the information system to users before granting access to the system;"},{"id":"ac-8.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2]"}],"prose":"the information system displays to users the organization-defined system use notification message or banner before granting access to the information system that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance, and states that:","parts":[{"id":"ac-8.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](1)"}],"prose":"users are accessing a U.S. Government information system;"},{"id":"ac-8.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](2)"}],"prose":"information system usage may be monitored, recorded, and subject to audit;"},{"id":"ac-8.a.3_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](3)"}],"prose":"unauthorized use of the information system is prohibited and subject to criminal and civil penalties;"},{"id":"ac-8.a.4_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(a)[2](4)"}],"prose":"use of the information system indicates consent to monitoring and recording;"}]}]},{"id":"ac-8.b_obj","name":"objective","props":[{"name":"label","value":"AC-8(b)"}],"prose":"the information system retains the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the information system;"},{"id":"ac-8.c_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)"}],"prose":"for publicly accessible systems:","parts":[{"id":"ac-8.c.1_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)(1)"}],"parts":[{"id":"ac-8.c.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-8(c)(1)[1]"}],"prose":"the organization defines conditions for system use to be displayed by the information system before granting further access;"},{"id":"ac-8.c.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-8(c)(1)[2]"}],"prose":"the information system displays organization-defined conditions before granting further access;"}]},{"id":"ac-8.c.2_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)(2)"}],"prose":"the information system displays references, if any, to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities; and"},{"id":"ac-8.c.3_obj","name":"objective","props":[{"name":"label","value":"AC-8(c)(3)"}],"prose":"the information system includes a description of the authorized uses of the system."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprivacy and security policies, procedures addressing system use notification\n\ndocumented approval of information system use notification messages or banners\n\ninformation system audit records\n\nuser acknowledgements of notification message or banner\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system use notification messages\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibility for providing legal advice\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing system use notification"}]}]},{"id":"ac-11","class":"SP800-53","title":"Session Lock","params":[{"id":"ac-11_prm_1","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AC-11"},{"name":"sort-id","value":"ac-11"}],"links":[{"href":"#4da24a96-6cf8-435d-9d1f-c73247cad109","rel":"reference"}],"parts":[{"id":"ac-11_smt","name":"statement","prose":"The information system:","parts":[{"id":"ac-11_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Prevents further access to the system by initiating a session lock after {{ insert: param, ac-11_prm_1 }} of inactivity or upon receiving a request from a user; and"},{"id":"ac-11_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Retains the session lock until the user reestablishes access using established identification and authentication procedures."}]},{"id":"ac-11_gdn","name":"guidance","prose":"Session locks are temporary actions taken when users stop work and move away from the immediate vicinity of information systems but do not want to log out because of the temporary nature of their absences. Session locks are implemented where session activities can be determined. This is typically at the operating system level, but can also be at the application level. Session locks are not an acceptable substitute for logging out of information systems, for example, if organizations require users to log out at the end of workdays.","links":[{"href":"#ac-7","rel":"related"}]},{"id":"ac-11_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-11.a_obj","name":"objective","props":[{"name":"label","value":"AC-11(a)"}],"parts":[{"id":"ac-11.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-11(a)[1]"}],"prose":"the organization defines the time period of user inactivity after which the information system initiates a session lock;"},{"id":"ac-11.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-11(a)[2]"}],"prose":"the information system prevents further access to the system by initiating a session lock after organization-defined time period of user inactivity or upon receiving a request from a user; and"}]},{"id":"ac-11.b_obj","name":"objective","props":[{"name":"label","value":"AC-11(b)"}],"prose":"the information system retains the session lock until the user reestablishes access using established identification and authentication procedures."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing session lock\n\nprocedures addressing identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing access control policy for session lock"}]}],"controls":[{"id":"ac-11.1","class":"SP800-53-enhancement","title":"Pattern-hiding Displays","props":[{"name":"label","value":"AC-11(1)"},{"name":"sort-id","value":"ac-11.01"}],"parts":[{"id":"ac-11.1_smt","name":"statement","prose":"The information system conceals, via the session lock, information previously visible on the display with a publicly viewable image."},{"id":"ac-11.1_gdn","name":"guidance","prose":"Publicly viewable images can include static or dynamic images, for example, patterns used with screen savers, photographic images, solid colors, clock, battery life indicator, or a blank screen, with the additional caveat that none of the images convey sensitive information."},{"id":"ac-11.1_obj","name":"objective","prose":"Determine if the information system conceals, via the session lock, information previously visible on the display with a publicly viewable image."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing session lock\n\ndisplay screen with session lock activated\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Information system session lock mechanisms"}]}]}]},{"id":"ac-12","class":"SP800-53","title":"Session Termination","params":[{"id":"ac-12_prm_1","label":"organization-defined conditions or trigger events requiring session disconnect"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"AC-12"},{"name":"sort-id","value":"ac-12"}],"parts":[{"id":"ac-12_smt","name":"statement","prose":"The information system automatically terminates a user session after {{ insert: param, ac-12_prm_1 }}."},{"id":"ac-12_gdn","name":"guidance","prose":"This control addresses the termination of user-initiated logical sessions in contrast to SC-10 which addresses the termination of network connections that are associated with communications sessions (i.e., network disconnect). A logical session (for local, network, and remote access) is initiated whenever a user (or process acting on behalf of a user) accesses an organizational information system. Such user sessions can be terminated (and thus terminate user access) without terminating network sessions. Session termination terminates all processes associated with a user’s logical session except those processes that are specifically created by the user (i.e., session owner) to continue after the session is terminated. Conditions or trigger events requiring automatic session termination can include, for example, organization-defined periods of user inactivity, targeted responses to certain types of incidents, time-of-day restrictions on information system use.","links":[{"href":"#sc-10","rel":"related"},{"href":"#sc-23","rel":"related"}]},{"id":"ac-12_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-12_obj.1","name":"objective","props":[{"name":"label","value":"AC-12[1]"}],"prose":"the organization defines conditions or trigger events requiring session disconnect; and"},{"id":"ac-12_obj.2","name":"objective","props":[{"name":"label","value":"AC-12[2]"}],"prose":"the information system automatically terminates a user session after organization-defined conditions or trigger events requiring session disconnect occurs."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing session termination\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of conditions or trigger events requiring session disconnect\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing user session termination"}]}]},{"id":"ac-14","class":"SP800-53","title":"Permitted Actions Without Identification or Authentication","params":[{"id":"ac-14_prm_1","label":"organization-defined user actions"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AC-14"},{"name":"sort-id","value":"ac-14"}],"parts":[{"id":"ac-14_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-14_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Identifies {{ insert: param, ac-14_prm_1 }} that can be performed on the information system without identification or authentication consistent with organizational missions\/business functions; and"},{"id":"ac-14_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents and provides supporting rationale in the security plan for the information system, user actions not requiring identification or authentication."}]},{"id":"ac-14_gdn","name":"guidance","prose":"This control addresses situations in which organizations determine that no identification or authentication is required in organizational information systems. Organizations may allow a limited number of user actions without identification or authentication including, for example, when individuals access public websites or other publicly accessible federal information systems, when individuals use mobile phones to receive calls, or when facsimiles are received. Organizations also identify actions that normally require identification or authentication but may under certain circumstances (e.g., emergencies), allow identification or authentication mechanisms to be bypassed. Such bypasses may occur, for example, via a software-readable physical switch that commands bypass of the logon functionality and is protected from accidental or unmonitored use. This control does not apply to situations where identification and authentication have already occurred and are not repeated, but rather to situations where identification and authentication have not yet occurred. Organizations may decide that there are no user actions that can be performed on organizational information systems without identification and authentication and thus, the values for assignment statements can be none.","links":[{"href":"#cp-2","rel":"related"},{"href":"#ia-2","rel":"related"}]},{"id":"ac-14_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-14.a_obj","name":"objective","props":[{"name":"label","value":"AC-14(a)"}],"parts":[{"id":"ac-14.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-14(a)[1]"}],"prose":"defines user actions that can be performed on the information system without identification or authentication consistent with organizational missions\/business functions;"},{"id":"ac-14.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-14(a)[2]"}],"prose":"identifies organization-defined user actions that can be performed on the information system without identification or authentication consistent with organizational missions\/business functions; and"}]},{"id":"ac-14.b_obj","name":"objective","props":[{"name":"label","value":"AC-14(b)"}],"prose":"documents and provides supporting rationale in the security plan for the information system, user actions not requiring identification or authentication."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing permitted actions without identification or authentication\n\ninformation system configuration settings and associated documentation\n\nsecurity plan\n\nlist of user actions that can be performed without identification or authentication\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ac-17","class":"SP800-53","title":"Remote Access","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-17"},{"name":"sort-id","value":"ac-17"}],"links":[{"href":"#5309d4d0-46f8-4213-a749-e7584164e5e8","rel":"reference"},{"href":"#99f331f2-a9f0-46c2-9856-a3cbb9b89442","rel":"reference"},{"href":"#349fe082-502d-464a-aa0c-1443c6a5cf40","rel":"reference"},{"href":"#1201fcf3-afb1-4675-915a-fb4ae0435717","rel":"reference"},{"href":"#d1a4e2a9-e512-4132-8795-5357aba29254","rel":"reference"}],"parts":[{"id":"ac-17_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-17_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes and documents usage restrictions, configuration\/connection requirements, and implementation guidance for each type of remote access allowed; and"},{"id":"ac-17_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes remote access to the information system prior to allowing such connections."}]},{"id":"ac-17_gdn","name":"guidance","prose":"Remote access is access to organizational information systems by users (or processes acting on behalf of users) communicating through external networks (e.g., the Internet). Remote access methods include, for example, dial-up, broadband, and wireless. Organizations often employ encrypted virtual private networks (VPNs) to enhance confidentiality and integrity over remote connections. The use of encrypted VPNs does not make the access non-remote; however, the use of VPNs, when adequately provisioned with appropriate security controls (e.g., employing appropriate encryption techniques for confidentiality and integrity protection) may provide sufficient assurance to the organization that it can effectively treat such connections as internal networks. Still, VPN connections traverse external networks, and the encrypted VPN does not enhance the availability of remote connections. Also, VPNs with encrypted tunnels can affect the organizational capability to adequately monitor network communications traffic for malicious code. Remote access controls apply to information systems other than public web servers or systems designed for public access. This control addresses authorization prior to allowing remote access without specifying the formats for such authorization. While organizations may use interconnection security agreements to authorize remote access connections, such agreements are not required by this control. Enforcing access restrictions for remote connections is addressed in AC-3.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#pe-17","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sc-10","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ac-17_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-17.a_obj","name":"objective","props":[{"name":"label","value":"AC-17(a)"}],"parts":[{"id":"ac-17.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-17(a)[1]"}],"prose":"identifies the types of remote access allowed to the information system;"},{"id":"ac-17.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-17(a)[2]"}],"prose":"establishes for each type of remote access allowed:","parts":[{"id":"ac-17.a_obj.2.a","name":"objective","props":[{"name":"label","value":"AC-17(a)[2][a]"}],"prose":"usage restrictions;"},{"id":"ac-17.a_obj.2.b","name":"objective","props":[{"name":"label","value":"AC-17(a)[2][b]"}],"prose":"configuration\/connection requirements;"},{"id":"ac-17.a_obj.2.c","name":"objective","props":[{"name":"label","value":"AC-17(a)[2][c]"}],"prose":"implementation guidance;"}]},{"id":"ac-17.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-17(a)[3]"}],"prose":"documents for each type of remote access allowed:","parts":[{"id":"ac-17.a_obj.3.a","name":"objective","props":[{"name":"label","value":"AC-17(a)[3][a]"}],"prose":"usage restrictions;"},{"id":"ac-17.a_obj.3.b","name":"objective","props":[{"name":"label","value":"AC-17(a)[3][b]"}],"prose":"configuration\/connection requirements;"},{"id":"ac-17.a_obj.3.c","name":"objective","props":[{"name":"label","value":"AC-17(a)[3][c]"}],"prose":"implementation guidance; and"}]}]},{"id":"ac-17.b_obj","name":"objective","props":[{"name":"label","value":"AC-17(b)"}],"prose":"authorizes remote access to the information system prior to allowing such connections."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access implementation and usage (including restrictions)\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\nremote access authorizations\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing remote access connections\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Remote access management capability for the information system"}]}],"controls":[{"id":"ac-17.1","class":"SP800-53-enhancement","title":"Automated Monitoring \/ Control","props":[{"name":"label","value":"AC-17(1)"},{"name":"sort-id","value":"ac-17.01"}],"parts":[{"id":"ac-17.1_smt","name":"statement","prose":"The information system monitors and controls remote access methods."},{"id":"ac-17.1_gdn","name":"guidance","prose":"Automated monitoring and control of remote access sessions allows organizations to detect cyber attacks and also ensure ongoing compliance with remote access policies by auditing connection activities of remote users on a variety of information system components (e.g., servers, workstations, notebook computers, smart phones, and tablets).","links":[{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"}]},{"id":"ac-17.1_obj","name":"objective","prose":"Determine if the information system monitors and controls remote access methods."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access to the information system\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\ninformation system monitoring records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms monitoring and controlling remote access methods"}]}]},{"id":"ac-17.2","class":"SP800-53-enhancement","title":"Protection of Confidentiality \/ Integrity Using Encryption","props":[{"name":"label","value":"AC-17(2)"},{"name":"sort-id","value":"ac-17.02"}],"parts":[{"id":"ac-17.2_smt","name":"statement","prose":"The information system implements cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions."},{"id":"ac-17.2_gdn","name":"guidance","prose":"The encryption strength of mechanism is selected based on the security categorization of the information.","links":[{"href":"#sc-8","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"ac-17.2_obj","name":"objective","prose":"Determine if the information system implements cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access to the information system\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ncryptographic mechanisms and associated configuration documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Cryptographic mechanisms protecting confidentiality and integrity of remote access sessions"}]}]},{"id":"ac-17.3","class":"SP800-53-enhancement","title":"Managed Access Control Points","params":[{"id":"ac-17.3_prm_1","label":"organization-defined number"}],"props":[{"name":"label","value":"AC-17(3)"},{"name":"sort-id","value":"ac-17.03"}],"parts":[{"id":"ac-17.3_smt","name":"statement","prose":"The information system routes all remote accesses through {{ insert: param, ac-17.3_prm_1 }} managed network access control points."},{"id":"ac-17.3_gdn","name":"guidance","prose":"Limiting the number of access control points for remote accesses reduces the attack surface for organizations. Organizations consider the Trusted Internet Connections (TIC) initiative requirements for external network connections.","links":[{"href":"#sc-7","rel":"related"}]},{"id":"ac-17.3_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ac-17.3_obj.1","name":"objective","props":[{"name":"label","value":"AC-17(3)[1]"}],"prose":"the organization defines the number of managed network access control points through which all remote accesses are to be routed; and"},{"id":"ac-17.3_obj.2","name":"objective","props":[{"name":"label","value":"AC-17(3)[2]"}],"prose":"the information system routes all remote accesses through the organization-defined number of managed network access control points."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access to the information system\n\ninformation system design documentation\n\nlist of all managed network access control points\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms routing all remote accesses through managed network access control points"}]}]},{"id":"ac-17.4","class":"SP800-53-enhancement","title":"Privileged Commands \/ Access","params":[{"id":"ac-17.4_prm_1","label":"organization-defined needs"}],"props":[{"name":"label","value":"AC-17(4)"},{"name":"sort-id","value":"ac-17.04"}],"parts":[{"id":"ac-17.4_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-17.4_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Authorizes the execution of privileged commands and access to security-relevant information via remote access only for {{ insert: param, ac-17.4_prm_1 }}; and"},{"id":"ac-17.4_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Documents the rationale for such access in the security plan for the information system."}]},{"id":"ac-17.4_gdn","name":"guidance","links":[{"href":"#ac-6","rel":"related"}]},{"id":"ac-17.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-17.4.a_obj","name":"objective","props":[{"name":"label","value":"AC-17(4)(a)"}],"parts":[{"id":"ac-17.4.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-17(4)(a)[1]"}],"prose":"defines needs to authorize the execution of privileged commands and access to security-relevant information via remote access;"},{"id":"ac-17.4.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-17(4)(a)[2]"}],"prose":"authorizes the execution of privileged commands and access to security-relevant information via remote access only for organization-defined needs; and"}],"links":[{"href":"#ac-17.4_smt.a","rel":"corresp"}]},{"id":"ac-17.4.b_obj","name":"objective","props":[{"name":"label","value":"AC-17(4)(b)"}],"prose":"documents the rationale for such access in the information system security plan.","links":[{"href":"#ac-17.4_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing remote access to the information system\n\ninformation system configuration settings and associated documentation\n\nsecurity plan\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing remote access management"}]}]}]},{"id":"ac-18","class":"SP800-53","title":"Wireless Access","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-18"},{"name":"sort-id","value":"ac-18"}],"links":[{"href":"#238ed479-eccb-49f6-82ec-ab74a7a428cf","rel":"reference"},{"href":"#d1b1d689-0f66-4474-9924-c81119758dc1","rel":"reference"},{"href":"#6f336ecd-f2a0-4c84-9699-0491d81b6e0d","rel":"reference"}],"parts":[{"id":"ac-18_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-18_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes usage restrictions, configuration\/connection requirements, and implementation guidance for wireless access; and"},{"id":"ac-18_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes wireless access to the information system prior to allowing such connections."}]},{"id":"ac-18_gdn","name":"guidance","prose":"Wireless technologies include, for example, microwave, packet radio (UHF\/VHF), 802.11x, and Bluetooth. Wireless networks use authentication protocols (e.g., EAP\/TLS, PEAP), which provide credential protection and mutual authentication.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ac-18_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-18.a_obj","name":"objective","props":[{"name":"label","value":"AC-18(a)"}],"prose":"establishes for wireless access:","parts":[{"id":"ac-18.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-18(a)[1]"}],"prose":"usage restrictions;"},{"id":"ac-18.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-18(a)[2]"}],"prose":"configuration\/connection requirement;"},{"id":"ac-18.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-18(a)[3]"}],"prose":"implementation guidance; and"}]},{"id":"ac-18.b_obj","name":"objective","props":[{"name":"label","value":"AC-18(b)"}],"prose":"authorizes wireless access to the information system prior to allowing such connections."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing wireless access implementation and usage (including restrictions)\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nwireless access authorizations\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing wireless access connections\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Wireless access management capability for the information system"}]}],"controls":[{"id":"ac-18.1","class":"SP800-53-enhancement","title":"Authentication and Encryption","params":[{"id":"ac-18.1_prm_1","select":{"how-many":"one-or-more","choice":["users","devices"]}}],"props":[{"name":"label","value":"AC-18(1)"},{"name":"sort-id","value":"ac-18.01"}],"parts":[{"id":"ac-18.1_smt","name":"statement","prose":"The information system protects wireless access to the system using authentication of {{ insert: param, ac-18.1_prm_1 }} and encryption."},{"id":"ac-18.1_gdn","name":"guidance","links":[{"href":"#sc-8","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"ac-18.1_obj","name":"objective","prose":"Determine if the information system protects wireless access to the system using encryption and one or more of the following:","parts":[{"id":"ac-18.1_obj.1","name":"objective","props":[{"name":"label","value":"AC-18(1)[1]"}],"prose":"authentication of users; and\/or"},{"id":"ac-18.1_obj.2","name":"objective","props":[{"name":"label","value":"AC-18(1)[2]"}],"prose":"authentication of devices."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing wireless implementation and usage (including restrictions)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing wireless access protections to the information system"}]}]}]},{"id":"ac-19","class":"SP800-53","title":"Access Control for Mobile Devices","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-19"},{"name":"sort-id","value":"ac-19"}],"links":[{"href":"#4da24a96-6cf8-435d-9d1f-c73247cad109","rel":"reference"},{"href":"#1201fcf3-afb1-4675-915a-fb4ae0435717","rel":"reference"},{"href":"#0293a393-fbe8-4ed1-b0b4-f6fbd3ae1589","rel":"reference"},{"href":"#6513e480-fada-4876-abba-1397084dfb26","rel":"reference"}],"parts":[{"id":"ac-19_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-19_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes usage restrictions, configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices; and"},{"id":"ac-19_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes the connection of mobile devices to organizational information systems."}]},{"id":"ac-19_gdn","name":"guidance","prose":"A mobile device is a computing device that: (i) has a small form factor such that it can easily be carried by a single individual; (ii) is designed to operate without a physical connection (e.g., wirelessly transmit or receive information); (iii) possesses local, non-removable or removable data storage; and (iv) includes a self-contained power source. Mobile devices may also include voice communication capabilities, on-board sensors that allow the device to capture information, and\/or built-in features for synchronizing local data with remote locations. Examples include smart phones, E-readers, and tablets. Mobile devices are typically associated with a single individual and the device is usually in close proximity to the individual; however, the degree of proximity can vary depending upon on the form factor and size of the device. The processing, storage, and transmission capability of the mobile device may be comparable to or merely a subset of desktop systems, depending upon the nature and intended purpose of the device. Due to the large variety of mobile devices with different technical characteristics and capabilities, organizational restrictions may vary for the different classes\/types of such devices. Usage restrictions and specific implementation guidance for mobile devices include, for example, configuration management, device identification and authentication, implementation of mandatory protective software (e.g., malicious code detection, firewall), scanning devices for malicious code, updating virus protection software, scanning for critical software updates and patches, conducting primary operating system (and possibly other resident software) integrity checks, and disabling unnecessary hardware (e.g., wireless, infrared). Organizations are cautioned that the need to provide adequate security for mobile devices goes beyond the requirements in this control. Many safeguards and countermeasures for mobile devices are reflected in other security controls in the catalog allocated in the initial control baselines as starting points for the development of security plans and overlays using the tailoring process. There may also be some degree of overlap in the requirements articulated by the security controls within the different families of controls. AC-20 addresses mobile devices that are not organization-controlled.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-7","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ca-9","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-43","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ac-19_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-19.a_obj","name":"objective","props":[{"name":"label","value":"AC-19(a)"}],"prose":"establishes for organization-controlled mobile devices:","parts":[{"id":"ac-19.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-19(a)[1]"}],"prose":"usage restrictions;"},{"id":"ac-19.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-19(a)[2]"}],"prose":"configuration\/connection requirement;"},{"id":"ac-19.a_obj.3","name":"objective","props":[{"name":"label","value":"AC-19(a)[3]"}],"prose":"implementation guidance; and"}]},{"id":"ac-19.b_obj","name":"objective","props":[{"name":"label","value":"AC-19(b)"}],"prose":"authorizes the connection of mobile devices to organizational information systems."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing access control for mobile device usage (including restrictions)\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nauthorizations for mobile device connections to organizational information systems\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel using mobile devices to access organizational information systems\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Access control capability authorizing mobile device connections to organizational information systems"}]}],"controls":[{"id":"ac-19.5","class":"SP800-53-enhancement","title":"Full Device \/ Container-based Encryption","params":[{"id":"ac-19.5_prm_1","select":{"choice":["full-device encryption","container encryption"]}},{"id":"ac-19.5_prm_2","label":"organization-defined mobile devices"}],"props":[{"name":"label","value":"AC-19(5)"},{"name":"sort-id","value":"ac-19.05"}],"parts":[{"id":"ac-19.5_smt","name":"statement","prose":"The organization employs {{ insert: param, ac-19.5_prm_1 }} to protect the confidentiality and integrity of information on {{ insert: param, ac-19.5_prm_2 }}."},{"id":"ac-19.5_gdn","name":"guidance","prose":"Container-based encryption provides a more fine-grained approach to the encryption of data\/information on mobile devices, including for example, encrypting selected data structures such as files, records, or fields.","links":[{"href":"#mp-5","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-28","rel":"related"}]},{"id":"ac-19.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-19.5_obj.1","name":"objective","props":[{"name":"label","value":"AC-19(5)[1]"}],"prose":"defines mobile devices for which full-device encryption or container encryption is required to protect the confidentiality and integrity of information on such devices; and"},{"id":"ac-19.5_obj.2","name":"objective","props":[{"name":"label","value":"AC-19(5)[2]"}],"prose":"employs full-device encryption or container encryption to protect the confidentiality and integrity of information on organization-defined mobile devices."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing access control for mobile devices\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nencryption mechanism s and associated configuration documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access control responsibilities for mobile devices\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Encryption mechanisms protecting confidentiality and integrity of information on mobile devices"}]}]}]},{"id":"ac-20","class":"SP800-53","title":"Use of External Information Systems","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AC-20"},{"name":"sort-id","value":"ac-20"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"}],"parts":[{"id":"ac-20_smt","name":"statement","prose":"The organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and\/or maintaining external information systems, allowing authorized individuals to:","parts":[{"id":"ac-20_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Access the information system from external information systems; and"},{"id":"ac-20_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Process, store, or transmit organization-controlled information using external information systems."}]},{"id":"ac-20_gdn","name":"guidance","prose":"External information systems are information systems or components of information systems that are outside of the authorization boundary established by organizations and for which organizations typically have no direct supervision and authority over the application of required security controls or the assessment of control effectiveness. External information systems include, for example: (i) personally owned information systems\/devices (e.g., notebook computers, smart phones, tablets, personal digital assistants); (ii) privately owned computing and communications devices resident in commercial or public facilities (e.g., hotels, train stations, convention centers, shopping malls, or airports); (iii) information systems owned or controlled by nonfederal governmental organizations; and (iv) federal information systems that are not owned by, operated by, or under the direct supervision and authority of organizations. This control also addresses the use of external information systems for the processing, storage, or transmission of organizational information, including, for example, accessing cloud services (e.g., infrastructure as a service, platform as a service, or software as a service) from organizational information systems. For some external information systems (i.e., information systems operated by other federal agencies, including organizations subordinate to those agencies), the trust relationships that have been established between those organizations and the originating organization may be such, that no explicit terms and conditions are required. Information systems within these organizations would not be considered external. These situations occur when, for example, there are pre-existing sharing\/trust agreements (either implicit or explicit) established between federal agencies or organizations subordinate to those agencies, or when such trust agreements are specified by applicable laws, Executive Orders, directives, or policies. Authorized individuals include, for example, organizational personnel, contractors, or other individuals with authorized access to organizational information systems and over which organizations have the authority to impose rules of behavior with regard to system access. Restrictions that organizations impose on authorized individuals need not be uniform, as those restrictions may vary depending upon the trust relationships between organizations. Therefore, organizations may choose to impose different security restrictions on contractors than on state, local, or tribal governments. This control does not apply to the use of external information systems to access public interfaces to organizational information systems (e.g., individuals accessing federal information through www.usa.gov). Organizations establish terms and conditions for the use of external information systems in accordance with organizational security policies and procedures. Terms and conditions address as a minimum: types of applications that can be accessed on organizational information systems from external information systems; and the highest security category of information that can be processed, stored, or transmitted on external information systems. If terms and conditions with the owners of external information systems cannot be established, organizations may impose restrictions on organizational personnel using those external systems.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#sa-9","rel":"related"}]},{"id":"ac-20_obj","name":"objective","prose":"Determine if the organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and\/or maintaining external information systems, allowing authorized individuals to:","parts":[{"id":"ac-20.a_obj","name":"objective","props":[{"name":"label","value":"AC-20(a)"}],"prose":"access the information system from the external information systems; and"},{"id":"ac-20.b_obj","name":"objective","props":[{"name":"label","value":"AC-20(b)"}],"prose":"process, store, or transmit organization-controlled information using external information systems."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing the use of external information systems\n\nexternal information systems terms and conditions\n\nlist of types of applications accessible from external information systems\n\nmaximum security categorization for information processed, stored, or transmitted on external information systems\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for defining terms and conditions for use of external information systems to access organizational systems\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing terms and conditions on use of external information systems"}]}],"controls":[{"id":"ac-20.1","class":"SP800-53-enhancement","title":"Limits On Authorized Use","props":[{"name":"label","value":"AC-20(1)"},{"name":"sort-id","value":"ac-20.01"}],"parts":[{"id":"ac-20.1_smt","name":"statement","prose":"The organization permits authorized individuals to use an external information system to access the information system or to process, store, or transmit organization-controlled information only when the organization:","parts":[{"id":"ac-20.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Verifies the implementation of required security controls on the external system as specified in the organization’s information security policy and security plan; or"},{"id":"ac-20.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Retains approved information system connection or processing agreements with the organizational entity hosting the external information system."}]},{"id":"ac-20.1_gdn","name":"guidance","prose":"This control enhancement recognizes that there are circumstances where individuals using external information systems (e.g., contractors, coalition partners) need to access organizational information systems. In those situations, organizations need confidence that the external information systems contain the necessary security safeguards (i.e., security controls), so as not to compromise, damage, or otherwise harm organizational information systems. Verification that the required security controls have been implemented can be achieved, for example, by third-party, independent assessments, attestations, or other means, depending on the confidence level required by organizations.","links":[{"href":"#ca-2","rel":"related"}]},{"id":"ac-20.1_obj","name":"objective","prose":"Determine if the organization permits authorized individuals to use an external information system to access the information system or to process, store, or transmit organization-controlled information only when the organization:","parts":[{"id":"ac-20.1.a_obj","name":"objective","props":[{"name":"label","value":"AC-20(1)(a)"}],"prose":"verifies the implementation of required security controls on the external system as specified in the organization’s information security policy and security plan; or","links":[{"href":"#ac-20.1_smt.a","rel":"corresp"}]},{"id":"ac-20.1.b_obj","name":"objective","props":[{"name":"label","value":"AC-20(1)(b)"}],"prose":"retains approved information system connection or processing agreements with the organizational entity hosting the external information system.","links":[{"href":"#ac-20.1_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing the use of external information systems\n\nsecurity plan\n\ninformation system connection or processing agreements\n\naccount management documents\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing limits on use of external information systems"}]}]},{"id":"ac-20.2","class":"SP800-53-enhancement","title":"Portable Storage Devices","params":[{"id":"ac-20.2_prm_1","select":{"choice":["restricts","prohibits"]}}],"props":[{"name":"label","value":"AC-20(2)"},{"name":"sort-id","value":"ac-20.02"}],"parts":[{"id":"ac-20.2_smt","name":"statement","prose":"The organization {{ insert: param, ac-20.2_prm_1 }} the use of organization-controlled portable storage devices by authorized individuals on external information systems."},{"id":"ac-20.2_gdn","name":"guidance","prose":"Limits on the use of organization-controlled portable storage devices in external information systems include, for example, complete prohibition of the use of such devices or restrictions on how the devices may be used and under what conditions the devices may be used."},{"id":"ac-20.2_obj","name":"objective","prose":"Determine if the organization restricts or prohibits the use of organization-controlled portable storage devices by authorized individuals on external information systems."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing the use of external information systems\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\ninformation system connection or processing agreements\n\naccount management documents\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for restricting or prohibiting use of organization-controlled storage devices on external information systems\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing restrictions on use of portable storage devices"}]}]}]},{"id":"ac-21","class":"SP800-53","title":"Information Sharing","params":[{"id":"ac-21_prm_1","label":"organization-defined information sharing circumstances where user discretion is required"},{"id":"ac-21_prm_2","label":"organization-defined automated mechanisms or manual processes"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"AC-21"},{"name":"sort-id","value":"ac-21"}],"parts":[{"id":"ac-21_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-21_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Facilitates information sharing by enabling authorized users to determine whether access authorizations assigned to the sharing partner match the access restrictions on the information for {{ insert: param, ac-21_prm_1 }}; and"},{"id":"ac-21_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Employs {{ insert: param, ac-21_prm_2 }} to assist users in making information sharing\/collaboration decisions."}]},{"id":"ac-21_gdn","name":"guidance","prose":"This control applies to information that may be restricted in some manner (e.g., privileged medical information, contract-sensitive information, proprietary information, personally identifiable information, classified information related to special access programs or compartments) based on some formal or administrative determination. Depending on the particular information-sharing circumstances, sharing partners may be defined at the individual, group, or organizational level. Information may be defined by content, type, security category, or special access program\/compartment.","links":[{"href":"#ac-3","rel":"related"}]},{"id":"ac-21_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-21.a_obj","name":"objective","props":[{"name":"label","value":"AC-21(a)"}],"parts":[{"id":"ac-21.a_obj.1","name":"objective","props":[{"name":"label","value":"AC-21(a)[1]"}],"prose":"defines information sharing circumstances where user discretion is required;"},{"id":"ac-21.a_obj.2","name":"objective","props":[{"name":"label","value":"AC-21(a)[2]"}],"prose":"facilitates information sharing by enabling authorized users to determine whether access authorizations assigned to the sharing partner match the access restrictions on the information for organization-defined information sharing circumstances;"}]},{"id":"ac-21.b_obj","name":"objective","props":[{"name":"label","value":"AC-21(b)"}],"parts":[{"id":"ac-21.b_obj.1","name":"objective","props":[{"name":"label","value":"AC-21(b)[1]"}],"prose":"defines automated mechanisms or manual processes to be employed to assist users in making information sharing\/collaboration decisions; and"},{"id":"ac-21.b_obj.2","name":"objective","props":[{"name":"label","value":"AC-21(b)[2]"}],"prose":"employs organization-defined automated mechanisms or manual processes to assist users in making information sharing\/collaboration decisions."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing user-based collaboration and information sharing (including restrictions)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of users authorized to make information sharing\/collaboration decisions\n\nlist of information sharing circumstances requiring user discretion\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel responsible for making information sharing\/collaboration decisions\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms or manual process implementing access authorizations supporting information sharing\/user collaboration decisions"}]}]},{"id":"ac-22","class":"SP800-53","title":"Publicly Accessible Content","params":[{"id":"ac-22_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AC-22"},{"name":"sort-id","value":"ac-22"}],"parts":[{"id":"ac-22_smt","name":"statement","prose":"The organization:","parts":[{"id":"ac-22_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Designates individuals authorized to post information onto a publicly accessible information system;"},{"id":"ac-22_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Trains authorized individuals to ensure that publicly accessible information does not contain nonpublic information;"},{"id":"ac-22_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included; and"},{"id":"ac-22_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Reviews the content on the publicly accessible information system for nonpublic information {{ insert: param, ac-22_prm_1 }} and removes such information, if discovered."}]},{"id":"ac-22_gdn","name":"guidance","prose":"In accordance with federal laws, Executive Orders, directives, policies, regulations, standards, and\/or guidance, the general public is not authorized access to nonpublic information (e.g., information protected under the Privacy Act and proprietary information). This control addresses information systems that are controlled by the organization and accessible to the general public, typically without identification or authentication. The posting of information on non-organization information systems is covered by organizational policy.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#au-13","rel":"related"}]},{"id":"ac-22_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ac-22.a_obj","name":"objective","props":[{"name":"label","value":"AC-22(a)"}],"prose":"designates individuals authorized to post information onto a publicly accessible information system;"},{"id":"ac-22.b_obj","name":"objective","props":[{"name":"label","value":"AC-22(b)"}],"prose":"trains authorized individuals to ensure that publicly accessible information does not contain nonpublic information;"},{"id":"ac-22.c_obj","name":"objective","props":[{"name":"label","value":"AC-22(c)"}],"prose":"reviews the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included;"},{"id":"ac-22.d_obj","name":"objective","props":[{"name":"label","value":"AC-22(d)"}],"parts":[{"id":"ac-22.d_obj.1","name":"objective","props":[{"name":"label","value":"AC-22(d)[1]"}],"prose":"defines the frequency to review the content on the publicly accessible information system for nonpublic information;"},{"id":"ac-22.d_obj.2","name":"objective","props":[{"name":"label","value":"AC-22(d)[2]"}],"prose":"reviews the content on the publicly accessible information system for nonpublic information with the organization-defined frequency; and"},{"id":"ac-22.d_obj.3","name":"objective","props":[{"name":"label","value":"AC-22(d)[3]"}],"prose":"removes nonpublic information from the publicly accessible information system, if discovered."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing publicly accessible content\n\nlist of users authorized to post publicly accessible content on organizational information systems\n\ntraining materials and\/or records\n\nrecords of publicly accessible information reviews\n\nrecords of response to nonpublic information on public websites\n\nsystem audit logs\n\nsecurity awareness training records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing publicly accessible information posted on organizational information systems\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing management of publicly accessible content"}]}]}]},{"id":"at","class":"family","title":"Awareness and Training","controls":[{"id":"at-1","class":"SP800-53","title":"Security Awareness and Training Policy and Procedures","params":[{"id":"at-1_prm_1","label":"organization-defined personnel or roles"},{"id":"at-1_prm_2","label":"organization-defined frequency"},{"id":"at-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AT-1"},{"name":"sort-id","value":"at-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"at-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"at-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, at-1_prm_1 }}:","parts":[{"id":"at-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A security awareness and training policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"at-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the security awareness and training policy and associated security awareness and training controls; and"}]},{"id":"at-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"at-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security awareness and training policy {{ insert: param, at-1_prm_2 }}; and"},{"id":"at-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Security awareness and training procedures {{ insert: param, at-1_prm_3 }}."}]}]},{"id":"at-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the AT family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"at-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-1.a_obj","name":"objective","props":[{"name":"label","value":"AT-1(a)"}],"parts":[{"id":"at-1.a.1_obj","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)"}],"parts":[{"id":"at-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1]"}],"prose":"develops and documents an security awareness and training policy that addresses:","parts":[{"id":"at-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"at-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"at-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"at-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"at-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"at-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"at-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"at-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the security awareness and training policy are to be disseminated;"},{"id":"at-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"AT-1(a)(1)[3]"}],"prose":"disseminates the security awareness and training policy to organization-defined personnel or roles;"}]},{"id":"at-1.a.2_obj","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)"}],"parts":[{"id":"at-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the security awareness and training policy and associated awareness and training controls;"},{"id":"at-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"at-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"AT-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"at-1.b_obj","name":"objective","props":[{"name":"label","value":"AT-1(b)"}],"parts":[{"id":"at-1.b.1_obj","name":"objective","props":[{"name":"label","value":"AT-1(b)(1)"}],"parts":[{"id":"at-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current security awareness and training policy;"},{"id":"at-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(b)(1)[2]"}],"prose":"reviews and updates the current security awareness and training policy with the organization-defined frequency;"}]},{"id":"at-1.b.2_obj","name":"objective","props":[{"name":"label","value":"AT-1(b)(2)"}],"parts":[{"id":"at-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"AT-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current security awareness and training procedures; and"},{"id":"at-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"AT-1(b)(2)[2]"}],"prose":"reviews and updates the current security awareness and training procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security awareness and training responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"at-2","class":"SP800-53","title":"Security Awareness Training","params":[{"id":"at-2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AT-2"},{"name":"sort-id","value":"at-02"}],"links":[{"href":"#bb61234b-46c3-4211-8c2b-9869222a720d","rel":"reference"},{"href":"#c5034e0c-eba6-4ecd-a541-79f0678f4ba4","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"at-2_smt","name":"statement","prose":"The organization provides basic security awareness training to information system users (including managers, senior executives, and contractors):","parts":[{"id":"at-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"As part of initial training for new users;"},{"id":"at-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"at-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, at-2_prm_1 }} thereafter."}]},{"id":"at-2_gdn","name":"guidance","prose":"Organizations determine the appropriate content of security awareness training and security awareness techniques based on the specific organizational requirements and the information systems to which personnel have authorized access. The content includes a basic understanding of the need for information security and user actions to maintain security and to respond to suspected security incidents. The content also addresses awareness of the need for operations security. Security awareness techniques can include, for example, displaying posters, offering supplies inscribed with security reminders, generating email advisories\/notices from senior organizational officials, displaying logon screen messages, and conducting information security awareness events.","links":[{"href":"#at-3","rel":"related"},{"href":"#at-4","rel":"related"},{"href":"#pl-4","rel":"related"}]},{"id":"at-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-2.a_obj","name":"objective","props":[{"name":"label","value":"AT-2(a)"}],"prose":"provides basic security awareness training to information system users (including managers, senior executives, and contractors) as part of initial training for new users;"},{"id":"at-2.b_obj","name":"objective","props":[{"name":"label","value":"AT-2(b)"}],"prose":"provides basic security awareness training to information system users (including managers, senior executives, and contractors) when required by information system changes; and"},{"id":"at-2.c_obj","name":"objective","props":[{"name":"label","value":"AT-2(c)"}],"parts":[{"id":"at-2.c_obj.1","name":"objective","props":[{"name":"label","value":"AT-2(c)[1]"}],"prose":"defines the frequency to provide refresher security awareness training thereafter to information system users (including managers, senior executives, and contractors); and"},{"id":"at-2.c_obj.2","name":"objective","props":[{"name":"label","value":"AT-2(c)[2]"}],"prose":"provides refresher security awareness training to information users (including managers, senior executives, and contractors) with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security awareness training implementation\n\nappropriate codes of federal regulations\n\nsecurity awareness training curriculum\n\nsecurity awareness training materials\n\nsecurity plan\n\ntraining records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for security awareness training\n\norganizational personnel with information security responsibilities\n\norganizational personnel comprising the general information system user community"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms managing security awareness training"}]}],"controls":[{"id":"at-2.2","class":"SP800-53-enhancement","title":"Insider Threat","props":[{"name":"label","value":"AT-2(2)"},{"name":"sort-id","value":"at-02.02"}],"parts":[{"id":"at-2.2_smt","name":"statement","prose":"The organization includes security awareness training on recognizing and reporting potential indicators of insider threat."},{"id":"at-2.2_gdn","name":"guidance","prose":"Potential indicators and possible precursors of insider threat can include behaviors such as inordinate, long-term job dissatisfaction, attempts to gain access to information not required for job performance, unexplained access to financial resources, bullying or sexual harassment of fellow employees, workplace violence, and other serious violations of organizational policies, procedures, directives, rules, or practices. Security awareness training includes how to communicate employee and management concerns regarding potential indicators of insider threat through appropriate organizational channels in accordance with established organizational policies and procedures.","links":[{"href":"#pl-4","rel":"related"},{"href":"#pm-12","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ps-6","rel":"related"}]},{"id":"at-2.2_obj","name":"objective","prose":"Determine if the organization includes security awareness training on recognizing and reporting potential indicators of insider threat."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security awareness training implementation\n\nsecurity awareness training curriculum\n\nsecurity awareness training materials\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel that participate in security awareness training\n\norganizational personnel with responsibilities for basic security awareness training\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"at-3","class":"SP800-53","title":"Role-based Security Training","params":[{"id":"at-3_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AT-3"},{"name":"sort-id","value":"at-03"}],"links":[{"href":"#bb61234b-46c3-4211-8c2b-9869222a720d","rel":"reference"},{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"at-3_smt","name":"statement","prose":"The organization provides role-based security training to personnel with assigned security roles and responsibilities:","parts":[{"id":"at-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Before authorizing access to the information system or performing assigned duties;"},{"id":"at-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"at-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, at-3_prm_1 }} thereafter."}]},{"id":"at-3_gdn","name":"guidance","prose":"Organizations determine the appropriate content of security training based on the assigned roles and responsibilities of individuals and the specific security requirements of organizations and the information systems to which personnel have authorized access. In addition, organizations provide enterprise architects, information system developers, software developers, acquisition\/procurement officials, information system managers, system\/network administrators, personnel conducting configuration management and auditing activities, personnel performing independent verification and validation activities, security control assessors, and other personnel having access to system-level software, adequate security-related technical training specifically tailored for their assigned duties. Comprehensive role-based training addresses management, operational, and technical roles and responsibilities covering physical, personnel, and technical safeguards and countermeasures. Such training can include for example, policies, procedures, tools, and artifacts for the organizational security roles defined. Organizations also provide the training necessary for individuals to carry out their responsibilities related to operations and supply chain security within the context of organizational information security programs. Role-based security training also applies to contractors providing services to federal agencies.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-4","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#ps-7","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#sa-16","rel":"related"}]},{"id":"at-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-3.a_obj","name":"objective","props":[{"name":"label","value":"AT-3(a)"}],"prose":"provides role-based security training to personnel with assigned security roles and responsibilities before authorizing access to the information system or performing assigned duties;"},{"id":"at-3.b_obj","name":"objective","props":[{"name":"label","value":"AT-3(b)"}],"prose":"provides role-based security training to personnel with assigned security roles and responsibilities when required by information system changes; and"},{"id":"at-3.c_obj","name":"objective","props":[{"name":"label","value":"AT-3(c)"}],"parts":[{"id":"at-3.c_obj.1","name":"objective","props":[{"name":"label","value":"AT-3(c)[1]"}],"prose":"defines the frequency to provide refresher role-based security training thereafter to personnel with assigned security roles and responsibilities; and"},{"id":"at-3.c_obj.2","name":"objective","props":[{"name":"label","value":"AT-3(c)[2]"}],"prose":"provides refresher role-based security training to personnel with assigned security roles and responsibilities with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security training implementation\n\ncodes of federal regulations\n\nsecurity training curriculum\n\nsecurity training materials\n\nsecurity plan\n\ntraining records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for role-based security training\n\norganizational personnel with assigned information system security roles and responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms managing role-based security training"}]}]},{"id":"at-4","class":"SP800-53","title":"Security Training Records","params":[{"id":"at-4_prm_1","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AT-4"},{"name":"sort-id","value":"at-04"}],"parts":[{"id":"at-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"at-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Documents and monitors individual information system security training activities including basic security awareness training and specific information system security training; and"},{"id":"at-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Retains individual training records for {{ insert: param, at-4_prm_1 }}."}]},{"id":"at-4_gdn","name":"guidance","prose":"Documentation for specialized training may be maintained by individual supervisors at the option of the organization.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#pm-14","rel":"related"}]},{"id":"at-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"at-4.a_obj","name":"objective","props":[{"name":"label","value":"AT-4(a)"}],"parts":[{"id":"at-4.a_obj.1","name":"objective","props":[{"name":"label","value":"AT-4(a)[1]"}],"prose":"documents individual information system security training activities including:","parts":[{"id":"at-4.a_obj.1.a","name":"objective","props":[{"name":"label","value":"AT-4(a)[1][a]"}],"prose":"basic security awareness training;"},{"id":"at-4.a_obj.1.b","name":"objective","props":[{"name":"label","value":"AT-4(a)[1][b]"}],"prose":"specific role-based information system security training;"}]},{"id":"at-4.a_obj.2","name":"objective","props":[{"name":"label","value":"AT-4(a)[2]"}],"prose":"monitors individual information system security training activities including:","parts":[{"id":"at-4.a_obj.2.a","name":"objective","props":[{"name":"label","value":"AT-4(a)[2][a]"}],"prose":"basic security awareness training;"},{"id":"at-4.a_obj.2.b","name":"objective","props":[{"name":"label","value":"AT-4(a)[2][b]"}],"prose":"specific role-based information system security training;"}]}]},{"id":"at-4.b_obj","name":"objective","props":[{"name":"label","value":"AT-4(b)"}],"parts":[{"id":"at-4.b_obj.1","name":"objective","props":[{"name":"label","value":"AT-4(b)[1]"}],"prose":"defines a time period to retain individual training records; and"},{"id":"at-4.b_obj.2","name":"objective","props":[{"name":"label","value":"AT-4(b)[2]"}],"prose":"retains individual training records for the organization-defined time period."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security awareness and training policy\n\nprocedures addressing security training records\n\nsecurity awareness and training records\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security training record retention responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting management of security training records"}]}]}]},{"id":"au","class":"family","title":"Audit and Accountability","controls":[{"id":"au-1","class":"SP800-53","title":"Audit and Accountability Policy and Procedures","params":[{"id":"au-1_prm_1","label":"organization-defined personnel or roles"},{"id":"au-1_prm_2","label":"organization-defined frequency"},{"id":"au-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-1"},{"name":"sort-id","value":"au-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"au-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"au-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, au-1_prm_1 }}:","parts":[{"id":"au-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An audit and accountability policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"au-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls; and"}]},{"id":"au-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"au-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Audit and accountability policy {{ insert: param, au-1_prm_2 }}; and"},{"id":"au-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Audit and accountability procedures {{ insert: param, au-1_prm_3 }}."}]}]},{"id":"au-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the AU family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"au-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-1.a_obj","name":"objective","props":[{"name":"label","value":"AU-1(a)"}],"parts":[{"id":"au-1.a.1_obj","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)"}],"parts":[{"id":"au-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1]"}],"prose":"develops and documents an audit and accountability policy that addresses:","parts":[{"id":"au-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"au-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"au-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"au-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"au-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"au-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"au-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"au-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the audit and accountability policy are to be disseminated;"},{"id":"au-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"AU-1(a)(1)[3]"}],"prose":"disseminates the audit and accountability policy to organization-defined personnel or roles;"}]},{"id":"au-1.a.2_obj","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)"}],"parts":[{"id":"au-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls;"},{"id":"au-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"au-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"AU-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"au-1.b_obj","name":"objective","props":[{"name":"label","value":"AU-1(b)"}],"parts":[{"id":"au-1.b.1_obj","name":"objective","props":[{"name":"label","value":"AU-1(b)(1)"}],"parts":[{"id":"au-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current audit and accountability policy;"},{"id":"au-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(b)(1)[2]"}],"prose":"reviews and updates the current audit and accountability policy with the organization-defined frequency;"}]},{"id":"au-1.b.2_obj","name":"objective","props":[{"name":"label","value":"AU-1(b)(2)"}],"parts":[{"id":"au-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"AU-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current audit and accountability procedures; and"},{"id":"au-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"AU-1(b)(2)[2]"}],"prose":"reviews and updates the current audit and accountability procedures in accordance with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"au-2","class":"SP800-53","title":"Audit Events","params":[{"id":"au-2_prm_1","label":"organization-defined auditable events"},{"id":"au-2_prm_2","label":"organization-defined audited events (the subset of the auditable events defined in AU-2 a.) along with the frequency of (or situation requiring) auditing for each identified event"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-2"},{"name":"sort-id","value":"au-02"}],"links":[{"href":"#672fd561-b92b-4713-b9cf-6c9d9456728b","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"au-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"au-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Determines that the information system is capable of auditing the following events: {{ insert: param, au-2_prm_1 }};"},{"id":"au-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events;"},{"id":"au-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Provides a rationale for why the auditable events are deemed to be adequate to support after-the-fact investigations of security incidents; and"},{"id":"au-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Determines that the following events are to be audited within the information system: {{ insert: param, au-2_prm_2 }}."}]},{"id":"au-2_gdn","name":"guidance","prose":"An event is any observable occurrence in an organizational information system. Organizations identify audit events as those events which are significant and relevant to the security of information systems and the environments in which those systems operate in order to meet specific and ongoing audit needs. Audit events can include, for example, password changes, failed logons, or failed accesses related to information systems, administrative privilege usage, PIV credential usage, or third-party credential usage. In determining the set of auditable events, organizations consider the auditing appropriate for each of the security controls to be implemented. To balance auditing requirements with other information system needs, this control also requires identifying that subset of auditable events that are audited at a given point in time. For example, organizations may determine that information systems must have the capability to log every file access both successful and unsuccessful, but not activate that capability except for specific circumstances due to the potential burden on system performance. Auditing requirements, including the need for auditable events, may be referenced in other security controls and control enhancements. Organizations also include auditable events that are required by applicable federal laws, Executive Orders, directives, policies, regulations, and standards. Audit records can be generated at various levels of abstraction, including at the packet level as information traverses the network. Selecting the appropriate level of abstraction is a critical aspect of an audit capability and can facilitate the identification of root causes to problems. Organizations consider in the definition of auditable events, the auditing necessary to cover related events such as the steps in distributed, transaction-based processes (e.g., processes that are distributed across multiple organizations) and actions that occur in service-oriented architectures.","links":[{"href":"#ac-6","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"au-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-2.a_obj","name":"objective","props":[{"name":"label","value":"AU-2(a)"}],"parts":[{"id":"au-2.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-2(a)[1]"}],"prose":"defines the auditable events that the information system must be capable of auditing;"},{"id":"au-2.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-2(a)[2]"}],"prose":"determines that the information system is capable of auditing organization-defined auditable events;"}]},{"id":"au-2.b_obj","name":"objective","props":[{"name":"label","value":"AU-2(b)"}],"prose":"coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events;"},{"id":"au-2.c_obj","name":"objective","props":[{"name":"label","value":"AU-2(c)"}],"prose":"provides a rationale for why the auditable events are deemed to be adequate to support after-the-fact investigations of security incidents;"},{"id":"au-2.d_obj","name":"objective","props":[{"name":"label","value":"AU-2(d)"}],"parts":[{"id":"au-2.d_obj.1","name":"objective","props":[{"name":"label","value":"AU-2(d)[1]"}],"prose":"defines the subset of auditable events defined in AU-2a that are to be audited within the information system;"},{"id":"au-2.d_obj.2","name":"objective","props":[{"name":"label","value":"AU-2(d)[2]"}],"prose":"determines that the subset of auditable events defined in AU-2a are to be audited within the information system; and"},{"id":"au-2.d_obj.3","name":"objective","props":[{"name":"label","value":"AU-2(d)[3]"}],"prose":"determines the frequency of (or situation requiring) auditing for each identified event."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing auditable events\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\ninformation system auditable events\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information system auditing"}]}],"controls":[{"id":"au-2.3","class":"SP800-53-enhancement","title":"Reviews and Updates","params":[{"id":"au-2.3_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"AU-2(3)"},{"name":"sort-id","value":"au-02.03"}],"parts":[{"id":"au-2.3_smt","name":"statement","prose":"The organization reviews and updates the audited events {{ insert: param, au-2.3_prm_1 }}."},{"id":"au-2.3_gdn","name":"guidance","prose":"Over time, the events that organizations believe should be audited may change. Reviewing and updating the set of audited events periodically is necessary to ensure that the current set is still necessary and sufficient."},{"id":"au-2.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-2.3_obj.1","name":"objective","props":[{"name":"label","value":"AU-2(3)[1]"}],"prose":"defines the frequency to review and update the audited events; and"},{"id":"au-2.3_obj.2","name":"objective","props":[{"name":"label","value":"AU-2(3)[2]"}],"prose":"reviews and updates the auditable events with organization-defined frequency."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing auditable events\n\nsecurity plan\n\nlist of organization-defined auditable events\n\nauditable events review and update records\n\ninformation system audit records\n\ninformation system incident reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting review and update of auditable events"}]}]}]},{"id":"au-3","class":"SP800-53","title":"Content of Audit Records","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-3"},{"name":"sort-id","value":"au-03"}],"parts":[{"id":"au-3_smt","name":"statement","prose":"The information system generates audit records containing information that establishes what type of event occurred, when the event occurred, where the event occurred, the source of the event, the outcome of the event, and the identity of any individuals or subjects associated with the event."},{"id":"au-3_gdn","name":"guidance","prose":"Audit record content that may be necessary to satisfy the requirement of this control, includes, for example, time stamps, source and destination addresses, user\/process identifiers, event descriptions, success\/fail indications, filenames involved, and access control or flow control rules invoked. Event outcomes can include indicators of event success or failure and event-specific results (e.g., the security state of the information system after the event occurred).","links":[{"href":"#au-2","rel":"related"},{"href":"#au-8","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#si-11","rel":"related"}]},{"id":"au-3_obj","name":"objective","prose":"Determine if the information system generates audit records containing information that establishes:","parts":[{"id":"au-3_obj.1","name":"objective","props":[{"name":"label","value":"AU-3[1]"}],"prose":"what type of event occurred;"},{"id":"au-3_obj.2","name":"objective","props":[{"name":"label","value":"AU-3[2]"}],"prose":"when the event occurred;"},{"id":"au-3_obj.3","name":"objective","props":[{"name":"label","value":"AU-3[3]"}],"prose":"where the event occurred;"},{"id":"au-3_obj.4","name":"objective","props":[{"name":"label","value":"AU-3[4]"}],"prose":"the source of the event;"},{"id":"au-3_obj.5","name":"objective","props":[{"name":"label","value":"AU-3[5]"}],"prose":"the outcome of the event; and"},{"id":"au-3_obj.6","name":"objective","props":[{"name":"label","value":"AU-3[6]"}],"prose":"the identity of any individuals or subjects associated with the event."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing content of audit records\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of organization-defined auditable events\n\ninformation system audit records\n\ninformation system incident reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information system auditing of auditable events"}]}],"controls":[{"id":"au-3.1","class":"SP800-53-enhancement","title":"Additional Audit Information","params":[{"id":"au-3.1_prm_1","label":"organization-defined additional, more detailed information"}],"props":[{"name":"label","value":"AU-3(1)"},{"name":"sort-id","value":"au-03.01"}],"parts":[{"id":"au-3.1_smt","name":"statement","prose":"The information system generates audit records containing the following additional information: {{ insert: param, au-3.1_prm_1 }}."},{"id":"au-3.1_gdn","name":"guidance","prose":"Detailed information that organizations may consider in audit records includes, for example, full text recording of privileged commands or the individual identities of group account users. Organizations consider limiting the additional audit information to only that information explicitly needed for specific audit requirements. This facilitates the use of audit trails and audit logs by not including information that could potentially be misleading or could make it more difficult to locate information of interest."},{"id":"au-3.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-3.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-3(1)[1]"}],"prose":"the organization defines additional, more detailed information to be contained in audit records that the information system generates; and"},{"id":"au-3.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-3(1)[2]"}],"prose":"the information system generates audit records containing the organization-defined additional, more detailed information."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing content of audit records\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of organization-defined auditable events\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Information system audit capability"}]}]}]},{"id":"au-4","class":"SP800-53","title":"Audit Storage Capacity","params":[{"id":"au-4_prm_1","label":"organization-defined audit record storage requirements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-4"},{"name":"sort-id","value":"au-04"}],"parts":[{"id":"au-4_smt","name":"statement","prose":"The organization allocates audit record storage capacity in accordance with {{ insert: param, au-4_prm_1 }}."},{"id":"au-4_gdn","name":"guidance","prose":"Organizations consider the types of auditing to be performed and the audit processing requirements when allocating audit storage capacity. Allocating sufficient audit storage capacity reduces the likelihood of such capacity being exceeded and resulting in the potential loss or reduction of auditing capability.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-5","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"},{"href":"#au-11","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"au-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-4_obj.1","name":"objective","props":[{"name":"label","value":"AU-4[1]"}],"prose":"defines audit record storage requirements; and"},{"id":"au-4_obj.2","name":"objective","props":[{"name":"label","value":"AU-4[2]"}],"prose":"allocates audit record storage capacity in accordance with the organization-defined audit record storage requirements."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit storage capacity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit record storage requirements\n\naudit record storage capability for information system components\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Audit record storage capacity and related configuration settings"}]}]},{"id":"au-5","class":"SP800-53","title":"Response to Audit Processing Failures","params":[{"id":"au-5_prm_1","label":"organization-defined personnel or roles"},{"id":"au-5_prm_2","label":"organization-defined actions to be taken (e.g., shut down information system, overwrite oldest audit records, stop generating audit records)"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-5"},{"name":"sort-id","value":"au-05"}],"parts":[{"id":"au-5_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Alerts {{ insert: param, au-5_prm_1 }} in the event of an audit processing failure; and"},{"id":"au-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Takes the following additional actions: {{ insert: param, au-5_prm_2 }}."}]},{"id":"au-5_gdn","name":"guidance","prose":"Audit processing failures include, for example, software\/hardware errors, failures in the audit capturing mechanisms, and audit storage capacity being reached or exceeded. Organizations may choose to define additional actions for different audit processing failures (e.g., by type, by location, by severity, or a combination of such factors). This control applies to each audit data storage repository (i.e., distinct information system component where audit records are stored), the total audit storage capacity of organizations (i.e., all audit data storage repositories combined), or both.","links":[{"href":"#au-4","rel":"related"},{"href":"#si-12","rel":"related"}]},{"id":"au-5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-5.a_obj","name":"objective","props":[{"name":"label","value":"AU-5(a)"}],"parts":[{"id":"au-5.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-5(a)[1]"}],"prose":"the organization defines the personnel or roles to be alerted in the event of an audit processing failure;"},{"id":"au-5.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-5(a)[2]"}],"prose":"the information system alerts the organization-defined personnel or roles in the event of an audit processing failure;"}]},{"id":"au-5.b_obj","name":"objective","props":[{"name":"label","value":"AU-5(b)"}],"parts":[{"id":"au-5.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-5(b)[1]"}],"prose":"the organization defines additional actions to be taken (e.g., shutdown information system, overwrite oldest audit records, stop generating audit records) in the event of an audit processing failure; and"},{"id":"au-5.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-5(b)[2]"}],"prose":"the information system takes the additional organization-defined actions in the event of an audit processing failure."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing response to audit processing failures\n\ninformation system design documentation\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\nlist of personnel to be notified in case of an audit processing failure\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing information system response to audit processing failures"}]}]},{"id":"au-6","class":"SP800-53","title":"Audit Review, Analysis, and Reporting","params":[{"id":"au-6_prm_1","label":"organization-defined frequency"},{"id":"au-6_prm_2","label":"organization-defined inappropriate or unusual activity"},{"id":"au-6_prm_3","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-6"},{"name":"sort-id","value":"au-06"}],"parts":[{"id":"au-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"au-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Reviews and analyzes information system audit records {{ insert: param, au-6_prm_1 }} for indications of {{ insert: param, au-6_prm_2 }}; and"},{"id":"au-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reports findings to {{ insert: param, au-6_prm_3 }}."}]},{"id":"au-6_gdn","name":"guidance","prose":"Audit review, analysis, and reporting covers information security-related auditing performed by organizations including, for example, auditing that results from monitoring of account usage, remote access, wireless connectivity, mobile device connection, configuration settings, system component inventory, use of maintenance tools and nonlocal maintenance, physical access, temperature and humidity, equipment delivery and removal, communications at the information system boundaries, use of mobile code, and use of VoIP. Findings can be reported to organizational entities that include, for example, incident response team, help desk, information security group\/department. If organizations are prohibited from reviewing and analyzing audit information or unable to conduct such activities (e.g., in certain national security applications or systems), the review\/analysis may be carried out by other organizations granted such authority.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#au-7","rel":"related"},{"href":"#au-16","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-10","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ir-5","rel":"related"},{"href":"#ir-6","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-6","rel":"related"},{"href":"#pe-14","rel":"related"},{"href":"#pe-16","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-18","rel":"related"},{"href":"#sc-19","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"au-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-6.a_obj","name":"objective","props":[{"name":"label","value":"AU-6(a)"}],"parts":[{"id":"au-6.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-6(a)[1]"}],"prose":"defines the types of inappropriate or unusual activity to look for when information system audit records are reviewed and analyzed;"},{"id":"au-6.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-6(a)[2]"}],"prose":"defines the frequency to review and analyze information system audit records for indications of organization-defined inappropriate or unusual activity;"},{"id":"au-6.a_obj.3","name":"objective","props":[{"name":"label","value":"AU-6(a)[3]"}],"prose":"reviews and analyzes information system audit records for indications of organization-defined inappropriate or unusual activity with the organization-defined frequency;"}]},{"id":"au-6.b_obj","name":"objective","props":[{"name":"label","value":"AU-6(b)"}],"parts":[{"id":"au-6.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-6(b)[1]"}],"prose":"defines personnel or roles to whom findings resulting from reviews and analysis of information system audit records are to be reported; and"},{"id":"au-6.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-6(b)[2]"}],"prose":"reports findings to organization-defined personnel or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit review, analysis, and reporting\n\nreports of audit findings\n\nrecords of actions taken in response to reviews\/analyses of audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit review, analysis, and reporting responsibilities\n\norganizational personnel with information security responsibilities"}]}],"controls":[{"id":"au-6.1","class":"SP800-53-enhancement","title":"Process Integration","props":[{"name":"label","value":"AU-6(1)"},{"name":"sort-id","value":"au-06.01"}],"parts":[{"id":"au-6.1_smt","name":"statement","prose":"The organization employs automated mechanisms to integrate audit review, analysis, and reporting processes to support organizational processes for investigation and response to suspicious activities."},{"id":"au-6.1_gdn","name":"guidance","prose":"Organizational processes benefiting from integrated audit review, analysis, and reporting include, for example, incident response, continuous monitoring, contingency planning, and Inspector General audits.","links":[{"href":"#au-12","rel":"related"},{"href":"#pm-7","rel":"related"}]},{"id":"au-6.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-6.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-6(1)[1]"}],"prose":"employs automated mechanisms to integrate:","parts":[{"id":"au-6.1_obj.1.a","name":"objective","props":[{"name":"label","value":"AU-6(1)[1][a]"}],"prose":"audit review;"},{"id":"au-6.1_obj.1.b","name":"objective","props":[{"name":"label","value":"AU-6(1)[1][b]"}],"prose":"analysis;"},{"id":"au-6.1_obj.1.c","name":"objective","props":[{"name":"label","value":"AU-6(1)[1][c]"}],"prose":"reporting processes;"}]},{"id":"au-6.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-6(1)[2]"}],"prose":"uses integrated audit review, analysis and reporting processes to support organizational processes for:","parts":[{"id":"au-6.1_obj.2.a","name":"objective","props":[{"name":"label","value":"AU-6(1)[2][a]"}],"prose":"investigation of suspicious activities; and"},{"id":"au-6.1_obj.2.b","name":"objective","props":[{"name":"label","value":"AU-6(1)[2][b]"}],"prose":"response to suspicious activities."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit review, analysis, and reporting\n\nprocedures addressing investigation and response to suspicious activities\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit review, analysis, and reporting responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms integrating audit review, analysis, and reporting processes"}]}]},{"id":"au-6.3","class":"SP800-53-enhancement","title":"Correlate Audit Repositories","props":[{"name":"label","value":"AU-6(3)"},{"name":"sort-id","value":"au-06.03"}],"parts":[{"id":"au-6.3_smt","name":"statement","prose":"The organization analyzes and correlates audit records across different repositories to gain organization-wide situational awareness."},{"id":"au-6.3_gdn","name":"guidance","prose":"Organization-wide situational awareness includes awareness across all three tiers of risk management (i.e., organizational, mission\/business process, and information system) and supports cross-organization awareness.","links":[{"href":"#au-12","rel":"related"},{"href":"#ir-4","rel":"related"}]},{"id":"au-6.3_obj","name":"objective","prose":"Determine if the organization analyzes and correlates audit records across different repositories to gain organization-wide situational awareness."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit review, analysis, and reporting\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records across different repositories\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit review, analysis, and reporting responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting analysis and correlation of audit records"}]}]}]},{"id":"au-7","class":"SP800-53","title":"Audit Reduction and Report Generation","props":[{"name":"priority","value":"P2"},{"name":"label","value":"AU-7"},{"name":"sort-id","value":"au-07"}],"parts":[{"id":"au-7_smt","name":"statement","prose":"The information system provides an audit reduction and report generation capability that:","parts":[{"id":"au-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Supports on-demand audit review, analysis, and reporting requirements and after-the-fact investigations of security incidents; and"},{"id":"au-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Does not alter the original content or time ordering of audit records."}]},{"id":"au-7_gdn","name":"guidance","prose":"Audit reduction is a process that manipulates collected audit information and organizes such information in a summary format that is more meaningful to analysts. Audit reduction and report generation capabilities do not always emanate from the same information system or from the same organizational entities conducting auditing activities. Audit reduction capability can include, for example, modern data mining techniques with advanced data filters to identify anomalous behavior in audit records. The report generation capability provided by the information system can generate customizable reports. Time ordering of audit records can be a significant issue if the granularity of the timestamp in the record is insufficient.","links":[{"href":"#au-6","rel":"related"}]},{"id":"au-7_obj","name":"objective","prose":"Determine if the information system provides an audit reduction and report generation capability that supports:","parts":[{"id":"au-7.a_obj","name":"objective","props":[{"name":"label","value":"AU-7(a)"}],"parts":[{"id":"au-7.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-7(a)[1]"}],"prose":"on-demand audit review;"},{"id":"au-7.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-7(a)[2]"}],"prose":"analysis;"},{"id":"au-7.a_obj.3","name":"objective","props":[{"name":"label","value":"AU-7(a)[3]"}],"prose":"reporting requirements;"},{"id":"au-7.a_obj.4","name":"objective","props":[{"name":"label","value":"AU-7(a)[4]"}],"prose":"after-the-fact investigations of security incidents; and"}]},{"id":"au-7.b_obj","name":"objective","props":[{"name":"label","value":"AU-7(b)"}],"prose":"does not alter the original content or time ordering of audit records."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit reduction and report generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit reduction, review, analysis, and reporting tools\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit reduction and report generation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Audit reduction and report generation capability"}]}],"controls":[{"id":"au-7.1","class":"SP800-53-enhancement","title":"Automatic Processing","params":[{"id":"au-7.1_prm_1","label":"organization-defined audit fields within audit records"}],"props":[{"name":"label","value":"AU-7(1)"},{"name":"sort-id","value":"au-07.01"}],"parts":[{"id":"au-7.1_smt","name":"statement","prose":"The information system provides the capability to process audit records for events of interest based on {{ insert: param, au-7.1_prm_1 }}."},{"id":"au-7.1_gdn","name":"guidance","prose":"Events of interest can be identified by the content of specific audit record fields including, for example, identities of individuals, event types, event locations, event times, event dates, system resources involved, IP addresses involved, or information objects accessed. Organizations may define audit event criteria to any degree of granularity required, for example, locations selectable by general networking location (e.g., by network or subnetwork) or selectable by specific information system component.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"}]},{"id":"au-7.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-7.1_obj.1","name":"objective","props":[{"name":"label","value":"AU-7(1)[1]"}],"prose":"the organization defines audit fields within audit records in order to process audit records for events of interest; and"},{"id":"au-7.1_obj.2","name":"objective","props":[{"name":"label","value":"AU-7(1)[2]"}],"prose":"the information system provides the capability to process audit records for events of interest based on the organization-defined audit fields within audit records."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit reduction and report generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit reduction, review, analysis, and reporting tools\n\naudit record criteria (fields) establishing events of interest\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit reduction and report generation responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Audit reduction and report generation capability"}]}]}]},{"id":"au-8","class":"SP800-53","title":"Time Stamps","params":[{"id":"au-8_prm_1","label":"organization-defined granularity of time measurement"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-8"},{"name":"sort-id","value":"au-08"}],"parts":[{"id":"au-8_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Uses internal system clocks to generate time stamps for audit records; and"},{"id":"au-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT) and meets {{ insert: param, au-8_prm_1 }}."}]},{"id":"au-8_gdn","name":"guidance","prose":"Time stamps generated by the information system include date and time. Time is commonly expressed in Coordinated Universal Time (UTC), a modern continuation of Greenwich Mean Time (GMT), or local time with an offset from UTC. Granularity of time measurements refers to the degree of synchronization between information system clocks and reference clocks, for example, clocks synchronizing within hundreds of milliseconds or within tens of milliseconds. Organizations may define different time granularities for different system components. Time service can also be critical to other security capabilities such as access control and identification and authentication, depending on the nature of the mechanisms used to support those capabilities.","links":[{"href":"#au-3","rel":"related"},{"href":"#au-12","rel":"related"}]},{"id":"au-8_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-8.a_obj","name":"objective","props":[{"name":"label","value":"AU-8(a)"}],"prose":"the information system uses internal system clocks to generate time stamps for audit records;"},{"id":"au-8.b_obj","name":"objective","props":[{"name":"label","value":"AU-8(b)"}],"parts":[{"id":"au-8.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-8(b)[1]"}],"prose":"the information system records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT);"},{"id":"au-8.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-8(b)[2]"}],"prose":"the organization defines the granularity of time measurement to be met when recording time stamps for audit records; and"},{"id":"au-8.b_obj.3","name":"objective","props":[{"name":"label","value":"AU-8(b)[3]"}],"prose":"the organization records time stamps for audit records that meet the organization-defined granularity of time measurement."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing time stamp generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing time stamp generation"}]}],"controls":[{"id":"au-8.1","class":"SP800-53-enhancement","title":"Synchronization with Authoritative Time Source","params":[{"id":"au-8.1_prm_1","label":"organization-defined frequency"},{"id":"au-8.1_prm_2","label":"organization-defined authoritative time source"},{"id":"au-8.1_prm_3","label":"organization-defined time period"}],"props":[{"name":"label","value":"AU-8(1)"},{"name":"sort-id","value":"au-08.01"}],"parts":[{"id":"au-8.1_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-8.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Compares the internal information system clocks {{ insert: param, au-8.1_prm_1 }} with {{ insert: param, au-8.1_prm_2 }}; and"},{"id":"au-8.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Synchronizes the internal system clocks to the authoritative time source when the time difference is greater than {{ insert: param, au-8.1_prm_3 }}."}]},{"id":"au-8.1_gdn","name":"guidance","prose":"This control enhancement provides uniformity of time stamps for information systems with multiple system clocks and systems connected over a network."},{"id":"au-8.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-8.1.a_obj","name":"objective","props":[{"name":"label","value":"AU-8(1)(a)"}],"parts":[{"id":"au-8.1.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-8(1)(a)[1]"}],"prose":"the organization defines the authoritative time source to which internal information system clocks are to be compared;"},{"id":"au-8.1.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-8(1)(a)[2]"}],"prose":"the organization defines the frequency to compare the internal information system clocks with the organization-defined authoritative time source; and"},{"id":"au-8.1.a_obj.3","name":"objective","props":[{"name":"label","value":"AU-8(1)(a)[3]"}],"prose":"the information system compares the internal information system clocks with the organization-defined authoritative time source with organization-defined frequency; and"}],"links":[{"href":"#au-8.1_smt.a","rel":"corresp"}]},{"id":"au-8.1.b_obj","name":"objective","props":[{"name":"label","value":"AU-8(1)(b)"}],"parts":[{"id":"au-8.1.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-8(1)(b)[1]"}],"prose":"the organization defines the time period that, if exceeded by the time difference between the internal system clocks and the authoritative time source, will result in the internal system clocks being synchronized to the authoritative time source; and"},{"id":"au-8.1.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-8(1)(b)[2]"}],"prose":"the information system synchronizes the internal information system clocks to the authoritative time source when the time difference is greater than the organization-defined time period."}],"links":[{"href":"#au-8.1_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing time stamp generation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing internal information system clock synchronization"}]}]}]},{"id":"au-9","class":"SP800-53","title":"Protection of Audit Information","props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-9"},{"name":"sort-id","value":"au-09"}],"parts":[{"id":"au-9_smt","name":"statement","prose":"The information system protects audit information and audit tools from unauthorized access, modification, and deletion."},{"id":"au-9_gdn","name":"guidance","prose":"Audit information includes all information (e.g., audit records, audit settings, and audit reports) needed to successfully audit information system activity. This control focuses on technical protection of audit information. Physical protection of audit information is addressed by media protection controls and physical and environmental protection controls.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-6","rel":"related"}]},{"id":"au-9_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-9_obj.1","name":"objective","props":[{"name":"label","value":"AU-9[1]"}],"prose":"the information system protects audit information from unauthorized:","parts":[{"id":"au-9_obj.1.a","name":"objective","props":[{"name":"label","value":"AU-9[1][a]"}],"prose":"access;"},{"id":"au-9_obj.1.b","name":"objective","props":[{"name":"label","value":"AU-9[1][b]"}],"prose":"modification;"},{"id":"au-9_obj.1.c","name":"objective","props":[{"name":"label","value":"AU-9[1][c]"}],"prose":"deletion;"}]},{"id":"au-9_obj.2","name":"objective","props":[{"name":"label","value":"AU-9[2]"}],"prose":"the information system protects audit tools from unauthorized:","parts":[{"id":"au-9_obj.2.a","name":"objective","props":[{"name":"label","value":"AU-9[2][a]"}],"prose":"access;"},{"id":"au-9_obj.2.b","name":"objective","props":[{"name":"label","value":"AU-9[2][b]"}],"prose":"modification; and"},{"id":"au-9_obj.2.c","name":"objective","props":[{"name":"label","value":"AU-9[2][c]"}],"prose":"deletion."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\naccess control policy and procedures\n\nprocedures addressing protection of audit information\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation, information system audit records\n\naudit tools\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing audit information protection"}]}],"controls":[{"id":"au-9.4","class":"SP800-53-enhancement","title":"Access by Subset of Privileged Users","params":[{"id":"au-9.4_prm_1","label":"organization-defined subset of privileged users"}],"props":[{"name":"label","value":"AU-9(4)"},{"name":"sort-id","value":"au-09.04"}],"parts":[{"id":"au-9.4_smt","name":"statement","prose":"The organization authorizes access to management of audit functionality to only {{ insert: param, au-9.4_prm_1 }}."},{"id":"au-9.4_gdn","name":"guidance","prose":"Individuals with privileged access to an information system and who are also the subject of an audit by that system, may affect the reliability of audit information by inhibiting audit activities or modifying audit records. This control enhancement requires that privileged access be further defined between audit-related privileges and other privileges, thus limiting the users with audit-related privileges.","links":[{"href":"#ac-5","rel":"related"}]},{"id":"au-9.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-9.4_obj.1","name":"objective","props":[{"name":"label","value":"AU-9(4)[1]"}],"prose":"defines a subset of privileged users to be authorized access to management of audit functionality; and"},{"id":"au-9.4_obj.2","name":"objective","props":[{"name":"label","value":"AU-9(4)[2]"}],"prose":"authorizes access to management of audit functionality to only the organization-defined subset of privileged users."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\naccess control policy and procedures\n\nprocedures addressing protection of audit information\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation, system-generated list of privileged users with access to management of audit functionality\n\naccess authorizations\n\naccess control list\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit and accountability responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms managing access to audit functionality"}]}]}]},{"id":"au-11","class":"SP800-53","title":"Audit Record Retention","params":[{"id":"au-11_prm_1","label":"organization-defined time period consistent with records retention policy"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"AU-11"},{"name":"sort-id","value":"au-11"}],"parts":[{"id":"au-11_smt","name":"statement","prose":"The organization retains audit records for {{ insert: param, au-11_prm_1 }} to provide support for after-the-fact investigations of security incidents and to meet regulatory and organizational information retention requirements."},{"id":"au-11_gdn","name":"guidance","prose":"Organizations retain audit records until it is determined that they are no longer needed for administrative, legal, audit, or other operational purposes. This includes, for example, retention and availability of audit records relative to Freedom of Information Act (FOIA) requests, subpoenas, and law enforcement actions. Organizations develop standard categories of audit records relative to such types of actions and standard response processes for each type of action. The National Archives and Records Administration (NARA) General Records Schedules provide federal policy on record retention.","links":[{"href":"#au-4","rel":"related"},{"href":"#au-5","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#mp-6","rel":"related"}]},{"id":"au-11_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"au-11_obj.1","name":"objective","props":[{"name":"label","value":"AU-11[1]"}],"prose":"defines a time period to retain audit records that is consistent with records retention policy;"},{"id":"au-11_obj.2","name":"objective","props":[{"name":"label","value":"AU-11[2]"}],"prose":"retains audit records for the organization-defined time period consistent with records retention policy to:","parts":[{"id":"au-11_obj.2.a","name":"objective","props":[{"name":"label","value":"AU-11[2][a]"}],"prose":"provide support for after-the-fact investigations of security incidents; and"},{"id":"au-11_obj.2.b","name":"objective","props":[{"name":"label","value":"AU-11[2][b]"}],"prose":"meet regulatory and organizational information retention requirements."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\naudit record retention policy and procedures\n\nsecurity plan\n\norganization-defined retention period for audit records\n\naudit record archives\n\naudit logs\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit record retention responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]}]},{"id":"au-12","class":"SP800-53","title":"Audit Generation","params":[{"id":"au-12_prm_1","label":"organization-defined information system components"},{"id":"au-12_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"AU-12"},{"name":"sort-id","value":"au-12"}],"parts":[{"id":"au-12_smt","name":"statement","prose":"The information system:","parts":[{"id":"au-12_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Provides audit record generation capability for the auditable events defined in AU-2 a. at {{ insert: param, au-12_prm_1 }};"},{"id":"au-12_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Allows {{ insert: param, au-12_prm_2 }} to select which auditable events are to be audited by specific components of the information system; and"},{"id":"au-12_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Generates audit records for the events defined in AU-2 d. with the content defined in AU-3."}]},{"id":"au-12_gdn","name":"guidance","prose":"Audit records can be generated from many different information system components. The list of audited events is the set of events for which audits are to be generated. These events are typically a subset of all events for which the information system is capable of generating audit records.","links":[{"href":"#ac-3","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"}]},{"id":"au-12_obj","name":"objective","prose":"Determine if:","parts":[{"id":"au-12.a_obj","name":"objective","props":[{"name":"label","value":"AU-12(a)"}],"parts":[{"id":"au-12.a_obj.1","name":"objective","props":[{"name":"label","value":"AU-12(a)[1]"}],"prose":"the organization defines the information system components which are to provide audit record generation capability for the auditable events defined in AU-2a;"},{"id":"au-12.a_obj.2","name":"objective","props":[{"name":"label","value":"AU-12(a)[2]"}],"prose":"the information system provides audit record generation capability, for the auditable events defined in AU-2a, at organization-defined information system components;"}]},{"id":"au-12.b_obj","name":"objective","props":[{"name":"label","value":"AU-12(b)"}],"parts":[{"id":"au-12.b_obj.1","name":"objective","props":[{"name":"label","value":"AU-12(b)[1]"}],"prose":"the organization defines the personnel or roles allowed to select which auditable events are to be audited by specific components of the information system;"},{"id":"au-12.b_obj.2","name":"objective","props":[{"name":"label","value":"AU-12(b)[2]"}],"prose":"the information system allows the organization-defined personnel or roles to select which auditable events are to be audited by specific components of the system; and"}]},{"id":"au-12.c_obj","name":"objective","props":[{"name":"label","value":"AU-12(c)"}],"prose":"the information system generates audit records for the events defined in AU-2d with the content in defined in AU-3."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Audit and accountability policy\n\nprocedures addressing audit record generation\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of auditable events\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with audit record generation responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing audit record generation capability"}]}]}]},{"id":"ca","class":"family","title":"Security Assessment and Authorization","controls":[{"id":"ca-1","class":"SP800-53","title":"Security Assessment and Authorization Policy and Procedures","params":[{"id":"ca-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ca-1_prm_2","label":"organization-defined frequency"},{"id":"ca-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CA-1"},{"name":"sort-id","value":"ca-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ca-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ca-1_prm_1 }}:","parts":[{"id":"ca-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ca-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the security assessment and authorization policy and associated security assessment and authorization controls; and"}]},{"id":"ca-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ca-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security assessment and authorization policy {{ insert: param, ca-1_prm_2 }}; and"},{"id":"ca-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Security assessment and authorization procedures {{ insert: param, ca-1_prm_3 }}."}]}]},{"id":"ca-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the CA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ca-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-1.a_obj","name":"objective","props":[{"name":"label","value":"CA-1(a)"}],"parts":[{"id":"ca-1.a.1_obj","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)"}],"parts":[{"id":"ca-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1]"}],"prose":"develops and documents a security assessment and authorization policy that addresses:","parts":[{"id":"ca-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ca-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ca-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ca-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ca-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ca-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ca-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ca-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the security assessment and authorization policy is to be disseminated;"},{"id":"ca-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"CA-1(a)(1)[3]"}],"prose":"disseminates the security assessment and authorization policy to organization-defined personnel or roles;"}]},{"id":"ca-1.a.2_obj","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)"}],"parts":[{"id":"ca-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the security assessment and authorization policy and associated assessment and authorization controls;"},{"id":"ca-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ca-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ca-1.b_obj","name":"objective","props":[{"name":"label","value":"CA-1(b)"}],"parts":[{"id":"ca-1.b.1_obj","name":"objective","props":[{"name":"label","value":"CA-1(b)(1)"}],"parts":[{"id":"ca-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current security assessment and authorization policy;"},{"id":"ca-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(b)(1)[2]"}],"prose":"reviews and updates the current security assessment and authorization policy with the organization-defined frequency;"}]},{"id":"ca-1.b.2_obj","name":"objective","props":[{"name":"label","value":"CA-1(b)(2)"}],"parts":[{"id":"ca-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"CA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current security assessment and authorization procedures; and"},{"id":"ca-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"CA-1(b)(2)[2]"}],"prose":"reviews and updates the current security assessment and authorization procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security assessment and authorization responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ca-2","class":"SP800-53","title":"Security Assessments","params":[{"id":"ca-2_prm_1","label":"organization-defined frequency"},{"id":"ca-2_prm_2","label":"organization-defined individuals or roles"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-2"},{"name":"sort-id","value":"ca-02"}],"links":[{"href":"#c5034e0c-eba6-4ecd-a541-79f0678f4ba4","rel":"reference"},{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"}],"parts":[{"id":"ca-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a security assessment plan that describes the scope of the assessment including:","parts":[{"id":"ca-2_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security controls and control enhancements under assessment;"},{"id":"ca-2_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Assessment procedures to be used to determine security control effectiveness; and"},{"id":"ca-2_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Assessment environment, assessment team, and assessment roles and responsibilities;"}]},{"id":"ca-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Assesses the security controls in the information system and its environment of operation {{ insert: param, ca-2_prm_1 }} to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;"},{"id":"ca-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Produces a security assessment report that documents the results of the assessment; and"},{"id":"ca-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Provides the results of the security control assessment to {{ insert: param, ca-2_prm_2 }}."}]},{"id":"ca-2_gdn","name":"guidance","prose":"Organizations assess security controls in organizational information systems and the environments in which those systems operate as part of: (i) initial and ongoing security authorizations; (ii) FISMA annual assessments; (iii) continuous monitoring; and (iv) system development life cycle activities. Security assessments: (i) ensure that information security is built into organizational information systems; (ii) identify weaknesses and deficiencies early in the development process; (iii) provide essential information needed to make risk-based decisions as part of security authorization processes; and (iv) ensure compliance to vulnerability mitigation procedures. Assessments are conducted on the implemented security controls from Appendix F (main catalog) and Appendix G (Program Management controls) as documented in System Security Plans and Information Security Program Plans. Organizations can use other types of assessment activities such as vulnerability scanning and system monitoring to maintain the security posture of information systems during the entire life cycle. Security assessment reports document assessment results in sufficient detail as deemed necessary by organizations, to determine the accuracy and completeness of the reports and whether the security controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting security requirements. The FISMA requirement for assessing security controls at least annually does not require additional assessment activities to those activities already in place in organizational security authorization processes. Security assessment results are provided to the individuals or roles appropriate for the types of assessments being conducted. For example, assessments conducted in support of security authorization decisions are provided to authorizing officials or authorizing official designated representatives. To satisfy annual assessment requirements, organizations can use assessment results from the following sources: (i) initial or ongoing information system authorizations; (ii) continuous monitoring; or (iii) system development life cycle activities. Organizations ensure that security assessment results are current, relevant to the determination of security control effectiveness, and obtained with the appropriate level of assessor independence. Existing security control assessment results can be reused to the extent that the results are still valid and can also be supplemented with additional assessments as needed. Subsequent to initial authorizations and in accordance with OMB policy, organizations assess security controls during continuous monitoring. Organizations establish the frequency for ongoing security control assessments in accordance with organizational continuous monitoring strategies. Information Assurance Vulnerability Alerts provide useful examples of vulnerability mitigation procedures. External audits (e.g., audits by external entities such as regulatory agencies) are outside the scope of this control.","links":[{"href":"#ca-5","rel":"related"},{"href":"#ca-6","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-2.a_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)"}],"prose":"develops a security assessment plan that describes the scope of the assessment including:","parts":[{"id":"ca-2.a.1_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)(1)"}],"prose":"security controls and control enhancements under assessment;"},{"id":"ca-2.a.2_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)(2)"}],"prose":"assessment procedures to be used to determine security control effectiveness;"},{"id":"ca-2.a.3_obj","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)"}],"parts":[{"id":"ca-2.a.3_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)[1]"}],"prose":"assessment environment;"},{"id":"ca-2.a.3_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)[2]"}],"prose":"assessment team;"},{"id":"ca-2.a.3_obj.3","name":"objective","props":[{"name":"label","value":"CA-2(a)(3)[3]"}],"prose":"assessment roles and responsibilities;"}]}]},{"id":"ca-2.b_obj","name":"objective","props":[{"name":"label","value":"CA-2(b)"}],"parts":[{"id":"ca-2.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(b)[1]"}],"prose":"defines the frequency to assess the security controls in the information system and its environment of operation;"},{"id":"ca-2.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(b)[2]"}],"prose":"assesses the security controls in the information system with the organization-defined frequency to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;"}]},{"id":"ca-2.c_obj","name":"objective","props":[{"name":"label","value":"CA-2(c)"}],"prose":"produces a security assessment report that documents the results of the assessment;"},{"id":"ca-2.d_obj","name":"objective","props":[{"name":"label","value":"CA-2(d)"}],"parts":[{"id":"ca-2.d_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(d)[1]"}],"prose":"defines individuals or roles to whom the results of the security control assessment are to be provided; and"},{"id":"ca-2.d_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(d)[2]"}],"prose":"provides the results of the security control assessment to organization-defined individuals or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing security assessment planning\n\nprocedures addressing security assessments\n\nsecurity assessment plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security assessment responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting security assessment, security assessment plan development, and\/or security assessment reporting"}]}],"controls":[{"id":"ca-2.1","class":"SP800-53-enhancement","title":"Independent Assessors","params":[{"id":"ca-2.1_prm_1","label":"organization-defined level of independence"}],"props":[{"name":"label","value":"CA-2(1)"},{"name":"sort-id","value":"ca-02.01"}],"parts":[{"id":"ca-2.1_smt","name":"statement","prose":"The organization employs assessors or assessment teams with {{ insert: param, ca-2.1_prm_1 }} to conduct security control assessments."},{"id":"ca-2.1_gdn","name":"guidance","prose":"Independent assessors or assessment teams are individuals or groups who conduct impartial assessments of organizational information systems. Impartiality implies that assessors are free from any perceived or actual conflicts of interest with regard to the development, operation, or management of the organizational information systems under assessment or to the determination of security control effectiveness. To achieve impartiality, assessors should not: (i) create a mutual or conflicting interest with the organizations where the assessments are being conducted; (ii) assess their own work; (iii) act as management or employees of the organizations they are serving; or (iv) place themselves in positions of advocacy for the organizations acquiring their services. Independent assessments can be obtained from elements within organizations or can be contracted to public or private sector entities outside of organizations. Authorizing officials determine the required level of independence based on the security categories of information systems and\/or the ultimate risk to organizational operations, organizational assets, or individuals. Authorizing officials also determine if the level of assessor independence provides sufficient assurance that the results are sound and can be used to make credible, risk-based decisions. This includes determining whether contracted security assessment services have sufficient independence, for example, when information system owners are not directly involved in contracting processes or cannot unduly influence the impartiality of assessors conducting assessments. In special situations, for example, when organizations that own the information systems are small or organizational structures require that assessments are conducted by individuals that are in the developmental, operational, or management chain of system owners, independence in assessment processes can be achieved by ensuring that assessment results are carefully reviewed and analyzed by independent teams of experts to validate the completeness, accuracy, integrity, and reliability of the results. Organizations recognize that assessments performed for purposes other than direct support to authorization decisions are, when performed by assessors with sufficient independence, more likely to be useable for such decisions, thereby reducing the need to repeat assessments."},{"id":"ca-2.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-2.1_obj.1","name":"objective","props":[{"name":"label","value":"CA-2(1)[1]"}],"prose":"defines the level of independence to be employed to conduct security control assessments; and"},{"id":"ca-2.1_obj.2","name":"objective","props":[{"name":"label","value":"CA-2(1)[2]"}],"prose":"employs assessors or assessment teams with the organization-defined level of independence to conduct security control assessments."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing security assessments\n\nsecurity authorization package (including security plan, security assessment plan, security assessment report, plan of action and milestones, authorization statement)\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security assessment responsibilities\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"ca-3","class":"SP800-53","title":"System Interconnections","params":[{"id":"ca-3_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CA-3"},{"name":"sort-id","value":"ca-03"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#2711f068-734e-4afd-94ba-0b22247fbc88","rel":"reference"}],"parts":[{"id":"ca-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;"},{"id":"ca-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents, for each interconnection, the interface characteristics, security requirements, and the nature of the information communicated; and"},{"id":"ca-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews and updates Interconnection Security Agreements {{ insert: param, ca-3_prm_1 }}."}]},{"id":"ca-3_gdn","name":"guidance","prose":"This control applies to dedicated connections between information systems (i.e., system interconnections) and does not apply to transitory, user-controlled connections such as email and website browsing. Organizations carefully consider the risks that may be introduced when information systems are connected to other systems with different security requirements and security controls, both within organizations and external to organizations. Authorizing officials determine the risk associated with information system connections and the appropriate controls employed. If interconnecting systems have the same authorizing official, organizations do not need to develop Interconnection Security Agreements. Instead, organizations can describe the interface characteristics between those interconnecting systems in their respective security plans. If interconnecting systems have different authorizing officials within the same organization, organizations can either develop Interconnection Security Agreements or describe the interface characteristics between systems in the security plans for the respective systems. Organizations may also incorporate Interconnection Security Agreement information into formal contracts, especially for interconnections established between federal agencies and nonfederal (i.e., private sector) organizations. Risk considerations also include information systems sharing the same networks. For certain technologies (e.g., space, unmanned aerial vehicles, and medical devices), there may be specialized connections in place during preoperational testing. Such connections may require Interconnection Security Agreements and be subject to additional security controls.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#au-16","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#sa-9","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-3.a_obj","name":"objective","props":[{"name":"label","value":"CA-3(a)"}],"prose":"authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;"},{"id":"ca-3.b_obj","name":"objective","props":[{"name":"label","value":"CA-3(b)"}],"prose":"documents, for each interconnection:","parts":[{"id":"ca-3.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-3(b)[1]"}],"prose":"the interface characteristics;"},{"id":"ca-3.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-3(b)[2]"}],"prose":"the security requirements;"},{"id":"ca-3.b_obj.3","name":"objective","props":[{"name":"label","value":"CA-3(b)[3]"}],"prose":"the nature of the information communicated;"}]},{"id":"ca-3.c_obj","name":"objective","props":[{"name":"label","value":"CA-3(c)"}],"parts":[{"id":"ca-3.c_obj.1","name":"objective","props":[{"name":"label","value":"CA-3(c)[1]"}],"prose":"defines the frequency to review and update Interconnection Security Agreements; and"},{"id":"ca-3.c_obj.2","name":"objective","props":[{"name":"label","value":"CA-3(c)[2]"}],"prose":"reviews and updates Interconnection Security Agreements with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing information system connections\n\nsystem and communications protection policy\n\ninformation system Interconnection Security Agreements\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for developing, implementing, or approving information system interconnection agreements\n\norganizational personnel with information security responsibilities\n\npersonnel managing the system(s) to which the Interconnection Security Agreement applies"}]}],"controls":[{"id":"ca-3.5","class":"SP800-53-enhancement","title":"Restrictions On External System Connections","params":[{"id":"ca-3.5_prm_1","select":{"choice":["allow-all, deny-by-exception","deny-all, permit-by-exception"]}},{"id":"ca-3.5_prm_2","label":"organization-defined information systems"}],"props":[{"name":"label","value":"CA-3(5)"},{"name":"sort-id","value":"ca-03.05"}],"parts":[{"id":"ca-3.5_smt","name":"statement","prose":"The organization employs {{ insert: param, ca-3.5_prm_1 }} policy for allowing {{ insert: param, ca-3.5_prm_2 }} to connect to external information systems."},{"id":"ca-3.5_gdn","name":"guidance","prose":"Organizations can constrain information system connectivity to external domains (e.g., websites) by employing one of two policies with regard to such connectivity: (i) allow-all, deny by exception, also known as blacklisting (the weaker of the two policies); or (ii) deny-all, allow by exception, also known as whitelisting (the stronger of the two policies). For either policy, organizations determine what exceptions, if any, are acceptable.","links":[{"href":"#cm-7","rel":"related"}]},{"id":"ca-3.5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-3.5_obj.1","name":"objective","props":[{"name":"label","value":"CA-3(5)[1]"}],"prose":"defines information systems to be allowed to connect to external information systems;"},{"id":"ca-3.5_obj.2","name":"objective","props":[{"name":"label","value":"CA-3(5)[2]"}],"prose":"employs one of the following policies for allowing organization-defined information systems to connect to external information systems:","parts":[{"id":"ca-3.5_obj.2.a","name":"objective","props":[{"name":"label","value":"CA-3(5)[2][a]"}],"prose":"allow-all policy;"},{"id":"ca-3.5_obj.2.b","name":"objective","props":[{"name":"label","value":"CA-3(5)[2][b]"}],"prose":"deny-by-exception policy;"},{"id":"ca-3.5_obj.2.c","name":"objective","props":[{"name":"label","value":"CA-3(5)[2][c]"}],"prose":"deny-all policy; or"},{"id":"ca-3.5_obj.2.d","name":"objective","props":[{"name":"label","value":"CA-3(5)[2][d]"}],"prose":"permit-by-exception policy."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing information system connections\n\nsystem and communications protection policy\n\ninformation system interconnection agreements\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity assessment report\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for managing connections to external information systems\n\nnetwork administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing restrictions on external system connections"}]}]}]},{"id":"ca-5","class":"SP800-53","title":"Plan of Action and Milestones","params":[{"id":"ca-5_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"CA-5"},{"name":"sort-id","value":"ca-05"}],"links":[{"href":"#2c5884cd-7b96-425c-862a-99877e1cf909","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"}],"parts":[{"id":"ca-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a plan of action and milestones for the information system to document the organization’s planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls and to reduce or eliminate known vulnerabilities in the system; and"},{"id":"ca-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Updates existing plan of action and milestones {{ insert: param, ca-5_prm_1 }} based on the findings from security controls assessments, security impact analyses, and continuous monitoring activities."}]},{"id":"ca-5_gdn","name":"guidance","prose":"Plans of action and milestones are key documents in security authorization packages and are subject to federal reporting requirements established by OMB.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#pm-4","rel":"related"}]},{"id":"ca-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-5.a_obj","name":"objective","props":[{"name":"label","value":"CA-5(a)"}],"prose":"develops a plan of action and milestones for the information system to:","parts":[{"id":"ca-5.a_obj.1","name":"objective","props":[{"name":"label","value":"CA-5(a)[1]"}],"prose":"document the organization’s planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls;"},{"id":"ca-5.a_obj.2","name":"objective","props":[{"name":"label","value":"CA-5(a)[2]"}],"prose":"reduce or eliminate known vulnerabilities in the system;"}]},{"id":"ca-5.b_obj","name":"objective","props":[{"name":"label","value":"CA-5(b)"}],"parts":[{"id":"ca-5.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-5(b)[1]"}],"prose":"defines the frequency to update the existing plan of action and milestones;"},{"id":"ca-5.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-5(b)[2]"}],"prose":"updates the existing plan of action and milestones with the organization-defined frequency based on the findings from:","parts":[{"id":"ca-5.b_obj.2.a","name":"objective","props":[{"name":"label","value":"CA-5(b)[2][a]"}],"prose":"security controls assessments;"},{"id":"ca-5.b_obj.2.b","name":"objective","props":[{"name":"label","value":"CA-5(b)[2][b]"}],"prose":"security impact analyses; and"},{"id":"ca-5.b_obj.2.c","name":"objective","props":[{"name":"label","value":"CA-5(b)[2][c]"}],"prose":"continuous monitoring activities."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing plan of action and milestones\n\nsecurity plan\n\nsecurity assessment plan\n\nsecurity assessment report\n\nsecurity assessment evidence\n\nplan of action and milestones\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with plan of action and milestones development and implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms for developing, implementing, and maintaining plan of action and milestones"}]}]},{"id":"ca-6","class":"SP800-53","title":"Security Authorization","params":[{"id":"ca-6_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-6"},{"name":"sort-id","value":"ca-06"}],"links":[{"href":"#9f77f845-e3ea-4ca4-b2c0-aa9eedc214ab","rel":"reference"},{"href":"#bedb15b7-ec5c-4a68-807f-385125751fcd","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"}],"parts":[{"id":"ca-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Assigns a senior-level executive or manager as the authorizing official for the information system;"},{"id":"ca-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Ensures that the authorizing official authorizes the information system for processing before commencing operations; and"},{"id":"ca-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Updates the security authorization {{ insert: param, ca-6_prm_1 }}."}]},{"id":"ca-6_gdn","name":"guidance","prose":"Security authorizations are official management decisions, conveyed through authorization decision documents, by senior organizational officials or executives (i.e., authorizing officials) to authorize operation of information systems and to explicitly accept the risk to organizational operations and assets, individuals, other organizations, and the Nation based on the implementation of agreed-upon security controls. Authorizing officials provide budgetary oversight for organizational information systems or assume responsibility for the mission\/business operations supported by those systems. The security authorization process is an inherently federal responsibility and therefore, authorizing officials must be federal employees. Through the security authorization process, authorizing officials assume responsibility and are accountable for security risks associated with the operation and use of organizational information systems. Accordingly, authorizing officials are in positions with levels of authority commensurate with understanding and accepting such information security-related risks. OMB policy requires that organizations conduct ongoing authorizations of information systems by implementing continuous monitoring programs. Continuous monitoring programs can satisfy three-year reauthorization requirements, so separate reauthorization processes are not necessary. Through the employment of comprehensive continuous monitoring processes, critical information contained in authorization packages (i.e., security plans, security assessment reports, and plans of action and milestones) is updated on an ongoing basis, providing authorizing officials and information system owners with an up-to-date status of the security state of organizational information systems and environments of operation. To reduce the administrative cost of security reauthorization, authorizing officials use the results of continuous monitoring processes to the maximum extent possible as the basis for rendering reauthorization decisions.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#pm-10","rel":"related"}]},{"id":"ca-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-6.a_obj","name":"objective","props":[{"name":"label","value":"CA-6(a)"}],"prose":"assigns a senior-level executive or manager as the authorizing official for the information system;"},{"id":"ca-6.b_obj","name":"objective","props":[{"name":"label","value":"CA-6(b)"}],"prose":"ensures that the authorizing official authorizes the information system for processing before commencing operations;"},{"id":"ca-6.c_obj","name":"objective","props":[{"name":"label","value":"CA-6(c)"}],"parts":[{"id":"ca-6.c_obj.1","name":"objective","props":[{"name":"label","value":"CA-6(c)[1]"}],"prose":"defines the frequency to update the security authorization; and"},{"id":"ca-6.c_obj.2","name":"objective","props":[{"name":"label","value":"CA-6(c)[2]"}],"prose":"updates the security authorization with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing security authorization\n\nsecurity authorization package (including security plan\n\nsecurity assessment report\n\nplan of action and milestones\n\nauthorization statement)\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security authorization responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms that facilitate security authorizations and updates"}]}]},{"id":"ca-7","class":"SP800-53","title":"Continuous Monitoring","params":[{"id":"ca-7_prm_1","label":"organization-defined metrics"},{"id":"ca-7_prm_2","label":"organization-defined frequencies"},{"id":"ca-7_prm_3","label":"organization-defined frequencies"},{"id":"ca-7_prm_4","label":"organization-defined personnel or roles"},{"id":"ca-7_prm_5","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-7"},{"name":"sort-id","value":"ca-07"}],"links":[{"href":"#bedb15b7-ec5c-4a68-807f-385125751fcd","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"},{"href":"#8ade2fbe-e468-4ca8-9a40-54d7f23c32bb","rel":"reference"},{"href":"#2d8b14e9-c8b5-4d3d-8bdc-155078f3281b","rel":"reference"}],"parts":[{"id":"ca-7_smt","name":"statement","prose":"The organization develops a continuous monitoring strategy and implements a continuous monitoring program that includes:","parts":[{"id":"ca-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishment of {{ insert: param, ca-7_prm_1 }} to be monitored;"},{"id":"ca-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishment of {{ insert: param, ca-7_prm_2 }} for monitoring and {{ insert: param, ca-7_prm_3 }} for assessments supporting such monitoring;"},{"id":"ca-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ongoing security control assessments in accordance with the organizational continuous monitoring strategy;"},{"id":"ca-7_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;"},{"id":"ca-7_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Correlation and analysis of security-related information generated by assessments and monitoring;"},{"id":"ca-7_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Response actions to address results of the analysis of security-related information; and"},{"id":"ca-7_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Reporting the security status of organization and the information system to {{ insert: param, ca-7_prm_4 }} {{ insert: param, ca-7_prm_5 }}."}]},{"id":"ca-7_gdn","name":"guidance","prose":"Continuous monitoring programs facilitate ongoing awareness of threats, vulnerabilities, and information security to support organizational risk management decisions. The terms continuous and ongoing imply that organizations assess\/analyze security controls and information security-related risks at a frequency sufficient to support organizational risk-based decisions. The results of continuous monitoring programs generate appropriate risk response actions by organizations. Continuous monitoring programs also allow organizations to maintain the security authorizations of information systems and common controls over time in highly dynamic environments of operation with changing mission\/business needs, threats, vulnerabilities, and technologies. Having access to security-related information on a continuing basis through reports\/dashboards gives organizational officials the capability to make more effective and timely risk management decisions, including ongoing security authorization decisions. Automation supports more frequent updates to security authorization packages, hardware\/software\/firmware inventories, and other system information. Effectiveness is further enhanced when continuous monitoring outputs are formatted to provide information that is specific, measurable, actionable, relevant, and timely. Continuous monitoring activities are scaled in accordance with the security categories of information systems.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-5","rel":"related"},{"href":"#ca-6","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#pm-6","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-2","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-7.a_obj","name":"objective","props":[{"name":"label","value":"CA-7(a)"}],"parts":[{"id":"ca-7.a_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(a)[1]"}],"prose":"develops a continuous monitoring strategy that defines metrics to be monitored;"},{"id":"ca-7.a_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(a)[2]"}],"prose":"develops a continuous monitoring strategy that includes monitoring of organization-defined metrics;"},{"id":"ca-7.a_obj.3","name":"objective","props":[{"name":"label","value":"CA-7(a)[3]"}],"prose":"implements a continuous monitoring program that includes monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.b_obj","name":"objective","props":[{"name":"label","value":"CA-7(b)"}],"parts":[{"id":"ca-7.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(b)[1]"}],"prose":"develops a continuous monitoring strategy that defines frequencies for monitoring;"},{"id":"ca-7.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(b)[2]"}],"prose":"defines frequencies for assessments supporting monitoring;"},{"id":"ca-7.b_obj.3","name":"objective","props":[{"name":"label","value":"CA-7(b)[3]"}],"prose":"develops a continuous monitoring strategy that includes establishment of the organization-defined frequencies for monitoring and for assessments supporting monitoring;"},{"id":"ca-7.b_obj.4","name":"objective","props":[{"name":"label","value":"CA-7(b)[4]"}],"prose":"implements a continuous monitoring program that includes establishment of organization-defined frequencies for monitoring and for assessments supporting such monitoring in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.c_obj","name":"objective","props":[{"name":"label","value":"CA-7(c)"}],"parts":[{"id":"ca-7.c_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(c)[1]"}],"prose":"develops a continuous monitoring strategy that includes ongoing security control assessments;"},{"id":"ca-7.c_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(c)[2]"}],"prose":"implements a continuous monitoring program that includes ongoing security control assessments in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.d_obj","name":"objective","props":[{"name":"label","value":"CA-7(d)"}],"parts":[{"id":"ca-7.d_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(d)[1]"}],"prose":"develops a continuous monitoring strategy that includes ongoing security status monitoring of organization-defined metrics;"},{"id":"ca-7.d_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(d)[2]"}],"prose":"implements a continuous monitoring program that includes ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.e_obj","name":"objective","props":[{"name":"label","value":"CA-7(e)"}],"parts":[{"id":"ca-7.e_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(e)[1]"}],"prose":"develops a continuous monitoring strategy that includes correlation and analysis of security-related information generated by assessments and monitoring;"},{"id":"ca-7.e_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(e)[2]"}],"prose":"implements a continuous monitoring program that includes correlation and analysis of security-related information generated by assessments and monitoring in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.f_obj","name":"objective","props":[{"name":"label","value":"CA-7(f)"}],"parts":[{"id":"ca-7.f_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(f)[1]"}],"prose":"develops a continuous monitoring strategy that includes response actions to address results of the analysis of security-related information;"},{"id":"ca-7.f_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(f)[2]"}],"prose":"implements a continuous monitoring program that includes response actions to address results of the analysis of security-related information in accordance with the organizational continuous monitoring strategy;"}]},{"id":"ca-7.g_obj","name":"objective","props":[{"name":"label","value":"CA-7(g)"}],"parts":[{"id":"ca-7.g_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(g)[1]"}],"prose":"develops a continuous monitoring strategy that defines the personnel or roles to whom the security status of the organization and information system are to be reported;"},{"id":"ca-7.g_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(g)[2]"}],"prose":"develops a continuous monitoring strategy that defines the frequency to report the security status of the organization and information system to organization-defined personnel or roles;"},{"id":"ca-7.g_obj.3","name":"objective","props":[{"name":"label","value":"CA-7(g)[3]"}],"prose":"develops a continuous monitoring strategy that includes reporting the security status of the organization or information system to organizational-defined personnel or roles with the organization-defined frequency; and"},{"id":"ca-7.g_obj.4","name":"objective","props":[{"name":"label","value":"CA-7(g)[4]"}],"prose":"implements a continuous monitoring program that includes reporting the security status of the organization and information system to organization-defined personnel or roles with the organization-defined frequency in accordance with the organizational continuous monitoring strategy."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing continuous monitoring of information system security controls\n\nprocedures addressing configuration management\n\nsecurity plan\n\nsecurity assessment report\n\nplan of action and milestones\n\ninformation system monitoring records\n\nconfiguration management records, security impact analyses\n\nstatus reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with continuous monitoring responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Mechanisms implementing continuous monitoring"}]}],"controls":[{"id":"ca-7.1","class":"SP800-53-enhancement","title":"Independent Assessment","params":[{"id":"ca-7.1_prm_1","label":"organization-defined level of independence"}],"props":[{"name":"label","value":"CA-7(1)"},{"name":"sort-id","value":"ca-07.01"}],"parts":[{"id":"ca-7.1_smt","name":"statement","prose":"The organization employs assessors or assessment teams with {{ insert: param, ca-7.1_prm_1 }} to monitor the security controls in the information system on an ongoing basis."},{"id":"ca-7.1_gdn","name":"guidance","prose":"Organizations can maximize the value of assessments of security controls during the continuous monitoring process by requiring that such assessments be conducted by assessors or assessment teams with appropriate levels of independence based on continuous monitoring strategies. Assessor independence provides a degree of impartiality to the monitoring process. To achieve such impartiality, assessors should not: (i) create a mutual or conflicting interest with the organizations where the assessments are being conducted; (ii) assess their own work; (iii) act as management or employees of the organizations they are serving; or (iv) place themselves in advocacy positions for the organizations acquiring their services."},{"id":"ca-7.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-7.1_obj.1","name":"objective","props":[{"name":"label","value":"CA-7(1)[1]"}],"prose":"defines a level of independence to be employed to monitor the security controls in the information system on an ongoing basis; and"},{"id":"ca-7.1_obj.2","name":"objective","props":[{"name":"label","value":"CA-7(1)[2]"}],"prose":"employs assessors or assessment teams with the organization-defined level of independence to monitor the security controls in the information system on an ongoing basis."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security assessment and authorization policy\n\nprocedures addressing continuous monitoring of information system security controls\n\nsecurity plan\n\nsecurity assessment report\n\nplan of action and milestones\n\ninformation system monitoring records\n\nsecurity impact analyses\n\nstatus reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with continuous monitoring responsibilities\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"ca-9","class":"SP800-53","title":"Internal System Connections","params":[{"id":"ca-9_prm_1","label":"organization-defined information system components or classes of components"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CA-9"},{"name":"sort-id","value":"ca-09"}],"parts":[{"id":"ca-9_smt","name":"statement","prose":"The organization:","parts":[{"id":"ca-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Authorizes internal connections of {{ insert: param, ca-9_prm_1 }} to the information system; and"},{"id":"ca-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents, for each internal connection, the interface characteristics, security requirements, and the nature of the information communicated."}]},{"id":"ca-9_gdn","name":"guidance","prose":"This control applies to connections between organizational information systems and (separate) constituent system components (i.e., intra-system connections) including, for example, system connections with mobile devices, notebook\/desktop computers, printers, copiers, facsimile machines, scanners, sensors, and servers. Instead of authorizing each individual internal connection, organizations can authorize internal connections for a class of components with common characteristics and\/or configurations, for example, all digital printers, scanners, and copiers with a specified processing, storage, and transmission capability or all smart phones with a specific baseline configuration.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"ca-9_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ca-9.a_obj","name":"objective","props":[{"name":"label","value":"CA-9(a)"}],"parts":[{"id":"ca-9.a_obj.1","name":"objective","props":[{"name":"label","value":"CA-9(a)[1]"}],"prose":"defines information system components or classes of components to be authorized as internal connections to the information system;"},{"id":"ca-9.a_obj.2","name":"objective","props":[{"name":"label","value":"CA-9(a)[2]"}],"prose":"authorizes internal connections of organization-defined information system components or classes of components to the information system;"}]},{"id":"ca-9.b_obj","name":"objective","props":[{"name":"label","value":"CA-9(b)"}],"prose":"documents, for each internal connection:","parts":[{"id":"ca-9.b_obj.1","name":"objective","props":[{"name":"label","value":"CA-9(b)[1]"}],"prose":"the interface characteristics;"},{"id":"ca-9.b_obj.2","name":"objective","props":[{"name":"label","value":"CA-9(b)[2]"}],"prose":"the security requirements; and"},{"id":"ca-9.b_obj.3","name":"objective","props":[{"name":"label","value":"CA-9(b)[3]"}],"prose":"the nature of the information communicated."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Access control policy\n\nprocedures addressing information system connections\n\nsystem and communications protection policy\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of components or classes of components authorized as internal system connections\n\nsecurity assessment report\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for developing, implementing, or authorizing internal system connections\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"cm","class":"family","title":"Configuration Management","controls":[{"id":"cm-1","class":"SP800-53","title":"Configuration Management Policy and Procedures","params":[{"id":"cm-1_prm_1","label":"organization-defined personnel or roles"},{"id":"cm-1_prm_2","label":"organization-defined frequency"},{"id":"cm-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-1"},{"name":"sort-id","value":"cm-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"cm-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, cm-1_prm_1 }}:","parts":[{"id":"cm-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"cm-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the configuration management policy and associated configuration management controls; and"}]},{"id":"cm-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"cm-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Configuration management policy {{ insert: param, cm-1_prm_2 }}; and"},{"id":"cm-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Configuration management procedures {{ insert: param, cm-1_prm_3 }}."}]}]},{"id":"cm-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the CM family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"cm-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-1.a_obj","name":"objective","props":[{"name":"label","value":"CM-1(a)"}],"parts":[{"id":"cm-1.a.1_obj","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)"}],"parts":[{"id":"cm-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1]"}],"prose":"develops and documents a configuration management policy that addresses:","parts":[{"id":"cm-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"cm-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"cm-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"cm-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"cm-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"cm-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"cm-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"cm-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the configuration management policy is to be disseminated;"},{"id":"cm-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"CM-1(a)(1)[3]"}],"prose":"disseminates the configuration management policy to organization-defined personnel or roles;"}]},{"id":"cm-1.a.2_obj","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)"}],"parts":[{"id":"cm-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the configuration management policy and associated configuration management controls;"},{"id":"cm-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"cm-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CM-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"cm-1.b_obj","name":"objective","props":[{"name":"label","value":"CM-1(b)"}],"parts":[{"id":"cm-1.b.1_obj","name":"objective","props":[{"name":"label","value":"CM-1(b)(1)"}],"parts":[{"id":"cm-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current configuration management policy;"},{"id":"cm-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(b)(1)[2]"}],"prose":"reviews and updates the current configuration management policy with the organization-defined frequency;"}]},{"id":"cm-1.b.2_obj","name":"objective","props":[{"name":"label","value":"CM-1(b)(2)"}],"parts":[{"id":"cm-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current configuration management procedures; and"},{"id":"cm-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-1(b)(2)[2]"}],"prose":"reviews and updates the current configuration management procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]}]},{"id":"cm-2","class":"SP800-53","title":"Baseline Configuration","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-2"},{"name":"sort-id","value":"cm-02"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-2_smt","name":"statement","prose":"The organization develops, documents, and maintains under configuration control, a current baseline configuration of the information system."},{"id":"cm-2_gdn","name":"guidance","prose":"This control establishes baseline configurations for information systems and system components including communications and connectivity-related aspects of systems. Baseline configurations are documented, formally reviewed and agreed-upon sets of specifications for information systems or configuration items within those systems. Baseline configurations serve as a basis for future builds, releases, and\/or changes to information systems. Baseline configurations include information about information system components (e.g., standard software packages installed on workstations, notebook computers, servers, network components, or mobile devices; current version numbers and patch information on operating systems and applications; and configuration settings\/parameters), network topology, and the logical placement of those components within the system architecture. Maintaining baseline configurations requires creating new baselines as organizational information systems change over time. Baseline configurations of information systems reflect the current enterprise architecture.","links":[{"href":"#cm-3","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#pm-5","rel":"related"},{"href":"#pm-7","rel":"related"}]},{"id":"cm-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-2_obj.1","name":"objective","props":[{"name":"label","value":"CM-2[1]"}],"prose":"develops and documents a current baseline configuration of the information system; and"},{"id":"cm-2_obj.2","name":"objective","props":[{"name":"label","value":"CM-2[2]"}],"prose":"maintains, under configuration control, a current baseline configuration of the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing the baseline configuration of the information system\n\nconfiguration management plan\n\nenterprise architecture documentation\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nchange control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing baseline configurations\n\nautomated mechanisms supporting configuration control of the baseline configuration"}]}],"controls":[{"id":"cm-2.1","class":"SP800-53-enhancement","title":"Reviews and Updates","params":[{"id":"cm-2.1_prm_1","label":"organization-defined frequency"},{"id":"cm-2.1_prm_2","label":"Assignment organization-defined circumstances"}],"props":[{"name":"label","value":"CM-2(1)"},{"name":"sort-id","value":"cm-02.01"}],"parts":[{"id":"cm-2.1_smt","name":"statement","prose":"The organization reviews and updates the baseline configuration of the information system:","parts":[{"id":"cm-2.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":" {{ insert: param, cm-2.1_prm_1 }};"},{"id":"cm-2.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"When required due to {{ insert: param, cm-2.1_prm_2 }}; and"},{"id":"cm-2.1_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"As an integral part of information system component installations and upgrades."}]},{"id":"cm-2.1_gdn","name":"guidance","links":[{"href":"#cm-5","rel":"related"}]},{"id":"cm-2.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-2.1.a_obj","name":"objective","props":[{"name":"label","value":"CM-2(1)(a)"}],"parts":[{"id":"cm-2.1.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(1)(a)[1]"}],"prose":"defines the frequency to review and update the baseline configuration of the information system;"},{"id":"cm-2.1.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(1)(a)[2]"}],"prose":"reviews and updates the baseline configuration of the information system with the organization-defined frequency;"}],"links":[{"href":"#cm-2.1_smt.a","rel":"corresp"}]},{"id":"cm-2.1.b_obj","name":"objective","props":[{"name":"label","value":"CM-2(1)(b)"}],"parts":[{"id":"cm-2.1.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(1)(b)[1]"}],"prose":"defines circumstances that require the baseline configuration of the information system to be reviewed and updated;"},{"id":"cm-2.1.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(1)(b)[2]"}],"prose":"reviews and updates the baseline configuration of the information system when required due to organization-defined circumstances; and"}],"links":[{"href":"#cm-2.1_smt.b","rel":"corresp"}]},{"id":"cm-2.1.c_obj","name":"objective","props":[{"name":"label","value":"CM-2(1)(c)"}],"prose":"reviews and updates the baseline configuration of the information system as an integral part of information system component installations and upgrades.","links":[{"href":"#cm-2.1_smt.c","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nconfiguration management plan\n\nprocedures addressing the baseline configuration of the information system\n\nprocedures addressing information system component installations and upgrades\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nrecords of information system baseline configuration reviews and updates\n\ninformation system component installations\/upgrades and associated records\n\nchange control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing baseline configurations\n\nautomated mechanisms supporting review and update of the baseline configuration"}]}]},{"id":"cm-2.3","class":"SP800-53-enhancement","title":"Retention of Previous Configurations","params":[{"id":"cm-2.3_prm_1","label":"organization-defined previous versions of baseline configurations of the information system"}],"props":[{"name":"label","value":"CM-2(3)"},{"name":"sort-id","value":"cm-02.03"}],"parts":[{"id":"cm-2.3_smt","name":"statement","prose":"The organization retains {{ insert: param, cm-2.3_prm_1 }} to support rollback."},{"id":"cm-2.3_gdn","name":"guidance","prose":"Retaining previous versions of baseline configurations to support rollback may include, for example, hardware, software, firmware, configuration files, and configuration records."},{"id":"cm-2.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-2.3_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(3)[1]"}],"prose":"defines previous versions of baseline configurations of the information system to be retained to support rollback; and"},{"id":"cm-2.3_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(3)[2]"}],"prose":"retains organization-defined previous versions of baseline configurations of the information system to support rollback."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing the baseline configuration of the information system\n\nconfiguration management plan\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\ncopies of previous baseline configuration versions\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing baseline configurations"}]}]},{"id":"cm-2.7","class":"SP800-53-enhancement","title":"Configure Systems, Components, or Devices for High-risk Areas","params":[{"id":"cm-2.7_prm_1","label":"organization-defined information systems, system components, or devices"},{"id":"cm-2.7_prm_2","label":"organization-defined configurations"},{"id":"cm-2.7_prm_3","label":"organization-defined security safeguards"}],"props":[{"name":"label","value":"CM-2(7)"},{"name":"sort-id","value":"cm-02.07"}],"parts":[{"id":"cm-2.7_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-2.7_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Issues {{ insert: param, cm-2.7_prm_1 }} with {{ insert: param, cm-2.7_prm_2 }} to individuals traveling to locations that the organization deems to be of significant risk; and"},{"id":"cm-2.7_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Applies {{ insert: param, cm-2.7_prm_3 }} to the devices when the individuals return."}]},{"id":"cm-2.7_gdn","name":"guidance","prose":"When it is known that information systems, system components, or devices (e.g., notebook computers, mobile devices) will be located in high-risk areas, additional security controls may be implemented to counter the greater threat in such areas coupled with the lack of physical security relative to organizational-controlled areas. For example, organizational policies and procedures for notebook computers used by individuals departing on and returning from travel include, for example, determining which locations are of concern, defining required configurations for the devices, ensuring that the devices are configured as intended before travel is initiated, and applying specific safeguards to the device after travel is completed. Specially configured notebook computers include, for example, computers with sanitized hard drives, limited applications, and additional hardening (e.g., more stringent configuration settings). Specified safeguards applied to mobile devices upon return from travel include, for example, examining the device for signs of physical tampering and purging\/reimaging the hard disk drive. Protecting information residing on mobile devices is covered in the media protection family."},{"id":"cm-2.7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-2.7.a_obj","name":"objective","props":[{"name":"label","value":"CM-2(7)(a)"}],"parts":[{"id":"cm-2.7.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(7)(a)[1]"}],"prose":"defines information systems, system components, or devices to be issued to individuals traveling to locations that the organization deems to be of significant risk;"},{"id":"cm-2.7.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(7)(a)[2]"}],"prose":"defines configurations to be employed on organization-defined information systems, system components, or devices issued to individuals traveling to such locations;"},{"id":"cm-2.7.a_obj.3","name":"objective","props":[{"name":"label","value":"CM-2(7)(a)[3]"}],"prose":"issues organization-defined information systems, system components, or devices with organization-defined configurations to individuals traveling to locations that the organization deems to be of significant risk;"}],"links":[{"href":"#cm-2.7_smt.a","rel":"corresp"}]},{"id":"cm-2.7.b_obj","name":"objective","props":[{"name":"label","value":"CM-2(7)(b)"}],"parts":[{"id":"cm-2.7.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-2(7)(b)[1]"}],"prose":"defines security safeguards to be applied to the devices when the individuals return; and"},{"id":"cm-2.7.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-2(7)(b)[2]"}],"prose":"applies organization-defined safeguards to the devices when the individuals return."}],"links":[{"href":"#cm-2.7_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nconfiguration management plan\n\nprocedures addressing the baseline configuration of the information system\n\nprocedures addressing information system component installations and upgrades\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nrecords of information system baseline configuration reviews and updates\n\ninformation system component installations\/upgrades and associated records\n\nchange control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing baseline configurations"}]}]}]},{"id":"cm-3","class":"SP800-53","title":"Configuration Change Control","params":[{"id":"cm-3_prm_1","label":"organization-defined time period"},{"id":"cm-3_prm_2","label":"organization-defined configuration change control element (e.g., committee, board)"},{"id":"cm-3_prm_3","select":{"how-many":"one-or-more","choice":[" {{ insert: param, cm-3_prm_4 }} "," {{ insert: param, cm-3_prm_5 }} "]}},{"id":"cm-3_prm_4","depends-on":"cm-3_prm_3","label":"organization-defined frequency"},{"id":"cm-3_prm_5","depends-on":"cm-3_prm_3","label":"organization-defined configuration change conditions"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-3"},{"name":"sort-id","value":"cm-03"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Determines the types of changes to the information system that are configuration-controlled;"},{"id":"cm-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews proposed configuration-controlled changes to the information system and approves or disapproves such changes with explicit consideration for security impact analyses;"},{"id":"cm-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Documents configuration change decisions associated with the information system;"},{"id":"cm-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Implements approved configuration-controlled changes to the information system;"},{"id":"cm-3_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Retains records of configuration-controlled changes to the information system for {{ insert: param, cm-3_prm_1 }};"},{"id":"cm-3_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Audits and reviews activities associated with configuration-controlled changes to the information system; and"},{"id":"cm-3_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Coordinates and provides oversight for configuration change control activities through {{ insert: param, cm-3_prm_2 }} that convenes {{ insert: param, cm-3_prm_3 }}."}]},{"id":"cm-3_gdn","name":"guidance","prose":"Configuration change controls for organizational information systems involve the systematic proposal, justification, implementation, testing, review, and disposition of changes to the systems, including system upgrades and modifications. Configuration change control includes changes to baseline configurations for components and configuration items of information systems, changes to configuration settings for information technology products (e.g., operating systems, applications, firewalls, routers, and mobile devices), unscheduled\/unauthorized changes, and changes to remediate vulnerabilities. Typical processes for managing configuration changes to information systems include, for example, Configuration Control Boards that approve proposed changes to systems. For new development information systems or systems undergoing major upgrades, organizations consider including representatives from development organizations on the Configuration Control Boards. Auditing of changes includes activities before and after changes are made to organizational information systems and the auditing activities required to implement such changes.","links":[{"href":"#ca-7","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#si-2","rel":"related"},{"href":"#si-12","rel":"related"}]},{"id":"cm-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-3.a_obj","name":"objective","props":[{"name":"label","value":"CM-3(a)"}],"prose":"determines the type of changes to the information system that must be configuration-controlled;"},{"id":"cm-3.b_obj","name":"objective","props":[{"name":"label","value":"CM-3(b)"}],"prose":"reviews proposed configuration-controlled changes to the information system and approves or disapproves such changes with explicit consideration for security impact analyses;"},{"id":"cm-3.c_obj","name":"objective","props":[{"name":"label","value":"CM-3(c)"}],"prose":"documents configuration change decisions associated with the information system;"},{"id":"cm-3.d_obj","name":"objective","props":[{"name":"label","value":"CM-3(d)"}],"prose":"implements approved configuration-controlled changes to the information system;"},{"id":"cm-3.e_obj","name":"objective","props":[{"name":"label","value":"CM-3(e)"}],"parts":[{"id":"cm-3.e_obj.1","name":"objective","props":[{"name":"label","value":"CM-3(e)[1]"}],"prose":"defines a time period to retain records of configuration-controlled changes to the information system;"},{"id":"cm-3.e_obj.2","name":"objective","props":[{"name":"label","value":"CM-3(e)[2]"}],"prose":"retains records of configuration-controlled changes to the information system for the organization-defined time period;"}]},{"id":"cm-3.f_obj","name":"objective","props":[{"name":"label","value":"CM-3(f)"}],"prose":"audits and reviews activities associated with configuration-controlled changes to the information system;"},{"id":"cm-3.g_obj","name":"objective","props":[{"name":"label","value":"CM-3(g)"}],"parts":[{"id":"cm-3.g_obj.1","name":"objective","props":[{"name":"label","value":"CM-3(g)[1]"}],"prose":"defines a configuration change control element (e.g., committee, board) responsible for coordinating and providing oversight for configuration change control activities;"},{"id":"cm-3.g_obj.2","name":"objective","props":[{"name":"label","value":"CM-3(g)[2]"}],"prose":"defines the frequency with which the configuration change control element must convene; and\/or"},{"id":"cm-3.g_obj.3","name":"objective","props":[{"name":"label","value":"CM-3(g)[3]"}],"prose":"defines configuration change conditions that prompt the configuration change control element to convene; and"},{"id":"cm-3.g_obj.4","name":"objective","props":[{"name":"label","value":"CM-3(g)[4]"}],"prose":"coordinates and provides oversight for configuration change control activities through organization-defined configuration change control element that convenes at organization-defined frequency and\/or for any organization-defined configuration change conditions."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system configuration change control\n\nconfiguration management plan\n\ninformation system architecture and configuration documentation\n\nsecurity plan\n\nchange control records\n\ninformation system audit records\n\nchange control audit and review reports\n\nagenda \/minutes from configuration change control oversight meetings\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration change control responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nmembers of change control board or similar"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for configuration change control\n\nautomated mechanisms that implement configuration change control"}]}],"controls":[{"id":"cm-3.2","class":"SP800-53-enhancement","title":"Test \/ Validate \/ Document Changes","props":[{"name":"label","value":"CM-3(2)"},{"name":"sort-id","value":"cm-03.02"}],"parts":[{"id":"cm-3.2_smt","name":"statement","prose":"The organization tests, validates, and documents changes to the information system before implementing the changes on the operational system."},{"id":"cm-3.2_gdn","name":"guidance","prose":"Changes to information systems include modifications to hardware, software, or firmware components and configuration settings defined in CM-6. Organizations ensure that testing does not interfere with information system operations. Individuals\/groups conducting tests understand organizational security policies and procedures, information system security policies and procedures, and the specific health, safety, and environmental risks associated with particular facilities\/processes. Operational systems may need to be taken off-line, or replicated to the extent feasible, before testing can be conducted. If information systems must be taken off-line for testing, the tests are scheduled to occur during planned system outages whenever possible. If testing cannot be conducted on operational systems, organizations employ compensating controls (e.g., testing on replicated systems)."},{"id":"cm-3.2_obj","name":"objective","prose":"Determine if the organization, before implementing changes on the operational system:","parts":[{"id":"cm-3.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-3(2)[1]"}],"prose":"tests changes to the information system;"},{"id":"cm-3.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-3(2)[2]"}],"prose":"validates changes to the information system; and"},{"id":"cm-3.2_obj.3","name":"objective","props":[{"name":"label","value":"CM-3(2)[3]"}],"prose":"documents changes to the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nconfiguration management plan\n\nprocedures addressing information system configuration change control\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\ntest records\n\nvalidation records\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with configuration change control responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for configuration change control\n\nautomated mechanisms supporting and\/or implementing testing, validating, and documenting information system changes"}]}]}]},{"id":"cm-4","class":"SP800-53","title":"Security Impact Analysis","props":[{"name":"priority","value":"P2"},{"name":"label","value":"CM-4"},{"name":"sort-id","value":"cm-04"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-4_smt","name":"statement","prose":"The organization analyzes changes to the information system to determine potential security impacts prior to change implementation."},{"id":"cm-4_gdn","name":"guidance","prose":"Organizational personnel with information security responsibilities (e.g., Information System Administrators, Information System Security Officers, Information System Security Managers, and Information System Security Engineers) conduct security impact analyses. Individuals conducting security impact analyses possess the necessary skills\/technical expertise to analyze the changes to information systems and the associated security ramifications. Security impact analysis may include, for example, reviewing security plans to understand security control requirements and reviewing system design documentation to understand control implementation and how specific changes might affect the controls. Security impact analyses may also include assessments of risk to better understand the impact of the changes and to determine if additional security controls are required. Security impact analyses are scaled in accordance with the security categories of the information systems.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"cm-4_obj","name":"objective","prose":"Determine if the organization analyzes changes to the information system to determine potential security impacts prior to change implementation."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing security impact analysis for changes to the information system\n\nconfiguration management plan\n\nsecurity impact analysis documentation\n\nanalysis tools and associated outputs\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for conducting security impact analysis\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security impact analysis"}]}]},{"id":"cm-5","class":"SP800-53","title":"Access Restrictions for Change","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-5"},{"name":"sort-id","value":"cm-05"}],"parts":[{"id":"cm-5_smt","name":"statement","prose":"The organization defines, documents, approves, and enforces physical and logical access restrictions associated with changes to the information system."},{"id":"cm-5_gdn","name":"guidance","prose":"Any changes to the hardware, software, and\/or firmware components of information systems can potentially have significant effects on the overall security of the systems. Therefore, organizations permit only qualified and authorized individuals to access information systems for purposes of initiating changes, including upgrades and modifications. Organizations maintain records of access to ensure that configuration change control is implemented and to support after-the-fact actions should organizations discover any unauthorized changes. Access restrictions for change also include software libraries. Access restrictions include, for example, physical and logical access controls (see AC-3 and PE-3), workflow automation, media libraries, abstract layers (e.g., changes implemented into third-party interfaces rather than directly into information systems), and change windows (e.g., changes occur only during specified times, making unauthorized changes easy to discover).","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#pe-3","rel":"related"}]},{"id":"cm-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-5_obj.1","name":"objective","props":[{"name":"label","value":"CM-5[1]"}],"prose":"defines physical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.2","name":"objective","props":[{"name":"label","value":"CM-5[2]"}],"prose":"documents physical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.3","name":"objective","props":[{"name":"label","value":"CM-5[3]"}],"prose":"approves physical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.4","name":"objective","props":[{"name":"label","value":"CM-5[4]"}],"prose":"enforces physical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.5","name":"objective","props":[{"name":"label","value":"CM-5[5]"}],"prose":"defines logical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.6","name":"objective","props":[{"name":"label","value":"CM-5[6]"}],"prose":"documents logical access restrictions associated with changes to the information system;"},{"id":"cm-5_obj.7","name":"objective","props":[{"name":"label","value":"CM-5[7]"}],"prose":"approves logical access restrictions associated with changes to the information system; and"},{"id":"cm-5_obj.8","name":"objective","props":[{"name":"label","value":"CM-5[8]"}],"prose":"enforces logical access restrictions associated with changes to the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing access restrictions for changes to the information system\n\nconfiguration management plan\n\ninformation system design documentation\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nlogical access approvals\n\nphysical access approvals\n\naccess credentials\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with logical access control responsibilities\n\norganizational personnel with physical access control responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing access restrictions to change\n\nautomated mechanisms supporting\/implementing\/enforcing access restrictions associated with changes to the information system"}]}]},{"id":"cm-6","class":"SP800-53","title":"Configuration Settings","params":[{"id":"cm-6_prm_1","label":"organization-defined security configuration checklists"},{"id":"cm-6_prm_2","label":"organization-defined information system components"},{"id":"cm-6_prm_3","label":"organization-defined operational requirements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-6"},{"name":"sort-id","value":"cm-06"}],"links":[{"href":"#990268bf-f4a9-4c81-91ae-dc7d3115f4b1","rel":"reference"},{"href":"#0b3d8ba9-051f-498d-81ea-97f0f018c612","rel":"reference"},{"href":"#0916ef02-3618-411b-a525-565c088849a6","rel":"reference"},{"href":"#84a37532-6db6-477b-9ea8-f9085ebca0fc","rel":"reference"},{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"},{"href":"#275cc052-0f7f-423c-bdb6-ed503dc36228","rel":"reference"},{"href":"#e95dd121-2733-413e-bf1e-f1eb49f20a98","rel":"reference"},{"href":"#647b6de3-81d0-4d22-bec1-5f1333e34380","rel":"reference"}],"parts":[{"id":"cm-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes and documents configuration settings for information technology products employed within the information system using {{ insert: param, cm-6_prm_1 }} that reflect the most restrictive mode consistent with operational requirements;"},{"id":"cm-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Implements the configuration settings;"},{"id":"cm-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Identifies, documents, and approves any deviations from established configuration settings for {{ insert: param, cm-6_prm_2 }} based on {{ insert: param, cm-6_prm_3 }}; and"},{"id":"cm-6_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Monitors and controls changes to the configuration settings in accordance with organizational policies and procedures."}]},{"id":"cm-6_gdn","name":"guidance","prose":"Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the information system that affect the security posture and\/or functionality of the system. Information technology products for which security-related configuration settings can be defined include, for example, mainframe computers, servers (e.g., database, electronic mail, authentication, web, proxy, file, domain name), workstations, input\/output devices (e.g., scanners, copiers, and printers), network components (e.g., firewalls, routers, gateways, voice and data switches, wireless access points, network appliances, sensors), operating systems, middleware, and applications. Security-related parameters are those parameters impacting the security state of information systems including the parameters required to satisfy other security control requirements. Security-related parameters include, for example: (i) registry settings; (ii) account, file, directory permission settings; and (iii) settings for functions, ports, protocols, services, and remote connections. Organizations establish organization-wide configuration settings and subsequently derive specific settings for information systems. The established settings become part of the systems configuration baseline. Common secure configurations (also referred to as security configuration checklists, lockdown and hardening guides, security reference guides, security technical implementation guides) provide recognized, standardized, and established benchmarks that stipulate secure configuration settings for specific information technology platforms\/products and instructions for configuring those information system components to meet operational requirements. Common secure configurations can be developed by a variety of organizations including, for example, information technology product developers, manufacturers, vendors, consortia, academia, industry, federal agencies, and other organizations in the public and private sectors. Common secure configurations include the United States Government Configuration Baseline (USGCB) which affects the implementation of CM-6 and other controls such as AC-19 and CM-7. The Security Content Automation Protocol (SCAP) and the defined standards within the protocol (e.g., Common Configuration Enumeration) provide an effective method to uniquely identify, track, and control configuration settings. OMB establishes federal policy on configuration requirements for federal information systems.","links":[{"href":"#ac-19","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"cm-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-6.a_obj","name":"objective","props":[{"name":"label","value":"CM-6(a)"}],"parts":[{"id":"cm-6.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(a)[1]"}],"prose":"defines security configuration checklists to be used to establish and document configuration settings for the information technology products employed;"},{"id":"cm-6.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(a)[2]"}],"prose":"ensures the defined security configuration checklists reflect the most restrictive mode consistent with operational requirements;"},{"id":"cm-6.a_obj.3","name":"objective","props":[{"name":"label","value":"CM-6(a)[3]"}],"prose":"establishes and documents configuration settings for information technology products employed within the information system using organization-defined security configuration checklists;"}]},{"id":"cm-6.b_obj","name":"objective","props":[{"name":"label","value":"CM-6(b)"}],"prose":"implements the configuration settings established\/documented in CM-6(a);;"},{"id":"cm-6.c_obj","name":"objective","props":[{"name":"label","value":"CM-6(c)"}],"parts":[{"id":"cm-6.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(c)[1]"}],"prose":"defines information system components for which any deviations from established configuration settings must be:","parts":[{"id":"cm-6.c_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-6(c)[1][a]"}],"prose":"identified;"},{"id":"cm-6.c_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-6(c)[1][b]"}],"prose":"documented;"},{"id":"cm-6.c_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-6(c)[1][c]"}],"prose":"approved;"}]},{"id":"cm-6.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(c)[2]"}],"prose":"defines operational requirements to support:","parts":[{"id":"cm-6.c_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-6(c)[2][a]"}],"prose":"the identification of any deviations from established configuration settings;"},{"id":"cm-6.c_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-6(c)[2][b]"}],"prose":"the documentation of any deviations from established configuration settings;"},{"id":"cm-6.c_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-6(c)[2][c]"}],"prose":"the approval of any deviations from established configuration settings;"}]},{"id":"cm-6.c_obj.3","name":"objective","props":[{"name":"label","value":"CM-6(c)[3]"}],"prose":"identifies any deviations from established configuration settings for organization-defined information system components based on organizational-defined operational requirements;"},{"id":"cm-6.c_obj.4","name":"objective","props":[{"name":"label","value":"CM-6(c)[4]"}],"prose":"documents any deviations from established configuration settings for organization-defined information system components based on organizational-defined operational requirements;"},{"id":"cm-6.c_obj.5","name":"objective","props":[{"name":"label","value":"CM-6(c)[5]"}],"prose":"approves any deviations from established configuration settings for organization-defined information system components based on organizational-defined operational requirements;"}]},{"id":"cm-6.d_obj","name":"objective","props":[{"name":"label","value":"CM-6(d)"}],"parts":[{"id":"cm-6.d_obj.1","name":"objective","props":[{"name":"label","value":"CM-6(d)[1]"}],"prose":"monitors changes to the configuration settings in accordance with organizational policies and procedures; and"},{"id":"cm-6.d_obj.2","name":"objective","props":[{"name":"label","value":"CM-6(d)[2]"}],"prose":"controls changes to the configuration settings in accordance with organizational policies and procedures."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing configuration settings for the information system\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity configuration checklists\n\nevidence supporting approved deviations from established configuration settings\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing configuration settings\n\nautomated mechanisms that implement, monitor, and\/or control information system configuration settings\n\nautomated mechanisms that identify and\/or document deviations from established configuration settings"}]}]},{"id":"cm-7","class":"SP800-53","title":"Least Functionality","params":[{"id":"cm-7_prm_1","label":"organization-defined prohibited or restricted functions, ports, protocols, and\/or services"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-7"},{"name":"sort-id","value":"cm-07"}],"links":[{"href":"#e42b2099-3e1c-415b-952c-61c96533c12e","rel":"reference"}],"parts":[{"id":"cm-7_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Configures the information system to provide only essential capabilities; and"},{"id":"cm-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Prohibits or restricts the use of the following functions, ports, protocols, and\/or services: {{ insert: param, cm-7_prm_1 }}."}]},{"id":"cm-7_gdn","name":"guidance","prose":"Information systems can provide a wide variety of functions and services. Some of the functions and services, provided by default, may not be necessary to support essential organizational operations (e.g., key missions, functions). Additionally, it is sometimes convenient to provide multiple services from single information system components, but doing so increases risk over limiting the services provided by any one component. Where feasible, organizations limit component functionality to a single function per device (e.g., email servers or web servers, but not both). Organizations review functions and services provided by information systems or individual components of information systems, to determine which functions and services are candidates for elimination (e.g., Voice Over Internet Protocol, Instant Messaging, auto-execute, and file sharing). Organizations consider disabling unused or unnecessary physical and logical ports\/protocols (e.g., Universal Serial Bus, File Transfer Protocol, and Hyper Text Transfer Protocol) on information systems to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling. Organizations can utilize network scanning tools, intrusion detection and prevention systems, and end-point protections such as firewalls and host-based intrusion detection systems to identify and prevent the use of prohibited functions, ports, protocols, and services.","links":[{"href":"#ac-6","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"cm-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-7.a_obj","name":"objective","props":[{"name":"label","value":"CM-7(a)"}],"prose":"configures the information system to provide only essential capabilities;"},{"id":"cm-7.b_obj","name":"objective","props":[{"name":"label","value":"CM-7(b)"}],"parts":[{"id":"cm-7.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(b)[1]"}],"prose":"defines prohibited or restricted:","parts":[{"id":"cm-7.b_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][a]"}],"prose":"functions;"},{"id":"cm-7.b_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][b]"}],"prose":"ports;"},{"id":"cm-7.b_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.b_obj.1.d","name":"objective","props":[{"name":"label","value":"CM-7(b)[1][d]"}],"prose":"services;"}]},{"id":"cm-7.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(b)[2]"}],"prose":"prohibits or restricts the use of organization-defined:","parts":[{"id":"cm-7.b_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][a]"}],"prose":"functions;"},{"id":"cm-7.b_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][b]"}],"prose":"ports;"},{"id":"cm-7.b_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.b_obj.2.d","name":"objective","props":[{"name":"label","value":"CM-7(b)[2][d]"}],"prose":"services."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nconfiguration management plan\n\nprocedures addressing least functionality in the information system\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity configuration checklists\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security configuration management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes prohibiting or restricting functions, ports, protocols, and\/or services\n\nautomated mechanisms implementing restrictions or prohibition of functions, ports, protocols, and\/or services"}]}],"controls":[{"id":"cm-7.1","class":"SP800-53-enhancement","title":"Periodic Review","params":[{"id":"cm-7.1_prm_1","label":"organization-defined frequency"},{"id":"cm-7.1_prm_2","label":"organization-defined functions, ports, protocols, and services within the information system deemed to be unnecessary and\/or nonsecure"}],"props":[{"name":"label","value":"CM-7(1)"},{"name":"sort-id","value":"cm-07.01"}],"parts":[{"id":"cm-7.1_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-7.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Reviews the information system {{ insert: param, cm-7.1_prm_1 }} to identify unnecessary and\/or nonsecure functions, ports, protocols, and services; and"},{"id":"cm-7.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Disables {{ insert: param, cm-7.1_prm_2 }}."}]},{"id":"cm-7.1_gdn","name":"guidance","prose":"The organization can either make a determination of the relative security of the function, port, protocol, and\/or service or base the security decision on the assessment of other entities. Bluetooth, FTP, and peer-to-peer networking are examples of less than secure protocols.","links":[{"href":"#ac-18","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#ia-2","rel":"related"}]},{"id":"cm-7.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-7.1.a_obj","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)"}],"parts":[{"id":"cm-7.1.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[1]"}],"prose":"defines the frequency to review the information system to identify unnecessary and\/or nonsecure:","parts":[{"id":"cm-7.1.a_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[1][a]"}],"prose":"functions;"},{"id":"cm-7.1.a_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[1][b]"}],"prose":"ports;"},{"id":"cm-7.1.a_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[1][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.1.a_obj.1.d","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[1][d]"}],"prose":"services;"}]},{"id":"cm-7.1.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[2]"}],"prose":"reviews the information system with the organization-defined frequency to identify unnecessary and\/or nonsecure:","parts":[{"id":"cm-7.1.a_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[2][a]"}],"prose":"functions;"},{"id":"cm-7.1.a_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[2][b]"}],"prose":"ports;"},{"id":"cm-7.1.a_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[2][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.1.a_obj.2.d","name":"objective","props":[{"name":"label","value":"CM-7(1)(a)[2][d]"}],"prose":"services;"}]}],"links":[{"href":"#cm-7.1_smt.a","rel":"corresp"}]},{"id":"cm-7.1.b_obj","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)"}],"parts":[{"id":"cm-7.1.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[1]"}],"prose":"defines, within the information system, unnecessary and\/or nonsecure:","parts":[{"id":"cm-7.1.b_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[1][a]"}],"prose":"functions;"},{"id":"cm-7.1.b_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[1][b]"}],"prose":"ports;"},{"id":"cm-7.1.b_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[1][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.1.b_obj.1.d","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[1][d]"}],"prose":"services;"}]},{"id":"cm-7.1.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[2]"}],"prose":"disables organization-defined unnecessary and\/or nonsecure:","parts":[{"id":"cm-7.1.b_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[2][a]"}],"prose":"functions;"},{"id":"cm-7.1.b_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[2][b]"}],"prose":"ports;"},{"id":"cm-7.1.b_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[2][c]"}],"prose":"protocols; and\/or"},{"id":"cm-7.1.b_obj.2.d","name":"objective","props":[{"name":"label","value":"CM-7(1)(b)[2][d]"}],"prose":"services."}]}],"links":[{"href":"#cm-7.1_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing least functionality in the information system\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nsecurity configuration checklists\n\ndocumented reviews of functions, ports, protocols, and\/or services\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for reviewing functions, ports, protocols, and services on the information system\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for reviewing\/disabling nonsecure functions, ports, protocols, and\/or services\n\nautomated mechanisms implementing review and disabling of nonsecure functions, ports, protocols, and\/or services"}]}]},{"id":"cm-7.2","class":"SP800-53-enhancement","title":"Prevent Program Execution","params":[{"id":"cm-7.2_prm_1","select":{"how-many":"one-or-more","choice":[" {{ insert: param, cm-7.2_prm_2 }} ","rules authorizing the terms and conditions of software program usage"]}},{"id":"cm-7.2_prm_2","depends-on":"cm-7.2_prm_1","label":"organization-defined policies regarding software program usage and restrictions"}],"props":[{"name":"label","value":"CM-7(2)"},{"name":"sort-id","value":"cm-07.02"}],"parts":[{"id":"cm-7.2_smt","name":"statement","prose":"The information system prevents program execution in accordance with {{ insert: param, cm-7.2_prm_1 }}."},{"id":"cm-7.2_gdn","name":"guidance","links":[{"href":"#cm-8","rel":"related"},{"href":"#pm-5","rel":"related"}]},{"id":"cm-7.2_obj","name":"objective","prose":"Determine if:","parts":[{"id":"cm-7.2_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(2)[1]"}],"prose":"the organization defines policies regarding software program usage and restrictions;"},{"id":"cm-7.2_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(2)[2]"}],"prose":"the information system prevents program execution in accordance with one or more of the following:","parts":[{"id":"cm-7.2_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-7(2)[2][a]"}],"prose":"organization-defined policies regarding program usage and restrictions; and\/or"},{"id":"cm-7.2_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-7(2)[2][b]"}],"prose":"rules authorizing the terms and conditions of software program usage."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing least functionality in the information system\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\nspecifications for preventing software program execution\n\ninformation system configuration settings and associated documentation\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes preventing program execution on the information system\n\norganizational processes for software program usage and restrictions\n\nautomated mechanisms preventing program execution on the information system\n\nautomated mechanisms supporting and\/or implementing software program usage and restrictions"}]}]},{"id":"cm-7.4","class":"SP800-53-enhancement","title":"Unauthorized Software \/ Blacklisting","params":[{"id":"cm-7.4_prm_1","label":"organization-defined software programs not authorized to execute on the information system"},{"id":"cm-7.4_prm_2","label":"organization-defined frequency"}],"props":[{"name":"label","value":"CM-7(4)"},{"name":"sort-id","value":"cm-07.04"}],"parts":[{"id":"cm-7.4_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-7.4_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Identifies {{ insert: param, cm-7.4_prm_1 }};"},{"id":"cm-7.4_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Employs an allow-all, deny-by-exception policy to prohibit the execution of unauthorized software programs on the information system; and"},{"id":"cm-7.4_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Reviews and updates the list of unauthorized software programs {{ insert: param, cm-7.4_prm_2 }}."}]},{"id":"cm-7.4_gdn","name":"guidance","prose":"The process used to identify software programs that are not authorized to execute on organizational information systems is commonly referred to as blacklisting. Organizations can implement CM-7 (5) instead of this control enhancement if whitelisting (the stronger of the two policies) is the preferred approach for restricting software program execution.","links":[{"href":"#cm-6","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#pm-5","rel":"related"}]},{"id":"cm-7.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-7.4.a_obj","name":"objective","props":[{"name":"label","value":"CM-7(4)(a)"}],"prose":"Identifies\/defines software programs not authorized to execute on the information system;","links":[{"href":"#cm-7.4_smt.a","rel":"corresp"}]},{"id":"cm-7.4.b_obj","name":"objective","props":[{"name":"label","value":"CM-7(4)(b)"}],"prose":"employs an allow-all, deny-by-exception policy to prohibit the execution of unauthorized software programs on the information system;","links":[{"href":"#cm-7.4_smt.b","rel":"corresp"}]},{"id":"cm-7.4.c_obj","name":"objective","props":[{"name":"label","value":"CM-7(4)(c)"}],"parts":[{"id":"cm-7.4.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-7(4)(c)[1]"}],"prose":"defines the frequency to review and update the list of unauthorized software programs on the information system; and"},{"id":"cm-7.4.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-7(4)(c)[2]"}],"prose":"reviews and updates the list of unauthorized software programs with the organization-defined frequency."}],"links":[{"href":"#cm-7.4_smt.c","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing least functionality in the information system\n\nconfiguration management plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of software programs not authorized to execute on the information system\n\nsecurity configuration checklists\n\nreview and update records associated with list of unauthorized software programs\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for identifying software not authorized to execute on the information system\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for identifying, reviewing, and updating programs not authorized to execute on the information system\n\norganizational process for implementing blacklisting\n\nautomated mechanisms supporting and\/or implementing blacklisting"}]}]}]},{"id":"cm-8","class":"SP800-53","title":"Information System Component Inventory","params":[{"id":"cm-8_prm_1","label":"organization-defined information deemed necessary to achieve effective information system component accountability"},{"id":"cm-8_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-8"},{"name":"sort-id","value":"cm-08"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops and documents an inventory of information system components that:","parts":[{"id":"cm-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Accurately reflects the current information system;"},{"id":"cm-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Includes all components within the authorization boundary of the information system;"},{"id":"cm-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Is at the level of granularity deemed necessary for tracking and reporting; and"},{"id":"cm-8_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Includes {{ insert: param, cm-8_prm_1 }}; and"}]},{"id":"cm-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the information system component inventory {{ insert: param, cm-8_prm_2 }}."}]},{"id":"cm-8_gdn","name":"guidance","prose":"Organizations may choose to implement centralized information system component inventories that include components from all organizational information systems. In such situations, organizations ensure that the resulting inventories include system-specific information required for proper component accountability (e.g., information system association, information system owner). Information deemed necessary for effective accountability of information system components includes, for example, hardware inventory specifications, software license information, software version numbers, component owners, and for networked components or devices, machine names and network addresses. Inventory specifications include, for example, manufacturer, device type, model, serial number, and physical location.","links":[{"href":"#cm-2","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#pm-5","rel":"related"}]},{"id":"cm-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-8.a_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)"}],"parts":[{"id":"cm-8.a.1_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(1)"}],"prose":"develops and documents an inventory of information system components that accurately reflects the current information system;"},{"id":"cm-8.a.2_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(2)"}],"prose":"develops and documents an inventory of information system components that includes all components within the authorization boundary of the information system;"},{"id":"cm-8.a.3_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(3)"}],"prose":"develops and documents an inventory of information system components that is at the level of granularity deemed necessary for tracking and reporting;"},{"id":"cm-8.a.4_obj","name":"objective","props":[{"name":"label","value":"CM-8(a)(4)"}],"parts":[{"id":"cm-8.a.4_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(a)(4)[1]"}],"prose":"defines the information deemed necessary to achieve effective information system component accountability;"},{"id":"cm-8.a.4_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(a)(4)[2]"}],"prose":"develops and documents an inventory of information system components that includes organization-defined information deemed necessary to achieve effective information system component accountability;"}]}]},{"id":"cm-8.b_obj","name":"objective","props":[{"name":"label","value":"CM-8(b)"}],"parts":[{"id":"cm-8.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(b)[1]"}],"prose":"defines the frequency to review and update the information system component inventory; and"},{"id":"cm-8.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(b)[2]"}],"prose":"reviews and updates the information system component inventory with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system component inventory\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system inventory records\n\ninventory reviews and update records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for information system component inventory\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for developing and documenting an inventory of information system components\n\nautomated mechanisms supporting and\/or implementing the information system component inventory"}]}],"controls":[{"id":"cm-8.1","class":"SP800-53-enhancement","title":"Updates During Installations \/ Removals","props":[{"name":"label","value":"CM-8(1)"},{"name":"sort-id","value":"cm-08.01"}],"parts":[{"id":"cm-8.1_smt","name":"statement","prose":"The organization updates the inventory of information system components as an integral part of component installations, removals, and information system updates."},{"id":"cm-8.1_obj","name":"objective","prose":"Determine if the organization updates the inventory of information system components as an integral part of:","parts":[{"id":"cm-8.1_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(1)[1]"}],"prose":"component installations;"},{"id":"cm-8.1_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(1)[2]"}],"prose":"component removals; and"},{"id":"cm-8.1_obj.3","name":"objective","props":[{"name":"label","value":"CM-8(1)[3]"}],"prose":"information system updates."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system component inventory\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system inventory records\n\ninventory reviews and update records\n\ncomponent installation records\n\ncomponent removal records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for updating the information system component inventory\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for updating inventory of information system components\n\nautomated mechanisms implementing updating of the information system component inventory"}]}]},{"id":"cm-8.3","class":"SP800-53-enhancement","title":"Automated Unauthorized Component Detection","params":[{"id":"cm-8.3_prm_1","label":"organization-defined frequency"},{"id":"cm-8.3_prm_2","select":{"how-many":"one-or-more","choice":["disables network access by such components","isolates the components","notifies {{ insert: param, cm-8.3_prm_3 }} "]}},{"id":"cm-8.3_prm_3","depends-on":"cm-8.3_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"CM-8(3)"},{"name":"sort-id","value":"cm-08.03"}],"parts":[{"id":"cm-8.3_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-8.3_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Employs automated mechanisms {{ insert: param, cm-8.3_prm_1 }} to detect the presence of unauthorized hardware, software, and firmware components within the information system; and"},{"id":"cm-8.3_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Takes the following actions when unauthorized components are detected: {{ insert: param, cm-8.3_prm_2 }}."}]},{"id":"cm-8.3_gdn","name":"guidance","prose":"This control enhancement is applied in addition to the monitoring for unauthorized remote connections and mobile devices. Monitoring for unauthorized system components may be accomplished on an ongoing basis or by the periodic scanning of systems for that purpose. Automated mechanisms can be implemented within information systems or in other separate devices. Isolation can be achieved, for example, by placing unauthorized information system components in separate domains or subnets or otherwise quarantining such components. This type of component isolation is commonly referred to as sandboxing.","links":[{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"},{"href":"#ra-5","rel":"related"}]},{"id":"cm-8.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-8.3.a_obj","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)"}],"parts":[{"id":"cm-8.3.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[1]"}],"prose":"defines the frequency to employ automated mechanisms to detect the presence of unauthorized:","parts":[{"id":"cm-8.3.a_obj.1.a","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[1][a]"}],"prose":"hardware components within the information system;"},{"id":"cm-8.3.a_obj.1.b","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[1][b]"}],"prose":"software components within the information system;"},{"id":"cm-8.3.a_obj.1.c","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[1][c]"}],"prose":"firmware components within the information system;"}]},{"id":"cm-8.3.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[2]"}],"prose":"employs automated mechanisms with the organization-defined frequency to detect the presence of unauthorized:","parts":[{"id":"cm-8.3.a_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[2][a]"}],"prose":"hardware components within the information system;"},{"id":"cm-8.3.a_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[2][b]"}],"prose":"software components within the information system;"},{"id":"cm-8.3.a_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-8(3)(a)[2][c]"}],"prose":"firmware components within the information system;"}]}],"links":[{"href":"#cm-8.3_smt.a","rel":"corresp"}]},{"id":"cm-8.3.b_obj","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)"}],"parts":[{"id":"cm-8.3.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)[1]"}],"prose":"defines personnel or roles to be notified when unauthorized components are detected;"},{"id":"cm-8.3.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)[2]"}],"prose":"takes one or more of the following actions when unauthorized components are detected:","parts":[{"id":"cm-8.3.b_obj.2.a","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)[2][a]"}],"prose":"disables network access by such components;"},{"id":"cm-8.3.b_obj.2.b","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)[2][b]"}],"prose":"isolates the components; and\/or"},{"id":"cm-8.3.b_obj.2.c","name":"objective","props":[{"name":"label","value":"CM-8(3)(b)[2][c]"}],"prose":"notifies organization-defined personnel or roles."}]}],"links":[{"href":"#cm-8.3_smt.b","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system component inventory\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system inventory records\n\nalerts\/notifications of unauthorized components within the information system\n\ninformation system monitoring records\n\nchange control records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for managing the automated mechanisms implementing unauthorized information system component detection\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for detection of unauthorized information system components\n\nautomated mechanisms implementing the detection of unauthorized information system components"}]}]},{"id":"cm-8.5","class":"SP800-53-enhancement","title":"No Duplicate Accounting of Components","props":[{"name":"label","value":"CM-8(5)"},{"name":"sort-id","value":"cm-08.05"}],"parts":[{"id":"cm-8.5_smt","name":"statement","prose":"The organization verifies that all components within the authorization boundary of the information system are not duplicated in other information system component inventories."},{"id":"cm-8.5_gdn","name":"guidance","prose":"This control enhancement addresses the potential problem of duplicate accounting of information system components in large or complex interconnected systems."},{"id":"cm-8.5_obj","name":"objective","prose":"Determine if the organization verifies that all components within the authorization boundary of the information system are not duplicated in other information system inventories."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing information system component inventory\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system inventory records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system inventory responsibilities\n\norganizational personnel with responsibilities for defining information system components within the authorization boundary of the system\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for maintaining the inventory of information system components\n\nautomated mechanisms implementing the information system component inventory"}]}]}]},{"id":"cm-9","class":"SP800-53","title":"Configuration Management Plan","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-9"},{"name":"sort-id","value":"cm-09"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"cm-9_smt","name":"statement","prose":"The organization develops, documents, and implements a configuration management plan for the information system that:","parts":[{"id":"cm-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Addresses roles, responsibilities, and configuration management processes and procedures;"},{"id":"cm-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishes a process for identifying configuration items throughout the system development life cycle and for managing the configuration of the configuration items;"},{"id":"cm-9_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Defines the configuration items for the information system and places the configuration items under configuration management; and"},{"id":"cm-9_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects the configuration management plan from unauthorized disclosure and modification."}]},{"id":"cm-9_gdn","name":"guidance","prose":"Configuration management plans satisfy the requirements in configuration management policies while being tailored to individual information systems. Such plans define detailed processes and procedures for how configuration management is used to support system development life cycle activities at the information system level. Configuration management plans are typically developed during the development\/acquisition phase of the system development life cycle. The plans describe how to move changes through change management processes, how to update configuration settings and baselines, how to maintain information system component inventories, how to control development, test, and operational environments, and how to develop, release, and update key documents. Organizations can employ templates to help ensure consistent and timely development and implementation of configuration management plans. Such templates can represent a master configuration management plan for the organization at large with subsets of the plan implemented on a system by system basis. Configuration management approval processes include designation of key management stakeholders responsible for reviewing and approving proposed changes to information systems, and personnel that conduct security impact analyses prior to the implementation of changes to the systems. Configuration items are the information system items (hardware, software, firmware, and documentation) to be configuration-managed. As information systems continue through the system development life cycle, new configuration items may be identified and some existing configuration items may no longer need to be under configuration control.","links":[{"href":"#cm-2","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#sa-10","rel":"related"}]},{"id":"cm-9_obj","name":"objective","prose":"Determine if the organization develops, documents, and implements a configuration management plan for the information system that:","parts":[{"id":"cm-9.a_obj","name":"objective","props":[{"name":"label","value":"CM-9(a)"}],"parts":[{"id":"cm-9.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-9(a)[1]"}],"prose":"addresses roles;"},{"id":"cm-9.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-9(a)[2]"}],"prose":"addresses responsibilities;"},{"id":"cm-9.a_obj.3","name":"objective","props":[{"name":"label","value":"CM-9(a)[3]"}],"prose":"addresses configuration management processes and procedures;"}]},{"id":"cm-9.b_obj","name":"objective","props":[{"name":"label","value":"CM-9(b)"}],"prose":"establishes a process for:","parts":[{"id":"cm-9.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-9(b)[1]"}],"prose":"identifying configuration items throughout the SDLC;"},{"id":"cm-9.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-9(b)[2]"}],"prose":"managing the configuration of the configuration items;"}]},{"id":"cm-9.c_obj","name":"objective","props":[{"name":"label","value":"CM-9(c)"}],"parts":[{"id":"cm-9.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-9(c)[1]"}],"prose":"defines the configuration items for the information system;"},{"id":"cm-9.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-9(c)[2]"}],"prose":"places the configuration items under configuration management;"}]},{"id":"cm-9.d_obj","name":"objective","props":[{"name":"label","value":"CM-9(d)"}],"prose":"protects the configuration management plan from unauthorized:","parts":[{"id":"cm-9.d_obj.1","name":"objective","props":[{"name":"label","value":"CM-9(d)[1]"}],"prose":"disclosure; and"},{"id":"cm-9.d_obj.2","name":"objective","props":[{"name":"label","value":"CM-9(d)[2]"}],"prose":"modification."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing configuration management planning\n\nconfiguration management plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for developing the configuration management plan\n\norganizational personnel with responsibilities for implementing and managing processes defined in the configuration management plan\n\norganizational personnel with responsibilities for protecting the configuration management plan\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for developing and documenting the configuration management plan\n\norganizational processes for identifying and managing configuration items\n\norganizational processes for protecting the configuration management plan\n\nautomated mechanisms implementing the configuration management plan\n\nautomated mechanisms for managing configuration items\n\nautomated mechanisms for protecting the configuration management plan"}]}]},{"id":"cm-10","class":"SP800-53","title":"Software Usage Restrictions","props":[{"name":"priority","value":"P2"},{"name":"label","value":"CM-10"},{"name":"sort-id","value":"cm-10"}],"parts":[{"id":"cm-10_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-10_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Uses software and associated documentation in accordance with contract agreements and copyright laws;"},{"id":"cm-10_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Tracks the use of software and associated documentation protected by quantity licenses to control copying and distribution; and"},{"id":"cm-10_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Controls and documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work."}]},{"id":"cm-10_gdn","name":"guidance","prose":"Software license tracking can be accomplished by manual methods (e.g., simple spreadsheets) or automated methods (e.g., specialized tracking applications) depending on organizational needs.","links":[{"href":"#ac-17","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"cm-10_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-10.a_obj","name":"objective","props":[{"name":"label","value":"CM-10(a)"}],"prose":"uses software and associated documentation in accordance with contract agreements and copyright laws;"},{"id":"cm-10.b_obj","name":"objective","props":[{"name":"label","value":"CM-10(b)"}],"prose":"tracks the use of software and associated documentation protected by quantity licenses to control copying and distribution; and"},{"id":"cm-10.c_obj","name":"objective","props":[{"name":"label","value":"CM-10(c)"}],"prose":"controls and documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing software usage restrictions\n\nconfiguration management plan\n\nsecurity plan\n\nsoftware contract agreements and copyright laws\n\nsite license documentation\n\nlist of software usage restrictions\n\nsoftware license tracking reports\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\norganizational personnel operating, using, and\/or maintaining the information system\n\norganizational personnel with software license management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for tracking the use of software protected by quantity licenses\n\norganization process for controlling\/documenting the use of peer-to-peer file sharing technology\n\nautomated mechanisms implementing software license tracking\n\nautomated mechanisms implementing and controlling the use of peer-to-peer files sharing technology"}]}]},{"id":"cm-11","class":"SP800-53","title":"User-installed Software","params":[{"id":"cm-11_prm_1","label":"organization-defined policies"},{"id":"cm-11_prm_2","label":"organization-defined methods"},{"id":"cm-11_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CM-11"},{"name":"sort-id","value":"cm-11"}],"parts":[{"id":"cm-11_smt","name":"statement","prose":"The organization:","parts":[{"id":"cm-11_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes {{ insert: param, cm-11_prm_1 }} governing the installation of software by users;"},{"id":"cm-11_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Enforces software installation policies through {{ insert: param, cm-11_prm_2 }}; and"},{"id":"cm-11_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Monitors policy compliance at {{ insert: param, cm-11_prm_3 }}."}]},{"id":"cm-11_gdn","name":"guidance","prose":"If provided the necessary privileges, users have the ability to install software in organizational information systems. To maintain control over the types of software installed, organizations identify permitted and prohibited actions regarding software installation. Permitted software installations may include, for example, updates and security patches to existing software and downloading applications from organization-approved “app stores” Prohibited software installations may include, for example, software with unknown or suspect pedigrees or software that organizations consider potentially malicious. The policies organizations select governing user-installed software may be organization-developed or provided by some external entity. Policy enforcement methods include procedural methods (e.g., periodic examination of user accounts), automated methods (e.g., configuration settings implemented on organizational information systems), or both.","links":[{"href":"#ac-3","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#pl-4","rel":"related"}]},{"id":"cm-11_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cm-11.a_obj","name":"objective","props":[{"name":"label","value":"CM-11(a)"}],"parts":[{"id":"cm-11.a_obj.1","name":"objective","props":[{"name":"label","value":"CM-11(a)[1]"}],"prose":"defines policies to govern the installation of software by users;"},{"id":"cm-11.a_obj.2","name":"objective","props":[{"name":"label","value":"CM-11(a)[2]"}],"prose":"establishes organization-defined policies governing the installation of software by users;"}]},{"id":"cm-11.b_obj","name":"objective","props":[{"name":"label","value":"CM-11(b)"}],"parts":[{"id":"cm-11.b_obj.1","name":"objective","props":[{"name":"label","value":"CM-11(b)[1]"}],"prose":"defines methods to enforce software installation policies;"},{"id":"cm-11.b_obj.2","name":"objective","props":[{"name":"label","value":"CM-11(b)[2]"}],"prose":"enforces software installation policies through organization-defined methods;"}]},{"id":"cm-11.c_obj","name":"objective","props":[{"name":"label","value":"CM-11(c)"}],"parts":[{"id":"cm-11.c_obj.1","name":"objective","props":[{"name":"label","value":"CM-11(c)[1]"}],"prose":"defines frequency to monitor policy compliance; and"},{"id":"cm-11.c_obj.2","name":"objective","props":[{"name":"label","value":"CM-11(c)[2]"}],"prose":"monitors policy compliance at organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Configuration management policy\n\nprocedures addressing user installed software\n\nconfiguration management plan\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of rules governing user installed software\n\ninformation system monitoring records\n\ninformation system audit records\n\nother relevant documents or records\n\ncontinuous monitoring strategy"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for governing user-installed software\n\norganizational personnel operating, using, and\/or maintaining the information system\n\norganizational personnel monitoring compliance with user-installed software policy\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes governing user-installed software on the information system\n\nautomated mechanisms enforcing rules\/methods for governing the installation of software by users\n\nautomated mechanisms monitoring policy compliance"}]}]}]},{"id":"cp","class":"family","title":"Contingency Planning","controls":[{"id":"cp-1","class":"SP800-53","title":"Contingency Planning Policy and Procedures","params":[{"id":"cp-1_prm_1","label":"organization-defined personnel or roles"},{"id":"cp-1_prm_2","label":"organization-defined frequency"},{"id":"cp-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-1"},{"name":"sort-id","value":"cp-01"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"cp-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, cp-1_prm_1 }}:","parts":[{"id":"cp-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A contingency planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"cp-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls; and"}]},{"id":"cp-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"cp-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Contingency planning policy {{ insert: param, cp-1_prm_2 }}; and"},{"id":"cp-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Contingency planning procedures {{ insert: param, cp-1_prm_3 }}."}]}]},{"id":"cp-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the CP family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"cp-1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"cp-1.a_obj","name":"objective","props":[{"name":"label","value":"CP-1(a)"}],"parts":[{"id":"cp-1.a.1_obj","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)"}],"parts":[{"id":"cp-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1]"}],"prose":"the organization develops and documents a contingency planning policy that addresses:","parts":[{"id":"cp-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"cp-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"cp-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"cp-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"cp-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"cp-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"cp-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"cp-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[2]"}],"prose":"the organization defines personnel or roles to whom the contingency planning policy is to be disseminated;"},{"id":"cp-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"CP-1(a)(1)[3]"}],"prose":"the organization disseminates the contingency planning policy to organization-defined personnel or roles;"}]},{"id":"cp-1.a.2_obj","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)"}],"parts":[{"id":"cp-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)[1]"}],"prose":"the organization develops and documents procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls;"},{"id":"cp-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)[2]"}],"prose":"the organization defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"cp-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CP-1(a)(2)[3]"}],"prose":"the organization disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"cp-1.b_obj","name":"objective","props":[{"name":"label","value":"CP-1(b)"}],"parts":[{"id":"cp-1.b.1_obj","name":"objective","props":[{"name":"label","value":"CP-1(b)(1)"}],"parts":[{"id":"cp-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(b)(1)[1]"}],"prose":"the organization defines the frequency to review and update the current contingency planning policy;"},{"id":"cp-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(b)(1)[2]"}],"prose":"the organization reviews and updates the current contingency planning with the organization-defined frequency;"}]},{"id":"cp-1.b.2_obj","name":"objective","props":[{"name":"label","value":"CP-1(b)(2)"}],"parts":[{"id":"cp-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-1(b)(2)[1]"}],"prose":"the organization defines the frequency to review and update the current contingency planning procedures; and"},{"id":"cp-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-1(b)(2)[2]"}],"prose":"the organization reviews and updates the current contingency planning procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-2","class":"SP800-53","title":"Contingency Plan","params":[{"id":"cp-2_prm_1","label":"organization-defined personnel or roles"},{"id":"cp-2_prm_2","label":"organization-defined key contingency personnel (identified by name and\/or by role) and organizational elements"},{"id":"cp-2_prm_3","label":"organization-defined frequency"},{"id":"cp-2_prm_4","label":"organization-defined key contingency personnel (identified by name and\/or by role) and organizational elements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-2"},{"name":"sort-id","value":"cp-02"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a contingency plan for the information system that:","parts":[{"id":"cp-2_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Identifies essential missions and business functions and associated contingency requirements;"},{"id":"cp-2_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Provides recovery objectives, restoration priorities, and metrics;"},{"id":"cp-2_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Addresses contingency roles, responsibilities, assigned individuals with contact information;"},{"id":"cp-2_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Addresses maintaining essential missions and business functions despite an information system disruption, compromise, or failure;"},{"id":"cp-2_smt.a.5","name":"item","props":[{"name":"label","value":"5."}],"prose":"Addresses eventual, full information system restoration without deterioration of the security safeguards originally planned and implemented; and"},{"id":"cp-2_smt.a.6","name":"item","props":[{"name":"label","value":"6."}],"prose":"Is reviewed and approved by {{ insert: param, cp-2_prm_1 }};"}]},{"id":"cp-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Distributes copies of the contingency plan to {{ insert: param, cp-2_prm_2 }};"},{"id":"cp-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Coordinates contingency planning activities with incident handling activities;"},{"id":"cp-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Reviews the contingency plan for the information system {{ insert: param, cp-2_prm_3 }};"},{"id":"cp-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Updates the contingency plan to address changes to the organization, information system, or environment of operation and problems encountered during contingency plan implementation, execution, or testing;"},{"id":"cp-2_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Communicates contingency plan changes to {{ insert: param, cp-2_prm_4 }}; and"},{"id":"cp-2_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Protects the contingency plan from unauthorized disclosure and modification."}]},{"id":"cp-2_gdn","name":"guidance","prose":"Contingency planning for information systems is part of an overall organizational program for achieving continuity of operations for mission\/business functions. Contingency planning addresses both information system restoration and implementation of alternative mission\/business processes when systems are compromised. The effectiveness of contingency planning is maximized by considering such planning throughout the phases of the system development life cycle. Performing contingency planning on hardware, software, and firmware development can be an effective means of achieving information system resiliency. Contingency plans reflect the degree of restoration required for organizational information systems since not all systems may need to fully recover to achieve the level of continuity of operations desired. Information system recovery objectives reflect applicable laws, Executive Orders, directives, policies, standards, regulations, and guidelines. In addition to information system availability, contingency plans also address other security-related events resulting in a reduction in mission and\/or business effectiveness, such as malicious attacks compromising the confidentiality or integrity of information systems. Actions addressed in contingency plans include, for example, orderly\/graceful degradation, information system shutdown, fallback to a manual mode, alternate information flows, and operating in modes reserved for when systems are under attack. By closely coordinating contingency planning with incident handling activities, organizations can ensure that the necessary contingency planning activities are in place and activated in the event of a security incident.","links":[{"href":"#ac-14","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#cp-7","rel":"related"},{"href":"#cp-8","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#cp-10","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#pm-8","rel":"related"},{"href":"#pm-11","rel":"related"}]},{"id":"cp-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-2.a_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)"}],"prose":"develops and documents a contingency plan for the information system that:","parts":[{"id":"cp-2.a.1_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(1)"}],"prose":"identifies essential missions and business functions and associated contingency requirements;"},{"id":"cp-2.a.2_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)"}],"parts":[{"id":"cp-2.a.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)[1]"}],"prose":"provides recovery objectives;"},{"id":"cp-2.a.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)[2]"}],"prose":"provides restoration priorities;"},{"id":"cp-2.a.2_obj.3","name":"objective","props":[{"name":"label","value":"CP-2(a)(2)[3]"}],"prose":"provides metrics;"}]},{"id":"cp-2.a.3_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)"}],"parts":[{"id":"cp-2.a.3_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)[1]"}],"prose":"addresses contingency roles;"},{"id":"cp-2.a.3_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)[2]"}],"prose":"addresses contingency responsibilities;"},{"id":"cp-2.a.3_obj.3","name":"objective","props":[{"name":"label","value":"CP-2(a)(3)[3]"}],"prose":"addresses assigned individuals with contact information;"}]},{"id":"cp-2.a.4_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(4)"}],"prose":"addresses maintaining essential missions and business functions despite an information system disruption, compromise, or failure;"},{"id":"cp-2.a.5_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(5)"}],"prose":"addresses eventual, full information system restoration without deterioration of the security safeguards originally planned and implemented;"},{"id":"cp-2.a.6_obj","name":"objective","props":[{"name":"label","value":"CP-2(a)(6)"}],"parts":[{"id":"cp-2.a.6_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(a)(6)[1]"}],"prose":"defines personnel or roles to review and approve the contingency plan for the information system;"},{"id":"cp-2.a.6_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(a)(6)[2]"}],"prose":"is reviewed and approved by organization-defined personnel or roles;"}]}]},{"id":"cp-2.b_obj","name":"objective","props":[{"name":"label","value":"CP-2(b)"}],"parts":[{"id":"cp-2.b_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(b)[1]"}],"prose":"defines key contingency personnel (identified by name and\/or by role) and organizational elements to whom copies of the contingency plan are to be distributed;"},{"id":"cp-2.b_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(b)[2]"}],"prose":"distributes copies of the contingency plan to organization-defined key contingency personnel and organizational elements;"}]},{"id":"cp-2.c_obj","name":"objective","props":[{"name":"label","value":"CP-2(c)"}],"prose":"coordinates contingency planning activities with incident handling activities;"},{"id":"cp-2.d_obj","name":"objective","props":[{"name":"label","value":"CP-2(d)"}],"parts":[{"id":"cp-2.d_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(d)[1]"}],"prose":"defines a frequency to review the contingency plan for the information system;"},{"id":"cp-2.d_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(d)[2]"}],"prose":"reviews the contingency plan with the organization-defined frequency;"}]},{"id":"cp-2.e_obj","name":"objective","props":[{"name":"label","value":"CP-2(e)"}],"prose":"updates the contingency plan to address:","parts":[{"id":"cp-2.e_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(e)[1]"}],"prose":"changes to the organization, information system, or environment of operation;"},{"id":"cp-2.e_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(e)[2]"}],"prose":"problems encountered during plan implementation, execution, and testing;"}]},{"id":"cp-2.f_obj","name":"objective","props":[{"name":"label","value":"CP-2(f)"}],"parts":[{"id":"cp-2.f_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(f)[1]"}],"prose":"defines key contingency personnel (identified by name and\/or by role) and organizational elements to whom contingency plan changes are to be communicated;"},{"id":"cp-2.f_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(f)[2]"}],"prose":"communicates contingency plan changes to organization-defined key contingency personnel and organizational elements; and"}]},{"id":"cp-2.g_obj","name":"objective","props":[{"name":"label","value":"CP-2(g)"}],"prose":"protects the contingency plan from unauthorized disclosure and modification."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nsecurity plan\n\nevidence of contingency plan reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with incident handling responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency plan development, review, update, and protection\n\nautomated mechanisms for developing, reviewing, updating and\/or protecting the contingency plan"}]}],"controls":[{"id":"cp-2.1","class":"SP800-53-enhancement","title":"Coordinate with Related Plans","props":[{"name":"label","value":"CP-2(1)"},{"name":"sort-id","value":"cp-02.01"}],"parts":[{"id":"cp-2.1_smt","name":"statement","prose":"The organization coordinates contingency plan development with organizational elements responsible for related plans."},{"id":"cp-2.1_gdn","name":"guidance","prose":"Plans related to contingency plans for organizational information systems include, for example, Business Continuity Plans, Disaster Recovery Plans, Continuity of Operations Plans, Crisis Communications Plans, Critical Infrastructure Plans, Cyber Incident Response Plans, Insider Threat Implementation Plan, and Occupant Emergency Plans."},{"id":"cp-2.1_obj","name":"objective","prose":"Determine if the organization coordinates contingency plan development with organizational elements responsible for related plans."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nbusiness contingency plans\n\ndisaster recovery plans\n\ncontinuity of operations plans\n\ncrisis communications plans\n\ncritical infrastructure plans\n\ncyber incident response plan\n\ninsider threat implementation plans\n\noccupant emergency plans\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities\n\npersonnel with responsibility for related plans"}]}]},{"id":"cp-2.3","class":"SP800-53-enhancement","title":"Resume Essential Missions \/ Business Functions","params":[{"id":"cp-2.3_prm_1","label":"organization-defined time period"}],"props":[{"name":"label","value":"CP-2(3)"},{"name":"sort-id","value":"cp-02.03"}],"parts":[{"id":"cp-2.3_smt","name":"statement","prose":"The organization plans for the resumption of essential missions and business functions within {{ insert: param, cp-2.3_prm_1 }} of contingency plan activation."},{"id":"cp-2.3_gdn","name":"guidance","prose":"Organizations may choose to carry out the contingency planning activities in this control enhancement as part of organizational business continuity planning including, for example, as part of business impact analyses. The time period for resumption of essential missions\/business functions may be dependent on the severity\/extent of disruptions to the information system and its supporting infrastructure.","links":[{"href":"#pe-12","rel":"related"}]},{"id":"cp-2.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-2.3_obj.1","name":"objective","props":[{"name":"label","value":"CP-2(3)[1]"}],"prose":"defines the time period to plan for the resumption of essential missions and business functions as a result of contingency plan activation; and"},{"id":"cp-2.3_obj.2","name":"objective","props":[{"name":"label","value":"CP-2(3)[2]"}],"prose":"plans for the resumption of essential missions and business functions within organization-defined time period of contingency plan activation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nsecurity plan\n\nbusiness impact assessment\n\nother related plans\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for resumption of missions and business functions"}]}]},{"id":"cp-2.8","class":"SP800-53-enhancement","title":"Identify Critical Assets","props":[{"name":"label","value":"CP-2(8)"},{"name":"sort-id","value":"cp-02.08"}],"parts":[{"id":"cp-2.8_smt","name":"statement","prose":"The organization identifies critical information system assets supporting essential missions and business functions."},{"id":"cp-2.8_gdn","name":"guidance","prose":"Organizations may choose to carry out the contingency planning activities in this control enhancement as part of organizational business continuity planning including, for example, as part of business impact analyses. Organizations identify critical information system assets so that additional safeguards and countermeasures can be employed (above and beyond those safeguards and countermeasures routinely implemented) to help ensure that organizational missions\/business functions can continue to be conducted during contingency operations. In addition, the identification of critical information assets facilitates the prioritization of organizational resources. Critical information system assets include technical and operational aspects. Technical aspects include, for example, information technology services, information system components, information technology products, and mechanisms. Operational aspects include, for example, procedures (manually executed operations) and personnel (individuals operating technical safeguards and\/or executing manual procedures). Organizational program protection plans can provide assistance in identifying critical assets.","links":[{"href":"#sa-14","rel":"related"},{"href":"#sa-15","rel":"related"}]},{"id":"cp-2.8_obj","name":"objective","prose":"Determine if the organization identifies critical information system assets supporting essential missions and business functions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency operations for the information system\n\ncontingency plan\n\nbusiness impact assessment\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"cp-3","class":"SP800-53","title":"Contingency Training","params":[{"id":"cp-3_prm_1","label":"organization-defined time period"},{"id":"cp-3_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CP-3"},{"name":"sort-id","value":"cp-03"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"cp-3_smt","name":"statement","prose":"The organization provides contingency training to information system users consistent with assigned roles and responsibilities:","parts":[{"id":"cp-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Within {{ insert: param, cp-3_prm_1 }} of assuming a contingency role or responsibility;"},{"id":"cp-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"cp-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, cp-3_prm_2 }} thereafter."}]},{"id":"cp-3_gdn","name":"guidance","prose":"Contingency training provided by organizations is linked to the assigned roles and responsibilities of organizational personnel to ensure that the appropriate content and level of detail is included in such training. For example, regular users may only need to know when and where to report for duty during contingency operations and if normal duties are affected; system administrators may require additional training on how to set up information systems at alternate processing and storage sites; and managers\/senior leaders may receive more specific training on how to conduct mission-essential functions in designated off-site locations and how to establish communications with other governmental entities for purposes of coordination on contingency-related activities. Training for contingency roles\/responsibilities reflects the specific continuity requirements in the contingency plan.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#ir-2","rel":"related"}]},{"id":"cp-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-3.a_obj","name":"objective","props":[{"name":"label","value":"CP-3(a)"}],"parts":[{"id":"cp-3.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-3(a)[1]"}],"prose":"defines a time period within which contingency training is to be provided to information system users assuming a contingency role or responsibility;"},{"id":"cp-3.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-3(a)[2]"}],"prose":"provides contingency training to information system users consistent with assigned roles and responsibilities within the organization-defined time period of assuming a contingency role or responsibility;"}]},{"id":"cp-3.b_obj","name":"objective","props":[{"name":"label","value":"CP-3(b)"}],"prose":"provides contingency training to information system users consistent with assigned roles and responsibilities when required by information system changes;"},{"id":"cp-3.c_obj","name":"objective","props":[{"name":"label","value":"CP-3(c)"}],"parts":[{"id":"cp-3.c_obj.1","name":"objective","props":[{"name":"label","value":"CP-3(c)[1]"}],"prose":"defines the frequency for contingency training thereafter; and"},{"id":"cp-3.c_obj.2","name":"objective","props":[{"name":"label","value":"CP-3(c)[2]"}],"prose":"provides contingency training to information system users consistent with assigned roles and responsibilities with the organization-defined frequency thereafter."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency training\n\ncontingency plan\n\ncontingency training curriculum\n\ncontingency training material\n\nsecurity plan\n\ncontingency training records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning, plan implementation, and training responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency training"}]}]},{"id":"cp-4","class":"SP800-53","title":"Contingency Plan Testing","params":[{"id":"cp-4_prm_1","label":"organization-defined frequency"},{"id":"cp-4_prm_2","label":"organization-defined tests"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"CP-4"},{"name":"sort-id","value":"cp-04"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"},{"href":"#0243a05a-e8a3-4d51-9364-4a9d20b0dcdf","rel":"reference"}],"parts":[{"id":"cp-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Tests the contingency plan for the information system {{ insert: param, cp-4_prm_1 }} using {{ insert: param, cp-4_prm_2 }} to determine the effectiveness of the plan and the organizational readiness to execute the plan;"},{"id":"cp-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews the contingency plan test results; and"},{"id":"cp-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Initiates corrective actions, if needed."}]},{"id":"cp-4_gdn","name":"guidance","prose":"Methods for testing contingency plans to determine the effectiveness of the plans and to identify potential weaknesses in the plans include, for example, walk-through and tabletop exercises, checklists, simulations (parallel, full interrupt), and comprehensive exercises. Organizations conduct testing based on the continuity requirements in contingency plans and include a determination of the effects on organizational operations, assets, and individuals arising due to contingency operations. Organizations have flexibility and discretion in the breadth, depth, and timelines of corrective actions.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-3","rel":"related"},{"href":"#ir-3","rel":"related"}]},{"id":"cp-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-4.a_obj","name":"objective","props":[{"name":"label","value":"CP-4(a)"}],"parts":[{"id":"cp-4.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-4(a)[1]"}],"prose":"defines tests to determine the effectiveness of the contingency plan and the organizational readiness to execute the plan;"},{"id":"cp-4.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-4(a)[2]"}],"prose":"defines a frequency to test the contingency plan for the information system;"},{"id":"cp-4.a_obj.3","name":"objective","props":[{"name":"label","value":"CP-4(a)[3]"}],"prose":"tests the contingency plan for the information system with the organization-defined frequency, using organization-defined tests to determine the effectiveness of the plan and the organizational readiness to execute the plan;"}]},{"id":"cp-4.b_obj","name":"objective","props":[{"name":"label","value":"CP-4(b)"}],"prose":"reviews the contingency plan test results; and"},{"id":"cp-4.c_obj","name":"objective","props":[{"name":"label","value":"CP-4(c)"}],"prose":"initiates corrective actions, if needed."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing contingency plan testing\n\ncontingency plan\n\nsecurity plan\n\ncontingency plan test documentation\n\ncontingency plan test results\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for contingency plan testing, reviewing or responding to contingency plan tests\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for contingency plan testing\n\nautomated mechanisms supporting the contingency plan and\/or contingency plan testing"}]}],"controls":[{"id":"cp-4.1","class":"SP800-53-enhancement","title":"Coordinate with Related Plans","props":[{"name":"label","value":"CP-4(1)"},{"name":"sort-id","value":"cp-04.01"}],"parts":[{"id":"cp-4.1_smt","name":"statement","prose":"The organization coordinates contingency plan testing with organizational elements responsible for related plans."},{"id":"cp-4.1_gdn","name":"guidance","prose":"Plans related to contingency plans for organizational information systems include, for example, Business Continuity Plans, Disaster Recovery Plans, Continuity of Operations Plans, Crisis Communications Plans, Critical Infrastructure Plans, Cyber Incident Response Plans, and Occupant Emergency Plans. This control enhancement does not require organizations to create organizational elements to handle related plans or to align such elements with specific plans. It does require, however, that if such organizational elements are responsible for related plans, organizations should coordinate with those elements.","links":[{"href":"#ir-8","rel":"related"},{"href":"#pm-8","rel":"related"}]},{"id":"cp-4.1_obj","name":"objective","prose":"Determine if the organization coordinates contingency plan testing with organizational elements responsible for related plans."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nincident response policy\n\nprocedures addressing contingency plan testing\n\ncontingency plan testing documentation\n\ncontingency plan\n\nbusiness continuity plans\n\ndisaster recovery plans\n\ncontinuity of operations plans\n\ncrisis communications plans\n\ncritical infrastructure plans\n\ncyber incident response plans\n\noccupant emergency plans\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan testing responsibilities\n\norganizational personnel\n\npersonnel with responsibilities for related plans\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"cp-6","class":"SP800-53","title":"Alternate Storage Site","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-6"},{"name":"sort-id","value":"cp-06"}],"links":[{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes an alternate storage site including necessary agreements to permit the storage and retrieval of information system backup information; and"},{"id":"cp-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Ensures that the alternate storage site provides information security safeguards equivalent to that of the primary site."}]},{"id":"cp-6_gdn","name":"guidance","prose":"Alternate storage sites are sites that are geographically distinct from primary storage sites. An alternate storage site maintains duplicate copies of information and data in the event that the primary storage site is not available. Items covered by alternate storage site agreements include, for example, environmental conditions at alternate sites, access rules, physical and environmental protection requirements, and coordination of delivery\/retrieval of backup media. Alternate storage sites reflect the requirements in contingency plans so that organizations can maintain essential missions\/business functions despite disruption, compromise, or failure in organizational information systems.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-7","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#cp-10","rel":"related"},{"href":"#mp-4","rel":"related"}]},{"id":"cp-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-6_obj.1","name":"objective","props":[{"name":"label","value":"CP-6[1]"}],"prose":"establishes an alternate storage site including necessary agreements to permit the storage and retrieval of information system backup information; and"},{"id":"cp-6_obj.2","name":"objective","props":[{"name":"label","value":"CP-6[2]"}],"prose":"ensures that the alternate storage site provides information security safeguards equivalent to that of the primary site."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate storage sites\n\ncontingency plan\n\nalternate storage site agreements\n\nprimary storage site agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate storage site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for storing and retrieving information system backup information at the alternate storage site\n\nautomated mechanisms supporting and\/or implementing storage and retrieval of information system backup information at the alternate storage site"}]}],"controls":[{"id":"cp-6.1","class":"SP800-53-enhancement","title":"Separation from Primary Site","props":[{"name":"label","value":"CP-6(1)"},{"name":"sort-id","value":"cp-06.01"}],"parts":[{"id":"cp-6.1_smt","name":"statement","prose":"The organization identifies an alternate storage site that is separated from the primary storage site to reduce susceptibility to the same threats."},{"id":"cp-6.1_gdn","name":"guidance","prose":"Threats that affect alternate storage sites are typically defined in organizational assessments of risk and include, for example, natural disasters, structural failures, hostile cyber attacks, and errors of omission\/commission. Organizations determine what is considered a sufficient degree of separation between primary and alternate storage sites based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber attack), the degree of separation between sites is less relevant.","links":[{"href":"#ra-3","rel":"related"}]},{"id":"cp-6.1_obj","name":"objective","prose":"Determine if the organization identifies an alternate storage site that is separated from the primary storage site to reduce susceptibility to the same threats."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate storage sites\n\ncontingency plan\n\nalternate storage site\n\nalternate storage site agreements\n\nprimary storage site agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate storage site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-6.3","class":"SP800-53-enhancement","title":"Accessibility","props":[{"name":"label","value":"CP-6(3)"},{"name":"sort-id","value":"cp-06.03"}],"parts":[{"id":"cp-6.3_smt","name":"statement","prose":"The organization identifies potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions."},{"id":"cp-6.3_gdn","name":"guidance","prose":"Area-wide disruptions refer to those types of disruptions that are broad in geographic scope (e.g., hurricane, regional power outage) with such determinations made by organizations based on organizational assessments of risk. Explicit mitigation actions include, for example: (i) duplicating backup information at other alternate storage sites if access problems occur at originally designated alternate sites; or (ii) planning for physical access to retrieve backup information if electronic accessibility to the alternate site is disrupted.","links":[{"href":"#ra-3","rel":"related"}]},{"id":"cp-6.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-6.3_obj.1","name":"objective","props":[{"name":"label","value":"CP-6(3)[1]"}],"prose":"identifies potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster; and"},{"id":"cp-6.3_obj.2","name":"objective","props":[{"name":"label","value":"CP-6(3)[2]"}],"prose":"outlines explicit mitigation actions for such potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate storage sites\n\ncontingency plan\n\nalternate storage site\n\nlist of potential accessibility problems to alternate storage site\n\nmitigation actions for accessibility problems to alternate storage site\n\norganizational risk assessments\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate storage site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"cp-7","class":"SP800-53","title":"Alternate Processing Site","params":[{"id":"cp-7_prm_1","label":"organization-defined information system operations"},{"id":"cp-7_prm_2","label":"organization-defined time period consistent with recovery time and recovery point objectives"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-7"},{"name":"sort-id","value":"cp-07"}],"links":[{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-7_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes an alternate processing site including necessary agreements to permit the transfer and resumption of {{ insert: param, cp-7_prm_1 }} for essential missions\/business functions within {{ insert: param, cp-7_prm_2 }} when the primary processing capabilities are unavailable;"},{"id":"cp-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Ensures that equipment and supplies required to transfer and resume operations are available at the alternate processing site or contracts are in place to support delivery to the site within the organization-defined time period for transfer\/resumption; and"},{"id":"cp-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensures that the alternate processing site provides information security safeguards equivalent to those of the primary site."}]},{"id":"cp-7_gdn","name":"guidance","prose":"Alternate processing sites are sites that are geographically distinct from primary processing sites. An alternate processing site provides processing capability in the event that the primary processing site is not available. Items covered by alternate processing site agreements include, for example, environmental conditions at alternate sites, access rules, physical and environmental protection requirements, and coordination for the transfer\/assignment of personnel. Requirements are specifically allocated to alternate processing sites that reflect the requirements in contingency plans to maintain essential missions\/business functions despite disruption, compromise, or failure in organizational information systems.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#cp-8","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#cp-10","rel":"related"},{"href":"#ma-6","rel":"related"}]},{"id":"cp-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-7.a_obj","name":"objective","props":[{"name":"label","value":"CP-7(a)"}],"parts":[{"id":"cp-7.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-7(a)[1]"}],"prose":"defines information system operations requiring an alternate processing site to be established to permit the transfer and resumption of such operations;"},{"id":"cp-7.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-7(a)[2]"}],"prose":"defines the time period consistent with recovery time objectives and recovery point objectives (as specified in the information system contingency plan) for transfer\/resumption of organization-defined information system operations for essential missions\/business functions;"},{"id":"cp-7.a_obj.3","name":"objective","props":[{"name":"label","value":"CP-7(a)[3]"}],"prose":"establishes an alternate processing site including necessary agreements to permit the transfer and resumption of organization-defined information system operations for essential missions\/business functions, within the organization-defined time period, when the primary processing capabilities are unavailable;"}]},{"id":"cp-7.b_obj","name":"objective","props":[{"name":"label","value":"CP-7(b)"}],"parts":[{"id":"cp-7.b_obj.1","name":"objective","props":[{"name":"label","value":"CP-7(b)[1]"}],"prose":"ensures that equipment and supplies required to transfer and resume operations are available at the alternate processing site; or"},{"id":"cp-7.b_obj.2","name":"objective","props":[{"name":"label","value":"CP-7(b)[2]"}],"prose":"ensures that contracts are in place to support delivery to the site within the organization-defined time period for transfer\/resumption; and"}]},{"id":"cp-7.c_obj","name":"objective","props":[{"name":"label","value":"CP-7(c)"}],"prose":"ensures that the alternate processing site provides information security safeguards equivalent to those of the primary site."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate processing sites\n\ncontingency plan\n\nalternate processing site agreements\n\nprimary processing site agreements\n\nspare equipment and supplies inventory at alternate processing site\n\nequipment and supply contracts\n\nservice-level agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for contingency planning and\/or alternate site arrangements\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for recovery at the alternate site\n\nautomated mechanisms supporting and\/or implementing recovery at the alternate processing site"}]}],"controls":[{"id":"cp-7.1","class":"SP800-53-enhancement","title":"Separation from Primary Site","props":[{"name":"label","value":"CP-7(1)"},{"name":"sort-id","value":"cp-07.01"}],"parts":[{"id":"cp-7.1_smt","name":"statement","prose":"The organization identifies an alternate processing site that is separated from the primary processing site to reduce susceptibility to the same threats."},{"id":"cp-7.1_gdn","name":"guidance","prose":"Threats that affect alternate processing sites are typically defined in organizational assessments of risk and include, for example, natural disasters, structural failures, hostile cyber attacks, and errors of omission\/commission. Organizations determine what is considered a sufficient degree of separation between primary and alternate processing sites based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber attack), the degree of separation between sites is less relevant.","links":[{"href":"#ra-3","rel":"related"}]},{"id":"cp-7.1_obj","name":"objective","prose":"Determine if the organization identifies an alternate processing site that is separated from the primary storage site to reduce susceptibility to the same threats."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate processing sites\n\ncontingency plan\n\nalternate processing site\n\nalternate processing site agreements\n\nprimary processing site agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate processing site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-7.2","class":"SP800-53-enhancement","title":"Accessibility","props":[{"name":"label","value":"CP-7(2)"},{"name":"sort-id","value":"cp-07.02"}],"parts":[{"id":"cp-7.2_smt","name":"statement","prose":"The organization identifies potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions."},{"id":"cp-7.2_gdn","name":"guidance","prose":"Area-wide disruptions refer to those types of disruptions that are broad in geographic scope (e.g., hurricane, regional power outage) with such determinations made by organizations based on organizational assessments of risk.","links":[{"href":"#ra-3","rel":"related"}]},{"id":"cp-7.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-7.2_obj.1","name":"objective","props":[{"name":"label","value":"CP-7(2)[1]"}],"prose":"identifies potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster; and"},{"id":"cp-7.2_obj.2","name":"objective","props":[{"name":"label","value":"CP-7(2)[2]"}],"prose":"outlines explicit mitigation actions for such potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate processing sites\n\ncontingency plan\n\nalternate processing site\n\nalternate processing site agreements\n\nprimary processing site agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate processing site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"cp-7.3","class":"SP800-53-enhancement","title":"Priority of Service","props":[{"name":"label","value":"CP-7(3)"},{"name":"sort-id","value":"cp-07.03"}],"parts":[{"id":"cp-7.3_smt","name":"statement","prose":"The organization develops alternate processing site agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives)."},{"id":"cp-7.3_gdn","name":"guidance","prose":"Priority-of-service agreements refer to negotiated agreements with service providers that ensure that organizations receive priority treatment consistent with their availability requirements and the availability of information resources at the alternate processing site."},{"id":"cp-7.3_obj","name":"objective","prose":"Determine if the organization develops alternate processing site agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives as specified in the information system contingency plan)."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate processing sites\n\ncontingency plan\n\nalternate processing site agreements\n\nservice-level agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan alternate processing site responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibility for acquisitions\/contractual agreements"}]}]}]},{"id":"cp-8","class":"SP800-53","title":"Telecommunications Services","params":[{"id":"cp-8_prm_1","label":"organization-defined information system operations"},{"id":"cp-8_prm_2","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-8"},{"name":"sort-id","value":"cp-08"}],"links":[{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"},{"href":"#fb5844de-ff96-47c0-b258-4f52bcc2f30d","rel":"reference"},{"href":"#3ac12e79-f54f-4a63-9f4b-ee4bcd4df604","rel":"reference"}],"parts":[{"id":"cp-8_smt","name":"statement","prose":"The organization establishes alternate telecommunications services including necessary agreements to permit the resumption of {{ insert: param, cp-8_prm_1 }} for essential missions and business functions within {{ insert: param, cp-8_prm_2 }} when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites."},{"id":"cp-8_gdn","name":"guidance","prose":"This control applies to telecommunications services (data and voice) for primary and alternate processing and storage sites. Alternate telecommunications services reflect the continuity requirements in contingency plans to maintain essential missions\/business functions despite the loss of primary telecommunications services. Organizations may specify different time periods for primary\/alternate sites. Alternate telecommunications services include, for example, additional organizational or commercial ground-based circuits\/lines or satellites in lieu of ground-based communications. Organizations consider factors such as availability, quality of service, and access when entering into alternate telecommunications agreements.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#cp-7","rel":"related"}]},{"id":"cp-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-8_obj.1","name":"objective","props":[{"name":"label","value":"CP-8[1]"}],"prose":"defines information system operations requiring alternate telecommunications services to be established to permit the resumption of such operations;"},{"id":"cp-8_obj.2","name":"objective","props":[{"name":"label","value":"CP-8[2]"}],"prose":"defines the time period to permit resumption of organization-defined information system operations for essential missions and business functions; and"},{"id":"cp-8_obj.3","name":"objective","props":[{"name":"label","value":"CP-8[3]"}],"prose":"establishes alternate telecommunications services including necessary agreements to permit the resumption of organization-defined information system operations for essential missions and business functions, within the organization-defined time period, when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing alternate telecommunications services\n\ncontingency plan\n\nprimary and alternate telecommunications service agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan telecommunications responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibility for acquisitions\/contractual agreements"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting telecommunications"}]}],"controls":[{"id":"cp-8.1","class":"SP800-53-enhancement","title":"Priority of Service Provisions","props":[{"name":"label","value":"CP-8(1)"},{"name":"sort-id","value":"cp-08.01"}],"parts":[{"id":"cp-8.1_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-8.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Develops primary and alternate telecommunications service agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives); and"},{"id":"cp-8.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Requests Telecommunications Service Priority for all telecommunications services used for national security emergency preparedness in the event that the primary and\/or alternate telecommunications services are provided by a common carrier."}]},{"id":"cp-8.1_gdn","name":"guidance","prose":"Organizations consider the potential mission\/business impact in situations where telecommunications service providers are servicing other organizations with similar priority-of-service provisions."},{"id":"cp-8.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-8.1_obj.1","name":"objective","props":[{"name":"label","value":"CP-8(1)[1]"}],"prose":"develops primary and alternate telecommunications service agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives as specified in the information system contingency plan); and"},{"id":"cp-8.1_obj.2","name":"objective","props":[{"name":"label","value":"CP-8(1)[2]"}],"prose":"requests Telecommunications Service Priority for all telecommunications services used for national security emergency preparedness in the event that the primary and\/or alternate telecommunications services are provided by a common carrier."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing primary and alternate telecommunications services\n\ncontingency plan\n\nprimary and alternate telecommunications service agreements\n\nTelecommunications Service Priority documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan telecommunications responsibilities\n\norganizational personnel with information system recovery responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibility for acquisitions\/contractual agreements"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting telecommunications"}]}]},{"id":"cp-8.2","class":"SP800-53-enhancement","title":"Single Points of Failure","props":[{"name":"label","value":"CP-8(2)"},{"name":"sort-id","value":"cp-08.02"}],"parts":[{"id":"cp-8.2_smt","name":"statement","prose":"The organization obtains alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services."},{"id":"cp-8.2_obj","name":"objective","prose":"Determine if the organization obtains alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing primary and alternate telecommunications services\n\ncontingency plan\n\nprimary and alternate telecommunications service agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency plan telecommunications responsibilities\n\norganizational personnel with information system recovery responsibilities\n\nprimary and alternate telecommunications service providers\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"cp-9","class":"SP800-53","title":"Information System Backup","params":[{"id":"cp-9_prm_1","label":"organization-defined frequency consistent with recovery time and recovery point objectives"},{"id":"cp-9_prm_2","label":"organization-defined frequency consistent with recovery time and recovery point objectives"},{"id":"cp-9_prm_3","label":"organization-defined frequency consistent with recovery time and recovery point objectives"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-9"},{"name":"sort-id","value":"cp-09"}],"links":[{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-9_smt","name":"statement","prose":"The organization:","parts":[{"id":"cp-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Conducts backups of user-level information contained in the information system {{ insert: param, cp-9_prm_1 }};"},{"id":"cp-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Conducts backups of system-level information contained in the information system {{ insert: param, cp-9_prm_2 }};"},{"id":"cp-9_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Conducts backups of information system documentation including security-related documentation {{ insert: param, cp-9_prm_3 }}; and"},{"id":"cp-9_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects the confidentiality, integrity, and availability of backup information at storage locations."}]},{"id":"cp-9_gdn","name":"guidance","prose":"System-level information includes, for example, system-state information, operating system and application software, and licenses. User-level information includes any information other than system-level information. Mechanisms employed by organizations to protect the integrity of information system backups include, for example, digital signatures and cryptographic hashes. Protection of system backup information while in transit is beyond the scope of this control. Information system backups reflect the requirements in contingency plans as well as other organizational requirements for backing up information.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"cp-9_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-9.a_obj","name":"objective","props":[{"name":"label","value":"CP-9(a)"}],"parts":[{"id":"cp-9.a_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(a)[1]"}],"prose":"defines a frequency, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to conduct backups of user-level information contained in the information system;"},{"id":"cp-9.a_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(a)[2]"}],"prose":"conducts backups of user-level information contained in the information system with the organization-defined frequency;"}]},{"id":"cp-9.b_obj","name":"objective","props":[{"name":"label","value":"CP-9(b)"}],"parts":[{"id":"cp-9.b_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(b)[1]"}],"prose":"defines a frequency, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to conduct backups of system-level information contained in the information system;"},{"id":"cp-9.b_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(b)[2]"}],"prose":"conducts backups of system-level information contained in the information system with the organization-defined frequency;"}]},{"id":"cp-9.c_obj","name":"objective","props":[{"name":"label","value":"CP-9(c)"}],"parts":[{"id":"cp-9.c_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(c)[1]"}],"prose":"defines a frequency, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to conduct backups of information system documentation including security-related documentation;"},{"id":"cp-9.c_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(c)[2]"}],"prose":"conducts backups of information system documentation, including security-related documentation, with the organization-defined frequency; and"}]},{"id":"cp-9.d_obj","name":"objective","props":[{"name":"label","value":"CP-9(d)"}],"prose":"protects the confidentiality, integrity, and availability of backup information at storage locations."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\nbackup storage location(s)\n\ninformation system backup logs or records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system backup responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for conducting information system backups\n\nautomated mechanisms supporting and\/or implementing information system backups"}]}],"controls":[{"id":"cp-9.1","class":"SP800-53-enhancement","title":"Testing for Reliability \/ Integrity","params":[{"id":"cp-9.1_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"CP-9(1)"},{"name":"sort-id","value":"cp-09.01"}],"parts":[{"id":"cp-9.1_smt","name":"statement","prose":"The organization tests backup information {{ insert: param, cp-9.1_prm_1 }} to verify media reliability and information integrity."},{"id":"cp-9.1_gdn","name":"guidance","links":[{"href":"#cp-4","rel":"related"}]},{"id":"cp-9.1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"cp-9.1_obj.1","name":"objective","props":[{"name":"label","value":"CP-9(1)[1]"}],"prose":"defines the frequency to test backup information to verify media reliability and information integrity; and"},{"id":"cp-9.1_obj.2","name":"objective","props":[{"name":"label","value":"CP-9(1)[2]"}],"prose":"tests backup information with the organization-defined frequency to verify media reliability and information integrity."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\ninformation system backup test results\n\ncontingency plan test documentation\n\ncontingency plan test results\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system backup responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for conducting information system backups\n\nautomated mechanisms supporting and\/or implementing information system backups"}]}]}]},{"id":"cp-10","class":"SP800-53","title":"Information System Recovery and Reconstitution","props":[{"name":"priority","value":"P1"},{"name":"label","value":"CP-10"},{"name":"sort-id","value":"cp-10"}],"links":[{"href":"#023104bc-6f75-4cd5-b7d0-fc92326f8007","rel":"reference"},{"href":"#748a81b9-9cad-463f-abde-8b368167e70d","rel":"reference"}],"parts":[{"id":"cp-10_smt","name":"statement","prose":"The organization provides for the recovery and reconstitution of the information system to a known state after a disruption, compromise, or failure."},{"id":"cp-10_gdn","name":"guidance","prose":"Recovery is executing information system contingency plan activities to restore organizational missions\/business functions. Reconstitution takes place following recovery and includes activities for returning organizational information systems to fully operational states. Recovery and reconstitution operations reflect mission and business priorities, recovery point\/time and reconstitution objectives, and established organizational metrics consistent with contingency plan requirements. Reconstitution includes the deactivation of any interim information system capabilities that may have been needed during recovery operations. Reconstitution also includes assessments of fully restored information system capabilities, reestablishment of continuous monitoring activities, potential information system reauthorizations, and activities to prepare the systems against future disruptions, compromises, or failures. Recovery\/reconstitution capabilities employed by organizations can include both automated mechanisms and manual procedures.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-6","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#cp-6","rel":"related"},{"href":"#cp-7","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#sc-24","rel":"related"}]},{"id":"cp-10_obj","name":"objective","prose":"Determine if the organization provides for:","parts":[{"id":"cp-10_obj.1","name":"objective","props":[{"name":"label","value":"CP-10[1]"}],"prose":"the recovery of the information system to a known state after:","parts":[{"id":"cp-10_obj.1.a","name":"objective","props":[{"name":"label","value":"CP-10[1][a]"}],"prose":"a disruption;"},{"id":"cp-10_obj.1.b","name":"objective","props":[{"name":"label","value":"CP-10[1][b]"}],"prose":"a compromise; or"},{"id":"cp-10_obj.1.c","name":"objective","props":[{"name":"label","value":"CP-10[1][c]"}],"prose":"a failure;"}]},{"id":"cp-10_obj.2","name":"objective","props":[{"name":"label","value":"CP-10[2]"}],"prose":"the reconstitution of the information system to a known state after:","parts":[{"id":"cp-10_obj.2.a","name":"objective","props":[{"name":"label","value":"CP-10[2][a]"}],"prose":"a disruption;"},{"id":"cp-10_obj.2.b","name":"objective","props":[{"name":"label","value":"CP-10[2][b]"}],"prose":"a compromise; or"},{"id":"cp-10_obj.2.c","name":"objective","props":[{"name":"label","value":"CP-10[2][c]"}],"prose":"a failure."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system backup\n\ncontingency plan\n\ninformation system backup test results\n\ncontingency plan test results\n\ncontingency plan test documentation\n\nredundant secondary system for information system backups\n\nlocation(s) of redundant secondary backup system(s)\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with contingency planning, recovery, and\/or reconstitution responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes implementing information system recovery and reconstitution operations\n\nautomated mechanisms supporting and\/or implementing information system recovery and reconstitution operations"}]}],"controls":[{"id":"cp-10.2","class":"SP800-53-enhancement","title":"Transaction Recovery","props":[{"name":"label","value":"CP-10(2)"},{"name":"sort-id","value":"cp-10.02"}],"parts":[{"id":"cp-10.2_smt","name":"statement","prose":"The information system implements transaction recovery for systems that are transaction-based."},{"id":"cp-10.2_gdn","name":"guidance","prose":"Transaction-based information systems include, for example, database management systems and transaction processing systems. Mechanisms supporting transaction recovery include, for example, transaction rollback and transaction journaling."},{"id":"cp-10.2_obj","name":"objective","prose":"Determine if the information system implements transaction recovery for systems that are transaction-based."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Contingency planning policy\n\nprocedures addressing information system recovery and reconstitution\n\ncontingency plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ncontingency plan test documentation\n\ncontingency plan test results\n\ninformation system transaction recovery records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for transaction recovery\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing transaction recovery capability"}]}]}]}]},{"id":"ia","class":"family","title":"Identification and Authentication","controls":[{"id":"ia-1","class":"SP800-53","title":"Identification and Authentication Policy and Procedures","params":[{"id":"ia-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ia-1_prm_2","label":"organization-defined frequency"},{"id":"ia-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-1"},{"name":"sort-id","value":"ia-01"}],"links":[{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ia-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ia-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ia-1_prm_1 }}:","parts":[{"id":"ia-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ia-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls; and"}]},{"id":"ia-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ia-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Identification and authentication policy {{ insert: param, ia-1_prm_2 }}; and"},{"id":"ia-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Identification and authentication procedures {{ insert: param, ia-1_prm_3 }}."}]}]},{"id":"ia-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the IA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ia-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ia-1.a_obj","name":"objective","props":[{"name":"label","value":"IA-1(a)"}],"parts":[{"id":"ia-1.a.1_obj","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)"}],"parts":[{"id":"ia-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1]"}],"prose":"develops and documents an identification and authentication policy that addresses:","parts":[{"id":"ia-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ia-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ia-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ia-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ia-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ia-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ia-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ia-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the identification and authentication policy is to be disseminated; and"},{"id":"ia-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"IA-1(a)(1)[3]"}],"prose":"disseminates the identification and authentication policy to organization-defined personnel or roles;"}]},{"id":"ia-1.a.2_obj","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)"}],"parts":[{"id":"ia-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls;"},{"id":"ia-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ia-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"IA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ia-1.b_obj","name":"objective","props":[{"name":"label","value":"IA-1(b)"}],"parts":[{"id":"ia-1.b.1_obj","name":"objective","props":[{"name":"label","value":"IA-1(b)(1)"}],"parts":[{"id":"ia-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current identification and authentication policy;"},{"id":"ia-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(b)(1)[2]"}],"prose":"reviews and updates the current identification and authentication policy with the organization-defined frequency; and"}]},{"id":"ia-1.b.2_obj","name":"objective","props":[{"name":"label","value":"IA-1(b)(2)"}],"parts":[{"id":"ia-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"IA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current identification and authentication procedures; and"},{"id":"ia-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"IA-1(b)(2)[2]"}],"prose":"reviews and updates the current identification and authentication procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with identification and authentication responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ia-2","class":"SP800-53","title":"Identification and Authentication (organizational Users)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-2"},{"name":"sort-id","value":"ia-02"}],"links":[{"href":"#ad733a42-a7ed-4774-b988-4930c28852f3","rel":"reference"},{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#4da24a96-6cf8-435d-9d1f-c73247cad109","rel":"reference"},{"href":"#74e740a4-c45d-49f3-a86e-eb747c549e01","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#ba557c91-ba3e-4792-adc6-a4ae479b39ff","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ia-2_smt","name":"statement","prose":"The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users)."},{"id":"ia-2_gdn","name":"guidance","prose":"Organizational users include employees or individuals that organizations deem to have equivalent status of employees (e.g., contractors, guest researchers). This control applies to all accesses other than: (i) accesses that are explicitly identified and documented in AC-14; and (ii) accesses that occur through authorized use of group authenticators without individual authentication. Organizations may require unique identification of individuals in group accounts (e.g., shared privilege accounts) or for detailed accountability of individual activity. Organizations employ passwords, tokens, or biometrics to authenticate user identities, or in the case multifactor authentication, or some combination thereof. Access to organizational information systems is defined as either local access or network access. Local access is any access to organizational information systems by users (or processes acting on behalf of users) where such access is obtained by direct connections without the use of networks. Network access is access to organizational information systems by users (or processes acting on behalf of users) where such access is obtained through network connections (i.e., nonlocal accesses). Remote access is a type of network access that involves communication through external networks (e.g., the Internet). Internal networks include local area networks and wide area networks. In addition, the use of encrypted virtual private networks (VPNs) for network connections between organization-controlled endpoints and non-organization controlled endpoints may be treated as internal networks from the perspective of protecting the confidentiality and integrity of information traversing the network. Organizations can satisfy the identification and authentication requirements in this control by complying with the requirements in Homeland Security Presidential Directive 12 consistent with the specific organizational implementation plans. Multifactor authentication requires the use of two or more different factors to achieve authentication. The factors are defined as: (i) something you know (e.g., password, personal identification number [PIN]); (ii) something you have (e.g., cryptographic identification device, token); or (iii) something you are (e.g., biometric). Multifactor solutions that require devices separate from information systems gaining access include, for example, hardware tokens providing time-based or challenge-response authenticators and smart cards such as the U.S. Government Personal Identity Verification card and the DoD common access card. In addition to identifying and authenticating users at the information system level (i.e., at logon), organizations also employ identification and authentication mechanisms at the application level, when necessary, to provide increased information security. Identification and authentication requirements for other than organizational users are described in IA-8.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"}]},{"id":"ia-2_obj","name":"objective","prose":"Determine if the information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users)."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for uniquely identifying and authenticating users\n\nautomated mechanisms supporting and\/or implementing identification and authentication capability"}]}],"controls":[{"id":"ia-2.1","class":"SP800-53-enhancement","title":"Network Access to Privileged Accounts","props":[{"name":"label","value":"IA-2(1)"},{"name":"sort-id","value":"ia-02.01"}],"parts":[{"id":"ia-2.1_smt","name":"statement","prose":"The information system implements multifactor authentication for network access to privileged accounts."},{"id":"ia-2.1_gdn","name":"guidance","links":[{"href":"#ac-6","rel":"related"}]},{"id":"ia-2.1_obj","name":"objective","prose":"Determine if the information system implements multifactor authentication for network access to privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing multifactor authentication capability"}]}]},{"id":"ia-2.2","class":"SP800-53-enhancement","title":"Network Access to Non-privileged Accounts","props":[{"name":"label","value":"IA-2(2)"},{"name":"sort-id","value":"ia-02.02"}],"parts":[{"id":"ia-2.2_smt","name":"statement","prose":"The information system implements multifactor authentication for network access to non-privileged accounts."},{"id":"ia-2.2_obj","name":"objective","prose":"Determine if the information system implements multifactor authentication for network access to non-privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing multifactor authentication capability"}]}]},{"id":"ia-2.3","class":"SP800-53-enhancement","title":"Local Access to Privileged Accounts","props":[{"name":"label","value":"IA-2(3)"},{"name":"sort-id","value":"ia-02.03"}],"parts":[{"id":"ia-2.3_smt","name":"statement","prose":"The information system implements multifactor authentication for local access to privileged accounts."},{"id":"ia-2.3_gdn","name":"guidance","links":[{"href":"#ac-6","rel":"related"}]},{"id":"ia-2.3_obj","name":"objective","prose":"Determine if the information system implements multifactor authentication for local access to privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing multifactor authentication capability"}]}]},{"id":"ia-2.8","class":"SP800-53-enhancement","title":"Network Access to Privileged Accounts - Replay Resistant","props":[{"name":"label","value":"IA-2(8)"},{"name":"sort-id","value":"ia-02.08"}],"parts":[{"id":"ia-2.8_smt","name":"statement","prose":"The information system implements replay-resistant authentication mechanisms for network access to privileged accounts."},{"id":"ia-2.8_gdn","name":"guidance","prose":"Authentication processes resist replay attacks if it is impractical to achieve successful authentications by replaying previous authentication messages. Replay-resistant techniques include, for example, protocols that use nonces or challenges such as Transport Layer Security (TLS) and time synchronous or challenge-response one-time authenticators."},{"id":"ia-2.8_obj","name":"objective","prose":"Determine if the information system implements replay-resistant authentication mechanisms for network access to privileged accounts."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of privileged information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms supporting and\/or implementing replay resistant authentication mechanisms"}]}]},{"id":"ia-2.11","class":"SP800-53-enhancement","title":"Remote Access - Separate Device","params":[{"id":"ia-2.11_prm_1","label":"organization-defined strength of mechanism requirements"}],"props":[{"name":"label","value":"IA-2(11)"},{"name":"sort-id","value":"ia-02.11"}],"parts":[{"id":"ia-2.11_smt","name":"statement","prose":"The information system implements multifactor authentication for remote access to privileged and non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets {{ insert: param, ia-2.11_prm_1 }}."},{"id":"ia-2.11_gdn","name":"guidance","prose":"For remote access to privileged\/non-privileged accounts, the purpose of requiring a device that is separate from the information system gaining access for one of the factors during multifactor authentication is to reduce the likelihood of compromising authentication credentials stored on the system. For example, adversaries deploying malicious code on organizational information systems can potentially compromise such credentials resident on the system and subsequently impersonate authorized users.","links":[{"href":"#ac-6","rel":"related"}]},{"id":"ia-2.11_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ia-2.11_obj.1","name":"objective","props":[{"name":"label","value":"IA-2(11)[1]"}],"prose":"the information system implements multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access;"},{"id":"ia-2.11_obj.2","name":"objective","props":[{"name":"label","value":"IA-2(11)[2]"}],"prose":"the information system implements multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access;"},{"id":"ia-2.11_obj.3","name":"objective","props":[{"name":"label","value":"IA-2(11)[3]"}],"prose":"the organization defines strength of mechanism requirements to be enforced by a device separate from the system gaining remote access to privileged accounts;"},{"id":"ia-2.11_obj.4","name":"objective","props":[{"name":"label","value":"IA-2(11)[4]"}],"prose":"the organization defines strength of mechanism requirements to be enforced by a device separate from the system gaining remote access to non-privileged accounts;"},{"id":"ia-2.11_obj.5","name":"objective","props":[{"name":"label","value":"IA-2(11)[5]"}],"prose":"the information system implements multifactor authentication for remote access to privileged accounts such that a device, separate from the system gaining access, meets organization-defined strength of mechanism requirements; and"},{"id":"ia-2.11_obj.6","name":"objective","props":[{"name":"label","value":"IA-2(11)[6]"}],"prose":"the information system implements multifactor authentication for remote access to non-privileged accounts such that a device, separate from the system gaining access, meets organization-defined strength of mechanism requirements."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of privileged and non-privileged information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability"}]}]},{"id":"ia-2.12","class":"SP800-53-enhancement","title":"Acceptance of PIV Credentials","props":[{"name":"label","value":"IA-2(12)"},{"name":"sort-id","value":"ia-02.12"}],"parts":[{"id":"ia-2.12_smt","name":"statement","prose":"The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials."},{"id":"ia-2.12_gdn","name":"guidance","prose":"This control enhancement applies to organizations implementing logical access control systems (LACS) and physical access control systems (PACS). Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11 requires federal agencies to continue implementing the requirements specified in HSPD-12 to enable agency-wide use of PIV credentials.","links":[{"href":"#au-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#sa-4","rel":"related"}]},{"id":"ia-2.12_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"ia-2.12_obj.1","name":"objective","props":[{"name":"label","value":"IA-2(12)[1]"}],"prose":"accepts Personal Identity Verification (PIV) credentials; and"},{"id":"ia-2.12_obj.2","name":"objective","props":[{"name":"label","value":"IA-2(12)[2]"}],"prose":"electronically verifies Personal Identity Verification (PIV) credentials."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nPIV verification records\n\nevidence of PIV credentials\n\nPIV credential authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing acceptance and verification of PIV credentials"}]}]}]},{"id":"ia-3","class":"SP800-53","title":"Device Identification and Authentication","params":[{"id":"ia-3_prm_1","label":"organization-defined specific and\/or types of devices"},{"id":"ia-3_prm_2","select":{"how-many":"one-or-more","choice":["local","remote","network"]}}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-3"},{"name":"sort-id","value":"ia-03"}],"parts":[{"id":"ia-3_smt","name":"statement","prose":"The information system uniquely identifies and authenticates {{ insert: param, ia-3_prm_1 }} before establishing a {{ insert: param, ia-3_prm_2 }} connection."},{"id":"ia-3_gdn","name":"guidance","prose":"Organizational devices requiring unique device-to-device identification and authentication may be defined by type, by device, or by a combination of type\/device. Information systems typically use either shared known information (e.g., Media Access Control [MAC] or Transmission Control Protocol\/Internet Protocol [TCP\/IP] addresses) for device identification or organizational authentication solutions (e.g., IEEE 802.1x and Extensible Authentication Protocol [EAP], Radius server with EAP-Transport Layer Security [TLS] authentication, Kerberos) to identify\/authenticate devices on local and\/or wide area networks. Organizations determine the required strength of authentication mechanisms by the security categories of information systems. Because of the challenges of applying this control on large scale, organizations are encouraged to only apply the control to those limited number (and type) of devices that truly need to support this capability.","links":[{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"}]},{"id":"ia-3_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ia-3_obj.1","name":"objective","props":[{"name":"label","value":"IA-3[1]"}],"prose":"the organization defines specific and\/or types of devices that the information system uniquely identifies and authenticates before establishing one or more of the following:","parts":[{"id":"ia-3_obj.1.a","name":"objective","props":[{"name":"label","value":"IA-3[1][a]"}],"prose":"a local connection;"},{"id":"ia-3_obj.1.b","name":"objective","props":[{"name":"label","value":"IA-3[1][b]"}],"prose":"a remote connection; and\/or"},{"id":"ia-3_obj.1.c","name":"objective","props":[{"name":"label","value":"IA-3[1][c]"}],"prose":"a network connection; and"}]},{"id":"ia-3_obj.2","name":"objective","props":[{"name":"label","value":"IA-3[2]"}],"prose":"the information system uniquely identifies and authenticates organization-defined devices before establishing one or more of the following:","parts":[{"id":"ia-3_obj.2.a","name":"objective","props":[{"name":"label","value":"IA-3[2][a]"}],"prose":"a local connection;"},{"id":"ia-3_obj.2.b","name":"objective","props":[{"name":"label","value":"IA-3[2][b]"}],"prose":"a remote connection; and\/or"},{"id":"ia-3_obj.2.c","name":"objective","props":[{"name":"label","value":"IA-3[2][c]"}],"prose":"a network connection."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing device identification and authentication\n\ninformation system design documentation\n\nlist of devices requiring unique identification and authentication\n\ndevice connection reports\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with operational responsibilities for device identification and authentication\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing device identification and authentication capability"}]}]},{"id":"ia-4","class":"SP800-53","title":"Identifier Management","params":[{"id":"ia-4_prm_1","label":"organization-defined personnel or roles"},{"id":"ia-4_prm_2","label":"organization-defined time period"},{"id":"ia-4_prm_3","label":"organization-defined time period of inactivity"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-4"},{"name":"sort-id","value":"ia-04"}],"links":[{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"}],"parts":[{"id":"ia-4_smt","name":"statement","prose":"The organization manages information system identifiers by:","parts":[{"id":"ia-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Receiving authorization from {{ insert: param, ia-4_prm_1 }} to assign an individual, group, role, or device identifier;"},{"id":"ia-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Selecting an identifier that identifies an individual, group, role, or device;"},{"id":"ia-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Assigning the identifier to the intended individual, group, role, or device;"},{"id":"ia-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Preventing reuse of identifiers for {{ insert: param, ia-4_prm_2 }}; and"},{"id":"ia-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Disabling the identifier after {{ insert: param, ia-4_prm_3 }}."}]},{"id":"ia-4_gdn","name":"guidance","prose":"Common device identifiers include, for example, media access control (MAC), Internet protocol (IP) addresses, or device-unique token identifiers. Management of individual identifiers is not applicable to shared information system accounts (e.g., guest and anonymous accounts). Typically, individual identifiers are the user names of the information system accounts assigned to those individuals. In such instances, the account management activities of AC-2 use account names provided by IA-4. This control also addresses individual identifiers not necessarily associated with information system accounts (e.g., identifiers used in physical security control databases accessed by badge reader systems for access to information systems). Preventing reuse of identifiers implies preventing the assignment of previously used individual, group, role, or device identifiers to different individuals, groups, roles, or devices.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#sc-37","rel":"related"}]},{"id":"ia-4_obj","name":"objective","prose":"Determine if the organization manages information system identifiers by:","parts":[{"id":"ia-4.a_obj","name":"objective","props":[{"name":"label","value":"IA-4(a)"}],"parts":[{"id":"ia-4.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(a)[1]"}],"prose":"defining personnel or roles from whom authorization must be received to assign:","parts":[{"id":"ia-4.a_obj.1.a","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][a]"}],"prose":"an individual identifier;"},{"id":"ia-4.a_obj.1.b","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][b]"}],"prose":"a group identifier;"},{"id":"ia-4.a_obj.1.c","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][c]"}],"prose":"a role identifier; and\/or"},{"id":"ia-4.a_obj.1.d","name":"objective","props":[{"name":"label","value":"IA-4(a)[1][d]"}],"prose":"a device identifier;"}]},{"id":"ia-4.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(a)[2]"}],"prose":"receiving authorization from organization-defined personnel or roles to assign:","parts":[{"id":"ia-4.a_obj.2.a","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][a]"}],"prose":"an individual identifier;"},{"id":"ia-4.a_obj.2.b","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][b]"}],"prose":"a group identifier;"},{"id":"ia-4.a_obj.2.c","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][c]"}],"prose":"a role identifier; and\/or"},{"id":"ia-4.a_obj.2.d","name":"objective","props":[{"name":"label","value":"IA-4(a)[2][d]"}],"prose":"a device identifier;"}]}]},{"id":"ia-4.b_obj","name":"objective","props":[{"name":"label","value":"IA-4(b)"}],"prose":"selecting an identifier that identifies:","parts":[{"id":"ia-4.b_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(b)[1]"}],"prose":"an individual;"},{"id":"ia-4.b_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(b)[2]"}],"prose":"a group;"},{"id":"ia-4.b_obj.3","name":"objective","props":[{"name":"label","value":"IA-4(b)[3]"}],"prose":"a role; and\/or"},{"id":"ia-4.b_obj.4","name":"objective","props":[{"name":"label","value":"IA-4(b)[4]"}],"prose":"a device;"}]},{"id":"ia-4.c_obj","name":"objective","props":[{"name":"label","value":"IA-4(c)"}],"prose":"assigning the identifier to the intended:","parts":[{"id":"ia-4.c_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(c)[1]"}],"prose":"individual;"},{"id":"ia-4.c_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(c)[2]"}],"prose":"group;"},{"id":"ia-4.c_obj.3","name":"objective","props":[{"name":"label","value":"IA-4(c)[3]"}],"prose":"role; and\/or"},{"id":"ia-4.c_obj.4","name":"objective","props":[{"name":"label","value":"IA-4(c)[4]"}],"prose":"device;"}]},{"id":"ia-4.d_obj","name":"objective","props":[{"name":"label","value":"IA-4(d)"}],"parts":[{"id":"ia-4.d_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(d)[1]"}],"prose":"defining a time period for preventing reuse of identifiers;"},{"id":"ia-4.d_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(d)[2]"}],"prose":"preventing reuse of identifiers for the organization-defined time period;"}]},{"id":"ia-4.e_obj","name":"objective","props":[{"name":"label","value":"IA-4(e)"}],"parts":[{"id":"ia-4.e_obj.1","name":"objective","props":[{"name":"label","value":"IA-4(e)[1]"}],"prose":"defining a time period of inactivity to disable the identifier; and"},{"id":"ia-4.e_obj.2","name":"objective","props":[{"name":"label","value":"IA-4(e)[2]"}],"prose":"disabling the identifier after the organization-defined time period of inactivity."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing identifier management\n\nprocedures addressing account management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of information system accounts\n\nlist of identifiers generated from physical access control devices\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with identifier management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identifier management"}]}]},{"id":"ia-5","class":"SP800-53","title":"Authenticator Management","params":[{"id":"ia-5_prm_1","label":"organization-defined time period by authenticator type"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-5"},{"name":"sort-id","value":"ia-05"}],"links":[{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#74e740a4-c45d-49f3-a86e-eb747c549e01","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#ba557c91-ba3e-4792-adc6-a4ae479b39ff","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ia-5_smt","name":"statement","prose":"The organization manages information system authenticators by:","parts":[{"id":"ia-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, or device receiving the authenticator;"},{"id":"ia-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishing initial authenticator content for authenticators defined by the organization;"},{"id":"ia-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensuring that authenticators have sufficient strength of mechanism for their intended use;"},{"id":"ia-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Establishing and implementing administrative procedures for initial authenticator distribution, for lost\/compromised or damaged authenticators, and for revoking authenticators;"},{"id":"ia-5_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Changing default content of authenticators prior to information system installation;"},{"id":"ia-5_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Establishing minimum and maximum lifetime restrictions and reuse conditions for authenticators;"},{"id":"ia-5_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Changing\/refreshing authenticators {{ insert: param, ia-5_prm_1 }};"},{"id":"ia-5_smt.h","name":"item","props":[{"name":"label","value":"h."}],"prose":"Protecting authenticator content from unauthorized disclosure and modification;"},{"id":"ia-5_smt.i","name":"item","props":[{"name":"label","value":"i."}],"prose":"Requiring individuals to take, and having devices implement, specific security safeguards to protect authenticators; and"},{"id":"ia-5_smt.j","name":"item","props":[{"name":"label","value":"j."}],"prose":"Changing authenticators for group\/role accounts when membership to those accounts changes."}]},{"id":"ia-5_gdn","name":"guidance","prose":"Individual authenticators include, for example, passwords, tokens, biometrics, PKI certificates, and key cards. Initial authenticator content is the actual content (e.g., the initial password) as opposed to requirements about authenticator content (e.g., minimum password length). In many cases, developers ship information system components with factory default authentication credentials to allow for initial installation and configuration. Default authentication credentials are often well known, easily discoverable, and present a significant security risk. The requirement to protect individual authenticators may be implemented via control PL-4 or PS-6 for authenticators in the possession of individuals and by controls AC-3, AC-6, and SC-28 for authenticators stored within organizational information systems (e.g., passwords stored in hashed or encrypted formats, files containing encrypted or hashed passwords accessible with administrator privileges). Information systems support individual authenticator management by organization-defined settings and restrictions for various authenticator characteristics including, for example, minimum password length, password composition, validation time window for time synchronous one-time tokens, and number of allowed rejections during the verification stage of biometric authentication. Specific actions that can be taken to safeguard authenticators include, for example, maintaining possession of individual authenticators, not loaning or sharing individual authenticators with others, and reporting lost, stolen, or compromised authenticators immediately. Authenticator management includes issuing and revoking, when no longer needed, authenticators for temporary access such as that required for remote maintenance. Device authenticators include, for example, certificates and passwords.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#ps-5","rel":"related"},{"href":"#ps-6","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-17","rel":"related"},{"href":"#sc-28","rel":"related"}]},{"id":"ia-5_obj","name":"objective","prose":"Determine if the organization manages information system authenticators by:","parts":[{"id":"ia-5.a_obj","name":"objective","props":[{"name":"label","value":"IA-5(a)"}],"prose":"verifying, as part of the initial authenticator distribution, the identity of:","parts":[{"id":"ia-5.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(a)[1]"}],"prose":"the individual receiving the authenticator;"},{"id":"ia-5.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(a)[2]"}],"prose":"the group receiving the authenticator;"},{"id":"ia-5.a_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(a)[3]"}],"prose":"the role receiving the authenticator; and\/or"},{"id":"ia-5.a_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(a)[4]"}],"prose":"the device receiving the authenticator;"}]},{"id":"ia-5.b_obj","name":"objective","props":[{"name":"label","value":"IA-5(b)"}],"prose":"establishing initial authenticator content for authenticators defined by the organization;"},{"id":"ia-5.c_obj","name":"objective","props":[{"name":"label","value":"IA-5(c)"}],"prose":"ensuring that authenticators have sufficient strength of mechanism for their intended use;"},{"id":"ia-5.d_obj","name":"objective","props":[{"name":"label","value":"IA-5(d)"}],"parts":[{"id":"ia-5.d_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(d)[1]"}],"prose":"establishing and implementing administrative procedures for initial authenticator distribution;"},{"id":"ia-5.d_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(d)[2]"}],"prose":"establishing and implementing administrative procedures for lost\/compromised or damaged authenticators;"},{"id":"ia-5.d_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(d)[3]"}],"prose":"establishing and implementing administrative procedures for revoking authenticators;"}]},{"id":"ia-5.e_obj","name":"objective","props":[{"name":"label","value":"IA-5(e)"}],"prose":"changing default content of authenticators prior to information system installation;"},{"id":"ia-5.f_obj","name":"objective","props":[{"name":"label","value":"IA-5(f)"}],"parts":[{"id":"ia-5.f_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(f)[1]"}],"prose":"establishing minimum lifetime restrictions for authenticators;"},{"id":"ia-5.f_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(f)[2]"}],"prose":"establishing maximum lifetime restrictions for authenticators;"},{"id":"ia-5.f_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(f)[3]"}],"prose":"establishing reuse conditions for authenticators;"}]},{"id":"ia-5.g_obj","name":"objective","props":[{"name":"label","value":"IA-5(g)"}],"parts":[{"id":"ia-5.g_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(g)[1]"}],"prose":"defining a time period (by authenticator type) for changing\/refreshing authenticators;"},{"id":"ia-5.g_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(g)[2]"}],"prose":"changing\/refreshing authenticators with the organization-defined time period by authenticator type;"}]},{"id":"ia-5.h_obj","name":"objective","props":[{"name":"label","value":"IA-5(h)"}],"prose":"protecting authenticator content from unauthorized:","parts":[{"id":"ia-5.h_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(h)[1]"}],"prose":"disclosure;"},{"id":"ia-5.h_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(h)[2]"}],"prose":"modification;"}]},{"id":"ia-5.i_obj","name":"objective","props":[{"name":"label","value":"IA-5(i)"}],"parts":[{"id":"ia-5.i_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(i)[1]"}],"prose":"requiring individuals to take specific security safeguards to protect authenticators;"},{"id":"ia-5.i_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(i)[2]"}],"prose":"having devices implement specific security safeguards to protect authenticators; and"}]},{"id":"ia-5.j_obj","name":"objective","props":[{"name":"label","value":"IA-5(j)"}],"prose":"changing authenticators for group\/role accounts when membership to those accounts changes."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator management\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of information system authenticator types\n\nchange control records associated with managing information system authenticators\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing authenticator management capability"}]}],"controls":[{"id":"ia-5.1","class":"SP800-53-enhancement","title":"Password-based Authentication","params":[{"id":"ia-5.1_prm_1","label":"organization-defined requirements for case sensitivity, number of characters, mix of upper-case letters, lower-case letters, numbers, and special characters, including minimum requirements for each type"},{"id":"ia-5.1_prm_2","label":"organization-defined number"},{"id":"ia-5.1_prm_3","label":"organization-defined numbers for lifetime minimum, lifetime maximum"},{"id":"ia-5.1_prm_4","label":"organization-defined number"}],"props":[{"name":"label","value":"IA-5(1)"},{"name":"sort-id","value":"ia-05.01"}],"parts":[{"id":"ia-5.1_smt","name":"statement","prose":"The information system, for password-based authentication:","parts":[{"id":"ia-5.1_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Enforces minimum password complexity of {{ insert: param, ia-5.1_prm_1 }};"},{"id":"ia-5.1_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Enforces at least the following number of changed characters when new passwords are created: {{ insert: param, ia-5.1_prm_2 }};"},{"id":"ia-5.1_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Stores and transmits only cryptographically-protected passwords;"},{"id":"ia-5.1_smt.d","name":"item","props":[{"name":"label","value":"(d)"}],"prose":"Enforces password minimum and maximum lifetime restrictions of {{ insert: param, ia-5.1_prm_3 }};"},{"id":"ia-5.1_smt.e","name":"item","props":[{"name":"label","value":"(e)"}],"prose":"Prohibits password reuse for {{ insert: param, ia-5.1_prm_4 }} generations; and"},{"id":"ia-5.1_smt.f","name":"item","props":[{"name":"label","value":"(f)"}],"prose":"Allows the use of a temporary password for system logons with an immediate change to a permanent password."}]},{"id":"ia-5.1_gdn","name":"guidance","prose":"This control enhancement applies to single-factor authentication of individuals using passwords as individual or group authenticators, and in a similar manner, when passwords are part of multifactor authenticators. This control enhancement does not apply when passwords are used to unlock hardware authenticators (e.g., Personal Identity Verification cards). The implementation of such password mechanisms may not meet all of the requirements in the enhancement. Cryptographically-protected passwords include, for example, encrypted versions of passwords and one-way cryptographic hashes of passwords. The number of changed characters refers to the number of changes required with respect to the total number of positions in the current password. Password lifetime restrictions do not apply to temporary passwords. To mitigate certain brute force attacks against passwords, organizations may also consider salting passwords.","links":[{"href":"#ia-6","rel":"related"}]},{"id":"ia-5.1_obj","name":"objective","prose":"Determine if, for password-based authentication:","parts":[{"id":"ia-5.1.a_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)"}],"parts":[{"id":"ia-5.1.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[1]"}],"prose":"the organization defines requirements for case sensitivity;"},{"id":"ia-5.1.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[2]"}],"prose":"the organization defines requirements for number of characters;"},{"id":"ia-5.1.a_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[3]"}],"prose":"the organization defines requirements for the mix of upper-case letters, lower-case letters, numbers and special characters;"},{"id":"ia-5.1.a_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[4]"}],"prose":"the organization defines minimum requirements for each type of character;"},{"id":"ia-5.1.a_obj.5","name":"objective","props":[{"name":"label","value":"IA-5(1)(a)[5]"}],"prose":"the information system enforces minimum password complexity of organization-defined requirements for case sensitivity, number of characters, mix of upper-case letters, lower-case letters, numbers, and special characters, including minimum requirements for each type;"}],"links":[{"href":"#ia-5.1_smt.a","rel":"corresp"}]},{"id":"ia-5.1.b_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(b)"}],"parts":[{"id":"ia-5.1.b_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(b)[1]"}],"prose":"the organization defines a minimum number of changed characters to be enforced when new passwords are created;"},{"id":"ia-5.1.b_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(b)[2]"}],"prose":"the information system enforces at least the organization-defined minimum number of characters that must be changed when new passwords are created;"}],"links":[{"href":"#ia-5.1_smt.b","rel":"corresp"}]},{"id":"ia-5.1.c_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(c)"}],"prose":"the information system stores and transmits only encrypted representations of passwords;","links":[{"href":"#ia-5.1_smt.c","rel":"corresp"}]},{"id":"ia-5.1.d_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)"}],"parts":[{"id":"ia-5.1.d_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[1]"}],"prose":"the organization defines numbers for password minimum lifetime restrictions to be enforced for passwords;"},{"id":"ia-5.1.d_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[2]"}],"prose":"the organization defines numbers for password maximum lifetime restrictions to be enforced for passwords;"},{"id":"ia-5.1.d_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[3]"}],"prose":"the information system enforces password minimum lifetime restrictions of organization-defined numbers for lifetime minimum;"},{"id":"ia-5.1.d_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(1)(d)[4]"}],"prose":"the information system enforces password maximum lifetime restrictions of organization-defined numbers for lifetime maximum;"}],"links":[{"href":"#ia-5.1_smt.d","rel":"corresp"}]},{"id":"ia-5.1.e_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(e)"}],"parts":[{"id":"ia-5.1.e_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(1)(e)[1]"}],"prose":"the organization defines the number of password generations to be prohibited from password reuse;"},{"id":"ia-5.1.e_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(1)(e)[2]"}],"prose":"the information system prohibits password reuse for the organization-defined number of generations; and"}],"links":[{"href":"#ia-5.1_smt.e","rel":"corresp"}]},{"id":"ia-5.1.f_obj","name":"objective","props":[{"name":"label","value":"IA-5(1)(f)"}],"prose":"the information system allows the use of a temporary password for system logons with an immediate change to a permanent password.","links":[{"href":"#ia-5.1_smt.f","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\npassword policy\n\nprocedures addressing authenticator management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\npassword configurations and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing password-based authenticator management capability"}]}]},{"id":"ia-5.2","class":"SP800-53-enhancement","title":"Pki-based Authentication","props":[{"name":"label","value":"IA-5(2)"},{"name":"sort-id","value":"ia-05.02"}],"parts":[{"id":"ia-5.2_smt","name":"statement","prose":"The information system, for PKI-based authentication:","parts":[{"id":"ia-5.2_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Validates certifications by constructing and verifying a certification path to an accepted trust anchor including checking certificate status information;"},{"id":"ia-5.2_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Enforces authorized access to the corresponding private key;"},{"id":"ia-5.2_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Maps the authenticated identity to the account of the individual or group; and"},{"id":"ia-5.2_smt.d","name":"item","props":[{"name":"label","value":"(d)"}],"prose":"Implements a local cache of revocation data to support path discovery and validation in case of inability to access revocation information via the network."}]},{"id":"ia-5.2_gdn","name":"guidance","prose":"Status information for certification paths includes, for example, certificate revocation lists or certificate status protocol responses. For PIV cards, validation of certifications involves the construction and verification of a certification path to the Common Policy Root trust anchor including certificate policy processing.","links":[{"href":"#ia-6","rel":"related"}]},{"id":"ia-5.2_obj","name":"objective","prose":"Determine if the information system, for PKI-based authentication:","parts":[{"id":"ia-5.2.a_obj","name":"objective","props":[{"name":"label","value":"IA-5(2)(a)"}],"parts":[{"id":"ia-5.2.a_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(2)(a)[1]"}],"prose":"validates certifications by constructing a certification path to an accepted trust anchor;"},{"id":"ia-5.2.a_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(2)(a)[2]"}],"prose":"validates certifications by verifying a certification path to an accepted trust anchor;"},{"id":"ia-5.2.a_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(2)(a)[3]"}],"prose":"includes checking certificate status information when constructing and verifying the certification path;"}],"links":[{"href":"#ia-5.2_smt.a","rel":"corresp"}]},{"id":"ia-5.2.b_obj","name":"objective","props":[{"name":"label","value":"IA-5(2)(b)"}],"prose":"enforces authorized access to the corresponding private key;","links":[{"href":"#ia-5.2_smt.b","rel":"corresp"}]},{"id":"ia-5.2.c_obj","name":"objective","props":[{"name":"label","value":"IA-5(2)(c)"}],"prose":"maps the authenticated identity to the account of the individual or group; and","links":[{"href":"#ia-5.2_smt.c","rel":"corresp"}]},{"id":"ia-5.2.d_obj","name":"objective","props":[{"name":"label","value":"IA-5(2)(d)"}],"prose":"implements a local cache of revocation data to support path discovery and validation in case of inability to access revocation information via the network.","links":[{"href":"#ia-5.2_smt.d","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator management\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nPKI certification validation records\n\nPKI certification revocation lists\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with PKI-based, authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing PKI-based, authenticator management capability"}]}]},{"id":"ia-5.3","class":"SP800-53-enhancement","title":"In-person or Trusted Third-party Registration","params":[{"id":"ia-5.3_prm_1","label":"organization-defined types of and\/or specific authenticators"},{"id":"ia-5.3_prm_2","select":{"choice":["in person","by a trusted third party"]}},{"id":"ia-5.3_prm_3","label":"organization-defined registration authority"},{"id":"ia-5.3_prm_4","label":"organization-defined personnel or roles"}],"props":[{"name":"label","value":"IA-5(3)"},{"name":"sort-id","value":"ia-05.03"}],"parts":[{"id":"ia-5.3_smt","name":"statement","prose":"The organization requires that the registration process to receive {{ insert: param, ia-5.3_prm_1 }} be conducted {{ insert: param, ia-5.3_prm_2 }} before {{ insert: param, ia-5.3_prm_3 }} with authorization by {{ insert: param, ia-5.3_prm_4 }}."},{"id":"ia-5.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ia-5.3_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(3)[1]"}],"prose":"defines types of and\/or specific authenticators to be received in person or by a trusted third party;"},{"id":"ia-5.3_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(3)[2]"}],"prose":"defines the registration authority with oversight of the registration process for receipt of organization-defined types of and\/or specific authenticators;"},{"id":"ia-5.3_obj.3","name":"objective","props":[{"name":"label","value":"IA-5(3)[3]"}],"prose":"defines personnel or roles responsible for authorizing organization-defined registration authority;"},{"id":"ia-5.3_obj.4","name":"objective","props":[{"name":"label","value":"IA-5(3)[4]"}],"prose":"defines if the registration process is to be conducted:","parts":[{"id":"ia-5.3_obj.4.a","name":"objective","props":[{"name":"label","value":"IA-5(3)[4][a]"}],"prose":"in person; or"},{"id":"ia-5.3_obj.4.b","name":"objective","props":[{"name":"label","value":"IA-5(3)[4][b]"}],"prose":"by a trusted third party; and"}]},{"id":"ia-5.3_obj.5","name":"objective","props":[{"name":"label","value":"IA-5(3)[5]"}],"prose":"requires that the registration process to receive organization-defined types of and\/or specific authenticators be conducted in person or by a trusted third party before organization-defined registration authority with authorization by organization-defined personnel or roles."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator management\n\nregistration process for receiving information system authenticators\n\nlist of authenticators requiring in-person registration\n\nlist of authenticators requiring trusted third party registration\n\nauthenticator registration documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\nregistration authority\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ia-5.11","class":"SP800-53-enhancement","title":"Hardware Token-based Authentication","params":[{"id":"ia-5.11_prm_1","label":"organization-defined token quality requirements"}],"props":[{"name":"label","value":"IA-5(11)"},{"name":"sort-id","value":"ia-05.11"}],"parts":[{"id":"ia-5.11_smt","name":"statement","prose":"The information system, for hardware token-based authentication, employs mechanisms that satisfy {{ insert: param, ia-5.11_prm_1 }}."},{"id":"ia-5.11_gdn","name":"guidance","prose":"Hardware token-based authentication typically refers to the use of PKI-based tokens, such as the U.S. Government Personal Identity Verification (PIV) card. Organizations define specific requirements for tokens, such as working with a particular PKI."},{"id":"ia-5.11_obj","name":"objective","prose":"Determine if, for hardware token-based authentication:","parts":[{"id":"ia-5.11_obj.1","name":"objective","props":[{"name":"label","value":"IA-5(11)[1]"}],"prose":"the organization defines token quality requirements to be satisfied; and"},{"id":"ia-5.11_obj.2","name":"objective","props":[{"name":"label","value":"IA-5(11)[2]"}],"prose":"the information system employs mechanisms that satisfy organization-defined token quality requirements."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator management\n\nsecurity plan\n\ninformation system design documentation\n\nautomated mechanisms employing hardware token-based authentication for the information system\n\nlist of token quality requirements\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with authenticator management responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing hardware token-based authenticator management capability"}]}]}]},{"id":"ia-6","class":"SP800-53","title":"Authenticator Feedback","props":[{"name":"priority","value":"P2"},{"name":"label","value":"IA-6"},{"name":"sort-id","value":"ia-06"}],"parts":[{"id":"ia-6_smt","name":"statement","prose":"The information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation\/use by unauthorized individuals."},{"id":"ia-6_gdn","name":"guidance","prose":"The feedback from information systems does not provide information that would allow unauthorized individuals to compromise authentication mechanisms. For some types of information systems or system components, for example, desktops\/notebooks with relatively large monitors, the threat (often referred to as shoulder surfing) may be significant. For other types of systems or components, for example, mobile devices with 2-4 inch screens, this threat may be less significant, and may need to be balanced against the increased likelihood of typographic input errors due to the small keyboards. Therefore, the means for obscuring the authenticator feedback is selected accordingly. Obscuring the feedback of authentication information includes, for example, displaying asterisks when users type passwords into input devices, or displaying feedback for a very limited time before fully obscuring it.","links":[{"href":"#pe-18","rel":"related"}]},{"id":"ia-6_obj","name":"objective","prose":"Determine if the information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation\/use by unauthorized individuals."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing authenticator feedback\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing the obscuring of feedback of authentication information during authentication"}]}]},{"id":"ia-7","class":"SP800-53","title":"Cryptographic Module Authentication","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-7"},{"name":"sort-id","value":"ia-07"}],"links":[{"href":"#39f9087d-7687-46d2-8eda-b6f4b7a4d8a9","rel":"reference"},{"href":"#b09d1a31-d3c9-4138-a4f4-4c63816afd7d","rel":"reference"}],"parts":[{"id":"ia-7_smt","name":"statement","prose":"The information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication."},{"id":"ia-7_gdn","name":"guidance","prose":"Authentication mechanisms may be required within a cryptographic module to authenticate an operator accessing the module and to verify that the operator is authorized to assume the requested role and perform services within that role.","links":[{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"ia-7_obj","name":"objective","prose":"Determine if the information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing cryptographic module authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for cryptographic module authentication\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing cryptographic module authentication"}]}]},{"id":"ia-8","class":"SP800-53","title":"Identification and Authentication (non-organizational Users)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IA-8"},{"name":"sort-id","value":"ia-08"}],"links":[{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#74e740a4-c45d-49f3-a86e-eb747c549e01","rel":"reference"},{"href":"#599fe9ba-4750-4450-9eeb-b95bd19a5e8f","rel":"reference"},{"href":"#ba557c91-ba3e-4792-adc6-a4ae479b39ff","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#2157bb7e-192c-4eaa-877f-93ef6b0a3292","rel":"reference"},{"href":"#654f21e2-f3bc-43b2-abdc-60ab8d09744b","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ia-8_smt","name":"statement","prose":"The information system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users)."},{"id":"ia-8_gdn","name":"guidance","prose":"Non-organizational users include information system users other than organizational users explicitly covered by IA-2. These individuals are uniquely identified and authenticated for accesses other than those accesses explicitly identified and documented in AC-14. In accordance with the E-Authentication E-Government initiative, authentication of non-organizational users accessing federal information systems may be required to protect federal, proprietary, or privacy-related information (with exceptions noted for national security systems). Organizations use risk assessments to determine authentication needs and consider scalability, practicality, and security in balancing the need to ensure ease of use for access to federal information and information systems with the need to protect and adequately mitigate risk. IA-2 addresses identification and authentication requirements for access to information systems by organizational users.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#sc-8","rel":"related"}]},{"id":"ia-8_obj","name":"objective","prose":"Determine if the information system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users)."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of information system accounts\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability"}]}],"controls":[{"id":"ia-8.1","class":"SP800-53-enhancement","title":"Acceptance of PIV Credentials from Other Agencies","props":[{"name":"label","value":"IA-8(1)"},{"name":"sort-id","value":"ia-08.01"}],"parts":[{"id":"ia-8.1_smt","name":"statement","prose":"The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials from other federal agencies."},{"id":"ia-8.1_gdn","name":"guidance","prose":"This control enhancement applies to logical access control systems (LACS) and physical access control systems (PACS). Personal Identity Verification (PIV) credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. OMB Memorandum 11-11 requires federal agencies to continue implementing the requirements specified in HSPD-12 to enable agency-wide use of PIV credentials.","links":[{"href":"#au-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#sa-4","rel":"related"}]},{"id":"ia-8.1_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"ia-8.1_obj.1","name":"objective","props":[{"name":"label","value":"IA-8(1)[1]"}],"prose":"accepts Personal Identity Verification (PIV) credentials from other agencies; and"},{"id":"ia-8.1_obj.2","name":"objective","props":[{"name":"label","value":"IA-8(1)[2]"}],"prose":"electronically verifies Personal Identity Verification (PIV) credentials from other agencies."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nPIV verification records\n\nevidence of PIV credentials\n\nPIV credential authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms that accept and verify PIV credentials"}]}]},{"id":"ia-8.2","class":"SP800-53-enhancement","title":"Acceptance of Third-party Credentials","props":[{"name":"label","value":"IA-8(2)"},{"name":"sort-id","value":"ia-08.02"}],"parts":[{"id":"ia-8.2_smt","name":"statement","prose":"The information system accepts only FICAM-approved third-party credentials."},{"id":"ia-8.2_gdn","name":"guidance","prose":"This control enhancement typically applies to organizational information systems that are accessible to the general public, for example, public-facing websites. Third-party credentials are those credentials issued by nonfederal government entities approved by the Federal Identity, Credential, and Access Management (FICAM) Trust Framework Solutions initiative. Approved third-party credentials meet or exceed the set of minimum federal government-wide technical, security, privacy, and organizational maturity requirements. This allows federal government relying parties to trust such credentials at their approved assurance levels.","links":[{"href":"#au-2","rel":"related"}]},{"id":"ia-8.2_obj","name":"objective","prose":"Determine if the information system accepts only FICAM-approved third-party credentials."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nprocedures addressing user identification and authentication\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of FICAM-approved, third-party credentialing products, components, or services procured and implemented by organization\n\nthird-party credential verification records\n\nevidence of FICAM-approved third-party credentials\n\nthird-party credential authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms that accept FICAM-approved credentials"}]}]},{"id":"ia-8.3","class":"SP800-53-enhancement","title":"Use of Ficam-approved Products","params":[{"id":"ia-8.3_prm_1","label":"organization-defined information systems"}],"props":[{"name":"label","value":"IA-8(3)"},{"name":"sort-id","value":"ia-08.03"}],"parts":[{"id":"ia-8.3_smt","name":"statement","prose":"The organization employs only FICAM-approved information system components in {{ insert: param, ia-8.3_prm_1 }} to accept third-party credentials."},{"id":"ia-8.3_gdn","name":"guidance","prose":"This control enhancement typically applies to information systems that are accessible to the general public, for example, public-facing websites. FICAM-approved information system components include, for example, information technology products and software libraries that have been approved by the Federal Identity, Credential, and Access Management conformance program.","links":[{"href":"#sa-4","rel":"related"}]},{"id":"ia-8.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ia-8.3_obj.1","name":"objective","props":[{"name":"label","value":"IA-8(3)[1]"}],"prose":"defines information systems in which only FICAM-approved information system components are to be employed to accept third-party credentials; and"},{"id":"ia-8.3_obj.2","name":"objective","props":[{"name":"label","value":"IA-8(3)[2]"}],"prose":"employs only FICAM-approved information system components in organization-defined information systems to accept third-party credentials."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nsystem and services acquisition policy\n\nprocedures addressing user identification and authentication\n\nprocedures addressing the integration of security requirements into the acquisition process\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nthird-party credential validations\n\nthird-party credential authorizations\n\nthird-party credential records\n\nlist of FICAM-approved information system components procured and implemented by organization\n\nacquisition documentation\n\nacquisition contracts for information system procurements or services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information system security, acquisition, and contracting responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability"}]}]},{"id":"ia-8.4","class":"SP800-53-enhancement","title":"Use of Ficam-issued Profiles","props":[{"name":"label","value":"IA-8(4)"},{"name":"sort-id","value":"ia-08.04"}],"parts":[{"id":"ia-8.4_smt","name":"statement","prose":"The information system conforms to FICAM-issued profiles."},{"id":"ia-8.4_gdn","name":"guidance","prose":"This control enhancement addresses open identity management standards. To ensure that these standards are viable, robust, reliable, sustainable (e.g., available in commercial information technology products), and interoperable as documented, the United States Government assesses and scopes identity management standards and technology implementations against applicable federal legislation, directives, policies, and requirements. The result is FICAM-issued implementation profiles of approved protocols (e.g., FICAM authentication protocols such as SAML 2.0 and OpenID 2.0, as well as other protocols such as the FICAM Backend Attribute Exchange).","links":[{"href":"#sa-4","rel":"related"}]},{"id":"ia-8.4_obj","name":"objective","prose":"Determine if the information system conforms to FICAM-issued profiles."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Identification and authentication policy\n\nsystem and services acquisition policy\n\nprocedures addressing user identification and authentication\n\nprocedures addressing the integration of security requirements into the acquisition process\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nlist of FICAM-issued profiles and associated, approved protocols\n\nacquisition documentation\n\nacquisition contracts for information system procurements or services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system operations responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developers\n\norganizational personnel with account management responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing identification and authentication capability\n\nautomated mechanisms supporting and\/or implementing conformance with FICAM-issued profiles"}]}]}]}]},{"id":"ir","class":"family","title":"Incident Response","controls":[{"id":"ir-1","class":"SP800-53","title":"Incident Response Policy and Procedures","params":[{"id":"ir-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ir-1_prm_2","label":"organization-defined frequency"},{"id":"ir-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-1"},{"name":"sort-id","value":"ir-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"},{"href":"#6d431fee-658f-4a0e-9f2e-a38b5d398fab","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ir-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ir-1_prm_1 }}:","parts":[{"id":"ir-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"An incident response policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ir-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the incident response policy and associated incident response controls; and"}]},{"id":"ir-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ir-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Incident response policy {{ insert: param, ir-1_prm_2 }}; and"},{"id":"ir-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Incident response procedures {{ insert: param, ir-1_prm_3 }}."}]}]},{"id":"ir-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the IR family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ir-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-1.a_obj","name":"objective","props":[{"name":"label","value":"IR-1(a)"}],"parts":[{"id":"ir-1.a.1_obj","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)"}],"parts":[{"id":"ir-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1]"}],"prose":"develops and documents an incident response policy that addresses:","parts":[{"id":"ir-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ir-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ir-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ir-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ir-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ir-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ir-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ir-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the incident response policy is to be disseminated;"},{"id":"ir-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"IR-1(a)(1)[3]"}],"prose":"disseminates the incident response policy to organization-defined personnel or roles;"}]},{"id":"ir-1.a.2_obj","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)"}],"parts":[{"id":"ir-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the incident response policy and associated incident response controls;"},{"id":"ir-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ir-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"IR-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ir-1.b_obj","name":"objective","props":[{"name":"label","value":"IR-1(b)"}],"parts":[{"id":"ir-1.b.1_obj","name":"objective","props":[{"name":"label","value":"IR-1(b)(1)"}],"parts":[{"id":"ir-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current incident response policy;"},{"id":"ir-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(b)(1)[2]"}],"prose":"reviews and updates the current incident response policy with the organization-defined frequency;"}]},{"id":"ir-1.b.2_obj","name":"objective","props":[{"name":"label","value":"IR-1(b)(2)"}],"parts":[{"id":"ir-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"IR-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current incident response procedures; and"},{"id":"ir-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"IR-1(b)(2)[2]"}],"prose":"reviews and updates the current incident response procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ir-2","class":"SP800-53","title":"Incident Response Training","params":[{"id":"ir-2_prm_1","label":"organization-defined time period"},{"id":"ir-2_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"IR-2"},{"name":"sort-id","value":"ir-02"}],"links":[{"href":"#825438c3-248d-4e30-a51e-246473ce6ada","rel":"reference"},{"href":"#e12b5738-de74-4fb3-8317-a3995a8a1898","rel":"reference"}],"parts":[{"id":"ir-2_smt","name":"statement","prose":"The organization provides incident response training to information system users consistent with assigned roles and responsibilities:","parts":[{"id":"ir-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Within {{ insert: param, ir-2_prm_1 }} of assuming an incident response role or responsibility;"},{"id":"ir-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"When required by information system changes; and"},{"id":"ir-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":" {{ insert: param, ir-2_prm_2 }} thereafter."}]},{"id":"ir-2_gdn","name":"guidance","prose":"Incident response training provided by organizations is linked to the assigned roles and responsibilities of organizational personnel to ensure the appropriate content and level of detail is included in such training. For example, regular users may only need to know who to call or how to recognize an incident on the information system; system administrators may require additional training on how to handle\/remediate incidents; and incident responders may receive more specific training on forensics, reporting, system recovery, and restoration. Incident response training includes user training in the identification and reporting of suspicious activities, both from external and internal sources.","links":[{"href":"#at-3","rel":"related"},{"href":"#cp-3","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"ir-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-2.a_obj","name":"objective","props":[{"name":"label","value":"IR-2(a)"}],"parts":[{"id":"ir-2.a_obj.1","name":"objective","props":[{"name":"label","value":"IR-2(a)[1]"}],"prose":"defines a time period within which incident response training is to be provided to information system users assuming an incident response role or responsibility;"},{"id":"ir-2.a_obj.2","name":"objective","props":[{"name":"label","value":"IR-2(a)[2]"}],"prose":"provides incident response training to information system users consistent with assigned roles and responsibilities within the organization-defined time period of assuming an incident response role or responsibility;"}]},{"id":"ir-2.b_obj","name":"objective","props":[{"name":"label","value":"IR-2(b)"}],"prose":"provides incident response training to information system users consistent with assigned roles and responsibilities when required by information system changes;"},{"id":"ir-2.c_obj","name":"objective","props":[{"name":"label","value":"IR-2(c)"}],"parts":[{"id":"ir-2.c_obj.1","name":"objective","props":[{"name":"label","value":"IR-2(c)[1]"}],"prose":"defines the frequency to provide refresher incident response training to information system users consistent with assigned roles or responsibilities; and"},{"id":"ir-2.c_obj.2","name":"objective","props":[{"name":"label","value":"IR-2(c)[2]"}],"prose":"after the initial incident response training, provides refresher incident response training to information system users consistent with assigned roles and responsibilities in accordance with the organization-defined frequency to provide refresher training."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response training\n\nincident response training curriculum\n\nincident response training materials\n\nsecurity plan\n\nincident response plan\n\nsecurity plan\n\nincident response training records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response training and operational responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ir-3","class":"SP800-53","title":"Incident Response Testing","params":[{"id":"ir-3_prm_1","label":"organization-defined frequency"},{"id":"ir-3_prm_2","label":"organization-defined tests"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"IR-3"},{"name":"sort-id","value":"ir-03"}],"links":[{"href":"#0243a05a-e8a3-4d51-9364-4a9d20b0dcdf","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"}],"parts":[{"id":"ir-3_smt","name":"statement","prose":"The organization tests the incident response capability for the information system {{ insert: param, ir-3_prm_1 }} using {{ insert: param, ir-3_prm_2 }} to determine the incident response effectiveness and documents the results."},{"id":"ir-3_gdn","name":"guidance","prose":"Organizations test incident response capabilities to determine the overall effectiveness of the capabilities and to identify potential weaknesses or deficiencies. Incident response testing includes, for example, the use of checklists, walk-through or tabletop exercises, simulations (parallel\/full interrupt), and comprehensive exercises. Incident response testing can also include a determination of the effects on organizational operations (e.g., reduction in mission capabilities), organizational assets, and individuals due to incident response.","links":[{"href":"#cp-4","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"ir-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-3_obj.1","name":"objective","props":[{"name":"label","value":"IR-3[1]"}],"prose":"defines incident response tests to test the incident response capability for the information system;"},{"id":"ir-3_obj.2","name":"objective","props":[{"name":"label","value":"IR-3[2]"}],"prose":"defines the frequency to test the incident response capability for the information system; and"},{"id":"ir-3_obj.3","name":"objective","props":[{"name":"label","value":"IR-3[3]"}],"prose":"tests the incident response capability for the information system with the organization-defined frequency, using organization-defined tests to determine the incident response effectiveness and documents the results."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\ncontingency planning policy\n\nprocedures addressing incident response testing\n\nprocedures addressing contingency plan testing\n\nincident response testing material\n\nincident response test results\n\nincident response test plan\n\nincident response plan\n\ncontingency plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response testing responsibilities\n\norganizational personnel with information security responsibilities"}]}],"controls":[{"id":"ir-3.2","class":"SP800-53-enhancement","title":"Coordination with Related Plans","props":[{"name":"label","value":"IR-3(2)"},{"name":"sort-id","value":"ir-03.02"}],"parts":[{"id":"ir-3.2_smt","name":"statement","prose":"The organization coordinates incident response testing with organizational elements responsible for related plans."},{"id":"ir-3.2_gdn","name":"guidance","prose":"Organizational plans related to incident response testing include, for example, Business Continuity Plans, Contingency Plans, Disaster Recovery Plans, Continuity of Operations Plans, Crisis Communications Plans, Critical Infrastructure Plans, and Occupant Emergency Plans."},{"id":"ir-3.2_obj","name":"objective","prose":"Determine if the organization coordinates incident response testing with organizational elements responsible for related plans."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\ncontingency planning policy\n\nprocedures addressing incident response testing\n\nincident response testing documentation\n\nincident response plan\n\nbusiness continuity plans\n\ncontingency plans\n\ndisaster recovery plans\n\ncontinuity of operations plans\n\ncrisis communications plans\n\ncritical infrastructure plans\n\noccupant emergency plans\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response testing responsibilities\n\norganizational personnel with responsibilities for testing organizational plans related to incident response testing\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"ir-4","class":"SP800-53","title":"Incident Handling","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-4"},{"name":"sort-id","value":"ir-04"}],"links":[{"href":"#c5034e0c-eba6-4ecd-a541-79f0678f4ba4","rel":"reference"},{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"}],"parts":[{"id":"ir-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Implements an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery;"},{"id":"ir-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Coordinates incident handling activities with contingency planning activities; and"},{"id":"ir-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Incorporates lessons learned from ongoing incident handling activities into incident response procedures, training, and testing, and implements the resulting changes accordingly."}]},{"id":"ir-4_gdn","name":"guidance","prose":"Organizations recognize that incident response capability is dependent on the capabilities of organizational information systems and the mission\/business processes being supported by those systems. Therefore, organizations consider incident response as part of the definition, design, and development of mission\/business processes and information systems. Incident-related information can be obtained from a variety of sources including, for example, audit monitoring, network monitoring, physical access monitoring, user\/administrator reports, and reported supply chain events. Effective incident handling capability includes coordination among many organizational entities including, for example, mission\/business owners, information system owners, authorizing officials, human resources offices, physical and personnel security offices, legal departments, operations personnel, procurement offices, and the risk executive (function).","links":[{"href":"#au-6","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#cp-4","rel":"related"},{"href":"#ir-2","rel":"related"},{"href":"#ir-3","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#pe-6","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"ir-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-4.a_obj","name":"objective","props":[{"name":"label","value":"IR-4(a)"}],"prose":"implements an incident handling capability for security incidents that includes:","parts":[{"id":"ir-4.a_obj.1","name":"objective","props":[{"name":"label","value":"IR-4(a)[1]"}],"prose":"preparation;"},{"id":"ir-4.a_obj.2","name":"objective","props":[{"name":"label","value":"IR-4(a)[2]"}],"prose":"detection and analysis;"},{"id":"ir-4.a_obj.3","name":"objective","props":[{"name":"label","value":"IR-4(a)[3]"}],"prose":"containment;"},{"id":"ir-4.a_obj.4","name":"objective","props":[{"name":"label","value":"IR-4(a)[4]"}],"prose":"eradication;"},{"id":"ir-4.a_obj.5","name":"objective","props":[{"name":"label","value":"IR-4(a)[5]"}],"prose":"recovery;"}]},{"id":"ir-4.b_obj","name":"objective","props":[{"name":"label","value":"IR-4(b)"}],"prose":"coordinates incident handling activities with contingency planning activities;"},{"id":"ir-4.c_obj","name":"objective","props":[{"name":"label","value":"IR-4(c)"}],"parts":[{"id":"ir-4.c_obj.1","name":"objective","props":[{"name":"label","value":"IR-4(c)[1]"}],"prose":"incorporates lessons learned from ongoing incident handling activities into:","parts":[{"id":"ir-4.c_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-4(c)[1][a]"}],"prose":"incident response procedures;"},{"id":"ir-4.c_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-4(c)[1][b]"}],"prose":"training;"},{"id":"ir-4.c_obj.1.c","name":"objective","props":[{"name":"label","value":"IR-4(c)[1][c]"}],"prose":"testing\/exercises;"}]},{"id":"ir-4.c_obj.2","name":"objective","props":[{"name":"label","value":"IR-4(c)[2]"}],"prose":"implements the resulting changes accordingly to:","parts":[{"id":"ir-4.c_obj.2.a","name":"objective","props":[{"name":"label","value":"IR-4(c)[2][a]"}],"prose":"incident response procedures;"},{"id":"ir-4.c_obj.2.b","name":"objective","props":[{"name":"label","value":"IR-4(c)[2][b]"}],"prose":"training; and"},{"id":"ir-4.c_obj.2.c","name":"objective","props":[{"name":"label","value":"IR-4(c)[2][c]"}],"prose":"testing\/exercises."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\ncontingency planning policy\n\nprocedures addressing incident handling\n\nincident response plan\n\ncontingency plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident handling responsibilities\n\norganizational personnel with contingency planning responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Incident handling capability for the organization"}]}],"controls":[{"id":"ir-4.1","class":"SP800-53-enhancement","title":"Automated Incident Handling Processes","props":[{"name":"label","value":"IR-4(1)"},{"name":"sort-id","value":"ir-04.01"}],"parts":[{"id":"ir-4.1_smt","name":"statement","prose":"The organization employs automated mechanisms to support the incident handling process."},{"id":"ir-4.1_gdn","name":"guidance","prose":"Automated mechanisms supporting incident handling processes include, for example, online incident management systems."},{"id":"ir-4.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to support the incident handling process."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident handling\n\nautomated mechanisms supporting incident handling\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident handling responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms that support and\/or implement the incident handling process"}]}]}]},{"id":"ir-5","class":"SP800-53","title":"Incident Monitoring","props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-5"},{"name":"sort-id","value":"ir-05"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"}],"parts":[{"id":"ir-5_smt","name":"statement","prose":"The organization tracks and documents information system security incidents."},{"id":"ir-5_gdn","name":"guidance","prose":"Documenting information system security incidents includes, for example, maintaining records about each incident, the status of the incident, and other pertinent information necessary for forensics, evaluating incident details, trends, and handling. Incident information can be obtained from a variety of sources including, for example, incident reports, incident response teams, audit monitoring, network monitoring, physical access monitoring, and user\/administrator reports.","links":[{"href":"#au-6","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#pe-6","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"ir-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-5_obj.1","name":"objective","props":[{"name":"label","value":"IR-5[1]"}],"prose":"tracks information system security incidents; and"},{"id":"ir-5_obj.2","name":"objective","props":[{"name":"label","value":"IR-5[2]"}],"prose":"documents information system security incidents."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident monitoring\n\nincident response records and documentation\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident monitoring responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Incident monitoring capability for the organization\n\nautomated mechanisms supporting and\/or implementing tracking and documenting of system security incidents"}]}]},{"id":"ir-6","class":"SP800-53","title":"Incident Reporting","params":[{"id":"ir-6_prm_1","label":"organization-defined time period"},{"id":"ir-6_prm_2","label":"organization-defined authorities"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-6"},{"name":"sort-id","value":"ir-06"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"},{"href":"#02631467-668b-4233-989b-3dfded2fd184","rel":"reference"}],"parts":[{"id":"ir-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Requires personnel to report suspected security incidents to the organizational incident response capability within {{ insert: param, ir-6_prm_1 }}; and"},{"id":"ir-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reports security incident information to {{ insert: param, ir-6_prm_2 }}."}]},{"id":"ir-6_gdn","name":"guidance","prose":"The intent of this control is to address both specific incident reporting requirements within an organization and the formal incident reporting requirements for federal agencies and their subordinate organizations. Suspected security incidents include, for example, the receipt of suspicious email communications that can potentially contain malicious code. The types of security incidents reported, the content and timeliness of the reports, and the designated reporting authorities reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Current federal policy requires that all federal agencies (unless specifically exempted from such requirements) report security incidents to the United States Computer Emergency Readiness Team (US-CERT) within specified time frames designated in the US-CERT Concept of Operations for Federal Cyber Security Incident Handling.","links":[{"href":"#ir-4","rel":"related"},{"href":"#ir-5","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"ir-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-6.a_obj","name":"objective","props":[{"name":"label","value":"IR-6(a)"}],"parts":[{"id":"ir-6.a_obj.1","name":"objective","props":[{"name":"label","value":"IR-6(a)[1]"}],"prose":"defines the time period within which personnel report suspected security incidents to the organizational incident response capability;"},{"id":"ir-6.a_obj.2","name":"objective","props":[{"name":"label","value":"IR-6(a)[2]"}],"prose":"requires personnel to report suspected security incidents to the organizational incident response capability within the organization-defined time period;"}]},{"id":"ir-6.b_obj","name":"objective","props":[{"name":"label","value":"IR-6(b)"}],"parts":[{"id":"ir-6.b_obj.1","name":"objective","props":[{"name":"label","value":"IR-6(b)[1]"}],"prose":"defines authorities to whom security incident information is to be reported; and"},{"id":"ir-6.b_obj.2","name":"objective","props":[{"name":"label","value":"IR-6(b)[2]"}],"prose":"reports security incident information to organization-defined authorities."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident reporting\n\nincident reporting records and documentation\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident reporting responsibilities\n\norganizational personnel with information security responsibilities\n\npersonnel who have\/should have reported incidents\n\npersonnel (authorities) to whom incident information is to be reported"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incident reporting\n\nautomated mechanisms supporting and\/or implementing incident reporting"}]}],"controls":[{"id":"ir-6.1","class":"SP800-53-enhancement","title":"Automated Reporting","props":[{"name":"label","value":"IR-6(1)"},{"name":"sort-id","value":"ir-06.01"}],"parts":[{"id":"ir-6.1_smt","name":"statement","prose":"The organization employs automated mechanisms to assist in the reporting of security incidents."},{"id":"ir-6.1_gdn","name":"guidance","links":[{"href":"#ir-7","rel":"related"}]},{"id":"ir-6.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to assist in the reporting of security incidents."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident reporting\n\nautomated mechanisms supporting incident reporting\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident reporting responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incident reporting\n\nautomated mechanisms supporting and\/or implementing reporting of security incidents"}]}]}]},{"id":"ir-7","class":"SP800-53","title":"Incident Response Assistance","props":[{"name":"priority","value":"P2"},{"name":"label","value":"IR-7"},{"name":"sort-id","value":"ir-07"}],"parts":[{"id":"ir-7_smt","name":"statement","prose":"The organization provides an incident response support resource, integral to the organizational incident response capability that offers advice and assistance to users of the information system for the handling and reporting of security incidents."},{"id":"ir-7_gdn","name":"guidance","prose":"Incident response support resources provided by organizations include, for example, help desks, assistance groups, and access to forensics services, when required.","links":[{"href":"#at-2","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ir-6","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#sa-9","rel":"related"}]},{"id":"ir-7_obj","name":"objective","prose":"Determine if the organization provides an incident response support resource:","parts":[{"id":"ir-7_obj.1","name":"objective","props":[{"name":"label","value":"IR-7[1]"}],"prose":"that is integral to the organizational incident response capability; and"},{"id":"ir-7_obj.2","name":"objective","props":[{"name":"label","value":"IR-7[2]"}],"prose":"that offers advice and assistance to users of the information system for the handling and reporting of security incidents."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response assistance\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response assistance and support responsibilities\n\norganizational personnel with access to incident response support and assistance capability\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incident response assistance\n\nautomated mechanisms supporting and\/or implementing incident response assistance"}]}],"controls":[{"id":"ir-7.1","class":"SP800-53-enhancement","title":"Automation Support for Availability of Information \/ Support","props":[{"name":"label","value":"IR-7(1)"},{"name":"sort-id","value":"ir-07.01"}],"parts":[{"id":"ir-7.1_smt","name":"statement","prose":"The organization employs automated mechanisms to increase the availability of incident response-related information and support."},{"id":"ir-7.1_gdn","name":"guidance","prose":"Automated mechanisms can provide a push and\/or pull capability for users to obtain incident response assistance. For example, individuals might have access to a website to query the assistance capability, or conversely, the assistance capability may have the ability to proactively send information to users (general distribution or targeted) as part of increasing understanding of current response capabilities and support."},{"id":"ir-7.1_obj","name":"objective","prose":"Determine if the organization employs automated mechanisms to increase the availability of incident response-related information and support."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response assistance\n\nautomated mechanisms supporting incident response support and assistance\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nincident response plan\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response support and assistance responsibilities\n\norganizational personnel with access to incident response support and assistance capability\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incident response assistance\n\nautomated mechanisms supporting and\/or implementing an increase in the availability of incident response information and support"}]}]}]},{"id":"ir-8","class":"SP800-53","title":"Incident Response Plan","params":[{"id":"ir-8_prm_1","label":"organization-defined personnel or roles"},{"id":"ir-8_prm_2","label":"organization-defined incident response personnel (identified by name and\/or by role) and organizational elements"},{"id":"ir-8_prm_3","label":"organization-defined frequency"},{"id":"ir-8_prm_4","label":"organization-defined incident response personnel (identified by name and\/or by role) and organizational elements"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"IR-8"},{"name":"sort-id","value":"ir-08"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"}],"parts":[{"id":"ir-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"ir-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops an incident response plan that:","parts":[{"id":"ir-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Provides the organization with a roadmap for implementing its incident response capability;"},{"id":"ir-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Describes the structure and organization of the incident response capability;"},{"id":"ir-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Provides a high-level approach for how the incident response capability fits into the overall organization;"},{"id":"ir-8_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Meets the unique requirements of the organization, which relate to mission, size, structure, and functions;"},{"id":"ir-8_smt.a.5","name":"item","props":[{"name":"label","value":"5."}],"prose":"Defines reportable incidents;"},{"id":"ir-8_smt.a.6","name":"item","props":[{"name":"label","value":"6."}],"prose":"Provides metrics for measuring the incident response capability within the organization;"},{"id":"ir-8_smt.a.7","name":"item","props":[{"name":"label","value":"7."}],"prose":"Defines the resources and management support needed to effectively maintain and mature an incident response capability; and"},{"id":"ir-8_smt.a.8","name":"item","props":[{"name":"label","value":"8."}],"prose":"Is reviewed and approved by {{ insert: param, ir-8_prm_1 }};"}]},{"id":"ir-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Distributes copies of the incident response plan to {{ insert: param, ir-8_prm_2 }};"},{"id":"ir-8_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the incident response plan {{ insert: param, ir-8_prm_3 }};"},{"id":"ir-8_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Updates the incident response plan to address system\/organizational changes or problems encountered during plan implementation, execution, or testing;"},{"id":"ir-8_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Communicates incident response plan changes to {{ insert: param, ir-8_prm_4 }}; and"},{"id":"ir-8_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Protects the incident response plan from unauthorized disclosure and modification."}]},{"id":"ir-8_gdn","name":"guidance","prose":"It is important that organizations develop and implement a coordinated approach to incident response. Organizational missions, business functions, strategies, goals, and objectives for incident response help to determine the structure of incident response capabilities. As part of a comprehensive incident response capability, organizations consider the coordination and sharing of information with external organizations, including, for example, external service providers and organizations involved in the supply chain for organizational information systems.","links":[{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"}]},{"id":"ir-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ir-8.a_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)"}],"prose":"develops an incident response plan that:","parts":[{"id":"ir-8.a.1_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(1)"}],"prose":"provides the organization with a roadmap for implementing its incident response capability;"},{"id":"ir-8.a.2_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(2)"}],"prose":"describes the structure and organization of the incident response capability;"},{"id":"ir-8.a.3_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(3)"}],"prose":"provides a high-level approach for how the incident response capability fits into the overall organization;"},{"id":"ir-8.a.4_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)"}],"prose":"meets the unique requirements of the organization, which relate to:","parts":[{"id":"ir-8.a.4_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[1]"}],"prose":"mission;"},{"id":"ir-8.a.4_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[2]"}],"prose":"size;"},{"id":"ir-8.a.4_obj.3","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[3]"}],"prose":"structure;"},{"id":"ir-8.a.4_obj.4","name":"objective","props":[{"name":"label","value":"IR-8(a)(4)[4]"}],"prose":"functions;"}]},{"id":"ir-8.a.5_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(5)"}],"prose":"defines reportable incidents;"},{"id":"ir-8.a.6_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(6)"}],"prose":"provides metrics for measuring the incident response capability within the organization;"},{"id":"ir-8.a.7_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(7)"}],"prose":"defines the resources and management support needed to effectively maintain and mature an incident response capability;"},{"id":"ir-8.a.8_obj","name":"objective","props":[{"name":"label","value":"IR-8(a)(8)"}],"parts":[{"id":"ir-8.a.8_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(a)(8)[1]"}],"prose":"defines personnel or roles to review and approve the incident response plan;"},{"id":"ir-8.a.8_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(a)(8)[2]"}],"prose":"is reviewed and approved by organization-defined personnel or roles;"}]}]},{"id":"ir-8.b_obj","name":"objective","props":[{"name":"label","value":"IR-8(b)"}],"parts":[{"id":"ir-8.b_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(b)[1]"}],"parts":[{"id":"ir-8.b_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-8(b)[1][a]"}],"prose":"defines incident response personnel (identified by name and\/or by role) to whom copies of the incident response plan are to be distributed;"},{"id":"ir-8.b_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-8(b)[1][b]"}],"prose":"defines organizational elements to whom copies of the incident response plan are to be distributed;"}]},{"id":"ir-8.b_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(b)[2]"}],"prose":"distributes copies of the incident response plan to organization-defined incident response personnel (identified by name and\/or by role) and organizational elements;"}]},{"id":"ir-8.c_obj","name":"objective","props":[{"name":"label","value":"IR-8(c)"}],"parts":[{"id":"ir-8.c_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(c)[1]"}],"prose":"defines the frequency to review the incident response plan;"},{"id":"ir-8.c_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(c)[2]"}],"prose":"reviews the incident response plan with the organization-defined frequency;"}]},{"id":"ir-8.d_obj","name":"objective","props":[{"name":"label","value":"IR-8(d)"}],"prose":"updates the incident response plan to address system\/organizational changes or problems encountered during plan:","parts":[{"id":"ir-8.d_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(d)[1]"}],"prose":"implementation;"},{"id":"ir-8.d_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(d)[2]"}],"prose":"execution; or"},{"id":"ir-8.d_obj.3","name":"objective","props":[{"name":"label","value":"IR-8(d)[3]"}],"prose":"testing;"}]},{"id":"ir-8.e_obj","name":"objective","props":[{"name":"label","value":"IR-8(e)"}],"parts":[{"id":"ir-8.e_obj.1","name":"objective","props":[{"name":"label","value":"IR-8(e)[1]"}],"parts":[{"id":"ir-8.e_obj.1.a","name":"objective","props":[{"name":"label","value":"IR-8(e)[1][a]"}],"prose":"defines incident response personnel (identified by name and\/or by role) to whom incident response plan changes are to be communicated;"},{"id":"ir-8.e_obj.1.b","name":"objective","props":[{"name":"label","value":"IR-8(e)[1][b]"}],"prose":"defines organizational elements to whom incident response plan changes are to be communicated;"}]},{"id":"ir-8.e_obj.2","name":"objective","props":[{"name":"label","value":"IR-8(e)[2]"}],"prose":"communicates incident response plan changes to organization-defined incident response personnel (identified by name and\/or by role) and organizational elements; and"}]},{"id":"ir-8.f_obj","name":"objective","props":[{"name":"label","value":"IR-8(f)"}],"prose":"protects the incident response plan from unauthorized disclosure and modification."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Incident response policy\n\nprocedures addressing incident response planning\n\nincident response plan\n\nrecords of incident response plan reviews and approvals\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with incident response planning responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational incident response plan and related organizational processes"}]}]}]},{"id":"ma","class":"family","title":"Maintenance","controls":[{"id":"ma-1","class":"SP800-53","title":"System Maintenance Policy and Procedures","params":[{"id":"ma-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ma-1_prm_2","label":"organization-defined frequency"},{"id":"ma-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MA-1"},{"name":"sort-id","value":"ma-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ma-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ma-1_prm_1 }}:","parts":[{"id":"ma-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system maintenance policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ma-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system maintenance policy and associated system maintenance controls; and"}]},{"id":"ma-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ma-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System maintenance policy {{ insert: param, ma-1_prm_2 }}; and"},{"id":"ma-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System maintenance procedures {{ insert: param, ma-1_prm_3 }}."}]}]},{"id":"ma-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the MA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ma-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-1.a_obj","name":"objective","props":[{"name":"label","value":"MA-1(a)"}],"parts":[{"id":"ma-1.a.1_obj","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)"}],"parts":[{"id":"ma-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1]"}],"prose":"develops and documents a system maintenance policy that addresses:","parts":[{"id":"ma-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ma-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ma-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ma-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ma-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ma-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ma-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ma-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system maintenance policy is to be disseminated;"},{"id":"ma-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"MA-1(a)(1)[3]"}],"prose":"disseminates the system maintenance policy to organization-defined personnel or roles;"}]},{"id":"ma-1.a.2_obj","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)"}],"parts":[{"id":"ma-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the maintenance policy and associated system maintenance controls;"},{"id":"ma-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ma-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"MA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ma-1.b_obj","name":"objective","props":[{"name":"label","value":"MA-1(b)"}],"parts":[{"id":"ma-1.b.1_obj","name":"objective","props":[{"name":"label","value":"MA-1(b)(1)"}],"parts":[{"id":"ma-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system maintenance policy;"},{"id":"ma-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(b)(1)[2]"}],"prose":"reviews and updates the current system maintenance policy with the organization-defined frequency;"}]},{"id":"ma-1.b.2_obj","name":"objective","props":[{"name":"label","value":"MA-1(b)(2)"}],"parts":[{"id":"ma-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"MA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system maintenance procedures; and"},{"id":"ma-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"MA-1(b)(2)[2]"}],"prose":"reviews and updates the current system maintenance procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Maintenance policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ma-2","class":"SP800-53","title":"Controlled Maintenance","params":[{"id":"ma-2_prm_1","label":"organization-defined personnel or roles"},{"id":"ma-2_prm_2","label":"organization-defined maintenance-related information"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-2"},{"name":"sort-id","value":"ma-02"}],"parts":[{"id":"ma-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Schedules, performs, documents, and reviews records of maintenance and repairs on information system components in accordance with manufacturer or vendor specifications and\/or organizational requirements;"},{"id":"ma-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Approves and monitors all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;"},{"id":"ma-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Requires that {{ insert: param, ma-2_prm_1 }} explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions; and"},{"id":"ma-2_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Includes {{ insert: param, ma-2_prm_2 }} in organizational maintenance records."}]},{"id":"ma-2_gdn","name":"guidance","prose":"This control addresses the information security aspects of the information system maintenance program and applies to all types of maintenance to any system component (including applications) conducted by any local or nonlocal entity (e.g., in-contract, warranty, in-house, software maintenance agreement). System maintenance also includes those components not directly associated with information processing and\/or data\/information retention such as scanners, copiers, and printers. Information necessary for creating effective maintenance records includes, for example: (i) date and time of maintenance; (ii) name of individuals or group performing the maintenance; (iii) name of escort, if necessary; (iv) a description of the maintenance performed; and (v) information system components\/equipment removed or replaced (including identification numbers, if applicable). The level of detail included in maintenance records can be informed by the security categories of organizational information systems. Organizations consider supply chain issues associated with replacement components for information systems.","links":[{"href":"#cm-3","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-6","rel":"related"},{"href":"#pe-16","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"ma-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-2.a_obj","name":"objective","props":[{"name":"label","value":"MA-2(a)"}],"parts":[{"id":"ma-2.a_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(a)[1]"}],"prose":"schedules maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.1.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[1][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.1.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[1][b]"}],"prose":"organizational requirements;"}]},{"id":"ma-2.a_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(a)[2]"}],"prose":"performs maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.2.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[2][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.2.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[2][b]"}],"prose":"organizational requirements;"}]},{"id":"ma-2.a_obj.3","name":"objective","props":[{"name":"label","value":"MA-2(a)[3]"}],"prose":"documents maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.3.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[3][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.3.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[3][b]"}],"prose":"organizational requirements;"}]},{"id":"ma-2.a_obj.4","name":"objective","props":[{"name":"label","value":"MA-2(a)[4]"}],"prose":"reviews records of maintenance and repairs on information system components in accordance with:","parts":[{"id":"ma-2.a_obj.4.a","name":"objective","props":[{"name":"label","value":"MA-2(a)[4][a]"}],"prose":"manufacturer or vendor specifications; and\/or"},{"id":"ma-2.a_obj.4.b","name":"objective","props":[{"name":"label","value":"MA-2(a)[4][b]"}],"prose":"organizational requirements;"}]}]},{"id":"ma-2.b_obj","name":"objective","props":[{"name":"label","value":"MA-2(b)"}],"parts":[{"id":"ma-2.b_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(b)[1]"}],"prose":"approves all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;"},{"id":"ma-2.b_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(b)[2]"}],"prose":"monitors all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;"}]},{"id":"ma-2.c_obj","name":"objective","props":[{"name":"label","value":"MA-2(c)"}],"parts":[{"id":"ma-2.c_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(c)[1]"}],"prose":"defines personnel or roles required to explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2.c_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(c)[2]"}],"prose":"requires that organization-defined personnel or roles explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;"}]},{"id":"ma-2.d_obj","name":"objective","props":[{"name":"label","value":"MA-2(d)"}],"prose":"sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs;"},{"id":"ma-2.e_obj","name":"objective","props":[{"name":"label","value":"MA-2(e)"}],"prose":"checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions;"},{"id":"ma-2.f_obj","name":"objective","props":[{"name":"label","value":"MA-2(f)"}],"parts":[{"id":"ma-2.f_obj.1","name":"objective","props":[{"name":"label","value":"MA-2(f)[1]"}],"prose":"defines maintenance-related information to be included in organizational maintenance records; and"},{"id":"ma-2.f_obj.2","name":"objective","props":[{"name":"label","value":"MA-2(f)[2]"}],"prose":"includes organization-defined maintenance-related information in organizational maintenance records."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing controlled information system maintenance\n\nmaintenance records\n\nmanufacturer\/vendor maintenance specifications\n\nequipment sanitization records\n\nmedia sanitization records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel responsible for media sanitization\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for scheduling, performing, documenting, reviewing, approving, and monitoring maintenance and repairs for the information system\n\norganizational processes for sanitizing information system components\n\nautomated mechanisms supporting and\/or implementing controlled maintenance\n\nautomated mechanisms implementing sanitization of information system components"}]}]},{"id":"ma-3","class":"SP800-53","title":"Maintenance Tools","props":[{"name":"priority","value":"P3"},{"name":"label","value":"MA-3"},{"name":"sort-id","value":"ma-03"}],"links":[{"href":"#263823e0-a971-4b00-959d-315b26278b22","rel":"reference"}],"parts":[{"id":"ma-3_smt","name":"statement","prose":"The organization approves, controls, and monitors information system maintenance tools."},{"id":"ma-3_gdn","name":"guidance","prose":"This control addresses security-related issues associated with maintenance tools used specifically for diagnostic and repair actions on organizational information systems. Maintenance tools can include hardware, software, and firmware items. Maintenance tools are potential vehicles for transporting malicious code, either intentionally or unintentionally, into a facility and subsequently into organizational information systems. Maintenance tools can include, for example, hardware\/software diagnostic test equipment and hardware\/software packet sniffers. This control does not cover hardware\/software components that may support information system maintenance, yet are a part of the system, for example, the software implementing “ping,” “ls,” “ipconfig, or the hardware and software implementing the monitoring port of an Ethernet switch.","links":[{"href":"#ma-2","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#mp-6","rel":"related"}]},{"id":"ma-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-3_obj.1","name":"objective","props":[{"name":"label","value":"MA-3[1]"}],"prose":"approves information system maintenance tools;"},{"id":"ma-3_obj.2","name":"objective","props":[{"name":"label","value":"MA-3[2]"}],"prose":"controls information system maintenance tools; and"},{"id":"ma-3_obj.3","name":"objective","props":[{"name":"label","value":"MA-3[3]"}],"prose":"monitors information system maintenance tools."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing information system maintenance tools\n\ninformation system maintenance tools and associated documentation\n\nmaintenance records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for approving, controlling, and monitoring maintenance tools\n\nautomated mechanisms supporting and\/or implementing approval, control, and\/or monitoring of maintenance tools"}]}],"controls":[{"id":"ma-3.1","class":"SP800-53-enhancement","title":"Inspect Tools","props":[{"name":"label","value":"MA-3(1)"},{"name":"sort-id","value":"ma-03.01"}],"parts":[{"id":"ma-3.1_smt","name":"statement","prose":"The organization inspects the maintenance tools carried into a facility by maintenance personnel for improper or unauthorized modifications."},{"id":"ma-3.1_gdn","name":"guidance","prose":"If, upon inspection of maintenance tools, organizations determine that the tools have been modified in an improper\/unauthorized manner or contain malicious code, the incident is handled consistent with organizational policies and procedures for incident handling.","links":[{"href":"#si-7","rel":"related"}]},{"id":"ma-3.1_obj","name":"objective","prose":"Determine if the organization inspects the maintenance tools carried into a facility by maintenance personnel for improper or unauthorized modifications."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing information system maintenance tools\n\ninformation system maintenance tools and associated documentation\n\nmaintenance tool inspection records\n\nmaintenance records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for inspecting maintenance tools\n\nautomated mechanisms supporting and\/or implementing inspection of maintenance tools"}]}]},{"id":"ma-3.2","class":"SP800-53-enhancement","title":"Inspect Media","props":[{"name":"label","value":"MA-3(2)"},{"name":"sort-id","value":"ma-03.02"}],"parts":[{"id":"ma-3.2_smt","name":"statement","prose":"The organization checks media containing diagnostic and test programs for malicious code before the media are used in the information system."},{"id":"ma-3.2_gdn","name":"guidance","prose":"If, upon inspection of media containing maintenance diagnostic and test programs, organizations determine that the media contain malicious code, the incident is handled consistent with organizational incident handling policies and procedures.","links":[{"href":"#si-3","rel":"related"}]},{"id":"ma-3.2_obj","name":"objective","prose":"Determine if the organization checks media containing diagnostic and test programs for malicious code before the media are used in the information system."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing information system maintenance tools\n\ninformation system maintenance tools and associated documentation\n\nmaintenance records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for inspecting media for malicious code\n\nautomated mechanisms supporting and\/or implementing inspection of media used for maintenance"}]}]}]},{"id":"ma-4","class":"SP800-53","title":"Nonlocal Maintenance","props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-4"},{"name":"sort-id","value":"ma-04"}],"links":[{"href":"#d715b234-9b5b-4e07-b1ed-99836727664d","rel":"reference"},{"href":"#f2dbd4ec-c413-4714-b85b-6b7184d1c195","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"},{"href":"#263823e0-a971-4b00-959d-315b26278b22","rel":"reference"},{"href":"#a4aa9645-9a8a-4b51-90a9-e223250f9a75","rel":"reference"}],"parts":[{"id":"ma-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Approves and monitors nonlocal maintenance and diagnostic activities;"},{"id":"ma-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Allows the use of nonlocal maintenance and diagnostic tools only as consistent with organizational policy and documented in the security plan for the information system;"},{"id":"ma-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions;"},{"id":"ma-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Maintains records for nonlocal maintenance and diagnostic activities; and"},{"id":"ma-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Terminates session and network connections when nonlocal maintenance is completed."}]},{"id":"ma-4_gdn","name":"guidance","prose":"Nonlocal maintenance and diagnostic activities are those activities conducted by individuals communicating through a network, either an external network (e.g., the Internet) or an internal network. Local maintenance and diagnostic activities are those activities carried out by individuals physically present at the information system or information system component and not communicating across a network connection. Authentication techniques used in the establishment of nonlocal maintenance and diagnostic sessions reflect the network access requirements in IA-2. Typically, strong authentication requires authenticators that are resistant to replay attacks and employ multifactor authentication. Strong authenticators include, for example, PKI where certificates are stored on a token protected by a password, passphrase, or biometric. Enforcing requirements in MA-4 is accomplished in part by other controls.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#ma-2","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#mp-6","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-10","rel":"related"},{"href":"#sc-17","rel":"related"}]},{"id":"ma-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-4.a_obj","name":"objective","props":[{"name":"label","value":"MA-4(a)"}],"parts":[{"id":"ma-4.a_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(a)[1]"}],"prose":"approves nonlocal maintenance and diagnostic activities;"},{"id":"ma-4.a_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(a)[2]"}],"prose":"monitors nonlocal maintenance and diagnostic activities;"}]},{"id":"ma-4.b_obj","name":"objective","props":[{"name":"label","value":"MA-4(b)"}],"prose":"allows the use of nonlocal maintenance and diagnostic tools only:","parts":[{"id":"ma-4.b_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(b)[1]"}],"prose":"as consistent with organizational policy;"},{"id":"ma-4.b_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(b)[2]"}],"prose":"as documented in the security plan for the information system;"}]},{"id":"ma-4.c_obj","name":"objective","props":[{"name":"label","value":"MA-4(c)"}],"prose":"employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions;"},{"id":"ma-4.d_obj","name":"objective","props":[{"name":"label","value":"MA-4(d)"}],"prose":"maintains records for nonlocal maintenance and diagnostic activities;"},{"id":"ma-4.e_obj","name":"objective","props":[{"name":"label","value":"MA-4(e)"}],"parts":[{"id":"ma-4.e_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(e)[1]"}],"prose":"terminates sessions when nonlocal maintenance or diagnostics is completed; and"},{"id":"ma-4.e_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(e)[2]"}],"prose":"terminates network connections when nonlocal maintenance or diagnostics is completed."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing nonlocal information system maintenance\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nmaintenance records\n\ndiagnostic records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing nonlocal maintenance\n\nautomated mechanisms implementing, supporting, and\/or managing nonlocal maintenance\n\nautomated mechanisms for strong authentication of nonlocal maintenance diagnostic sessions\n\nautomated mechanisms for terminating nonlocal maintenance sessions and network connections"}]}],"controls":[{"id":"ma-4.2","class":"SP800-53-enhancement","title":"Document Nonlocal Maintenance","props":[{"name":"label","value":"MA-4(2)"},{"name":"sort-id","value":"ma-04.02"}],"parts":[{"id":"ma-4.2_smt","name":"statement","prose":"The organization documents in the security plan for the information system, the policies and procedures for the establishment and use of nonlocal maintenance and diagnostic connections."},{"id":"ma-4.2_obj","name":"objective","prose":"Determine if the organization documents in the security plan for the information system:","parts":[{"id":"ma-4.2_obj.1","name":"objective","props":[{"name":"label","value":"MA-4(2)[1]"}],"prose":"the policies for the establishment and use of nonlocal maintenance and diagnostic connections; and"},{"id":"ma-4.2_obj.2","name":"objective","props":[{"name":"label","value":"MA-4(2)[2]"}],"prose":"the procedures for the establishment and use of nonlocal maintenance and diagnostic connections."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing non-local information system maintenance\n\nsecurity plan\n\nmaintenance records\n\ndiagnostic records\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"ma-5","class":"SP800-53","title":"Maintenance Personnel","props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-5"},{"name":"sort-id","value":"ma-05"}],"parts":[{"id":"ma-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ma-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes a process for maintenance personnel authorization and maintains a list of authorized maintenance organizations or personnel;"},{"id":"ma-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and"},{"id":"ma-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations."}]},{"id":"ma-5_gdn","name":"guidance","prose":"This control applies to individuals performing hardware or software maintenance on organizational information systems, while PE-2 addresses physical access for individuals whose maintenance duties place them within the physical protection perimeter of the systems (e.g., custodial staff, physical plant maintenance personnel). Technical competence of supervising individuals relates to the maintenance performed on the information systems while having required access authorizations refers to maintenance on and near the systems. Individuals not previously identified as authorized maintenance personnel, such as information technology manufacturers, vendors, systems integrators, and consultants, may require privileged access to organizational information systems, for example, when required to conduct maintenance activities with little or no notice. Based on organizational assessments of risk, organizations may issue temporary credentials to these individuals. Temporary credentials may be for one-time use or for very limited time periods.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-8","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#ra-3","rel":"related"}]},{"id":"ma-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-5.a_obj","name":"objective","props":[{"name":"label","value":"MA-5(a)"}],"parts":[{"id":"ma-5.a_obj.1","name":"objective","props":[{"name":"label","value":"MA-5(a)[1]"}],"prose":"establishes a process for maintenance personnel authorization;"},{"id":"ma-5.a_obj.2","name":"objective","props":[{"name":"label","value":"MA-5(a)[2]"}],"prose":"maintains a list of authorized maintenance organizations or personnel;"}]},{"id":"ma-5.b_obj","name":"objective","props":[{"name":"label","value":"MA-5(b)"}],"prose":"ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and"},{"id":"ma-5.c_obj","name":"objective","props":[{"name":"label","value":"MA-5(c)"}],"prose":"designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing maintenance personnel\n\nservice provider contracts\n\nservice-level agreements\n\nlist of authorized personnel\n\nmaintenance records\n\naccess control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for authorizing and managing maintenance personnel\n\nautomated mechanisms supporting and\/or implementing authorization of maintenance personnel"}]}]},{"id":"ma-6","class":"SP800-53","title":"Timely Maintenance","params":[{"id":"ma-6_prm_1","label":"organization-defined information system components"},{"id":"ma-6_prm_2","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"MA-6"},{"name":"sort-id","value":"ma-06"}],"parts":[{"id":"ma-6_smt","name":"statement","prose":"The organization obtains maintenance support and\/or spare parts for {{ insert: param, ma-6_prm_1 }} within {{ insert: param, ma-6_prm_2 }} of failure."},{"id":"ma-6_gdn","name":"guidance","prose":"Organizations specify the information system components that result in increased risk to organizational operations and assets, individuals, other organizations, or the Nation when the functionality provided by those components is not operational. Organizational actions to obtain maintenance support typically include having appropriate contracts in place.","links":[{"href":"#cm-8","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#cp-7","rel":"related"},{"href":"#sa-14","rel":"related"},{"href":"#sa-15","rel":"related"}]},{"id":"ma-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ma-6_obj.1","name":"objective","props":[{"name":"label","value":"MA-6[1]"}],"prose":"defines information system components for which maintenance support and\/or spare parts are to be obtained;"},{"id":"ma-6_obj.2","name":"objective","props":[{"name":"label","value":"MA-6[2]"}],"prose":"defines the time period within which maintenance support and\/or spare parts are to be obtained after a failure;"},{"id":"ma-6_obj.3","name":"objective","props":[{"name":"label","value":"MA-6[3]"}],"parts":[{"id":"ma-6_obj.3.a","name":"objective","props":[{"name":"label","value":"MA-6[3][a]"}],"prose":"obtains maintenance support for organization-defined information system components within the organization-defined time period of failure; and\/or"},{"id":"ma-6_obj.3.b","name":"objective","props":[{"name":"label","value":"MA-6[3][b]"}],"prose":"obtains spare parts for organization-defined information system components within the organization-defined time period of failure."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system maintenance policy\n\nprocedures addressing information system maintenance\n\nservice provider contracts\n\nservice-level agreements\n\ninventory and availability of spare parts\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system maintenance responsibilities\n\norganizational personnel with acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for ensuring timely maintenance"}]}]}]},{"id":"mp","class":"family","title":"Media Protection","controls":[{"id":"mp-1","class":"SP800-53","title":"Media Protection Policy and Procedures","params":[{"id":"mp-1_prm_1","label":"organization-defined personnel or roles"},{"id":"mp-1_prm_2","label":"organization-defined frequency"},{"id":"mp-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-1"},{"name":"sort-id","value":"mp-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"mp-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, mp-1_prm_1 }}:","parts":[{"id":"mp-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A media protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"mp-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the media protection policy and associated media protection controls; and"}]},{"id":"mp-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"mp-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Media protection policy {{ insert: param, mp-1_prm_2 }}; and"},{"id":"mp-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Media protection procedures {{ insert: param, mp-1_prm_3 }}."}]}]},{"id":"mp-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the MP family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"mp-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-1.a_obj","name":"objective","props":[{"name":"label","value":"MP-1(a)"}],"parts":[{"id":"mp-1.a.1_obj","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)"}],"parts":[{"id":"mp-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1]"}],"prose":"develops and documents a media protection policy that addresses:","parts":[{"id":"mp-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"mp-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"mp-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"mp-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"mp-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"mp-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"mp-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"mp-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the media protection policy is to be disseminated;"},{"id":"mp-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"MP-1(a)(1)[3]"}],"prose":"disseminates the media protection policy to organization-defined personnel or roles;"}]},{"id":"mp-1.a.2_obj","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)"}],"parts":[{"id":"mp-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the media protection policy and associated media protection controls;"},{"id":"mp-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"mp-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"MP-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"mp-1.b_obj","name":"objective","props":[{"name":"label","value":"MP-1(b)"}],"parts":[{"id":"mp-1.b.1_obj","name":"objective","props":[{"name":"label","value":"MP-1(b)(1)"}],"parts":[{"id":"mp-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current media protection policy;"},{"id":"mp-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(b)(1)[2]"}],"prose":"reviews and updates the current media protection policy with the organization-defined frequency;"}]},{"id":"mp-1.b.2_obj","name":"objective","props":[{"name":"label","value":"MP-1(b)(2)"}],"parts":[{"id":"mp-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"MP-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current media protection procedures; and"},{"id":"mp-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"MP-1(b)(2)[2]"}],"prose":"reviews and updates the current media protection procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Media protection policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with media protection responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"mp-2","class":"SP800-53","title":"Media Access","params":[{"id":"mp-2_prm_1","label":"organization-defined types of digital and\/or non-digital media"},{"id":"mp-2_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-2"},{"name":"sort-id","value":"mp-02"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","rel":"reference"}],"parts":[{"id":"mp-2_smt","name":"statement","prose":"The organization restricts access to {{ insert: param, mp-2_prm_1 }} to {{ insert: param, mp-2_prm_2 }}."},{"id":"mp-2_gdn","name":"guidance","prose":"Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. Restricting non-digital media access includes, for example, denying access to patient medical records in a community hospital unless the individuals seeking access to such records are authorized healthcare providers. Restricting access to digital media includes, for example, limiting access to design specifications stored on compact disks in the media library to the project leader and the individuals on the development team.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pl-2","rel":"related"}]},{"id":"mp-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-2_obj.1","name":"objective","props":[{"name":"label","value":"MP-2[1]"}],"prose":"defines types of digital and\/or non-digital media requiring restricted access;"},{"id":"mp-2_obj.2","name":"objective","props":[{"name":"label","value":"MP-2[2]"}],"prose":"defines personnel or roles authorized to access organization-defined types of digital and\/or non-digital media; and"},{"id":"mp-2_obj.3","name":"objective","props":[{"name":"label","value":"MP-2[3]"}],"prose":"restricts access to organization-defined types of digital and\/or non-digital media to organization-defined personnel or roles."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media access restrictions\n\naccess control policy and procedures\n\nphysical and environmental protection policy and procedures\n\nmedia storage facilities\n\naccess control records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media protection responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for restricting information media\n\nautomated mechanisms supporting and\/or implementing media access restrictions"}]}]},{"id":"mp-3","class":"SP800-53","title":"Media Marking","params":[{"id":"mp-3_prm_1","label":"organization-defined types of information system media"},{"id":"mp-3_prm_2","label":"organization-defined controlled areas"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"MP-3"},{"name":"sort-id","value":"mp-03"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"}],"parts":[{"id":"mp-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Marks information system media indicating the distribution limitations, handling caveats, and applicable security markings (if any) of the information; and"},{"id":"mp-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Exempts {{ insert: param, mp-3_prm_1 }} from marking as long as the media remain within {{ insert: param, mp-3_prm_2 }}."}]},{"id":"mp-3_gdn","name":"guidance","prose":"The term security marking refers to the application\/use of human-readable security attributes. The term security labeling refers to the application\/use of security attributes with regard to internal data structures within information systems (see AC-16). Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. Security marking is generally not required for media containing information determined by organizations to be in the public domain or to be publicly releasable. However, some organizations may require markings for public information indicating that the information is publicly releasable. Marking of information system media reflects applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.","links":[{"href":"#ac-16","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#ra-3","rel":"related"}]},{"id":"mp-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-3.a_obj","name":"objective","props":[{"name":"label","value":"MP-3(a)"}],"prose":"marks information system media indicating the:","parts":[{"id":"mp-3.a_obj.1","name":"objective","props":[{"name":"label","value":"MP-3(a)[1]"}],"prose":"distribution limitations of the information;"},{"id":"mp-3.a_obj.2","name":"objective","props":[{"name":"label","value":"MP-3(a)[2]"}],"prose":"handling caveats of the information;"},{"id":"mp-3.a_obj.3","name":"objective","props":[{"name":"label","value":"MP-3(a)[3]"}],"prose":"applicable security markings (if any) of the information;"}]},{"id":"mp-3.b_obj","name":"objective","props":[{"name":"label","value":"MP-3(b)"}],"parts":[{"id":"mp-3.b_obj.1","name":"objective","props":[{"name":"label","value":"MP-3(b)[1]"}],"prose":"defines types of information system media to be exempted from marking as long as the media remain in designated controlled areas;"},{"id":"mp-3.b_obj.2","name":"objective","props":[{"name":"label","value":"MP-3(b)[2]"}],"prose":"defines controlled areas where organization-defined types of information system media exempt from marking are to be retained; and"},{"id":"mp-3.b_obj.3","name":"objective","props":[{"name":"label","value":"MP-3(b)[3]"}],"prose":"exempts organization-defined types of information system media from marking as long as the media remain within organization-defined controlled areas."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media marking\n\nphysical and environmental protection policy and procedures\n\nsecurity plan\n\nlist of information system media marking security attributes\n\ndesignated controlled areas\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media protection and marking responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for marking information media\n\nautomated mechanisms supporting and\/or implementing media marking"}]}]},{"id":"mp-4","class":"SP800-53","title":"Media Storage","params":[{"id":"mp-4_prm_1","label":"organization-defined types of digital and\/or non-digital media"},{"id":"mp-4_prm_2","label":"organization-defined controlled areas"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-4"},{"name":"sort-id","value":"mp-04"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#81f09e01-d0b0-4ae2-aa6a-064ed9950070","rel":"reference"},{"href":"#a6c774c0-bf50-4590-9841-2a5c1c91ac6f","rel":"reference"},{"href":"#3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","rel":"reference"}],"parts":[{"id":"mp-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Physically controls and securely stores {{ insert: param, mp-4_prm_1 }} within {{ insert: param, mp-4_prm_2 }}; and"},{"id":"mp-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Protects information system media until the media are destroyed or sanitized using approved equipment, techniques, and procedures."}]},{"id":"mp-4_gdn","name":"guidance","prose":"Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. Physically controlling information system media includes, for example, conducting inventories, ensuring procedures are in place to allow individuals to check out and return media to the media library, and maintaining accountability for all stored media. Secure storage includes, for example, a locked drawer, desk, or cabinet, or a controlled media library. The type of media storage is commensurate with the security category and\/or classification of the information residing on the media. Controlled areas are areas for which organizations provide sufficient physical and procedural safeguards to meet the requirements established for protecting information and\/or information systems. For media containing information determined by organizations to be in the public domain, to be publicly releasable, or to have limited or no adverse impact on organizations or individuals if accessed by other than authorized personnel, fewer safeguards may be needed. In these situations, physical access controls provide adequate protection.","links":[{"href":"#cp-6","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-7","rel":"related"},{"href":"#pe-3","rel":"related"}]},{"id":"mp-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-4.a_obj","name":"objective","props":[{"name":"label","value":"MP-4(a)"}],"parts":[{"id":"mp-4.a_obj.1","name":"objective","props":[{"name":"label","value":"MP-4(a)[1]"}],"prose":"defines types of digital and\/or non-digital media to be physically controlled and securely stored within designated controlled areas;"},{"id":"mp-4.a_obj.2","name":"objective","props":[{"name":"label","value":"MP-4(a)[2]"}],"prose":"defines controlled areas designated to physically control and securely store organization-defined types of digital and\/or non-digital media;"},{"id":"mp-4.a_obj.3","name":"objective","props":[{"name":"label","value":"MP-4(a)[3]"}],"prose":"physically controls organization-defined types of digital and\/or non-digital media within organization-defined controlled areas;"},{"id":"mp-4.a_obj.4","name":"objective","props":[{"name":"label","value":"MP-4(a)[4]"}],"prose":"securely stores organization-defined types of digital and\/or non-digital media within organization-defined controlled areas; and"}]},{"id":"mp-4.b_obj","name":"objective","props":[{"name":"label","value":"MP-4(b)"}],"prose":"protects information system media until the media are destroyed or sanitized using approved equipment, techniques, and procedures."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media storage\n\nphysical and environmental protection policy and procedures\n\naccess control policy and procedures\n\nsecurity plan\n\ninformation system media\n\ndesignated controlled areas\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media protection and storage responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for storing information media\n\nautomated mechanisms supporting and\/or implementing secure media storage\/media protection"}]}]},{"id":"mp-5","class":"SP800-53","title":"Media Transport","params":[{"id":"mp-5_prm_1","label":"organization-defined types of information system media"},{"id":"mp-5_prm_2","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-5"},{"name":"sort-id","value":"mp-05"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"}],"parts":[{"id":"mp-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Protects and controls {{ insert: param, mp-5_prm_1 }} during transport outside of controlled areas using {{ insert: param, mp-5_prm_2 }};"},{"id":"mp-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Maintains accountability for information system media during transport outside of controlled areas;"},{"id":"mp-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Documents activities associated with the transport of information system media; and"},{"id":"mp-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Restricts the activities associated with the transport of information system media to authorized personnel."}]},{"id":"mp-5_gdn","name":"guidance","prose":"Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. This control also applies to mobile devices with information storage capability (e.g., smart phones, tablets, E-readers), that are transported outside of controlled areas. Controlled areas are areas or spaces for which organizations provide sufficient physical and\/or procedural safeguards to meet the requirements established for protecting information and\/or information systems. Physical and technical safeguards for media are commensurate with the security category or classification of the information residing on the media. Safeguards to protect media during transport include, for example, locked containers and cryptography. Cryptographic mechanisms can provide confidentiality and integrity protections depending upon the mechanisms used. Activities associated with transport include the actual transport as well as those activities such as releasing media for transport and ensuring that media enters the appropriate transport processes. For the actual transport, authorized transport and courier personnel may include individuals from outside the organization (e.g., U.S. Postal Service or a commercial transport or delivery service). Maintaining accountability of media during transport includes, for example, restricting transport activities to authorized personnel, and tracking and\/or obtaining explicit records of transport activities as the media moves through the transportation system to prevent and detect loss, destruction, or tampering. Organizations establish documentation requirements for activities associated with the transport of information system media in accordance with organizational assessments of risk to include the flexibility to define different record-keeping methods for the different types of media transport as part of an overall system of transport-related records.","links":[{"href":"#ac-19","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#mp-3","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-28","rel":"related"}]},{"id":"mp-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-5.a_obj","name":"objective","props":[{"name":"label","value":"MP-5(a)"}],"parts":[{"id":"mp-5.a_obj.1","name":"objective","props":[{"name":"label","value":"MP-5(a)[1]"}],"prose":"defines types of information system media to be protected and controlled during transport outside of controlled areas;"},{"id":"mp-5.a_obj.2","name":"objective","props":[{"name":"label","value":"MP-5(a)[2]"}],"prose":"defines security safeguards to protect and control organization-defined information system media during transport outside of controlled areas;"},{"id":"mp-5.a_obj.3","name":"objective","props":[{"name":"label","value":"MP-5(a)[3]"}],"prose":"protects and controls organization-defined information system media during transport outside of controlled areas using organization-defined security safeguards;"}]},{"id":"mp-5.b_obj","name":"objective","props":[{"name":"label","value":"MP-5(b)"}],"prose":"maintains accountability for information system media during transport outside of controlled areas;"},{"id":"mp-5.c_obj","name":"objective","props":[{"name":"label","value":"MP-5(c)"}],"prose":"documents activities associated with the transport of information system media; and"},{"id":"mp-5.d_obj","name":"objective","props":[{"name":"label","value":"MP-5(d)"}],"prose":"restricts the activities associated with transport of information system media to authorized personnel."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media storage\n\nphysical and environmental protection policy and procedures\n\naccess control policy and procedures\n\nsecurity plan\n\ninformation system media\n\ndesignated controlled areas\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media protection and storage responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for storing information media\n\nautomated mechanisms supporting and\/or implementing media storage\/media protection"}]}],"controls":[{"id":"mp-5.4","class":"SP800-53-enhancement","title":"Cryptographic Protection","props":[{"name":"label","value":"MP-5(4)"},{"name":"sort-id","value":"mp-05.04"}],"parts":[{"id":"mp-5.4_smt","name":"statement","prose":"The information system implements cryptographic mechanisms to protect the confidentiality and integrity of information stored on digital media during transport outside of controlled areas."},{"id":"mp-5.4_gdn","name":"guidance","prose":"This control enhancement applies to both portable storage devices (e.g., USB memory sticks, compact disks, digital video disks, external\/removable hard disk drives) and mobile devices with storage capability (e.g., smart phones, tablets, E-readers).","links":[{"href":"#mp-2","rel":"related"}]},{"id":"mp-5.4_obj","name":"objective","prose":"Determine if the organization employs cryptographic mechanisms to protect the confidentiality and integrity of information stored on digital media during transport outside of controlled areas."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media transport\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system media transport records\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media transport responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Cryptographic mechanisms protecting information on digital media during transportation outside controlled areas"}]}]}]},{"id":"mp-6","class":"SP800-53","title":"Media Sanitization","params":[{"id":"mp-6_prm_1","label":"organization-defined information system media"},{"id":"mp-6_prm_2","label":"organization-defined sanitization techniques and procedures"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-6"},{"name":"sort-id","value":"mp-06"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"},{"href":"#263823e0-a971-4b00-959d-315b26278b22","rel":"reference"},{"href":"#a47466c4-c837-4f06-a39f-e68412a5f73d","rel":"reference"}],"parts":[{"id":"mp-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"mp-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Sanitizes {{ insert: param, mp-6_prm_1 }} prior to disposal, release out of organizational control, or release for reuse using {{ insert: param, mp-6_prm_2 }} in accordance with applicable federal and organizational standards and policies; and"},{"id":"mp-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Employs sanitization mechanisms with the strength and integrity commensurate with the security category or classification of the information."}]},{"id":"mp-6_gdn","name":"guidance","prose":"This control applies to all information system media, both digital and non-digital, subject to disposal or reuse, whether or not the media is considered removable. Examples include media found in scanners, copiers, printers, notebook computers, workstations, network components, and mobile devices. The sanitization process removes information from the media such that the information cannot be retrieved or reconstructed. Sanitization techniques, including clearing, purging, cryptographic erase, and destruction, prevent the disclosure of information to unauthorized individuals when such media is reused or released for disposal. Organizations determine the appropriate sanitization methods recognizing that destruction is sometimes necessary when other methods cannot be applied to media requiring sanitization. Organizations use discretion on the employment of approved sanitization techniques and procedures for media containing information deemed to be in the public domain or publicly releasable, or deemed to have no adverse impact on organizations or individuals if released for reuse or disposal. Sanitization of non-digital media includes, for example, removing a classified appendix from an otherwise unclassified document, or redacting selected sections or words from a document by obscuring the redacted sections\/words in a manner equivalent in effectiveness to removing them from the document. NSA standards and policies control the sanitization process for media containing classified information.","links":[{"href":"#ma-2","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-4","rel":"related"}]},{"id":"mp-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-6.a_obj","name":"objective","props":[{"name":"label","value":"MP-6(a)"}],"parts":[{"id":"mp-6.a_obj.1","name":"objective","props":[{"name":"label","value":"MP-6(a)[1]"}],"prose":"defines information system media to be sanitized prior to:","parts":[{"id":"mp-6.a_obj.1.a","name":"objective","props":[{"name":"label","value":"MP-6(a)[1][a]"}],"prose":"disposal;"},{"id":"mp-6.a_obj.1.b","name":"objective","props":[{"name":"label","value":"MP-6(a)[1][b]"}],"prose":"release out of organizational control; or"},{"id":"mp-6.a_obj.1.c","name":"objective","props":[{"name":"label","value":"MP-6(a)[1][c]"}],"prose":"release for reuse;"}]},{"id":"mp-6.a_obj.2","name":"objective","props":[{"name":"label","value":"MP-6(a)[2]"}],"prose":"defines sanitization techniques or procedures to be used for sanitizing organization-defined information system media prior to:","parts":[{"id":"mp-6.a_obj.2.a","name":"objective","props":[{"name":"label","value":"MP-6(a)[2][a]"}],"prose":"disposal;"},{"id":"mp-6.a_obj.2.b","name":"objective","props":[{"name":"label","value":"MP-6(a)[2][b]"}],"prose":"release out of organizational control; or"},{"id":"mp-6.a_obj.2.c","name":"objective","props":[{"name":"label","value":"MP-6(a)[2][c]"}],"prose":"release for reuse;"}]},{"id":"mp-6.a_obj.3","name":"objective","props":[{"name":"label","value":"MP-6(a)[3]"}],"prose":"sanitizes organization-defined information system media prior to disposal, release out of organizational control, or release for reuse using organization-defined sanitization techniques or procedures in accordance with applicable federal and organizational standards and policies; and"}]},{"id":"mp-6.b_obj","name":"objective","props":[{"name":"label","value":"MP-6(b)"}],"prose":"employs sanitization mechanisms with strength and integrity commensurate with the security category or classification of the information."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nprocedures addressing media sanitization and disposal\n\napplicable federal standards and policies addressing media sanitization\n\nmedia sanitization records\n\naudit records\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with media sanitization responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media sanitization\n\nautomated mechanisms supporting and\/or implementing media sanitization"}]}]},{"id":"mp-7","class":"SP800-53","title":"Media Use","params":[{"id":"mp-7_prm_1","select":{"choice":["restricts","prohibits"]}},{"id":"mp-7_prm_2","label":"organization-defined types of information system media"},{"id":"mp-7_prm_3","label":"organization-defined information systems or system components"},{"id":"mp-7_prm_4","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"MP-7"},{"name":"sort-id","value":"mp-07"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","rel":"reference"}],"parts":[{"id":"mp-7_smt","name":"statement","prose":"The organization {{ insert: param, mp-7_prm_1 }} the use of {{ insert: param, mp-7_prm_2 }} on {{ insert: param, mp-7_prm_3 }} using {{ insert: param, mp-7_prm_4 }}."},{"id":"mp-7_gdn","name":"guidance","prose":"Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external\/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. This control also applies to mobile devices with information storage capability (e.g., smart phones, tablets, E-readers). In contrast to MP-2, which restricts user access to media, this control restricts the use of certain types of media on information systems, for example, restricting\/prohibiting the use of flash drives or external hard disk drives. Organizations can employ technical and nontechnical safeguards (e.g., policies, procedures, rules of behavior) to restrict the use of information system media. Organizations may restrict the use of portable storage devices, for example, by using physical cages on workstations to prohibit access to certain external ports, or disabling\/removing the ability to insert, read or write to such devices. Organizations may also limit the use of portable storage devices to only approved devices including, for example, devices provided by the organization, devices provided by other approved organizations, and devices that are not personally owned. Finally, organizations may restrict the use of portable storage devices based on the type of device, for example, prohibiting the use of writeable, portable storage devices, and implementing this restriction by disabling or removing the capability to write to such devices.","links":[{"href":"#ac-19","rel":"related"},{"href":"#pl-4","rel":"related"}]},{"id":"mp-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"mp-7_obj.1","name":"objective","props":[{"name":"label","value":"MP-7[1]"}],"prose":"defines types of information system media to be:","parts":[{"id":"mp-7_obj.1.a","name":"objective","props":[{"name":"label","value":"MP-7[1][a]"}],"prose":"restricted on information systems or system components; or"},{"id":"mp-7_obj.1.b","name":"objective","props":[{"name":"label","value":"MP-7[1][b]"}],"prose":"prohibited from use on information systems or system components;"}]},{"id":"mp-7_obj.2","name":"objective","props":[{"name":"label","value":"MP-7[2]"}],"prose":"defines information systems or system components on which the use of organization-defined types of information system media is to be one of the following:","parts":[{"id":"mp-7_obj.2.a","name":"objective","props":[{"name":"label","value":"MP-7[2][a]"}],"prose":"restricted; or"},{"id":"mp-7_obj.2.b","name":"objective","props":[{"name":"label","value":"MP-7[2][b]"}],"prose":"prohibited;"}]},{"id":"mp-7_obj.3","name":"objective","props":[{"name":"label","value":"MP-7[3]"}],"prose":"defines security safeguards to be employed to restrict or prohibit the use of organization-defined types of information system media on organization-defined information systems or system components; and"},{"id":"mp-7_obj.4","name":"objective","props":[{"name":"label","value":"MP-7[4]"}],"prose":"restricts or prohibits the use of organization-defined information system media on organization-defined information systems or system components using organization-defined security safeguards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nsystem use policy\n\nprocedures addressing media usage restrictions\n\nsecurity plan\n\nrules of behavior\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media use responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media use\n\nautomated mechanisms restricting or prohibiting use of information system media on information systems or system components"}]}],"controls":[{"id":"mp-7.1","class":"SP800-53-enhancement","title":"Prohibit Use Without Owner","props":[{"name":"label","value":"MP-7(1)"},{"name":"sort-id","value":"mp-07.01"}],"parts":[{"id":"mp-7.1_smt","name":"statement","prose":"The organization prohibits the use of portable storage devices in organizational information systems when such devices have no identifiable owner."},{"id":"mp-7.1_gdn","name":"guidance","prose":"Requiring identifiable owners (e.g., individuals, organizations, or projects) for portable storage devices reduces the risk of using such technologies by allowing organizations to assign responsibility and accountability for addressing known vulnerabilities in the devices (e.g., malicious code insertion).","links":[{"href":"#pl-4","rel":"related"}]},{"id":"mp-7.1_obj","name":"objective","prose":"Determine if the organization prohibits the use of portable storage devices in organizational information systems when such devices have no identifiable owner."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system media protection policy\n\nsystem use policy\n\nprocedures addressing media usage restrictions\n\nsecurity plan\n\nrules of behavior\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\naudit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information system media use responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for media use\n\nautomated mechanisms prohibiting use of media on information systems or system components"}]}]}]}]},{"id":"pe","class":"family","title":"Physical and Environmental Protection","controls":[{"id":"pe-1","class":"SP800-53","title":"Physical and Environmental Protection Policy and Procedures","params":[{"id":"pe-1_prm_1","label":"organization-defined personnel or roles"},{"id":"pe-1_prm_2","label":"organization-defined frequency"},{"id":"pe-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-1"},{"name":"sort-id","value":"pe-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"pe-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, pe-1_prm_1 }}:","parts":[{"id":"pe-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A physical and environmental protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"pe-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls; and"}]},{"id":"pe-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"pe-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Physical and environmental protection policy {{ insert: param, pe-1_prm_2 }}; and"},{"id":"pe-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Physical and environmental protection procedures {{ insert: param, pe-1_prm_3 }}."}]}]},{"id":"pe-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the PE family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"pe-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-1.a_obj","name":"objective","props":[{"name":"label","value":"PE-1(a)"}],"parts":[{"id":"pe-1.a.1_obj","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)"}],"parts":[{"id":"pe-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1]"}],"prose":"develops and documents a physical and environmental protection policy that addresses:","parts":[{"id":"pe-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"pe-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"pe-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"pe-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"pe-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"pe-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"pe-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"pe-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the physical and environmental protection policy is to be disseminated;"},{"id":"pe-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"PE-1(a)(1)[3]"}],"prose":"disseminates the physical and environmental protection policy to organization-defined personnel or roles;"}]},{"id":"pe-1.a.2_obj","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)"}],"parts":[{"id":"pe-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls;"},{"id":"pe-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"pe-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"PE-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"pe-1.b_obj","name":"objective","props":[{"name":"label","value":"PE-1(b)"}],"parts":[{"id":"pe-1.b.1_obj","name":"objective","props":[{"name":"label","value":"PE-1(b)(1)"}],"parts":[{"id":"pe-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current physical and environmental protection policy;"},{"id":"pe-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(b)(1)[2]"}],"prose":"reviews and updates the current physical and environmental protection policy with the organization-defined frequency;"}]},{"id":"pe-1.b.2_obj","name":"objective","props":[{"name":"label","value":"PE-1(b)(2)"}],"parts":[{"id":"pe-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"PE-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current physical and environmental protection procedures; and"},{"id":"pe-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"PE-1(b)(2)[2]"}],"prose":"reviews and updates the current physical and environmental protection procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical and environmental protection responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"pe-2","class":"SP800-53","title":"Physical Access Authorizations","params":[{"id":"pe-2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-2"},{"name":"sort-id","value":"pe-02"}],"parts":[{"id":"pe-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, approves, and maintains a list of individuals with authorized access to the facility where the information system resides;"},{"id":"pe-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Issues authorization credentials for facility access;"},{"id":"pe-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the access list detailing authorized facility access by individuals {{ insert: param, pe-2_prm_1 }}; and"},{"id":"pe-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Removes individuals from the facility access list when access is no longer required."}]},{"id":"pe-2_gdn","name":"guidance","prose":"This control applies to organizational employees and visitors. Individuals (e.g., employees, contractors, and others) with permanent physical access authorization credentials are not considered visitors. Authorization credentials include, for example, badges, identification cards, and smart cards. Organizations determine the strength of authorization credentials needed (including level of forge-proof badges, smart cards, or identification cards) consistent with federal standards, policies, and procedures. This control only applies to areas within facilities that have not been designated as publicly accessible.","links":[{"href":"#pe-3","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#ps-3","rel":"related"}]},{"id":"pe-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-2.a_obj","name":"objective","props":[{"name":"label","value":"PE-2(a)"}],"parts":[{"id":"pe-2.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-2(a)[1]"}],"prose":"develops a list of individuals with authorized access to the facility where the information system resides;"},{"id":"pe-2.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-2(a)[2]"}],"prose":"approves a list of individuals with authorized access to the facility where the information system resides;"},{"id":"pe-2.a_obj.3","name":"objective","props":[{"name":"label","value":"PE-2(a)[3]"}],"prose":"maintains a list of individuals with authorized access to the facility where the information system resides;"}]},{"id":"pe-2.b_obj","name":"objective","props":[{"name":"label","value":"PE-2(b)"}],"prose":"issues authorization credentials for facility access;"},{"id":"pe-2.c_obj","name":"objective","props":[{"name":"label","value":"PE-2(c)"}],"parts":[{"id":"pe-2.c_obj.1","name":"objective","props":[{"name":"label","value":"PE-2(c)[1]"}],"prose":"defines the frequency to review the access list detailing authorized facility access by individuals;"},{"id":"pe-2.c_obj.2","name":"objective","props":[{"name":"label","value":"PE-2(c)[2]"}],"prose":"reviews the access list detailing authorized facility access by individuals with the organization-defined frequency; and"}]},{"id":"pe-2.d_obj","name":"objective","props":[{"name":"label","value":"PE-2(d)"}],"prose":"removes individuals from the facility access list when access is no longer required."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access authorizations\n\nsecurity plan\n\nauthorized personnel access list\n\nauthorization credentials\n\nphysical access list reviews\n\nphysical access termination records and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access authorization responsibilities\n\norganizational personnel with physical access to information system facility\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for physical access authorizations\n\nautomated mechanisms supporting and\/or implementing physical access authorizations"}]}]},{"id":"pe-3","class":"SP800-53","title":"Physical Access Control","params":[{"id":"pe-3_prm_1","label":"organization-defined entry\/exit points to the facility where the information system resides"},{"id":"pe-3_prm_2","select":{"how-many":"one-or-more","choice":[" {{ insert: param, pe-3_prm_3 }} ","guards"]}},{"id":"pe-3_prm_3","depends-on":"pe-3_prm_2","label":"organization-defined physical access control systems\/devices"},{"id":"pe-3_prm_4","label":"organization-defined entry\/exit points"},{"id":"pe-3_prm_5","label":"organization-defined security safeguards"},{"id":"pe-3_prm_6","label":"organization-defined circumstances requiring visitor escorts and monitoring"},{"id":"pe-3_prm_7","label":"organization-defined physical access devices"},{"id":"pe-3_prm_8","label":"organization-defined frequency"},{"id":"pe-3_prm_9","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-3"},{"name":"sort-id","value":"pe-03"}],"links":[{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#2157bb7e-192c-4eaa-877f-93ef6b0a3292","rel":"reference"},{"href":"#6caa237b-531b-43ac-9711-d8f6b97b0377","rel":"reference"},{"href":"#398e33fd-f404-4e5c-b90e-2d50d3181244","rel":"reference"},{"href":"#61081e7f-041d-4033-96a7-44a439071683","rel":"reference"},{"href":"#dd2f5acd-08f1-435a-9837-f8203088dc1a","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"},{"href":"#5ed1f4d5-1494-421b-97ed-39d3c88ab51f","rel":"reference"}],"parts":[{"id":"pe-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Enforces physical access authorizations at {{ insert: param, pe-3_prm_1 }} by;","parts":[{"id":"pe-3_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Verifying individual access authorizations before granting access to the facility; and"},{"id":"pe-3_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Controlling ingress\/egress to the facility using {{ insert: param, pe-3_prm_2 }};"}]},{"id":"pe-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Maintains physical access audit logs for {{ insert: param, pe-3_prm_4 }};"},{"id":"pe-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Provides {{ insert: param, pe-3_prm_5 }} to control access to areas within the facility officially designated as publicly accessible;"},{"id":"pe-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Escorts visitors and monitors visitor activity {{ insert: param, pe-3_prm_6 }};"},{"id":"pe-3_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Secures keys, combinations, and other physical access devices;"},{"id":"pe-3_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Inventories {{ insert: param, pe-3_prm_7 }} every {{ insert: param, pe-3_prm_8 }}; and"},{"id":"pe-3_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Changes combinations and keys {{ insert: param, pe-3_prm_9 }} and\/or when keys are lost, combinations are compromised, or individuals are transferred or terminated."}]},{"id":"pe-3_gdn","name":"guidance","prose":"This control applies to organizational employees and visitors. Individuals (e.g., employees, contractors, and others) with permanent physical access authorization credentials are not considered visitors. Organizations determine the types of facility guards needed including, for example, professional physical security staff or other personnel such as administrative staff or information system users. Physical access devices include, for example, keys, locks, combinations, and card readers. Safeguards for publicly accessible areas within organizational facilities include, for example, cameras, monitoring by guards, and isolating selected information systems and\/or system components in secured areas. Physical access control systems comply with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. The Federal Identity, Credential, and Access Management Program provides implementation guidance for identity, credential, and access management capabilities for physical access control systems. Organizations have flexibility in the types of audit logs employed. Audit logs can be procedural (e.g., a written log of individuals accessing the facility and when such access occurred), automated (e.g., capturing ID provided by a PIV card), or some combination thereof. Physical access points can include facility access points, interior access points to information systems and\/or components requiring supplemental access controls, or both. Components of organizational information systems (e.g., workstations, terminals) may be located in areas designated as publicly accessible with organizations safeguarding access to such devices.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#pe-5","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ra-3","rel":"related"}]},{"id":"pe-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-3.a_obj","name":"objective","props":[{"name":"label","value":"PE-3(a)"}],"parts":[{"id":"pe-3.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(a)[1]"}],"prose":"defines entry\/exit points to the facility where the information system resides;"},{"id":"pe-3.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2]"}],"prose":"enforces physical access authorizations at organization-defined entry\/exit points to the facility where the information system resides by:","parts":[{"id":"pe-3.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](1)"}],"prose":"verifying individual access authorizations before granting access to the facility;"},{"id":"pe-3.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)"}],"parts":[{"id":"pe-3.a.2_obj.2.a","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[a]"}],"prose":"defining physical access control systems\/devices to be employed to control ingress\/egress to the facility where the information system resides;"},{"id":"pe-3.a.2_obj.2.b","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[b]"}],"prose":"using one or more of the following ways to control ingress\/egress to the facility:","parts":[{"id":"pe-3.a.2_obj.2.b.1","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[b][1]"}],"prose":"organization-defined physical access control systems\/devices; and\/or"},{"id":"pe-3.a.2_obj.2.b.2","name":"objective","props":[{"name":"label","value":"PE-3(a)[2](2)[b][2]"}],"prose":"guards;"}]}]}]}]},{"id":"pe-3.b_obj","name":"objective","props":[{"name":"label","value":"PE-3(b)"}],"parts":[{"id":"pe-3.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(b)[1]"}],"prose":"defines entry\/exit points for which physical access audit logs are to be maintained;"},{"id":"pe-3.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(b)[2]"}],"prose":"maintains physical access audit logs for organization-defined entry\/exit points;"}]},{"id":"pe-3.c_obj","name":"objective","props":[{"name":"label","value":"PE-3(c)"}],"parts":[{"id":"pe-3.c_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(c)[1]"}],"prose":"defines security safeguards to be employed to control access to areas within the facility officially designated as publicly accessible;"},{"id":"pe-3.c_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(c)[2]"}],"prose":"provides organization-defined security safeguards to control access to areas within the facility officially designated as publicly accessible;"}]},{"id":"pe-3.d_obj","name":"objective","props":[{"name":"label","value":"PE-3(d)"}],"parts":[{"id":"pe-3.d_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(d)[1]"}],"prose":"defines circumstances requiring visitor:","parts":[{"id":"pe-3.d_obj.1.a","name":"objective","props":[{"name":"label","value":"PE-3(d)[1][a]"}],"prose":"escorts;"},{"id":"pe-3.d_obj.1.b","name":"objective","props":[{"name":"label","value":"PE-3(d)[1][b]"}],"prose":"monitoring;"}]},{"id":"pe-3.d_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(d)[2]"}],"prose":"in accordance with organization-defined circumstances requiring visitor escorts and monitoring:","parts":[{"id":"pe-3.d_obj.2.a","name":"objective","props":[{"name":"label","value":"PE-3(d)[2][a]"}],"prose":"escorts visitors;"},{"id":"pe-3.d_obj.2.b","name":"objective","props":[{"name":"label","value":"PE-3(d)[2][b]"}],"prose":"monitors visitor activities;"}]}]},{"id":"pe-3.e_obj","name":"objective","props":[{"name":"label","value":"PE-3(e)"}],"parts":[{"id":"pe-3.e_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(e)[1]"}],"prose":"secures keys;"},{"id":"pe-3.e_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(e)[2]"}],"prose":"secures combinations;"},{"id":"pe-3.e_obj.3","name":"objective","props":[{"name":"label","value":"PE-3(e)[3]"}],"prose":"secures other physical access devices;"}]},{"id":"pe-3.f_obj","name":"objective","props":[{"name":"label","value":"PE-3(f)"}],"parts":[{"id":"pe-3.f_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(f)[1]"}],"prose":"defines physical access devices to be inventoried;"},{"id":"pe-3.f_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(f)[2]"}],"prose":"defines the frequency to inventory organization-defined physical access devices;"},{"id":"pe-3.f_obj.3","name":"objective","props":[{"name":"label","value":"PE-3(f)[3]"}],"prose":"inventories the organization-defined physical access devices with the organization-defined frequency;"}]},{"id":"pe-3.g_obj","name":"objective","props":[{"name":"label","value":"PE-3(g)"}],"parts":[{"id":"pe-3.g_obj.1","name":"objective","props":[{"name":"label","value":"PE-3(g)[1]"}],"prose":"defines the frequency to change combinations and keys; and"},{"id":"pe-3.g_obj.2","name":"objective","props":[{"name":"label","value":"PE-3(g)[2]"}],"prose":"changes combinations and keys with the organization-defined frequency and\/or when:","parts":[{"id":"pe-3.g_obj.2.a","name":"objective","props":[{"name":"label","value":"PE-3(g)[2][a]"}],"prose":"keys are lost;"},{"id":"pe-3.g_obj.2.b","name":"objective","props":[{"name":"label","value":"PE-3(g)[2][b]"}],"prose":"combinations are compromised;"},{"id":"pe-3.g_obj.2.c","name":"objective","props":[{"name":"label","value":"PE-3(g)[2][c]"}],"prose":"individuals are transferred or terminated."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access control\n\nsecurity plan\n\nphysical access control logs or records\n\ninventory records of physical access control devices\n\ninformation system entry and exit points\n\nrecords of key and lock combination changes\n\nstorage locations for physical access control devices\n\nphysical access control devices\n\nlist of security safeguards controlling access to designated publicly accessible areas within facility\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access control responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for physical access control\n\nautomated mechanisms supporting and\/or implementing physical access control\n\nphysical access control devices"}]}]},{"id":"pe-4","class":"SP800-53","title":"Access Control for Transmission Medium","params":[{"id":"pe-4_prm_1","label":"organization-defined information system distribution and transmission lines"},{"id":"pe-4_prm_2","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-4"},{"name":"sort-id","value":"pe-04"}],"links":[{"href":"#06dff0ea-3848-4945-8d91-e955ee69f05d","rel":"reference"}],"parts":[{"id":"pe-4_smt","name":"statement","prose":"The organization controls physical access to {{ insert: param, pe-4_prm_1 }} within organizational facilities using {{ insert: param, pe-4_prm_2 }}."},{"id":"pe-4_gdn","name":"guidance","prose":"Physical security safeguards applied to information system distribution and transmission lines help to prevent accidental damage, disruption, and physical tampering. In addition, physical safeguards may be necessary to help prevent eavesdropping or in transit modification of unencrypted transmissions. Security safeguards to control physical access to system distribution and transmission lines include, for example: (i) locked wiring closets; (ii) disconnected or locked spare jacks; and\/or (iii) protection of cabling by conduit or cable trays.","links":[{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-8","rel":"related"}]},{"id":"pe-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-4_obj.1","name":"objective","props":[{"name":"label","value":"PE-4[1]"}],"prose":"defines information system distribution and transmission lines requiring physical access controls;"},{"id":"pe-4_obj.2","name":"objective","props":[{"name":"label","value":"PE-4[2]"}],"prose":"defines security safeguards to be employed to control physical access to organization-defined information system distribution and transmission lines within organizational facilities; and"},{"id":"pe-4_obj.3","name":"objective","props":[{"name":"label","value":"PE-4[3]"}],"prose":"controls physical access to organization-defined information system distribution and transmission lines within organizational facilities using organization-defined security safeguards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing access control for transmission medium\n\ninformation system design documentation\n\nfacility communications and wiring diagrams\n\nlist of physical security safeguards applied to information system distribution and transmission lines\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access control responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for access control to distribution and transmission lines\n\nautomated mechanisms\/security safeguards supporting and\/or implementing access control to distribution and transmission lines"}]}]},{"id":"pe-5","class":"SP800-53","title":"Access Control for Output Devices","props":[{"name":"priority","value":"P2"},{"name":"label","value":"PE-5"},{"name":"sort-id","value":"pe-05"}],"parts":[{"id":"pe-5_smt","name":"statement","prose":"The organization controls physical access to information system output devices to prevent unauthorized individuals from obtaining the output."},{"id":"pe-5_gdn","name":"guidance","prose":"Controlling physical access to output devices includes, for example, placing output devices in locked rooms or other secured areas and allowing access to authorized individuals only, and placing output devices in locations that can be monitored by organizational personnel. Monitors, printers, copiers, scanners, facsimile machines, and audio devices are examples of information system output devices.","links":[{"href":"#pe-2","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#pe-4","rel":"related"},{"href":"#pe-18","rel":"related"}]},{"id":"pe-5_obj","name":"objective","prose":"Determine if the organization controls physical access to information system output devices to prevent unauthorized individuals from obtaining the output."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing access control for display medium\n\nfacility layout of information system components\n\nactual displays from information system components\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access control responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for access control to output devices\n\nautomated mechanisms supporting and\/or implementing access control to output devices"}]}]},{"id":"pe-6","class":"SP800-53","title":"Monitoring Physical Access","params":[{"id":"pe-6_prm_1","label":"organization-defined frequency"},{"id":"pe-6_prm_2","label":"organization-defined events or potential indications of events"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-6"},{"name":"sort-id","value":"pe-06"}],"parts":[{"id":"pe-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Monitors physical access to the facility where the information system resides to detect and respond to physical security incidents;"},{"id":"pe-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews physical access logs {{ insert: param, pe-6_prm_1 }} and upon occurrence of {{ insert: param, pe-6_prm_2 }}; and"},{"id":"pe-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Coordinates results of reviews and investigations with the organizational incident response capability."}]},{"id":"pe-6_gdn","name":"guidance","prose":"Organizational incident response capabilities include investigations of and responses to detected physical security incidents. Security incidents include, for example, apparent security violations or suspicious physical access activities. Suspicious physical access activities include, for example: (i) accesses outside of normal work hours; (ii) repeated accesses to areas not normally accessed; (iii) accesses for unusual lengths of time; and (iv) out-of-sequence accesses.","links":[{"href":"#ca-7","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ir-8","rel":"related"}]},{"id":"pe-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-6.a_obj","name":"objective","props":[{"name":"label","value":"PE-6(a)"}],"prose":"monitors physical access to the facility where the information system resides to detect and respond to physical security incidents;"},{"id":"pe-6.b_obj","name":"objective","props":[{"name":"label","value":"PE-6(b)"}],"parts":[{"id":"pe-6.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-6(b)[1]"}],"prose":"defines the frequency to review physical access logs;"},{"id":"pe-6.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-6(b)[2]"}],"prose":"defines events or potential indication of events requiring physical access logs to be reviewed;"},{"id":"pe-6.b_obj.3","name":"objective","props":[{"name":"label","value":"PE-6(b)[3]"}],"prose":"reviews physical access logs with the organization-defined frequency and upon occurrence of organization-defined events or potential indications of events; and"}]},{"id":"pe-6.c_obj","name":"objective","props":[{"name":"label","value":"PE-6(c)"}],"prose":"coordinates results of reviews and investigations with the organizational incident response capability."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access monitoring\n\nsecurity plan\n\nphysical access logs or records\n\nphysical access monitoring records\n\nphysical access log reviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access monitoring responsibilities\n\norganizational personnel with incident response responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring physical access\n\nautomated mechanisms supporting and\/or implementing physical access monitoring\n\nautomated mechanisms supporting and\/or implementing reviewing of physical access logs"}]}],"controls":[{"id":"pe-6.1","class":"SP800-53-enhancement","title":"Intrusion Alarms \/ Surveillance Equipment","props":[{"name":"label","value":"PE-6(1)"},{"name":"sort-id","value":"pe-06.01"}],"parts":[{"id":"pe-6.1_smt","name":"statement","prose":"The organization monitors physical intrusion alarms and surveillance equipment."},{"id":"pe-6.1_obj","name":"objective","prose":"Determine if the organization monitors physical intrusion alarms and surveillance equipment."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing physical access monitoring\n\nsecurity plan\n\nphysical access logs or records\n\nphysical access monitoring records\n\nphysical access log reviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with physical access monitoring responsibilities\n\norganizational personnel with incident response responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring physical intrusion alarms and surveillance equipment\n\nautomated mechanisms supporting and\/or implementing physical access monitoring\n\nautomated mechanisms supporting and\/or implementing physical intrusion alarms and surveillance equipment"}]}]}]},{"id":"pe-8","class":"SP800-53","title":"Visitor Access Records","params":[{"id":"pe-8_prm_1","label":"organization-defined time period"},{"id":"pe-8_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"PE-8"},{"name":"sort-id","value":"pe-08"}],"parts":[{"id":"pe-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Maintains visitor access records to the facility where the information system resides for {{ insert: param, pe-8_prm_1 }}; and"},{"id":"pe-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews visitor access records {{ insert: param, pe-8_prm_2 }}."}]},{"id":"pe-8_gdn","name":"guidance","prose":"Visitor access records include, for example, names and organizations of persons visiting, visitor signatures, forms of identification, dates of access, entry and departure times, purposes of visits, and names and organizations of persons visited. Visitor access records are not required for publicly accessible areas."},{"id":"pe-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-8.a_obj","name":"objective","props":[{"name":"label","value":"PE-8(a)"}],"parts":[{"id":"pe-8.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-8(a)[1]"}],"prose":"defines the time period to maintain visitor access records to the facility where the information system resides;"},{"id":"pe-8.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-8(a)[2]"}],"prose":"maintains visitor access records to the facility where the information system resides for the organization-defined time period;"}]},{"id":"pe-8.b_obj","name":"objective","props":[{"name":"label","value":"PE-8(b)"}],"parts":[{"id":"pe-8.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-8(b)[1]"}],"prose":"defines the frequency to review visitor access records; and"},{"id":"pe-8.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-8(b)[2]"}],"prose":"reviews visitor access records with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing visitor access records\n\nsecurity plan\n\nvisitor access control logs or records\n\nvisitor access record or log reviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with visitor access records responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for maintaining and reviewing visitor access records\n\nautomated mechanisms supporting and\/or implementing maintenance and review of visitor access records"}]}]},{"id":"pe-9","class":"SP800-53","title":"Power Equipment and Cabling","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-9"},{"name":"sort-id","value":"pe-09"}],"parts":[{"id":"pe-9_smt","name":"statement","prose":"The organization protects power equipment and power cabling for the information system from damage and destruction."},{"id":"pe-9_gdn","name":"guidance","prose":"Organizations determine the types of protection necessary for power equipment and cabling employed at different locations both internal and external to organizational facilities and environments of operation. This includes, for example, generators and power cabling outside of buildings, internal cabling and uninterruptable power sources within an office or data center, and power sources for self-contained entities such as vehicles and satellites.","links":[{"href":"#pe-4","rel":"related"}]},{"id":"pe-9_obj","name":"objective","prose":"Determine if the organization protects power equipment and power cabling for the information system from damage and destruction."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing power equipment\/cabling protection\n\nfacilities housing power equipment\/cabling\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for protecting power equipment\/cabling\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing protection of power equipment\/cabling"}]}]},{"id":"pe-10","class":"SP800-53","title":"Emergency Shutoff","params":[{"id":"pe-10_prm_1","label":"organization-defined location by information system or system component"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-10"},{"name":"sort-id","value":"pe-10"}],"parts":[{"id":"pe-10_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-10_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Provides the capability of shutting off power to the information system or individual system components in emergency situations;"},{"id":"pe-10_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Places emergency shutoff switches or devices in {{ insert: param, pe-10_prm_1 }} to facilitate safe and easy access for personnel; and"},{"id":"pe-10_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Protects emergency power shutoff capability from unauthorized activation."}]},{"id":"pe-10_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms.","links":[{"href":"#pe-15","rel":"related"}]},{"id":"pe-10_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-10.a_obj","name":"objective","props":[{"name":"label","value":"PE-10(a)"}],"prose":"provides the capability of shutting off power to the information system or individual system components in emergency situations;"},{"id":"pe-10.b_obj","name":"objective","props":[{"name":"label","value":"PE-10(b)"}],"parts":[{"id":"pe-10.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-10(b)[1]"}],"prose":"defines the location of emergency shutoff switches or devices by information system or system component;"},{"id":"pe-10.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-10(b)[2]"}],"prose":"places emergency shutoff switches or devices in the organization-defined location by information system or system component to facilitate safe and easy access for personnel; and"}]},{"id":"pe-10.c_obj","name":"objective","props":[{"name":"label","value":"PE-10(c)"}],"prose":"protects emergency power shutoff capability from unauthorized activation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing power source emergency shutoff\n\nsecurity plan\n\nemergency shutoff controls or switches\n\nlocations housing emergency shutoff switches and devices\n\nsecurity safeguards protecting emergency power shutoff capability from unauthorized activation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for emergency power shutoff capability (both implementing and using the capability)\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing emergency power shutoff"}]}]},{"id":"pe-11","class":"SP800-53","title":"Emergency Power","params":[{"id":"pe-11_prm_1","select":{"how-many":"one-or-more","choice":["an orderly shutdown of the information system","transition of the information system to long-term alternate power"]}}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-11"},{"name":"sort-id","value":"pe-11"}],"parts":[{"id":"pe-11_smt","name":"statement","prose":"The organization provides a short-term uninterruptible power supply to facilitate {{ insert: param, pe-11_prm_1 }} in the event of a primary power source loss."},{"id":"pe-11_gdn","name":"guidance","links":[{"href":"#at-3","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#cp-7","rel":"related"}]},{"id":"pe-11_obj","name":"objective","prose":"Determine if the organization provides a short-term uninterruptible power supply to facilitate one or more of the following in the event of a primary power source loss:","parts":[{"id":"pe-11_obj.1","name":"objective","props":[{"name":"label","value":"PE-11[1]"}],"prose":"an orderly shutdown of the information system; and\/or"},{"id":"pe-11_obj.2","name":"objective","props":[{"name":"label","value":"PE-11[2]"}],"prose":"transition of the information system to long-term alternate power."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing emergency power\n\nuninterruptible power supply\n\nuninterruptible power supply documentation\n\nuninterruptible power supply test records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for emergency power and\/or planning\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing uninterruptible power supply\n\nthe uninterruptable power supply"}]}]},{"id":"pe-12","class":"SP800-53","title":"Emergency Lighting","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-12"},{"name":"sort-id","value":"pe-12"}],"parts":[{"id":"pe-12_smt","name":"statement","prose":"The organization employs and maintains automatic emergency lighting for the information system that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility."},{"id":"pe-12_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms.","links":[{"href":"#cp-2","rel":"related"},{"href":"#cp-7","rel":"related"}]},{"id":"pe-12_obj","name":"objective","prose":"Determine if the organization employs and maintains automatic emergency lighting for the information system that:","parts":[{"id":"pe-12_obj.1","name":"objective","props":[{"name":"label","value":"PE-12[1]"}],"prose":"activates in the event of a power outage or disruption; and"},{"id":"pe-12_obj.2","name":"objective","props":[{"name":"label","value":"PE-12[2]"}],"prose":"covers emergency exits and evacuation routes within the facility."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing emergency lighting\n\nemergency lighting documentation\n\nemergency lighting test records\n\nemergency exits and evacuation routes\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for emergency lighting and\/or planning\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing emergency lighting capability"}]}]},{"id":"pe-13","class":"SP800-53","title":"Fire Protection","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-13"},{"name":"sort-id","value":"pe-13"}],"parts":[{"id":"pe-13_smt","name":"statement","prose":"The organization employs and maintains fire suppression and detection devices\/systems for the information system that are supported by an independent energy source."},{"id":"pe-13_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms. Fire suppression and detection devices\/systems include, for example, sprinkler systems, handheld fire extinguishers, fixed fire hoses, and smoke detectors."},{"id":"pe-13_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-13_obj.1","name":"objective","props":[{"name":"label","value":"PE-13[1]"}],"prose":"employs fire suppression and detection devices\/systems for the information system that are supported by an independent energy source; and"},{"id":"pe-13_obj.2","name":"objective","props":[{"name":"label","value":"PE-13[2]"}],"prose":"maintains fire suppression and detection devices\/systems for the information system that are supported by an independent energy source."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing fire protection\n\nfire suppression and detection devices\/systems\n\nfire suppression and detection devices\/systems documentation\n\ntest records of fire suppression and detection devices\/systems\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for fire detection and suppression devices\/systems\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing fire suppression\/detection devices\/systems"}]}],"controls":[{"id":"pe-13.3","class":"SP800-53-enhancement","title":"Automatic Fire Suppression","props":[{"name":"label","value":"PE-13(3)"},{"name":"sort-id","value":"pe-13.03"}],"parts":[{"id":"pe-13.3_smt","name":"statement","prose":"The organization employs an automatic fire suppression capability for the information system when the facility is not staffed on a continuous basis."},{"id":"pe-13.3_obj","name":"objective","prose":"Determine if the organization employs an automatic fire suppression capability for the information system when the facility is not staffed on a continuous basis."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing fire protection\n\nfire suppression and detection devices\/systems documentation\n\nfacility housing the information system\n\nalarm service-level agreements\n\ntest records of fire suppression and detection devices\/systems\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for fire detection and suppression devices\/systems\n\norganizational personnel with responsibilities for providing automatic notifications of any activation of fire suppression devices\/systems to appropriate personnel, roles, and emergency responders\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing fire suppression devices\/systems\n\nactivation of fire suppression devices\/systems (simulated)"}]}]}]},{"id":"pe-14","class":"SP800-53","title":"Temperature and Humidity Controls","params":[{"id":"pe-14_prm_1","label":"organization-defined acceptable levels"},{"id":"pe-14_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-14"},{"name":"sort-id","value":"pe-14"}],"parts":[{"id":"pe-14_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-14_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Maintains temperature and humidity levels within the facility where the information system resides at {{ insert: param, pe-14_prm_1 }}; and"},{"id":"pe-14_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Monitors temperature and humidity levels {{ insert: param, pe-14_prm_2 }}."}]},{"id":"pe-14_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources, for example, data centers, server rooms, and mainframe computer rooms.","links":[{"href":"#at-3","rel":"related"}]},{"id":"pe-14_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-14.a_obj","name":"objective","props":[{"name":"label","value":"PE-14(a)"}],"parts":[{"id":"pe-14.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-14(a)[1]"}],"prose":"defines acceptable temperature levels to be maintained within the facility where the information system resides;"},{"id":"pe-14.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-14(a)[2]"}],"prose":"defines acceptable humidity levels to be maintained within the facility where the information system resides;"},{"id":"pe-14.a_obj.3","name":"objective","props":[{"name":"label","value":"PE-14(a)[3]"}],"prose":"maintains temperature levels within the facility where the information system resides at the organization-defined levels;"},{"id":"pe-14.a_obj.4","name":"objective","props":[{"name":"label","value":"PE-14(a)[4]"}],"prose":"maintains humidity levels within the facility where the information system resides at the organization-defined levels;"}]},{"id":"pe-14.b_obj","name":"objective","props":[{"name":"label","value":"PE-14(b)"}],"parts":[{"id":"pe-14.b_obj.1","name":"objective","props":[{"name":"label","value":"PE-14(b)[1]"}],"prose":"defines the frequency to monitor temperature levels;"},{"id":"pe-14.b_obj.2","name":"objective","props":[{"name":"label","value":"PE-14(b)[2]"}],"prose":"defines the frequency to monitor humidity levels;"},{"id":"pe-14.b_obj.3","name":"objective","props":[{"name":"label","value":"PE-14(b)[3]"}],"prose":"monitors temperature levels with the organization-defined frequency; and"},{"id":"pe-14.b_obj.4","name":"objective","props":[{"name":"label","value":"PE-14(b)[4]"}],"prose":"monitors humidity levels with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing temperature and humidity control\n\nsecurity plan\n\ntemperature and humidity controls\n\nfacility housing the information system\n\ntemperature and humidity controls documentation\n\ntemperature and humidity records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for information system environmental controls\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing maintenance and monitoring of temperature and humidity levels"}]}]},{"id":"pe-15","class":"SP800-53","title":"Water Damage Protection","props":[{"name":"priority","value":"P1"},{"name":"label","value":"PE-15"},{"name":"sort-id","value":"pe-15"}],"parts":[{"id":"pe-15_smt","name":"statement","prose":"The organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are accessible, working properly, and known to key personnel."},{"id":"pe-15_gdn","name":"guidance","prose":"This control applies primarily to facilities containing concentrations of information system resources including, for example, data centers, server rooms, and mainframe computer rooms. Isolation valves can be employed in addition to or in lieu of master shutoff valves to shut off water supplies in specific areas of concern, without affecting entire organizations.","links":[{"href":"#at-3","rel":"related"}]},{"id":"pe-15_obj","name":"objective","prose":"Determine if the organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are:","parts":[{"id":"pe-15_obj.1","name":"objective","props":[{"name":"label","value":"PE-15[1]"}],"prose":"accessible;"},{"id":"pe-15_obj.2","name":"objective","props":[{"name":"label","value":"PE-15[2]"}],"prose":"working properly; and"},{"id":"pe-15_obj.3","name":"objective","props":[{"name":"label","value":"PE-15[3]"}],"prose":"known to key personnel."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing water damage protection\n\nfacility housing the information system\n\nmaster shutoff valves\n\nlist of key personnel with knowledge of location and activation procedures for master shutoff valves for the plumbing system\n\nmaster shutoff valve documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for information system environmental controls\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Master water-shutoff valves\n\norganizational process for activating master water-shutoff"}]}]},{"id":"pe-16","class":"SP800-53","title":"Delivery and Removal","params":[{"id":"pe-16_prm_1","label":"organization-defined types of information system components"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PE-16"},{"name":"sort-id","value":"pe-16"}],"parts":[{"id":"pe-16_smt","name":"statement","prose":"The organization authorizes, monitors, and controls {{ insert: param, pe-16_prm_1 }} entering and exiting the facility and maintains records of those items."},{"id":"pe-16_gdn","name":"guidance","prose":"Effectively enforcing authorizations for entry and exit of information system components may require restricting access to delivery areas and possibly isolating the areas from the information system and media libraries.","links":[{"href":"#cm-3","rel":"related"},{"href":"#ma-2","rel":"related"},{"href":"#ma-3","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#sa-12","rel":"related"}]},{"id":"pe-16_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-16_obj.1","name":"objective","props":[{"name":"label","value":"PE-16[1]"}],"prose":"defines types of information system components to be authorized, monitored, and controlled as such components are entering and exiting the facility;"},{"id":"pe-16_obj.2","name":"objective","props":[{"name":"label","value":"PE-16[2]"}],"prose":"authorizes organization-defined information system components entering the facility;"},{"id":"pe-16_obj.3","name":"objective","props":[{"name":"label","value":"PE-16[3]"}],"prose":"monitors organization-defined information system components entering the facility;"},{"id":"pe-16_obj.4","name":"objective","props":[{"name":"label","value":"PE-16[4]"}],"prose":"controls organization-defined information system components entering the facility;"},{"id":"pe-16_obj.5","name":"objective","props":[{"name":"label","value":"PE-16[5]"}],"prose":"authorizes organization-defined information system components exiting the facility;"},{"id":"pe-16_obj.6","name":"objective","props":[{"name":"label","value":"PE-16[6]"}],"prose":"monitors organization-defined information system components exiting the facility;"},{"id":"pe-16_obj.7","name":"objective","props":[{"name":"label","value":"PE-16[7]"}],"prose":"controls organization-defined information system components exiting the facility;"},{"id":"pe-16_obj.8","name":"objective","props":[{"name":"label","value":"PE-16[8]"}],"prose":"maintains records of information system components entering the facility; and"},{"id":"pe-16_obj.9","name":"objective","props":[{"name":"label","value":"PE-16[9]"}],"prose":"maintains records of information system components exiting the facility."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing delivery and removal of information system components from the facility\n\nsecurity plan\n\nfacility housing the information system\n\nrecords of items entering and exiting the facility\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibilities for controlling information system components entering and exiting the facility\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for authorizing, monitoring, and controlling information system-related items entering and exiting the facility\n\nautomated mechanisms supporting and\/or implementing authorizing, monitoring, and controlling information system-related items entering and exiting the facility"}]}]},{"id":"pe-17","class":"SP800-53","title":"Alternate Work Site","params":[{"id":"pe-17_prm_1","label":"organization-defined security controls"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PE-17"},{"name":"sort-id","value":"pe-17"}],"links":[{"href":"#5309d4d0-46f8-4213-a749-e7584164e5e8","rel":"reference"}],"parts":[{"id":"pe-17_smt","name":"statement","prose":"The organization:","parts":[{"id":"pe-17_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Employs {{ insert: param, pe-17_prm_1 }} at alternate work sites;"},{"id":"pe-17_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Assesses as feasible, the effectiveness of security controls at alternate work sites; and"},{"id":"pe-17_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Provides a means for employees to communicate with information security personnel in case of security incidents or problems."}]},{"id":"pe-17_gdn","name":"guidance","prose":"Alternate work sites may include, for example, government facilities or private residences of employees. While commonly distinct from alternative processing sites, alternate work sites may provide readily available alternate locations as part of contingency operations. Organizations may define different sets of security controls for specific alternate work sites or types of sites depending on the work-related activities conducted at those sites. This control supports the contingency planning activities of organizations and the federal telework initiative.","links":[{"href":"#ac-17","rel":"related"},{"href":"#cp-7","rel":"related"}]},{"id":"pe-17_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pe-17.a_obj","name":"objective","props":[{"name":"label","value":"PE-17(a)"}],"parts":[{"id":"pe-17.a_obj.1","name":"objective","props":[{"name":"label","value":"PE-17(a)[1]"}],"prose":"defines security controls to be employed at alternate work sites;"},{"id":"pe-17.a_obj.2","name":"objective","props":[{"name":"label","value":"PE-17(a)[2]"}],"prose":"employs organization-defined security controls at alternate work sites;"}]},{"id":"pe-17.b_obj","name":"objective","props":[{"name":"label","value":"PE-17(b)"}],"prose":"assesses, as feasible, the effectiveness of security controls at alternate work sites; and"},{"id":"pe-17.c_obj","name":"objective","props":[{"name":"label","value":"PE-17(c)"}],"prose":"provides a means for employees to communicate with information security personnel in case of security incidents or problems."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Physical and environmental protection policy\n\nprocedures addressing alternate work sites for organizational personnel\n\nsecurity plan\n\nlist of security controls required for alternate work sites\n\nassessments of security controls at alternate work sites\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel approving use of alternate work sites\n\norganizational personnel using alternate work sites\n\norganizational personnel assessing controls at alternate work sites\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security at alternate work sites\n\nautomated mechanisms supporting alternate work sites\n\nsecurity controls employed at alternate work sites\n\nmeans of communications between personnel at alternate work sites and security personnel"}]}]}]},{"id":"pl","class":"family","title":"Planning","controls":[{"id":"pl-1","class":"SP800-53","title":"Security Planning Policy and Procedures","params":[{"id":"pl-1_prm_1","label":"organization-defined personnel or roles"},{"id":"pl-1_prm_2","label":"organization-defined frequency"},{"id":"pl-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PL-1"},{"name":"sort-id","value":"pl-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9c5c9e8c-dc81-4f55-a11c-d71d7487790f","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"pl-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, pl-1_prm_1 }}:","parts":[{"id":"pl-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A security planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"pl-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the security planning policy and associated security planning controls; and"}]},{"id":"pl-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"pl-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Security planning policy {{ insert: param, pl-1_prm_2 }}; and"},{"id":"pl-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Security planning procedures {{ insert: param, pl-1_prm_3 }}."}]}]},{"id":"pl-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the PL family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"pl-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-1.a_obj","name":"objective","props":[{"name":"label","value":"PL-1(a)"}],"parts":[{"id":"pl-1.a.1_obj","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)"}],"parts":[{"id":"pl-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1]"}],"prose":"develops and documents a planning policy that addresses:","parts":[{"id":"pl-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"pl-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"pl-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"pl-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"pl-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"pl-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"pl-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"pl-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the planning policy is to be disseminated;"},{"id":"pl-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"PL-1(a)(1)[3]"}],"prose":"disseminates the planning policy to organization-defined personnel or roles;"}]},{"id":"pl-1.a.2_obj","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)"}],"parts":[{"id":"pl-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the planning policy and associated planning controls;"},{"id":"pl-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"pl-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"PL-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"pl-1.b_obj","name":"objective","props":[{"name":"label","value":"PL-1(b)"}],"parts":[{"id":"pl-1.b.1_obj","name":"objective","props":[{"name":"label","value":"PL-1(b)(1)"}],"parts":[{"id":"pl-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current planning policy;"},{"id":"pl-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(b)(1)[2]"}],"prose":"reviews and updates the current planning policy with the organization-defined frequency;"}]},{"id":"pl-1.b.2_obj","name":"objective","props":[{"name":"label","value":"PL-1(b)(2)"}],"parts":[{"id":"pl-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"PL-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current planning procedures; and"},{"id":"pl-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"PL-1(b)(2)[2]"}],"prose":"reviews and updates the current planning procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Planning policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with planning responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"pl-2","class":"SP800-53","title":"System Security Plan","params":[{"id":"pl-2_prm_1","label":"organization-defined personnel or roles"},{"id":"pl-2_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PL-2"},{"name":"sort-id","value":"pl-02"}],"links":[{"href":"#9c5c9e8c-dc81-4f55-a11c-d71d7487790f","rel":"reference"}],"parts":[{"id":"pl-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops a security plan for the information system that:","parts":[{"id":"pl-2_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Is consistent with the organization’s enterprise architecture;"},{"id":"pl-2_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Explicitly defines the authorization boundary for the system;"},{"id":"pl-2_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Describes the operational context of the information system in terms of missions and business processes;"},{"id":"pl-2_smt.a.4","name":"item","props":[{"name":"label","value":"4."}],"prose":"Provides the security categorization of the information system including supporting rationale;"},{"id":"pl-2_smt.a.5","name":"item","props":[{"name":"label","value":"5."}],"prose":"Describes the operational environment for the information system and relationships with or connections to other information systems;"},{"id":"pl-2_smt.a.6","name":"item","props":[{"name":"label","value":"6."}],"prose":"Provides an overview of the security requirements for the system;"},{"id":"pl-2_smt.a.7","name":"item","props":[{"name":"label","value":"7."}],"prose":"Identifies any relevant overlays, if applicable;"},{"id":"pl-2_smt.a.8","name":"item","props":[{"name":"label","value":"8."}],"prose":"Describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring decisions; and"},{"id":"pl-2_smt.a.9","name":"item","props":[{"name":"label","value":"9."}],"prose":"Is reviewed and approved by the authorizing official or designated representative prior to plan implementation;"}]},{"id":"pl-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Distributes copies of the security plan and communicates subsequent changes to the plan to {{ insert: param, pl-2_prm_1 }};"},{"id":"pl-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews the security plan for the information system {{ insert: param, pl-2_prm_2 }};"},{"id":"pl-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Updates the plan to address changes to the information system\/environment of operation or problems identified during plan implementation or security control assessments; and"},{"id":"pl-2_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Protects the security plan from unauthorized disclosure and modification."}]},{"id":"pl-2_gdn","name":"guidance","prose":"Security plans relate security requirements to a set of security controls and control enhancements. Security plans also describe, at a high level, how the security controls and control enhancements meet those security requirements, but do not provide detailed, technical descriptions of the specific design or implementation of the controls\/enhancements. Security plans contain sufficient information (including the specification of parameter values for assignment and selection statements either explicitly or by reference) to enable a design and implementation that is unambiguously compliant with the intent of the plans and subsequent determinations of risk to organizational operations and assets, individuals, other organizations, and the Nation if the plan is implemented as intended. Organizations can also apply tailoring guidance to the security control baselines in Appendix D and CNSS Instruction 1253 to develop overlays for community-wide use or to address specialized requirements, technologies, or missions\/environments of operation (e.g., DoD-tactical, Federal Public Key Infrastructure, or Federal Identity, Credential, and Access Management, space operations). Appendix I provides guidance on developing overlays. Security plans need not be single documents; the plans can be a collection of various documents including documents that already exist. Effective security plans make extensive use of references to policies, procedures, and additional documents (e.g., design and implementation specifications) where more detailed information can be obtained. This reduces the documentation requirements associated with security programs and maintains security-related information in other established management\/operational areas related to enterprise architecture, system development life cycle, systems engineering, and acquisition. For example, security plans do not contain detailed contingency plan or incident response plan information but instead provide explicitly or by reference, sufficient information to define what needs to be accomplished by those plans.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-14","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#ca-2","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#cp-2","rel":"related"},{"href":"#ir-8","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#ma-5","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#pl-7","rel":"related"},{"href":"#pm-1","rel":"related"},{"href":"#pm-7","rel":"related"},{"href":"#pm-8","rel":"related"},{"href":"#pm-9","rel":"related"},{"href":"#pm-11","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-17","rel":"related"}]},{"id":"pl-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-2.a_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)"}],"prose":"develops a security plan for the information system that:","parts":[{"id":"pl-2.a.1_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(1)"}],"prose":"is consistent with the organization’s enterprise architecture;"},{"id":"pl-2.a.2_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(2)"}],"prose":"explicitly defines the authorization boundary for the system;"},{"id":"pl-2.a.3_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(3)"}],"prose":"describes the operational context of the information system in terms of missions and business processes;"},{"id":"pl-2.a.4_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(4)"}],"prose":"provides the security categorization of the information system including supporting rationale;"},{"id":"pl-2.a.5_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(5)"}],"prose":"describes the operational environment for the information system and relationships with or connections to other information systems;"},{"id":"pl-2.a.6_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(6)"}],"prose":"provides an overview of the security requirements for the system;"},{"id":"pl-2.a.7_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(7)"}],"prose":"identifies any relevant overlays, if applicable;"},{"id":"pl-2.a.8_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(8)"}],"prose":"describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring and supplemental decisions;"},{"id":"pl-2.a.9_obj","name":"objective","props":[{"name":"label","value":"PL-2(a)(9)"}],"prose":"is reviewed and approved by the authorizing official or designated representative prior to plan implementation;"}]},{"id":"pl-2.b_obj","name":"objective","props":[{"name":"label","value":"PL-2(b)"}],"parts":[{"id":"pl-2.b_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(b)[1]"}],"prose":"defines personnel or roles to whom copies of the security plan are to be distributed and subsequent changes to the plan are to be communicated;"},{"id":"pl-2.b_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(b)[2]"}],"prose":"distributes copies of the security plan and communicates subsequent changes to the plan to organization-defined personnel or roles;"}]},{"id":"pl-2.c_obj","name":"objective","props":[{"name":"label","value":"PL-2(c)"}],"parts":[{"id":"pl-2.c_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(c)[1]"}],"prose":"defines the frequency to review the security plan for the information system;"},{"id":"pl-2.c_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(c)[2]"}],"prose":"reviews the security plan for the information system with the organization-defined frequency;"}]},{"id":"pl-2.d_obj","name":"objective","props":[{"name":"label","value":"PL-2(d)"}],"prose":"updates the plan to address:","parts":[{"id":"pl-2.d_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(d)[1]"}],"prose":"changes to the information system\/environment of operation;"},{"id":"pl-2.d_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(d)[2]"}],"prose":"problems identified during plan implementation;"},{"id":"pl-2.d_obj.3","name":"objective","props":[{"name":"label","value":"PL-2(d)[3]"}],"prose":"problems identified during security control assessments;"}]},{"id":"pl-2.e_obj","name":"objective","props":[{"name":"label","value":"PL-2(e)"}],"prose":"protects the security plan from unauthorized:","parts":[{"id":"pl-2.e_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(e)[1]"}],"prose":"disclosure; and"},{"id":"pl-2.e_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(e)[2]"}],"prose":"modification."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\nprocedures addressing security plan development and implementation\n\nprocedures addressing security plan reviews and updates\n\nenterprise architecture documentation\n\nsecurity plan for the information system\n\nrecords of security plan reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security planning and plan implementation responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security plan development\/review\/update\/approval\n\nautomated mechanisms supporting the information system security plan"}]}],"controls":[{"id":"pl-2.3","class":"SP800-53-enhancement","title":"Plan \/ Coordinate with Other Organizational Entities","params":[{"id":"pl-2.3_prm_1","label":"organization-defined individuals or groups"}],"props":[{"name":"label","value":"PL-2(3)"},{"name":"sort-id","value":"pl-02.03"}],"parts":[{"id":"pl-2.3_smt","name":"statement","prose":"The organization plans and coordinates security-related activities affecting the information system with {{ insert: param, pl-2.3_prm_1 }} before conducting such activities in order to reduce the impact on other organizational entities."},{"id":"pl-2.3_gdn","name":"guidance","prose":"Security-related activities include, for example, security assessments, audits, hardware and software maintenance, patch management, and contingency plan testing. Advance planning and coordination includes emergency and nonemergency (i.e., planned or nonurgent unplanned) situations. The process defined by organizations to plan and coordinate security-related activities can be included in security plans for information systems or other documents, as appropriate.","links":[{"href":"#cp-4","rel":"related"},{"href":"#ir-4","rel":"related"}]},{"id":"pl-2.3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-2.3_obj.1","name":"objective","props":[{"name":"label","value":"PL-2(3)[1]"}],"prose":"defines individuals or groups with whom security-related activities affecting the information system are to be planned and coordinated before conducting such activities in order to reduce the impact on other organizational entities; and"},{"id":"pl-2.3_obj.2","name":"objective","props":[{"name":"label","value":"PL-2(3)[2]"}],"prose":"plans and coordinates security-related activities affecting the information system with organization-defined individuals or groups before conducting such activities in order to reduce the impact on other organizational entities."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\naccess control policy\n\ncontingency planning policy\n\nprocedures addressing security-related activity planning for the information system\n\nsecurity plan for the information system\n\ncontingency plan for the information system\n\ninformation system design documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security planning and plan implementation responsibilities\n\norganizational individuals or groups with whom security-related activities are to be planned and coordinated\n\norganizational personnel with information security responsibilities"}]}]}]},{"id":"pl-4","class":"SP800-53","title":"Rules of Behavior","params":[{"id":"pl-4_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PL-4"},{"name":"sort-id","value":"pl-04"}],"links":[{"href":"#9c5c9e8c-dc81-4f55-a11c-d71d7487790f","rel":"reference"}],"parts":[{"id":"pl-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes and makes readily available to individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;"},{"id":"pl-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Receives a signed acknowledgment from such individuals, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the information system;"},{"id":"pl-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews and updates the rules of behavior {{ insert: param, pl-4_prm_1 }}; and"},{"id":"pl-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Requires individuals who have signed a previous version of the rules of behavior to read and re-sign when the rules of behavior are revised\/updated."}]},{"id":"pl-4_gdn","name":"guidance","prose":"This control enhancement applies to organizational users. Organizations consider rules of behavior based on individual user roles and responsibilities, differentiating, for example, between rules that apply to privileged users and rules that apply to general users. Establishing rules of behavior for some types of non-organizational users including, for example, individuals who simply receive data\/information from federal information systems, is often not feasible given the large number of such users and the limited nature of their interactions with the systems. Rules of behavior for both organizational and non-organizational users can also be established in AC-8, System Use Notification. PL-4 b. (the signed acknowledgment portion of this control) may be satisfied by the security awareness training and role-based security training programs conducted by organizations if such training includes rules of behavior. Organizations can use electronic signatures for acknowledging rules of behavior.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ac-8","rel":"related"},{"href":"#ac-9","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#ac-19","rel":"related"},{"href":"#ac-20","rel":"related"},{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#ia-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#ia-5","rel":"related"},{"href":"#mp-7","rel":"related"},{"href":"#ps-6","rel":"related"},{"href":"#ps-8","rel":"related"},{"href":"#sa-5","rel":"related"}]},{"id":"pl-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-4.a_obj","name":"objective","props":[{"name":"label","value":"PL-4(a)"}],"parts":[{"id":"pl-4.a_obj.1","name":"objective","props":[{"name":"label","value":"PL-4(a)[1]"}],"prose":"establishes, for individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;"},{"id":"pl-4.a_obj.2","name":"objective","props":[{"name":"label","value":"PL-4(a)[2]"}],"prose":"makes readily available to individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;"}]},{"id":"pl-4.b_obj","name":"objective","props":[{"name":"label","value":"PL-4(b)"}],"prose":"receives a signed acknowledgement from such individuals, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the information system;"},{"id":"pl-4.c_obj","name":"objective","props":[{"name":"label","value":"PL-4(c)"}],"parts":[{"id":"pl-4.c_obj.1","name":"objective","props":[{"name":"label","value":"PL-4(c)[1]"}],"prose":"defines the frequency to review and update the rules of behavior;"},{"id":"pl-4.c_obj.2","name":"objective","props":[{"name":"label","value":"PL-4(c)[2]"}],"prose":"reviews and updates the rules of behavior with the organization-defined frequency; and"}]},{"id":"pl-4.d_obj","name":"objective","props":[{"name":"label","value":"PL-4(d)"}],"prose":"requires individuals who have signed a previous version of the rules of behavior to read and resign when the rules of behavior are revised\/updated."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\nprocedures addressing rules of behavior for information system users\n\nrules of behavior\n\nsigned acknowledgements\n\nrecords for rules of behavior reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for establishing, reviewing, and updating rules of behavior\n\norganizational personnel who are authorized users of the information system and have signed and resigned rules of behavior\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for establishing, reviewing, disseminating, and updating rules of behavior\n\nautomated mechanisms supporting and\/or implementing the establishment, review, dissemination, and update of rules of behavior"}]}],"controls":[{"id":"pl-4.1","class":"SP800-53-enhancement","title":"Social Media and Networking Restrictions","props":[{"name":"label","value":"PL-4(1)"},{"name":"sort-id","value":"pl-04.01"}],"parts":[{"id":"pl-4.1_smt","name":"statement","prose":"The organization includes in the rules of behavior, explicit restrictions on the use of social media\/networking sites and posting organizational information on public websites."},{"id":"pl-4.1_gdn","name":"guidance","prose":"This control enhancement addresses rules of behavior related to the use of social media\/networking sites: (i) when organizational personnel are using such sites for official duties or in the conduct of official business; (ii) when organizational information is involved in social media\/networking transactions; and (iii) when personnel are accessing social media\/networking sites from organizational information systems. Organizations also address specific rules that prevent unauthorized entities from obtaining and\/or inferring non-public organizational information (e.g., system account information, personally identifiable information) from social media\/networking sites."},{"id":"pl-4.1_obj","name":"objective","prose":"Determine if the organization includes the following in the rules of behavior:","parts":[{"id":"pl-4.1_obj.1","name":"objective","props":[{"name":"label","value":"PL-4(1)[1]"}],"prose":"explicit restrictions on the use of social media\/networking sites; and"},{"id":"pl-4.1_obj.2","name":"objective","props":[{"name":"label","value":"PL-4(1)[2]"}],"prose":"posting organizational information on public websites."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\nprocedures addressing rules of behavior for information system users\n\nrules of behavior\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for establishing, reviewing, and updating rules of behavior\n\norganizational personnel who are authorized users of the information system and have signed rules of behavior\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for establishing rules of behavior\n\nautomated mechanisms supporting and\/or implementing the establishment of rules of behavior"}]}]}]},{"id":"pl-8","class":"SP800-53","title":"Information Security Architecture","params":[{"id":"pl-8_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PL-8"},{"name":"sort-id","value":"pl-08"}],"parts":[{"id":"pl-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"pl-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops an information security architecture for the information system that:","parts":[{"id":"pl-8_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Describes the overall philosophy, requirements, and approach to be taken with regard to protecting the confidentiality, integrity, and availability of organizational information;"},{"id":"pl-8_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Describes how the information security architecture is integrated into and supports the enterprise architecture; and"},{"id":"pl-8_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Describes any information security assumptions about, and dependencies on, external services;"}]},{"id":"pl-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the information security architecture {{ insert: param, pl-8_prm_1 }} to reflect updates in the enterprise architecture; and"},{"id":"pl-8_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensures that planned information security architecture changes are reflected in the security plan, the security Concept of Operations (CONOPS), and organizational procurements\/acquisitions."}]},{"id":"pl-8_gdn","name":"guidance","prose":"This control addresses actions taken by organizations in the design and development of information systems. The information security architecture at the individual information system level is consistent with and complements the more global, organization-wide information security architecture described in PM-7 that is integral to and developed as part of the enterprise architecture. The information security architecture includes an architectural description, the placement\/allocation of security functionality (including security controls), security-related information for external interfaces, information being exchanged across the interfaces, and the protection mechanisms associated with each interface. In addition, the security architecture can include other important security-related information, for example, user roles and access privileges assigned to each role, unique security requirements, the types of information processed, stored, and transmitted by the information system, restoration priorities of information and information system services, and any other specific protection needs. In today’s modern architecture, it is becoming less common for organizations to control all information resources. There are going to be key dependencies on external information services and service providers. Describing such dependencies in the information security architecture is important to developing a comprehensive mission\/business protection strategy. Establishing, developing, documenting, and maintaining under configuration control, a baseline configuration for organizational information systems is critical to implementing and maintaining an effective information security architecture. The development of the information security architecture is coordinated with the Senior Agency Official for Privacy (SAOP)\/Chief Privacy Officer (CPO) to ensure that security controls needed to support privacy requirements are identified and effectively implemented. PL-8 is primarily directed at organizations (i.e., internally focused) to help ensure that organizations develop an information security architecture for the information system, and that the security architecture is integrated with or tightly coupled to the enterprise architecture through the organization-wide information security architecture. In contrast, SA-17 is primarily directed at external information technology product\/system developers and integrators (although SA-17 could be used internally within organizations for in-house system development). SA-17, which is complementary to PL-8, is selected when organizations outsource the development of information systems or information system components to external entities, and there is a need to demonstrate\/show consistency with the organization’s enterprise architecture and information security architecture.","links":[{"href":"#cm-2","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#pm-7","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-17","rel":"related"},{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-53r4","rel":"related"}]},{"id":"pl-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"pl-8.a_obj","name":"objective","props":[{"name":"label","value":"PL-8(a)"}],"prose":"develops an information security architecture for the information system that describes:","parts":[{"id":"pl-8.a.1_obj","name":"objective","props":[{"name":"label","value":"PL-8(a)(1)"}],"prose":"the overall philosophy, requirements, and approach to be taken with regard to protecting the confidentiality, integrity, and availability of organizational information;"},{"id":"pl-8.a.2_obj","name":"objective","props":[{"name":"label","value":"PL-8(a)(2)"}],"prose":"how the information security architecture is integrated into and supports the enterprise architecture;"},{"id":"pl-8.a.3_obj","name":"objective","props":[{"name":"label","value":"PL-8(a)(3)"}],"prose":"any information security assumptions about, and dependencies on, external services;"}]},{"id":"pl-8.b_obj","name":"objective","props":[{"name":"label","value":"PL-8(b)"}],"parts":[{"id":"pl-8.b_obj.1","name":"objective","props":[{"name":"label","value":"PL-8(b)[1]"}],"prose":"defines the frequency to review and update the information security architecture;"},{"id":"pl-8.b_obj.2","name":"objective","props":[{"name":"label","value":"PL-8(b)[2]"}],"prose":"reviews and updates the information security architecture with the organization-defined frequency to reflect updates in the enterprise architecture;"}]},{"id":"pl-8.c_obj","name":"objective","props":[{"name":"label","value":"PL-8(c)"}],"prose":"ensures that planned information security architecture changes are reflected in:","parts":[{"id":"pl-8.c_obj.1","name":"objective","props":[{"name":"label","value":"PL-8(c)[1]"}],"prose":"the security plan;"},{"id":"pl-8.c_obj.2","name":"objective","props":[{"name":"label","value":"PL-8(c)[2]"}],"prose":"the security Concept of Operations (CONOPS); and"},{"id":"pl-8.c_obj.3","name":"objective","props":[{"name":"label","value":"PL-8(c)[3]"}],"prose":"the organizational procurements\/acquisitions."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Security planning policy\n\nprocedures addressing information security architecture development\n\nprocedures addressing information security architecture reviews and updates\n\nenterprise architecture documentation\n\ninformation security architecture documentation\n\nsecurity plan for the information system\n\nsecurity CONOPS for the information system\n\nrecords of information security architecture reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security planning and plan implementation responsibilities\n\norganizational personnel with information security architecture development responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for developing, reviewing, and updating the information security architecture\n\nautomated mechanisms supporting and\/or implementing the development, review, and update of the information security architecture"}]}]}]},{"id":"ps","class":"family","title":"Personnel Security","controls":[{"id":"ps-1","class":"SP800-53","title":"Personnel Security Policy and Procedures","params":[{"id":"ps-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ps-1_prm_2","label":"organization-defined frequency"},{"id":"ps-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-1"},{"name":"sort-id","value":"ps-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ps-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ps-1_prm_1 }}:","parts":[{"id":"ps-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A personnel security policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ps-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the personnel security policy and associated personnel security controls; and"}]},{"id":"ps-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ps-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Personnel security policy {{ insert: param, ps-1_prm_2 }}; and"},{"id":"ps-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Personnel security procedures {{ insert: param, ps-1_prm_3 }}."}]}]},{"id":"ps-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the PS family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ps-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-1.a_obj","name":"objective","props":[{"name":"label","value":"PS-1(a)"}],"parts":[{"id":"ps-1.a.1_obj","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)"}],"parts":[{"id":"ps-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1]"}],"prose":"develops and documents an personnel security policy that addresses:","parts":[{"id":"ps-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ps-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ps-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ps-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ps-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ps-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ps-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ps-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the personnel security policy is to be disseminated;"},{"id":"ps-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"PS-1(a)(1)[3]"}],"prose":"disseminates the personnel security policy to organization-defined personnel or roles;"}]},{"id":"ps-1.a.2_obj","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)"}],"parts":[{"id":"ps-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the personnel security policy and associated personnel security controls;"},{"id":"ps-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ps-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"PS-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ps-1.b_obj","name":"objective","props":[{"name":"label","value":"PS-1(b)"}],"parts":[{"id":"ps-1.b.1_obj","name":"objective","props":[{"name":"label","value":"PS-1(b)(1)"}],"parts":[{"id":"ps-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current personnel security policy;"},{"id":"ps-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(b)(1)[2]"}],"prose":"reviews and updates the current personnel security policy with the organization-defined frequency;"}]},{"id":"ps-1.b.2_obj","name":"objective","props":[{"name":"label","value":"PS-1(b)(2)"}],"parts":[{"id":"ps-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"PS-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current personnel security procedures; and"},{"id":"ps-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"PS-1(b)(2)[2]"}],"prose":"reviews and updates the current personnel security procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with access control responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ps-2","class":"SP800-53","title":"Position Risk Designation","params":[{"id":"ps-2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-2"},{"name":"sort-id","value":"ps-02"}],"links":[{"href":"#0c97e60b-325a-4efa-ba2b-90f20ccd5abc","rel":"reference"}],"parts":[{"id":"ps-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Assigns a risk designation to all organizational positions;"},{"id":"ps-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishes screening criteria for individuals filling those positions; and"},{"id":"ps-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews and updates position risk designations {{ insert: param, ps-2_prm_1 }}."}]},{"id":"ps-2_gdn","name":"guidance","prose":"Position risk designations reflect Office of Personnel Management policy and guidance. Risk designations can guide and inform the types of authorizations individuals receive when accessing organizational information and information systems. Position screening criteria include explicit information security role appointment requirements (e.g., training, security clearances).","links":[{"href":"#at-3","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#ps-3","rel":"related"}]},{"id":"ps-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-2.a_obj","name":"objective","props":[{"name":"label","value":"PS-2(a)"}],"prose":"assigns a risk designation to all organizational positions;"},{"id":"ps-2.b_obj","name":"objective","props":[{"name":"label","value":"PS-2(b)"}],"prose":"establishes screening criteria for individuals filling those positions;"},{"id":"ps-2.c_obj","name":"objective","props":[{"name":"label","value":"PS-2(c)"}],"parts":[{"id":"ps-2.c_obj.1","name":"objective","props":[{"name":"label","value":"PS-2(c)[1]"}],"prose":"defines the frequency to review and update position risk designations; and"},{"id":"ps-2.c_obj.2","name":"objective","props":[{"name":"label","value":"PS-2(c)[2]"}],"prose":"reviews and updates position risk designations with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing position categorization\n\nappropriate codes of federal regulations\n\nlist of risk designations for organizational positions\n\nsecurity plan\n\nrecords of position risk designation reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for assigning, reviewing, and updating position risk designations\n\norganizational processes for establishing screening criteria"}]}]},{"id":"ps-3","class":"SP800-53","title":"Personnel Screening","params":[{"id":"ps-3_prm_1","label":"organization-defined conditions requiring rescreening and, where rescreening is so indicated, the frequency of such rescreening"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-3"},{"name":"sort-id","value":"ps-03"}],"links":[{"href":"#0c97e60b-325a-4efa-ba2b-90f20ccd5abc","rel":"reference"},{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"},{"href":"#ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","rel":"reference"},{"href":"#2a71298a-ee90-490e-80ff-48c967173a47","rel":"reference"},{"href":"#2042d97b-f7f6-4c74-84f8-981867684659","rel":"reference"},{"href":"#6caa237b-531b-43ac-9711-d8f6b97b0377","rel":"reference"}],"parts":[{"id":"ps-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Screens individuals prior to authorizing access to the information system; and"},{"id":"ps-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Rescreens individuals according to {{ insert: param, ps-3_prm_1 }}."}]},{"id":"ps-3_gdn","name":"guidance","prose":"Personnel screening and rescreening activities reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, guidance, and specific criteria established for the risk designations of assigned positions. Organizations may define different rescreening conditions and frequencies for personnel accessing information systems based on types of information processed, stored, or transmitted by the systems.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#ps-2","rel":"related"}]},{"id":"ps-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-3.a_obj","name":"objective","props":[{"name":"label","value":"PS-3(a)"}],"prose":"screens individuals prior to authorizing access to the information system;"},{"id":"ps-3.b_obj","name":"objective","props":[{"name":"label","value":"PS-3(b)"}],"parts":[{"id":"ps-3.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-3(b)[1]"}],"prose":"defines conditions requiring re-screening;"},{"id":"ps-3.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-3(b)[2]"}],"prose":"defines the frequency of re-screening where it is so indicated; and"},{"id":"ps-3.b_obj.3","name":"objective","props":[{"name":"label","value":"PS-3(b)[3]"}],"prose":"re-screens individuals in accordance with organization-defined conditions requiring re-screening and, where re-screening is so indicated, with the organization-defined frequency of such re-screening."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel screening\n\nrecords of screened personnel\n\nsecurity plan\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for personnel screening"}]}]},{"id":"ps-4","class":"SP800-53","title":"Personnel Termination","params":[{"id":"ps-4_prm_1","label":"organization-defined time period"},{"id":"ps-4_prm_2","label":"organization-defined information security topics"},{"id":"ps-4_prm_3","label":"organization-defined personnel or roles"},{"id":"ps-4_prm_4","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-4"},{"name":"sort-id","value":"ps-04"}],"parts":[{"id":"ps-4_smt","name":"statement","prose":"The organization, upon termination of individual employment:","parts":[{"id":"ps-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Disables information system access within {{ insert: param, ps-4_prm_1 }};"},{"id":"ps-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Terminates\/revokes any authenticators\/credentials associated with the individual;"},{"id":"ps-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Conducts exit interviews that include a discussion of {{ insert: param, ps-4_prm_2 }};"},{"id":"ps-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Retrieves all security-related organizational information system-related property;"},{"id":"ps-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Retains access to organizational information and information systems formerly controlled by terminated individual; and"},{"id":"ps-4_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Notifies {{ insert: param, ps-4_prm_3 }} within {{ insert: param, ps-4_prm_4 }}."}]},{"id":"ps-4_gdn","name":"guidance","prose":"Information system-related property includes, for example, hardware authentication tokens, system administration technical manuals, keys, identification cards, and building passes. Exit interviews ensure that terminated individuals understand the security constraints imposed by being former employees and that proper accountability is achieved for information system-related property. Security topics of interest at exit interviews can include, for example, reminding terminated individuals of nondisclosure agreements and potential limitations on future employment. Exit interviews may not be possible for some terminated individuals, for example, in cases related to job abandonment, illnesses, and nonavailability of supervisors. Exit interviews are important for individuals with security clearances. Timely execution of termination actions is essential for individuals terminated for cause. In certain situations, organizations consider disabling the information system accounts of individuals that are being terminated prior to the individuals being notified.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#ps-5","rel":"related"},{"href":"#ps-6","rel":"related"}]},{"id":"ps-4_obj","name":"objective","prose":"Determine if the organization, upon termination of individual employment,:","parts":[{"id":"ps-4.a_obj","name":"objective","props":[{"name":"label","value":"PS-4(a)"}],"parts":[{"id":"ps-4.a_obj.1","name":"objective","props":[{"name":"label","value":"PS-4(a)[1]"}],"prose":"defines a time period within which to disable information system access;"},{"id":"ps-4.a_obj.2","name":"objective","props":[{"name":"label","value":"PS-4(a)[2]"}],"prose":"disables information system access within the organization-defined time period;"}]},{"id":"ps-4.b_obj","name":"objective","props":[{"name":"label","value":"PS-4(b)"}],"prose":"terminates\/revokes any authenticators\/credentials associated with the individual;"},{"id":"ps-4.c_obj","name":"objective","props":[{"name":"label","value":"PS-4(c)"}],"parts":[{"id":"ps-4.c_obj.1","name":"objective","props":[{"name":"label","value":"PS-4(c)[1]"}],"prose":"defines information security topics to be discussed when conducting exit interviews;"},{"id":"ps-4.c_obj.2","name":"objective","props":[{"name":"label","value":"PS-4(c)[2]"}],"prose":"conducts exit interviews that include a discussion of organization-defined information security topics;"}]},{"id":"ps-4.d_obj","name":"objective","props":[{"name":"label","value":"PS-4(d)"}],"prose":"retrieves all security-related organizational information system-related property;"},{"id":"ps-4.e_obj","name":"objective","props":[{"name":"label","value":"PS-4(e)"}],"prose":"retains access to organizational information and information systems formerly controlled by the terminated individual;"},{"id":"ps-4.f_obj","name":"objective","props":[{"name":"label","value":"PS-4(f)"}],"parts":[{"id":"ps-4.f_obj.1","name":"objective","props":[{"name":"label","value":"PS-4(f)[1]"}],"prose":"defines personnel or roles to be notified of the termination;"},{"id":"ps-4.f_obj.2","name":"objective","props":[{"name":"label","value":"PS-4(f)[2]"}],"prose":"defines the time period within which to notify organization-defined personnel or roles; and"},{"id":"ps-4.f_obj.3","name":"objective","props":[{"name":"label","value":"PS-4(f)[3]"}],"prose":"notifies organization-defined personnel or roles within the organization-defined time period."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel termination\n\nrecords of personnel termination actions\n\nlist of information system accounts\n\nrecords of terminated or revoked authenticators\/credentials\n\nrecords of exit interviews\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for personnel termination\n\nautomated mechanisms supporting and\/or implementing personnel termination notifications\n\nautomated mechanisms for disabling information system access\/revoking authenticators"}]}]},{"id":"ps-5","class":"SP800-53","title":"Personnel Transfer","params":[{"id":"ps-5_prm_1","label":"organization-defined transfer or reassignment actions"},{"id":"ps-5_prm_2","label":"organization-defined time period following the formal transfer action"},{"id":"ps-5_prm_3","label":"organization-defined personnel or roles"},{"id":"ps-5_prm_4","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"PS-5"},{"name":"sort-id","value":"ps-05"}],"parts":[{"id":"ps-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Reviews and confirms ongoing operational need for current logical and physical access authorizations to information systems\/facilities when individuals are reassigned or transferred to other positions within the organization;"},{"id":"ps-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Initiates {{ insert: param, ps-5_prm_1 }} within {{ insert: param, ps-5_prm_2 }};"},{"id":"ps-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Modifies access authorization as needed to correspond with any changes in operational need due to reassignment or transfer; and"},{"id":"ps-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Notifies {{ insert: param, ps-5_prm_3 }} within {{ insert: param, ps-5_prm_4 }}."}]},{"id":"ps-5_gdn","name":"guidance","prose":"This control applies when reassignments or transfers of individuals are permanent or of such extended durations as to make the actions warranted. Organizations define actions appropriate for the types of reassignments or transfers, whether permanent or extended. Actions that may be required for personnel transfers or reassignments to other positions within organizations include, for example: (i) returning old and issuing new keys, identification cards, and building passes; (ii) closing information system accounts and establishing new accounts; (iii) changing information system access authorizations (i.e., privileges); and (iv) providing for access to official records to which individuals had access at previous work locations and in previous information system accounts.","links":[{"href":"#ac-2","rel":"related"},{"href":"#ia-4","rel":"related"},{"href":"#pe-2","rel":"related"},{"href":"#ps-4","rel":"related"}]},{"id":"ps-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-5.a_obj","name":"objective","props":[{"name":"label","value":"PS-5(a)"}],"prose":"when individuals are reassigned or transferred to other positions within the organization, reviews and confirms ongoing operational need for current:","parts":[{"id":"ps-5.a_obj.1","name":"objective","props":[{"name":"label","value":"PS-5(a)[1]"}],"prose":"logical access authorizations to information systems;"},{"id":"ps-5.a_obj.2","name":"objective","props":[{"name":"label","value":"PS-5(a)[2]"}],"prose":"physical access authorizations to information systems and facilities;"}]},{"id":"ps-5.b_obj","name":"objective","props":[{"name":"label","value":"PS-5(b)"}],"parts":[{"id":"ps-5.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-5(b)[1]"}],"prose":"defines transfer or reassignment actions to be initiated following transfer or reassignment;"},{"id":"ps-5.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-5(b)[2]"}],"prose":"defines the time period within which transfer or reassignment actions must occur following transfer or reassignment;"},{"id":"ps-5.b_obj.3","name":"objective","props":[{"name":"label","value":"PS-5(b)[3]"}],"prose":"initiates organization-defined transfer or reassignment actions within the organization-defined time period following transfer or reassignment;"}]},{"id":"ps-5.c_obj","name":"objective","props":[{"name":"label","value":"PS-5(c)"}],"prose":"modifies access authorization as needed to correspond with any changes in operational need due to reassignment or transfer;"},{"id":"ps-5.d_obj","name":"objective","props":[{"name":"label","value":"PS-5(d)"}],"parts":[{"id":"ps-5.d_obj.1","name":"objective","props":[{"name":"label","value":"PS-5(d)[1]"}],"prose":"defines personnel or roles to be notified when individuals are reassigned or transferred to other positions within the organization;"},{"id":"ps-5.d_obj.2","name":"objective","props":[{"name":"label","value":"PS-5(d)[2]"}],"prose":"defines the time period within which to notify organization-defined personnel or roles when individuals are reassigned or transferred to other positions within the organization; and"},{"id":"ps-5.d_obj.3","name":"objective","props":[{"name":"label","value":"PS-5(d)[3]"}],"prose":"notifies organization-defined personnel or roles within the organization-defined time period when individuals are reassigned or transferred to other positions within the organization."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel transfer\n\nsecurity plan\n\nrecords of personnel transfer actions\n\nlist of information system and facility access authorizations\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities organizational personnel with account management responsibilities\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for personnel transfer\n\nautomated mechanisms supporting and\/or implementing personnel transfer notifications\n\nautomated mechanisms for disabling information system access\/revoking authenticators"}]}]},{"id":"ps-6","class":"SP800-53","title":"Access Agreements","params":[{"id":"ps-6_prm_1","label":"organization-defined frequency"},{"id":"ps-6_prm_2","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"PS-6"},{"name":"sort-id","value":"ps-06"}],"parts":[{"id":"ps-6_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-6_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops and documents access agreements for organizational information systems;"},{"id":"ps-6_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the access agreements {{ insert: param, ps-6_prm_1 }}; and"},{"id":"ps-6_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensures that individuals requiring access to organizational information and information systems:","parts":[{"id":"ps-6_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Sign appropriate access agreements prior to being granted access; and"},{"id":"ps-6_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Re-sign access agreements to maintain access to organizational information systems when access agreements have been updated or {{ insert: param, ps-6_prm_2 }}."}]}]},{"id":"ps-6_gdn","name":"guidance","prose":"Access agreements include, for example, nondisclosure agreements, acceptable use agreements, rules of behavior, and conflict-of-interest agreements. Signed access agreements include an acknowledgement that individuals have read, understand, and agree to abide by the constraints associated with organizational information systems to which access is authorized. Organizations can use electronic signatures to acknowledge access agreements unless specifically prohibited by organizational policy.","links":[{"href":"#pl-4","rel":"related"},{"href":"#ps-2","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ps-4","rel":"related"},{"href":"#ps-8","rel":"related"}]},{"id":"ps-6_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-6.a_obj","name":"objective","props":[{"name":"label","value":"PS-6(a)"}],"prose":"develops and documents access agreements for organizational information systems;"},{"id":"ps-6.b_obj","name":"objective","props":[{"name":"label","value":"PS-6(b)"}],"parts":[{"id":"ps-6.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-6(b)[1]"}],"prose":"defines the frequency to review and update the access agreements;"},{"id":"ps-6.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-6(b)[2]"}],"prose":"reviews and updates the access agreements with the organization-defined frequency;"}]},{"id":"ps-6.c_obj","name":"objective","props":[{"name":"label","value":"PS-6(c)"}],"parts":[{"id":"ps-6.c.1_obj","name":"objective","props":[{"name":"label","value":"PS-6(c)(1)"}],"prose":"ensures that individuals requiring access to organizational information and information systems sign appropriate access agreements prior to being granted access;"},{"id":"ps-6.c.2_obj","name":"objective","props":[{"name":"label","value":"PS-6(c)(2)"}],"parts":[{"id":"ps-6.c.2_obj.1","name":"objective","props":[{"name":"label","value":"PS-6(c)(2)[1]"}],"prose":"defines the frequency to re-sign access agreements to maintain access to organizational information systems when access agreements have been updated;"},{"id":"ps-6.c.2_obj.2","name":"objective","props":[{"name":"label","value":"PS-6(c)(2)[2]"}],"prose":"ensures that individuals requiring access to organizational information and information systems re-sign access agreements to maintain access to organizational information systems when access agreements have been updated or with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing access agreements for organizational information and information systems\n\nsecurity plan\n\naccess agreements\n\nrecords of access agreement reviews and updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel who have signed\/resigned access agreements\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for access agreements\n\nautomated mechanisms supporting access agreements"}]}]},{"id":"ps-7","class":"SP800-53","title":"Third-party Personnel Security","params":[{"id":"ps-7_prm_1","label":"organization-defined personnel or roles"},{"id":"ps-7_prm_2","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"PS-7"},{"name":"sort-id","value":"ps-07"}],"links":[{"href":"#0c775bc3-bfc3-42c7-a382-88949f503171","rel":"reference"}],"parts":[{"id":"ps-7_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes personnel security requirements including security roles and responsibilities for third-party providers;"},{"id":"ps-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Requires third-party providers to comply with personnel security policies and procedures established by the organization;"},{"id":"ps-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Documents personnel security requirements;"},{"id":"ps-7_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Requires third-party providers to notify {{ insert: param, ps-7_prm_1 }} of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges within {{ insert: param, ps-7_prm_2 }}; and"},{"id":"ps-7_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Monitors provider compliance."}]},{"id":"ps-7_gdn","name":"guidance","prose":"Third-party providers include, for example, service bureaus, contractors, and other organizations providing information system development, information technology services, outsourced applications, and network and security management. Organizations explicitly include personnel security requirements in acquisition-related documents. Third-party providers may have personnel working at organizational facilities with credentials, badges, or information system privileges issued by organizations. Notifications of third-party personnel changes ensure appropriate termination of privileges and credentials. Organizations define the transfers and terminations deemed reportable by security-related characteristics that include, for example, functions, roles, and nature of credentials\/privileges associated with individuals transferred or terminated.","links":[{"href":"#ps-2","rel":"related"},{"href":"#ps-3","rel":"related"},{"href":"#ps-4","rel":"related"},{"href":"#ps-5","rel":"related"},{"href":"#ps-6","rel":"related"},{"href":"#sa-9","rel":"related"},{"href":"#sa-21","rel":"related"}]},{"id":"ps-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-7.a_obj","name":"objective","props":[{"name":"label","value":"PS-7(a)"}],"prose":"establishes personnel security requirements, including security roles and responsibilities, for third-party providers;"},{"id":"ps-7.b_obj","name":"objective","props":[{"name":"label","value":"PS-7(b)"}],"prose":"requires third-party providers to comply with personnel security policies and procedures established by the organization;"},{"id":"ps-7.c_obj","name":"objective","props":[{"name":"label","value":"PS-7(c)"}],"prose":"documents personnel security requirements;"},{"id":"ps-7.d_obj","name":"objective","props":[{"name":"label","value":"PS-7(d)"}],"parts":[{"id":"ps-7.d_obj.1","name":"objective","props":[{"name":"label","value":"PS-7(d)[1]"}],"prose":"defines personnel or roles to be notified of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges;"},{"id":"ps-7.d_obj.2","name":"objective","props":[{"name":"label","value":"PS-7(d)[2]"}],"prose":"defines the time period within which third-party providers are required to notify organization-defined personnel or roles of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges;"},{"id":"ps-7.d_obj.3","name":"objective","props":[{"name":"label","value":"PS-7(d)[3]"}],"prose":"requires third-party providers to notify organization-defined personnel or roles within the organization-defined time period of any personnel transfers or terminations of third-party personnel who possess organizational credentials and\/or badges, or who have information system privileges; and"}]},{"id":"ps-7.e_obj","name":"objective","props":[{"name":"label","value":"PS-7(e)"}],"prose":"monitors provider compliance."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing third-party personnel security\n\nlist of personnel security requirements\n\nacquisition documents\n\nservice-level agreements\n\ncompliance monitoring process\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\nthird-party providers\n\nsystem\/network administrators\n\norganizational personnel with account management responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing and monitoring third-party personnel security\n\nautomated mechanisms supporting and\/or implementing monitoring of provider compliance"}]}]},{"id":"ps-8","class":"SP800-53","title":"Personnel Sanctions","params":[{"id":"ps-8_prm_1","label":"organization-defined personnel or roles"},{"id":"ps-8_prm_2","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P3"},{"name":"label","value":"PS-8"},{"name":"sort-id","value":"ps-08"}],"parts":[{"id":"ps-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"ps-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Employs a formal sanctions process for individuals failing to comply with established information security policies and procedures; and"},{"id":"ps-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Notifies {{ insert: param, ps-8_prm_1 }} within {{ insert: param, ps-8_prm_2 }} when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction."}]},{"id":"ps-8_gdn","name":"guidance","prose":"Organizational sanctions processes reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Sanctions processes are described in access agreements and can be included as part of general personnel policies and procedures for organizations. Organizations consult with the Office of the General Counsel regarding matters of employee sanctions.","links":[{"href":"#pl-4","rel":"related"},{"href":"#ps-6","rel":"related"}]},{"id":"ps-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ps-8.a_obj","name":"objective","props":[{"name":"label","value":"PS-8(a)"}],"prose":"employs a formal sanctions process for individuals failing to comply with established information security policies and procedures;"},{"id":"ps-8.b_obj","name":"objective","props":[{"name":"label","value":"PS-8(b)"}],"parts":[{"id":"ps-8.b_obj.1","name":"objective","props":[{"name":"label","value":"PS-8(b)[1]"}],"prose":"defines personnel or roles to be notified when a formal employee sanctions process is initiated;"},{"id":"ps-8.b_obj.2","name":"objective","props":[{"name":"label","value":"PS-8(b)[2]"}],"prose":"defines the time period within which organization-defined personnel or roles must be notified when a formal employee sanctions process is initiated; and"},{"id":"ps-8.b_obj.3","name":"objective","props":[{"name":"label","value":"PS-8(b)[3]"}],"prose":"notifies organization-defined personnel or roles within the organization-defined time period when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Personnel security policy\n\nprocedures addressing personnel sanctions\n\nrules of behavior\n\nrecords of formal sanctions\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with personnel security responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for managing personnel sanctions\n\nautomated mechanisms supporting and\/or implementing notifications"}]}]}]},{"id":"ra","class":"family","title":"Risk Assessment","controls":[{"id":"ra-1","class":"SP800-53","title":"Risk Assessment Policy and Procedures","params":[{"id":"ra-1_prm_1","label":"organization-defined personnel or roles"},{"id":"ra-1_prm_2","label":"organization-defined frequency"},{"id":"ra-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-1"},{"name":"sort-id","value":"ra-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"ra-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, ra-1_prm_1 }}:","parts":[{"id":"ra-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"ra-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls; and"}]},{"id":"ra-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"ra-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Risk assessment policy {{ insert: param, ra-1_prm_2 }}; and"},{"id":"ra-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Risk assessment procedures {{ insert: param, ra-1_prm_3 }}."}]}]},{"id":"ra-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the RA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"ra-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-1.a_obj","name":"objective","props":[{"name":"label","value":"RA-1(a)"}],"parts":[{"id":"ra-1.a.1_obj","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)"}],"parts":[{"id":"ra-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1]"}],"prose":"develops and documents a risk assessment policy that addresses:","parts":[{"id":"ra-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"ra-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"ra-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"ra-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"ra-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"ra-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"ra-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"ra-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the risk assessment policy is to be disseminated;"},{"id":"ra-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"RA-1(a)(1)[3]"}],"prose":"disseminates the risk assessment policy to organization-defined personnel or roles;"}]},{"id":"ra-1.a.2_obj","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)"}],"parts":[{"id":"ra-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls;"},{"id":"ra-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"ra-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"RA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"ra-1.b_obj","name":"objective","props":[{"name":"label","value":"RA-1(b)"}],"parts":[{"id":"ra-1.b.1_obj","name":"objective","props":[{"name":"label","value":"RA-1(b)(1)"}],"parts":[{"id":"ra-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current risk assessment policy;"},{"id":"ra-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(b)(1)[2]"}],"prose":"reviews and updates the current risk assessment policy with the organization-defined frequency;"}]},{"id":"ra-1.b.2_obj","name":"objective","props":[{"name":"label","value":"RA-1(b)(2)"}],"parts":[{"id":"ra-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current risk assessment procedures; and"},{"id":"ra-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-1(b)(2)[2]"}],"prose":"reviews and updates the current risk assessment procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"risk assessment policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with risk assessment responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"ra-2","class":"SP800-53","title":"Security Categorization","props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-2"},{"name":"sort-id","value":"ra-02"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#f152844f-b1ef-4836-8729-6277078ebee1","rel":"reference"}],"parts":[{"id":"ra-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Categorizes information and the information system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"},{"id":"ra-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents the security categorization results (including supporting rationale) in the security plan for the information system; and"},{"id":"ra-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Ensures that the authorizing official or authorizing official designated representative reviews and approves the security categorization decision."}]},{"id":"ra-2_gdn","name":"guidance","prose":"Clearly defined authorization boundaries are a prerequisite for effective security categorization decisions. Security categories describe the potential adverse impacts to organizational operations, organizational assets, and individuals if organizational information and information systems are comprised through a loss of confidentiality, integrity, or availability. Organizations conduct the security categorization process as an organization-wide activity with the involvement of chief information officers, senior information security officers, information system owners, mission\/business owners, and information owners\/stewards. Organizations also consider the potential adverse impacts to other organizations and, in accordance with the USA PATRIOT Act of 2001 and Homeland Security Presidential Directives, potential national-level adverse impacts. Security categorization processes carried out by organizations facilitate the development of inventories of information assets, and along with CM-8, mappings to specific information system components where information is processed, stored, or transmitted.","links":[{"href":"#cm-8","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"ra-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-2.a_obj","name":"objective","props":[{"name":"label","value":"RA-2(a)"}],"prose":"categorizes information and the information system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"},{"id":"ra-2.b_obj","name":"objective","props":[{"name":"label","value":"RA-2(b)"}],"prose":"documents the security categorization results (including supporting rationale) in the security plan for the information system; and"},{"id":"ra-2.c_obj","name":"objective","props":[{"name":"label","value":"RA-2(c)"}],"prose":"ensures the authorizing official or authorizing official designated representative reviews and approves the security categorization decision."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nsecurity planning policy and procedures\n\nprocedures addressing security categorization of organizational information and information systems\n\nsecurity plan\n\nsecurity categorization documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security categorization and risk assessment responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for security categorization"}]}]},{"id":"ra-3","class":"SP800-53","title":"Risk Assessment","params":[{"id":"ra-3_prm_1","select":{"choice":["security plan","risk assessment report"," {{ insert: param, ra-3_prm_2 }} "]}},{"id":"ra-3_prm_2","depends-on":"ra-3_prm_1","label":"organization-defined document"},{"id":"ra-3_prm_3","label":"organization-defined frequency"},{"id":"ra-3_prm_4","label":"organization-defined personnel or roles"},{"id":"ra-3_prm_5","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-3"},{"name":"sort-id","value":"ra-03"}],"links":[{"href":"#ff3bfb02-79b2-411f-8735-98dfe5af2ab0","rel":"reference"},{"href":"#a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","rel":"reference"},{"href":"#d480aa6a-7a88-424e-a10c-ad1c7870354b","rel":"reference"},{"href":"#85280698-0417-489d-b214-12bb935fb939","rel":"reference"}],"parts":[{"id":"ra-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Conducts an assessment of risk, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, disruption, modification, or destruction of the information system and the information it processes, stores, or transmits;"},{"id":"ra-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Documents risk assessment results in {{ insert: param, ra-3_prm_1 }};"},{"id":"ra-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Reviews risk assessment results {{ insert: param, ra-3_prm_3 }};"},{"id":"ra-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Disseminates risk assessment results to {{ insert: param, ra-3_prm_4 }}; and"},{"id":"ra-3_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Updates the risk assessment {{ insert: param, ra-3_prm_5 }} or whenever there are significant changes to the information system or environment of operation (including the identification of new threats and vulnerabilities), or other conditions that may impact the security state of the system."}]},{"id":"ra-3_gdn","name":"guidance","prose":"Clearly defined authorization boundaries are a prerequisite for effective risk assessments. Risk assessments take into account threats, vulnerabilities, likelihood, and impact to organizational operations and assets, individuals, other organizations, and the Nation based on the operation and use of information systems. Risk assessments also take into account risk from external parties (e.g., service providers, contractors operating information systems on behalf of the organization, individuals accessing organizational information systems, outsourcing entities). In accordance with OMB policy and related E-authentication initiatives, authentication of public users accessing federal information systems may also be required to protect nonpublic or privacy-related information. As such, organizational assessments of risk also address public access to federal information systems. Risk assessments (either formal or informal) can be conducted at all three tiers in the risk management hierarchy (i.e., organization level, mission\/business process level, or information system level) and at any phase in the system development life cycle. Risk assessments can also be conducted at various steps in the Risk Management Framework, including categorization, security control selection, security control implementation, security control assessment, information system authorization, and security control monitoring. RA-3 is noteworthy in that the control must be partially implemented prior to the implementation of other controls in order to complete the first two steps in the Risk Management Framework. Risk assessments can play an important role in security control selection processes, particularly during the application of tailoring guidance, which includes security control supplementation.","links":[{"href":"#ra-2","rel":"related"},{"href":"#pm-9","rel":"related"}]},{"id":"ra-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-3.a_obj","name":"objective","props":[{"name":"label","value":"RA-3(a)"}],"prose":"conducts an assessment of risk, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, disruption, modification, or destruction of:","parts":[{"id":"ra-3.a_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(a)[1]"}],"prose":"the information system;"},{"id":"ra-3.a_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(a)[2]"}],"prose":"the information the system processes, stores, or transmits;"}]},{"id":"ra-3.b_obj","name":"objective","props":[{"name":"label","value":"RA-3(b)"}],"parts":[{"id":"ra-3.b_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(b)[1]"}],"prose":"defines a document in which risk assessment results are to be documented (if not documented in the security plan or risk assessment report);"},{"id":"ra-3.b_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(b)[2]"}],"prose":"documents risk assessment results in one of the following:","parts":[{"id":"ra-3.b_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-3(b)[2][a]"}],"prose":"the security plan;"},{"id":"ra-3.b_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-3(b)[2][b]"}],"prose":"the risk assessment report; or"},{"id":"ra-3.b_obj.2.c","name":"objective","props":[{"name":"label","value":"RA-3(b)[2][c]"}],"prose":"the organization-defined document;"}]}]},{"id":"ra-3.c_obj","name":"objective","props":[{"name":"label","value":"RA-3(c)"}],"parts":[{"id":"ra-3.c_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(c)[1]"}],"prose":"defines the frequency to review risk assessment results;"},{"id":"ra-3.c_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(c)[2]"}],"prose":"reviews risk assessment results with the organization-defined frequency;"}]},{"id":"ra-3.d_obj","name":"objective","props":[{"name":"label","value":"RA-3(d)"}],"parts":[{"id":"ra-3.d_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(d)[1]"}],"prose":"defines personnel or roles to whom risk assessment results are to be disseminated;"},{"id":"ra-3.d_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(d)[2]"}],"prose":"disseminates risk assessment results to organization-defined personnel or roles;"}]},{"id":"ra-3.e_obj","name":"objective","props":[{"name":"label","value":"RA-3(e)"}],"parts":[{"id":"ra-3.e_obj.1","name":"objective","props":[{"name":"label","value":"RA-3(e)[1]"}],"prose":"defines the frequency to update the risk assessment;"},{"id":"ra-3.e_obj.2","name":"objective","props":[{"name":"label","value":"RA-3(e)[2]"}],"prose":"updates the risk assessment:","parts":[{"id":"ra-3.e_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-3(e)[2][a]"}],"prose":"with the organization-defined frequency;"},{"id":"ra-3.e_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-3(e)[2][b]"}],"prose":"whenever there are significant changes to the information system or environment of operation (including the identification of new threats and vulnerabilities); and"},{"id":"ra-3.e_obj.2.c","name":"objective","props":[{"name":"label","value":"RA-3(e)[2][c]"}],"prose":"whenever there are other conditions that may impact the security state of the system."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nsecurity planning policy and procedures\n\nprocedures addressing organizational assessments of risk\n\nsecurity plan\n\nrisk assessment\n\nrisk assessment results\n\nrisk assessment reviews\n\nrisk assessment updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with risk assessment responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for risk assessment\n\nautomated mechanisms supporting and\/or for conducting, documenting, reviewing, disseminating, and updating the risk assessment"}]}]},{"id":"ra-5","class":"SP800-53","title":"Vulnerability Scanning","params":[{"id":"ra-5_prm_1","label":"organization-defined frequency and\/or randomly in accordance with organization-defined process"},{"id":"ra-5_prm_2","label":"organization-defined response times"},{"id":"ra-5_prm_3","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"RA-5"},{"name":"sort-id","value":"ra-05"}],"links":[{"href":"#bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","rel":"reference"},{"href":"#84a37532-6db6-477b-9ea8-f9085ebca0fc","rel":"reference"},{"href":"#c4691b88-57d1-463b-9053-2d0087913f31","rel":"reference"},{"href":"#15522e92-9192-463d-9646-6a01982db8ca","rel":"reference"},{"href":"#275cc052-0f7f-423c-bdb6-ed503dc36228","rel":"reference"}],"parts":[{"id":"ra-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"ra-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Scans for vulnerabilities in the information system and hosted applications {{ insert: param, ra-5_prm_1 }} and when new vulnerabilities potentially affecting the system\/applications are identified and reported;"},{"id":"ra-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for:","parts":[{"id":"ra-5_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Enumerating platforms, software flaws, and improper configurations;"},{"id":"ra-5_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Formatting checklists and test procedures; and"},{"id":"ra-5_smt.b.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Measuring vulnerability impact;"}]},{"id":"ra-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Analyzes vulnerability scan reports and results from security control assessments;"},{"id":"ra-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Remediates legitimate vulnerabilities {{ insert: param, ra-5_prm_2 }} in accordance with an organizational assessment of risk; and"},{"id":"ra-5_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Shares information obtained from the vulnerability scanning process and security control assessments with {{ insert: param, ra-5_prm_3 }} to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies)."}]},{"id":"ra-5_gdn","name":"guidance","prose":"Security categorization of information systems guides the frequency and comprehensiveness of vulnerability scans. Organizations determine the required vulnerability scanning for all information system components, ensuring that potential sources of vulnerabilities such as networked printers, scanners, and copiers are not overlooked. Vulnerability analyses for custom software applications may require additional approaches such as static analysis, dynamic analysis, binary analysis, or a hybrid of the three approaches. Organizations can employ these analysis approaches in a variety of tools (e.g., web-based application scanners, static analysis tools, binary analyzers) and in source code reviews. Vulnerability scanning includes, for example: (i) scanning for patch levels; (ii) scanning for functions, ports, protocols, and services that should not be accessible to users or devices; and (iii) scanning for improperly configured or incorrectly operating information flow control mechanisms. Organizations consider using tools that express vulnerabilities in the Common Vulnerabilities and Exposures (CVE) naming convention and that use the Open Vulnerability Assessment Language (OVAL) to determine\/test for the presence of vulnerabilities. Suggested sources for vulnerability information include the Common Weakness Enumeration (CWE) listing and the National Vulnerability Database (NVD). In addition, security control assessments such as red team exercises provide other sources of potential vulnerabilities for which to scan. Organizations also consider using tools that express vulnerability impact by the Common Vulnerability Scoring System (CVSS).","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#ra-2","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"ra-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-5.a_obj","name":"objective","props":[{"name":"label","value":"RA-5(a)"}],"parts":[{"id":"ra-5.a_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(a)[1]"}],"parts":[{"id":"ra-5.a_obj.1.a","name":"objective","props":[{"name":"label","value":"RA-5(a)[1][a]"}],"prose":"defines the frequency for conducting vulnerability scans on the information system and hosted applications; and\/or"},{"id":"ra-5.a_obj.1.b","name":"objective","props":[{"name":"label","value":"RA-5(a)[1][b]"}],"prose":"defines the process for conducting random vulnerability scans on the information system and hosted applications;"}]},{"id":"ra-5.a_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(a)[2]"}],"prose":"in accordance with the organization-defined frequency and\/or organization-defined process for conducting random scans, scans for vulnerabilities in:","parts":[{"id":"ra-5.a_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-5(a)[2][a]"}],"prose":"the information system;"},{"id":"ra-5.a_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-5(a)[2][b]"}],"prose":"hosted applications;"}]},{"id":"ra-5.a_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(a)[3]"}],"prose":"when new vulnerabilities potentially affecting the system\/applications are identified and reported, scans for vulnerabilities in:","parts":[{"id":"ra-5.a_obj.3.a","name":"objective","props":[{"name":"label","value":"RA-5(a)[3][a]"}],"prose":"the information system;"},{"id":"ra-5.a_obj.3.b","name":"objective","props":[{"name":"label","value":"RA-5(a)[3][b]"}],"prose":"hosted applications;"}]}]},{"id":"ra-5.b_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)"}],"prose":"employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for:","parts":[{"id":"ra-5.b.1_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)"}],"parts":[{"id":"ra-5.b.1_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)[1]"}],"prose":"enumerating platforms;"},{"id":"ra-5.b.1_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)[2]"}],"prose":"enumerating software flaws;"},{"id":"ra-5.b.1_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(b)(1)[3]"}],"prose":"enumerating improper configurations;"}]},{"id":"ra-5.b.2_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)(2)"}],"parts":[{"id":"ra-5.b.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(b)(2)[1]"}],"prose":"formatting checklists;"},{"id":"ra-5.b.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(b)(2)[2]"}],"prose":"formatting test procedures;"}]},{"id":"ra-5.b.3_obj","name":"objective","props":[{"name":"label","value":"RA-5(b)(3)"}],"prose":"measuring vulnerability impact;"}]},{"id":"ra-5.c_obj","name":"objective","props":[{"name":"label","value":"RA-5(c)"}],"parts":[{"id":"ra-5.c_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(c)[1]"}],"prose":"analyzes vulnerability scan reports;"},{"id":"ra-5.c_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(c)[2]"}],"prose":"analyzes results from security control assessments;"}]},{"id":"ra-5.d_obj","name":"objective","props":[{"name":"label","value":"RA-5(d)"}],"parts":[{"id":"ra-5.d_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(d)[1]"}],"prose":"defines response times to remediate legitimate vulnerabilities in accordance with an organizational assessment of risk;"},{"id":"ra-5.d_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(d)[2]"}],"prose":"remediates legitimate vulnerabilities within the organization-defined response times in accordance with an organizational assessment of risk;"}]},{"id":"ra-5.e_obj","name":"objective","props":[{"name":"label","value":"RA-5(e)"}],"parts":[{"id":"ra-5.e_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(e)[1]"}],"prose":"defines personnel or roles with whom information obtained from the vulnerability scanning process and security control assessments is to be shared;"},{"id":"ra-5.e_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(e)[2]"}],"prose":"shares information obtained from the vulnerability scanning process with organization-defined personnel or roles to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies); and"},{"id":"ra-5.e_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(e)[3]"}],"prose":"shares information obtained from security control assessments with organization-defined personnel or roles to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies)."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nprocedures addressing vulnerability scanning\n\nrisk assessment\n\nsecurity plan\n\nsecurity assessment report\n\nvulnerability scanning tools and associated configuration documentation\n\nvulnerability scanning results\n\npatch and vulnerability management records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with risk assessment, security control assessment and vulnerability scanning responsibilities\n\norganizational personnel with vulnerability scan analysis responsibilities\n\norganizational personnel with vulnerability remediation responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for vulnerability scanning, analysis, remediation, and information sharing\n\nautomated mechanisms supporting and\/or implementing vulnerability scanning, analysis, remediation, and information sharing"}]}],"controls":[{"id":"ra-5.1","class":"SP800-53-enhancement","title":"Update Tool Capability","props":[{"name":"label","value":"RA-5(1)"},{"name":"sort-id","value":"ra-05.01"}],"parts":[{"id":"ra-5.1_smt","name":"statement","prose":"The organization employs vulnerability scanning tools that include the capability to readily update the information system vulnerabilities to be scanned."},{"id":"ra-5.1_gdn","name":"guidance","prose":"The vulnerabilities to be scanned need to be readily updated as new vulnerabilities are discovered, announced, and scanning methods developed. This updating process helps to ensure that potential vulnerabilities in the information system are identified and addressed as quickly as possible.","links":[{"href":"#si-3","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"ra-5.1_obj","name":"objective","prose":"Determine if the organization employs vulnerability scanning tools that include the capability to readily update the information system vulnerabilities to be scanned."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Procedures addressing vulnerability scanning\n\nsecurity plan\n\nsecurity assessment report\n\nvulnerability scanning tools and associated configuration documentation\n\nvulnerability scanning results\n\npatch and vulnerability management records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with vulnerability scanning responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for vulnerability scanning\n\nautomated mechanisms\/tools supporting and\/or implementing vulnerability scanning"}]}]},{"id":"ra-5.2","class":"SP800-53-enhancement","title":"Update by Frequency \/ Prior to New Scan \/ When Identified","params":[{"id":"ra-5.2_prm_1","select":{"how-many":"one-or-more","choice":[" {{ insert: param, ra-5.2_prm_2 }} ","prior to a new scan","when new vulnerabilities are identified and reported"]}},{"id":"ra-5.2_prm_2","depends-on":"ra-5.2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"RA-5(2)"},{"name":"sort-id","value":"ra-05.02"}],"parts":[{"id":"ra-5.2_smt","name":"statement","prose":"The organization updates the information system vulnerabilities scanned {{ insert: param, ra-5.2_prm_1 }}."},{"id":"ra-5.2_gdn","name":"guidance","links":[{"href":"#si-3","rel":"related"},{"href":"#si-5","rel":"related"}]},{"id":"ra-5.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"ra-5.2_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(2)[1]"}],"prose":"defines the frequency to update the information system vulnerabilities scanned;"},{"id":"ra-5.2_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(2)[2]"}],"prose":"updates the information system vulnerabilities scanned one or more of the following:","parts":[{"id":"ra-5.2_obj.2.a","name":"objective","props":[{"name":"label","value":"RA-5(2)[2][a]"}],"prose":"with the organization-defined frequency;"},{"id":"ra-5.2_obj.2.b","name":"objective","props":[{"name":"label","value":"RA-5(2)[2][b]"}],"prose":"prior to a new scan; and\/or"},{"id":"ra-5.2_obj.2.c","name":"objective","props":[{"name":"label","value":"RA-5(2)[2][c]"}],"prose":"when new vulnerabilities are identified and reported."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Procedures addressing vulnerability scanning\n\nsecurity plan\n\nsecurity assessment report\n\nvulnerability scanning tools and associated configuration documentation\n\nvulnerability scanning results\n\npatch and vulnerability management records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with vulnerability scanning responsibilities\n\norganizational personnel with vulnerability scan analysis responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for vulnerability scanning\n\nautomated mechanisms\/tools supporting and\/or implementing vulnerability scanning"}]}]},{"id":"ra-5.5","class":"SP800-53-enhancement","title":"Privileged Access","params":[{"id":"ra-5.5_prm_1","label":"organization-identified information system components"},{"id":"ra-5.5_prm_2","label":"organization-defined vulnerability scanning activities"}],"props":[{"name":"label","value":"RA-5(5)"},{"name":"sort-id","value":"ra-05.05"}],"parts":[{"id":"ra-5.5_smt","name":"statement","prose":"The information system implements privileged access authorization to {{ insert: param, ra-5.5_prm_1 }} for selected {{ insert: param, ra-5.5_prm_2 }}."},{"id":"ra-5.5_gdn","name":"guidance","prose":"In certain situations, the nature of the vulnerability scanning may be more intrusive or the information system component that is the subject of the scanning may contain highly sensitive information. Privileged access authorization to selected system components facilitates more thorough vulnerability scanning and also protects the sensitive nature of such scanning."},{"id":"ra-5.5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"ra-5.5_obj.1","name":"objective","props":[{"name":"label","value":"RA-5(5)[1]"}],"prose":"the organization defines information system components to which privileged access is authorized for selected vulnerability scanning activities;"},{"id":"ra-5.5_obj.2","name":"objective","props":[{"name":"label","value":"RA-5(5)[2]"}],"prose":"the organization defines vulnerability scanning activities selected for privileged access authorization to organization-defined information system components; and"},{"id":"ra-5.5_obj.3","name":"objective","props":[{"name":"label","value":"RA-5(5)[3]"}],"prose":"the information system implements privileged access authorization to organization-defined information system components for selected organization-defined vulnerability scanning activities."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Risk assessment policy\n\nprocedures addressing vulnerability scanning\n\nsecurity plan\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of information system components for vulnerability scanning\n\npersonnel access authorization list\n\nauthorization credentials\n\naccess authorization records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with vulnerability scanning responsibilities\n\nsystem\/network administrators\n\norganizational personnel responsible for access control to the information system\n\norganizational personnel responsible for configuration management of the information system\n\nsystem developers\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for vulnerability scanning\n\norganizational processes for access control\n\nautomated mechanisms supporting and\/or implementing access control\n\nautomated mechanisms\/tools supporting and\/or implementing vulnerability scanning"}]}]}]}]},{"id":"sa","class":"family","title":"System and Services Acquisition","controls":[{"id":"sa-1","class":"SP800-53","title":"System and Services Acquisition Policy and Procedures","params":[{"id":"sa-1_prm_1","label":"organization-defined personnel or roles"},{"id":"sa-1_prm_2","label":"organization-defined frequency"},{"id":"sa-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-1"},{"name":"sort-id","value":"sa-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"sa-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, sa-1_prm_1 }}:","parts":[{"id":"sa-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system and services acquisition policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"sa-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls; and"}]},{"id":"sa-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"sa-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System and services acquisition policy {{ insert: param, sa-1_prm_2 }}; and"},{"id":"sa-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System and services acquisition procedures {{ insert: param, sa-1_prm_3 }}."}]}]},{"id":"sa-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the SA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"sa-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-1.a_obj","name":"objective","props":[{"name":"label","value":"SA-1(a)"}],"parts":[{"id":"sa-1.a.1_obj","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)"}],"parts":[{"id":"sa-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1]"}],"prose":"develops and documents a system and services acquisition policy that addresses:","parts":[{"id":"sa-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"sa-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"sa-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"sa-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"sa-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"sa-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"sa-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"sa-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system and services acquisition policy is to be disseminated;"},{"id":"sa-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SA-1(a)(1)[3]"}],"prose":"disseminates the system and services acquisition policy to organization-defined personnel or roles;"}]},{"id":"sa-1.a.2_obj","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)"}],"parts":[{"id":"sa-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls;"},{"id":"sa-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"sa-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SA-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"sa-1.b_obj","name":"objective","props":[{"name":"label","value":"SA-1(b)"}],"parts":[{"id":"sa-1.b.1_obj","name":"objective","props":[{"name":"label","value":"SA-1(b)(1)"}],"parts":[{"id":"sa-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system and services acquisition policy;"},{"id":"sa-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(b)(1)[2]"}],"prose":"reviews and updates the current system and services acquisition policy with the organization-defined frequency;"}]},{"id":"sa-1.b.2_obj","name":"objective","props":[{"name":"label","value":"SA-1(b)(2)"}],"parts":[{"id":"sa-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system and services acquisition procedures; and"},{"id":"sa-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-1(b)(2)[2]"}],"prose":"reviews and updates the current system and services acquisition procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"sa-2","class":"SP800-53","title":"Allocation of Resources","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-2"},{"name":"sort-id","value":"sa-02"}],"links":[{"href":"#29fcfe59-33cd-494a-8756-5907ae3a8f92","rel":"reference"}],"parts":[{"id":"sa-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Determines information security requirements for the information system or information system service in mission\/business process planning;"},{"id":"sa-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Determines, documents, and allocates the resources required to protect the information system or information system service as part of its capital planning and investment control process; and"},{"id":"sa-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Establishes a discrete line item for information security in organizational programming and budgeting documentation."}]},{"id":"sa-2_gdn","name":"guidance","prose":"Resource allocation for information security includes funding for the initial information system or information system service acquisition and funding for the sustainment of the system\/service.","links":[{"href":"#pm-3","rel":"related"},{"href":"#pm-11","rel":"related"}]},{"id":"sa-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-2.a_obj","name":"objective","props":[{"name":"label","value":"SA-2(a)"}],"prose":"determines information security requirements for the information system or information system service in mission\/business process planning;"},{"id":"sa-2.b_obj","name":"objective","props":[{"name":"label","value":"SA-2(b)"}],"prose":"to protect the information system or information system service as part of its capital planning and investment control process:","parts":[{"id":"sa-2.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-2(b)[1]"}],"prose":"determines the resources required;"},{"id":"sa-2.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-2(b)[2]"}],"prose":"documents the resources required;"},{"id":"sa-2.b_obj.3","name":"objective","props":[{"name":"label","value":"SA-2(b)[3]"}],"prose":"allocates the resources required; and"}]},{"id":"sa-2.c_obj","name":"objective","props":[{"name":"label","value":"SA-2(c)"}],"prose":"establishes a discrete line item for information security in organizational programming and budgeting documentation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the allocation of resources to information security requirements\n\nprocedures addressing capital planning and investment control\n\norganizational programming and budgeting documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with capital planning, investment control, organizational programming and budgeting responsibilities\n\norganizational personnel responsible for determining information security requirements for information systems\/services\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for determining information security requirements\n\norganizational processes for capital planning, programming, and budgeting\n\nautomated mechanisms supporting and\/or implementing organizational capital planning, programming, and budgeting"}]}]},{"id":"sa-3","class":"SP800-53","title":"System Development Life Cycle","params":[{"id":"sa-3_prm_1","label":"organization-defined system development life cycle"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-3"},{"name":"sort-id","value":"sa-03"}],"links":[{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#abd950ae-092f-4b7a-b374-1c7c67fe9350","rel":"reference"}],"parts":[{"id":"sa-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Manages the information system using {{ insert: param, sa-3_prm_1 }} that incorporates information security considerations;"},{"id":"sa-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Defines and documents information security roles and responsibilities throughout the system development life cycle;"},{"id":"sa-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Identifies individuals having information security roles and responsibilities; and"},{"id":"sa-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Integrates the organizational information security risk management process into system development life cycle activities."}]},{"id":"sa-3_gdn","name":"guidance","prose":"A well-defined system development life cycle provides the foundation for the successful development, implementation, and operation of organizational information systems. To apply the required security controls within the system development life cycle requires a basic understanding of information security, threats, vulnerabilities, adverse impacts, and risk to critical missions\/business functions. The security engineering principles in SA-8 cannot be properly applied if individuals that design, code, and test information systems and system components (including information technology products) do not understand security. Therefore, organizations include qualified personnel, for example, chief information security officers, security architects, security engineers, and information system security officers in system development life cycle activities to ensure that security requirements are incorporated into organizational information systems. It is equally important that developers include individuals on the development team that possess the requisite security expertise and skills to ensure that needed security capabilities are effectively integrated into the information system. Security awareness and training programs can help ensure that individuals having key security roles and responsibilities have the appropriate experience, skills, and expertise to conduct assigned system development life cycle activities. The effective integration of security requirements into enterprise architecture also helps to ensure that important security considerations are addressed early in the system development life cycle and that those considerations are directly related to the organizational mission\/business processes. This process also facilitates the integration of the information security architecture into the enterprise architecture, consistent with organizational risk management and information security strategies.","links":[{"href":"#at-3","rel":"related"},{"href":"#pm-7","rel":"related"},{"href":"#sa-8","rel":"related"}]},{"id":"sa-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-3.a_obj","name":"objective","props":[{"name":"label","value":"SA-3(a)"}],"parts":[{"id":"sa-3.a_obj.1","name":"objective","props":[{"name":"label","value":"SA-3(a)[1]"}],"prose":"defines a system development life cycle that incorporates information security considerations to be used to manage the information system;"},{"id":"sa-3.a_obj.2","name":"objective","props":[{"name":"label","value":"SA-3(a)[2]"}],"prose":"manages the information system using the organization-defined system development life cycle;"}]},{"id":"sa-3.b_obj","name":"objective","props":[{"name":"label","value":"SA-3(b)"}],"prose":"defines and documents information security roles and responsibilities throughout the system development life cycle;"},{"id":"sa-3.c_obj","name":"objective","props":[{"name":"label","value":"SA-3(c)"}],"prose":"identifies individuals having information security roles and responsibilities; and"},{"id":"sa-3.d_obj","name":"objective","props":[{"name":"label","value":"SA-3(d)"}],"prose":"integrates the organizational information security risk management process into system development life cycle activities."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security into the system development life cycle process\n\ninformation system development life cycle documentation\n\ninformation security risk management strategy\/program documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with information security and system life cycle development responsibilities\n\norganizational personnel with information security risk management responsibilities\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for defining and documenting the SDLC\n\norganizational processes for identifying SDLC roles and responsibilities\n\norganizational process for integrating information security risk management into the SDLC\n\nautomated mechanisms supporting and\/or implementing the SDLC"}]}]},{"id":"sa-4","class":"SP800-53","title":"Acquisition Process","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-4"},{"name":"sort-id","value":"sa-04"}],"links":[{"href":"#ad733a42-a7ed-4774-b988-4930c28852f3","rel":"reference"},{"href":"#1737a687-52fb-4008-b900-cbfa836f7b65","rel":"reference"},{"href":"#d715b234-9b5b-4e07-b1ed-99836727664d","rel":"reference"},{"href":"#c80c10b3-1294-4984-a4cc-d1733ca432b9","rel":"reference"},{"href":"#0a5db899-f033-467f-8631-f5a8ba971475","rel":"reference"},{"href":"#0c775bc3-bfc3-42c7-a382-88949f503171","rel":"reference"},{"href":"#d818efd3-db31-4953-8afa-9e76afe83ce2","rel":"reference"},{"href":"#0a0c26b6-fd44-4274-8b36-93442d49d998","rel":"reference"},{"href":"#abd950ae-092f-4b7a-b374-1c7c67fe9350","rel":"reference"},{"href":"#84a37532-6db6-477b-9ea8-f9085ebca0fc","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"},{"href":"#56d671da-6b7b-4abf-8296-84b61980390a","rel":"reference"},{"href":"#c95a9986-3cd6-4a98-931b-ccfc56cb11e5","rel":"reference"},{"href":"#5ed1f4d5-1494-421b-97ed-39d3c88ab51f","rel":"reference"},{"href":"#bbd50dd1-54ce-4432-959d-63ea564b1bb4","rel":"reference"}],"parts":[{"id":"sa-4_smt","name":"statement","prose":"The organization includes the following requirements, descriptions, and criteria, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission\/business needs:","parts":[{"id":"sa-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Security functional requirements;"},{"id":"sa-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Security strength requirements;"},{"id":"sa-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Security assurance requirements;"},{"id":"sa-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Security-related documentation requirements;"},{"id":"sa-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Requirements for protecting security-related documentation;"},{"id":"sa-4_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Description of the information system development environment and environment in which the system is intended to operate; and"},{"id":"sa-4_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Acceptance criteria."}]},{"id":"sa-4_gdn","name":"guidance","prose":"Information system components are discrete, identifiable information technology assets (e.g., hardware, software, or firmware) that represent the building blocks of an information system. Information system components include commercial information technology products. Security functional requirements include security capabilities, security functions, and security mechanisms. Security strength requirements associated with such capabilities, functions, and mechanisms include degree of correctness, completeness, resistance to direct attack, and resistance to tampering or bypass. Security assurance requirements include: (i) development processes, procedures, practices, and methodologies; and (ii) evidence from development and assessment activities providing grounds for confidence that the required security functionality has been implemented and the required security strength has been achieved. Security documentation requirements address all phases of the system development life cycle. Security functionality, assurance, and documentation requirements are expressed in terms of security controls and control enhancements that have been selected through the tailoring process. The security control tailoring process includes, for example, the specification of parameter values through the use of assignment and selection statements and the specification of platform dependencies and implementation information. Security documentation provides user and administrator guidance regarding the implementation and operation of security controls. The level of detail required in security documentation is based on the security category or classification level of the information system and the degree to which organizations depend on the stated security capability, functions, or mechanisms to meet overall risk response expectations (as defined in the organizational risk management strategy). Security requirements can also include organizationally mandated configuration settings specifying allowed functions, ports, protocols, and services. Acceptance criteria for information systems, information system components, and information system services are defined in the same manner as such criteria for any organizational acquisition or procurement. The Federal Acquisition Regulation (FAR) Section 7.103 contains information security requirements from FISMA.","links":[{"href":"#cm-6","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#ps-7","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#sa-12","rel":"related"}]},{"id":"sa-4_obj","name":"objective","prose":"Determine if the organization includes the following requirements, descriptions, and criteria, explicitly or by reference, in the acquisition contracts for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission\/business needs:","parts":[{"id":"sa-4.a_obj","name":"objective","props":[{"name":"label","value":"SA-4(a)"}],"prose":"security functional requirements;"},{"id":"sa-4.b_obj","name":"objective","props":[{"name":"label","value":"SA-4(b)"}],"prose":"security strength requirements;"},{"id":"sa-4.c_obj","name":"objective","props":[{"name":"label","value":"SA-4(c)"}],"prose":"security assurance requirements;"},{"id":"sa-4.d_obj","name":"objective","props":[{"name":"label","value":"SA-4(d)"}],"prose":"security-related documentation requirements;"},{"id":"sa-4.e_obj","name":"objective","props":[{"name":"label","value":"SA-4(e)"}],"prose":"requirements for protecting security-related documentation;"},{"id":"sa-4.f_obj","name":"objective","props":[{"name":"label","value":"SA-4(f)"}],"prose":"description of:","parts":[{"id":"sa-4.f_obj.1","name":"objective","props":[{"name":"label","value":"SA-4(f)[1]"}],"prose":"the information system development environment;"},{"id":"sa-4.f_obj.2","name":"objective","props":[{"name":"label","value":"SA-4(f)[2]"}],"prose":"the environment in which the system is intended to operate; and"}]},{"id":"sa-4.g_obj","name":"objective","props":[{"name":"label","value":"SA-4(g)"}],"prose":"acceptance criteria."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\nacquisition contracts for the information system, system component, or information system service\n\ninformation system design documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security functional, strength, and assurance requirements\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for determining information system security functional, strength, and assurance requirements\n\norganizational processes for developing acquisition contracts\n\nautomated mechanisms supporting and\/or implementing acquisitions and inclusion of security requirements in contracts"}]}],"controls":[{"id":"sa-4.1","class":"SP800-53-enhancement","title":"Functional Properties of Security Controls","props":[{"name":"label","value":"SA-4(1)"},{"name":"sort-id","value":"sa-04.01"}],"parts":[{"id":"sa-4.1_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to provide a description of the functional properties of the security controls to be employed."},{"id":"sa-4.1_gdn","name":"guidance","prose":"Functional properties of security controls describe the functionality (i.e., security capability, functions, or mechanisms) visible at the interfaces of the controls and specifically exclude functionality and data structures internal to the operation of the controls.","links":[{"href":"#sa-5","rel":"related"}]},{"id":"sa-4.1_obj","name":"objective","prose":"Determine if the organization requires the developer of the information system, system component, or information system service to provide a description of the functional properties of the security controls to be employed."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\nsolicitation documents\n\nacquisition documentation\n\nacquisition contracts for the information system, system component, or information system services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security functional requirements\n\ninformation system developer or service provider\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for determining information system security functional, requirements\n\norganizational processes for developing acquisition contracts\n\nautomated mechanisms supporting and\/or implementing acquisitions and inclusion of security requirements in contracts"}]}]},{"id":"sa-4.2","class":"SP800-53-enhancement","title":"Design \/ Implementation Information for Security Controls","params":[{"id":"sa-4.2_prm_1","select":{"how-many":"one-or-more","choice":["security-relevant external system interfaces","high-level design","low-level design","source code or hardware schematics"," {{ insert: param, sa-4.2_prm_2 }} "]}},{"id":"sa-4.2_prm_2","depends-on":"sa-4.2_prm_1","label":"organization-defined design\/implementation information"},{"id":"sa-4.2_prm_3","label":"organization-defined level of detail"}],"props":[{"name":"label","value":"SA-4(2)"},{"name":"sort-id","value":"sa-04.02"}],"parts":[{"id":"sa-4.2_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to provide design and implementation information for the security controls to be employed that includes: {{ insert: param, sa-4.2_prm_1 }} at {{ insert: param, sa-4.2_prm_3 }}."},{"id":"sa-4.2_gdn","name":"guidance","prose":"Organizations may require different levels of detail in design and implementation documentation for security controls employed in organizational information systems, system components, or information system services based on mission\/business requirements, requirements for trustworthiness\/resiliency, and requirements for analysis and testing. Information systems can be partitioned into multiple subsystems. Each subsystem within the system can contain one or more modules. The high-level design for the system is expressed in terms of multiple subsystems and the interfaces between subsystems providing security-relevant functionality. The low-level design for the system is expressed in terms of modules with particular emphasis on software and firmware (but not excluding hardware) and the interfaces between modules providing security-relevant functionality. Source code and hardware schematics are typically referred to as the implementation representation of the information system.","links":[{"href":"#sa-5","rel":"related"}]},{"id":"sa-4.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-4.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-4(2)[1]"}],"prose":"defines level of detail that the developer is required to provide in design and implementation information for the security controls to be employed in the information system, system component, or information system service;"},{"id":"sa-4.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-4(2)[2]"}],"prose":"defines design\/implementation information that the developer is to provide for the security controls to be employed (if selected);"},{"id":"sa-4.2_obj.3","name":"objective","props":[{"name":"label","value":"SA-4(2)[3]"}],"prose":"requires the developer of the information system, system component, or information system service to provide design and implementation information for the security controls to be employed that includes, at the organization-defined level of detail, one or more of the following:","parts":[{"id":"sa-4.2_obj.3.a","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][a]"}],"prose":"security-relevant external system interfaces;"},{"id":"sa-4.2_obj.3.b","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][b]"}],"prose":"high-level design;"},{"id":"sa-4.2_obj.3.c","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][c]"}],"prose":"low-level design;"},{"id":"sa-4.2_obj.3.d","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][d]"}],"prose":"source code;"},{"id":"sa-4.2_obj.3.e","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][e]"}],"prose":"hardware schematics; and\/or"},{"id":"sa-4.2_obj.3.f","name":"objective","props":[{"name":"label","value":"SA-4(2)[3][f]"}],"prose":"organization-defined design\/implementation information."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\nsolicitation documents\n\nacquisition documentation\n\nacquisition contracts for the information system, system components, or information system services\n\ndesign and implementation information for security controls employed in the information system, system component, or information system service\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\ninformation system developer or service provider\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for determining level of detail for system design and security controls\n\norganizational processes for developing acquisition contracts\n\nautomated mechanisms supporting and\/or implementing development of system design details"}]}]},{"id":"sa-4.9","class":"SP800-53-enhancement","title":"Functions \/ Ports \/ Protocols \/ Services in Use","props":[{"name":"label","value":"SA-4(9)"},{"name":"sort-id","value":"sa-04.09"}],"parts":[{"id":"sa-4.9_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to identify early in the system development life cycle, the functions, ports, protocols, and services intended for organizational use."},{"id":"sa-4.9_gdn","name":"guidance","prose":"The identification of functions, ports, protocols, and services early in the system development life cycle (e.g., during the initial requirements definition and design phases) allows organizations to influence the design of the information system, information system component, or information system service. This early involvement in the life cycle helps organizations to avoid or minimize the use of functions, ports, protocols, or services that pose unnecessarily high risks and understand the trade-offs involved in blocking specific ports, protocols, or services (or when requiring information system service providers to do so). Early identification of functions, ports, protocols, and services avoids costly retrofitting of security controls after the information system, system component, or information system service has been implemented. SA-9 describes requirements for external information system services with organizations identifying which functions, ports, protocols, and services are provided from external sources.","links":[{"href":"#cm-7","rel":"related"},{"href":"#sa-9","rel":"related"}]},{"id":"sa-4.9_obj","name":"objective","prose":"Determine if the organization requires the developer of the information system, system component, or information system service to identify early in the system development life cycle:","parts":[{"id":"sa-4.9_obj.1","name":"objective","props":[{"name":"label","value":"SA-4(9)[1]"}],"prose":"the functions intended for organizational use;"},{"id":"sa-4.9_obj.2","name":"objective","props":[{"name":"label","value":"SA-4(9)[2]"}],"prose":"the ports intended for organizational use;"},{"id":"sa-4.9_obj.3","name":"objective","props":[{"name":"label","value":"SA-4(9)[3]"}],"prose":"the protocols intended for organizational use; and"},{"id":"sa-4.9_obj.4","name":"objective","props":[{"name":"label","value":"SA-4(9)[4]"}],"prose":"the services intended for organizational use."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\ninformation system design documentation\n\ninformation system documentation including functions, ports, protocols, and services intended for organizational use\n\nacquisition contracts for information systems or services\n\nacquisition documentation\n\nsolicitation documentation\n\nservice-level agreements\n\norganizational security requirements, descriptions, and criteria for developers of information systems, system components, and information system services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\nsystem\/network administrators\n\norganizational personnel operating, using, and\/or maintaining the information system\n\ninformation system developers\n\norganizational personnel with information security responsibilities"}]}]},{"id":"sa-4.10","class":"SP800-53-enhancement","title":"Use of Approved PIV Products","props":[{"name":"label","value":"SA-4(10)"},{"name":"sort-id","value":"sa-04.10"}],"parts":[{"id":"sa-4.10_smt","name":"statement","prose":"The organization employs only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational information systems."},{"id":"sa-4.10_gdn","name":"guidance","links":[{"href":"#ia-2","rel":"related"},{"href":"#ia-8","rel":"related"}]},{"id":"sa-4.10_obj","name":"objective","prose":"Determine if the organization employs only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational information systems."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing the integration of information security requirements, descriptions, and criteria into the acquisition process\n\nsolicitation documentation\n\nacquisition documentation\n\nacquisition contracts for the information system, system component, or information system service\n\nservice-level agreements\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\norganizational personnel with responsibility for ensuring only FIPS 201-approved products are implemented\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for selecting and employing FIPS 201-approved products"}]}]}]},{"id":"sa-5","class":"SP800-53","title":"Information System Documentation","params":[{"id":"sa-5_prm_1","label":"organization-defined actions"},{"id":"sa-5_prm_2","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"SA-5"},{"name":"sort-id","value":"sa-05"}],"parts":[{"id":"sa-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Obtains administrator documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Secure configuration, installation, and operation of the system, component, or service;"},{"id":"sa-5_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Effective use and maintenance of security functions\/mechanisms; and"},{"id":"sa-5_smt.a.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"Known vulnerabilities regarding configuration and use of administrative (i.e., privileged) functions;"}]},{"id":"sa-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Obtains user documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"User-accessible security functions\/mechanisms and how to effectively use those security functions\/mechanisms;"},{"id":"sa-5_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and"},{"id":"sa-5_smt.b.3","name":"item","props":[{"name":"label","value":"3."}],"prose":"User responsibilities in maintaining the security of the system, component, or service;"}]},{"id":"sa-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent and takes {{ insert: param, sa-5_prm_1 }} in response;"},{"id":"sa-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects documentation as required, in accordance with the risk management strategy; and"},{"id":"sa-5_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Distributes documentation to {{ insert: param, sa-5_prm_2 }}."}]},{"id":"sa-5_gdn","name":"guidance","prose":"This control helps organizational personnel understand the implementation and operation of security controls associated with information systems, system components, and information system services. Organizations consider establishing specific measures to determine the quality\/completeness of the content provided. The inability to obtain needed documentation may occur, for example, due to the age of the information system\/component or lack of support from developers and contractors. In those situations, organizations may need to recreate selected documentation if such documentation is essential to the effective implementation or operation of security controls. The level of protection provided for selected information system, component, or service documentation is commensurate with the security category or classification of the system. For example, documentation associated with a key DoD weapons system or command and control system would typically require a higher level of protection than a routine administrative system. Documentation that addresses information system vulnerabilities may also require an increased level of protection. Secure operation of the information system, includes, for example, initially starting the system and resuming secure system operation after any lapse in system operation.","links":[{"href":"#cm-6","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#pl-2","rel":"related"},{"href":"#pl-4","rel":"related"},{"href":"#ps-2","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-4","rel":"related"}]},{"id":"sa-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-5.a_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)"}],"prose":"obtains administrator documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5.a.1_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)"}],"parts":[{"id":"sa-5.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)[1]"}],"prose":"secure configuration of the system, system component, or service;"},{"id":"sa-5.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)[2]"}],"prose":"secure installation of the system, system component, or service;"},{"id":"sa-5.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SA-5(a)(1)[3]"}],"prose":"secure operation of the system, system component, or service;"}]},{"id":"sa-5.a.2_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)(2)"}],"parts":[{"id":"sa-5.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(a)(2)[1]"}],"prose":"effective use of the security features\/mechanisms;"},{"id":"sa-5.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(a)(2)[2]"}],"prose":"effective maintenance of the security features\/mechanisms;"}]},{"id":"sa-5.a.3_obj","name":"objective","props":[{"name":"label","value":"SA-5(a)(3)"}],"prose":"known vulnerabilities regarding configuration and use of administrative (i.e., privileged) functions;"}]},{"id":"sa-5.b_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)"}],"prose":"obtains user documentation for the information system, system component, or information system service that describes:","parts":[{"id":"sa-5.b.1_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)(1)"}],"parts":[{"id":"sa-5.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(b)(1)[1]"}],"prose":"user-accessible security functions\/mechanisms;"},{"id":"sa-5.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(b)(1)[2]"}],"prose":"how to effectively use those functions\/mechanisms;"}]},{"id":"sa-5.b.2_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)(2)"}],"prose":"methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner;"},{"id":"sa-5.b.3_obj","name":"objective","props":[{"name":"label","value":"SA-5(b)(3)"}],"prose":"user responsibilities in maintaining the security of the system, component, or service;"}]},{"id":"sa-5.c_obj","name":"objective","props":[{"name":"label","value":"SA-5(c)"}],"parts":[{"id":"sa-5.c_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(c)[1]"}],"prose":"defines actions to be taken after documented attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent;"},{"id":"sa-5.c_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(c)[2]"}],"prose":"documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent;"},{"id":"sa-5.c_obj.3","name":"objective","props":[{"name":"label","value":"SA-5(c)[3]"}],"prose":"takes organization-defined actions in response;"}]},{"id":"sa-5.d_obj","name":"objective","props":[{"name":"label","value":"SA-5(d)"}],"prose":"protects documentation as required, in accordance with the risk management strategy;"},{"id":"sa-5.e_obj","name":"objective","props":[{"name":"label","value":"SA-5(e)"}],"parts":[{"id":"sa-5.e_obj.1","name":"objective","props":[{"name":"label","value":"SA-5(e)[1]"}],"prose":"defines personnel or roles to whom documentation is to be distributed; and"},{"id":"sa-5.e_obj.2","name":"objective","props":[{"name":"label","value":"SA-5(e)[2]"}],"prose":"distributes documentation to organization-defined personnel or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing information system documentation\n\ninformation system documentation including administrator and user guides\n\nrecords documenting attempts to obtain unavailable or nonexistent information system documentation\n\nlist of actions to be taken in response to documented attempts to obtain information system, system component, or information system service documentation\n\nrisk management strategy documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\nsystem administrators\n\norganizational personnel operating, using, and\/or maintaining the information system\n\ninformation system developers\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for obtaining, protecting, and distributing information system administrator and user documentation"}]}]},{"id":"sa-8","class":"SP800-53","title":"Security Engineering Principles","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-8"},{"name":"sort-id","value":"sa-08"}],"links":[{"href":"#21b1ed35-56d2-40a8-bdfe-b461fffe322f","rel":"reference"}],"parts":[{"id":"sa-8_smt","name":"statement","prose":"The organization applies information system security engineering principles in the specification, design, development, implementation, and modification of the information system."},{"id":"sa-8_gdn","name":"guidance","prose":"Organizations apply security engineering principles primarily to new development information systems or systems undergoing major upgrades. For legacy systems, organizations apply security engineering principles to system upgrades and modifications to the extent feasible, given the current state of hardware, software, and firmware within those systems. Security engineering principles include, for example: (i) developing layered protections; (ii) establishing sound security policy, architecture, and controls as the foundation for design; (iii) incorporating security requirements into the system development life cycle; (iv) delineating physical and logical security boundaries; (v) ensuring that system developers are trained on how to build secure software; (vi) tailoring security controls to meet organizational and operational needs; (vii) performing threat modeling to identify use cases, threat agents, attack vectors, and attack patterns as well as compensating controls and design patterns needed to mitigate risk; and (viii) reducing risk to acceptable levels, thus enabling informed risk management decisions.","links":[{"href":"#pm-7","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-17","rel":"related"},{"href":"#sc-2","rel":"related"},{"href":"#sc-3","rel":"related"}]},{"id":"sa-8_obj","name":"objective","prose":"Determine if the organization applies information system security engineering principles in:","parts":[{"id":"sa-8_obj.1","name":"objective","props":[{"name":"label","value":"SA-8[1]"}],"prose":"the specification of the information system;"},{"id":"sa-8_obj.2","name":"objective","props":[{"name":"label","value":"SA-8[2]"}],"prose":"the design of the information system;"},{"id":"sa-8_obj.3","name":"objective","props":[{"name":"label","value":"SA-8[3]"}],"prose":"the development of the information system;"},{"id":"sa-8_obj.4","name":"objective","props":[{"name":"label","value":"SA-8[4]"}],"prose":"the implementation of the information system; and"},{"id":"sa-8_obj.5","name":"objective","props":[{"name":"label","value":"SA-8[5]"}],"prose":"the modification of the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing security engineering principles used in the specification, design, development, implementation, and modification of the information system\n\ninformation system design documentation\n\ninformation security requirements and specifications for the information system\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with acquisition\/contracting responsibilities\n\norganizational personnel with responsibility for determining information system security requirements\n\norganizational personnel with information system specification, design, development, implementation, and modification responsibilities\n\ninformation system developers\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for applying security engineering principles in information system specification, design, development, implementation, and modification\n\nautomated mechanisms supporting the application of security engineering principles in information system specification, design, development, implementation, and modification"}]}]},{"id":"sa-9","class":"SP800-53","title":"External Information System Services","params":[{"id":"sa-9_prm_1","label":"organization-defined security controls"},{"id":"sa-9_prm_2","label":"organization-defined processes, methods, and techniques"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-9"},{"name":"sort-id","value":"sa-09"}],"links":[{"href":"#0c775bc3-bfc3-42c7-a382-88949f503171","rel":"reference"}],"parts":[{"id":"sa-9_smt","name":"statement","prose":"The organization:","parts":[{"id":"sa-9_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Requires that providers of external information system services comply with organizational information security requirements and employ {{ insert: param, sa-9_prm_1 }} in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"},{"id":"sa-9_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Defines and documents government oversight and user roles and responsibilities with regard to external information system services; and"},{"id":"sa-9_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Employs {{ insert: param, sa-9_prm_2 }} to monitor security control compliance by external service providers on an ongoing basis."}]},{"id":"sa-9_gdn","name":"guidance","prose":"External information system services are services that are implemented outside of the authorization boundaries of organizational information systems. This includes services that are used by, but not a part of, organizational information systems. FISMA and OMB policy require that organizations using external service providers that are processing, storing, or transmitting federal information or operating information systems on behalf of the federal government ensure that such providers meet the same security requirements that federal agencies are required to meet. Organizations establish relationships with external service providers in a variety of ways including, for example, through joint ventures, business partnerships, contracts, interagency agreements, lines of business arrangements, licensing agreements, and supply chain exchanges. The responsibility for managing risks from the use of external information system services remains with authorizing officials. For services external to organizations, a chain of trust requires that organizations establish and retain a level of confidence that each participating provider in the potentially complex consumer-provider relationship provides adequate protection for the services rendered. The extent and nature of this chain of trust varies based on the relationships between organizations and the external providers. Organizations document the basis for trust relationships so the relationships can be monitored over time. External information system services documentation includes government, service providers, end user security roles and responsibilities, and service-level agreements. Service-level agreements define expectations of performance for security controls, describe measurable outcomes, and identify remedies and response requirements for identified instances of noncompliance.","links":[{"href":"#ca-3","rel":"related"},{"href":"#ir-7","rel":"related"},{"href":"#ps-7","rel":"related"}]},{"id":"sa-9_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-9.a_obj","name":"objective","props":[{"name":"label","value":"SA-9(a)"}],"parts":[{"id":"sa-9.a_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(a)[1]"}],"prose":"defines security controls to be employed by providers of external information system services;"},{"id":"sa-9.a_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(a)[2]"}],"prose":"requires that providers of external information system services comply with organizational information security requirements;"},{"id":"sa-9.a_obj.3","name":"objective","props":[{"name":"label","value":"SA-9(a)[3]"}],"prose":"requires that providers of external information system services employ organization-defined security controls in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;"}]},{"id":"sa-9.b_obj","name":"objective","props":[{"name":"label","value":"SA-9(b)"}],"parts":[{"id":"sa-9.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(b)[1]"}],"prose":"defines and documents government oversight with regard to external information system services;"},{"id":"sa-9.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(b)[2]"}],"prose":"defines and documents user roles and responsibilities with regard to external information system services;"}]},{"id":"sa-9.c_obj","name":"objective","props":[{"name":"label","value":"SA-9(c)"}],"parts":[{"id":"sa-9.c_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(c)[1]"}],"prose":"defines processes, methods, and techniques to be employed to monitor security control compliance by external service providers; and"},{"id":"sa-9.c_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(c)[2]"}],"prose":"employs organization-defined processes, methods, and techniques to monitor security control compliance by external service providers on an ongoing basis."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing external information system services\n\nprocedures addressing methods and techniques for monitoring security control compliance by external service providers of information system services\n\nacquisition contracts, service-level agreements\n\norganizational security requirements and security specifications for external provider services\n\nsecurity control assessment evidence from external providers of information system services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\nexternal providers of information system services\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring security control compliance by external service providers on an ongoing basis\n\nautomated mechanisms for monitoring security control compliance by external service providers on an ongoing basis"}]}],"controls":[{"id":"sa-9.2","class":"SP800-53-enhancement","title":"Identification of Functions \/ Ports \/ Protocols \/ Services","params":[{"id":"sa-9.2_prm_1","label":"organization-defined external information system services"}],"props":[{"name":"label","value":"SA-9(2)"},{"name":"sort-id","value":"sa-09.02"}],"parts":[{"id":"sa-9.2_smt","name":"statement","prose":"The organization requires providers of {{ insert: param, sa-9.2_prm_1 }} to identify the functions, ports, protocols, and other services required for the use of such services."},{"id":"sa-9.2_gdn","name":"guidance","prose":"Information from external service providers regarding the specific functions, ports, protocols, and services used in the provision of such services can be particularly useful when the need arises to understand the trade-offs involved in restricting certain functions\/services or blocking certain ports\/protocols.","links":[{"href":"#cm-7","rel":"related"}]},{"id":"sa-9.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-9.2_obj.1","name":"objective","props":[{"name":"label","value":"SA-9(2)[1]"}],"prose":"defines external information system services for which providers of such services are to identify the functions, ports, protocols, and other services required for the use of such services;"},{"id":"sa-9.2_obj.2","name":"objective","props":[{"name":"label","value":"SA-9(2)[2]"}],"prose":"requires providers of organization-defined external information system services to identify:","parts":[{"id":"sa-9.2_obj.2.a","name":"objective","props":[{"name":"label","value":"SA-9(2)[2][a]"}],"prose":"the functions required for the use of such services;"},{"id":"sa-9.2_obj.2.b","name":"objective","props":[{"name":"label","value":"SA-9(2)[2][b]"}],"prose":"the ports required for the use of such services;"},{"id":"sa-9.2_obj.2.c","name":"objective","props":[{"name":"label","value":"SA-9(2)[2][c]"}],"prose":"the protocols required for the use of such services; and"},{"id":"sa-9.2_obj.2.d","name":"objective","props":[{"name":"label","value":"SA-9(2)[2][d]"}],"prose":"the other services required for the use of such services."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing external information system services\n\nacquisition contracts for the information system, system component, or information system service\n\nacquisition documentation\n\nsolicitation documentation, service-level agreements\n\norganizational security requirements and security specifications for external service providers\n\nlist of required functions, ports, protocols, and other services\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nexternal providers of information system services"}]}]}]},{"id":"sa-10","class":"SP800-53","title":"Developer Configuration Management","params":[{"id":"sa-10_prm_1","select":{"how-many":"one-or-more","choice":["design","development","implementation","operation"]}},{"id":"sa-10_prm_2","label":"organization-defined configuration items under configuration management"},{"id":"sa-10_prm_3","label":"organization-defined personnel"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-10"},{"name":"sort-id","value":"sa-10"}],"links":[{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"sa-10_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to:","parts":[{"id":"sa-10_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Perform configuration management during system, component, or service {{ insert: param, sa-10_prm_1 }};"},{"id":"sa-10_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Document, manage, and control the integrity of changes to {{ insert: param, sa-10_prm_2 }};"},{"id":"sa-10_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Implement only organization-approved changes to the system, component, or service;"},{"id":"sa-10_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Document approved changes to the system, component, or service and the potential security impacts of such changes; and"},{"id":"sa-10_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Track security flaws and flaw resolution within the system, component, or service and report findings to {{ insert: param, sa-10_prm_3 }}."}]},{"id":"sa-10_gdn","name":"guidance","prose":"This control also applies to organizations conducting internal information systems development and integration. Organizations consider the quality and completeness of the configuration management activities conducted by developers as evidence of applying effective security safeguards. Safeguards include, for example, protecting from unauthorized modification or destruction, the master copies of all material used to generate security-relevant portions of the system hardware, software, and firmware. Maintaining the integrity of changes to the information system, information system component, or information system service requires configuration control throughout the system development life cycle to track authorized changes and prevent unauthorized changes. Configuration items that are placed under configuration management (if existence\/use is required by other security controls) include: the formal model; the functional, high-level, and low-level design specifications; other design data; implementation documentation; source code and hardware schematics; the running version of the object code; tools for comparing new versions of security-relevant hardware descriptions and software\/firmware source code with previous versions; and test fixtures and documentation. Depending on the mission\/business needs of organizations and the nature of the contractual relationships in place, developers may provide configuration management support during the operations and maintenance phases of the life cycle.","links":[{"href":"#cm-3","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#cm-9","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"sa-10_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-10.a_obj","name":"objective","props":[{"name":"label","value":"SA-10(a)"}],"prose":"requires the developer of the information system, system component, or information system service to perform configuration management during one or more of the following:","parts":[{"id":"sa-10.a_obj.1","name":"objective","props":[{"name":"label","value":"SA-10(a)[1]"}],"prose":"system, component, or service design;"},{"id":"sa-10.a_obj.2","name":"objective","props":[{"name":"label","value":"SA-10(a)[2]"}],"prose":"system, component, or service development;"},{"id":"sa-10.a_obj.3","name":"objective","props":[{"name":"label","value":"SA-10(a)[3]"}],"prose":"system, component, or service implementation; and\/or"},{"id":"sa-10.a_obj.4","name":"objective","props":[{"name":"label","value":"SA-10(a)[4]"}],"prose":"system, component, or service operation;"}]},{"id":"sa-10.b_obj","name":"objective","props":[{"name":"label","value":"SA-10(b)"}],"parts":[{"id":"sa-10.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-10(b)[1]"}],"prose":"defines configuration items to be placed under configuration management;"},{"id":"sa-10.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-10(b)[2]"}],"prose":"requires the developer of the information system, system component, or information system service to:","parts":[{"id":"sa-10.b_obj.2.a","name":"objective","props":[{"name":"label","value":"SA-10(b)[2][a]"}],"prose":"document the integrity of changes to organization-defined items under configuration management;"},{"id":"sa-10.b_obj.2.b","name":"objective","props":[{"name":"label","value":"SA-10(b)[2][b]"}],"prose":"manage the integrity of changes to organization-defined items under configuration management;"},{"id":"sa-10.b_obj.2.c","name":"objective","props":[{"name":"label","value":"SA-10(b)[2][c]"}],"prose":"control the integrity of changes to organization-defined items under configuration management;"}]}]},{"id":"sa-10.c_obj","name":"objective","props":[{"name":"label","value":"SA-10(c)"}],"prose":"requires the developer of the information system, system component, or information system service to implement only organization-approved changes to the system, component, or service;"},{"id":"sa-10.d_obj","name":"objective","props":[{"name":"label","value":"SA-10(d)"}],"prose":"requires the developer of the information system, system component, or information system service to document:","parts":[{"id":"sa-10.d_obj.1","name":"objective","props":[{"name":"label","value":"SA-10(d)[1]"}],"prose":"approved changes to the system, component, or service;"},{"id":"sa-10.d_obj.2","name":"objective","props":[{"name":"label","value":"SA-10(d)[2]"}],"prose":"the potential security impacts of such changes;"}]},{"id":"sa-10.e_obj","name":"objective","props":[{"name":"label","value":"SA-10(e)"}],"parts":[{"id":"sa-10.e_obj.1","name":"objective","props":[{"name":"label","value":"SA-10(e)[1]"}],"prose":"defines personnel to whom findings, resulting from security flaws and flaw resolution tracked within the system, component, or service, are to be reported;"},{"id":"sa-10.e_obj.2","name":"objective","props":[{"name":"label","value":"SA-10(e)[2]"}],"prose":"requires the developer of the information system, system component, or information system service to:","parts":[{"id":"sa-10.e_obj.2.a","name":"objective","props":[{"name":"label","value":"SA-10(e)[2][a]"}],"prose":"track security flaws within the system, component, or service;"},{"id":"sa-10.e_obj.2.b","name":"objective","props":[{"name":"label","value":"SA-10(e)[2][b]"}],"prose":"track security flaw resolution within the system, component, or service; and"},{"id":"sa-10.e_obj.2.c","name":"objective","props":[{"name":"label","value":"SA-10(e)[2][c]"}],"prose":"report findings to organization-defined personnel."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing system developer configuration management\n\nsolicitation documentation\n\nacquisition documentation\n\nservice-level agreements\n\nacquisition contracts for the information system, system component, or information system service\n\nsystem developer configuration management plan\n\nsecurity flaw and flaw resolution tracking records\n\nsystem change authorization records\n\nchange control records\n\nconfiguration management records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with configuration management responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring developer configuration management\n\nautomated mechanisms supporting and\/or implementing the monitoring of developer configuration management"}]}]},{"id":"sa-11","class":"SP800-53","title":"Developer Security Testing and Evaluation","params":[{"id":"sa-11_prm_1","select":{"how-many":"one-or-more","choice":["unit","integration","system","regression"]}},{"id":"sa-11_prm_2","label":"organization-defined depth and coverage"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SA-11"},{"name":"sort-id","value":"sa-11"}],"links":[{"href":"#1737a687-52fb-4008-b900-cbfa836f7b65","rel":"reference"},{"href":"#cd4cf751-3312-4a55-b1a9-fad2f1db9119","rel":"reference"},{"href":"#275cc052-0f7f-423c-bdb6-ed503dc36228","rel":"reference"},{"href":"#15522e92-9192-463d-9646-6a01982db8ca","rel":"reference"},{"href":"#0931209f-00ae-4132-b92c-bc645847e8f9","rel":"reference"},{"href":"#4ef539ba-b767-4666-b0d3-168c53005fa3","rel":"reference"}],"parts":[{"id":"sa-11_smt","name":"statement","prose":"The organization requires the developer of the information system, system component, or information system service to:","parts":[{"id":"sa-11_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Create and implement a security assessment plan;"},{"id":"sa-11_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Perform {{ insert: param, sa-11_prm_1 }} testing\/evaluation at {{ insert: param, sa-11_prm_2 }};"},{"id":"sa-11_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Produce evidence of the execution of the security assessment plan and the results of the security testing\/evaluation;"},{"id":"sa-11_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Implement a verifiable flaw remediation process; and"},{"id":"sa-11_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Correct flaws identified during security testing\/evaluation."}]},{"id":"sa-11_gdn","name":"guidance","prose":"Developmental security testing\/evaluation occurs at all post-design phases of the system development life cycle. Such testing\/evaluation confirms that the required security controls are implemented correctly, operating as intended, enforcing the desired security policy, and meeting established security requirements. Security properties of information systems may be affected by the interconnection of system components or changes to those components. These interconnections or changes (e.g., upgrading or replacing applications and operating systems) may adversely affect previously implemented security controls. This control provides additional types of security testing\/evaluation that developers can conduct to reduce or eliminate potential flaws. Testing custom software applications may require approaches such as static analysis, dynamic analysis, binary analysis, or a hybrid of the three approaches. Developers can employ these analysis approaches in a variety of tools (e.g., web-based application scanners, static analysis tools, binary analyzers) and in source code reviews. Security assessment plans provide the specific activities that developers plan to carry out including the types of analyses, testing, evaluation, and reviews of software and firmware components, the degree of rigor to be applied, and the types of artifacts produced during those processes. The depth of security testing\/evaluation refers to the rigor and level of detail associated with the assessment process (e.g., black box, gray box, or white box testing). The coverage of security testing\/evaluation refers to the scope (i.e., number and type) of the artifacts included in the assessment process. Contracts specify the acceptance criteria for security assessment plans, flaw remediation processes, and the evidence that the plans\/processes have been diligently applied. Methods for reviewing and protecting assessment plans, evidence, and documentation are commensurate with the security category or classification level of the information system. Contracts may specify documentation protection requirements.","links":[{"href":"#ca-2","rel":"related"},{"href":"#cm-4","rel":"related"},{"href":"#sa-3","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#si-2","rel":"related"}]},{"id":"sa-11_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sa-11.a_obj","name":"objective","props":[{"name":"label","value":"SA-11(a)"}],"prose":"requires the developer of the information system, system component, or information system service to create and implement a security plan;"},{"id":"sa-11.b_obj","name":"objective","props":[{"name":"label","value":"SA-11(b)"}],"parts":[{"id":"sa-11.b_obj.1","name":"objective","props":[{"name":"label","value":"SA-11(b)[1]"}],"prose":"defines the depth of testing\/evaluation to be performed by the developer of the information system, system component, or information system service;"},{"id":"sa-11.b_obj.2","name":"objective","props":[{"name":"label","value":"SA-11(b)[2]"}],"prose":"defines the coverage of testing\/evaluation to be performed by the developer of the information system, system component, or information system service;"},{"id":"sa-11.b_obj.3","name":"objective","props":[{"name":"label","value":"SA-11(b)[3]"}],"prose":"requires the developer of the information system, system component, or information system service to perform one or more of the following testing\/evaluation at the organization-defined depth and coverage:","parts":[{"id":"sa-11.b_obj.3.a","name":"objective","props":[{"name":"label","value":"SA-11(b)[3][a]"}],"prose":"unit testing\/evaluation;"},{"id":"sa-11.b_obj.3.b","name":"objective","props":[{"name":"label","value":"SA-11(b)[3][b]"}],"prose":"integration testing\/evaluation;"},{"id":"sa-11.b_obj.3.c","name":"objective","props":[{"name":"label","value":"SA-11(b)[3][c]"}],"prose":"system testing\/evaluation; and\/or"},{"id":"sa-11.b_obj.3.d","name":"objective","props":[{"name":"label","value":"SA-11(b)[3][d]"}],"prose":"regression testing\/evaluation;"}]}]},{"id":"sa-11.c_obj","name":"objective","props":[{"name":"label","value":"SA-11(c)"}],"prose":"requires the developer of the information system, system component, or information system service to produce evidence of:","parts":[{"id":"sa-11.c_obj.1","name":"objective","props":[{"name":"label","value":"SA-11(c)[1]"}],"prose":"the execution of the security assessment plan;"},{"id":"sa-11.c_obj.2","name":"objective","props":[{"name":"label","value":"SA-11(c)[2]"}],"prose":"the results of the security testing\/evaluation;"}]},{"id":"sa-11.d_obj","name":"objective","props":[{"name":"label","value":"SA-11(d)"}],"prose":"requires the developer of the information system, system component, or information system service to implement a verifiable flaw remediation process; and"},{"id":"sa-11.e_obj","name":"objective","props":[{"name":"label","value":"SA-11(e)"}],"prose":"requires the developer of the information system, system component, or information system service to correct flaws identified during security testing\/evaluation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and services acquisition policy\n\nprocedures addressing system developer security testing\n\nprocedures addressing flaw remediation\n\nsolicitation documentation\n\nacquisition documentation\n\nservice-level agreements\n\nacquisition contracts for the information system, system component, or information system service\n\nsystem developer security test plans\n\nrecords of developer security testing results for the information system, system component, or information system service\n\nsecurity flaw and remediation tracking records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and services acquisition responsibilities\n\norganizational personnel with information security responsibilities\n\norganizational personnel with developer security testing responsibilities\n\nsystem developers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for monitoring developer security testing and evaluation\n\nautomated mechanisms supporting and\/or implementing the monitoring of developer security testing and evaluation"}]}]}]},{"id":"sc","class":"family","title":"System and Communications Protection","controls":[{"id":"sc-1","class":"SP800-53","title":"System and Communications Protection Policy and Procedures","params":[{"id":"sc-1_prm_1","label":"organization-defined personnel or roles"},{"id":"sc-1_prm_2","label":"organization-defined frequency"},{"id":"sc-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-1"},{"name":"sort-id","value":"sc-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"sc-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"sc-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, sc-1_prm_1 }}:","parts":[{"id":"sc-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"sc-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls; and"}]},{"id":"sc-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"sc-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System and communications protection policy {{ insert: param, sc-1_prm_2 }}; and"},{"id":"sc-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System and communications protection procedures {{ insert: param, sc-1_prm_3 }}."}]}]},{"id":"sc-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the SC family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"sc-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-1.a_obj","name":"objective","props":[{"name":"label","value":"SC-1(a)"}],"parts":[{"id":"sc-1.a.1_obj","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)"}],"parts":[{"id":"sc-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1]"}],"prose":"develops and documents a system and communications protection policy that addresses:","parts":[{"id":"sc-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"sc-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"sc-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"sc-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"sc-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"sc-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"sc-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"sc-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system and communications protection policy is to be disseminated;"},{"id":"sc-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SC-1(a)(1)[3]"}],"prose":"disseminates the system and communications protection policy to organization-defined personnel or roles;"}]},{"id":"sc-1.a.2_obj","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)"}],"parts":[{"id":"sc-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls;"},{"id":"sc-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"sc-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SC-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"sc-1.b_obj","name":"objective","props":[{"name":"label","value":"SC-1(b)"}],"parts":[{"id":"sc-1.b.1_obj","name":"objective","props":[{"name":"label","value":"SC-1(b)(1)"}],"parts":[{"id":"sc-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system and communications protection policy;"},{"id":"sc-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(b)(1)[2]"}],"prose":"reviews and updates the current system and communications protection policy with the organization-defined frequency;"}]},{"id":"sc-1.b.2_obj","name":"objective","props":[{"name":"label","value":"SC-1(b)(2)"}],"parts":[{"id":"sc-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"SC-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system and communications protection procedures; and"},{"id":"sc-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"SC-1(b)(2)[2]"}],"prose":"reviews and updates the current system and communications protection procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and communications protection responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"sc-2","class":"SP800-53","title":"Application Partitioning","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-2"},{"name":"sort-id","value":"sc-02"}],"parts":[{"id":"sc-2_smt","name":"statement","prose":"The information system separates user functionality (including user interface services) from information system management functionality."},{"id":"sc-2_gdn","name":"guidance","prose":"Information system management functionality includes, for example, functions necessary to administer databases, network components, workstations, or servers, and typically requires privileged user access. The separation of user functionality from information system management functionality is either physical or logical. Organizations implement separation of system management-related functionality from user functionality by using different computers, different central processing units, different instances of operating systems, different network addresses, virtualization techniques, or combinations of these or other methods, as appropriate. This type of separation includes, for example, web administrative interfaces that use separate authentication methods for users of any other information system resources. Separation of system and user functionality may include isolating administrative interfaces on different domains and with additional access controls.","links":[{"href":"#sa-4","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sc-3","rel":"related"}]},{"id":"sc-2_obj","name":"objective","prose":"Determine if the information system separates user functionality (including user interface services) from information system management functionality."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing application partitioning\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Separation of user functionality from information system management functionality"}]}]},{"id":"sc-4","class":"SP800-53","title":"Information in Shared Resources","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-4"},{"name":"sort-id","value":"sc-04"}],"parts":[{"id":"sc-4_smt","name":"statement","prose":"The information system prevents unauthorized and unintended information transfer via shared system resources."},{"id":"sc-4_gdn","name":"guidance","prose":"This control prevents information, including encrypted representations of information, produced by the actions of prior users\/roles (or the actions of processes acting on behalf of prior users\/roles) from being available to any current users\/roles (or current processes) that obtain access to shared system resources (e.g., registers, main memory, hard disks) after those resources have been released back to information systems. The control of information in shared resources is also commonly referred to as object reuse and residual information protection. This control does not address: (i) information remanence which refers to residual representation of data that has been nominally erased or removed; (ii) covert channels (including storage and\/or timing channels) where shared resources are manipulated to violate information flow restrictions; or (iii) components within information systems for which there are only single users\/roles.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#mp-6","rel":"related"}]},{"id":"sc-4_obj","name":"objective","prose":"Determine if the information system prevents unauthorized and unintended information transfer via shared system resources."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing information protection in shared system resources\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms preventing unauthorized and unintended transfer of information via shared system resources"}]}]},{"id":"sc-5","class":"SP800-53","title":"Denial of Service Protection","params":[{"id":"sc-5_prm_1","label":"organization-defined types of denial of service attacks or references to sources for such information"},{"id":"sc-5_prm_2","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-5"},{"name":"sort-id","value":"sc-05"}],"parts":[{"id":"sc-5_smt","name":"statement","prose":"The information system protects against or limits the effects of the following types of denial of service attacks: {{ insert: param, sc-5_prm_1 }} by employing {{ insert: param, sc-5_prm_2 }}."},{"id":"sc-5_gdn","name":"guidance","prose":"A variety of technologies exist to limit, or in some cases, eliminate the effects of denial of service attacks. For example, boundary protection devices can filter certain types of packets to protect information system components on internal organizational networks from being directly affected by denial of service attacks. Employing increased capacity and bandwidth combined with service redundancy may also reduce the susceptibility to denial of service attacks.","links":[{"href":"#sc-6","rel":"related"},{"href":"#sc-7","rel":"related"}]},{"id":"sc-5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-5_obj.1","name":"objective","props":[{"name":"label","value":"SC-5[1]"}],"prose":"the organization defines types of denial of service attacks or reference to source of such information for the information system to protect against or limit the effects;"},{"id":"sc-5_obj.2","name":"objective","props":[{"name":"label","value":"SC-5[2]"}],"prose":"the organization defines security safeguards to be employed by the information system to protect against or limit the effects of organization-defined types of denial of service attacks; and"},{"id":"sc-5_obj.3","name":"objective","props":[{"name":"label","value":"SC-5[3]"}],"prose":"the information system protects against or limits the effects of the organization-defined denial or service attacks (or reference to source for such information) by employing organization-defined security safeguards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing denial of service protection\n\ninformation system design documentation\n\nsecurity plan\n\nlist of denial of services attacks requiring employment of security safeguards to protect against or limit effects of such attacks\n\nlist of security safeguards protecting against or limiting the effects of denial of service attacks\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with incident response responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms protecting against or limiting the effects of denial of service attacks"}]}]},{"id":"sc-7","class":"SP800-53","title":"Boundary Protection","params":[{"id":"sc-7_prm_1","select":{"choice":["physically","logically"]}}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-7"},{"name":"sort-id","value":"sc-07"}],"links":[{"href":"#e85cdb3f-7f0a-4083-8639-f13f70d3760b","rel":"reference"},{"href":"#756a8e86-57d5-4701-8382-f7a40439665a","rel":"reference"},{"href":"#99f331f2-a9f0-46c2-9856-a3cbb9b89442","rel":"reference"}],"parts":[{"id":"sc-7_smt","name":"statement","prose":"The information system:","parts":[{"id":"sc-7_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Monitors and controls communications at the external boundary of the system and at key internal boundaries within the system;"},{"id":"sc-7_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Implements subnetworks for publicly accessible system components that are {{ insert: param, sc-7_prm_1 }} separated from internal organizational networks; and"},{"id":"sc-7_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture."}]},{"id":"sc-7_gdn","name":"guidance","prose":"Managed interfaces include, for example, gateways, routers, firewalls, guards, network-based malicious code analysis and virtualization systems, or encrypted tunnels implemented within a security architecture (e.g., routers protecting firewalls or application gateways residing on protected subnetworks). Subnetworks that are physically or logically separated from internal networks are referred to as demilitarized zones or DMZs. Restricting or prohibiting interfaces within organizational information systems includes, for example, restricting external web traffic to designated web servers within managed interfaces and prohibiting external traffic that appears to be spoofing internal addresses. Organizations consider the shared nature of commercial telecommunications services in the implementation of security controls associated with the use of such services. Commercial telecommunications services are commonly based on network components and consolidated management systems shared by all attached commercial customers, and may also include third party-provided access lines and other service elements. Such transmission services may represent sources of increased risk despite contract security provisions.","links":[{"href":"#ac-4","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ca-3","rel":"related"},{"href":"#cm-7","rel":"related"},{"href":"#cp-8","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ra-3","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-13","rel":"related"}]},{"id":"sc-7_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"sc-7.a_obj","name":"objective","props":[{"name":"label","value":"SC-7(a)"}],"parts":[{"id":"sc-7.a_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(a)[1]"}],"prose":"monitors communications at the external boundary of the information system;"},{"id":"sc-7.a_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(a)[2]"}],"prose":"monitors communications at key internal boundaries within the system;"},{"id":"sc-7.a_obj.3","name":"objective","props":[{"name":"label","value":"SC-7(a)[3]"}],"prose":"controls communications at the external boundary of the information system;"},{"id":"sc-7.a_obj.4","name":"objective","props":[{"name":"label","value":"SC-7(a)[4]"}],"prose":"controls communications at key internal boundaries within the system;"}]},{"id":"sc-7.b_obj","name":"objective","props":[{"name":"label","value":"SC-7(b)"}],"prose":"implements subnetworks for publicly accessible system components that are either:","parts":[{"id":"sc-7.b_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(b)[1]"}],"prose":"physically separated from internal organizational networks; and\/or"},{"id":"sc-7.b_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(b)[2]"}],"prose":"logically separated from internal organizational networks; and"}]},{"id":"sc-7.c_obj","name":"objective","props":[{"name":"label","value":"SC-7(c)"}],"prose":"connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\nlist of key internal boundaries of the information system\n\ninformation system design documentation\n\nboundary protection hardware and software\n\ninformation system configuration settings and associated documentation\n\nenterprise security architecture documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing boundary protection capability"}]}],"controls":[{"id":"sc-7.3","class":"SP800-53-enhancement","title":"Access Points","props":[{"name":"label","value":"SC-7(3)"},{"name":"sort-id","value":"sc-07.03"}],"parts":[{"id":"sc-7.3_smt","name":"statement","prose":"The organization limits the number of external network connections to the information system."},{"id":"sc-7.3_gdn","name":"guidance","prose":"Limiting the number of external network connections facilitates more comprehensive monitoring of inbound and outbound communications traffic. The Trusted Internet Connection (TIC) initiative is an example of limiting the number of external network connections."},{"id":"sc-7.3_obj","name":"objective","prose":"Determine if the organization limits the number of external network connections to the information system."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\ninformation system design documentation\n\nboundary protection hardware and software\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\ncommunications and network traffic monitoring logs\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing boundary protection capability\n\nautomated mechanisms limiting the number of external network connections to the information system"}]}]},{"id":"sc-7.4","class":"SP800-53-enhancement","title":"External Telecommunications Services","params":[{"id":"sc-7.4_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"SC-7(4)"},{"name":"sort-id","value":"sc-07.04"}],"parts":[{"id":"sc-7.4_smt","name":"statement","prose":"The organization:","parts":[{"id":"sc-7.4_smt.a","name":"item","props":[{"name":"label","value":"(a)"}],"prose":"Implements a managed interface for each external telecommunication service;"},{"id":"sc-7.4_smt.b","name":"item","props":[{"name":"label","value":"(b)"}],"prose":"Establishes a traffic flow policy for each managed interface;"},{"id":"sc-7.4_smt.c","name":"item","props":[{"name":"label","value":"(c)"}],"prose":"Protects the confidentiality and integrity of the information being transmitted across each interface;"},{"id":"sc-7.4_smt.d","name":"item","props":[{"name":"label","value":"(d)"}],"prose":"Documents each exception to the traffic flow policy with a supporting mission\/business need and duration of that need; and"},{"id":"sc-7.4_smt.e","name":"item","props":[{"name":"label","value":"(e)"}],"prose":"Reviews exceptions to the traffic flow policy {{ insert: param, sc-7.4_prm_1 }} and removes exceptions that are no longer supported by an explicit mission\/business need."}]},{"id":"sc-7.4_gdn","name":"guidance","links":[{"href":"#sc-8","rel":"related"}]},{"id":"sc-7.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-7.4.a_obj","name":"objective","props":[{"name":"label","value":"SC-7(4)(a)"}],"prose":"implements a managed interface for each external telecommunication service;","links":[{"href":"#sc-7.4_smt.a","rel":"corresp"}]},{"id":"sc-7.4.b_obj","name":"objective","props":[{"name":"label","value":"SC-7(4)(b)"}],"prose":"establishes a traffic flow policy for each managed interface;","links":[{"href":"#sc-7.4_smt.b","rel":"corresp"}]},{"id":"sc-7.4.c_obj","name":"objective","props":[{"name":"label","value":"SC-7(4)(c)"}],"prose":"protects the confidentiality and integrity of the information being transmitted across each interface;","links":[{"href":"#sc-7.4_smt.c","rel":"corresp"}]},{"id":"sc-7.4.d_obj","name":"objective","props":[{"name":"label","value":"SC-7(4)(d)"}],"prose":"documents each exception to the traffic flow policy with:","parts":[{"id":"sc-7.4.d_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(4)(d)[1]"}],"prose":"a supporting mission\/business need;"},{"id":"sc-7.4.d_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(4)(d)[2]"}],"prose":"duration of that need;"}],"links":[{"href":"#sc-7.4_smt.d","rel":"corresp"}]},{"id":"sc-7.4.e_obj","name":"objective","props":[{"name":"label","value":"SC-7(4)(e)"}],"parts":[{"id":"sc-7.4.e_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(4)(e)[1]"}],"prose":"defines a frequency to review exceptions to traffic flow policy;"},{"id":"sc-7.4.e_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(4)(e)[2]"}],"prose":"reviews exceptions to the traffic flow policy with the organization-defined frequency; and"},{"id":"sc-7.4.e_obj.3","name":"objective","props":[{"name":"label","value":"SC-7(4)(e)[3]"}],"prose":"removes traffic flow policy exceptions that are no longer supported by an explicit mission\/business need"}],"links":[{"href":"#sc-7.4_smt.e","rel":"corresp"}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\ntraffic flow policy\n\ninformation flow control policy\n\nprocedures addressing boundary protection\n\ninformation system security architecture\n\ninformation system design documentation\n\nboundary protection hardware and software\n\ninformation system architecture and configuration documentation\n\ninformation system configuration settings and associated documentation\n\nrecords of traffic flow policy exceptions\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for documenting and reviewing exceptions to the traffic flow policy\n\norganizational processes for removing exceptions to the traffic flow policy\n\nautomated mechanisms implementing boundary protection capability\n\nmanaged interfaces implementing traffic flow policy"}]}]},{"id":"sc-7.5","class":"SP800-53-enhancement","title":"Deny by Default \/ Allow by Exception","props":[{"name":"label","value":"SC-7(5)"},{"name":"sort-id","value":"sc-07.05"}],"parts":[{"id":"sc-7.5_smt","name":"statement","prose":"The information system at managed interfaces denies network communications traffic by default and allows network communications traffic by exception (i.e., deny all, permit by exception)."},{"id":"sc-7.5_gdn","name":"guidance","prose":"This control enhancement applies to both inbound and outbound network communications traffic. A deny-all, permit-by-exception network communications traffic policy ensures that only those connections which are essential and approved are allowed."},{"id":"sc-7.5_obj","name":"objective","prose":"Determine if the information system, at managed interfaces:","parts":[{"id":"sc-7.5_obj.1","name":"objective","props":[{"name":"label","value":"SC-7(5)[1]"}],"prose":"denies network traffic by default; and"},{"id":"sc-7.5_obj.2","name":"objective","props":[{"name":"label","value":"SC-7(5)[2]"}],"prose":"allows network traffic by exception."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing traffic management at managed interfaces"}]}]},{"id":"sc-7.7","class":"SP800-53-enhancement","title":"Prevent Split Tunneling for Remote Devices","props":[{"name":"label","value":"SC-7(7)"},{"name":"sort-id","value":"sc-07.07"}],"parts":[{"id":"sc-7.7_smt","name":"statement","prose":"The information system, in conjunction with a remote device, prevents the device from simultaneously establishing non-remote connections with the system and communicating via some other connection to resources in external networks."},{"id":"sc-7.7_gdn","name":"guidance","prose":"This control enhancement is implemented within remote devices (e.g., notebook computers) through configuration settings to disable split tunneling in those devices, and by preventing those configuration settings from being readily configurable by users. This control enhancement is implemented within the information system by the detection of split tunneling (or of configuration settings that allow split tunneling) in the remote device, and by prohibiting the connection if the remote device is using split tunneling. Split tunneling might be desirable by remote users to communicate with local information system resources such as printers\/file servers. However, split tunneling would in effect allow unauthorized external connections, making the system more vulnerable to attack and to exfiltration of organizational information. The use of VPNs for remote connections, when adequately provisioned with appropriate security controls, may provide the organization with sufficient assurance that it can effectively treat such connections as non-remote connections from the confidentiality and integrity perspective. VPNs thus provide a means for allowing non-remote communications paths from remote devices. The use of an adequately provisioned VPN does not eliminate the need for preventing split tunneling."},{"id":"sc-7.7_obj","name":"objective","prose":"Determine if the information system, in conjunction with a remote device, prevents the device from simultaneously establishing non-remote connections with the system and communicating via some other connection to resources in external networks."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing boundary protection\n\ninformation system design documentation\n\ninformation system hardware and software\n\ninformation system architecture\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with boundary protection responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms implementing boundary protection capability\n\nautomated mechanisms supporting\/restricting non-remote connections"}]}]}]},{"id":"sc-8","class":"SP800-53","title":"Transmission Confidentiality and Integrity","params":[{"id":"sc-8_prm_1","select":{"how-many":"one-or-more","choice":["confidentiality","integrity"]}}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-8"},{"name":"sort-id","value":"sc-08"}],"links":[{"href":"#d715b234-9b5b-4e07-b1ed-99836727664d","rel":"reference"},{"href":"#f2dbd4ec-c413-4714-b85b-6b7184d1c195","rel":"reference"},{"href":"#90c5bc98-f9c4-44c9-98b7-787422f0999c","rel":"reference"},{"href":"#99f331f2-a9f0-46c2-9856-a3cbb9b89442","rel":"reference"},{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"},{"href":"#349fe082-502d-464a-aa0c-1443c6a5cf40","rel":"reference"},{"href":"#a4aa9645-9a8a-4b51-90a9-e223250f9a75","rel":"reference"},{"href":"#06dff0ea-3848-4945-8d91-e955ee69f05d","rel":"reference"}],"parts":[{"id":"sc-8_smt","name":"statement","prose":"The information system protects the {{ insert: param, sc-8_prm_1 }} of transmitted information."},{"id":"sc-8_gdn","name":"guidance","prose":"This control applies to both internal and external networks and all types of information system components from which information can be transmitted (e.g., servers, mobile devices, notebook computers, printers, copiers, scanners, facsimile machines). Communication paths outside the physical protection of a controlled boundary are exposed to the possibility of interception and modification. Protecting the confidentiality and\/or integrity of organizational information can be accomplished by physical means (e.g., by employing protected distribution systems) or by logical means (e.g., employing encryption techniques). Organizations relying on commercial providers offering transmission services as commodity services rather than as fully dedicated services (i.e., services which can be highly specialized to individual customer needs), may find it difficult to obtain the necessary assurances regarding the implementation of needed security controls for transmission confidentiality\/integrity. In such situations, organizations determine what types of confidentiality\/integrity services are available in standard, commercial telecommunication service packages. If it is infeasible or impractical to obtain the necessary security controls and assurances of control effectiveness through appropriate contracting vehicles, organizations implement appropriate compensating security controls or explicitly accept the additional risk.","links":[{"href":"#ac-17","rel":"related"},{"href":"#pe-4","rel":"related"}]},{"id":"sc-8_obj","name":"objective","prose":"Determine if the information system protects one or more of the following:","parts":[{"id":"sc-8_obj.1","name":"objective","props":[{"name":"label","value":"SC-8[1]"}],"prose":"confidentiality of transmitted information; and\/or"},{"id":"sc-8_obj.2","name":"objective","props":[{"name":"label","value":"SC-8[2]"}],"prose":"integrity of transmitted information."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing transmission confidentiality and integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing transmission confidentiality and\/or integrity"}]}],"controls":[{"id":"sc-8.1","class":"SP800-53-enhancement","title":"Cryptographic or Alternate Physical Protection","params":[{"id":"sc-8.1_prm_1","select":{"how-many":"one-or-more","choice":["prevent unauthorized disclosure of information","detect changes to information"]}},{"id":"sc-8.1_prm_2","label":"organization-defined alternative physical safeguards"}],"props":[{"name":"label","value":"SC-8(1)"},{"name":"sort-id","value":"sc-08.01"}],"parts":[{"id":"sc-8.1_smt","name":"statement","prose":"The information system implements cryptographic mechanisms to {{ insert: param, sc-8.1_prm_1 }} during transmission unless otherwise protected by {{ insert: param, sc-8.1_prm_2 }}."},{"id":"sc-8.1_gdn","name":"guidance","prose":"Encrypting information for transmission protects information from unauthorized disclosure and modification. Cryptographic mechanisms implemented to protect information integrity include, for example, cryptographic hash functions which have common application in digital signatures, checksums, and message authentication codes. Alternative physical security safeguards include, for example, protected distribution systems.","links":[{"href":"#sc-13","rel":"related"}]},{"id":"sc-8.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-8.1_obj.1","name":"objective","props":[{"name":"label","value":"SC-8(1)[1]"}],"prose":"the organization defines physical safeguards to be implemented to protect information during transmission when cryptographic mechanisms are not implemented; and"},{"id":"sc-8.1_obj.2","name":"objective","props":[{"name":"label","value":"SC-8(1)[2]"}],"prose":"the information system implements cryptographic mechanisms to do one or more of the following during transmission unless otherwise protected by organization-defined alternative physical safeguards:","parts":[{"id":"sc-8.1_obj.2.a","name":"objective","props":[{"name":"label","value":"SC-8(1)[2][a]"}],"prose":"prevent unauthorized disclosure of information; and\/or"},{"id":"sc-8.1_obj.2.b","name":"objective","props":[{"name":"label","value":"SC-8(1)[2][b]"}],"prose":"detect changes to information."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing transmission confidentiality and integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Cryptographic mechanisms supporting and\/or implementing transmission confidentiality and\/or integrity\n\nautomated mechanisms supporting and\/or implementing alternative physical safeguards\n\norganizational processes for defining and implementing alternative physical safeguards"}]}]}]},{"id":"sc-10","class":"SP800-53","title":"Network Disconnect","params":[{"id":"sc-10_prm_1","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"SC-10"},{"name":"sort-id","value":"sc-10"}],"parts":[{"id":"sc-10_smt","name":"statement","prose":"The information system terminates the network connection associated with a communications session at the end of the session or after {{ insert: param, sc-10_prm_1 }} of inactivity."},{"id":"sc-10_gdn","name":"guidance","prose":"This control applies to both internal and external networks. Terminating network connections associated with communications sessions include, for example, de-allocating associated TCP\/IP address\/port pairs at the operating system level, or de-allocating networking assignments at the application level if multiple application sessions are using a single, operating system-level network connection. Time periods of inactivity may be established by organizations and include, for example, time periods by type of network access or for specific network accesses."},{"id":"sc-10_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-10_obj.1","name":"objective","props":[{"name":"label","value":"SC-10[1]"}],"prose":"the organization defines a time period of inactivity after which the information system terminates a network connection associated with a communications session; and"},{"id":"sc-10_obj.2","name":"objective","props":[{"name":"label","value":"SC-10[2]"}],"prose":"the information system terminates the network connection associated with a communication session at the end of the session or after the organization-defined time period of inactivity."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing network disconnect\n\ninformation system design documentation\n\nsecurity plan\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing network disconnect capability"}]}]},{"id":"sc-12","class":"SP800-53","title":"Cryptographic Key Establishment and Management","params":[{"id":"sc-12_prm_1","label":"organization-defined requirements for key generation, distribution, storage, access, and destruction"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-12"},{"name":"sort-id","value":"sc-12"}],"links":[{"href":"#81f09e01-d0b0-4ae2-aa6a-064ed9950070","rel":"reference"},{"href":"#a6c774c0-bf50-4590-9841-2a5c1c91ac6f","rel":"reference"}],"parts":[{"id":"sc-12_smt","name":"statement","prose":"The organization establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with {{ insert: param, sc-12_prm_1 }}."},{"id":"sc-12_gdn","name":"guidance","prose":"Cryptographic key management and establishment can be performed using manual procedures or automated mechanisms with supporting manual procedures. Organizations define key management requirements in accordance with applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance, specifying appropriate options, levels, and parameters. Organizations manage trust stores to ensure that only approved trust anchors are in such trust stores. This includes certificates with visibility external to organizational information systems and certificates related to the internal operations of systems.","links":[{"href":"#sc-13","rel":"related"},{"href":"#sc-17","rel":"related"}]},{"id":"sc-12_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-12_obj.1","name":"objective","props":[{"name":"label","value":"SC-12[1]"}],"prose":"defines requirements for cryptographic key:","parts":[{"id":"sc-12_obj.1.a","name":"objective","props":[{"name":"label","value":"SC-12[1][a]"}],"prose":"generation;"},{"id":"sc-12_obj.1.b","name":"objective","props":[{"name":"label","value":"SC-12[1][b]"}],"prose":"distribution;"},{"id":"sc-12_obj.1.c","name":"objective","props":[{"name":"label","value":"SC-12[1][c]"}],"prose":"storage;"},{"id":"sc-12_obj.1.d","name":"objective","props":[{"name":"label","value":"SC-12[1][d]"}],"prose":"access;"},{"id":"sc-12_obj.1.e","name":"objective","props":[{"name":"label","value":"SC-12[1][e]"}],"prose":"destruction; and"}]},{"id":"sc-12_obj.2","name":"objective","props":[{"name":"label","value":"SC-12[2]"}],"prose":"establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key generation, distribution, storage, access, and destruction."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing cryptographic key establishment and management\n\ninformation system design documentation\n\ncryptographic mechanisms\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for cryptographic key establishment and\/or management"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing cryptographic key establishment and management"}]}]},{"id":"sc-13","class":"SP800-53","title":"Cryptographic Protection","params":[{"id":"sc-13_prm_1","label":"organization-defined cryptographic uses and type of cryptography required for each use"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-13"},{"name":"sort-id","value":"sc-13"}],"links":[{"href":"#39f9087d-7687-46d2-8eda-b6f4b7a4d8a9","rel":"reference"},{"href":"#6a1041fc-054e-4230-946b-2e6f4f3731bb","rel":"reference"},{"href":"#9b97ed27-3dd6-4f9a-ade5-1b43e9669794","rel":"reference"}],"parts":[{"id":"sc-13_smt","name":"statement","prose":"The information system implements {{ insert: param, sc-13_prm_1 }} in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards."},{"id":"sc-13_gdn","name":"guidance","prose":"Cryptography can be employed to support a variety of security solutions including, for example, the protection of classified and Controlled Unclassified Information, the provision of digital signatures, and the enforcement of information separation when authorized individuals have the necessary clearances for such information but lack the necessary formal access approvals. Cryptography can also be used to support random number generation and hash generation. Generally applicable cryptographic standards include FIPS-validated cryptography and NSA-approved cryptography. This control does not impose any requirements on organizations to use cryptography. However, if cryptography is required based on the selection of other security controls, organizations define each type of cryptographic use and the type of cryptography required (e.g., protection of classified information: NSA-approved cryptography; provision of digital signatures: FIPS-validated cryptography).","links":[{"href":"#ac-2","rel":"related"},{"href":"#ac-3","rel":"related"},{"href":"#ac-7","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#ac-18","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#au-10","rel":"related"},{"href":"#cm-11","rel":"related"},{"href":"#cp-9","rel":"related"},{"href":"#ia-3","rel":"related"},{"href":"#ia-7","rel":"related"},{"href":"#ma-4","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"},{"href":"#mp-5","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-28","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"sc-13_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-13_obj.1","name":"objective","props":[{"name":"label","value":"SC-13[1]"}],"prose":"the organization defines cryptographic uses; and"},{"id":"sc-13_obj.2","name":"objective","props":[{"name":"label","value":"SC-13[2]"}],"prose":"the organization defines the type of cryptography required for each use; and"},{"id":"sc-13_obj.3","name":"objective","props":[{"name":"label","value":"SC-13[3]"}],"prose":"the information system implements the organization-defined cryptographic uses and type of cryptography required for each use in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing cryptographic protection\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ncryptographic module validation certificates\n\nlist of FIPS validated cryptographic modules\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with responsibilities for cryptographic protection"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing cryptographic protection"}]}]},{"id":"sc-15","class":"SP800-53","title":"Collaborative Computing Devices","params":[{"id":"sc-15_prm_1","label":"organization-defined exceptions where remote activation is to be allowed"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-15"},{"name":"sort-id","value":"sc-15"}],"parts":[{"id":"sc-15_smt","name":"statement","prose":"The information system:","parts":[{"id":"sc-15_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Prohibits remote activation of collaborative computing devices with the following exceptions: {{ insert: param, sc-15_prm_1 }}; and"},{"id":"sc-15_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Provides an explicit indication of use to users physically present at the devices."}]},{"id":"sc-15_gdn","name":"guidance","prose":"Collaborative computing devices include, for example, networked white boards, cameras, and microphones. Explicit indication of use includes, for example, signals to users when collaborative computing devices are activated.","links":[{"href":"#ac-21","rel":"related"}]},{"id":"sc-15_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-15.a_obj","name":"objective","props":[{"name":"label","value":"SC-15(a)"}],"parts":[{"id":"sc-15.a_obj.1","name":"objective","props":[{"name":"label","value":"SC-15(a)[1]"}],"prose":"the organization defines exceptions where remote activation of collaborative computing devices is to be allowed;"},{"id":"sc-15.a_obj.2","name":"objective","props":[{"name":"label","value":"SC-15(a)[2]"}],"prose":"the information system prohibits remote activation of collaborative computing devices, except for organization-defined exceptions where remote activation is to be allowed; and"}]},{"id":"sc-15.b_obj","name":"objective","props":[{"name":"label","value":"SC-15(b)"}],"prose":"the information system provides an explicit indication of use to users physically present at the devices."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing collaborative computing\n\naccess control policy and procedures\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer\n\norganizational personnel with responsibilities for managing collaborative computing devices"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing management of remote activation of collaborative computing devices\n\nautomated mechanisms providing an indication of use of collaborative computing devices"}]}]},{"id":"sc-17","class":"SP800-53","title":"Public Key Infrastructure Certificates","params":[{"id":"sc-17_prm_1","label":"organization-defined certificate policy"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-17"},{"name":"sort-id","value":"sc-17"}],"links":[{"href":"#58ad6f27-af99-429f-86a8-8bb767b014b9","rel":"reference"},{"href":"#8f174e91-844e-4cf1-a72a-45c119a3a8dd","rel":"reference"},{"href":"#644f44a9-a2de-4494-9c04-cd37fba45471","rel":"reference"}],"parts":[{"id":"sc-17_smt","name":"statement","prose":"The organization issues public key certificates under an {{ insert: param, sc-17_prm_1 }} or obtains public key certificates from an approved service provider."},{"id":"sc-17_gdn","name":"guidance","prose":"For all certificates, organizations manage information system trust stores to ensure only approved trust anchors are in the trust stores. This control addresses both certificates with visibility external to organizational information systems and certificates related to the internal operations of systems, for example, application-specific time services.","links":[{"href":"#sc-12","rel":"related"}]},{"id":"sc-17_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-17_obj.1","name":"objective","props":[{"name":"label","value":"SC-17[1]"}],"prose":"defines a certificate policy for issuing public key certificates;"},{"id":"sc-17_obj.2","name":"objective","props":[{"name":"label","value":"SC-17[2]"}],"prose":"issues public key certificates:","parts":[{"id":"sc-17_obj.2.a","name":"objective","props":[{"name":"label","value":"SC-17[2][a]"}],"prose":"under an organization-defined certificate policy: or"},{"id":"sc-17_obj.2.b","name":"objective","props":[{"name":"label","value":"SC-17[2][b]"}],"prose":"obtains public key certificates from an approved service provider."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing public key infrastructure certificates\n\npublic key certificate policy or policies\n\npublic key issuing process\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for issuing public key certificates\n\nservice providers"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing the management of public key infrastructure certificates"}]}]},{"id":"sc-18","class":"SP800-53","title":"Mobile Code","props":[{"name":"priority","value":"P2"},{"name":"label","value":"SC-18"},{"name":"sort-id","value":"sc-18"}],"links":[{"href":"#e716cd51-d1d5-4c6a-967a-22e9fbbc42f1","rel":"reference"},{"href":"#e6522953-6714-435d-a0d3-140df554c186","rel":"reference"}],"parts":[{"id":"sc-18_smt","name":"statement","prose":"The organization:","parts":[{"id":"sc-18_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Defines acceptable and unacceptable mobile code and mobile code technologies;"},{"id":"sc-18_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Establishes usage restrictions and implementation guidance for acceptable mobile code and mobile code technologies; and"},{"id":"sc-18_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Authorizes, monitors, and controls the use of mobile code within the information system."}]},{"id":"sc-18_gdn","name":"guidance","prose":"Decisions regarding the employment of mobile code within organizational information systems are based on the potential for the code to cause damage to the systems if used maliciously. Mobile code technologies include, for example, Java, JavaScript, ActiveX, Postscript, PDF, Shockwave movies, Flash animations, and VBScript. Usage restrictions and implementation guidance apply to both the selection and use of mobile code installed on servers and mobile code downloaded and executed on individual workstations and devices (e.g., smart phones). Mobile code policy and procedures address preventing the development, acquisition, or introduction of unacceptable mobile code within organizational information systems.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#cm-2","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#si-3","rel":"related"}]},{"id":"sc-18_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-18.a_obj","name":"objective","props":[{"name":"label","value":"SC-18(a)"}],"prose":"defines acceptable and unacceptable mobile code and mobile code technologies;"},{"id":"sc-18.b_obj","name":"objective","props":[{"name":"label","value":"SC-18(b)"}],"parts":[{"id":"sc-18.b_obj.1","name":"objective","props":[{"name":"label","value":"SC-18(b)[1]"}],"prose":"establishes usage restrictions for acceptable mobile code and mobile code technologies;"},{"id":"sc-18.b_obj.2","name":"objective","props":[{"name":"label","value":"SC-18(b)[2]"}],"prose":"establishes implementation guidance for acceptable mobile code and mobile code technologies;"}]},{"id":"sc-18.c_obj","name":"objective","props":[{"name":"label","value":"SC-18(c)"}],"parts":[{"id":"sc-18.c_obj.1","name":"objective","props":[{"name":"label","value":"SC-18(c)[1]"}],"prose":"authorizes the use of mobile code within the information system;"},{"id":"sc-18.c_obj.2","name":"objective","props":[{"name":"label","value":"SC-18(c)[2]"}],"prose":"monitors the use of mobile code within the information system; and"},{"id":"sc-18.c_obj.3","name":"objective","props":[{"name":"label","value":"SC-18(c)[3]"}],"prose":"controls the use of mobile code within the information system."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing mobile code\n\nmobile code usage restrictions, mobile code implementation policy and procedures\n\nlist of acceptable mobile code and mobile code technologies\n\nlist of unacceptable mobile code and mobile technologies\n\nauthorization records\n\ninformation system monitoring records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing mobile code"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for controlling, authorizing, monitoring, and restricting mobile code\n\nautomated mechanisms supporting and\/or implementing the management of mobile code\n\nautomated mechanisms supporting and\/or implementing the monitoring of mobile code"}]}]},{"id":"sc-19","class":"SP800-53","title":"Voice Over Internet Protocol","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-19"},{"name":"sort-id","value":"sc-19"}],"links":[{"href":"#7783f3e7-09b3-478b-9aa2-4a76dfd0ea90","rel":"reference"}],"parts":[{"id":"sc-19_smt","name":"statement","prose":"The organization:","parts":[{"id":"sc-19_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Establishes usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously; and"},{"id":"sc-19_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Authorizes, monitors, and controls the use of VoIP within the information system."}]},{"id":"sc-19_gdn","name":"guidance","links":[{"href":"#cm-6","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-15","rel":"related"}]},{"id":"sc-19_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"sc-19.a_obj","name":"objective","props":[{"name":"label","value":"SC-19(a)"}],"parts":[{"id":"sc-19.a_obj.1","name":"objective","props":[{"name":"label","value":"SC-19(a)[1]"}],"prose":"establishes usage restrictions for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously;"},{"id":"sc-19.a_obj.2","name":"objective","props":[{"name":"label","value":"SC-19(a)[2]"}],"prose":"establishes implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously;"}]},{"id":"sc-19.b_obj","name":"objective","props":[{"name":"label","value":"SC-19(b)"}],"parts":[{"id":"sc-19.b_obj.1","name":"objective","props":[{"name":"label","value":"SC-19(b)[1]"}],"prose":"authorizes the use of VoIP within the information system;"},{"id":"sc-19.b_obj.2","name":"objective","props":[{"name":"label","value":"SC-19(b)[2]"}],"prose":"monitors the use of VoIP within the information system; and"},{"id":"sc-19.b_obj.3","name":"objective","props":[{"name":"label","value":"SC-19(b)[3]"}],"prose":"controls the use of VoIP within the information system."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing VoIP\n\nVoIP usage restrictions\n\nVoIP implementation guidance\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system monitoring records\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing VoIP"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational process for authorizing, monitoring, and controlling VoIP\n\nautomated mechanisms supporting and\/or implementing authorizing, monitoring, and controlling VoIP"}]}]},{"id":"sc-20","class":"SP800-53","title":"Secure Name \/ Address Resolution Service (authoritative Source)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-20"},{"name":"sort-id","value":"sc-20"}],"links":[{"href":"#28115a56-da6b-4d44-b1df-51dd7f048a3e","rel":"reference"},{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"}],"parts":[{"id":"sc-20_smt","name":"statement","prose":"The information system:","parts":[{"id":"sc-20_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Provides additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name\/address resolution queries; and"},{"id":"sc-20_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Provides the means to indicate the security status of child zones and (if the child supports secure resolution services) to enable verification of a chain of trust among parent and child domains, when operating as part of a distributed, hierarchical namespace."}]},{"id":"sc-20_gdn","name":"guidance","prose":"This control enables external clients including, for example, remote Internet clients, to obtain origin authentication and integrity verification assurances for the host\/service name to network address resolution information obtained through the service. Information systems that provide name and address resolution services include, for example, domain name system (DNS) servers. Additional artifacts include, for example, DNS Security (DNSSEC) digital signatures and cryptographic keys. DNS resource records are examples of authoritative data. The means to indicate the security status of child zones includes, for example, the use of delegation signer resource records in the DNS. The DNS security controls reflect (and are referenced from) OMB Memorandum 08-23. Information systems that use technologies other than the DNS to map between host\/service names and network addresses provide other means to assure the authenticity and integrity of response data.","links":[{"href":"#au-10","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-12","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#sc-21","rel":"related"},{"href":"#sc-22","rel":"related"}]},{"id":"sc-20_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"sc-20.a_obj","name":"objective","props":[{"name":"label","value":"SC-20(a)"}],"prose":"provides additional data origin and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name\/address resolution queries;"},{"id":"sc-20.b_obj","name":"objective","props":[{"name":"label","value":"SC-20(b)"}],"prose":"provides the means to, when operating as part of a distributed, hierarchical namespace:","parts":[{"id":"sc-20.b_obj.1","name":"objective","props":[{"name":"label","value":"SC-20(b)[1]"}],"prose":"indicate the security status of child zones; and"},{"id":"sc-20.b_obj.2","name":"objective","props":[{"name":"label","value":"SC-20(b)[2]"}],"prose":"enable verification of a chain of trust among parent and child domains (if the child supports secure resolution services)."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing secure name\/address resolution service (authoritative source)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing DNS"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing secure name\/address resolution service"}]}]},{"id":"sc-21","class":"SP800-53","title":"Secure Name \/ Address Resolution Service (recursive or Caching Resolver)","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-21"},{"name":"sort-id","value":"sc-21"}],"links":[{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"}],"parts":[{"id":"sc-21_smt","name":"statement","prose":"The information system requests and performs data origin authentication and data integrity verification on the name\/address resolution responses the system receives from authoritative sources."},{"id":"sc-21_gdn","name":"guidance","prose":"Each client of name resolution services either performs this validation on its own, or has authenticated channels to trusted validation providers. Information systems that provide name and address resolution services for local clients include, for example, recursive resolving or caching domain name system (DNS) servers. DNS client resolvers either perform validation of DNSSEC signatures, or clients use authenticated channels to recursive resolvers that perform such validations. Information systems that use technologies other than the DNS to map between host\/service names and network addresses provide other means to enable clients to verify the authenticity and integrity of response data.","links":[{"href":"#sc-20","rel":"related"},{"href":"#sc-22","rel":"related"}]},{"id":"sc-21_obj","name":"objective","prose":"Determine if the information system:","parts":[{"id":"sc-21_obj.1","name":"objective","props":[{"name":"label","value":"SC-21[1]"}],"prose":"requests data origin authentication on the name\/address resolution responses the system receives from authoritative sources;"},{"id":"sc-21_obj.2","name":"objective","props":[{"name":"label","value":"SC-21[2]"}],"prose":"requests data integrity verification on the name\/address resolution responses the system receives from authoritative sources;"},{"id":"sc-21_obj.3","name":"objective","props":[{"name":"label","value":"SC-21[3]"}],"prose":"performs data origin authentication on the name\/address resolution responses the system receives from authoritative sources; and"},{"id":"sc-21_obj.4","name":"objective","props":[{"name":"label","value":"SC-21[4]"}],"prose":"performs data integrity verification on the name\/address resolution responses the system receives from authoritative sources."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing secure name\/address resolution service (recursive or caching resolver)\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing DNS"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing data origin authentication and data integrity verification for name\/address resolution services"}]}]},{"id":"sc-22","class":"SP800-53","title":"Architecture and Provisioning for Name \/ Address Resolution Service","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-22"},{"name":"sort-id","value":"sc-22"}],"links":[{"href":"#6af1e841-672c-46c4-b121-96f603d04be3","rel":"reference"}],"parts":[{"id":"sc-22_smt","name":"statement","prose":"The information systems that collectively provide name\/address resolution service for an organization are fault-tolerant and implement internal\/external role separation."},{"id":"sc-22_gdn","name":"guidance","prose":"Information systems that provide name and address resolution services include, for example, domain name system (DNS) servers. To eliminate single points of failure and to enhance redundancy, organizations employ at least two authoritative domain name system servers, one configured as the primary server and the other configured as the secondary server. Additionally, organizations typically deploy the servers in two geographically separated network subnetworks (i.e., not located in the same physical facility). For role separation, DNS servers with internal roles only process name and address resolution requests from within organizations (i.e., from internal clients). DNS servers with external roles only process name and address resolution information requests from clients external to organizations (i.e., on external networks including the Internet). Organizations specify clients that can access authoritative DNS servers in particular roles (e.g., by address ranges, explicit lists).","links":[{"href":"#sc-2","rel":"related"},{"href":"#sc-20","rel":"related"},{"href":"#sc-21","rel":"related"},{"href":"#sc-24","rel":"related"}]},{"id":"sc-22_obj","name":"objective","prose":"Determine if the information systems that collectively provide name\/address resolution service for an organization:","parts":[{"id":"sc-22_obj.1","name":"objective","props":[{"name":"label","value":"SC-22[1]"}],"prose":"are fault tolerant; and"},{"id":"sc-22_obj.2","name":"objective","props":[{"name":"label","value":"SC-22[2]"}],"prose":"implement internal\/external role separation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing architecture and provisioning for name\/address resolution service\n\naccess control policy and procedures\n\ninformation system design documentation\n\nassessment results from independent, testing organizations\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel with responsibilities for managing DNS"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing name\/address resolution service for fault tolerance and role separation"}]}]},{"id":"sc-23","class":"SP800-53","title":"Session Authenticity","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-23"},{"name":"sort-id","value":"sc-23"}],"links":[{"href":"#90c5bc98-f9c4-44c9-98b7-787422f0999c","rel":"reference"},{"href":"#99f331f2-a9f0-46c2-9856-a3cbb9b89442","rel":"reference"},{"href":"#1ebdf782-d95d-4a7b-8ec7-ee860951eced","rel":"reference"}],"parts":[{"id":"sc-23_smt","name":"statement","prose":"The information system protects the authenticity of communications sessions."},{"id":"sc-23_gdn","name":"guidance","prose":"This control addresses communications protection at the session, versus packet level (e.g., sessions in service-oriented architectures providing web-based services) and establishes grounds for confidence at both ends of communications sessions in ongoing identities of other parties and in the validity of information transmitted. Authenticity protection includes, for example, protecting against man-in-the-middle attacks\/session hijacking and the insertion of false information into sessions.","links":[{"href":"#sc-8","rel":"related"},{"href":"#sc-10","rel":"related"},{"href":"#sc-11","rel":"related"}]},{"id":"sc-23_obj","name":"objective","prose":"Determine if the information system protects the authenticity of communications sessions."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing session authenticity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing session authenticity"}]}]},{"id":"sc-28","class":"SP800-53","title":"Protection of Information at Rest","params":[{"id":"sc-28_prm_1","select":{"how-many":"one-or-more","choice":["confidentiality","integrity"]}},{"id":"sc-28_prm_2","label":"organization-defined information at rest"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-28"},{"name":"sort-id","value":"sc-28"}],"links":[{"href":"#81f09e01-d0b0-4ae2-aa6a-064ed9950070","rel":"reference"},{"href":"#a6c774c0-bf50-4590-9841-2a5c1c91ac6f","rel":"reference"},{"href":"#3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","rel":"reference"}],"parts":[{"id":"sc-28_smt","name":"statement","prose":"The information system protects the {{ insert: param, sc-28_prm_1 }} of {{ insert: param, sc-28_prm_2 }}."},{"id":"sc-28_gdn","name":"guidance","prose":"This control addresses the confidentiality and integrity of information at rest and covers user information and system information. Information at rest refers to the state of information when it is located on storage devices as specific components of information systems. System-related information requiring protection includes, for example, configurations or rule sets for firewalls, gateways, intrusion detection\/prevention systems, filtering routers, and authenticator content. Organizations may employ different mechanisms to achieve confidentiality and integrity protections, including the use of cryptographic mechanisms and file share scanning. Integrity protection can be achieved, for example, by implementing Write-Once-Read-Many (WORM) technologies. Organizations may also employ other security controls including, for example, secure off-line storage in lieu of online storage when adequate protection of information at rest cannot otherwise be achieved and\/or continuous monitoring to identify malicious code at rest.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-6","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"sc-28_obj","name":"objective","prose":"Determine if:","parts":[{"id":"sc-28_obj.1","name":"objective","props":[{"name":"label","value":"SC-28[1]"}],"prose":"the organization defines information at rest requiring one or more of the following:","parts":[{"id":"sc-28_obj.1.a","name":"objective","props":[{"name":"label","value":"SC-28[1][a]"}],"prose":"confidentiality protection; and\/or"},{"id":"sc-28_obj.1.b","name":"objective","props":[{"name":"label","value":"SC-28[1][b]"}],"prose":"integrity protection;"}]},{"id":"sc-28_obj.2","name":"objective","props":[{"name":"label","value":"SC-28[2]"}],"prose":"the information system protects:","parts":[{"id":"sc-28_obj.2.a","name":"objective","props":[{"name":"label","value":"SC-28[2][a]"}],"prose":"the confidentiality of organization-defined information at rest; and\/or"},{"id":"sc-28_obj.2.b","name":"objective","props":[{"name":"label","value":"SC-28[2][b]"}],"prose":"the integrity of organization-defined information at rest."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and communications protection policy\n\nprocedures addressing protection of information at rest\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ncryptographic mechanisms and associated configuration documentation\n\nlist of information at rest requiring confidentiality and integrity protections\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing confidentiality and integrity protections for information at rest"}]}]},{"id":"sc-39","class":"SP800-53","title":"Process Isolation","props":[{"name":"priority","value":"P1"},{"name":"label","value":"SC-39"},{"name":"sort-id","value":"sc-39"}],"parts":[{"id":"sc-39_smt","name":"statement","prose":"The information system maintains a separate execution domain for each executing process."},{"id":"sc-39_gdn","name":"guidance","prose":"Information systems can maintain separate execution domains for each executing process by assigning each process a separate address space. Each information system process has a distinct address space so that communication between processes is performed in a manner controlled through the security functions, and one process cannot modify the executing code of another process. Maintaining separate execution domains for executing processes can be achieved, for example, by implementing separate address spaces. This capability is available in most commercial operating systems that employ multi-state processor technologies.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-6","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-5","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sc-2","rel":"related"},{"href":"#sc-3","rel":"related"}]},{"id":"sc-39_obj","name":"objective","prose":"Determine if the information system maintains a separate execution domain for each executing process."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Information system design documentation\n\ninformation system architecture\n\nindependent verification and validation documentation\n\ntesting and evaluation documentation, other relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Information system developers\/integrators\n\ninformation system security architect"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing separate execution domains for each executing process"}]}]}]},{"id":"si","class":"family","title":"System and Information Integrity","controls":[{"id":"si-1","class":"SP800-53","title":"System and Information Integrity Policy and Procedures","params":[{"id":"si-1_prm_1","label":"organization-defined personnel or roles"},{"id":"si-1_prm_2","label":"organization-defined frequency"},{"id":"si-1_prm_3","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-1"},{"name":"sort-id","value":"si-01"}],"links":[{"href":"#5c201b63-0768-417b-ac22-3f014e3941b2","rel":"reference"},{"href":"#9cb3d8fe-2127-48ba-821e-cdd2d7aee921","rel":"reference"}],"parts":[{"id":"si-1_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-1_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Develops, documents, and disseminates to {{ insert: param, si-1_prm_1 }}:","parts":[{"id":"si-1_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"A system and information integrity policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and"},{"id":"si-1_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Procedures to facilitate the implementation of the system and information integrity policy and associated system and information integrity controls; and"}]},{"id":"si-1_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reviews and updates the current:","parts":[{"id":"si-1_smt.b.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"System and information integrity policy {{ insert: param, si-1_prm_2 }}; and"},{"id":"si-1_smt.b.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"System and information integrity procedures {{ insert: param, si-1_prm_3 }}."}]}]},{"id":"si-1_gdn","name":"guidance","prose":"This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the SI family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.","links":[{"href":"#pm-9","rel":"related"}]},{"id":"si-1_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-1.a_obj","name":"objective","props":[{"name":"label","value":"SI-1(a)"}],"parts":[{"id":"si-1.a.1_obj","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)"}],"parts":[{"id":"si-1.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1]"}],"prose":"develops and documents a system and information integrity policy that addresses:","parts":[{"id":"si-1.a.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][a]"}],"prose":"purpose;"},{"id":"si-1.a.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][b]"}],"prose":"scope;"},{"id":"si-1.a.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][c]"}],"prose":"roles;"},{"id":"si-1.a.1_obj.1.d","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][d]"}],"prose":"responsibilities;"},{"id":"si-1.a.1_obj.1.e","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][e]"}],"prose":"management commitment;"},{"id":"si-1.a.1_obj.1.f","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][f]"}],"prose":"coordination among organizational entities;"},{"id":"si-1.a.1_obj.1.g","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[1][g]"}],"prose":"compliance;"}]},{"id":"si-1.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[2]"}],"prose":"defines personnel or roles to whom the system and information integrity policy is to be disseminated;"},{"id":"si-1.a.1_obj.3","name":"objective","props":[{"name":"label","value":"SI-1(a)(1)[3]"}],"prose":"disseminates the system and information integrity policy to organization-defined personnel or roles;"}]},{"id":"si-1.a.2_obj","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)"}],"parts":[{"id":"si-1.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)[1]"}],"prose":"develops and documents procedures to facilitate the implementation of the system and information integrity policy and associated system and information integrity controls;"},{"id":"si-1.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)[2]"}],"prose":"defines personnel or roles to whom the procedures are to be disseminated;"},{"id":"si-1.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SI-1(a)(2)[3]"}],"prose":"disseminates the procedures to organization-defined personnel or roles;"}]}]},{"id":"si-1.b_obj","name":"objective","props":[{"name":"label","value":"SI-1(b)"}],"parts":[{"id":"si-1.b.1_obj","name":"objective","props":[{"name":"label","value":"SI-1(b)(1)"}],"parts":[{"id":"si-1.b.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(b)(1)[1]"}],"prose":"defines the frequency to review and update the current system and information integrity policy;"},{"id":"si-1.b.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(b)(1)[2]"}],"prose":"reviews and updates the current system and information integrity policy with the organization-defined frequency;"}]},{"id":"si-1.b.2_obj","name":"objective","props":[{"name":"label","value":"SI-1(b)(2)"}],"parts":[{"id":"si-1.b.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-1(b)(2)[1]"}],"prose":"defines the frequency to review and update the current system and information integrity procedures; and"},{"id":"si-1.b.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-1(b)(2)[2]"}],"prose":"reviews and updates the current system and information integrity procedures with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy and procedures\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with system and information integrity responsibilities\n\norganizational personnel with information security responsibilities"}]}]},{"id":"si-2","class":"SP800-53","title":"Flaw Remediation","params":[{"id":"si-2_prm_1","label":"organization-defined time period"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-2"},{"name":"sort-id","value":"si-02"}],"links":[{"href":"#bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","rel":"reference"},{"href":"#080f8068-5e3e-435e-9790-d22ba4722693","rel":"reference"}],"parts":[{"id":"si-2_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-2_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Identifies, reports, and corrects information system flaws;"},{"id":"si-2_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Tests software and firmware updates related to flaw remediation for effectiveness and potential side effects before installation;"},{"id":"si-2_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Installs security-relevant software and firmware updates within {{ insert: param, si-2_prm_1 }} of the release of the updates; and"},{"id":"si-2_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Incorporates flaw remediation into the organizational configuration management process."}]},{"id":"si-2_gdn","name":"guidance","prose":"Organizations identify information systems affected by announced software flaws including potential vulnerabilities resulting from those flaws, and report this information to designated organizational personnel with information security responsibilities. Security-relevant software updates include, for example, patches, service packs, hot fixes, and anti-virus signatures. Organizations also address flaws discovered during security assessments, continuous monitoring, incident response activities, and system error handling. Organizations take advantage of available resources such as the Common Weakness Enumeration (CWE) or Common Vulnerabilities and Exposures (CVE) databases in remediating flaws discovered in organizational information systems. By incorporating flaw remediation into ongoing configuration management processes, required\/anticipated remediation actions can be tracked and verified. Flaw remediation actions that can be tracked and verified include, for example, determining whether organizations follow US-CERT guidance and Information Assurance Vulnerability Alerts. Organization-defined time periods for updating security-relevant software and firmware may vary based on a variety of factors including, for example, the security category of the information system or the criticality of the update (i.e., severity of the vulnerability related to the discovered flaw). Some types of flaw remediation may require more testing than other types. Organizations determine the degree and type of testing needed for the specific type of flaw remediation activity under consideration and also the types of changes that are to be configuration-managed. In some situations, organizations may determine that the testing of software and\/or firmware updates is not necessary or practical, for example, when implementing simple anti-virus signature updates. Organizations may also consider in testing decisions, whether security-relevant software or firmware updates are obtained from authorized sources with appropriate digital signatures.","links":[{"href":"#ca-2","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#cm-3","rel":"related"},{"href":"#cm-5","rel":"related"},{"href":"#cm-8","rel":"related"},{"href":"#ma-2","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sa-10","rel":"related"},{"href":"#sa-11","rel":"related"},{"href":"#si-11","rel":"related"}]},{"id":"si-2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-2.a_obj","name":"objective","props":[{"name":"label","value":"SI-2(a)"}],"parts":[{"id":"si-2.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(a)[1]"}],"prose":"identifies information system flaws;"},{"id":"si-2.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(a)[2]"}],"prose":"reports information system flaws;"},{"id":"si-2.a_obj.3","name":"objective","props":[{"name":"label","value":"SI-2(a)[3]"}],"prose":"corrects information system flaws;"}]},{"id":"si-2.b_obj","name":"objective","props":[{"name":"label","value":"SI-2(b)"}],"parts":[{"id":"si-2.b_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(b)[1]"}],"prose":"tests software updates related to flaw remediation for effectiveness and potential side effects before installation;"},{"id":"si-2.b_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(b)[2]"}],"prose":"tests firmware updates related to flaw remediation for effectiveness and potential side effects before installation;"}]},{"id":"si-2.c_obj","name":"objective","props":[{"name":"label","value":"SI-2(c)"}],"parts":[{"id":"si-2.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(c)[1]"}],"prose":"defines the time period within which to install security-relevant software updates after the release of the updates;"},{"id":"si-2.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(c)[2]"}],"prose":"defines the time period within which to install security-relevant firmware updates after the release of the updates;"},{"id":"si-2.c_obj.3","name":"objective","props":[{"name":"label","value":"SI-2(c)[3]"}],"prose":"installs software updates within the organization-defined time period of the release of the updates;"},{"id":"si-2.c_obj.4","name":"objective","props":[{"name":"label","value":"SI-2(c)[4]"}],"prose":"installs firmware updates within the organization-defined time period of the release of the updates; and"}]},{"id":"si-2.d_obj","name":"objective","props":[{"name":"label","value":"SI-2(d)"}],"prose":"incorporates flaw remediation into the organizational configuration management process."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing flaw remediation\n\nprocedures addressing configuration management\n\nlist of flaws and vulnerabilities potentially affecting the information system\n\nlist of recent security flaw remediation actions performed on the information system (e.g., list of installed patches, service packs, hot fixes, and other software updates to correct information system flaws)\n\ntest results from the installation of software and firmware updates to correct information system flaws\n\ninstallation\/change control records for security-relevant software and firmware updates\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for flaw remediation\n\norganizational personnel with configuration management responsibility"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for identifying, reporting, and correcting information system flaws\n\norganizational process for installing software and firmware updates\n\nautomated mechanisms supporting and\/or implementing reporting, and correcting information system flaws\n\nautomated mechanisms supporting and\/or implementing testing software and firmware updates"}]}],"controls":[{"id":"si-2.2","class":"SP800-53-enhancement","title":"Automated Flaw Remediation Status","params":[{"id":"si-2.2_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"SI-2(2)"},{"name":"sort-id","value":"si-02.02"}],"parts":[{"id":"si-2.2_smt","name":"statement","prose":"The organization employs automated mechanisms {{ insert: param, si-2.2_prm_1 }} to determine the state of information system components with regard to flaw remediation."},{"id":"si-2.2_gdn","name":"guidance","links":[{"href":"#cm-6","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"si-2.2_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-2.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-2(2)[1]"}],"prose":"defines a frequency to employ automated mechanisms to determine the state of information system components with regard to flaw remediation; and"},{"id":"si-2.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-2(2)[2]"}],"prose":"employs automated mechanisms with the organization-defined frequency to determine the state of information system components with regard to flaw remediation."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing flaw remediation\n\nautomated mechanisms supporting centralized management of flaw remediation\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for flaw remediation"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms used to determine the state of information system components with regard to flaw remediation"}]}]}]},{"id":"si-3","class":"SP800-53","title":"Malicious Code Protection","params":[{"id":"si-3_prm_1","label":"organization-defined frequency"},{"id":"si-3_prm_2","select":{"how-many":"one-or-more","choice":["endpoint","network entry\/exit points"]}},{"id":"si-3_prm_3","select":{"how-many":"one-or-more","choice":["block malicious code","quarantine malicious code","send alert to administrator"," {{ insert: param, si-3_prm_4 }} "]}},{"id":"si-3_prm_4","depends-on":"si-3_prm_3","label":"organization-defined action"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-3"},{"name":"sort-id","value":"si-03"}],"links":[{"href":"#6d431fee-658f-4a0e-9f2e-a38b5d398fab","rel":"reference"}],"parts":[{"id":"si-3_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-3_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code;"},{"id":"si-3_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures;"},{"id":"si-3_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Configures malicious code protection mechanisms to:","parts":[{"id":"si-3_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Perform periodic scans of the information system {{ insert: param, si-3_prm_1 }} and real-time scans of files from external sources at {{ insert: param, si-3_prm_2 }} as the files are downloaded, opened, or executed in accordance with organizational security policy; and"},{"id":"si-3_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":" {{ insert: param, si-3_prm_3 }} in response to malicious code detection; and"}]},{"id":"si-3_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Addresses the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the information system."}]},{"id":"si-3_gdn","name":"guidance","prose":"Information system entry and exit points include, for example, firewalls, electronic mail servers, web servers, proxy servers, remote-access servers, workstations, notebook computers, and mobile devices. Malicious code includes, for example, viruses, worms, Trojan horses, and spyware. Malicious code can also be encoded in various formats (e.g., UUENCODE, Unicode), contained within compressed or hidden files, or hidden in files using steganography. Malicious code can be transported by different means including, for example, web accesses, electronic mail, electronic mail attachments, and portable storage devices. Malicious code insertions occur through the exploitation of information system vulnerabilities. Malicious code protection mechanisms include, for example, anti-virus signature definitions and reputation-based technologies. A variety of technologies and methods exist to limit or eliminate the effects of malicious code. Pervasive configuration management and comprehensive software integrity controls may be effective in preventing execution of unauthorized code. In addition to commercial off-the-shelf software, malicious code may also be present in custom-built software. This could include, for example, logic bombs, back doors, and other types of cyber attacks that could affect organizational missions\/business functions. Traditional malicious code protection mechanisms cannot always detect such code. In these situations, organizations rely instead on other safeguards including, for example, secure coding practices, configuration management and control, trusted procurement processes, and monitoring practices to help ensure that software does not perform functions other than the functions intended. Organizations may determine that in response to the detection of malicious code, different actions may be warranted. For example, organizations can define actions in response to malicious code detection during periodic scans, actions in response to detection of malicious downloads, and\/or actions in response to detection of maliciousness when attempting to open or execute files.","links":[{"href":"#cm-3","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#sa-4","rel":"related"},{"href":"#sa-8","rel":"related"},{"href":"#sa-12","rel":"related"},{"href":"#sa-13","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-26","rel":"related"},{"href":"#sc-44","rel":"related"},{"href":"#si-2","rel":"related"},{"href":"#si-4","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"si-3_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-3.a_obj","name":"objective","props":[{"name":"label","value":"SI-3(a)"}],"prose":"employs malicious code protection mechanisms to detect and eradicate malicious code at information system:","parts":[{"id":"si-3.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-3(a)[1]"}],"prose":"entry points;"},{"id":"si-3.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-3(a)[2]"}],"prose":"exit points;"}]},{"id":"si-3.b_obj","name":"objective","props":[{"name":"label","value":"SI-3(b)"}],"prose":"updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures (as identified in CM-1);"},{"id":"si-3.c_obj","name":"objective","props":[{"name":"label","value":"SI-3(c)"}],"parts":[{"id":"si-3.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-3(c)[1]"}],"prose":"defines a frequency for malicious code protection mechanisms to perform periodic scans of the information system;"},{"id":"si-3.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-3(c)[2]"}],"prose":"defines action to be initiated by malicious protection mechanisms in response to malicious code detection;"},{"id":"si-3.c_obj.3","name":"objective","props":[{"name":"label","value":"SI-3(c)[3]"}],"parts":[{"id":"si-3.c.1_obj.3","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](1)"}],"prose":"configures malicious code protection mechanisms to:","parts":[{"id":"si-3.c.1_obj.3.a","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](1)[a]"}],"prose":"perform periodic scans of the information system with the organization-defined frequency;"},{"id":"si-3.c.1_obj.3.b","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](1)[b]"}],"prose":"perform real-time scans of files from external sources at endpoint and\/or network entry\/exit points as the files are downloaded, opened, or executed in accordance with organizational security policy;"}]},{"id":"si-3.c.2_obj.3","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)"}],"prose":"configures malicious code protection mechanisms to do one or more of the following:","parts":[{"id":"si-3.c.2_obj.3.a","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[a]"}],"prose":"block malicious code in response to malicious code detection;"},{"id":"si-3.c.2_obj.3.b","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[b]"}],"prose":"quarantine malicious code in response to malicious code detection;"},{"id":"si-3.c.2_obj.3.c","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[c]"}],"prose":"send alert to administrator in response to malicious code detection; and\/or"},{"id":"si-3.c.2_obj.3.d","name":"objective","props":[{"name":"label","value":"SI-3(c)[3](2)[d]"}],"prose":"initiate organization-defined action in response to malicious code detection;"}]}]}]},{"id":"si-3.d_obj","name":"objective","props":[{"name":"label","value":"SI-3(d)"}],"parts":[{"id":"si-3.d_obj.1","name":"objective","props":[{"name":"label","value":"SI-3(d)[1]"}],"prose":"addresses the receipt of false positives during malicious code detection and eradication; and"},{"id":"si-3.d_obj.2","name":"objective","props":[{"name":"label","value":"SI-3(d)[2]"}],"prose":"addresses the resulting potential impact on the availability of the information system."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nconfiguration management policy and procedures\n\nprocedures addressing malicious code protection\n\nmalicious code protection mechanisms\n\nrecords of malicious code protection updates\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nscan results from malicious code protection mechanisms\n\nrecord of actions initiated by malicious code protection mechanisms in response to malicious code detection\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for malicious code protection\n\norganizational personnel with configuration management responsibility"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for employing, updating, and configuring malicious code protection mechanisms\n\norganizational process for addressing false positives and resulting potential impact\n\nautomated mechanisms supporting and\/or implementing employing, updating, and configuring malicious code protection mechanisms\n\nautomated mechanisms supporting and\/or implementing malicious code scanning and subsequent actions"}]}],"controls":[{"id":"si-3.1","class":"SP800-53-enhancement","title":"Central Management","props":[{"name":"label","value":"SI-3(1)"},{"name":"sort-id","value":"si-03.01"}],"parts":[{"id":"si-3.1_smt","name":"statement","prose":"The organization centrally manages malicious code protection mechanisms."},{"id":"si-3.1_gdn","name":"guidance","prose":"Central management is the organization-wide management and implementation of malicious code protection mechanisms. Central management includes planning, implementing, assessing, authorizing, and monitoring the organization-defined, centrally managed flaw malicious code protection security controls.","links":[{"href":"#au-2","rel":"related"},{"href":"#si-8","rel":"related"}]},{"id":"si-3.1_obj","name":"objective","prose":"Determine if the organization centrally manages malicious code protection mechanisms."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing malicious code protection\n\nautomated mechanisms supporting centralized management of malicious code protection mechanisms\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for malicious code protection"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for central management of malicious code protection mechanisms\n\nautomated mechanisms supporting and\/or implementing central management of malicious code protection mechanisms"}]}]},{"id":"si-3.2","class":"SP800-53-enhancement","title":"Automatic Updates","props":[{"name":"label","value":"SI-3(2)"},{"name":"sort-id","value":"si-03.02"}],"parts":[{"id":"si-3.2_smt","name":"statement","prose":"The information system automatically updates malicious code protection mechanisms."},{"id":"si-3.2_gdn","name":"guidance","prose":"Malicious code protection mechanisms include, for example, signature definitions. Due to information system integrity and availability concerns, organizations give careful consideration to the methodology used to carry out automatic updates.","links":[{"href":"#si-8","rel":"related"}]},{"id":"si-3.2_obj","name":"objective","prose":"Determine if the information system automatically updates malicious code protection mechanisms."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing malicious code protection\n\nautomated mechanisms supporting centralized management of malicious code protection mechanisms\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for malicious code protection"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing automatic updates to malicious code protection capability"}]}]}]},{"id":"si-4","class":"SP800-53","title":"Information System Monitoring","params":[{"id":"si-4_prm_1","label":"organization-defined monitoring objectives"},{"id":"si-4_prm_2","label":"organization-defined techniques and methods"},{"id":"si-4_prm_3","label":"organization-defined information system monitoring information"},{"id":"si-4_prm_4","label":"organization-defined personnel or roles"},{"id":"si-4_prm_5","select":{"how-many":"one-or-more","choice":["as needed"," {{ insert: param, si-4_prm_6 }} "]}},{"id":"si-4_prm_6","depends-on":"si-4_prm_5","label":"organization-defined frequency"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-4"},{"name":"sort-id","value":"si-04"}],"links":[{"href":"#be95fb85-a53f-4624-bdbb-140075500aa3","rel":"reference"},{"href":"#6d431fee-658f-4a0e-9f2e-a38b5d398fab","rel":"reference"},{"href":"#672fd561-b92b-4713-b9cf-6c9d9456728b","rel":"reference"},{"href":"#d1b1d689-0f66-4474-9924-c81119758dc1","rel":"reference"},{"href":"#cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","rel":"reference"}],"parts":[{"id":"si-4_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-4_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Monitors the information system to detect:","parts":[{"id":"si-4_smt.a.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Attacks and indicators of potential attacks in accordance with {{ insert: param, si-4_prm_1 }}; and"},{"id":"si-4_smt.a.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"Unauthorized local, network, and remote connections;"}]},{"id":"si-4_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Identifies unauthorized use of the information system through {{ insert: param, si-4_prm_2 }};"},{"id":"si-4_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Deploys monitoring devices:","parts":[{"id":"si-4_smt.c.1","name":"item","props":[{"name":"label","value":"1."}],"prose":"Strategically within the information system to collect organization-determined essential information; and"},{"id":"si-4_smt.c.2","name":"item","props":[{"name":"label","value":"2."}],"prose":"At ad hoc locations within the system to track specific types of transactions of interest to the organization;"}]},{"id":"si-4_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Protects information obtained from intrusion-monitoring tools from unauthorized access, modification, and deletion;"},{"id":"si-4_smt.e","name":"item","props":[{"name":"label","value":"e."}],"prose":"Heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information;"},{"id":"si-4_smt.f","name":"item","props":[{"name":"label","value":"f."}],"prose":"Obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations; and"},{"id":"si-4_smt.g","name":"item","props":[{"name":"label","value":"g."}],"prose":"Provides {{ insert: param, si-4_prm_3 }} to {{ insert: param, si-4_prm_4 }} {{ insert: param, si-4_prm_5 }}."}]},{"id":"si-4_gdn","name":"guidance","prose":"Information system monitoring includes external and internal monitoring. External monitoring includes the observation of events occurring at the information system boundary (i.e., part of perimeter defense and boundary protection). Internal monitoring includes the observation of events occurring within the information system. Organizations can monitor information systems, for example, by observing audit activities in real time or by observing other system aspects such as access patterns, characteristics of access, and other actions. The monitoring objectives may guide determination of the events. Information system monitoring capability is achieved through a variety of tools and techniques (e.g., intrusion detection systems, intrusion prevention systems, malicious code protection software, scanning tools, audit record monitoring software, network monitoring software). Strategic locations for monitoring devices include, for example, selected perimeter locations and near server farms supporting critical applications, with such devices typically being employed at the managed interfaces associated with controls SC-7 and AC-17. Einstein network monitoring devices from the Department of Homeland Security can also be included as monitoring devices. The granularity of monitoring information collected is based on organizational monitoring objectives and the capability of information systems to support such objectives. Specific types of transactions of interest include, for example, Hyper Text Transfer Protocol (HTTP) traffic that bypasses HTTP proxies. Information system monitoring is an integral part of organizational continuous monitoring and incident response programs. Output from system monitoring serves as input to continuous monitoring and incident response programs. A network connection is any connection with a device that communicates through a network (e.g., local area network, Internet). A remote connection is any connection with a device communicating through an external network (e.g., the Internet). Local, network, and remote connections can be either wired or wireless.","links":[{"href":"#ac-3","rel":"related"},{"href":"#ac-4","rel":"related"},{"href":"#ac-8","rel":"related"},{"href":"#ac-17","rel":"related"},{"href":"#au-2","rel":"related"},{"href":"#au-6","rel":"related"},{"href":"#au-7","rel":"related"},{"href":"#au-9","rel":"related"},{"href":"#au-12","rel":"related"},{"href":"#ca-7","rel":"related"},{"href":"#ir-4","rel":"related"},{"href":"#pe-3","rel":"related"},{"href":"#ra-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#sc-26","rel":"related"},{"href":"#sc-35","rel":"related"},{"href":"#si-3","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"si-4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-4.a_obj","name":"objective","props":[{"name":"label","value":"SI-4(a)"}],"parts":[{"id":"si-4.a.1_obj","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)"}],"parts":[{"id":"si-4.a.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[1]"}],"prose":"defines monitoring objectives to detect attacks and indicators of potential attacks on the information system;"},{"id":"si-4.a.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[2]"}],"prose":"monitors the information system to detect, in accordance with organization-defined monitoring objectives,:","parts":[{"id":"si-4.a.1_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[2][a]"}],"prose":"attacks;"},{"id":"si-4.a.1_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-4(a)(1)[2][b]"}],"prose":"indicators of potential attacks;"}]}]},{"id":"si-4.a.2_obj","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)"}],"prose":"monitors the information system to detect unauthorized:","parts":[{"id":"si-4.a.2_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)[1]"}],"prose":"local connections;"},{"id":"si-4.a.2_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)[2]"}],"prose":"network connections;"},{"id":"si-4.a.2_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(a)(2)[3]"}],"prose":"remote connections;"}]}]},{"id":"si-4.b_obj","name":"objective","props":[{"name":"label","value":"SI-4(b)"}],"parts":[{"id":"si-4.b.1_obj","name":"objective","props":[{"name":"label","value":"SI-4(b)(1)"}],"prose":"defines techniques and methods to identify unauthorized use of the information system;"},{"id":"si-4.b.2_obj","name":"objective","props":[{"name":"label","value":"SI-4(b)(2)"}],"prose":"identifies unauthorized use of the information system through organization-defined techniques and methods;"}]},{"id":"si-4.c_obj","name":"objective","props":[{"name":"label","value":"SI-4(c)"}],"prose":"deploys monitoring devices:","parts":[{"id":"si-4.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(c)[1]"}],"prose":"strategically within the information system to collect organization-determined essential information;"},{"id":"si-4.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(c)[2]"}],"prose":"at ad hoc locations within the system to track specific types of transactions of interest to the organization;"}]},{"id":"si-4.d_obj","name":"objective","props":[{"name":"label","value":"SI-4(d)"}],"prose":"protects information obtained from intrusion-monitoring tools from unauthorized:","parts":[{"id":"si-4.d_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(d)[1]"}],"prose":"access;"},{"id":"si-4.d_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(d)[2]"}],"prose":"modification;"},{"id":"si-4.d_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(d)[3]"}],"prose":"deletion;"}]},{"id":"si-4.e_obj","name":"objective","props":[{"name":"label","value":"SI-4(e)"}],"prose":"heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information;"},{"id":"si-4.f_obj","name":"objective","props":[{"name":"label","value":"SI-4(f)"}],"prose":"obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations;"},{"id":"si-4.g_obj","name":"objective","props":[{"name":"label","value":"SI-4(g)"}],"parts":[{"id":"si-4.g_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(g)[1]"}],"prose":"defines personnel or roles to whom information system monitoring information is to be provided;"},{"id":"si-4.g_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(g)[2]"}],"prose":"defines information system monitoring information to be provided to organization-defined personnel or roles;"},{"id":"si-4.g_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(g)[3]"}],"prose":"defines a frequency to provide organization-defined information system monitoring to organization-defined personnel or roles;"},{"id":"si-4.g_obj.4","name":"objective","props":[{"name":"label","value":"SI-4(g)[4]"}],"prose":"provides organization-defined information system monitoring information to organization-defined personnel or roles one or more of the following:","parts":[{"id":"si-4.g_obj.4.a","name":"objective","props":[{"name":"label","value":"SI-4(g)[4][a]"}],"prose":"as needed; and\/or"},{"id":"si-4.g_obj.4.b","name":"objective","props":[{"name":"label","value":"SI-4(g)[4][b]"}],"prose":"with the organization-defined frequency."}]}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"Continuous monitoring strategy\n\nsystem and information integrity policy\n\nprocedures addressing information system monitoring tools and techniques\n\nfacility diagram\/layout\n\ninformation system design documentation\n\ninformation system monitoring tools and techniques documentation\n\nlocations within information system where monitoring devices are deployed\n\ninformation system configuration settings and associated documentation\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility monitoring the information system"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for information system monitoring\n\nautomated mechanisms supporting and\/or implementing information system monitoring capability"}]}],"controls":[{"id":"si-4.2","class":"SP800-53-enhancement","title":"Automated Tools for Real-time Analysis","props":[{"name":"label","value":"SI-4(2)"},{"name":"sort-id","value":"si-04.02"}],"parts":[{"id":"si-4.2_smt","name":"statement","prose":"The organization employs automated tools to support near real-time analysis of events."},{"id":"si-4.2_gdn","name":"guidance","prose":"Automated tools include, for example, host-based, network-based, transport-based, or storage-based event monitoring tools or Security Information and Event Management (SIEM) technologies that provide real time analysis of alerts and\/or notifications generated by organizational information systems."},{"id":"si-4.2_obj","name":"objective","prose":"Determine if the organization employs automated tools to support near real-time analysis of events."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing information system monitoring tools and techniques\n\ninformation system design documentation\n\ninformation system monitoring tools and techniques documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for monitoring the information system\n\norganizational personnel with responsibility for incident response\/management"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for near real-time analysis of events\n\norganizational processes for information system monitoring\n\nautomated mechanisms supporting and\/or implementing information system monitoring\n\nautomated mechanisms\/tools supporting and\/or implementing analysis of events"}]}]},{"id":"si-4.4","class":"SP800-53-enhancement","title":"Inbound and Outbound Communications Traffic","params":[{"id":"si-4.4_prm_1","label":"organization-defined frequency"}],"props":[{"name":"label","value":"SI-4(4)"},{"name":"sort-id","value":"si-04.04"}],"parts":[{"id":"si-4.4_smt","name":"statement","prose":"The information system monitors inbound and outbound communications traffic {{ insert: param, si-4.4_prm_1 }} for unusual or unauthorized activities or conditions."},{"id":"si-4.4_gdn","name":"guidance","prose":"Unusual\/unauthorized activities or conditions related to information system inbound and outbound communications traffic include, for example, internal traffic that indicates the presence of malicious code within organizational information systems or propagating among system components, the unauthorized exporting of information, or signaling to external information systems. Evidence of malicious code is used to identify potentially compromised information systems or information system components."},{"id":"si-4.4_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-4.4_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(4)[1]"}],"prose":"defines a frequency to monitor:","parts":[{"id":"si-4.4_obj.1.a","name":"objective","props":[{"name":"label","value":"SI-4(4)[1][a]"}],"prose":"inbound communications traffic for unusual or unauthorized activities or conditions;"},{"id":"si-4.4_obj.1.b","name":"objective","props":[{"name":"label","value":"SI-4(4)[1][b]"}],"prose":"outbound communications traffic for unusual or unauthorized activities or conditions;"}]},{"id":"si-4.4_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(4)[2]"}],"prose":"monitors, with the organization-defined frequency:","parts":[{"id":"si-4.4_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-4(4)[2][a]"}],"prose":"inbound communications traffic for unusual or unauthorized activities or conditions; and"},{"id":"si-4.4_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-4(4)[2][b]"}],"prose":"outbound communications traffic for unusual or unauthorized activities or conditions."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing information system monitoring tools and techniques\n\ninformation system design documentation\n\ninformation system monitoring tools and techniques documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system protocols\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for monitoring the information system\n\norganizational personnel with responsibility for the intrusion detection system"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for intrusion detection\/information system monitoring\n\nautomated mechanisms supporting and\/or implementing intrusion detection capability\/information system monitoring\n\nautomated mechanisms supporting and\/or implementing monitoring of inbound\/outbound communications traffic"}]}]},{"id":"si-4.5","class":"SP800-53-enhancement","title":"System-generated Alerts","params":[{"id":"si-4.5_prm_1","label":"organization-defined personnel or roles"},{"id":"si-4.5_prm_2","label":"organization-defined compromise indicators"}],"props":[{"name":"label","value":"SI-4(5)"},{"name":"sort-id","value":"si-04.05"}],"parts":[{"id":"si-4.5_smt","name":"statement","prose":"The information system alerts {{ insert: param, si-4.5_prm_1 }} when the following indications of compromise or potential compromise occur: {{ insert: param, si-4.5_prm_2 }}."},{"id":"si-4.5_gdn","name":"guidance","prose":"Alerts may be generated from a variety of sources, including, for example, audit records or inputs from malicious code protection mechanisms, intrusion detection or prevention mechanisms, or boundary protection devices such as firewalls, gateways, and routers. Alerts can be transmitted, for example, telephonically, by electronic mail messages, or by text messaging. Organizational personnel on the notification list can include, for example, system administrators, mission\/business owners, system owners, or information system security officers.","links":[{"href":"#au-5","rel":"related"},{"href":"#pe-6","rel":"related"}]},{"id":"si-4.5_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-4.5_obj.1","name":"objective","props":[{"name":"label","value":"SI-4(5)[1]"}],"prose":"the organization defines compromise indicators for the information system;"},{"id":"si-4.5_obj.2","name":"objective","props":[{"name":"label","value":"SI-4(5)[2]"}],"prose":"the organization defines personnel or roles to be alerted when indications of compromise or potential compromise occur; and"},{"id":"si-4.5_obj.3","name":"objective","props":[{"name":"label","value":"SI-4(5)[3]"}],"prose":"the information system alerts organization-defined personnel or roles when organization-defined compromise indicators occur."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing information system monitoring tools and techniques\n\ninformation system monitoring tools and techniques documentation\n\ninformation system configuration settings and associated documentation\n\nalerts\/notifications generated based on compromise indicators\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"System\/network administrators\n\norganizational personnel with information security responsibilities\n\nsystem developers\n\norganizational personnel installing, configuring, and\/or maintaining the information system\n\norganizational personnel with responsibility for monitoring the information system\n\norganizational personnel with responsibility for the intrusion detection system"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for intrusion detection\/information system monitoring\n\nautomated mechanisms supporting and\/or implementing intrusion detection\/information system monitoring capability\n\nautomated mechanisms supporting and\/or implementing alerts for compromise indicators"}]}]}]},{"id":"si-5","class":"SP800-53","title":"Security Alerts, Advisories, and Directives","params":[{"id":"si-5_prm_1","label":"organization-defined external organizations"},{"id":"si-5_prm_2","select":{"how-many":"one-or-more","choice":[" {{ insert: param, si-5_prm_3 }} "," {{ insert: param, si-5_prm_4 }} "," {{ insert: param, si-5_prm_5 }} "]}},{"id":"si-5_prm_3","depends-on":"si-5_prm_2","label":"organization-defined personnel or roles"},{"id":"si-5_prm_4","depends-on":"si-5_prm_2","label":"organization-defined elements within the organization"},{"id":"si-5_prm_5","depends-on":"si-5_prm_2","label":"organization-defined external organizations"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-5"},{"name":"sort-id","value":"si-05"}],"links":[{"href":"#bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","rel":"reference"}],"parts":[{"id":"si-5_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-5_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Receives information system security alerts, advisories, and directives from {{ insert: param, si-5_prm_1 }} on an ongoing basis;"},{"id":"si-5_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Generates internal security alerts, advisories, and directives as deemed necessary;"},{"id":"si-5_smt.c","name":"item","props":[{"name":"label","value":"c."}],"prose":"Disseminates security alerts, advisories, and directives to: {{ insert: param, si-5_prm_2 }}; and"},{"id":"si-5_smt.d","name":"item","props":[{"name":"label","value":"d."}],"prose":"Implements security directives in accordance with established time frames, or notifies the issuing organization of the degree of noncompliance."}]},{"id":"si-5_gdn","name":"guidance","prose":"The United States Computer Emergency Readiness Team (US-CERT) generates security alerts and advisories to maintain situational awareness across the federal government. Security directives are issued by OMB or other designated organizations with the responsibility and authority to issue such directives. Compliance to security directives is essential due to the critical nature of many of these directives and the potential immediate adverse effects on organizational operations and assets, individuals, other organizations, and the Nation should the directives not be implemented in a timely manner. External organizations include, for example, external mission\/business partners, supply chain partners, external service providers, and other peer\/supporting organizations.","links":[{"href":"#si-2","rel":"related"}]},{"id":"si-5_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-5.a_obj","name":"objective","props":[{"name":"label","value":"SI-5(a)"}],"parts":[{"id":"si-5.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-5(a)[1]"}],"prose":"defines external organizations from whom information system security alerts, advisories and directives are to be received;"},{"id":"si-5.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-5(a)[2]"}],"prose":"receives information system security alerts, advisories, and directives from organization-defined external organizations on an ongoing basis;"}]},{"id":"si-5.b_obj","name":"objective","props":[{"name":"label","value":"SI-5(b)"}],"prose":"generates internal security alerts, advisories, and directives as deemed necessary;"},{"id":"si-5.c_obj","name":"objective","props":[{"name":"label","value":"SI-5(c)"}],"parts":[{"id":"si-5.c_obj.1","name":"objective","props":[{"name":"label","value":"SI-5(c)[1]"}],"prose":"defines personnel or roles to whom security alerts, advisories, and directives are to be provided;"},{"id":"si-5.c_obj.2","name":"objective","props":[{"name":"label","value":"SI-5(c)[2]"}],"prose":"defines elements within the organization to whom security alerts, advisories, and directives are to be provided;"},{"id":"si-5.c_obj.3","name":"objective","props":[{"name":"label","value":"SI-5(c)[3]"}],"prose":"defines external organizations to whom security alerts, advisories, and directives are to be provided;"},{"id":"si-5.c_obj.4","name":"objective","props":[{"name":"label","value":"SI-5(c)[4]"}],"prose":"disseminates security alerts, advisories, and directives to one or more of the following:","parts":[{"id":"si-5.c_obj.4.a","name":"objective","props":[{"name":"label","value":"SI-5(c)[4][a]"}],"prose":"organization-defined personnel or roles;"},{"id":"si-5.c_obj.4.b","name":"objective","props":[{"name":"label","value":"SI-5(c)[4][b]"}],"prose":"organization-defined elements within the organization; and\/or"},{"id":"si-5.c_obj.4.c","name":"objective","props":[{"name":"label","value":"SI-5(c)[4][c]"}],"prose":"organization-defined external organizations; and"}]}]},{"id":"si-5.d_obj","name":"objective","props":[{"name":"label","value":"SI-5(d)"}],"parts":[{"id":"si-5.d_obj.1","name":"objective","props":[{"name":"label","value":"SI-5(d)[1]"}],"prose":"implements security directives in accordance with established time frames; or"},{"id":"si-5.d_obj.2","name":"objective","props":[{"name":"label","value":"SI-5(d)[2]"}],"prose":"notifies the issuing organization of the degree of noncompliance."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing security alerts, advisories, and directives\n\nrecords of security alerts and advisories\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with security alert and advisory responsibilities\n\norganizational personnel implementing, operating, maintaining, and using the information system\n\norganizational personnel, organizational elements, and\/or external organizations to whom alerts, advisories, and directives are to be disseminated\n\nsystem\/network administrators\n\norganizational personnel with information security responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for defining, receiving, generating, disseminating, and complying with security alerts, advisories, and directives\n\nautomated mechanisms supporting and\/or implementing definition, receipt, generation, and dissemination of security alerts, advisories, and directives\n\nautomated mechanisms supporting and\/or implementing security directives"}]}]},{"id":"si-7","class":"SP800-53","title":"Software, Firmware, and Information Integrity","params":[{"id":"si-7_prm_1","label":"organization-defined software, firmware, and information"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-7"},{"name":"sort-id","value":"si-07"}],"links":[{"href":"#6bf8d24a-78dc-4727-a2ac-0e64d71c495c","rel":"reference"},{"href":"#3878cc04-144a-483e-af62-8fe6f4ad6c7a","rel":"reference"}],"parts":[{"id":"si-7_smt","name":"statement","prose":"The organization employs integrity verification tools to detect unauthorized changes to {{ insert: param, si-7_prm_1 }}."},{"id":"si-7_gdn","name":"guidance","prose":"Unauthorized changes to software, firmware, and information can occur due to errors or malicious activity (e.g., tampering). Software includes, for example, operating systems (with key internal components such as kernels, drivers), middleware, and applications. Firmware includes, for example, the Basic Input Output System (BIOS). Information includes metadata such as security attributes associated with information. State-of-the-practice integrity-checking mechanisms (e.g., parity checks, cyclical redundancy checks, cryptographic hashes) and associated tools can automatically monitor the integrity of information systems and hosted applications.","links":[{"href":"#sa-12","rel":"related"},{"href":"#sc-8","rel":"related"},{"href":"#sc-13","rel":"related"},{"href":"#si-3","rel":"related"}]},{"id":"si-7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-7_obj.1","name":"objective","props":[{"name":"label","value":"SI-7[1]"}],"parts":[{"id":"si-7_obj.1.a","name":"objective","props":[{"name":"label","value":"SI-7[1][a]"}],"prose":"defines software requiring integrity verification tools to be employed to detect unauthorized changes;"},{"id":"si-7_obj.1.b","name":"objective","props":[{"name":"label","value":"SI-7[1][b]"}],"prose":"defines firmware requiring integrity verification tools to be employed to detect unauthorized changes;"},{"id":"si-7_obj.1.c","name":"objective","props":[{"name":"label","value":"SI-7[1][c]"}],"prose":"defines information requiring integrity verification tools to be employed to detect unauthorized changes;"}]},{"id":"si-7_obj.2","name":"objective","props":[{"name":"label","value":"SI-7[2]"}],"prose":"employs integrity verification tools to detect unauthorized changes to organization-defined:","parts":[{"id":"si-7_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-7[2][a]"}],"prose":"software;"},{"id":"si-7_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-7[2][b]"}],"prose":"firmware; and"},{"id":"si-7_obj.2.c","name":"objective","props":[{"name":"label","value":"SI-7[2][c]"}],"prose":"information."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing software, firmware, and information integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nintegrity verification tools and associated documentation\n\nrecords generated\/triggered from integrity verification tools regarding unauthorized software, firmware, and information changes\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for software, firmware, and\/or information integrity\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Software, firmware, and information integrity verification tools"}]}],"controls":[{"id":"si-7.1","class":"SP800-53-enhancement","title":"Integrity Checks","params":[{"id":"si-7.1_prm_1","label":"organization-defined software, firmware, and information"},{"id":"si-7.1_prm_2","select":{"how-many":"one-or-more","choice":["at startup","at {{ insert: param, si-7.1_prm_3 }} "," {{ insert: param, si-7.1_prm_4 }} "]}},{"id":"si-7.1_prm_3","depends-on":"si-7.1_prm_2","label":"organization-defined transitional states or security-relevant events"},{"id":"si-7.1_prm_4","depends-on":"si-7.1_prm_2","label":"organization-defined frequency"}],"props":[{"name":"label","value":"SI-7(1)"},{"name":"sort-id","value":"si-07.01"}],"parts":[{"id":"si-7.1_smt","name":"statement","prose":"The information system performs an integrity check of {{ insert: param, si-7.1_prm_1 }} {{ insert: param, si-7.1_prm_2 }}."},{"id":"si-7.1_gdn","name":"guidance","prose":"Security-relevant events include, for example, the identification of a new threat to which organizational information systems are susceptible, and the installation of new hardware, software, or firmware. Transitional states include, for example, system startup, restart, shutdown, and abort."},{"id":"si-7.1_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-7.1_obj.1","name":"objective","props":[{"name":"label","value":"SI-7(1)[1]"}],"prose":"the organization defines:","parts":[{"id":"si-7.1_obj.1.a","name":"objective","props":[{"name":"label","value":"SI-7(1)[1][a]"}],"prose":"software requiring integrity checks to be performed;"},{"id":"si-7.1_obj.1.b","name":"objective","props":[{"name":"label","value":"SI-7(1)[1][b]"}],"prose":"firmware requiring integrity checks to be performed;"},{"id":"si-7.1_obj.1.c","name":"objective","props":[{"name":"label","value":"SI-7(1)[1][c]"}],"prose":"information requiring integrity checks to be performed;"}]},{"id":"si-7.1_obj.2","name":"objective","props":[{"name":"label","value":"SI-7(1)[2]"}],"prose":"the organization defines transitional states or security-relevant events requiring integrity checks of organization-defined:","parts":[{"id":"si-7.1_obj.2.a","name":"objective","props":[{"name":"label","value":"SI-7(1)[2][a]"}],"prose":"software;"},{"id":"si-7.1_obj.2.b","name":"objective","props":[{"name":"label","value":"SI-7(1)[2][b]"}],"prose":"firmware;"},{"id":"si-7.1_obj.2.c","name":"objective","props":[{"name":"label","value":"SI-7(1)[2][c]"}],"prose":"information;"}]},{"id":"si-7.1_obj.3","name":"objective","props":[{"name":"label","value":"SI-7(1)[3]"}],"prose":"the organization defines a frequency with which to perform an integrity check of organization-defined:","parts":[{"id":"si-7.1_obj.3.a","name":"objective","props":[{"name":"label","value":"SI-7(1)[3][a]"}],"prose":"software;"},{"id":"si-7.1_obj.3.b","name":"objective","props":[{"name":"label","value":"SI-7(1)[3][b]"}],"prose":"firmware;"},{"id":"si-7.1_obj.3.c","name":"objective","props":[{"name":"label","value":"SI-7(1)[3][c]"}],"prose":"information;"}]},{"id":"si-7.1_obj.4","name":"objective","props":[{"name":"label","value":"SI-7(1)[4]"}],"prose":"the information system performs an integrity check of organization-defined software, firmware, and information one or more of the following:","parts":[{"id":"si-7.1_obj.4.a","name":"objective","props":[{"name":"label","value":"SI-7(1)[4][a]"}],"prose":"at startup;"},{"id":"si-7.1_obj.4.b","name":"objective","props":[{"name":"label","value":"SI-7(1)[4][b]"}],"prose":"at organization-defined transitional states or security-relevant events; and\/or"},{"id":"si-7.1_obj.4.c","name":"objective","props":[{"name":"label","value":"SI-7(1)[4][c]"}],"prose":"with the organization-defined frequency."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing software, firmware, and information integrity\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nintegrity verification tools and associated documentation\n\nrecords of integrity scans\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for software, firmware, and\/or information integrity\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Software, firmware, and information integrity verification tools"}]}]},{"id":"si-7.7","class":"SP800-53-enhancement","title":"Integration of Detection and Response","params":[{"id":"si-7.7_prm_1","label":"organization-defined security-relevant changes to the information system"}],"props":[{"name":"label","value":"SI-7(7)"},{"name":"sort-id","value":"si-07.07"}],"parts":[{"id":"si-7.7_smt","name":"statement","prose":"The organization incorporates the detection of unauthorized {{ insert: param, si-7.7_prm_1 }} into the organizational incident response capability."},{"id":"si-7.7_gdn","name":"guidance","prose":"This control enhancement helps to ensure that detected events are tracked, monitored, corrected, and available for historical purposes. Maintaining historical records is important both for being able to identify and discern adversary actions over an extended period of time and for possible legal actions. Security-relevant changes include, for example, unauthorized changes to established configuration settings or unauthorized elevation of information system privileges.","links":[{"href":"#ir-4","rel":"related"},{"href":"#ir-5","rel":"related"},{"href":"#si-4","rel":"related"}]},{"id":"si-7.7_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-7.7_obj.1","name":"objective","props":[{"name":"label","value":"SI-7(7)[1]"}],"prose":"defines unauthorized security-relevant changes to the information system; and"},{"id":"si-7.7_obj.2","name":"objective","props":[{"name":"label","value":"SI-7(7)[2]"}],"prose":"incorporates the detection of unauthorized organization-defined security-relevant changes to the information system into the organizational incident response capability."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing software, firmware, and information integrity\n\nprocedures addressing incident response\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nincident response records\n\ninformation audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for software, firmware, and\/or information integrity\n\norganizational personnel with information security responsibilities\n\norganizational personnel with incident response responsibilities"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for incorporating detection of unauthorized security-relevant changes into the incident response capability\n\nsoftware, firmware, and information integrity verification tools\n\nautomated mechanisms supporting and\/or implementing incorporation of detection of unauthorized security-relevant changes into the incident response capability"}]}]}]},{"id":"si-8","class":"SP800-53","title":"Spam Protection","props":[{"name":"priority","value":"P2"},{"name":"label","value":"SI-8"},{"name":"sort-id","value":"si-08"}],"links":[{"href":"#c6e95ca0-5828-420e-b095-00895b72b5e8","rel":"reference"}],"parts":[{"id":"si-8_smt","name":"statement","prose":"The organization:","parts":[{"id":"si-8_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Employs spam protection mechanisms at information system entry and exit points to detect and take action on unsolicited messages; and"},{"id":"si-8_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Updates spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures."}]},{"id":"si-8_gdn","name":"guidance","prose":"Information system entry and exit points include, for example, firewalls, electronic mail servers, web servers, proxy servers, remote-access servers, workstations, mobile devices, and notebook\/laptop computers. Spam can be transported by different means including, for example, electronic mail, electronic mail attachments, and web accesses. Spam protection mechanisms include, for example, signature definitions.","links":[{"href":"#at-2","rel":"related"},{"href":"#at-3","rel":"related"},{"href":"#sc-5","rel":"related"},{"href":"#sc-7","rel":"related"},{"href":"#si-3","rel":"related"}]},{"id":"si-8_obj","name":"objective","prose":"Determine if the organization:","parts":[{"id":"si-8.a_obj","name":"objective","props":[{"name":"label","value":"SI-8(a)"}],"prose":"employs spam protection mechanisms:","parts":[{"id":"si-8.a_obj.1","name":"objective","props":[{"name":"label","value":"SI-8(a)[1]"}],"prose":"at information system entry points to detect unsolicited messages;"},{"id":"si-8.a_obj.2","name":"objective","props":[{"name":"label","value":"SI-8(a)[2]"}],"prose":"at information system entry points to take action on unsolicited messages;"},{"id":"si-8.a_obj.3","name":"objective","props":[{"name":"label","value":"SI-8(a)[3]"}],"prose":"at information system exit points to detect unsolicited messages;"},{"id":"si-8.a_obj.4","name":"objective","props":[{"name":"label","value":"SI-8(a)[4]"}],"prose":"at information system exit points to take action on unsolicited messages; and"}]},{"id":"si-8.b_obj","name":"objective","props":[{"name":"label","value":"SI-8(b)"}],"prose":"updates spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nconfiguration management policy and procedures (CM-1)\n\nprocedures addressing spam protection\n\nspam protection mechanisms\n\nrecords of spam protection updates\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for spam protection\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for implementing spam protection\n\nautomated mechanisms supporting and\/or implementing spam protection"}]}],"controls":[{"id":"si-8.1","class":"SP800-53-enhancement","title":"Central Management","props":[{"name":"label","value":"SI-8(1)"},{"name":"sort-id","value":"si-08.01"}],"parts":[{"id":"si-8.1_smt","name":"statement","prose":"The organization centrally manages spam protection mechanisms."},{"id":"si-8.1_gdn","name":"guidance","prose":"Central management is the organization-wide management and implementation of spam protection mechanisms. Central management includes planning, implementing, assessing, authorizing, and monitoring the organization-defined, centrally managed spam protection security controls.","links":[{"href":"#au-3","rel":"related"},{"href":"#si-2","rel":"related"},{"href":"#si-7","rel":"related"}]},{"id":"si-8.1_obj","name":"objective","prose":"Determine if the organization centrally manages spam protection mechanisms."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing spam protection\n\nspam protection mechanisms\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for spam protection\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for central management of spam protection\n\nautomated mechanisms supporting and\/or implementing central management of spam protection"}]}]},{"id":"si-8.2","class":"SP800-53-enhancement","title":"Automatic Updates","props":[{"name":"label","value":"SI-8(2)"},{"name":"sort-id","value":"si-08.02"}],"parts":[{"id":"si-8.2_smt","name":"statement","prose":"The information system automatically updates spam protection mechanisms."},{"id":"si-8.2_obj","name":"objective","prose":"Determine if the information system automatically updates spam protection mechanisms."},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing spam protection\n\nspam protection mechanisms\n\nrecords of spam protection updates\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for spam protection\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for spam protection\n\nautomated mechanisms supporting and\/or implementing automatic updates to spam protection mechanisms"}]}]}]},{"id":"si-10","class":"SP800-53","title":"Information Input Validation","params":[{"id":"si-10_prm_1","label":"organization-defined information inputs"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-10"},{"name":"sort-id","value":"si-10"}],"parts":[{"id":"si-10_smt","name":"statement","prose":"The information system checks the validity of {{ insert: param, si-10_prm_1 }}."},{"id":"si-10_gdn","name":"guidance","prose":"Checking the valid syntax and semantics of information system inputs (e.g., character set, length, numerical range, and acceptable values) verifies that inputs match specified definitions for format and content. Software applications typically follow well-defined protocols that use structured messages (i.e., commands or queries) to communicate between software modules or system components. Structured messages can contain raw or unstructured data interspersed with metadata or control information. If software applications use attacker-supplied inputs to construct structured messages without properly encoding such messages, then the attacker could insert malicious commands or special characters that can cause the data to be interpreted as control information or metadata. Consequently, the module or component that receives the tainted output will perform the wrong operations or otherwise interpret the data incorrectly. Prescreening inputs prior to passing to interpreters prevents the content from being unintentionally interpreted as commands. Input validation helps to ensure accurate and correct inputs and prevent attacks such as cross-site scripting and a variety of injection attacks."},{"id":"si-10_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-10_obj.1","name":"objective","props":[{"name":"label","value":"SI-10[1]"}],"prose":"the organization defines information inputs requiring validity checks; and"},{"id":"si-10_obj.2","name":"objective","props":[{"name":"label","value":"SI-10[2]"}],"prose":"the information system checks the validity of organization-defined information inputs."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\naccess control policy and procedures\n\nseparation of duties policy and procedures\n\nprocedures addressing information input validation\n\ndocumentation for automated tools and applications to verify validity of information\n\nlist of information inputs requiring validity checks\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for information input validation\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing validity checks on information inputs"}]}]},{"id":"si-11","class":"SP800-53","title":"Error Handling","params":[{"id":"si-11_prm_1","label":"organization-defined personnel or roles"}],"props":[{"name":"priority","value":"P2"},{"name":"label","value":"SI-11"},{"name":"sort-id","value":"si-11"}],"parts":[{"id":"si-11_smt","name":"statement","prose":"The information system:","parts":[{"id":"si-11_smt.a","name":"item","props":[{"name":"label","value":"a."}],"prose":"Generates error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries; and"},{"id":"si-11_smt.b","name":"item","props":[{"name":"label","value":"b."}],"prose":"Reveals error messages only to {{ insert: param, si-11_prm_1 }}."}]},{"id":"si-11_gdn","name":"guidance","prose":"Organizations carefully consider the structure\/content of error messages. The extent to which information systems are able to identify and handle error conditions is guided by organizational policy and operational requirements. Information that could be exploited by adversaries includes, for example, erroneous logon attempts with passwords entered by mistake as the username, mission\/business information that can be derived from (if not stated explicitly by) information recorded, and personal information such as account numbers, social security numbers, and credit card numbers. In addition, error messages may provide a covert channel for transmitting information.","links":[{"href":"#au-2","rel":"related"},{"href":"#au-3","rel":"related"},{"href":"#sc-31","rel":"related"}]},{"id":"si-11_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-11.a_obj","name":"objective","props":[{"name":"label","value":"SI-11(a)"}],"prose":"the information system generates error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries;"},{"id":"si-11.b_obj","name":"objective","props":[{"name":"label","value":"SI-11(b)"}],"parts":[{"id":"si-11.b_obj.1","name":"objective","props":[{"name":"label","value":"SI-11(b)[1]"}],"prose":"the organization defines personnel or roles to whom error messages are to be revealed; and"},{"id":"si-11.b_obj.2","name":"objective","props":[{"name":"label","value":"SI-11(b)[2]"}],"prose":"the information system reveals error messages only to organization-defined personnel or roles."}]}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing information system error handling\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\ndocumentation providing structure\/content of error messages\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for information input validation\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for error handling\n\nautomated mechanisms supporting and\/or implementing error handling\n\nautomated mechanisms supporting and\/or implementing management of error messages"}]}]},{"id":"si-12","class":"SP800-53","title":"Information Handling and Retention","props":[{"name":"priority","value":"P2"},{"name":"label","value":"SI-12"},{"name":"sort-id","value":"si-12"}],"parts":[{"id":"si-12_smt","name":"statement","prose":"The organization handles and retains information within the information system and information output from the system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements."},{"id":"si-12_gdn","name":"guidance","prose":"Information handling and retention requirements cover the full life cycle of information, in some cases extending beyond the disposal of information systems. The National Archives and Records Administration provides guidance on records retention.","links":[{"href":"#ac-16","rel":"related"},{"href":"#au-5","rel":"related"},{"href":"#au-11","rel":"related"},{"href":"#mp-2","rel":"related"},{"href":"#mp-4","rel":"related"}]},{"id":"si-12_obj","name":"objective","prose":"Determine if the organization, in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements:","parts":[{"id":"si-12_obj.1","name":"objective","props":[{"name":"label","value":"SI-12[1]"}],"prose":"handles information within the information system;"},{"id":"si-12_obj.2","name":"objective","props":[{"name":"label","value":"SI-12[2]"}],"prose":"handles output from the information system;"},{"id":"si-12_obj.3","name":"objective","props":[{"name":"label","value":"SI-12[3]"}],"prose":"retains information within the information system; and"},{"id":"si-12_obj.4","name":"objective","props":[{"name":"label","value":"SI-12[4]"}],"prose":"retains output from the information system."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nfederal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements applicable to information handling and retention\n\nmedia protection policy and procedures\n\nprocedures addressing information system output handling and retention\n\ninformation retention records, other relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for information handling and retention\n\norganizational personnel with information security responsibilities\/network administrators"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Organizational processes for information handling and retention\n\nautomated mechanisms supporting and\/or implementing information handling and retention"}]}]},{"id":"si-16","class":"SP800-53","title":"Memory Protection","params":[{"id":"si-16_prm_1","label":"organization-defined security safeguards"}],"props":[{"name":"priority","value":"P1"},{"name":"label","value":"SI-16"},{"name":"sort-id","value":"si-16"}],"parts":[{"id":"si-16_smt","name":"statement","prose":"The information system implements {{ insert: param, si-16_prm_1 }} to protect its memory from unauthorized code execution."},{"id":"si-16_gdn","name":"guidance","prose":"Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations that are prohibited. Security safeguards employed to protect memory include, for example, data execution prevention and address space layout randomization. Data execution prevention safeguards can either be hardware-enforced or software-enforced with hardware providing the greater strength of mechanism.","links":[{"href":"#ac-25","rel":"related"},{"href":"#sc-3","rel":"related"}]},{"id":"si-16_obj","name":"objective","prose":"Determine if:","parts":[{"id":"si-16_obj.1","name":"objective","props":[{"name":"label","value":"SI-16[1]"}],"prose":"the organization defines security safeguards to be implemented to protect information system memory from unauthorized code execution; and"},{"id":"si-16_obj.2","name":"objective","props":[{"name":"label","value":"SI-16[2]"}],"prose":"the information system implements organization-defined security safeguards to protect its memory from unauthorized code execution."}]},{"name":"assessment","props":[{"name":"method","value":"EXAMINE"}],"parts":[{"name":"objects","prose":"System and information integrity policy\n\nprocedures addressing memory protection for the information system\n\ninformation system design documentation\n\ninformation system configuration settings and associated documentation\n\nlist of security safeguards protecting information system memory from unauthorized code execution\n\ninformation system audit records\n\nother relevant documents or records"}]},{"name":"assessment","props":[{"name":"method","value":"INTERVIEW"}],"parts":[{"name":"objects","prose":"Organizational personnel with responsibility for memory protection\n\norganizational personnel with information security responsibilities\n\nsystem\/network administrators\n\nsystem developer"}]},{"name":"assessment","props":[{"name":"method","value":"TEST"}],"parts":[{"name":"objects","prose":"Automated mechanisms supporting and\/or implementing safeguards to protect information system memory from unauthorized code execution"}]}]}]}],"back-matter":{"resources":[{"uuid":"0c97e60b-325a-4efa-ba2b-90f20ccd5abc","title":"5 C.F.R. 731.106","citation":{"text":"Code of Federal Regulations, Title 5, Administrative Personnel, Section 731.106, Designation of Public Trust Positions and Investigative Requirements (5 C.F.R. 731.106)."},"rlinks":[{"href":"http:\/\/www.gpo.gov\/fdsys\/granule\/CFR-2012-title5-vol2\/CFR-2012-title5-vol2-sec731-106\/content-detail.html"}]},{"uuid":"bb61234b-46c3-4211-8c2b-9869222a720d","title":"C.F.R. Part 5 Subpart C (5 C.F.R. 930.301)","citation":{"text":"C.F.R. Part 5 Subpart C (5 C.F.R. 930.301)"},"rlinks":[{"href":"http:\/\/www.gpo.gov\/fdsys\/granule\/CFR-2009-title5-vol2\/CFR-2009-title5-vol2-sec930-301\/content-detail.html"}]},{"uuid":"a4aa9645-9a8a-4b51-90a9-e223250f9a75","title":"CNSS Policy 15","citation":{"text":"CNSS Policy 15"},"rlinks":[{"href":"https:\/\/www.cnss.gov\/policies.html"}]},{"uuid":"2d8b14e9-c8b5-4d3d-8bdc-155078f3281b","title":"DoD Information Assurance Vulnerability Alerts","citation":{"text":"DoD Information Assurance Vulnerability Alerts"}},{"uuid":"61081e7f-041d-4033-96a7-44a439071683","title":"DoD Instruction 5200.39","citation":{"text":"DoD Instruction 5200.39"},"rlinks":[{"href":"http:\/\/www.dtic.mil\/whs\/directives\/corres\/ins1.html"}]},{"uuid":"e42b2099-3e1c-415b-952c-61c96533c12e","title":"DoD Instruction 8551.01","citation":{"text":"DoD Instruction 8551.01"},"rlinks":[{"href":"http:\/\/www.dtic.mil\/whs\/directives\/corres\/ins1.html"}]},{"uuid":"e6522953-6714-435d-a0d3-140df554c186","title":"DoD Instruction 8552.01","citation":{"text":"DoD Instruction 8552.01"},"rlinks":[{"href":"http:\/\/www.dtic.mil\/whs\/directives\/corres\/ins1.html"}]},{"uuid":"c5034e0c-eba6-4ecd-a541-79f0678f4ba4","title":"Executive Order 13587","citation":{"text":"Executive Order 13587"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/the-press-office\/2011\/10\/07\/executive-order-13587-structural-reforms-improve-security-classified-net"}]},{"uuid":"56d671da-6b7b-4abf-8296-84b61980390a","title":"Federal Acquisition Regulation","citation":{"text":"Federal Acquisition Regulation"},"rlinks":[{"href":"https:\/\/acquisition.gov\/far"}]},{"uuid":"023104bc-6f75-4cd5-b7d0-fc92326f8007","title":"Federal Continuity Directive 1","citation":{"text":"Federal Continuity Directive 1"},"rlinks":[{"href":"http:\/\/www.fema.gov\/pdf\/about\/offices\/fcd1.pdf"}]},{"uuid":"ba557c91-ba3e-4792-adc6-a4ae479b39ff","title":"FICAM Roadmap and Implementation Guidance","citation":{"text":"FICAM Roadmap and Implementation Guidance"},"rlinks":[{"href":"http:\/\/www.idmanagement.gov\/documents\/ficam-roadmap-and-implementation-guidance"}]},{"uuid":"39f9087d-7687-46d2-8eda-b6f4b7a4d8a9","title":"FIPS Publication 140","citation":{"text":"FIPS Publication 140"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html"}]},{"uuid":"d715b234-9b5b-4e07-b1ed-99836727664d","title":"FIPS Publication 140-2","citation":{"text":"FIPS Publication 140-2"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#140-2"}]},{"uuid":"f2dbd4ec-c413-4714-b85b-6b7184d1c195","title":"FIPS Publication 197","citation":{"text":"FIPS Publication 197"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#197"}]},{"uuid":"e85cdb3f-7f0a-4083-8639-f13f70d3760b","title":"FIPS Publication 199","citation":{"text":"FIPS Publication 199"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#199"}]},{"uuid":"c80c10b3-1294-4984-a4cc-d1733ca432b9","title":"FIPS Publication 201","citation":{"text":"FIPS Publication 201"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsFIPS.html#201"}]},{"uuid":"ad733a42-a7ed-4774-b988-4930c28852f3","title":"HSPD-12","citation":{"text":"HSPD-12"},"rlinks":[{"href":"http:\/\/www.dhs.gov\/homeland-security-presidential-directive-12"}]},{"uuid":"4ef539ba-b767-4666-b0d3-168c53005fa3","title":"http:\/\/capec.mitre.org","citation":{"text":"http:\/\/capec.mitre.org"},"rlinks":[{"href":"http:\/\/capec.mitre.org"}]},{"uuid":"e95dd121-2733-413e-bf1e-f1eb49f20a98","title":"http:\/\/checklists.nist.gov","citation":{"text":"http:\/\/checklists.nist.gov"},"rlinks":[{"href":"http:\/\/checklists.nist.gov"}]},{"uuid":"6a1041fc-054e-4230-946b-2e6f4f3731bb","title":"http:\/\/csrc.nist.gov\/cryptval","citation":{"text":"http:\/\/csrc.nist.gov\/cryptval"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/cryptval"}]},{"uuid":"b09d1a31-d3c9-4138-a4f4-4c63816afd7d","title":"http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/index.html","citation":{"text":"http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/index.html"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/index.html"}]},{"uuid":"0931209f-00ae-4132-b92c-bc645847e8f9","title":"http:\/\/cve.mitre.org","citation":{"text":"http:\/\/cve.mitre.org"},"rlinks":[{"href":"http:\/\/cve.mitre.org"}]},{"uuid":"15522e92-9192-463d-9646-6a01982db8ca","title":"http:\/\/cwe.mitre.org","citation":{"text":"http:\/\/cwe.mitre.org"},"rlinks":[{"href":"http:\/\/cwe.mitre.org"}]},{"uuid":"5ed1f4d5-1494-421b-97ed-39d3c88ab51f","title":"http:\/\/fips201ep.cio.gov","citation":{"text":"http:\/\/fips201ep.cio.gov"},"rlinks":[{"href":"http:\/\/fips201ep.cio.gov"}]},{"uuid":"85280698-0417-489d-b214-12bb935fb939","title":"http:\/\/idmanagement.gov","citation":{"text":"http:\/\/idmanagement.gov"},"rlinks":[{"href":"http:\/\/idmanagement.gov"}]},{"uuid":"275cc052-0f7f-423c-bdb6-ed503dc36228","title":"http:\/\/nvd.nist.gov","citation":{"text":"http:\/\/nvd.nist.gov"},"rlinks":[{"href":"http:\/\/nvd.nist.gov"}]},{"uuid":"bbd50dd1-54ce-4432-959d-63ea564b1bb4","title":"http:\/\/www.acquisition.gov\/far","citation":{"text":"http:\/\/www.acquisition.gov\/far"},"rlinks":[{"href":"http:\/\/www.acquisition.gov\/far"}]},{"uuid":"9b97ed27-3dd6-4f9a-ade5-1b43e9669794","title":"http:\/\/www.cnss.gov","citation":{"text":"http:\/\/www.cnss.gov"},"rlinks":[{"href":"http:\/\/www.cnss.gov"}]},{"uuid":"3ac12e79-f54f-4a63-9f4b-ee4bcd4df604","title":"http:\/\/www.dhs.gov\/telecommunications-service-priority-tsp","citation":{"text":"http:\/\/www.dhs.gov\/telecommunications-service-priority-tsp"},"rlinks":[{"href":"http:\/\/www.dhs.gov\/telecommunications-service-priority-tsp"}]},{"uuid":"c95a9986-3cd6-4a98-931b-ccfc56cb11e5","title":"http:\/\/www.niap-ccevs.org","citation":{"text":"http:\/\/www.niap-ccevs.org"},"rlinks":[{"href":"http:\/\/www.niap-ccevs.org"}]},{"uuid":"647b6de3-81d0-4d22-bec1-5f1333e34380","title":"http:\/\/www.nsa.gov","citation":{"text":"http:\/\/www.nsa.gov"},"rlinks":[{"href":"http:\/\/www.nsa.gov"}]},{"uuid":"a47466c4-c837-4f06-a39f-e68412a5f73d","title":"http:\/\/www.nsa.gov\/ia\/mitigation_guidance\/media_destruction_guidance\/index.shtml","citation":{"text":"http:\/\/www.nsa.gov\/ia\/mitigation_guidance\/media_destruction_guidance\/index.shtml"},"rlinks":[{"href":"http:\/\/www.nsa.gov\/ia\/mitigation_guidance\/media_destruction_guidance\/index.shtml"}]},{"uuid":"02631467-668b-4233-989b-3dfded2fd184","title":"http:\/\/www.us-cert.gov","citation":{"text":"http:\/\/www.us-cert.gov"},"rlinks":[{"href":"http:\/\/www.us-cert.gov"}]},{"uuid":"6caa237b-531b-43ac-9711-d8f6b97b0377","title":"ICD 704","citation":{"text":"ICD 704"},"rlinks":[{"href":"http:\/\/www.dni.gov\/index.php\/intelligence-community\/ic-policies-reports\/intelligence-community-directives"}]},{"uuid":"398e33fd-f404-4e5c-b90e-2d50d3181244","title":"ICD 705","citation":{"text":"ICD 705"},"rlinks":[{"href":"http:\/\/www.dni.gov\/index.php\/intelligence-community\/ic-policies-reports\/intelligence-community-directives"}]},{"uuid":"1737a687-52fb-4008-b900-cbfa836f7b65","title":"ISO\/IEC 15408","citation":{"text":"ISO\/IEC 15408"},"rlinks":[{"href":"http:\/\/www.iso.org\/iso\/iso_catalog\/catalog_tc\/catalog_detail.htm?csnumber=50341"}]},{"uuid":"fb5844de-ff96-47c0-b258-4f52bcc2f30d","title":"National Communications Systems Directive 3-10","citation":{"text":"National Communications Systems Directive 3-10"}},{"uuid":"654f21e2-f3bc-43b2-abdc-60ab8d09744b","title":"National Strategy for Trusted Identities in Cyberspace","citation":{"text":"National Strategy for Trusted Identities in Cyberspace"},"rlinks":[{"href":"http:\/\/www.nist.gov\/nstic"}]},{"uuid":"9cb3d8fe-2127-48ba-821e-cdd2d7aee921","title":"NIST Special Publication 800-100","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-100"}],"citation":{"text":"NIST Special Publication 800-100"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-100"}]},{"uuid":"3cac5e7b-9ebf-4bbb-9af5-ae032de78e8e","title":"NIST Special Publication 800-111","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-111"}],"citation":{"text":"NIST Special Publication 800-111"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-111"}]},{"uuid":"349fe082-502d-464a-aa0c-1443c6a5cf40","title":"NIST Special Publication 800-113","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-113"}],"citation":{"text":"NIST Special Publication 800-113"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-113"}]},{"uuid":"1201fcf3-afb1-4675-915a-fb4ae0435717","title":"NIST Special Publication 800-114 Rev. 1","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-114r1"}],"citation":{"text":"NIST Special Publication 800-114 Rev. 1"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-114r1"}]},{"uuid":"c4691b88-57d1-463b-9053-2d0087913f31","title":"NIST Special Publication 800-115","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-115"}],"citation":{"text":"NIST Special Publication 800-115"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-115"}]},{"uuid":"2157bb7e-192c-4eaa-877f-93ef6b0a3292","title":"NIST Special Publication 800-116 Rev. 1","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-116r1"}],"citation":{"text":"NIST Special Publication 800-116 Rev. 1"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-116r1"}]},{"uuid":"5c201b63-0768-417b-ac22-3f014e3941b2","title":"NIST Special Publication 800-12 Rev. 1","document-ids":[{"scheme":"https:\/\/www.doi.org\/","identifier":"10.6028\/NIST.SP.800-12r1"}],"citation":{"text":"NIST Special Publication 800-12 Rev. 1"},"rlinks":[{"href":"https:\/\/doi.org\/10.6028\/NIST.SP.800-12r1"}]},{"uuid":"d1a4e2a9-e512-4132-8795-5357aba29254","title":"NIST Special Publication 800-121","citation":{"text":"NIST Special Publication 800-121"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-121"}]},{"uuid":"0293a393-fbe8-4ed1-b0b4-f6fbd3ae1589","title":"NIST Special Publication 800-124","citation":{"text":"NIST Special Publication 800-124"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-124"}]},{"uuid":"080f8068-5e3e-435e-9790-d22ba4722693","title":"NIST Special Publication 800-128","citation":{"text":"NIST Special Publication 800-128"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-128"}]},{"uuid":"cee2c6ca-0261-4a6f-b630-e41d8ffdd82b","title":"NIST Special Publication 800-137","citation":{"text":"NIST Special Publication 800-137"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-137"}]},{"uuid":"6bf8d24a-78dc-4727-a2ac-0e64d71c495c","title":"NIST Special Publication 800-147","citation":{"text":"NIST Special Publication 800-147"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-147"}]},{"uuid":"3878cc04-144a-483e-af62-8fe6f4ad6c7a","title":"NIST Special Publication 800-155","citation":{"text":"NIST Special Publication 800-155"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-155"}]},{"uuid":"825438c3-248d-4e30-a51e-246473ce6ada","title":"NIST Special Publication 800-16","citation":{"text":"NIST Special Publication 800-16"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-16"}]},{"uuid":"6513e480-fada-4876-abba-1397084dfb26","title":"NIST Special Publication 800-164","citation":{"text":"NIST Special Publication 800-164"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-164"}]},{"uuid":"9c5c9e8c-dc81-4f55-a11c-d71d7487790f","title":"NIST Special Publication 800-18","citation":{"text":"NIST Special Publication 800-18"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-18"}]},{"uuid":"0a5db899-f033-467f-8631-f5a8ba971475","title":"NIST Special Publication 800-23","citation":{"text":"NIST Special Publication 800-23"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-23"}]},{"uuid":"21b1ed35-56d2-40a8-bdfe-b461fffe322f","title":"NIST Special Publication 800-27","citation":{"text":"NIST Special Publication 800-27"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-27"}]},{"uuid":"e716cd51-d1d5-4c6a-967a-22e9fbbc42f1","title":"NIST Special Publication 800-28","citation":{"text":"NIST Special Publication 800-28"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-28"}]},{"uuid":"a466121b-f0e2-41f0-a5f9-deb0b5fe6b15","title":"NIST Special Publication 800-30","citation":{"text":"NIST Special Publication 800-30"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-30"}]},{"uuid":"8f174e91-844e-4cf1-a72a-45c119a3a8dd","title":"NIST Special Publication 800-32","citation":{"text":"NIST Special Publication 800-32"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-32"}]},{"uuid":"748a81b9-9cad-463f-abde-8b368167e70d","title":"NIST Special Publication 800-34","citation":{"text":"NIST Special Publication 800-34"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-34"}]},{"uuid":"0c775bc3-bfc3-42c7-a382-88949f503171","title":"NIST Special Publication 800-35","citation":{"text":"NIST Special Publication 800-35"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-35"}]},{"uuid":"d818efd3-db31-4953-8afa-9e76afe83ce2","title":"NIST Special Publication 800-36","citation":{"text":"NIST Special Publication 800-36"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-36"}]},{"uuid":"0a0c26b6-fd44-4274-8b36-93442d49d998","title":"NIST Special Publication 800-37","citation":{"text":"NIST Special Publication 800-37"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-37"}]},{"uuid":"d480aa6a-7a88-424e-a10c-ad1c7870354b","title":"NIST Special Publication 800-39","citation":{"text":"NIST Special Publication 800-39"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-39"}]},{"uuid":"bdd14f6c-41ab-4277-8d74-a0ce75a0eb1d","title":"NIST Special Publication 800-40","citation":{"text":"NIST Special Publication 800-40"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-40"}]},{"uuid":"756a8e86-57d5-4701-8382-f7a40439665a","title":"NIST Special Publication 800-41","citation":{"text":"NIST Special Publication 800-41"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-41"}]},{"uuid":"c6e95ca0-5828-420e-b095-00895b72b5e8","title":"NIST Special Publication 800-45","citation":{"text":"NIST Special Publication 800-45"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-45"}]},{"uuid":"5309d4d0-46f8-4213-a749-e7584164e5e8","title":"NIST Special Publication 800-46","citation":{"text":"NIST Special Publication 800-46"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-46"}]},{"uuid":"2711f068-734e-4afd-94ba-0b22247fbc88","title":"NIST Special Publication 800-47","citation":{"text":"NIST Special Publication 800-47"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-47"}]},{"uuid":"238ed479-eccb-49f6-82ec-ab74a7a428cf","title":"NIST Special Publication 800-48","citation":{"text":"NIST Special Publication 800-48"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-48"}]},{"uuid":"e12b5738-de74-4fb3-8317-a3995a8a1898","title":"NIST Special Publication 800-50","citation":{"text":"NIST Special Publication 800-50"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-50"}]},{"uuid":"90c5bc98-f9c4-44c9-98b7-787422f0999c","title":"NIST Special Publication 800-52","citation":{"text":"NIST Special Publication 800-52"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-52"}]},{"uuid":"cd4cf751-3312-4a55-b1a9-fad2f1db9119","title":"NIST Special Publication 800-53A","citation":{"text":"NIST Special Publication 800-53A"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-53A"}]},{"uuid":"81f09e01-d0b0-4ae2-aa6a-064ed9950070","title":"NIST Special Publication 800-56","citation":{"text":"NIST Special Publication 800-56"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-56"}]},{"uuid":"a6c774c0-bf50-4590-9841-2a5c1c91ac6f","title":"NIST Special Publication 800-57","citation":{"text":"NIST Special Publication 800-57"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-57"}]},{"uuid":"7783f3e7-09b3-478b-9aa2-4a76dfd0ea90","title":"NIST Special Publication 800-58","citation":{"text":"NIST Special Publication 800-58"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-58"}]},{"uuid":"f152844f-b1ef-4836-8729-6277078ebee1","title":"NIST Special Publication 800-60","citation":{"text":"NIST Special Publication 800-60"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-60"}]},{"uuid":"be95fb85-a53f-4624-bdbb-140075500aa3","title":"NIST Special Publication 800-61","citation":{"text":"NIST Special Publication 800-61"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-61"}]},{"uuid":"644f44a9-a2de-4494-9c04-cd37fba45471","title":"NIST Special Publication 800-63","citation":{"text":"NIST Special Publication 800-63"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-63"}]},{"uuid":"abd950ae-092f-4b7a-b374-1c7c67fe9350","title":"NIST Special Publication 800-64","citation":{"text":"NIST Special Publication 800-64"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-64"}]},{"uuid":"29fcfe59-33cd-494a-8756-5907ae3a8f92","title":"NIST Special Publication 800-65","citation":{"text":"NIST Special Publication 800-65"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-65"}]},{"uuid":"84a37532-6db6-477b-9ea8-f9085ebca0fc","title":"NIST Special Publication 800-70","citation":{"text":"NIST Special Publication 800-70"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-70"}]},{"uuid":"ead74ea9-4c9c-446d-9b92-bcbf0ad4b655","title":"NIST Special Publication 800-73","citation":{"text":"NIST Special Publication 800-73"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-73"}]},{"uuid":"2a71298a-ee90-490e-80ff-48c967173a47","title":"NIST Special Publication 800-76","citation":{"text":"NIST Special Publication 800-76"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-76"}]},{"uuid":"99f331f2-a9f0-46c2-9856-a3cbb9b89442","title":"NIST Special Publication 800-77","citation":{"text":"NIST Special Publication 800-77"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-77"}]},{"uuid":"2042d97b-f7f6-4c74-84f8-981867684659","title":"NIST Special Publication 800-78","citation":{"text":"NIST Special Publication 800-78"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-78"}]},{"uuid":"6af1e841-672c-46c4-b121-96f603d04be3","title":"NIST Special Publication 800-81","citation":{"text":"NIST Special Publication 800-81"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-81"}]},{"uuid":"6d431fee-658f-4a0e-9f2e-a38b5d398fab","title":"NIST Special Publication 800-83","citation":{"text":"NIST Special Publication 800-83"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-83"}]},{"uuid":"0243a05a-e8a3-4d51-9364-4a9d20b0dcdf","title":"NIST Special Publication 800-84","citation":{"text":"NIST Special Publication 800-84"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-84"}]},{"uuid":"263823e0-a971-4b00-959d-315b26278b22","title":"NIST Special Publication 800-88","citation":{"text":"NIST Special Publication 800-88"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-88"}]},{"uuid":"672fd561-b92b-4713-b9cf-6c9d9456728b","title":"NIST Special Publication 800-92","citation":{"text":"NIST Special Publication 800-92"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-92"}]},{"uuid":"d1b1d689-0f66-4474-9924-c81119758dc1","title":"NIST Special Publication 800-94","citation":{"text":"NIST Special Publication 800-94"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-94"}]},{"uuid":"1ebdf782-d95d-4a7b-8ec7-ee860951eced","title":"NIST Special Publication 800-95","citation":{"text":"NIST Special Publication 800-95"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-95"}]},{"uuid":"6f336ecd-f2a0-4c84-9699-0491d81b6e0d","title":"NIST Special Publication 800-97","citation":{"text":"NIST Special Publication 800-97"},"rlinks":[{"href":"http:\/\/csrc.nist.gov\/publications\/PubsSPs.html#800-97"}]},{"uuid":"06dff0ea-3848-4945-8d91-e955ee69f05d","title":"NSTISSI No. 7003","citation":{"text":"NSTISSI No. 7003"},"rlinks":[{"href":"http:\/\/www.cnss.gov\/Assets\/pdf\/nstissi_7003.pdf"}]},{"uuid":"9f77f845-e3ea-4ca4-b2c0-aa9eedc214ab","title":"OMB Circular A-130","citation":{"text":"OMB Circular A-130"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/omb\/circulars_a130_a130trans4"}]},{"uuid":"2c5884cd-7b96-425c-862a-99877e1cf909","title":"OMB Memorandum 02-01","citation":{"text":"OMB Memorandum 02-01"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/omb\/memoranda_m02-01"}]},{"uuid":"ff3bfb02-79b2-411f-8735-98dfe5af2ab0","title":"OMB Memorandum 04-04","citation":{"text":"OMB Memorandum 04-04"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy04\/m04-04.pdf"}]},{"uuid":"58ad6f27-af99-429f-86a8-8bb767b014b9","title":"OMB Memorandum 05-24","citation":{"text":"OMB Memorandum 05-24"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2005\/m05-24.pdf"}]},{"uuid":"4da24a96-6cf8-435d-9d1f-c73247cad109","title":"OMB Memorandum 06-16","citation":{"text":"OMB Memorandum 06-16"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2006\/m06-16.pdf"}]},{"uuid":"990268bf-f4a9-4c81-91ae-dc7d3115f4b1","title":"OMB Memorandum 07-11","citation":{"text":"OMB Memorandum 07-11"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2007\/m07-11.pdf"}]},{"uuid":"0b3d8ba9-051f-498d-81ea-97f0f018c612","title":"OMB Memorandum 07-18","citation":{"text":"OMB Memorandum 07-18"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2007\/m07-18.pdf"}]},{"uuid":"0916ef02-3618-411b-a525-565c088849a6","title":"OMB Memorandum 08-22","citation":{"text":"OMB Memorandum 08-22"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2008\/m08-22.pdf"}]},{"uuid":"28115a56-da6b-4d44-b1df-51dd7f048a3e","title":"OMB Memorandum 08-23","citation":{"text":"OMB Memorandum 08-23"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/assets\/omb\/memoranda\/fy2008\/m08-23.pdf"}]},{"uuid":"599fe9ba-4750-4450-9eeb-b95bd19a5e8f","title":"OMB Memorandum 10-06-2011","citation":{"text":"OMB Memorandum 10-06-2011"}},{"uuid":"74e740a4-c45d-49f3-a86e-eb747c549e01","title":"OMB Memorandum 11-11","citation":{"text":"OMB Memorandum 11-11"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/memoranda\/2011\/m11-11.pdf"}]},{"uuid":"bedb15b7-ec5c-4a68-807f-385125751fcd","title":"OMB Memorandum 11-33","citation":{"text":"OMB Memorandum 11-33"},"rlinks":[{"href":"http:\/\/www.whitehouse.gov\/sites\/default\/files\/omb\/memoranda\/2011\/m11-33.pdf"}]},{"uuid":"dd2f5acd-08f1-435a-9837-f8203088dc1a","title":"Personal Identity Verification (PIV) in Enterprise Physical Access Control System (E-PACS)","citation":{"text":"Personal Identity Verification (PIV) in Enterprise Physical Access Control System (E-PACS)"}},{"uuid":"8ade2fbe-e468-4ca8-9a40-54d7f23c32bb","title":"US-CERT Technical Cyber Security Alerts","citation":{"text":"US-CERT Technical Cyber Security Alerts"},"rlinks":[{"href":"http:\/\/www.us-cert.gov\/ncas\/alerts"}]}]}}} \ No newline at end of file diff --git a/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_MODERATE-baseline-resolved-profile_catalog.json b/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_MODERATE-baseline-resolved-profile_catalog.json index 96fba5b5..5485d5d3 100644 --- a/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_MODERATE-baseline-resolved-profile_catalog.json +++ b/nist.gov/SP800-53/rev4/json/NIST_SP-800-53_rev4_MODERATE-baseline-resolved-profile_catalog.json @@ -1,9 +1,9 @@ { "catalog": { - "uuid": "975aa476-c834-4b62-9e8b-f5d28a23962c", + "uuid": "4f3ed81e-6a9c-4b14-ac07-7d02ec09f643", "metadata": { "title": "NIST Special Publication 800-53 Revision 4 MODERATE IMPACT BASELINE", - "last-modified": "2023-11-02T11:49:43.964173-04:00", + "last-modified": "2023-12-05T21:54:48.24154Z", "version": "2015-01-22", "oscal-version": "1.1.1", "props": [ diff --git a/nist.gov/SP800-53/rev4/xml/NIST_SP-800-53_rev4_HIGH-baseline-resolved-profile_catalog.xml b/nist.gov/SP800-53/rev4/xml/NIST_SP-800-53_rev4_HIGH-baseline-resolved-profile_catalog.xml index 6f6db6a1..366acdae 100644 --- a/nist.gov/SP800-53/rev4/xml/NIST_SP-800-53_rev4_HIGH-baseline-resolved-profile_catalog.xml +++ b/nist.gov/SP800-53/rev4/xml/NIST_SP-800-53_rev4_HIGH-baseline-resolved-profile_catalog.xml @@ -1,9 +1,9 @@ + uuid="d3d0fe20-8c66-4ead-a7bf-10455eada4ac"> NIST Special Publication 800-53 Revision 4 HIGH IMPACT BASELINE - 2023-11-02T11:49:45.965719-04:00 + 2023-12-05T21:54:41.390821Z 2015-01-22 1.1.1 + uuid="90cfe612-52c5-4daa-8ec1-9a6c223fa571"> NIST Special Publication 800-53 Revision 4 LOW IMPACT BASELINE - 2023-11-02T11:49:37.69093-04:00 + 2023-12-05T21:54:40.489331Z 2015-01-22 1.1.1 + uuid="4f3ed81e-6a9c-4b14-ac07-7d02ec09f643"> NIST Special Publication 800-53 Revision 4 MODERATE IMPACT BASELINE - 2023-11-02T11:49:43.964173-04:00 + 2023-12-05T21:54:48.24154Z 2015-01-22 1.1.1 diff --git a/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_HIGH-baseline-resolved-profile_catalog.yaml b/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_HIGH-baseline-resolved-profile_catalog.yaml index 7a890d11..558d0bc8 100644 --- a/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_HIGH-baseline-resolved-profile_catalog.yaml +++ b/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_HIGH-baseline-resolved-profile_catalog.yaml @@ -1,9 +1,9 @@ catalog: - uuid: fa9322a2-ab84-423c-b677-8602000b4876 + uuid: 283e5a73-1997-40fe-8d7e-38abfe6c6b2b metadata: - title: NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE - last-modified: "2023-11-02T11:49:45.431064-04:00" - version: Final + title: NIST Special Publication 800-53 Revision 5.1.1 HIGH IMPACT BASELINE + last-modified: "2023-12-05T21:55:03.03012Z" + version: 5.1.1+u2 oscal-version: 1.1.1 props: - name: resolution-tool @@ -257,6 +257,9 @@ catalog: value: AC-01a.[01] class: sp800-53a prose: an access control policy is developed and documented; + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.a-2 name: assessment-objective props: @@ -264,6 +267,9 @@ catalog: value: AC-01a.[02] class: sp800-53a prose: 'the access control policy is disseminated to {{ insert: param, ac-01_odp.01 }};' + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.a-3 name: assessment-objective props: @@ -271,6 +277,9 @@ catalog: value: AC-01a.[03] class: sp800-53a prose: access control procedures to facilitate the implementation of the access control policy and associated controls are developed and documented; + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.a-4 name: assessment-objective props: @@ -278,6 +287,9 @@ catalog: value: AC-01a.[04] class: sp800-53a prose: 'the access control procedures are disseminated to {{ insert: param, ac-01_odp.02 }};' + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.a.1 name: assessment-objective props: @@ -299,6 +311,9 @@ catalog: value: AC-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses purpose;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-2 name: assessment-objective props: @@ -306,6 +321,9 @@ catalog: value: AC-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses scope;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-3 name: assessment-objective props: @@ -313,6 +331,9 @@ catalog: value: AC-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses roles;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-4 name: assessment-objective props: @@ -320,6 +341,9 @@ catalog: value: AC-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses responsibilities;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-5 name: assessment-objective props: @@ -327,6 +351,9 @@ catalog: value: AC-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses management commitment;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-6 name: assessment-objective props: @@ -334,6 +361,9 @@ catalog: value: AC-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses coordination among organizational entities;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-7 name: assessment-objective props: @@ -341,6 +371,12 @@ catalog: value: AC-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses compliance;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.b name: assessment-objective props: @@ -348,6 +384,15 @@ catalog: value: AC-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ac-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ac-1_smt.a.1' + rel: assessment-for + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.b name: assessment-objective props: @@ -355,6 +400,9 @@ catalog: value: AC-01b. class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the access control policy and procedures;' + links: + - href: '#ac-1_smt.b' + rel: assessment-for - id: ac-1_obj.c name: assessment-objective props: @@ -376,6 +424,9 @@ catalog: value: AC-01c.01[01] class: sp800-53a prose: 'the current access control policy is reviewed and updated {{ insert: param, ac-01_odp.05 }};' + links: + - href: '#ac-1_smt.c.1' + rel: assessment-for - id: ac-1_obj.c.1-2 name: assessment-objective props: @@ -383,6 +434,12 @@ catalog: value: AC-01c.01[02] class: sp800-53a prose: 'the current access control policy is reviewed and updated following {{ insert: param, ac-01_odp.06 }};' + links: + - href: '#ac-1_smt.c.1' + rel: assessment-for + links: + - href: '#ac-1_smt.c.1' + rel: assessment-for - id: ac-1_obj.c.2 name: assessment-objective props: @@ -397,6 +454,9 @@ catalog: value: AC-01c.02[01] class: sp800-53a prose: 'the current access control procedures are reviewed and updated {{ insert: param, ac-01_odp.07 }};' + links: + - href: '#ac-1_smt.c.2' + rel: assessment-for - id: ac-1_obj.c.2-2 name: assessment-objective props: @@ -404,6 +464,18 @@ catalog: value: AC-01c.02[02] class: sp800-53a prose: 'the current access control procedures are reviewed and updated following {{ insert: param, ac-01_odp.08 }}.' + links: + - href: '#ac-1_smt.c.2' + rel: assessment-for + links: + - href: '#ac-1_smt.c.2' + rel: assessment-for + links: + - href: '#ac-1_smt.c' + rel: assessment-for + links: + - href: '#ac-1_smt' + rel: assessment-for - id: ac-1_asm-examine name: assessment-method props: @@ -778,6 +850,9 @@ catalog: value: AC-02a.[01] class: sp800-53a prose: account types allowed for use within the system are defined and documented; + links: + - href: '#ac-2_smt.a' + rel: assessment-for - id: ac-2_obj.a-2 name: assessment-objective props: @@ -785,6 +860,12 @@ catalog: value: AC-02a.[02] class: sp800-53a prose: account types specifically prohibited for use within the system are defined and documented; + links: + - href: '#ac-2_smt.a' + rel: assessment-for + links: + - href: '#ac-2_smt.a' + rel: assessment-for - id: ac-2_obj.b name: assessment-objective props: @@ -792,6 +873,9 @@ catalog: value: AC-02b. class: sp800-53a prose: account managers are assigned; + links: + - href: '#ac-2_smt.b' + rel: assessment-for - id: ac-2_obj.c name: assessment-objective props: @@ -799,6 +883,9 @@ catalog: value: AC-02c. class: sp800-53a prose: ' {{ insert: param, ac-02_odp.01 }} for group and role membership are required;' + links: + - href: '#ac-2_smt.c' + rel: assessment-for - id: ac-2_obj.d name: assessment-objective props: @@ -813,6 +900,9 @@ catalog: value: AC-02d.01 class: sp800-53a prose: authorized users of the system are specified; + links: + - href: '#ac-2_smt.d.1' + rel: assessment-for - id: ac-2_obj.d.2 name: assessment-objective props: @@ -820,6 +910,9 @@ catalog: value: AC-02d.02 class: sp800-53a prose: group and role membership are specified; + links: + - href: '#ac-2_smt.d.2' + rel: assessment-for - id: ac-2_obj.d.3 name: assessment-objective props: @@ -834,6 +927,9 @@ catalog: value: AC-02d.03[01] class: sp800-53a prose: access authorizations (i.e., privileges) are specified for each account; + links: + - href: '#ac-2_smt.d.3' + rel: assessment-for - id: ac-2_obj.d.3-2 name: assessment-objective props: @@ -841,6 +937,15 @@ catalog: value: AC-02d.03[02] class: sp800-53a prose: ' {{ insert: param, ac-02_odp.02 }} are specified for each account;' + links: + - href: '#ac-2_smt.d.3' + rel: assessment-for + links: + - href: '#ac-2_smt.d.3' + rel: assessment-for + links: + - href: '#ac-2_smt.d' + rel: assessment-for - id: ac-2_obj.e name: assessment-objective props: @@ -848,6 +953,9 @@ catalog: value: AC-02e. class: sp800-53a prose: 'approvals are required by {{ insert: param, ac-02_odp.03 }} for requests to create accounts;' + links: + - href: '#ac-2_smt.e' + rel: assessment-for - id: ac-2_obj.f name: assessment-objective props: @@ -862,6 +970,9 @@ catalog: value: AC-02f.[01] class: sp800-53a prose: 'accounts are created in accordance with {{ insert: param, ac-02_odp.04 }};' + links: + - href: '#ac-2_smt.f' + rel: assessment-for - id: ac-2_obj.f-2 name: assessment-objective props: @@ -869,6 +980,9 @@ catalog: value: AC-02f.[02] class: sp800-53a prose: 'accounts are enabled in accordance with {{ insert: param, ac-02_odp.04 }};' + links: + - href: '#ac-2_smt.f' + rel: assessment-for - id: ac-2_obj.f-3 name: assessment-objective props: @@ -876,6 +990,9 @@ catalog: value: AC-02f.[03] class: sp800-53a prose: 'accounts are modified in accordance with {{ insert: param, ac-02_odp.04 }};' + links: + - href: '#ac-2_smt.f' + rel: assessment-for - id: ac-2_obj.f-4 name: assessment-objective props: @@ -883,6 +1000,9 @@ catalog: value: AC-02f.[04] class: sp800-53a prose: 'accounts are disabled in accordance with {{ insert: param, ac-02_odp.04 }};' + links: + - href: '#ac-2_smt.f' + rel: assessment-for - id: ac-2_obj.f-5 name: assessment-objective props: @@ -890,6 +1010,12 @@ catalog: value: AC-02f.[05] class: sp800-53a prose: 'accounts are removed in accordance with {{ insert: param, ac-02_odp.04 }};' + links: + - href: '#ac-2_smt.f' + rel: assessment-for + links: + - href: '#ac-2_smt.f' + rel: assessment-for - id: ac-2_obj.g name: assessment-objective props: @@ -897,6 +1023,9 @@ catalog: value: AC-02g. class: sp800-53a prose: 'the use of accounts is monitored; ' + links: + - href: '#ac-2_smt.g' + rel: assessment-for - id: ac-2_obj.h name: assessment-objective props: @@ -911,6 +1040,9 @@ catalog: value: AC-02h.01 class: sp800-53a prose: 'account managers and {{ insert: param, ac-02_odp.05 }} are notified within {{ insert: param, ac-02_odp.06 }} when accounts are no longer required;' + links: + - href: '#ac-2_smt.h.1' + rel: assessment-for - id: ac-2_obj.h.2 name: assessment-objective props: @@ -918,6 +1050,9 @@ catalog: value: AC-02h.02 class: sp800-53a prose: 'account managers and {{ insert: param, ac-02_odp.05 }} are notified within {{ insert: param, ac-02_odp.07 }} when users are terminated or transferred;' + links: + - href: '#ac-2_smt.h.2' + rel: assessment-for - id: ac-2_obj.h.3 name: assessment-objective props: @@ -925,6 +1060,12 @@ catalog: value: AC-02h.03 class: sp800-53a prose: 'account managers and {{ insert: param, ac-02_odp.05 }} are notified within {{ insert: param, ac-02_odp.08 }} when system usage or the need to know changes for an individual;' + links: + - href: '#ac-2_smt.h.3' + rel: assessment-for + links: + - href: '#ac-2_smt.h' + rel: assessment-for - id: ac-2_obj.i name: assessment-objective props: @@ -939,6 +1080,9 @@ catalog: value: AC-02i.01 class: sp800-53a prose: access to the system is authorized based on a valid access authorization; + links: + - href: '#ac-2_smt.i.1' + rel: assessment-for - id: ac-2_obj.i.2 name: assessment-objective props: @@ -946,6 +1090,9 @@ catalog: value: AC-02i.02 class: sp800-53a prose: access to the system is authorized based on intended system usage; + links: + - href: '#ac-2_smt.i.2' + rel: assessment-for - id: ac-2_obj.i.3 name: assessment-objective props: @@ -953,6 +1100,12 @@ catalog: value: AC-02i.03 class: sp800-53a prose: 'access to the system is authorized based on {{ insert: param, ac-02_odp.09 }};' + links: + - href: '#ac-2_smt.i.3' + rel: assessment-for + links: + - href: '#ac-2_smt.i' + rel: assessment-for - id: ac-2_obj.j name: assessment-objective props: @@ -960,6 +1113,9 @@ catalog: value: AC-02j. class: sp800-53a prose: 'accounts are reviewed for compliance with account management requirements {{ insert: param, ac-02_odp.10 }};' + links: + - href: '#ac-2_smt.j' + rel: assessment-for - id: ac-2_obj.k name: assessment-objective props: @@ -974,6 +1130,9 @@ catalog: value: AC-02k.[01] class: sp800-53a prose: a process is established for changing shared or group account authenticators (if deployed) when individuals are removed from the group; + links: + - href: '#ac-2_smt.k' + rel: assessment-for - id: ac-2_obj.k-2 name: assessment-objective props: @@ -981,6 +1140,12 @@ catalog: value: AC-02k.[02] class: sp800-53a prose: a process is implemented for changing shared or group account authenticators (if deployed) when individuals are removed from the group; + links: + - href: '#ac-2_smt.k' + rel: assessment-for + links: + - href: '#ac-2_smt.k' + rel: assessment-for - id: ac-2_obj.l name: assessment-objective props: @@ -995,6 +1160,9 @@ catalog: value: AC-02l.[01] class: sp800-53a prose: account management processes are aligned with personnel termination processes; + links: + - href: '#ac-2_smt.l' + rel: assessment-for - id: ac-2_obj.l-2 name: assessment-objective props: @@ -1002,6 +1170,15 @@ catalog: value: AC-02l.[02] class: sp800-53a prose: account management processes are aligned with personnel transfer processes. + links: + - href: '#ac-2_smt.l' + rel: assessment-for + links: + - href: '#ac-2_smt.l' + rel: assessment-for + links: + - href: '#ac-2_smt' + rel: assessment-for - id: ac-2_asm-examine name: assessment-method props: @@ -1122,6 +1299,9 @@ catalog: value: AC-02(01) class: sp800-53a prose: 'the management of system accounts is supported using {{ insert: param, ac-02.01_odp }}.' + links: + - href: '#ac-2.1_smt' + rel: assessment-for - id: ac-2.1_asm-examine name: assessment-method props: @@ -1234,6 +1414,9 @@ catalog: value: AC-02(02) class: sp800-53a prose: 'temporary and emergency accounts are automatically {{ insert: param, ac-02.02_odp.01 }} after {{ insert: param, ac-02.02_odp.02 }}.' + links: + - href: '#ac-2.2_smt' + rel: assessment-for - id: ac-2.2_asm-examine name: assessment-method props: @@ -1378,6 +1561,9 @@ catalog: value: AC-02(03)(a) class: sp800-53a prose: 'accounts are disabled within {{ insert: param, ac-02.03_odp.01 }} when the accounts have expired;' + links: + - href: '#ac-2.3_smt.a' + rel: assessment-for - id: ac-2.3_obj.b name: assessment-objective props: @@ -1385,6 +1571,9 @@ catalog: value: AC-02(03)(b) class: sp800-53a prose: 'accounts are disabled within {{ insert: param, ac-02.03_odp.01 }} when the accounts are no longer associated with a user or individual;' + links: + - href: '#ac-2.3_smt.b' + rel: assessment-for - id: ac-2.3_obj.c name: assessment-objective props: @@ -1392,6 +1581,9 @@ catalog: value: AC-02(03)(c) class: sp800-53a prose: 'accounts are disabled within {{ insert: param, ac-02.03_odp.01 }} when the accounts are in violation of organizational policy;' + links: + - href: '#ac-2.3_smt.c' + rel: assessment-for - id: ac-2.3_obj.d name: assessment-objective props: @@ -1399,6 +1591,12 @@ catalog: value: AC-02(03)(d) class: sp800-53a prose: 'accounts are disabled within {{ insert: param, ac-02.03_odp.01 }} when the accounts have been inactive for {{ insert: param, ac-02.03_odp.02 }}.' + links: + - href: '#ac-2.3_smt.d' + rel: assessment-for + links: + - href: '#ac-2.3_smt' + rel: assessment-for - id: ac-2.3_asm-examine name: assessment-method props: @@ -1503,6 +1701,9 @@ catalog: value: AC-02(04)[01] class: sp800-53a prose: account creation is automatically audited; + links: + - href: '#ac-2.4_smt' + rel: assessment-for - id: ac-2.4_obj-2 name: assessment-objective props: @@ -1510,6 +1711,9 @@ catalog: value: AC-02(04)[02] class: sp800-53a prose: account modification is automatically audited; + links: + - href: '#ac-2.4_smt' + rel: assessment-for - id: ac-2.4_obj-3 name: assessment-objective props: @@ -1517,6 +1721,9 @@ catalog: value: AC-02(04)[03] class: sp800-53a prose: account enabling is automatically audited; + links: + - href: '#ac-2.4_smt' + rel: assessment-for - id: ac-2.4_obj-4 name: assessment-objective props: @@ -1524,6 +1731,9 @@ catalog: value: AC-02(04)[04] class: sp800-53a prose: account disabling is automatically audited; + links: + - href: '#ac-2.4_smt' + rel: assessment-for - id: ac-2.4_obj-5 name: assessment-objective props: @@ -1531,6 +1741,12 @@ catalog: value: AC-02(04)[05] class: sp800-53a prose: account removal actions are automatically audited. + links: + - href: '#ac-2.4_smt' + rel: assessment-for + links: + - href: '#ac-2.4_smt' + rel: assessment-for - id: ac-2.4_asm-examine name: assessment-method props: @@ -1634,6 +1850,9 @@ catalog: value: AC-02(05) class: sp800-53a prose: 'users are required to log out when {{ insert: param, ac-02.05_odp }}.' + links: + - href: '#ac-2.5_smt' + rel: assessment-for - id: ac-2.5_asm-examine name: assessment-method props: @@ -1732,6 +1951,9 @@ catalog: value: AC-02(11) class: sp800-53a prose: ' {{ insert: param, ac-02.11_odp.01 }} for {{ insert: param, ac-02.11_odp.02 }} are enforced.' + links: + - href: '#ac-2.11_smt' + rel: assessment-for - id: ac-2.11_asm-examine name: assessment-method props: @@ -1874,6 +2096,9 @@ catalog: value: AC-02(12)(a) class: sp800-53a prose: 'system accounts are monitored for {{ insert: param, ac-02.12_odp.01 }}; ' + links: + - href: '#ac-2.12_smt.a' + rel: assessment-for - id: ac-2.12_obj.b name: assessment-objective props: @@ -1881,6 +2106,12 @@ catalog: value: AC-02(12)(b) class: sp800-53a prose: 'atypical usage of system accounts is reported to {{ insert: param, ac-02.12_odp.02 }}.' + links: + - href: '#ac-2.12_smt.b' + rel: assessment-for + links: + - href: '#ac-2.12_smt' + rel: assessment-for - id: ac-2.12_asm-examine name: assessment-method props: @@ -1999,6 +2230,9 @@ catalog: value: AC-02(13) class: sp800-53a prose: 'accounts of individuals are disabled within {{ insert: param, ac-02.13_odp.01 }} of discovery of {{ insert: param, ac-02.13_odp.02 }}.' + links: + - href: '#ac-2.13_smt' + rel: assessment-for - id: ac-2.13_asm-examine name: assessment-method props: @@ -2136,6 +2370,8 @@ catalog: rel: related - href: '#ia-11' rel: related + - href: '#ia-13' + rel: related - href: '#ma-3' rel: related - href: '#ma-4' @@ -2188,6 +2424,9 @@ catalog: value: AC-03 class: sp800-53a prose: approved authorizations for logical access to information and system resources are enforced in accordance with applicable access control policies. + links: + - href: '#ac-3_smt' + rel: assessment-for - id: ac-3_asm-examine name: assessment-method props: @@ -2333,6 +2572,9 @@ catalog: value: AC-04 class: sp800-53a prose: 'approved authorizations are enforced for controlling the flow of information within the system and between connected systems based on {{ insert: param, ac-04_odp }}.' + links: + - href: '#ac-4_smt' + rel: assessment-for - id: ac-4_asm-examine name: assessment-method props: @@ -2473,6 +2715,9 @@ catalog: value: AC-04(04) class: sp800-53a prose: 'encrypted information is prevented from bypassing {{ insert: param, ac-04.04_odp.01 }} by {{ insert: param, ac-04.04_odp.02 }}.' + links: + - href: '#ac-4.4_smt' + rel: assessment-for - id: ac-4.4_asm-examine name: assessment-method props: @@ -2623,6 +2868,9 @@ catalog: value: AC-05a. class: sp800-53a prose: ' {{ insert: param, ac-05_odp }} are identified and documented;' + links: + - href: '#ac-5_smt.a' + rel: assessment-for - id: ac-5_obj.b name: assessment-objective props: @@ -2630,6 +2878,12 @@ catalog: value: AC-05b. class: sp800-53a prose: system access authorizations to support separation of duties are defined. + links: + - href: '#ac-5_smt.b' + rel: assessment-for + links: + - href: '#ac-5_smt' + rel: assessment-for - id: ac-5_asm-examine name: assessment-method props: @@ -2739,6 +2993,9 @@ catalog: value: AC-06 class: sp800-53a prose: the principle of least privilege is employed, allowing only authorized accesses for users (or processes acting on behalf of users) that are necessary to accomplish assigned organizational tasks. + links: + - href: '#ac-6_smt' + rel: assessment-for - id: ac-6_asm-examine name: assessment-method props: @@ -2922,6 +3179,9 @@ catalog: value: AC-06(01)(a)[01] class: sp800-53a prose: 'access is authorized for {{ insert: param, ac-06.01_odp.01 }} to {{ insert: param, ac-06.01_odp.02 }};' + links: + - href: '#ac-6.1_smt.a' + rel: assessment-for - id: ac-6.1_obj.a-2 name: assessment-objective props: @@ -2929,6 +3189,9 @@ catalog: value: AC-06(01)(a)[02] class: sp800-53a prose: 'access is authorized for {{ insert: param, ac-06.01_odp.01 }} to {{ insert: param, ac-06.01_odp.03 }};' + links: + - href: '#ac-6.1_smt.a' + rel: assessment-for - id: ac-6.1_obj.a-3 name: assessment-objective props: @@ -2936,6 +3199,12 @@ catalog: value: AC-06(01)(a)[03] class: sp800-53a prose: 'access is authorized for {{ insert: param, ac-06.01_odp.01 }} to {{ insert: param, ac-06.01_odp.04 }};' + links: + - href: '#ac-6.1_smt.a' + rel: assessment-for + links: + - href: '#ac-6.1_smt.a' + rel: assessment-for - id: ac-6.1_obj.b name: assessment-objective props: @@ -2943,6 +3212,12 @@ catalog: value: AC-06(01)(b) class: sp800-53a prose: 'access is authorized for {{ insert: param, ac-06.01_odp.01 }} to {{ insert: param, ac-06.01_odp.05 }}.' + links: + - href: '#ac-6.1_smt.b' + rel: assessment-for + links: + - href: '#ac-6.1_smt' + rel: assessment-for - id: ac-6.1_asm-examine name: assessment-method props: @@ -3047,6 +3322,9 @@ catalog: value: AC-06(02) class: sp800-53a prose: 'users of system accounts (or roles) with access to {{ insert: param, ac-06.02_odp }} are required to use non-privileged accounts or roles when accessing non-security functions.' + links: + - href: '#ac-6.2_smt' + rel: assessment-for - id: ac-6.2_asm-examine name: assessment-method props: @@ -3166,6 +3444,9 @@ catalog: value: AC-06(03)[01] class: sp800-53a prose: 'network access to {{ insert: param, ac-06.03_odp.01 }} is authorized only for {{ insert: param, ac-06.03_odp.02 }};' + links: + - href: '#ac-6.3_smt' + rel: assessment-for - id: ac-6.3_obj-2 name: assessment-objective props: @@ -3173,6 +3454,12 @@ catalog: value: AC-06(03)[02] class: sp800-53a prose: the rationale for authorizing network access to privileged commands is documented in the security plan for the system. + links: + - href: '#ac-6.3_smt' + rel: assessment-for + links: + - href: '#ac-6.3_smt' + rel: assessment-for - id: ac-6.3_asm-examine name: assessment-method props: @@ -3273,6 +3560,9 @@ catalog: value: AC-06(05) class: sp800-53a prose: 'privileged accounts on the system are restricted to {{ insert: param, ac-06.05_odp }}.' + links: + - href: '#ac-6.5_smt' + rel: assessment-for - id: ac-6.5_asm-examine name: assessment-method props: @@ -3405,6 +3695,9 @@ catalog: value: AC-06(07)(a) class: sp800-53a prose: 'privileges assigned to {{ insert: param, ac-06.07_odp.02 }} are reviewed {{ insert: param, ac-06.07_odp.01 }} to validate the need for such privileges;' + links: + - href: '#ac-6.7_smt.a' + rel: assessment-for - id: ac-6.7_obj.b name: assessment-objective props: @@ -3412,6 +3705,12 @@ catalog: value: AC-06(07)(b) class: sp800-53a prose: privileges are reassigned or removed, if necessary, to correctly reflect organizational mission and business needs. + links: + - href: '#ac-6.7_smt.b' + rel: assessment-for + links: + - href: '#ac-6.7_smt' + rel: assessment-for - id: ac-6.7_asm-examine name: assessment-method props: @@ -3509,6 +3808,9 @@ catalog: value: AC-06(09) class: sp800-53a prose: the execution of privileged functions is logged. + links: + - href: '#ac-6.9_smt' + rel: assessment-for - id: ac-6.9_asm-examine name: assessment-method props: @@ -3600,6 +3902,9 @@ catalog: value: AC-06(10) class: sp800-53a prose: non-privileged users are prevented from executing privileged functions. + links: + - href: '#ac-6.10_smt' + rel: assessment-for - id: ac-6.10_asm-examine name: assessment-method props: @@ -3784,6 +4089,9 @@ catalog: value: AC-07a. class: sp800-53a prose: 'a limit of {{ insert: param, ac-07_odp.01 }} consecutive invalid logon attempts by a user during {{ insert: param, ac-07_odp.02 }} is enforced;' + links: + - href: '#ac-7_smt.a' + rel: assessment-for - id: ac-7_obj.b name: assessment-objective props: @@ -3791,6 +4099,12 @@ catalog: value: AC-07b. class: sp800-53a prose: 'automatically {{ insert: param, ac-07_odp.03 }} when the maximum number of unsuccessful attempts is exceeded.' + links: + - href: '#ac-7_smt.b' + rel: assessment-for + links: + - href: '#ac-7_smt' + rel: assessment-for - id: ac-7_asm-examine name: assessment-method props: @@ -3984,6 +4298,9 @@ catalog: value: AC-08a.01 class: sp800-53a prose: the system use notification states that users are accessing a U.S. Government system; + links: + - href: '#ac-8_smt.a.1' + rel: assessment-for - id: ac-8_obj.a.2 name: assessment-objective props: @@ -3991,6 +4308,9 @@ catalog: value: AC-08a.02 class: sp800-53a prose: the system use notification states that system usage may be monitored, recorded, and subject to audit; + links: + - href: '#ac-8_smt.a.2' + rel: assessment-for - id: ac-8_obj.a.3 name: assessment-objective props: @@ -3998,6 +4318,9 @@ catalog: value: AC-08a.03 class: sp800-53a prose: the system use notification states that unauthorized use of the system is prohibited and subject to criminal and civil penalties; and + links: + - href: '#ac-8_smt.a.3' + rel: assessment-for - id: ac-8_obj.a.4 name: assessment-objective props: @@ -4005,6 +4328,12 @@ catalog: value: AC-08a.04 class: sp800-53a prose: the system use notification states that use of the system indicates consent to monitoring and recording; + links: + - href: '#ac-8_smt.a.4' + rel: assessment-for + links: + - href: '#ac-8_smt.a' + rel: assessment-for - id: ac-8_obj.b name: assessment-objective props: @@ -4012,6 +4341,9 @@ catalog: value: AC-08b. class: sp800-53a prose: the notification message or banner is retained on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the system; + links: + - href: '#ac-8_smt.b' + rel: assessment-for - id: ac-8_obj.c name: assessment-objective props: @@ -4026,6 +4358,9 @@ catalog: value: AC-08c.01 class: sp800-53a prose: 'for publicly accessible systems, system use information {{ insert: param, ac-08_odp.02 }} is displayed before granting further access to the publicly accessible system;' + links: + - href: '#ac-8_smt.c.1' + rel: assessment-for - id: ac-8_obj.c.2 name: assessment-objective props: @@ -4033,6 +4368,9 @@ catalog: value: AC-08c.02 class: sp800-53a prose: for publicly accessible systems, any references to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities are displayed; + links: + - href: '#ac-8_smt.c.2' + rel: assessment-for - id: ac-8_obj.c.3 name: assessment-objective props: @@ -4040,6 +4378,15 @@ catalog: value: AC-08c.03 class: sp800-53a prose: for publicly accessible systems, a description of the authorized uses of the system is included. + links: + - href: '#ac-8_smt.c.3' + rel: assessment-for + links: + - href: '#ac-8_smt.c' + rel: assessment-for + links: + - href: '#ac-8_smt' + rel: assessment-for - id: ac-8_asm-examine name: assessment-method props: @@ -4163,6 +4510,9 @@ catalog: value: AC-10 class: sp800-53a prose: 'the number of concurrent sessions for each {{ insert: param, ac-10_odp.01 }} is limited to {{ insert: param, ac-10_odp.02 }}.' + links: + - href: '#ac-10_smt' + rel: assessment-for - id: ac-10_asm-examine name: assessment-method props: @@ -4296,6 +4646,9 @@ catalog: value: AC-11a. class: sp800-53a prose: 'further access to the system is prevented by {{ insert: param, ac-11_odp.01 }};' + links: + - href: '#ac-11_smt.a' + rel: assessment-for - id: ac-11_obj.b name: assessment-objective props: @@ -4303,6 +4656,12 @@ catalog: value: AC-11b. class: sp800-53a prose: device lock is retained until the user re-establishes access using established identification and authentication procedures. + links: + - href: '#ac-11_smt.b' + rel: assessment-for + links: + - href: '#ac-11_smt' + rel: assessment-for - id: ac-11_asm-examine name: assessment-method props: @@ -4391,6 +4750,9 @@ catalog: value: AC-11(01) class: sp800-53a prose: information previously visible on the display is concealed, via device lock, with a publicly viewable image. + links: + - href: '#ac-11.1_smt' + rel: assessment-for - id: ac-11.1_asm-examine name: assessment-method props: @@ -4494,6 +4856,9 @@ catalog: value: AC-12 class: sp800-53a prose: 'a user session is automatically terminated after {{ insert: param, ac-12_odp }}.' + links: + - href: '#ac-12_smt' + rel: assessment-for - id: ac-12_asm-examine name: assessment-method props: @@ -4615,6 +4980,9 @@ catalog: value: AC-14a. class: sp800-53a prose: ' {{ insert: param, ac-14_odp }} that can be performed on the system without identification or authentication consistent with organizational mission and business functions are identified;' + links: + - href: '#ac-14_smt.a' + rel: assessment-for - id: ac-14_obj.b name: assessment-objective props: @@ -4629,6 +4997,9 @@ catalog: value: AC-14b.[01] class: sp800-53a prose: user actions not requiring identification or authentication are documented in the security plan for the system; + links: + - href: '#ac-14_smt.b' + rel: assessment-for - id: ac-14_obj.b-2 name: assessment-objective props: @@ -4636,6 +5007,15 @@ catalog: value: AC-14b.[02] class: sp800-53a prose: a rationale for user actions not requiring identification or authentication is provided in the security plan for the system. + links: + - href: '#ac-14_smt.b' + rel: assessment-for + links: + - href: '#ac-14_smt.b' + rel: assessment-for + links: + - href: '#ac-14_smt' + rel: assessment-for - id: ac-14_asm-examine name: assessment-method props: @@ -4783,6 +5163,9 @@ catalog: value: AC-17a.[01] class: sp800-53a prose: usage restrictions are established and documented for each type of remote access allowed; + links: + - href: '#ac-17_smt.a' + rel: assessment-for - id: ac-17_obj.a-2 name: assessment-objective props: @@ -4790,6 +5173,9 @@ catalog: value: AC-17a.[02] class: sp800-53a prose: configuration/connection requirements are established and documented for each type of remote access allowed; + links: + - href: '#ac-17_smt.a' + rel: assessment-for - id: ac-17_obj.a-3 name: assessment-objective props: @@ -4797,6 +5183,12 @@ catalog: value: AC-17a.[03] class: sp800-53a prose: implementation guidance is established and documented for each type of remote access allowed; + links: + - href: '#ac-17_smt.a' + rel: assessment-for + links: + - href: '#ac-17_smt.a' + rel: assessment-for - id: ac-17_obj.b name: assessment-objective props: @@ -4804,6 +5196,12 @@ catalog: value: AC-17b. class: sp800-53a prose: each type of remote access to the system is authorized prior to allowing such connections. + links: + - href: '#ac-17_smt.b' + rel: assessment-for + links: + - href: '#ac-17_smt' + rel: assessment-for - id: ac-17_asm-examine name: assessment-method props: @@ -4910,6 +5308,9 @@ catalog: value: AC-17(01)[01] class: sp800-53a prose: automated mechanisms are employed to monitor remote access methods; + links: + - href: '#ac-17.1_smt' + rel: assessment-for - id: ac-17.1_obj-2 name: assessment-objective props: @@ -4917,6 +5318,12 @@ catalog: value: AC-17(01)[02] class: sp800-53a prose: automated mechanisms are employed to control remote access methods. + links: + - href: '#ac-17.1_smt' + rel: assessment-for + links: + - href: '#ac-17.1_smt' + rel: assessment-for - id: ac-17.1_asm-examine name: assessment-method props: @@ -5010,6 +5417,9 @@ catalog: value: AC-17(02) class: sp800-53a prose: cryptographic mechanisms are implemented to protect the confidentiality and integrity of remote access sessions. + links: + - href: '#ac-17.2_smt' + rel: assessment-for - id: ac-17.2_asm-examine name: assessment-method props: @@ -5099,6 +5509,9 @@ catalog: value: AC-17(03) class: sp800-53a prose: remote accesses are routed through authorized and managed network access control points. + links: + - href: '#ac-17.3_smt' + rel: assessment-for - id: ac-17.3_asm-examine name: assessment-method props: @@ -5242,6 +5655,9 @@ catalog: value: AC-17(04)(a)[01] class: sp800-53a prose: the execution of privileged commands via remote access is authorized only in a format that provides assessable evidence; + links: + - href: '#ac-17.4_smt.a' + rel: assessment-for - id: ac-17.4_obj.a-2 name: assessment-objective props: @@ -5249,6 +5665,9 @@ catalog: value: AC-17(04)(a)[02] class: sp800-53a prose: access to security-relevant information via remote access is authorized only in a format that provides assessable evidence; + links: + - href: '#ac-17.4_smt.a' + rel: assessment-for - id: ac-17.4_obj.a-3 name: assessment-objective props: @@ -5256,6 +5675,9 @@ catalog: value: AC-17(04)(a)[03] class: sp800-53a prose: 'the execution of privileged commands via remote access is authorized only for the following needs: {{ insert: param, ac-17.04_odp.01 }};' + links: + - href: '#ac-17.4_smt.a' + rel: assessment-for - id: ac-17.4_obj.a-4 name: assessment-objective props: @@ -5263,6 +5685,12 @@ catalog: value: AC-17(04)(a)[04] class: sp800-53a prose: 'access to security-relevant information via remote access is authorized only for the following needs: {{ insert: param, ac-17.04_odp.02 }};' + links: + - href: '#ac-17.4_smt.a' + rel: assessment-for + links: + - href: '#ac-17.4_smt.a' + rel: assessment-for - id: ac-17.4_obj.b name: assessment-objective props: @@ -5270,6 +5698,12 @@ catalog: value: AC-17(04)(b) class: sp800-53a prose: the rationale for remote access is documented in the security plan for the system. + links: + - href: '#ac-17.4_smt.b' + rel: assessment-for + links: + - href: '#ac-17.4_smt' + rel: assessment-for - id: ac-17.4_asm-examine name: assessment-method props: @@ -5407,6 +5841,9 @@ catalog: value: AC-18a.[01] class: sp800-53a prose: configuration requirements are established for each type of wireless access; + links: + - href: '#ac-18_smt.a' + rel: assessment-for - id: ac-18_obj.a-2 name: assessment-objective props: @@ -5414,6 +5851,9 @@ catalog: value: AC-18a.[02] class: sp800-53a prose: connection requirements are established for each type of wireless access; + links: + - href: '#ac-18_smt.a' + rel: assessment-for - id: ac-18_obj.a-3 name: assessment-objective props: @@ -5421,6 +5861,12 @@ catalog: value: AC-18a.[03] class: sp800-53a prose: implementation guidance is established for each type of wireless access; + links: + - href: '#ac-18_smt.a' + rel: assessment-for + links: + - href: '#ac-18_smt.a' + rel: assessment-for - id: ac-18_obj.b name: assessment-objective props: @@ -5428,6 +5874,12 @@ catalog: value: AC-18b. class: sp800-53a prose: each type of wireless access to the system is authorized prior to allowing such connections. + links: + - href: '#ac-18_smt.b' + rel: assessment-for + links: + - href: '#ac-18_smt' + rel: assessment-for - id: ac-18_asm-examine name: assessment-method props: @@ -5542,6 +5994,9 @@ catalog: value: AC-18(01)[01] class: sp800-53a prose: 'wireless access to the system is protected using authentication of {{ insert: param, ac-18.01_odp }};' + links: + - href: '#ac-18.1_smt' + rel: assessment-for - id: ac-18.1_obj-2 name: assessment-objective props: @@ -5549,6 +6004,12 @@ catalog: value: AC-18(01)[02] class: sp800-53a prose: wireless access to the system is protected using encryption. + links: + - href: '#ac-18.1_smt' + rel: assessment-for + links: + - href: '#ac-18.1_smt' + rel: assessment-for - id: ac-18.1_asm-examine name: assessment-method props: @@ -5637,6 +6098,9 @@ catalog: value: AC-18(03) class: sp800-53a prose: when not intended for use, wireless networking capabilities embedded within system components are disabled prior to issuance and deployment. + links: + - href: '#ac-18.3_smt' + rel: assessment-for - id: ac-18.3_asm-examine name: assessment-method props: @@ -5731,6 +6195,9 @@ catalog: value: AC-18(04)[01] class: sp800-53a prose: users allowed to independently configure wireless networking capabilities are identified; + links: + - href: '#ac-18.4_smt' + rel: assessment-for - id: ac-18.4_obj-2 name: assessment-objective props: @@ -5738,6 +6205,12 @@ catalog: value: AC-18(04)[02] class: sp800-53a prose: users allowed to independently configure wireless networking capabilities are explicitly authorized. + links: + - href: '#ac-18.4_smt' + rel: assessment-for + links: + - href: '#ac-18.4_smt' + rel: assessment-for - id: ac-18.4_asm-examine name: assessment-method props: @@ -5830,6 +6303,9 @@ catalog: value: AC-18(05)[01] class: sp800-53a prose: radio antennas are selected to reduce the probability that signals from wireless access points can be received outside of organization-controlled boundaries; + links: + - href: '#ac-18.5_smt' + rel: assessment-for - id: ac-18.5_obj-2 name: assessment-objective props: @@ -5837,6 +6313,12 @@ catalog: value: AC-18(05)[02] class: sp800-53a prose: transmission power levels are calibrated to reduce the probability that signals from wireless access points can be received outside of organization-controlled boundaries. + links: + - href: '#ac-18.5_smt' + rel: assessment-for + links: + - href: '#ac-18.5_smt' + rel: assessment-for - id: ac-18.5_asm-examine name: assessment-method props: @@ -6002,6 +6484,9 @@ catalog: value: AC-19a.[01] class: sp800-53a prose: configuration requirements are established for organization-controlled mobile devices, including when such devices are outside of the controlled area; + links: + - href: '#ac-19_smt.a' + rel: assessment-for - id: ac-19_obj.a-2 name: assessment-objective props: @@ -6009,6 +6494,9 @@ catalog: value: AC-19a.[02] class: sp800-53a prose: connection requirements are established for organization-controlled mobile devices, including when such devices are outside of the controlled area; + links: + - href: '#ac-19_smt.a' + rel: assessment-for - id: ac-19_obj.a-3 name: assessment-objective props: @@ -6016,6 +6504,12 @@ catalog: value: AC-19a.[03] class: sp800-53a prose: implementation guidance is established for organization-controlled mobile devices, including when such devices are outside of the controlled area; + links: + - href: '#ac-19_smt.a' + rel: assessment-for + links: + - href: '#ac-19_smt.a' + rel: assessment-for - id: ac-19_obj.b name: assessment-objective props: @@ -6023,6 +6517,12 @@ catalog: value: AC-19b. class: sp800-53a prose: the connection of mobile devices to organizational systems is authorized. + links: + - href: '#ac-19_smt.b' + rel: assessment-for + links: + - href: '#ac-19_smt' + rel: assessment-for - id: ac-19_asm-examine name: assessment-method props: @@ -6144,6 +6644,9 @@ catalog: value: AC-19(05) class: sp800-53a prose: ' {{ insert: param, ac-19.05_odp.01 }} is employed to protect the confidentiality and integrity of information on {{ insert: param, ac-19.05_odp.02 }}.' + links: + - href: '#ac-19.5_smt' + rel: assessment-for - id: ac-19.5_asm-examine name: assessment-method props: @@ -6343,16 +6846,25 @@ catalog: name: assessment-objective props: - name: label - value: AC-20a.1 + value: AC-20a.01 class: sp800-53a prose: ' {{ insert: param, ac-20_odp.01 }} is/are consistent with the trust relationships established with other organizations owning, operating, and/or maintaining external systems, allowing authorized individuals to access the system from external systems (if applicable);' + links: + - href: '#ac-20_smt.a.1' + rel: assessment-for - id: ac-20_obj.a.2 name: assessment-objective props: - name: label - value: AC-20a.2 + value: AC-20a.02 class: sp800-53a prose: ' {{ insert: param, ac-20_odp.01 }} is/are consistent with the trust relationships established with other organizations owning, operating, and/or maintaining external systems, allowing authorized individuals to process, store, or transmit organization-controlled information using external systems (if applicable);' + links: + - href: '#ac-20_smt.a.2' + rel: assessment-for + links: + - href: '#ac-20_smt.a' + rel: assessment-for - id: ac-20_obj.b name: assessment-objective props: @@ -6360,6 +6872,12 @@ catalog: value: AC-20b. class: sp800-53a prose: 'the use of {{ insert: param, ac-20_odp.04 }} is prohibited (if applicable).' + links: + - href: '#ac-20_smt.b' + rel: assessment-for + links: + - href: '#ac-20_smt' + rel: assessment-for - id: ac-20_asm-examine name: assessment-method props: @@ -6470,6 +6988,9 @@ catalog: value: AC-20(01)(a) class: sp800-53a prose: authorized individuals are permitted to use an external system to access the system or to process, store, or transmit organization-controlled information only after verification of the implementation of controls on the external system as specified in the organization’s security and privacy policies and security and privacy plans (if applicable); + links: + - href: '#ac-20.1_smt.a' + rel: assessment-for - id: ac-20.1_obj.b name: assessment-objective props: @@ -6477,6 +6998,12 @@ catalog: value: AC-20(01)(b) class: sp800-53a prose: authorized individuals are permitted to use an external system to access the system or to process, store, or transmit organization-controlled information only after retention of approved system connection or processing agreements with the organizational entity hosting the external system (if applicable). + links: + - href: '#ac-20.1_smt.b' + rel: assessment-for + links: + - href: '#ac-20.1_smt' + rel: assessment-for - id: ac-20.1_asm-examine name: assessment-method props: @@ -6573,6 +7100,9 @@ catalog: value: AC-20(02) class: sp800-53a prose: 'the use of organization-controlled portable storage devices by authorized individuals is restricted on external systems using {{ insert: param, ac-20.02_odp }}.' + links: + - href: '#ac-20.2_smt' + rel: assessment-for - id: ac-20.2_asm-examine name: assessment-method props: @@ -6722,6 +7252,9 @@ catalog: value: AC-21a. class: sp800-53a prose: 'authorized users are enabled to determine whether access authorizations assigned to a sharing partner match the information’s access and use restrictions for {{ insert: param, ac-21_odp.01 }};' + links: + - href: '#ac-21_smt.a' + rel: assessment-for - id: ac-21_obj.b name: assessment-objective props: @@ -6729,6 +7262,12 @@ catalog: value: AC-21b. class: sp800-53a prose: ' {{ insert: param, ac-21_odp.02 }} are employed to assist users in making information-sharing and collaboration decisions.' + links: + - href: '#ac-21_smt.b' + rel: assessment-for + links: + - href: '#ac-21_smt' + rel: assessment-for - id: ac-21_asm-examine name: assessment-method props: @@ -6878,6 +7417,9 @@ catalog: value: AC-22a. class: sp800-53a prose: designated individuals are authorized to make information publicly accessible; + links: + - href: '#ac-22_smt.a' + rel: assessment-for - id: ac-22_obj.b name: assessment-objective props: @@ -6885,6 +7427,9 @@ catalog: value: AC-22b. class: sp800-53a prose: authorized individuals are trained to ensure that publicly accessible information does not contain non-public information; + links: + - href: '#ac-22_smt.b' + rel: assessment-for - id: ac-22_obj.c name: assessment-objective props: @@ -6892,6 +7437,9 @@ catalog: value: AC-22c. class: sp800-53a prose: the proposed content of information is reviewed prior to posting onto the publicly accessible system to ensure that non-public information is not included; + links: + - href: '#ac-22_smt.c' + rel: assessment-for - id: ac-22_obj.d name: assessment-objective props: @@ -6906,6 +7454,9 @@ catalog: value: AC-22d.[01] class: sp800-53a prose: 'the content on the publicly accessible system is reviewed for non-public information {{ insert: param, ac-22_odp }};' + links: + - href: '#ac-22_smt.d' + rel: assessment-for - id: ac-22_obj.d-2 name: assessment-objective props: @@ -6913,6 +7464,15 @@ catalog: value: AC-22d.[02] class: sp800-53a prose: non-public information is removed from the publicly accessible system, if discovered. + links: + - href: '#ac-22_smt.d' + rel: assessment-for + links: + - href: '#ac-22_smt.d' + rel: assessment-for + links: + - href: '#ac-22_smt' + rel: assessment-for - id: ac-22_asm-examine name: assessment-method props: @@ -7185,6 +7745,9 @@ catalog: value: AT-01a.[01] class: sp800-53a prose: 'an awareness and training policy is developed and documented; ' + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.a-2 name: assessment-objective props: @@ -7192,6 +7755,9 @@ catalog: value: AT-01a.[02] class: sp800-53a prose: 'the awareness and training policy is disseminated to {{ insert: param, at-01_odp.01 }};' + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.a-3 name: assessment-objective props: @@ -7199,6 +7765,9 @@ catalog: value: AT-01a.[03] class: sp800-53a prose: awareness and training procedures to facilitate the implementation of the awareness and training policy and associated access controls are developed and documented; + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.a-4 name: assessment-objective props: @@ -7206,6 +7775,9 @@ catalog: value: AT-01a.[04] class: sp800-53a prose: 'the awareness and training procedures are disseminated to {{ insert: param, at-01_odp.02 }}.' + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.a.1 name: assessment-objective props: @@ -7227,6 +7799,9 @@ catalog: value: AT-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses purpose;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-2 name: assessment-objective props: @@ -7234,6 +7809,9 @@ catalog: value: AT-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses scope;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-3 name: assessment-objective props: @@ -7241,6 +7819,9 @@ catalog: value: AT-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses roles;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-4 name: assessment-objective props: @@ -7248,6 +7829,9 @@ catalog: value: AT-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses responsibilities;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-5 name: assessment-objective props: @@ -7255,6 +7839,9 @@ catalog: value: AT-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses management commitment;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-6 name: assessment-objective props: @@ -7262,6 +7849,9 @@ catalog: value: AT-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses coordination among organizational entities;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-7 name: assessment-objective props: @@ -7269,6 +7859,12 @@ catalog: value: AT-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses compliance; and' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.b name: assessment-objective props: @@ -7276,6 +7872,15 @@ catalog: value: AT-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines; and' + links: + - href: '#at-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#at-1_smt.a.1' + rel: assessment-for + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.b name: assessment-objective props: @@ -7283,6 +7888,9 @@ catalog: value: AT-01b. class: sp800-53a prose: 'the {{ insert: param, at-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the awareness and training policy and procedures;' + links: + - href: '#at-1_smt.b' + rel: assessment-for - id: at-1_obj.c name: assessment-objective props: @@ -7304,6 +7912,9 @@ catalog: value: AT-01c.01[01] class: sp800-53a prose: 'the current awareness and training policy is reviewed and updated {{ insert: param, at-01_odp.05 }}; ' + links: + - href: '#at-1_smt.c.1' + rel: assessment-for - id: at-1_obj.c.1-2 name: assessment-objective props: @@ -7311,6 +7922,12 @@ catalog: value: AT-01c.01[02] class: sp800-53a prose: 'the current awareness and training policy is reviewed and updated following {{ insert: param, at-01_odp.06 }};' + links: + - href: '#at-1_smt.c.1' + rel: assessment-for + links: + - href: '#at-1_smt.c.1' + rel: assessment-for - id: at-1_obj.c.2 name: assessment-objective props: @@ -7325,6 +7942,9 @@ catalog: value: AT-01c.02[01] class: sp800-53a prose: 'the current awareness and training procedures are reviewed and updated {{ insert: param, at-01_odp.07 }};' + links: + - href: '#at-1_smt.c.2' + rel: assessment-for - id: at-1_obj.c.2-2 name: assessment-objective props: @@ -7332,6 +7952,18 @@ catalog: value: AT-01c.02[02] class: sp800-53a prose: 'the current awareness and training procedures are reviewed and updated following {{ insert: param, at-01_odp.08 }}.' + links: + - href: '#at-1_smt.c.2' + rel: assessment-for + links: + - href: '#at-1_smt.c.2' + rel: assessment-for + links: + - href: '#at-1_smt.c' + rel: assessment-for + links: + - href: '#at-1_smt' + rel: assessment-for - id: at-1_asm-examine name: assessment-method props: @@ -7584,6 +8216,9 @@ catalog: value: AT-02a.01[01] class: sp800-53a prose: security literacy training is provided to system users (including managers, senior executives, and contractors) as part of initial training for new users; + links: + - href: '#at-2_smt.a.1' + rel: assessment-for - id: at-2_obj.a.1-2 name: assessment-objective props: @@ -7591,6 +8226,9 @@ catalog: value: AT-02a.01[02] class: sp800-53a prose: privacy literacy training is provided to system users (including managers, senior executives, and contractors) as part of initial training for new users; + links: + - href: '#at-2_smt.a.1' + rel: assessment-for - id: at-2_obj.a.1-3 name: assessment-objective props: @@ -7598,6 +8236,9 @@ catalog: value: AT-02a.01[03] class: sp800-53a prose: 'security literacy training is provided to system users (including managers, senior executives, and contractors) {{ insert: param, at-02_odp.01 }} thereafter;' + links: + - href: '#at-2_smt.a.1' + rel: assessment-for - id: at-2_obj.a.1-4 name: assessment-objective props: @@ -7605,6 +8246,12 @@ catalog: value: AT-02a.01[04] class: sp800-53a prose: 'privacy literacy training is provided to system users (including managers, senior executives, and contractors) {{ insert: param, at-02_odp.02 }} thereafter;' + links: + - href: '#at-2_smt.a.1' + rel: assessment-for + links: + - href: '#at-2_smt.a.1' + rel: assessment-for - id: at-2_obj.a.2 name: assessment-objective props: @@ -7619,6 +8266,9 @@ catalog: value: AT-02a.02[01] class: sp800-53a prose: 'security literacy training is provided to system users (including managers, senior executives, and contractors) when required by system changes or following {{ insert: param, at-02_odp.03 }};' + links: + - href: '#at-2_smt.a.2' + rel: assessment-for - id: at-2_obj.a.2-2 name: assessment-objective props: @@ -7626,6 +8276,15 @@ catalog: value: AT-02a.02[02] class: sp800-53a prose: 'privacy literacy training is provided to system users (including managers, senior executives, and contractors) when required by system changes or following {{ insert: param, at-02_odp.04 }};' + links: + - href: '#at-2_smt.a.2' + rel: assessment-for + links: + - href: '#at-2_smt.a.2' + rel: assessment-for + links: + - href: '#at-2_smt.a' + rel: assessment-for - id: at-2_obj.b name: assessment-objective props: @@ -7633,6 +8292,9 @@ catalog: value: AT-02b. class: sp800-53a prose: ' {{ insert: param, at-02_odp.05 }} are employed to increase the security and privacy awareness of system users;' + links: + - href: '#at-2_smt.b' + rel: assessment-for - id: at-2_obj.c name: assessment-objective props: @@ -7647,6 +8309,9 @@ catalog: value: AT-02c.[01] class: sp800-53a prose: 'literacy training and awareness content is updated {{ insert: param, at-02_odp.06 }};' + links: + - href: '#at-2_smt.c' + rel: assessment-for - id: at-2_obj.c-2 name: assessment-objective props: @@ -7654,6 +8319,12 @@ catalog: value: AT-02c.[02] class: sp800-53a prose: 'literacy training and awareness content is updated following {{ insert: param, at-02_odp.07 }};' + links: + - href: '#at-2_smt.c' + rel: assessment-for + links: + - href: '#at-2_smt.c' + rel: assessment-for - id: at-2_obj.d name: assessment-objective props: @@ -7661,6 +8332,12 @@ catalog: value: AT-02d. class: sp800-53a prose: lessons learned from internal or external security incidents or breaches are incorporated into literacy training and awareness techniques. + links: + - href: '#at-2_smt.d' + rel: assessment-for + links: + - href: '#at-2_smt' + rel: assessment-for - id: at-2_asm-examine name: assessment-method props: @@ -7763,6 +8440,9 @@ catalog: value: AT-02(02)[01] class: sp800-53a prose: literacy training on recognizing potential indicators of insider threat is provided; + links: + - href: '#at-2.2_smt' + rel: assessment-for - id: at-2.2_obj-2 name: assessment-objective props: @@ -7770,6 +8450,12 @@ catalog: value: AT-02(02)[02] class: sp800-53a prose: literacy training on reporting potential indicators of insider threat is provided. + links: + - href: '#at-2.2_smt' + rel: assessment-for + links: + - href: '#at-2.2_smt' + rel: assessment-for - id: at-2.2_asm-examine name: assessment-method props: @@ -7853,6 +8539,9 @@ catalog: value: AT-02(03)[01] class: sp800-53a prose: literacy training on recognizing potential and actual instances of social engineering is provided; + links: + - href: '#at-2.3_smt' + rel: assessment-for - id: at-2.3_obj-2 name: assessment-objective props: @@ -7860,6 +8549,9 @@ catalog: value: AT-02(03)[02] class: sp800-53a prose: literacy training on reporting potential and actual instances of social engineering is provided; + links: + - href: '#at-2.3_smt' + rel: assessment-for - id: at-2.3_obj-3 name: assessment-objective props: @@ -7867,6 +8559,9 @@ catalog: value: AT-02(03)[03] class: sp800-53a prose: literacy training on recognizing potential and actual instances of social mining is provided; + links: + - href: '#at-2.3_smt' + rel: assessment-for - id: at-2.3_obj-4 name: assessment-objective props: @@ -7874,6 +8569,12 @@ catalog: value: AT-02(03)[04] class: sp800-53a prose: literacy training on reporting potential and actual instances of social mining is provided. + links: + - href: '#at-2.3_smt' + rel: assessment-for + links: + - href: '#at-2.3_smt' + rel: assessment-for - id: at-2.3_asm-examine name: assessment-method props: @@ -8109,6 +8810,9 @@ catalog: value: AT-03a.01[01] class: sp800-53a prose: 'role-based security training is provided to {{ insert: param, at-03_odp.01 }} before authorizing access to the system, information, or performing assigned duties;' + links: + - href: '#at-3_smt.a.1' + rel: assessment-for - id: at-3_obj.a.1-2 name: assessment-objective props: @@ -8116,6 +8820,9 @@ catalog: value: AT-03a.01[02] class: sp800-53a prose: 'role-based privacy training is provided to {{ insert: param, at-03_odp.02 }} before authorizing access to the system, information, or performing assigned duties;' + links: + - href: '#at-3_smt.a.1' + rel: assessment-for - id: at-3_obj.a.1-3 name: assessment-objective props: @@ -8123,6 +8830,9 @@ catalog: value: AT-03a.01[03] class: sp800-53a prose: 'role-based security training is provided to {{ insert: param, at-03_odp.01 }} {{ insert: param, at-03_odp.03 }} thereafter;' + links: + - href: '#at-3_smt.a.1' + rel: assessment-for - id: at-3_obj.a.1-4 name: assessment-objective props: @@ -8130,6 +8840,12 @@ catalog: value: AT-03a.01[04] class: sp800-53a prose: 'role-based privacy training is provided to {{ insert: param, at-03_odp.02 }} {{ insert: param, at-03_odp.03 }} thereafter;' + links: + - href: '#at-3_smt.a.1' + rel: assessment-for + links: + - href: '#at-3_smt.a.1' + rel: assessment-for - id: at-3_obj.a.2 name: assessment-objective props: @@ -8144,6 +8860,9 @@ catalog: value: AT-03a.02[01] class: sp800-53a prose: role-based security training is provided to personnel with assigned security roles and responsibilities when required by system changes; + links: + - href: '#at-3_smt.a.2' + rel: assessment-for - id: at-3_obj.a.2-2 name: assessment-objective props: @@ -8151,6 +8870,15 @@ catalog: value: AT-03a.02[02] class: sp800-53a prose: role-based privacy training is provided to personnel with assigned security roles and responsibilities when required by system changes; + links: + - href: '#at-3_smt.a.2' + rel: assessment-for + links: + - href: '#at-3_smt.a.2' + rel: assessment-for + links: + - href: '#at-3_smt.a' + rel: assessment-for - id: at-3_obj.b name: assessment-objective props: @@ -8165,6 +8893,9 @@ catalog: value: AT-03b.[01] class: sp800-53a prose: 'role-based training content is updated {{ insert: param, at-03_odp.04 }};' + links: + - href: '#at-3_smt.b' + rel: assessment-for - id: at-3_obj.b-2 name: assessment-objective props: @@ -8172,6 +8903,12 @@ catalog: value: AT-03b.[02] class: sp800-53a prose: 'role-based training content is updated following {{ insert: param, at-03_odp.05 }};' + links: + - href: '#at-3_smt.b' + rel: assessment-for + links: + - href: '#at-3_smt.b' + rel: assessment-for - id: at-3_obj.c name: assessment-objective props: @@ -8179,6 +8916,12 @@ catalog: value: AT-03c. class: sp800-53a prose: lessons learned from internal or external security incidents or breaches are incorporated into role-based training. + links: + - href: '#at-3_smt.c' + rel: assessment-for + links: + - href: '#at-3_smt' + rel: assessment-for - id: at-3_asm-examine name: assessment-method props: @@ -8318,6 +9061,9 @@ catalog: value: AT-04a.[01] class: sp800-53a prose: information security and privacy training activities, including security and privacy awareness training and specific role-based security and privacy training, are documented; + links: + - href: '#at-4_smt.a' + rel: assessment-for - id: at-4_obj.a-2 name: assessment-objective props: @@ -8325,6 +9071,12 @@ catalog: value: AT-04a.[02] class: sp800-53a prose: information security and privacy training activities, including security and privacy awareness training and specific role-based security and privacy training, are monitored; + links: + - href: '#at-4_smt.a' + rel: assessment-for + links: + - href: '#at-4_smt.a' + rel: assessment-for - id: at-4_obj.b name: assessment-objective props: @@ -8332,6 +9084,12 @@ catalog: value: AT-04b. class: sp800-53a prose: 'individual training records are retained for {{ insert: param, at-04_odp }}.' + links: + - href: '#at-4_smt.b' + rel: assessment-for + links: + - href: '#at-4_smt' + rel: assessment-for - id: at-4_asm-examine name: assessment-method props: @@ -8589,6 +9347,9 @@ catalog: value: AU-01a.[01] class: sp800-53a prose: an audit and accountability policy is developed and documented; + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.a-2 name: assessment-objective props: @@ -8596,6 +9357,9 @@ catalog: value: AU-01a.[02] class: sp800-53a prose: 'the audit and accountability policy is disseminated to {{ insert: param, au-01_odp.01 }};' + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.a-3 name: assessment-objective props: @@ -8603,6 +9367,9 @@ catalog: value: AU-01a.[03] class: sp800-53a prose: audit and accountability procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls are developed and documented; + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.a-4 name: assessment-objective props: @@ -8610,6 +9377,9 @@ catalog: value: AU-01a.[04] class: sp800-53a prose: 'the audit and accountability procedures are disseminated to {{ insert: param, au-01_odp.02 }};' + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.a.1 name: assessment-objective props: @@ -8631,6 +9401,9 @@ catalog: value: AU-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses purpose;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-2 name: assessment-objective props: @@ -8638,6 +9411,9 @@ catalog: value: AU-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses scope;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-3 name: assessment-objective props: @@ -8645,6 +9421,9 @@ catalog: value: AU-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses roles;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-4 name: assessment-objective props: @@ -8652,6 +9431,9 @@ catalog: value: AU-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses responsibilities;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-5 name: assessment-objective props: @@ -8659,6 +9441,9 @@ catalog: value: AU-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses management commitment;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-6 name: assessment-objective props: @@ -8666,6 +9451,9 @@ catalog: value: AU-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses coordination among organizational entities;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-7 name: assessment-objective props: @@ -8673,6 +9461,12 @@ catalog: value: AU-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses compliance;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.b name: assessment-objective props: @@ -8680,6 +9474,15 @@ catalog: value: AU-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#au-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#au-1_smt.a.1' + rel: assessment-for + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.b name: assessment-objective props: @@ -8687,6 +9490,9 @@ catalog: value: AU-01b. class: sp800-53a prose: 'the {{ insert: param, au-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the audit and accountability policy and procedures;' + links: + - href: '#au-1_smt.b' + rel: assessment-for - id: au-1_obj.c name: assessment-objective props: @@ -8708,6 +9514,9 @@ catalog: value: AU-01c.01[01] class: sp800-53a prose: 'the current audit and accountability policy is reviewed and updated {{ insert: param, au-01_odp.05 }};' + links: + - href: '#au-1_smt.c.1' + rel: assessment-for - id: au-1_obj.c.1-2 name: assessment-objective props: @@ -8715,6 +9524,12 @@ catalog: value: AU-01c.01[02] class: sp800-53a prose: 'the current audit and accountability policy is reviewed and updated following {{ insert: param, au-01_odp.06 }};' + links: + - href: '#au-1_smt.c.1' + rel: assessment-for + links: + - href: '#au-1_smt.c.1' + rel: assessment-for - id: au-1_obj.c.2 name: assessment-objective props: @@ -8729,6 +9544,9 @@ catalog: value: AU-01c.02[01] class: sp800-53a prose: 'the current audit and accountability procedures are reviewed and updated {{ insert: param, au-01_odp.07 }};' + links: + - href: '#au-1_smt.c.2' + rel: assessment-for - id: au-1_obj.c.2-2 name: assessment-objective props: @@ -8736,6 +9554,18 @@ catalog: value: AU-01c.02[02] class: sp800-53a prose: 'the current audit and accountability procedures are reviewed and updated following {{ insert: param, au-01_odp.08 }}.' + links: + - href: '#au-1_smt.c.2' + rel: assessment-for + links: + - href: '#au-1_smt.c.2' + rel: assessment-for + links: + - href: '#au-1_smt.c' + rel: assessment-for + links: + - href: '#au-1_smt' + rel: assessment-for - id: au-1_asm-examine name: assessment-method props: @@ -8962,6 +9792,9 @@ catalog: value: AU-02a. class: sp800-53a prose: ' {{ insert: param, au-02_odp.01 }} that the system is capable of logging are identified in support of the audit logging function;' + links: + - href: '#au-2_smt.a' + rel: assessment-for - id: au-2_obj.b name: assessment-objective props: @@ -8969,6 +9802,9 @@ catalog: value: AU-02b. class: sp800-53a prose: the event logging function is coordinated with other organizational entities requiring audit-related information to guide and inform the selection criteria for events to be logged; + links: + - href: '#au-2_smt.b' + rel: assessment-for - id: au-2_obj.c name: assessment-objective props: @@ -8983,6 +9819,9 @@ catalog: value: AU-02c.[01] class: sp800-53a prose: ' {{ insert: param, au-02_odp.02 }} are specified for logging within the system;' + links: + - href: '#au-2_smt.c' + rel: assessment-for - id: au-2_obj.c-2 name: assessment-objective props: @@ -8990,6 +9829,12 @@ catalog: value: AU-02c.[02] class: sp800-53a prose: 'the specified event types are logged within the system {{ insert: param, au-02_odp.03 }};' + links: + - href: '#au-2_smt.c' + rel: assessment-for + links: + - href: '#au-2_smt.c' + rel: assessment-for - id: au-2_obj.d name: assessment-objective props: @@ -8997,6 +9842,9 @@ catalog: value: AU-02d. class: sp800-53a prose: a rationale is provided for why the event types selected for logging are deemed to be adequate to support after-the-fact investigations of incidents; + links: + - href: '#au-2_smt.d' + rel: assessment-for - id: au-2_obj.e name: assessment-objective props: @@ -9004,6 +9852,12 @@ catalog: value: AU-02e. class: sp800-53a prose: 'the event types selected for logging are reviewed and updated {{ insert: param, au-02_odp.04 }}.' + links: + - href: '#au-2_smt.e' + rel: assessment-for + links: + - href: '#au-2_smt' + rel: assessment-for - id: au-2_asm-examine name: assessment-method props: @@ -9157,6 +10011,9 @@ catalog: value: AU-03a. class: sp800-53a prose: audit records contain information that establishes what type of event occurred; + links: + - href: '#au-3_smt.a' + rel: assessment-for - id: au-3_obj.b name: assessment-objective props: @@ -9164,6 +10021,9 @@ catalog: value: AU-03b. class: sp800-53a prose: audit records contain information that establishes when the event occurred; + links: + - href: '#au-3_smt.b' + rel: assessment-for - id: au-3_obj.c name: assessment-objective props: @@ -9171,6 +10031,9 @@ catalog: value: AU-03c. class: sp800-53a prose: audit records contain information that establishes where the event occurred; + links: + - href: '#au-3_smt.c' + rel: assessment-for - id: au-3_obj.d name: assessment-objective props: @@ -9178,6 +10041,9 @@ catalog: value: AU-03d. class: sp800-53a prose: audit records contain information that establishes the source of the event; + links: + - href: '#au-3_smt.d' + rel: assessment-for - id: au-3_obj.e name: assessment-objective props: @@ -9185,6 +10051,9 @@ catalog: value: AU-03e. class: sp800-53a prose: audit records contain information that establishes the outcome of the event; + links: + - href: '#au-3_smt.e' + rel: assessment-for - id: au-3_obj.f name: assessment-objective props: @@ -9192,6 +10061,12 @@ catalog: value: AU-03f. class: sp800-53a prose: audit records contain information that establishes the identity of any individuals, subjects, or objects/entities associated with the event. + links: + - href: '#au-3_smt.f' + rel: assessment-for + links: + - href: '#au-3_smt' + rel: assessment-for - id: au-3_asm-examine name: assessment-method props: @@ -9295,6 +10170,9 @@ catalog: value: AU-03(01) class: sp800-53a prose: 'generated audit records contain the following {{ insert: param, au-03.01_odp }}.' + links: + - href: '#au-3.1_smt' + rel: assessment-for - id: au-3.1_asm-examine name: assessment-method props: @@ -9416,6 +10294,9 @@ catalog: value: AU-04 class: sp800-53a prose: 'audit log storage capacity is allocated to accommodate {{ insert: param, au-04_odp }}.' + links: + - href: '#au-4_smt' + rel: assessment-for - id: au-4_asm-examine name: assessment-method props: @@ -9575,6 +10456,9 @@ catalog: value: AU-05a. class: sp800-53a prose: ' {{ insert: param, au-05_odp.01 }} are alerted in the event of an audit logging process failure within {{ insert: param, au-05_odp.02 }};' + links: + - href: '#au-5_smt.a' + rel: assessment-for - id: au-5_obj.b name: assessment-objective props: @@ -9582,6 +10466,12 @@ catalog: value: AU-05b. class: sp800-53a prose: ' {{ insert: param, au-05_odp.03 }} are taken in the event of an audit logging process failure.' + links: + - href: '#au-5_smt.b' + rel: assessment-for + links: + - href: '#au-5_smt' + rel: assessment-for - id: au-5_asm-examine name: assessment-method props: @@ -9705,6 +10595,9 @@ catalog: value: AU-05(01) class: sp800-53a prose: 'a warning is provided to {{ insert: param, au-05.01_odp.01 }} within {{ insert: param, au-05.01_odp.02 }} when allocated audit log storage volume reaches {{ insert: param, au-05.01_odp.03 }} of repository maximum audit log storage capacity.' + links: + - href: '#au-5.1_smt' + rel: assessment-for - id: au-5.1_asm-examine name: assessment-method props: @@ -9823,6 +10716,9 @@ catalog: value: AU-05(02) class: sp800-53a prose: 'an alert is provided within {{ insert: param, au-05.02_odp.01 }} to {{ insert: param, au-05.02_odp.02 }} when {{ insert: param, au-05.02_odp.03 }} occur.' + links: + - href: '#au-5.2_smt' + rel: assessment-for - id: au-5.2_asm-examine name: assessment-method props: @@ -10021,6 +10917,9 @@ catalog: value: AU-06a. class: sp800-53a prose: 'system audit records are reviewed and analyzed {{ insert: param, au-06_odp.01 }} for indications of {{ insert: param, au-06_odp.02 }} and the potential impact of the inappropriate or unusual activity;' + links: + - href: '#au-6_smt.a' + rel: assessment-for - id: au-6_obj.b name: assessment-objective props: @@ -10028,6 +10927,9 @@ catalog: value: AU-06b. class: sp800-53a prose: 'findings are reported to {{ insert: param, au-06_odp.03 }};' + links: + - href: '#au-6_smt.b' + rel: assessment-for - id: au-6_obj.c name: assessment-objective props: @@ -10035,6 +10937,12 @@ catalog: value: AU-06c. class: sp800-53a prose: the level of audit record review, analysis, and reporting within the system is adjusted when there is a change in risk based on law enforcement information, intelligence information, or other credible sources of information. + links: + - href: '#au-6_smt.c' + rel: assessment-for + links: + - href: '#au-6_smt' + rel: assessment-for - id: au-6_asm-examine name: assessment-method props: @@ -10123,6 +11031,9 @@ catalog: value: AU-06(01) class: sp800-53a prose: 'audit record review, analysis, and reporting processes are integrated using {{ insert: param, au-06.01_odp }}.' + links: + - href: '#au-6.1_smt' + rel: assessment-for - id: au-6.1_asm-examine name: assessment-method props: @@ -10217,6 +11128,9 @@ catalog: value: AU-06(03) class: sp800-53a prose: audit records across different repositories are analyzed and correlated to gain organization-wide situational awareness. + links: + - href: '#au-6.3_smt' + rel: assessment-for - id: au-6.3_asm-examine name: assessment-method props: @@ -10334,6 +11248,9 @@ catalog: value: AU-06(05) class: sp800-53a prose: 'analysis of audit records is integrated with analysis of {{ insert: param, au-06.05_odp.01 }} to further enhance the ability to identify inappropriate or unusual activity.' + links: + - href: '#au-6.5_smt' + rel: assessment-for - id: au-6.5_asm-examine name: assessment-method props: @@ -10422,6 +11339,9 @@ catalog: value: AU-06(06) class: sp800-53a prose: information from audit records is correlated with information obtained from monitoring physical access to further enhance the ability to identify suspicious, inappropriate, unusual, or malevolent activity. + links: + - href: '#au-6.6_smt' + rel: assessment-for - id: au-6.6_asm-examine name: assessment-method props: @@ -10565,6 +11485,9 @@ catalog: value: AU-07a.[01] class: sp800-53a prose: an audit record reduction and report generation capability is provided that supports on-demand audit record review, analysis, and reporting requirements and after-the-fact investigations of incidents; + links: + - href: '#au-7_smt.a' + rel: assessment-for - id: au-7_obj.a-2 name: assessment-objective props: @@ -10572,6 +11495,12 @@ catalog: value: AU-07a.[02] class: sp800-53a prose: an audit record reduction and report generation capability is implemented that supports on-demand audit record review, analysis, and reporting requirements and after-the-fact investigations of incidents; + links: + - href: '#au-7_smt.a' + rel: assessment-for + links: + - href: '#au-7_smt.a' + rel: assessment-for - id: au-7_obj.b name: assessment-objective props: @@ -10586,6 +11515,9 @@ catalog: value: AU-07b.[01] class: sp800-53a prose: an audit record reduction and report generation capability is provided that does not alter the original content or time ordering of audit records; + links: + - href: '#au-7_smt.b' + rel: assessment-for - id: au-7_obj.b-2 name: assessment-objective props: @@ -10593,6 +11525,15 @@ catalog: value: AU-07b.[02] class: sp800-53a prose: an audit record reduction and report generation capability is implemented that does not alter the original content or time ordering of audit records. + links: + - href: '#au-7_smt.b' + rel: assessment-for + links: + - href: '#au-7_smt.b' + rel: assessment-for + links: + - href: '#au-7_smt' + rel: assessment-for - id: au-7_asm-examine name: assessment-method props: @@ -10702,6 +11643,9 @@ catalog: value: AU-07(01)[01] class: sp800-53a prose: 'the capability to process, sort, and search audit records for events of interest based on {{ insert: param, au-07.01_odp }} are provided;' + links: + - href: '#au-7.1_smt' + rel: assessment-for - id: au-7.1_obj-2 name: assessment-objective props: @@ -10709,6 +11653,12 @@ catalog: value: AU-07(01)[02] class: sp800-53a prose: 'the capability to process, sort, and search audit records for events of interest based on {{ insert: param, au-07.01_odp }} are implemented.' + links: + - href: '#au-7.1_smt' + rel: assessment-for + links: + - href: '#au-7.1_smt' + rel: assessment-for - id: au-7.1_asm-examine name: assessment-method props: @@ -10836,6 +11786,9 @@ catalog: value: AU-08a. class: sp800-53a prose: internal system clocks are used to generate timestamps for audit records; + links: + - href: '#au-8_smt.a' + rel: assessment-for - id: au-8_obj.b name: assessment-objective props: @@ -10843,6 +11796,12 @@ catalog: value: AU-08b. class: sp800-53a prose: 'timestamps are recorded for audit records that meet {{ insert: param, au-08_odp }} and that use Coordinated Universal Time, have a fixed local time offset from Coordinated Universal Time, or include the local time offset as part of the timestamp.' + links: + - href: '#au-8_smt.b' + rel: assessment-for + links: + - href: '#au-8_smt' + rel: assessment-for - id: au-8_asm-examine name: assessment-method props: @@ -10992,6 +11951,9 @@ catalog: value: AU-09a. class: sp800-53a prose: audit information and audit logging tools are protected from unauthorized access, modification, and deletion; + links: + - href: '#au-9_smt.a' + rel: assessment-for - id: au-9_obj.b name: assessment-objective props: @@ -10999,6 +11961,12 @@ catalog: value: AU-09b. class: sp800-53a prose: ' {{ insert: param, au-09_odp }} are alerted upon detection of unauthorized access, modification, or deletion of audit information.' + links: + - href: '#au-9_smt.b' + rel: assessment-for + links: + - href: '#au-9_smt' + rel: assessment-for - id: au-9_asm-examine name: assessment-method props: @@ -11108,6 +12076,9 @@ catalog: value: AU-09(02) class: sp800-53a prose: 'audit records are stored {{ insert: param, au-09.02_odp }} in a repository that is part of a physically different system or system component than the system or component being audited.' + links: + - href: '#au-9.2_smt' + rel: assessment-for - id: au-9.2_asm-examine name: assessment-method props: @@ -11205,6 +12176,9 @@ catalog: value: AU-09(03) class: sp800-53a prose: cryptographic mechanisms to protect the integrity of audit information and audit tools are implemented. + links: + - href: '#au-9.3_smt' + rel: assessment-for - id: au-9.3_asm-examine name: assessment-method props: @@ -11311,6 +12285,9 @@ catalog: value: AU-09(04) class: sp800-53a prose: 'access to management of audit logging functionality is authorized only to {{ insert: param, au-09.04_odp }}.' + links: + - href: '#au-9.4_smt' + rel: assessment-for - id: au-9.4_asm-examine name: assessment-method props: @@ -11449,6 +12426,9 @@ catalog: value: AU-10 class: sp800-53a prose: 'irrefutable evidence is provided that an individual (or process acting on behalf of an individual) has performed {{ insert: param, au-10_odp }}.' + links: + - href: '#au-10_smt' + rel: assessment-for - id: au-10_asm-examine name: assessment-method props: @@ -11568,6 +12548,9 @@ catalog: value: AU-11 class: sp800-53a prose: 'audit records are retained for {{ insert: param, au-11_odp }} to provide support for after-the-fact investigations of incidents and to meet regulatory and organizational information retention requirements.' + links: + - href: '#au-11_smt' + rel: assessment-for - id: au-11_asm-examine name: assessment-method props: @@ -11729,6 +12712,9 @@ catalog: value: AU-12a. class: sp800-53a prose: 'audit record generation capability for the event types the system is capable of auditing (defined in AU-02_ODP[01]) is provided by {{ insert: param, au-12_odp.01 }};' + links: + - href: '#au-12_smt.a' + rel: assessment-for - id: au-12_obj.b name: assessment-objective props: @@ -11736,6 +12722,9 @@ catalog: value: AU-12b. class: sp800-53a prose: ' {{ insert: param, au-12_odp.02 }} is/are allowed to select the event types that are to be logged by specific components of the system;' + links: + - href: '#au-12_smt.b' + rel: assessment-for - id: au-12_obj.c name: assessment-objective props: @@ -11743,6 +12732,12 @@ catalog: value: AU-12c. class: sp800-53a prose: audit records for the event types defined in AU-02_ODP[02] that include the audit record content defined in AU-03 are generated. + links: + - href: '#au-12_smt.c' + rel: assessment-for + links: + - href: '#au-12_smt' + rel: assessment-for - id: au-12_asm-examine name: assessment-method props: @@ -11863,6 +12858,9 @@ catalog: value: AU-12(01) class: sp800-53a prose: 'audit records from {{ insert: param, au-12.01_odp.01 }} are compiled into a system-wide (logical or physical) audit trail that is time-correlated to within {{ insert: param, au-12.01_odp.02 }}.' + links: + - href: '#au-12.1_smt' + rel: assessment-for - id: au-12.1_asm-examine name: assessment-method props: @@ -12004,6 +13002,9 @@ catalog: value: AU-12(03)[01] class: sp800-53a prose: 'the capability for {{ insert: param, au-12.03_odp.01 }} to change the logging to be performed on {{ insert: param, au-12.03_odp.02 }} based on {{ insert: param, au-12.03_odp.03 }} within {{ insert: param, au-12.03_odp.04 }} is provided;' + links: + - href: '#au-12.3_smt' + rel: assessment-for - id: au-12.3_obj-2 name: assessment-objective props: @@ -12011,6 +13012,12 @@ catalog: value: AU-12(03)[02] class: sp800-53a prose: 'the capability for {{ insert: param, au-12.03_odp.01 }} to change the logging to be performed on {{ insert: param, au-12.03_odp.02 }} based on {{ insert: param, au-12.03_odp.03 }} within {{ insert: param, au-12.03_odp.04 }} is implemented.' + links: + - href: '#au-12.3_smt' + rel: assessment-for + links: + - href: '#au-12.3_smt' + rel: assessment-for - id: au-12.3_asm-examine name: assessment-method props: @@ -12293,6 +13300,9 @@ catalog: value: CA-01a.[01] class: sp800-53a prose: an assessment, authorization, and monitoring policy is developed and documented; + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.a-2 name: assessment-objective props: @@ -12300,6 +13310,9 @@ catalog: value: CA-01a.[02] class: sp800-53a prose: 'the assessment, authorization, and monitoring policy is disseminated to {{ insert: param, ca-01_odp.01 }};' + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.a-3 name: assessment-objective props: @@ -12307,6 +13320,9 @@ catalog: value: CA-01a.[03] class: sp800-53a prose: assessment, authorization, and monitoring procedures to facilitate the implementation of the assessment, authorization, and monitoring policy and associated assessment, authorization, and monitoring controls are developed and documented; + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.a-4 name: assessment-objective props: @@ -12314,6 +13330,9 @@ catalog: value: CA-01a.[04] class: sp800-53a prose: 'the assessment, authorization, and monitoring procedures are disseminated to {{ insert: param, ca-01_odp.02 }};' + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.a.1 name: assessment-objective props: @@ -12335,6 +13354,9 @@ catalog: value: CA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses purpose;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-2 name: assessment-objective props: @@ -12342,6 +13364,9 @@ catalog: value: CA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses scope;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-3 name: assessment-objective props: @@ -12349,6 +13374,9 @@ catalog: value: CA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses roles;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-4 name: assessment-objective props: @@ -12356,6 +13384,9 @@ catalog: value: CA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses responsibilities;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-5 name: assessment-objective props: @@ -12363,6 +13394,9 @@ catalog: value: CA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses management commitment;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-6 name: assessment-objective props: @@ -12370,6 +13404,9 @@ catalog: value: CA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses coordination among organizational entities;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-7 name: assessment-objective props: @@ -12377,6 +13414,12 @@ catalog: value: CA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses compliance;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.b name: assessment-objective props: @@ -12384,6 +13427,15 @@ catalog: value: CA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ca-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ca-1_smt.a.1' + rel: assessment-for + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.b name: assessment-objective props: @@ -12391,6 +13443,9 @@ catalog: value: CA-01b. class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the assessment, authorization, and monitoring policy and procedures;' + links: + - href: '#ca-1_smt.b' + rel: assessment-for - id: ca-1_obj.c name: assessment-objective props: @@ -12412,6 +13467,9 @@ catalog: value: CA-01c.01[01] class: sp800-53a prose: 'the current assessment, authorization, and monitoring policy is reviewed and updated {{ insert: param, ca-01_odp.05 }}; ' + links: + - href: '#ca-1_smt.c.1' + rel: assessment-for - id: ca-1_obj.c.1-2 name: assessment-objective props: @@ -12419,6 +13477,12 @@ catalog: value: CA-01c.01[02] class: sp800-53a prose: 'the current assessment, authorization, and monitoring policy is reviewed and updated following {{ insert: param, ca-01_odp.06 }};' + links: + - href: '#ca-1_smt.c.1' + rel: assessment-for + links: + - href: '#ca-1_smt.c.1' + rel: assessment-for - id: ca-1_obj.c.2 name: assessment-objective props: @@ -12433,6 +13497,9 @@ catalog: value: CA-01c.02[01] class: sp800-53a prose: 'the current assessment, authorization, and monitoring procedures are reviewed and updated {{ insert: param, ca-01_odp.07 }}; ' + links: + - href: '#ca-1_smt.c.2' + rel: assessment-for - id: ca-1_obj.c.2-2 name: assessment-objective props: @@ -12440,6 +13507,18 @@ catalog: value: CA-01c.02[02] class: sp800-53a prose: 'the current assessment, authorization, and monitoring procedures are reviewed and updated following {{ insert: param, ca-01_odp.08 }}.' + links: + - href: '#ca-1_smt.c.2' + rel: assessment-for + links: + - href: '#ca-1_smt.c.2' + rel: assessment-for + links: + - href: '#ca-1_smt.c' + rel: assessment-for + links: + - href: '#ca-1_smt' + rel: assessment-for - id: ca-1_asm-examine name: assessment-method props: @@ -12647,6 +13726,9 @@ catalog: value: CA-02a. class: sp800-53a prose: an appropriate assessor or assessment team is selected for the type of assessment to be conducted; + links: + - href: '#ca-2_smt.a' + rel: assessment-for - id: ca-2_obj.b name: assessment-objective props: @@ -12661,6 +13743,9 @@ catalog: value: CA-02b.01 class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including controls and control enhancements under assessment; + links: + - href: '#ca-2_smt.b.1' + rel: assessment-for - id: ca-2_obj.b.2 name: assessment-objective props: @@ -12668,6 +13753,9 @@ catalog: value: CA-02b.02 class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including assessment procedures to be used to determine control effectiveness; + links: + - href: '#ca-2_smt.b.2' + rel: assessment-for - id: ca-2_obj.b.3 name: assessment-objective props: @@ -12682,6 +13770,9 @@ catalog: value: CA-02b.03[01] class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including the assessment environment; + links: + - href: '#ca-2_smt.b.3' + rel: assessment-for - id: ca-2_obj.b.3-2 name: assessment-objective props: @@ -12689,6 +13780,9 @@ catalog: value: CA-02b.03[02] class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including the assessment team; + links: + - href: '#ca-2_smt.b.3' + rel: assessment-for - id: ca-2_obj.b.3-3 name: assessment-objective props: @@ -12696,6 +13790,15 @@ catalog: value: CA-02b.03[03] class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including assessment roles and responsibilities; + links: + - href: '#ca-2_smt.b.3' + rel: assessment-for + links: + - href: '#ca-2_smt.b.3' + rel: assessment-for + links: + - href: '#ca-2_smt.b' + rel: assessment-for - id: ca-2_obj.c name: assessment-objective props: @@ -12703,6 +13806,9 @@ catalog: value: CA-02c. class: sp800-53a prose: the control assessment plan is reviewed and approved by the authorizing official or designated representative prior to conducting the assessment; + links: + - href: '#ca-2_smt.c' + rel: assessment-for - id: ca-2_obj.d name: assessment-objective props: @@ -12717,6 +13823,9 @@ catalog: value: CA-02d.[01] class: sp800-53a prose: 'controls are assessed in the system and its environment of operation {{ insert: param, ca-02_odp.01 }} to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;' + links: + - href: '#ca-2_smt.d' + rel: assessment-for - id: ca-2_obj.d-2 name: assessment-objective props: @@ -12724,6 +13833,12 @@ catalog: value: CA-02d.[02] class: sp800-53a prose: 'controls are assessed in the system and its environment of operation {{ insert: param, ca-02_odp.01 }} to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established privacy requirements;' + links: + - href: '#ca-2_smt.d' + rel: assessment-for + links: + - href: '#ca-2_smt.d' + rel: assessment-for - id: ca-2_obj.e name: assessment-objective props: @@ -12731,6 +13846,9 @@ catalog: value: CA-02e. class: sp800-53a prose: a control assessment report is produced that documents the results of the assessment; + links: + - href: '#ca-2_smt.e' + rel: assessment-for - id: ca-2_obj.f name: assessment-objective props: @@ -12738,6 +13856,12 @@ catalog: value: CA-02f. class: sp800-53a prose: 'the results of the control assessment are provided to {{ insert: param, ca-02_odp.02 }}.' + links: + - href: '#ca-2_smt.f' + rel: assessment-for + links: + - href: '#ca-2_smt' + rel: assessment-for - id: ca-2_asm-examine name: assessment-method props: @@ -12832,6 +13956,9 @@ catalog: value: CA-02(01) class: sp800-53a prose: independent assessors or assessment teams are employed to conduct control assessments. + links: + - href: '#ca-2.1_smt' + rel: assessment-for - id: ca-2.1_asm-examine name: assessment-method props: @@ -12968,6 +14095,9 @@ catalog: value: CA-02(02) class: sp800-53a prose: ' {{ insert: param, ca-02.02_odp.01 }} {{ insert: param, ca-02.02_odp.02 }} {{ insert: param, ca-02.02_odp.03 }} are included as part of control assessments.' + links: + - href: '#ca-2.2_smt' + rel: assessment-for - id: ca-2.2_asm-examine name: assessment-method props: @@ -13150,6 +14280,9 @@ catalog: value: CA-03a. class: sp800-53a prose: 'the exchange of information between the system and other systems is approved and managed using {{ insert: param, ca-03_odp.01 }};' + links: + - href: '#ca-3_smt.a' + rel: assessment-for - id: ca-3_obj.b name: assessment-objective props: @@ -13164,6 +14297,9 @@ catalog: value: CA-03b.[01] class: sp800-53a prose: the interface characteristics are documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.b-2 name: assessment-objective props: @@ -13171,6 +14307,9 @@ catalog: value: CA-03b.[02] class: sp800-53a prose: security requirements are documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.b-3 name: assessment-objective props: @@ -13178,6 +14317,9 @@ catalog: value: CA-03b.[03] class: sp800-53a prose: privacy requirements are documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.b-4 name: assessment-objective props: @@ -13185,6 +14327,9 @@ catalog: value: CA-03b.[04] class: sp800-53a prose: controls are documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.b-5 name: assessment-objective props: @@ -13192,6 +14337,9 @@ catalog: value: CA-03b.[05] class: sp800-53a prose: responsibilities for each system are documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.b-6 name: assessment-objective props: @@ -13199,6 +14347,12 @@ catalog: value: CA-03b.[06] class: sp800-53a prose: the impact level of the information communicated is documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.c name: assessment-objective props: @@ -13206,6 +14360,12 @@ catalog: value: CA-03c. class: sp800-53a prose: 'agreements are reviewed and updated {{ insert: param, ca-03_odp.03 }}.' + links: + - href: '#ca-3_smt.c' + rel: assessment-for + links: + - href: '#ca-3_smt' + rel: assessment-for - id: ca-3_asm-examine name: assessment-method props: @@ -13308,6 +14468,9 @@ catalog: value: CA-03(06) class: sp800-53a prose: individuals or systems transferring data between interconnecting systems have the requisite authorizations (i.e., write permissions or privileges) prior to accepting such data. + links: + - href: '#ca-3.6_smt' + rel: assessment-for - id: ca-3.6_asm-examine name: assessment-method props: @@ -13458,6 +14621,9 @@ catalog: value: CA-05a. class: sp800-53a prose: a plan of action and milestones for the system is developed to document the planned remediation actions of the organization to correct weaknesses or deficiencies noted during the assessment of the controls and to reduce or eliminate known vulnerabilities in the system; + links: + - href: '#ca-5_smt.a' + rel: assessment-for - id: ca-5_obj.b name: assessment-objective props: @@ -13465,6 +14631,12 @@ catalog: value: CA-05b. class: sp800-53a prose: 'existing plan of action and milestones are updated {{ insert: param, ca-05_odp }} based on the findings from control assessments, independent audits or reviews, and continuous monitoring activities.' + links: + - href: '#ca-5_smt.b' + rel: assessment-for + links: + - href: '#ca-5_smt' + rel: assessment-for - id: ca-5_asm-examine name: assessment-method props: @@ -13639,6 +14811,9 @@ catalog: value: CA-06a. class: sp800-53a prose: a senior official is assigned as the authorizing official for the system; + links: + - href: '#ca-6_smt.a' + rel: assessment-for - id: ca-6_obj.b name: assessment-objective props: @@ -13646,6 +14821,9 @@ catalog: value: CA-06b. class: sp800-53a prose: a senior official is assigned as the authorizing official for common controls available for inheritance by organizational systems; + links: + - href: '#ca-6_smt.b' + rel: assessment-for - id: ca-6_obj.c name: assessment-objective props: @@ -13660,6 +14838,9 @@ catalog: value: CA-06c.01 class: sp800-53a prose: before commencing operations, the authorizing official for the system accepts the use of common controls inherited by the system; + links: + - href: '#ca-6_smt.c.1' + rel: assessment-for - id: ca-6_obj.c.2 name: assessment-objective props: @@ -13667,6 +14848,12 @@ catalog: value: CA-06c.02 class: sp800-53a prose: before commencing operations, the authorizing official for the system authorizes the system to operate; + links: + - href: '#ca-6_smt.c.2' + rel: assessment-for + links: + - href: '#ca-6_smt.c' + rel: assessment-for - id: ca-6_obj.d name: assessment-objective props: @@ -13674,6 +14861,9 @@ catalog: value: CA-06d. class: sp800-53a prose: the authorizing official for common controls authorizes the use of those controls for inheritance by organizational systems; + links: + - href: '#ca-6_smt.d' + rel: assessment-for - id: ca-6_obj.e name: assessment-objective props: @@ -13681,6 +14871,12 @@ catalog: value: CA-06e. class: sp800-53a prose: 'the authorizations are updated {{ insert: param, ca-06_odp }}.' + links: + - href: '#ca-6_smt.e' + rel: assessment-for + links: + - href: '#ca-6_smt' + rel: assessment-for - id: ca-6_asm-examine name: assessment-method props: @@ -14013,6 +15209,9 @@ catalog: value: CA-07[01] class: sp800-53a prose: a system-level continuous monitoring strategy is developed; + links: + - href: '#ca-7_smt' + rel: assessment-for - id: ca-7_obj-2 name: assessment-objective props: @@ -14020,6 +15219,9 @@ catalog: value: CA-07[02] class: sp800-53a prose: system-level continuous monitoring is implemented in accordance with the organization-level continuous monitoring strategy; + links: + - href: '#ca-7_smt' + rel: assessment-for - id: ca-7_obj.a name: assessment-objective props: @@ -14027,6 +15229,9 @@ catalog: value: CA-07a. class: sp800-53a prose: 'system-level continuous monitoring includes establishment of the following system-level metrics to be monitored: {{ insert: param, ca-07_odp.01 }};' + links: + - href: '#ca-7_smt.a' + rel: assessment-for - id: ca-7_obj.b name: assessment-objective props: @@ -14041,6 +15246,9 @@ catalog: value: CA-07b.[01] class: sp800-53a prose: 'system-level continuous monitoring includes established {{ insert: param, ca-07_odp.02 }} for monitoring;' + links: + - href: '#ca-7_smt.b' + rel: assessment-for - id: ca-7_obj.b-2 name: assessment-objective props: @@ -14048,6 +15256,12 @@ catalog: value: CA-07b.[02] class: sp800-53a prose: 'system-level continuous monitoring includes established {{ insert: param, ca-07_odp.03 }} for assessment of control effectiveness;' + links: + - href: '#ca-7_smt.b' + rel: assessment-for + links: + - href: '#ca-7_smt.b' + rel: assessment-for - id: ca-7_obj.c name: assessment-objective props: @@ -14055,6 +15269,9 @@ catalog: value: CA-07c. class: sp800-53a prose: system-level continuous monitoring includes ongoing control assessments in accordance with the continuous monitoring strategy; + links: + - href: '#ca-7_smt.c' + rel: assessment-for - id: ca-7_obj.d name: assessment-objective props: @@ -14062,6 +15279,9 @@ catalog: value: CA-07d. class: sp800-53a prose: system-level continuous monitoring includes ongoing monitoring of system and organization-defined metrics in accordance with the continuous monitoring strategy; + links: + - href: '#ca-7_smt.d' + rel: assessment-for - id: ca-7_obj.e name: assessment-objective props: @@ -14069,6 +15289,9 @@ catalog: value: CA-07e. class: sp800-53a prose: system-level continuous monitoring includes correlation and analysis of information generated by control assessments and monitoring; + links: + - href: '#ca-7_smt.e' + rel: assessment-for - id: ca-7_obj.f name: assessment-objective props: @@ -14076,6 +15299,9 @@ catalog: value: CA-07f. class: sp800-53a prose: system-level continuous monitoring includes response actions to address the results of the analysis of control assessment and monitoring information; + links: + - href: '#ca-7_smt.f' + rel: assessment-for - id: ca-7_obj.g name: assessment-objective props: @@ -14090,6 +15316,9 @@ catalog: value: CA-07g.[01] class: sp800-53a prose: 'system-level continuous monitoring includes reporting the security status of the system to {{ insert: param, ca-07_odp.04 }} {{ insert: param, ca-07_odp.05 }};' + links: + - href: '#ca-7_smt.g' + rel: assessment-for - id: ca-7_obj.g-2 name: assessment-objective props: @@ -14097,6 +15326,15 @@ catalog: value: CA-07g.[02] class: sp800-53a prose: 'system-level continuous monitoring includes reporting the privacy status of the system to {{ insert: param, ca-07_odp.06 }} {{ insert: param, ca-07_odp.07 }}.' + links: + - href: '#ca-7_smt.g' + rel: assessment-for + links: + - href: '#ca-7_smt.g' + rel: assessment-for + links: + - href: '#ca-7_smt' + rel: assessment-for - id: ca-7_asm-examine name: assessment-method props: @@ -14205,6 +15443,9 @@ catalog: value: CA-07(01) class: sp800-53a prose: independent assessors or assessment teams are employed to monitor the controls in the system on an ongoing basis. + links: + - href: '#ca-7.1_smt' + rel: assessment-for - id: ca-7.1_asm-examine name: assessment-method props: @@ -14319,6 +15560,9 @@ catalog: value: CA-07(04)(a) class: sp800-53a prose: effectiveness monitoring is included in risk monitoring; + links: + - href: '#ca-7.4_smt.a' + rel: assessment-for - id: ca-7.4_obj.b name: assessment-objective props: @@ -14326,6 +15570,9 @@ catalog: value: CA-07(04)(b) class: sp800-53a prose: compliance monitoring is included in risk monitoring; + links: + - href: '#ca-7.4_smt.b' + rel: assessment-for - id: ca-7.4_obj.c name: assessment-objective props: @@ -14333,6 +15580,12 @@ catalog: value: CA-07(04)(c) class: sp800-53a prose: change monitoring is included in risk monitoring. + links: + - href: '#ca-7.4_smt.c' + rel: assessment-for + links: + - href: '#ca-7.4_smt' + rel: assessment-for - id: ca-7.4_asm-examine name: assessment-method props: @@ -14464,6 +15717,9 @@ catalog: value: CA-08 class: sp800-53a prose: 'penetration testing is conducted {{ insert: param, ca-08_odp.01 }} on {{ insert: param, ca-08_odp.02 }}.' + links: + - href: '#ca-8_smt' + rel: assessment-for - id: ca-8_asm-examine name: assessment-method props: @@ -14559,6 +15815,9 @@ catalog: value: CA-08(01) class: sp800-53a prose: an independent penetration testing agent or team is employed to perform penetration testing on the system or system components. + links: + - href: '#ca-8.1_smt' + rel: assessment-for - id: ca-8.1_asm-examine name: assessment-method props: @@ -14720,6 +15979,9 @@ catalog: value: CA-09a. class: sp800-53a prose: 'internal connections of {{ insert: param, ca-09_odp.01 }} to the system are authorized;' + links: + - href: '#ca-9_smt.a' + rel: assessment-for - id: ca-9_obj.b name: assessment-objective props: @@ -14734,6 +15996,9 @@ catalog: value: CA-09b.[01] class: sp800-53a prose: for each internal connection, the interface characteristics are documented; + links: + - href: '#ca-9_smt.b' + rel: assessment-for - id: ca-9_obj.b-2 name: assessment-objective props: @@ -14741,6 +16006,9 @@ catalog: value: CA-09b.[02] class: sp800-53a prose: for each internal connection, the security requirements are documented; + links: + - href: '#ca-9_smt.b' + rel: assessment-for - id: ca-9_obj.b-3 name: assessment-objective props: @@ -14748,6 +16016,9 @@ catalog: value: CA-09b.[03] class: sp800-53a prose: for each internal connection, the privacy requirements are documented; + links: + - href: '#ca-9_smt.b' + rel: assessment-for - id: ca-9_obj.b-4 name: assessment-objective props: @@ -14755,6 +16026,12 @@ catalog: value: CA-09b.[04] class: sp800-53a prose: for each internal connection, the nature of the information communicated is documented; + links: + - href: '#ca-9_smt.b' + rel: assessment-for + links: + - href: '#ca-9_smt.b' + rel: assessment-for - id: ca-9_obj.c name: assessment-objective props: @@ -14762,6 +16039,9 @@ catalog: value: CA-09c. class: sp800-53a prose: 'internal system connections are terminated after {{ insert: param, ca-09_odp.02 }};' + links: + - href: '#ca-9_smt.c' + rel: assessment-for - id: ca-9_obj.d name: assessment-objective props: @@ -14769,6 +16049,12 @@ catalog: value: CA-09d. class: sp800-53a prose: 'the continued need for each internal connection is reviewed {{ insert: param, ca-09_odp.03 }}.' + links: + - href: '#ca-9_smt.d' + rel: assessment-for + links: + - href: '#ca-9_smt' + rel: assessment-for - id: ca-9_asm-examine name: assessment-method props: @@ -15045,6 +16331,9 @@ catalog: value: CM-01a.[01] class: sp800-53a prose: a configuration management policy is developed and documented; + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.a-2 name: assessment-objective props: @@ -15052,6 +16341,9 @@ catalog: value: CM-01a.[02] class: sp800-53a prose: 'the configuration management policy is disseminated to {{ insert: param, cm-01_odp.01 }};' + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.a-3 name: assessment-objective props: @@ -15059,6 +16351,9 @@ catalog: value: CM-01a.[03] class: sp800-53a prose: configuration management procedures to facilitate the implementation of the configuration management policy and associated configuration management controls are developed and documented; + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.a-4 name: assessment-objective props: @@ -15066,6 +16361,9 @@ catalog: value: CM-01a.[04] class: sp800-53a prose: 'the configuration management procedures are disseminated to {{ insert: param, cm-01_odp.02 }};' + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.a.1 name: assessment-objective props: @@ -15087,6 +16385,9 @@ catalog: value: CM-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses purpose;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-2 name: assessment-objective props: @@ -15094,6 +16395,9 @@ catalog: value: CM-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses scope;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-3 name: assessment-objective props: @@ -15101,6 +16405,9 @@ catalog: value: CM-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses roles;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-4 name: assessment-objective props: @@ -15108,6 +16415,9 @@ catalog: value: CM-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses responsibilities;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-5 name: assessment-objective props: @@ -15115,6 +16425,9 @@ catalog: value: CM-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses management commitment;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-6 name: assessment-objective props: @@ -15122,6 +16435,9 @@ catalog: value: CM-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses coordination among organizational entities;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-7 name: assessment-objective props: @@ -15129,6 +16445,12 @@ catalog: value: CM-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses compliance;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.b name: assessment-objective props: @@ -15136,6 +16458,15 @@ catalog: value: CM-01a.01(b) class: sp800-53a prose: the configuration management policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines; + links: + - href: '#cm-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#cm-1_smt.a.1' + rel: assessment-for + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.b name: assessment-objective props: @@ -15143,6 +16474,9 @@ catalog: value: CM-01b. class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the configuration management policy and procedures;' + links: + - href: '#cm-1_smt.b' + rel: assessment-for - id: cm-1_obj.c name: assessment-objective props: @@ -15164,6 +16498,9 @@ catalog: value: CM-01c.01[01] class: sp800-53a prose: 'the current configuration management policy is reviewed and updated {{ insert: param, cm-01_odp.05 }}; ' + links: + - href: '#cm-1_smt.c.1' + rel: assessment-for - id: cm-1_obj.c.1-2 name: assessment-objective props: @@ -15171,6 +16508,12 @@ catalog: value: CM-01c.01[02] class: sp800-53a prose: 'the current configuration management policy is reviewed and updated following {{ insert: param, cm-01_odp.06 }};' + links: + - href: '#cm-1_smt.c.1' + rel: assessment-for + links: + - href: '#cm-1_smt.c.1' + rel: assessment-for - id: cm-1_obj.c.2 name: assessment-objective props: @@ -15185,6 +16528,9 @@ catalog: value: CM-01c.02[01] class: sp800-53a prose: 'the current configuration management procedures are reviewed and updated {{ insert: param, cm-01_odp.07 }}; ' + links: + - href: '#cm-1_smt.c.2' + rel: assessment-for - id: cm-1_obj.c.2-2 name: assessment-objective props: @@ -15192,6 +16538,18 @@ catalog: value: CM-01c.02[02] class: sp800-53a prose: 'the current configuration management procedures are reviewed and updated following {{ insert: param, cm-01_odp.08 }}.' + links: + - href: '#cm-1_smt.c.2' + rel: assessment-for + links: + - href: '#cm-1_smt.c.2' + rel: assessment-for + links: + - href: '#cm-1_smt.c' + rel: assessment-for + links: + - href: '#cm-1_smt' + rel: assessment-for - id: cm-1_asm-examine name: assessment-method props: @@ -15374,6 +16732,9 @@ catalog: value: CM-02a.[01] class: sp800-53a prose: a current baseline configuration of the system is developed and documented; + links: + - href: '#cm-2_smt.a' + rel: assessment-for - id: cm-2_obj.a-2 name: assessment-objective props: @@ -15381,6 +16742,12 @@ catalog: value: CM-02a.[02] class: sp800-53a prose: a current baseline configuration of the system is maintained under configuration control; + links: + - href: '#cm-2_smt.a' + rel: assessment-for + links: + - href: '#cm-2_smt.a' + rel: assessment-for - id: cm-2_obj.b name: assessment-objective props: @@ -15395,6 +16762,9 @@ catalog: value: CM-02b.01 class: sp800-53a prose: 'the baseline configuration of the system is reviewed and updated {{ insert: param, cm-02_odp.01 }};' + links: + - href: '#cm-2_smt.b.1' + rel: assessment-for - id: cm-2_obj.b.2 name: assessment-objective props: @@ -15402,6 +16772,9 @@ catalog: value: CM-02b.02 class: sp800-53a prose: 'the baseline configuration of the system is reviewed and updated when required due to {{ insert: param, cm-02_odp.02 }};' + links: + - href: '#cm-2_smt.b.2' + rel: assessment-for - id: cm-2_obj.b.3 name: assessment-objective props: @@ -15409,6 +16782,15 @@ catalog: value: CM-02b.03 class: sp800-53a prose: the baseline configuration of the system is reviewed and updated when system components are installed or upgraded. + links: + - href: '#cm-2_smt.b.3' + rel: assessment-for + links: + - href: '#cm-2_smt.b' + rel: assessment-for + links: + - href: '#cm-2_smt' + rel: assessment-for - id: cm-2_asm-examine name: assessment-method props: @@ -15535,6 +16917,9 @@ catalog: value: CM-02(02)[01] class: sp800-53a prose: 'the currency of the baseline configuration of the system is maintained using {{ insert: param, cm-02.02_odp }};' + links: + - href: '#cm-2.2_smt' + rel: assessment-for - id: cm-2.2_obj-2 name: assessment-objective props: @@ -15542,6 +16927,9 @@ catalog: value: CM-02(02)[02] class: sp800-53a prose: 'the completeness of the baseline configuration of the system is maintained using {{ insert: param, cm-02.02_odp }};' + links: + - href: '#cm-2.2_smt' + rel: assessment-for - id: cm-2.2_obj-3 name: assessment-objective props: @@ -15549,6 +16937,9 @@ catalog: value: CM-02(02)[03] class: sp800-53a prose: 'the accuracy of the baseline configuration of the system is maintained using {{ insert: param, cm-02.02_odp }};' + links: + - href: '#cm-2.2_smt' + rel: assessment-for - id: cm-2.2_obj-4 name: assessment-objective props: @@ -15556,6 +16947,12 @@ catalog: value: CM-02(02)[04] class: sp800-53a prose: 'the availability of the baseline configuration of the system is maintained using {{ insert: param, cm-02.02_odp }}.' + links: + - href: '#cm-2.2_smt' + rel: assessment-for + links: + - href: '#cm-2.2_smt' + rel: assessment-for - id: cm-2.2_asm-examine name: assessment-method props: @@ -15664,6 +17061,9 @@ catalog: value: CM-02(03) class: sp800-53a prose: ' {{ insert: param, cm-02.03_odp }} of previous baseline configuration version(s) of the system is/are retained to support rollback.' + links: + - href: '#cm-2.3_smt' + rel: assessment-for - id: cm-2.3_asm-examine name: assessment-method props: @@ -15808,6 +17208,9 @@ catalog: value: CM-02(07)(a) class: sp800-53a prose: ' {{ insert: param, cm-02.07_odp.01 }} with {{ insert: param, cm-02.07_odp.02 }} are issued to individuals traveling to locations that the organization deems to be of significant risk;' + links: + - href: '#cm-2.7_smt.a' + rel: assessment-for - id: cm-2.7_obj.b name: assessment-objective props: @@ -15815,6 +17218,12 @@ catalog: value: CM-02(07)(b) class: sp800-53a prose: ' {{ insert: param, cm-02.07_odp.03 }} are applied to the systems or system components when the individuals return from travel.' + links: + - href: '#cm-2.7_smt.b' + rel: assessment-for + links: + - href: '#cm-2.7_smt' + rel: assessment-for - id: cm-2.7_asm-examine name: assessment-method props: @@ -16065,6 +17474,9 @@ catalog: value: CM-03a. class: sp800-53a prose: the types of changes to the system that are configuration-controlled are determined and documented; + links: + - href: '#cm-3_smt.a' + rel: assessment-for - id: cm-3_obj.b name: assessment-objective props: @@ -16079,6 +17491,9 @@ catalog: value: CM-03b.[01] class: sp800-53a prose: proposed configuration-controlled changes to the system are reviewed; + links: + - href: '#cm-3_smt.b' + rel: assessment-for - id: cm-3_obj.b-2 name: assessment-objective props: @@ -16086,6 +17501,12 @@ catalog: value: CM-03b.[02] class: sp800-53a prose: proposed configuration-controlled changes to the system are approved or disapproved with explicit consideration for security and privacy impact analyses; + links: + - href: '#cm-3_smt.b' + rel: assessment-for + links: + - href: '#cm-3_smt.b' + rel: assessment-for - id: cm-3_obj.c name: assessment-objective props: @@ -16093,6 +17514,9 @@ catalog: value: CM-03c. class: sp800-53a prose: configuration change decisions associated with the system are documented; + links: + - href: '#cm-3_smt.c' + rel: assessment-for - id: cm-3_obj.d name: assessment-objective props: @@ -16100,6 +17524,9 @@ catalog: value: CM-03d. class: sp800-53a prose: approved configuration-controlled changes to the system are implemented; + links: + - href: '#cm-3_smt.d' + rel: assessment-for - id: cm-3_obj.e name: assessment-objective props: @@ -16107,6 +17534,9 @@ catalog: value: CM-03e. class: sp800-53a prose: 'records of configuration-controlled changes to the system are retained for {{ insert: param, cm-03_odp.01 }};' + links: + - href: '#cm-3_smt.e' + rel: assessment-for - id: cm-3_obj.f name: assessment-objective props: @@ -16121,6 +17551,9 @@ catalog: value: CM-03f.[01] class: sp800-53a prose: activities associated with configuration-controlled changes to the system are monitored; + links: + - href: '#cm-3_smt.f' + rel: assessment-for - id: cm-3_obj.f-2 name: assessment-objective props: @@ -16128,6 +17561,12 @@ catalog: value: CM-03f.[02] class: sp800-53a prose: activities associated with configuration-controlled changes to the system are reviewed; + links: + - href: '#cm-3_smt.f' + rel: assessment-for + links: + - href: '#cm-3_smt.f' + rel: assessment-for - id: cm-3_obj.g name: assessment-objective props: @@ -16142,6 +17581,9 @@ catalog: value: CM-03g.[01] class: sp800-53a prose: 'configuration change control activities are coordinated and overseen by {{ insert: param, cm-03_odp.02 }};' + links: + - href: '#cm-3_smt.g' + rel: assessment-for - id: cm-3_obj.g-2 name: assessment-objective props: @@ -16149,6 +17591,15 @@ catalog: value: CM-03g.[02] class: sp800-53a prose: 'the configuration control element convenes {{ insert: param, cm-03_odp.03 }}.' + links: + - href: '#cm-3_smt.g' + rel: assessment-for + links: + - href: '#cm-3_smt.g' + rel: assessment-for + links: + - href: '#cm-3_smt' + rel: assessment-for - id: cm-3_asm-examine name: assessment-method props: @@ -16340,6 +17791,9 @@ catalog: value: CM-03(01)(a) class: sp800-53a prose: ' {{ insert: param, cm-03.01_odp.01 }} are used to document proposed changes to the system;' + links: + - href: '#cm-3.1_smt.a' + rel: assessment-for - id: cm-3.1_obj.b name: assessment-objective props: @@ -16347,6 +17801,9 @@ catalog: value: CM-03(01)(b) class: sp800-53a prose: ' {{ insert: param, cm-03.01_odp.01 }} are used to notify {{ insert: param, cm-03.01_odp.02 }} of proposed changes to the system and request change approval;' + links: + - href: '#cm-3.1_smt.b' + rel: assessment-for - id: cm-3.1_obj.c name: assessment-objective props: @@ -16354,6 +17811,9 @@ catalog: value: CM-03(01)(c) class: sp800-53a prose: ' {{ insert: param, cm-03.01_odp.01 }} are used to highlight proposed changes to the system that have not been approved or disapproved within {{ insert: param, cm-03.01_odp.03 }};' + links: + - href: '#cm-3.1_smt.c' + rel: assessment-for - id: cm-3.1_obj.d name: assessment-objective props: @@ -16361,6 +17821,9 @@ catalog: value: CM-03(01)(d) class: sp800-53a prose: ' {{ insert: param, cm-03.01_odp.01 }} are used to prohibit changes to the system until designated approvals are received;' + links: + - href: '#cm-3.1_smt.d' + rel: assessment-for - id: cm-3.1_obj.e name: assessment-objective props: @@ -16368,6 +17831,9 @@ catalog: value: CM-03(01)(e) class: sp800-53a prose: ' {{ insert: param, cm-03.01_odp.01 }} are used to document all changes to the system;' + links: + - href: '#cm-3.1_smt.e' + rel: assessment-for - id: cm-3.1_obj.f name: assessment-objective props: @@ -16375,6 +17841,12 @@ catalog: value: CM-03(01)(f) class: sp800-53a prose: ' {{ insert: param, cm-03.01_odp.01 }} are used to notify {{ insert: param, cm-03.01_odp.04 }} when approved changes to the system are completed.' + links: + - href: '#cm-3.1_smt.f' + rel: assessment-for + links: + - href: '#cm-3.1_smt' + rel: assessment-for - id: cm-3.1_asm-examine name: assessment-method props: @@ -16489,6 +17961,9 @@ catalog: value: CM-03(02)[01] class: sp800-53a prose: changes to the system are tested before finalizing the implementation of the changes; + links: + - href: '#cm-3.2_smt' + rel: assessment-for - id: cm-3.2_obj-2 name: assessment-objective props: @@ -16496,6 +17971,9 @@ catalog: value: CM-03(02)[02] class: sp800-53a prose: changes to the system are validated before finalizing the implementation of the changes; + links: + - href: '#cm-3.2_smt' + rel: assessment-for - id: cm-3.2_obj-3 name: assessment-objective props: @@ -16503,6 +17981,12 @@ catalog: value: CM-03(02)[03] class: sp800-53a prose: changes to the system are documented before finalizing the implementation of the changes. + links: + - href: '#cm-3.2_smt' + rel: assessment-for + links: + - href: '#cm-3.2_smt' + rel: assessment-for - id: cm-3.2_asm-examine name: assessment-method props: @@ -16648,6 +18132,9 @@ catalog: value: CM-03(04)[01] class: sp800-53a prose: ' {{ insert: param, cm-03.04_odp.01 }} are required to be members of the {{ insert: param, cm-03.04_odp.03 }};' + links: + - href: '#cm-3.4_smt' + rel: assessment-for - id: cm-3.4_obj-2 name: assessment-objective props: @@ -16655,6 +18142,12 @@ catalog: value: CM-03(04)[02] class: sp800-53a prose: ' {{ insert: param, cm-03.04_odp.02 }} are required to be members of the {{ insert: param, cm-03.04_odp.03 }}.' + links: + - href: '#cm-3.4_smt' + rel: assessment-for + links: + - href: '#cm-3.4_smt' + rel: assessment-for - id: cm-3.4_asm-examine name: assessment-method props: @@ -16751,6 +18244,9 @@ catalog: value: CM-03(06) class: sp800-53a prose: 'cryptographic mechanisms used to provide {{ insert: param, cm-03.06_odp }} are under configuration management.' + links: + - href: '#cm-3.6_smt' + rel: assessment-for - id: cm-3.6_asm-examine name: assessment-method props: @@ -16879,6 +18375,9 @@ catalog: value: CM-04[01] class: sp800-53a prose: changes to the system are analyzed to determine potential security impacts prior to change implementation; + links: + - href: '#cm-4_smt' + rel: assessment-for - id: cm-4_obj-2 name: assessment-objective props: @@ -16886,6 +18385,12 @@ catalog: value: CM-04[02] class: sp800-53a prose: changes to the system are analyzed to determine potential privacy impacts prior to change implementation. + links: + - href: '#cm-4_smt' + rel: assessment-for + links: + - href: '#cm-4_smt' + rel: assessment-for - id: cm-4_asm-examine name: assessment-method props: @@ -17009,6 +18514,9 @@ catalog: value: CM-04(01)[01] class: sp800-53a prose: changes to the system are analyzed in a separate test environment before implementation in an operational environment; + links: + - href: '#cm-4.1_smt' + rel: assessment-for - id: cm-4.1_obj-2 name: assessment-objective props: @@ -17016,6 +18524,9 @@ catalog: value: CM-04(01)[02] class: sp800-53a prose: changes to the system are analyzed for security impacts due to flaws; + links: + - href: '#cm-4.1_smt' + rel: assessment-for - id: cm-4.1_obj-3 name: assessment-objective props: @@ -17023,6 +18534,9 @@ catalog: value: CM-04(01)[03] class: sp800-53a prose: changes to the system are analyzed for privacy impacts due to flaws; + links: + - href: '#cm-4.1_smt' + rel: assessment-for - id: cm-4.1_obj-4 name: assessment-objective props: @@ -17030,6 +18544,9 @@ catalog: value: CM-04(01)[04] class: sp800-53a prose: changes to the system are analyzed for security impacts due to weaknesses; + links: + - href: '#cm-4.1_smt' + rel: assessment-for - id: cm-4.1_obj-5 name: assessment-objective props: @@ -17037,6 +18554,9 @@ catalog: value: CM-04(01)[05] class: sp800-53a prose: changes to the system are analyzed for privacy impacts due to weaknesses; + links: + - href: '#cm-4.1_smt' + rel: assessment-for - id: cm-4.1_obj-6 name: assessment-objective props: @@ -17044,6 +18564,9 @@ catalog: value: CM-04(01)[06] class: sp800-53a prose: changes to the system are analyzed for security impacts due to incompatibility; + links: + - href: '#cm-4.1_smt' + rel: assessment-for - id: cm-4.1_obj-7 name: assessment-objective props: @@ -17051,6 +18574,9 @@ catalog: value: CM-04(01)[07] class: sp800-53a prose: changes to the system are analyzed for privacy impacts due to incompatibility; + links: + - href: '#cm-4.1_smt' + rel: assessment-for - id: cm-4.1_obj-8 name: assessment-objective props: @@ -17058,6 +18584,9 @@ catalog: value: CM-04(01)[08] class: sp800-53a prose: changes to the system are analyzed for security impacts due to intentional malice; + links: + - href: '#cm-4.1_smt' + rel: assessment-for - id: cm-4.1_obj-9 name: assessment-objective props: @@ -17065,6 +18594,12 @@ catalog: value: CM-04(01)[09] class: sp800-53a prose: changes to the system are analyzed for privacy impacts due to intentional malice. + links: + - href: '#cm-4.1_smt' + rel: assessment-for + links: + - href: '#cm-4.1_smt' + rel: assessment-for - id: cm-4.1_asm-examine name: assessment-method props: @@ -17191,6 +18726,9 @@ catalog: value: CM-04(02)[01] class: sp800-53a prose: the impacted controls are implemented correctly with regard to meeting the security requirements for the system after system changes; + links: + - href: '#cm-4.2_smt' + rel: assessment-for - id: cm-4.2_obj-2 name: assessment-objective props: @@ -17198,6 +18736,9 @@ catalog: value: CM-04(02)[02] class: sp800-53a prose: the impacted controls are implemented correctly with regard to meeting the privacy requirements for the system after system changes; + links: + - href: '#cm-4.2_smt' + rel: assessment-for - id: cm-4.2_obj-3 name: assessment-objective props: @@ -17205,6 +18746,9 @@ catalog: value: CM-04(02)[03] class: sp800-53a prose: the impacted controls are operating as intended with regard to meeting the security requirements for the system after system changes; + links: + - href: '#cm-4.2_smt' + rel: assessment-for - id: cm-4.2_obj-4 name: assessment-objective props: @@ -17212,6 +18756,9 @@ catalog: value: CM-04(02)[04] class: sp800-53a prose: the impacted controls are operating as intended with regard to meeting the privacy requirements for the system after system changes; + links: + - href: '#cm-4.2_smt' + rel: assessment-for - id: cm-4.2_obj-5 name: assessment-objective props: @@ -17219,6 +18766,9 @@ catalog: value: CM-04(02)[05] class: sp800-53a prose: the impacted controls are producing the desired outcome with regard to meeting the security requirements for the system after system changes; + links: + - href: '#cm-4.2_smt' + rel: assessment-for - id: cm-4.2_obj-6 name: assessment-objective props: @@ -17226,6 +18776,12 @@ catalog: value: CM-04(02)[06] class: sp800-53a prose: the impacted controls are producing the desired outcome with regard to meeting the privacy requirements for the system after system changes. + links: + - href: '#cm-4.2_smt' + rel: assessment-for + links: + - href: '#cm-4.2_smt' + rel: assessment-for - id: cm-4.2_asm-examine name: assessment-method props: @@ -17361,6 +18917,9 @@ catalog: value: CM-05[01] class: sp800-53a prose: physical access restrictions associated with changes to the system are defined and documented; + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_obj-2 name: assessment-objective props: @@ -17368,6 +18927,9 @@ catalog: value: CM-05[02] class: sp800-53a prose: physical access restrictions associated with changes to the system are approved; + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_obj-3 name: assessment-objective props: @@ -17375,6 +18937,9 @@ catalog: value: CM-05[03] class: sp800-53a prose: physical access restrictions associated with changes to the system are enforced; + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_obj-4 name: assessment-objective props: @@ -17382,6 +18947,9 @@ catalog: value: CM-05[04] class: sp800-53a prose: logical access restrictions associated with changes to the system are defined and documented; + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_obj-5 name: assessment-objective props: @@ -17389,6 +18957,9 @@ catalog: value: CM-05[05] class: sp800-53a prose: logical access restrictions associated with changes to the system are approved; + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_obj-6 name: assessment-objective props: @@ -17396,6 +18967,12 @@ catalog: value: CM-05[06] class: sp800-53a prose: logical access restrictions associated with changes to the system are enforced. + links: + - href: '#cm-5_smt' + rel: assessment-for + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_asm-examine name: assessment-method props: @@ -17543,6 +19120,9 @@ catalog: value: CM-05(01)(a) class: sp800-53a prose: 'access restrictions for change are enforced using {{ insert: param, cm-05.01_odp }};' + links: + - href: '#cm-5.1_smt.a' + rel: assessment-for - id: cm-5.1_obj.b name: assessment-objective props: @@ -17550,6 +19130,12 @@ catalog: value: CM-05(01)(b) class: sp800-53a prose: audit records of enforcement actions are automatically generated. + links: + - href: '#cm-5.1_smt.b' + rel: assessment-for + links: + - href: '#cm-5.1_smt' + rel: assessment-for - id: cm-5.1_asm-examine name: assessment-method props: @@ -17782,6 +19368,9 @@ catalog: value: CM-06a. class: sp800-53a prose: 'configuration settings that reflect the most restrictive mode consistent with operational requirements are established and documented for components employed within the system using {{ insert: param, cm-06_odp.01 }};' + links: + - href: '#cm-6_smt.a' + rel: assessment-for - id: cm-6_obj.b name: assessment-objective props: @@ -17789,6 +19378,9 @@ catalog: value: CM-06b. class: sp800-53a prose: the configuration settings documented in CM-06a are implemented; + links: + - href: '#cm-6_smt.b' + rel: assessment-for - id: cm-6_obj.c name: assessment-objective props: @@ -17803,6 +19395,9 @@ catalog: value: CM-06c.[01] class: sp800-53a prose: 'any deviations from established configuration settings for {{ insert: param, cm-06_odp.02 }} are identified and documented based on {{ insert: param, cm-06_odp.03 }};' + links: + - href: '#cm-6_smt.c' + rel: assessment-for - id: cm-6_obj.c-2 name: assessment-objective props: @@ -17810,6 +19405,12 @@ catalog: value: CM-06c.[02] class: sp800-53a prose: 'any deviations from established configuration settings for {{ insert: param, cm-06_odp.02 }} are approved;' + links: + - href: '#cm-6_smt.c' + rel: assessment-for + links: + - href: '#cm-6_smt.c' + rel: assessment-for - id: cm-6_obj.d name: assessment-objective props: @@ -17824,6 +19425,9 @@ catalog: value: CM-06d.[01] class: sp800-53a prose: changes to the configuration settings are monitored in accordance with organizational policies and procedures; + links: + - href: '#cm-6_smt.d' + rel: assessment-for - id: cm-6_obj.d-2 name: assessment-objective props: @@ -17831,6 +19435,15 @@ catalog: value: CM-06d.[02] class: sp800-53a prose: changes to the configuration settings are controlled in accordance with organizational policies and procedures. + links: + - href: '#cm-6_smt.d' + rel: assessment-for + links: + - href: '#cm-6_smt.d' + rel: assessment-for + links: + - href: '#cm-6_smt' + rel: assessment-for - id: cm-6_asm-examine name: assessment-method props: @@ -17994,6 +19607,9 @@ catalog: value: CM-06(01)[01] class: sp800-53a prose: 'configuration settings for {{ insert: param, cm-06.01_odp.01 }} are managed using {{ insert: param, cm-06.01_odp.02 }};' + links: + - href: '#cm-6.1_smt' + rel: assessment-for - id: cm-6.1_obj-2 name: assessment-objective props: @@ -18001,6 +19617,9 @@ catalog: value: CM-06(01)[02] class: sp800-53a prose: 'configuration settings for {{ insert: param, cm-06.01_odp.01 }} are applied using {{ insert: param, cm-06.01_odp.03 }};' + links: + - href: '#cm-6.1_smt' + rel: assessment-for - id: cm-6.1_obj-3 name: assessment-objective props: @@ -18008,6 +19627,12 @@ catalog: value: CM-06(01)[03] class: sp800-53a prose: 'configuration settings for {{ insert: param, cm-06.01_odp.01 }} are verified using {{ insert: param, cm-06.01_odp.04 }}.' + links: + - href: '#cm-6.1_smt' + rel: assessment-for + links: + - href: '#cm-6.1_smt' + rel: assessment-for - id: cm-6.1_asm-examine name: assessment-method props: @@ -18135,6 +19760,9 @@ catalog: value: CM-06(02) class: sp800-53a prose: ' {{ insert: param, cm-06.02_odp.01 }} are taken in response to unauthorized changes to {{ insert: param, cm-06.02_odp.02 }}.' + links: + - href: '#cm-6.2_smt' + rel: assessment-for - id: cm-6.2_asm-examine name: assessment-method props: @@ -18371,6 +19999,9 @@ catalog: value: CM-07a. class: sp800-53a prose: 'the system is configured to provide only {{ insert: param, cm-07_odp.01 }};' + links: + - href: '#cm-7_smt.a' + rel: assessment-for - id: cm-7_obj.b name: assessment-objective props: @@ -18385,6 +20016,9 @@ catalog: value: CM-07b.[01] class: sp800-53a prose: 'the use of {{ insert: param, cm-07_odp.02 }} is prohibited or restricted;' + links: + - href: '#cm-7_smt.b' + rel: assessment-for - id: cm-7_obj.b-2 name: assessment-objective props: @@ -18392,6 +20026,9 @@ catalog: value: CM-07b.[02] class: sp800-53a prose: 'the use of {{ insert: param, cm-07_odp.03 }} is prohibited or restricted;' + links: + - href: '#cm-7_smt.b' + rel: assessment-for - id: cm-7_obj.b-3 name: assessment-objective props: @@ -18399,6 +20036,9 @@ catalog: value: CM-07b.[03] class: sp800-53a prose: 'the use of {{ insert: param, cm-07_odp.04 }} is prohibited or restricted;' + links: + - href: '#cm-7_smt.b' + rel: assessment-for - id: cm-7_obj.b-4 name: assessment-objective props: @@ -18406,6 +20046,9 @@ catalog: value: CM-07b.[04] class: sp800-53a prose: 'the use of {{ insert: param, cm-07_odp.05 }} is prohibited or restricted;' + links: + - href: '#cm-7_smt.b' + rel: assessment-for - id: cm-7_obj.b-5 name: assessment-objective props: @@ -18413,6 +20056,15 @@ catalog: value: CM-07b.[05] class: sp800-53a prose: 'the use of {{ insert: param, cm-07_odp.06 }} is prohibited or restricted.' + links: + - href: '#cm-7_smt.b' + rel: assessment-for + links: + - href: '#cm-7_smt.b' + rel: assessment-for + links: + - href: '#cm-7_smt' + rel: assessment-for - id: cm-7_asm-examine name: assessment-method props: @@ -18601,6 +20253,9 @@ catalog: value: CM-07(01)(a) class: sp800-53a prose: 'the system is reviewed {{ insert: param, cm-07.01_odp.01 }} to identify unnecessary and/or non-secure functions, ports, protocols, software, and services:' + links: + - href: '#cm-7.1_smt.a' + rel: assessment-for - id: cm-7.1_obj.b name: assessment-objective props: @@ -18615,6 +20270,9 @@ catalog: value: CM-07(01)(b)[01] class: sp800-53a prose: ' {{ insert: param, cm-07.01_odp.02 }} deemed to be unnecessary and/or non-secure are disabled or removed;' + links: + - href: '#cm-7.1_smt.b' + rel: assessment-for - id: cm-7.1_obj.b-2 name: assessment-objective props: @@ -18622,6 +20280,9 @@ catalog: value: CM-07(01)(b)[02] class: sp800-53a prose: ' {{ insert: param, cm-07.01_odp.03 }} deemed to be unnecessary and/or non-secure are disabled or removed;' + links: + - href: '#cm-7.1_smt.b' + rel: assessment-for - id: cm-7.1_obj.b-3 name: assessment-objective props: @@ -18629,6 +20290,9 @@ catalog: value: CM-07(01)(b)[03] class: sp800-53a prose: ' {{ insert: param, cm-07.01_odp.04 }} deemed to be unnecessary and/or non-secure are disabled or removed;' + links: + - href: '#cm-7.1_smt.b' + rel: assessment-for - id: cm-7.1_obj.b-4 name: assessment-objective props: @@ -18636,6 +20300,9 @@ catalog: value: CM-07(01)(b)[04] class: sp800-53a prose: ' {{ insert: param, cm-07.01_odp.05 }} deemed to be unnecessary and/or non-secure is disabled or removed;' + links: + - href: '#cm-7.1_smt.b' + rel: assessment-for - id: cm-7.1_obj.b-5 name: assessment-objective props: @@ -18643,6 +20310,15 @@ catalog: value: CM-07(01)(b)[05] class: sp800-53a prose: ' {{ insert: param, cm-07.01_odp.06 }} deemed to be unnecessary and/or non-secure are disabled or removed.' + links: + - href: '#cm-7.1_smt.b' + rel: assessment-for + links: + - href: '#cm-7.1_smt.b' + rel: assessment-for + links: + - href: '#cm-7.1_smt' + rel: assessment-for - id: cm-7.1_asm-examine name: assessment-method props: @@ -18774,6 +20450,9 @@ catalog: value: CM-07(02) class: sp800-53a prose: 'program execution is prevented in accordance with {{ insert: param, cm-07.02_odp.01 }}.' + links: + - href: '#cm-7.2_smt' + rel: assessment-for - id: cm-7.2_asm-examine name: assessment-method props: @@ -18946,6 +20625,9 @@ catalog: value: CM-07(05)(a) class: sp800-53a prose: ' {{ insert: param, cm-07.05_odp.01 }} are identified;' + links: + - href: '#cm-7.5_smt.a' + rel: assessment-for - id: cm-7.5_obj.b name: assessment-objective props: @@ -18953,6 +20635,9 @@ catalog: value: CM-07(05)(b) class: sp800-53a prose: a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the system is employed; + links: + - href: '#cm-7.5_smt.b' + rel: assessment-for - id: cm-7.5_obj.c name: assessment-objective props: @@ -18960,6 +20645,12 @@ catalog: value: CM-07(05)(c) class: sp800-53a prose: 'the list of authorized software programs is reviewed and updated {{ insert: param, cm-07.05_odp.02 }}.' + links: + - href: '#cm-7.5_smt.c' + rel: assessment-for + links: + - href: '#cm-7.5_smt' + rel: assessment-for - id: cm-7.5_asm-examine name: assessment-method props: @@ -19195,6 +20886,9 @@ catalog: value: CM-08a.01 class: sp800-53a prose: an inventory of system components that accurately reflects the system is developed and documented; + links: + - href: '#cm-8_smt.a.1' + rel: assessment-for - id: cm-8_obj.a.2 name: assessment-objective props: @@ -19202,6 +20896,9 @@ catalog: value: CM-08a.02 class: sp800-53a prose: an inventory of system components that includes all components within the system is developed and documented; + links: + - href: '#cm-8_smt.a.2' + rel: assessment-for - id: cm-8_obj.a.3 name: assessment-objective props: @@ -19209,6 +20906,9 @@ catalog: value: CM-08a.03 class: sp800-53a prose: an inventory of system components that does not include duplicate accounting of components or components assigned to any other system is developed and documented; + links: + - href: '#cm-8_smt.a.3' + rel: assessment-for - id: cm-8_obj.a.4 name: assessment-objective props: @@ -19216,6 +20916,9 @@ catalog: value: CM-08a.04 class: sp800-53a prose: an inventory of system components that is at the level of granularity deemed necessary for tracking and reporting is developed and documented; + links: + - href: '#cm-8_smt.a.4' + rel: assessment-for - id: cm-8_obj.a.5 name: assessment-objective props: @@ -19223,6 +20926,12 @@ catalog: value: CM-08a.05 class: sp800-53a prose: 'an inventory of system components that includes {{ insert: param, cm-08_odp.01 }} is developed and documented;' + links: + - href: '#cm-8_smt.a.5' + rel: assessment-for + links: + - href: '#cm-8_smt.a' + rel: assessment-for - id: cm-8_obj.b name: assessment-objective props: @@ -19230,6 +20939,12 @@ catalog: value: CM-08b. class: sp800-53a prose: 'the system component inventory is reviewed and updated {{ insert: param, cm-08_odp.02 }}.' + links: + - href: '#cm-8_smt.b' + rel: assessment-for + links: + - href: '#cm-8_smt' + rel: assessment-for - id: cm-8_asm-examine name: assessment-method props: @@ -19335,6 +21050,9 @@ catalog: value: CM-08(01)[01] class: sp800-53a prose: the inventory of system components is updated as part of component installations; + links: + - href: '#cm-8.1_smt' + rel: assessment-for - id: cm-8.1_obj-2 name: assessment-objective props: @@ -19342,6 +21060,9 @@ catalog: value: CM-08(01)[02] class: sp800-53a prose: the inventory of system components is updated as part of component removals; + links: + - href: '#cm-8.1_smt' + rel: assessment-for - id: cm-8.1_obj-3 name: assessment-objective props: @@ -19349,6 +21070,12 @@ catalog: value: CM-08(01)[03] class: sp800-53a prose: the inventory of system components is updated as part of system updates. + links: + - href: '#cm-8.1_smt' + rel: assessment-for + links: + - href: '#cm-8.1_smt' + rel: assessment-for - id: cm-8.1_asm-examine name: assessment-method props: @@ -19503,6 +21230,9 @@ catalog: value: CM-08(02)[01] class: sp800-53a prose: ' {{ insert: param, cm-08.02_odp.01 }} are used to maintain the currency of the system component inventory;' + links: + - href: '#cm-8.2_smt' + rel: assessment-for - id: cm-8.2_obj-2 name: assessment-objective props: @@ -19510,6 +21240,9 @@ catalog: value: CM-08(02)[02] class: sp800-53a prose: ' {{ insert: param, cm-08.02_odp.02 }} are used to maintain the completeness of the system component inventory;' + links: + - href: '#cm-8.2_smt' + rel: assessment-for - id: cm-8.2_obj-3 name: assessment-objective props: @@ -19517,6 +21250,9 @@ catalog: value: CM-08(02)[03] class: sp800-53a prose: ' {{ insert: param, cm-08.02_odp.03 }} are used to maintain the accuracy of the system component inventory;' + links: + - href: '#cm-8.2_smt' + rel: assessment-for - id: cm-8.2_obj-4 name: assessment-objective props: @@ -19524,6 +21260,12 @@ catalog: value: CM-08(02)[04] class: sp800-53a prose: ' {{ insert: param, cm-08.02_odp.04 }} are used to maintain the availability of the system component inventory.' + links: + - href: '#cm-8.2_smt' + rel: assessment-for + links: + - href: '#cm-8.2_smt' + rel: assessment-for - id: cm-8.2_asm-examine name: assessment-method props: @@ -19739,6 +21481,9 @@ catalog: value: CM-08(03)(a)[01] class: sp800-53a prose: 'the presence of unauthorized hardware within the system is detected using {{ insert: param, cm-08.03_odp.01 }} {{ insert: param, cm-08.03_odp.04 }};' + links: + - href: '#cm-8.3_smt.a' + rel: assessment-for - id: cm-8.3_obj.a-2 name: assessment-objective props: @@ -19746,6 +21491,9 @@ catalog: value: CM-08(03)(a)[02] class: sp800-53a prose: 'the presence of unauthorized software within the system is detected using {{ insert: param, cm-08.03_odp.02 }} {{ insert: param, cm-08.03_odp.04 }};' + links: + - href: '#cm-8.3_smt.a' + rel: assessment-for - id: cm-8.3_obj.a-3 name: assessment-objective props: @@ -19753,6 +21501,12 @@ catalog: value: CM-08(03)(a)[03] class: sp800-53a prose: 'the presence of unauthorized firmware within the system is detected using {{ insert: param, cm-08.03_odp.03 }} {{ insert: param, cm-08.03_odp.04 }};' + links: + - href: '#cm-8.3_smt.a' + rel: assessment-for + links: + - href: '#cm-8.3_smt.a' + rel: assessment-for - id: cm-8.3_obj.b name: assessment-objective props: @@ -19767,6 +21521,9 @@ catalog: value: CM-08(03)(b)[01] class: sp800-53a prose: ' {{ insert: param, cm-08.03_odp.05 }} are taken when unauthorized hardware is detected;' + links: + - href: '#cm-8.3_smt.b' + rel: assessment-for - id: cm-8.3_obj.b-2 name: assessment-objective props: @@ -19774,6 +21531,9 @@ catalog: value: CM-08(03)(b)[02] class: sp800-53a prose: ' {{ insert: param, cm-08.03_odp.05 }} are taken when unauthorized software is detected;' + links: + - href: '#cm-8.3_smt.b' + rel: assessment-for - id: cm-8.3_obj.b-3 name: assessment-objective props: @@ -19781,6 +21541,15 @@ catalog: value: CM-08(03)(b)[03] class: sp800-53a prose: ' {{ insert: param, cm-08.03_odp.05 }} are taken when unauthorized firmware is detected.' + links: + - href: '#cm-8.3_smt.b' + rel: assessment-for + links: + - href: '#cm-8.3_smt.b' + rel: assessment-for + links: + - href: '#cm-8.3_smt' + rel: assessment-for - id: cm-8.3_asm-examine name: assessment-method props: @@ -19908,6 +21677,9 @@ catalog: value: CM-08(04) class: sp800-53a prose: 'individuals responsible and accountable for administering system components are identified by {{ insert: param, cm-08.04_odp }} in the system component inventory.' + links: + - href: '#cm-8.4_smt' + rel: assessment-for - id: cm-8.4_asm-examine name: assessment-method props: @@ -20068,6 +21840,9 @@ catalog: value: CM-09[01] class: sp800-53a prose: a configuration management plan for the system is developed and documented; + links: + - href: '#cm-9_smt' + rel: assessment-for - id: cm-9_obj-2 name: assessment-objective props: @@ -20075,6 +21850,9 @@ catalog: value: CM-09[02] class: sp800-53a prose: a configuration management plan for the system is implemented; + links: + - href: '#cm-9_smt' + rel: assessment-for - id: cm-9_obj.a name: assessment-objective props: @@ -20089,6 +21867,9 @@ catalog: value: CM-09a.[01] class: sp800-53a prose: the configuration management plan addresses roles; + links: + - href: '#cm-9_smt.a' + rel: assessment-for - id: cm-9_obj.a-2 name: assessment-objective props: @@ -20096,6 +21877,9 @@ catalog: value: CM-09a.[02] class: sp800-53a prose: the configuration management plan addresses responsibilities; + links: + - href: '#cm-9_smt.a' + rel: assessment-for - id: cm-9_obj.a-3 name: assessment-objective props: @@ -20103,6 +21887,12 @@ catalog: value: CM-09a.[03] class: sp800-53a prose: the configuration management plan addresses configuration management processes and procedures; + links: + - href: '#cm-9_smt.a' + rel: assessment-for + links: + - href: '#cm-9_smt.a' + rel: assessment-for - id: cm-9_obj.b name: assessment-objective props: @@ -20117,6 +21907,9 @@ catalog: value: CM-09b.[01] class: sp800-53a prose: the configuration management plan establishes a process for identifying configuration items throughout the system development life cycle; + links: + - href: '#cm-9_smt.b' + rel: assessment-for - id: cm-9_obj.b-2 name: assessment-objective props: @@ -20124,6 +21917,12 @@ catalog: value: CM-09b.[02] class: sp800-53a prose: the configuration management plan establishes a process for managing the configuration of the configuration items; + links: + - href: '#cm-9_smt.b' + rel: assessment-for + links: + - href: '#cm-9_smt.b' + rel: assessment-for - id: cm-9_obj.c name: assessment-objective props: @@ -20138,6 +21937,9 @@ catalog: value: CM-09c.[01] class: sp800-53a prose: the configuration management plan defines the configuration items for the system; + links: + - href: '#cm-9_smt.c' + rel: assessment-for - id: cm-9_obj.c-2 name: assessment-objective props: @@ -20145,6 +21947,12 @@ catalog: value: CM-09c.[02] class: sp800-53a prose: the configuration management plan places the configuration items under configuration management; + links: + - href: '#cm-9_smt.c' + rel: assessment-for + links: + - href: '#cm-9_smt.c' + rel: assessment-for - id: cm-9_obj.d name: assessment-objective props: @@ -20152,6 +21960,9 @@ catalog: value: CM-09d. class: sp800-53a prose: 'the configuration management plan is reviewed and approved by {{ insert: param, cm-09_odp }};' + links: + - href: '#cm-9_smt.d' + rel: assessment-for - id: cm-9_obj.e name: assessment-objective props: @@ -20166,6 +21977,9 @@ catalog: value: CM-09e.[01] class: sp800-53a prose: the configuration management plan is protected from unauthorized disclosure; + links: + - href: '#cm-9_smt.e' + rel: assessment-for - id: cm-9_obj.e-2 name: assessment-objective props: @@ -20173,6 +21987,15 @@ catalog: value: CM-09e.[02] class: sp800-53a prose: the configuration management plan is protected from unauthorized modification. + links: + - href: '#cm-9_smt.e' + rel: assessment-for + links: + - href: '#cm-9_smt.e' + rel: assessment-for + links: + - href: '#cm-9_smt' + rel: assessment-for - id: cm-9_asm-examine name: assessment-method props: @@ -20308,6 +22131,9 @@ catalog: value: CM-10a. class: sp800-53a prose: software and associated documentation are used in accordance with contract agreements and copyright laws; + links: + - href: '#cm-10_smt.a' + rel: assessment-for - id: cm-10_obj.b name: assessment-objective props: @@ -20315,6 +22141,9 @@ catalog: value: CM-10b. class: sp800-53a prose: the use of software and associated documentation protected by quantity licenses is tracked to control copying and distribution; + links: + - href: '#cm-10_smt.b' + rel: assessment-for - id: cm-10_obj.c name: assessment-objective props: @@ -20322,6 +22151,12 @@ catalog: value: CM-10c. class: sp800-53a prose: the use of peer-to-peer file sharing technology is controlled and documented to ensure that peer-to-peer file sharing is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work. + links: + - href: '#cm-10_smt.c' + rel: assessment-for + links: + - href: '#cm-10_smt' + rel: assessment-for - id: cm-10_asm-examine name: assessment-method props: @@ -20498,6 +22333,9 @@ catalog: value: CM-11a. class: sp800-53a prose: ' {{ insert: param, cm-11_odp.01 }} governing the installation of software by users are established;' + links: + - href: '#cm-11_smt.a' + rel: assessment-for - id: cm-11_obj.b name: assessment-objective props: @@ -20505,6 +22343,9 @@ catalog: value: CM-11b. class: sp800-53a prose: 'software installation policies are enforced through {{ insert: param, cm-11_odp.02 }};' + links: + - href: '#cm-11_smt.b' + rel: assessment-for - id: cm-11_obj.c name: assessment-objective props: @@ -20512,6 +22353,12 @@ catalog: value: CM-11c. class: sp800-53a prose: 'compliance with {{ insert: param, cm-11_odp.01 }} is monitored {{ insert: param, cm-11_odp.03 }}.' + links: + - href: '#cm-11_smt.c' + rel: assessment-for + links: + - href: '#cm-11_smt' + rel: assessment-for - id: cm-11_asm-examine name: assessment-method props: @@ -20698,6 +22545,9 @@ catalog: value: CM-12a.[01] class: sp800-53a prose: 'the location of {{ insert: param, cm-12_odp }} is identified and documented;' + links: + - href: '#cm-12_smt.a' + rel: assessment-for - id: cm-12_obj.a-2 name: assessment-objective props: @@ -20705,6 +22555,9 @@ catalog: value: CM-12a.[02] class: sp800-53a prose: 'the specific system components on which {{ insert: param, cm-12_odp }} is processed are identified and documented;' + links: + - href: '#cm-12_smt.a' + rel: assessment-for - id: cm-12_obj.a-3 name: assessment-objective props: @@ -20712,6 +22565,12 @@ catalog: value: CM-12a.[03] class: sp800-53a prose: 'the specific system components on which {{ insert: param, cm-12_odp }} is stored are identified and documented;' + links: + - href: '#cm-12_smt.a' + rel: assessment-for + links: + - href: '#cm-12_smt.a' + rel: assessment-for - id: cm-12_obj.b name: assessment-objective props: @@ -20726,6 +22585,9 @@ catalog: value: CM-12b.[01] class: sp800-53a prose: 'the users who have access to the system and system components where {{ insert: param, cm-12_odp }} is processed are identified and documented;' + links: + - href: '#cm-12_smt.b' + rel: assessment-for - id: cm-12_obj.b-2 name: assessment-objective props: @@ -20733,6 +22595,12 @@ catalog: value: CM-12b.[02] class: sp800-53a prose: 'the users who have access to the system and system components where {{ insert: param, cm-12_odp }} is stored are identified and documented;' + links: + - href: '#cm-12_smt.b' + rel: assessment-for + links: + - href: '#cm-12_smt.b' + rel: assessment-for - id: cm-12_obj.c name: assessment-objective props: @@ -20747,6 +22615,9 @@ catalog: value: CM-12c.[01] class: sp800-53a prose: 'changes to the location (i.e., system or system components) where {{ insert: param, cm-12_odp }} is processed are documented;' + links: + - href: '#cm-12_smt.c' + rel: assessment-for - id: cm-12_obj.c-2 name: assessment-objective props: @@ -20754,6 +22625,15 @@ catalog: value: CM-12c.[02] class: sp800-53a prose: 'changes to the location (i.e., system or system components) where {{ insert: param, cm-12_odp }} is stored are documented.' + links: + - href: '#cm-12_smt.c' + rel: assessment-for + links: + - href: '#cm-12_smt.c' + rel: assessment-for + links: + - href: '#cm-12_smt' + rel: assessment-for - id: cm-12_asm-examine name: assessment-method props: @@ -20885,6 +22765,9 @@ catalog: value: CM-12(01) class: sp800-53a prose: 'automated tools are used to identify {{ insert: param, cm-12.01_odp.01 }} on {{ insert: param, cm-12.01_odp.02 }} to ensure that controls are in place to protect organizational information and individual privacy.' + links: + - href: '#cm-12.1_smt' + rel: assessment-for - id: cm-12.1_asm-examine name: assessment-method props: @@ -21168,6 +23051,9 @@ catalog: value: CP-01a.[01] class: sp800-53a prose: a contingency planning policy is developed and documented; + links: + - href: '#cp-1_smt.a' + rel: assessment-for - id: cp-1_obj.a-2 name: assessment-objective props: @@ -21175,6 +23061,9 @@ catalog: value: CP-01a.[02] class: sp800-53a prose: 'the contingency planning policy is disseminated to {{ insert: param, cp-01_odp.01 }};' + links: + - href: '#cp-1_smt.a' + rel: assessment-for - id: cp-1_obj.a-3 name: assessment-objective props: @@ -21182,6 +23071,9 @@ catalog: value: CP-01a.[03] class: sp800-53a prose: contingency planning procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls are developed and documented; + links: + - href: '#cp-1_smt.a' + rel: assessment-for - id: cp-1_obj.a-4 name: assessment-objective props: @@ -21189,6 +23081,9 @@ catalog: value: CP-01a.[04] class: sp800-53a prose: 'the contingency planning procedures are disseminated to {{ insert: param, cp-01_odp.02 }};' + links: + - href: '#cp-1_smt.a' + rel: assessment-for - id: cp-1_obj.a.1 name: assessment-objective props: @@ -21210,6 +23105,9 @@ catalog: value: CP-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses purpose;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-2 name: assessment-objective props: @@ -21217,6 +23115,9 @@ catalog: value: CP-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses scope;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-3 name: assessment-objective props: @@ -21224,6 +23125,9 @@ catalog: value: CP-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses roles;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-4 name: assessment-objective props: @@ -21231,6 +23135,9 @@ catalog: value: CP-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses responsibilities;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-5 name: assessment-objective props: @@ -21238,6 +23145,9 @@ catalog: value: CP-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses management commitment;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-6 name: assessment-objective props: @@ -21245,6 +23155,9 @@ catalog: value: CP-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses coordination among organizational entities;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-7 name: assessment-objective props: @@ -21252,6 +23165,12 @@ catalog: value: CP-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses compliance;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.b name: assessment-objective props: @@ -21259,6 +23178,15 @@ catalog: value: CP-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#cp-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#cp-1_smt.a.1' + rel: assessment-for + links: + - href: '#cp-1_smt.a' + rel: assessment-for - id: cp-1_obj.b name: assessment-objective props: @@ -21266,6 +23194,9 @@ catalog: value: CP-01b. class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the contingency planning policy and procedures;' + links: + - href: '#cp-1_smt.b' + rel: assessment-for - id: cp-1_obj.c name: assessment-objective props: @@ -21287,6 +23218,9 @@ catalog: value: CP-01c.01[01] class: sp800-53a prose: 'the current contingency planning policy is reviewed and updated {{ insert: param, cp-01_odp.05 }};' + links: + - href: '#cp-1_smt.c.1' + rel: assessment-for - id: cp-1_obj.c.1-2 name: assessment-objective props: @@ -21294,6 +23228,12 @@ catalog: value: CP-01c.01[02] class: sp800-53a prose: 'the current contingency planning policy is reviewed and updated following {{ insert: param, cp-01_odp.06 }};' + links: + - href: '#cp-1_smt.c.1' + rel: assessment-for + links: + - href: '#cp-1_smt.c.1' + rel: assessment-for - id: cp-1_obj.c.2 name: assessment-objective props: @@ -21308,6 +23248,9 @@ catalog: value: CP-01c.02[01] class: sp800-53a prose: 'the current contingency planning procedures are reviewed and updated {{ insert: param, cp-01_odp.07 }};' + links: + - href: '#cp-1_smt.c.2' + rel: assessment-for - id: cp-1_obj.c.2-2 name: assessment-objective props: @@ -21315,6 +23258,18 @@ catalog: value: CP-01c.02[02] class: sp800-53a prose: 'the current contingency planning procedures are reviewed and updated following {{ insert: param, cp-01_odp.08 }}.' + links: + - href: '#cp-1_smt.c.2' + rel: assessment-for + links: + - href: '#cp-1_smt.c.2' + rel: assessment-for + links: + - href: '#cp-1_smt.c' + rel: assessment-for + links: + - href: '#cp-1_smt' + rel: assessment-for - id: cp-1_asm-examine name: assessment-method props: @@ -21626,6 +23581,9 @@ catalog: value: CP-02a.01 class: sp800-53a prose: a contingency plan for the system is developed that identifies essential mission and business functions and associated contingency requirements; + links: + - href: '#cp-2_smt.a.1' + rel: assessment-for - id: cp-2_obj.a.2 name: assessment-objective props: @@ -21640,6 +23598,9 @@ catalog: value: CP-02a.02[01] class: sp800-53a prose: a contingency plan for the system is developed that provides recovery objectives; + links: + - href: '#cp-2_smt.a.2' + rel: assessment-for - id: cp-2_obj.a.2-2 name: assessment-objective props: @@ -21647,6 +23608,9 @@ catalog: value: CP-02a.02[02] class: sp800-53a prose: a contingency plan for the system is developed that provides restoration priorities; + links: + - href: '#cp-2_smt.a.2' + rel: assessment-for - id: cp-2_obj.a.2-3 name: assessment-objective props: @@ -21654,6 +23618,12 @@ catalog: value: CP-02a.02[03] class: sp800-53a prose: a contingency plan for the system is developed that provides metrics; + links: + - href: '#cp-2_smt.a.2' + rel: assessment-for + links: + - href: '#cp-2_smt.a.2' + rel: assessment-for - id: cp-2_obj.a.3 name: assessment-objective props: @@ -21668,6 +23638,9 @@ catalog: value: CP-02a.03[01] class: sp800-53a prose: a contingency plan for the system is developed that addresses contingency roles; + links: + - href: '#cp-2_smt.a.3' + rel: assessment-for - id: cp-2_obj.a.3-2 name: assessment-objective props: @@ -21675,6 +23648,9 @@ catalog: value: CP-02a.03[02] class: sp800-53a prose: a contingency plan for the system is developed that addresses contingency responsibilities; + links: + - href: '#cp-2_smt.a.3' + rel: assessment-for - id: cp-2_obj.a.3-3 name: assessment-objective props: @@ -21682,6 +23658,12 @@ catalog: value: CP-02a.03[03] class: sp800-53a prose: a contingency plan for the system is developed that addresses assigned individuals with contact information; + links: + - href: '#cp-2_smt.a.3' + rel: assessment-for + links: + - href: '#cp-2_smt.a.3' + rel: assessment-for - id: cp-2_obj.a.4 name: assessment-objective props: @@ -21689,6 +23671,9 @@ catalog: value: CP-02a.04 class: sp800-53a prose: a contingency plan for the system is developed that addresses maintaining essential mission and business functions despite a system disruption, compromise, or failure; + links: + - href: '#cp-2_smt.a.4' + rel: assessment-for - id: cp-2_obj.a.5 name: assessment-objective props: @@ -21696,6 +23681,9 @@ catalog: value: CP-02a.05 class: sp800-53a prose: a contingency plan for the system is developed that addresses eventual, full-system restoration without deterioration of the controls originally planned and implemented; + links: + - href: '#cp-2_smt.a.5' + rel: assessment-for - id: cp-2_obj.a.6 name: assessment-objective props: @@ -21703,6 +23691,9 @@ catalog: value: CP-02a.06 class: sp800-53a prose: a contingency plan for the system is developed that addresses the sharing of contingency information; + links: + - href: '#cp-2_smt.a.6' + rel: assessment-for - id: cp-2_obj.a.7 name: assessment-objective props: @@ -21717,6 +23708,9 @@ catalog: value: CP-02a.07[01] class: sp800-53a prose: 'a contingency plan for the system is developed that is reviewed by {{ insert: param, cp-02_odp.01 }};' + links: + - href: '#cp-2_smt.a.7' + rel: assessment-for - id: cp-2_obj.a.7-2 name: assessment-objective props: @@ -21724,6 +23718,15 @@ catalog: value: CP-02a.07[02] class: sp800-53a prose: 'a contingency plan for the system is developed that is approved by {{ insert: param, cp-02_odp.02 }};' + links: + - href: '#cp-2_smt.a.7' + rel: assessment-for + links: + - href: '#cp-2_smt.a.7' + rel: assessment-for + links: + - href: '#cp-2_smt.a' + rel: assessment-for - id: cp-2_obj.b name: assessment-objective props: @@ -21738,6 +23741,9 @@ catalog: value: CP-02b.[01] class: sp800-53a prose: 'copies of the contingency plan are distributed to {{ insert: param, cp-02_odp.03 }};' + links: + - href: '#cp-2_smt.b' + rel: assessment-for - id: cp-2_obj.b-2 name: assessment-objective props: @@ -21745,6 +23751,12 @@ catalog: value: CP-02b.[02] class: sp800-53a prose: 'copies of the contingency plan are distributed to {{ insert: param, cp-02_odp.04 }};' + links: + - href: '#cp-2_smt.b' + rel: assessment-for + links: + - href: '#cp-2_smt.b' + rel: assessment-for - id: cp-2_obj.c name: assessment-objective props: @@ -21752,6 +23764,9 @@ catalog: value: CP-02c. class: sp800-53a prose: contingency planning activities are coordinated with incident handling activities; + links: + - href: '#cp-2_smt.c' + rel: assessment-for - id: cp-2_obj.d name: assessment-objective props: @@ -21759,6 +23774,9 @@ catalog: value: CP-02d. class: sp800-53a prose: 'the contingency plan for the system is reviewed {{ insert: param, cp-02_odp.05 }};' + links: + - href: '#cp-2_smt.d' + rel: assessment-for - id: cp-2_obj.e name: assessment-objective props: @@ -21773,6 +23791,9 @@ catalog: value: CP-02e.[01] class: sp800-53a prose: the contingency plan is updated to address changes to the organization, system, or environment of operation; + links: + - href: '#cp-2_smt.e' + rel: assessment-for - id: cp-2_obj.e-2 name: assessment-objective props: @@ -21780,6 +23801,12 @@ catalog: value: CP-02e.[02] class: sp800-53a prose: the contingency plan is updated to address problems encountered during contingency plan implementation, execution, or testing; + links: + - href: '#cp-2_smt.e' + rel: assessment-for + links: + - href: '#cp-2_smt.e' + rel: assessment-for - id: cp-2_obj.f name: assessment-objective props: @@ -21794,6 +23821,9 @@ catalog: value: CP-02f.[01] class: sp800-53a prose: 'contingency plan changes are communicated to {{ insert: param, cp-02_odp.06 }};' + links: + - href: '#cp-2_smt.f' + rel: assessment-for - id: cp-2_obj.f-2 name: assessment-objective props: @@ -21801,6 +23831,12 @@ catalog: value: CP-02f.[02] class: sp800-53a prose: 'contingency plan changes are communicated to {{ insert: param, cp-02_odp.07 }};' + links: + - href: '#cp-2_smt.f' + rel: assessment-for + links: + - href: '#cp-2_smt.f' + rel: assessment-for - id: cp-2_obj.g name: assessment-objective props: @@ -21815,6 +23851,9 @@ catalog: value: CP-02g.[01] class: sp800-53a prose: lessons learned from contingency plan testing or actual contingency activities are incorporated into contingency testing; + links: + - href: '#cp-2_smt.g' + rel: assessment-for - id: cp-2_obj.g-2 name: assessment-objective props: @@ -21822,6 +23861,12 @@ catalog: value: CP-02g.[02] class: sp800-53a prose: lessons learned from contingency plan training or actual contingency activities are incorporated into contingency testing and training; + links: + - href: '#cp-2_smt.g' + rel: assessment-for + links: + - href: '#cp-2_smt.g' + rel: assessment-for - id: cp-2_obj.h name: assessment-objective props: @@ -21836,6 +23881,9 @@ catalog: value: CP-02h.[01] class: sp800-53a prose: the contingency plan is protected from unauthorized disclosure; + links: + - href: '#cp-2_smt.h' + rel: assessment-for - id: cp-2_obj.h-2 name: assessment-objective props: @@ -21843,6 +23891,15 @@ catalog: value: CP-02h.[02] class: sp800-53a prose: the contingency plan is protected from unauthorized modification. + links: + - href: '#cp-2_smt.h' + rel: assessment-for + links: + - href: '#cp-2_smt.h' + rel: assessment-for + links: + - href: '#cp-2_smt' + rel: assessment-for - id: cp-2_asm-examine name: assessment-method props: @@ -21932,6 +23989,9 @@ catalog: value: CP-02(01) class: sp800-53a prose: contingency plan development is coordinated with organizational elements responsible for related plans. + links: + - href: '#cp-2.1_smt' + rel: assessment-for - id: cp-2.1_asm-examine name: assessment-method props: @@ -22036,6 +24096,9 @@ catalog: value: CP-02(02)[01] class: sp800-53a prose: capacity planning is conducted so that the necessary capacity exists during contingency operations for information processing; + links: + - href: '#cp-2.2_smt' + rel: assessment-for - id: cp-2.2_obj-2 name: assessment-objective props: @@ -22043,6 +24106,9 @@ catalog: value: CP-02(02)[02] class: sp800-53a prose: capacity planning is conducted so that the necessary capacity exists during contingency operations for telecommunications; + links: + - href: '#cp-2.2_smt' + rel: assessment-for - id: cp-2.2_obj-3 name: assessment-objective props: @@ -22050,6 +24116,12 @@ catalog: value: CP-02(02)[03] class: sp800-53a prose: capacity planning is conducted so that the necessary capacity exists during contingency operations for environmental support. + links: + - href: '#cp-2.2_smt' + rel: assessment-for + links: + - href: '#cp-2.2_smt' + rel: assessment-for - id: cp-2.2_asm-examine name: assessment-method props: @@ -22143,6 +24215,9 @@ catalog: value: CP-02(03) class: sp800-53a prose: 'the resumption of {{ insert: param, cp-02.03_odp.01 }} mission and business functions are planned for within {{ insert: param, cp-02.03_odp.02 }} of contingency plan activation.' + links: + - href: '#cp-2.3_smt' + rel: assessment-for - id: cp-2.3_asm-examine name: assessment-method props: @@ -22251,6 +24326,9 @@ catalog: value: CP-02(05)[01] class: sp800-53a prose: 'the continuance of {{ insert: param, cp-02.05_odp }} mission and business functions with minimal or no loss of operational continuity is planned for;' + links: + - href: '#cp-2.5_smt' + rel: assessment-for - id: cp-2.5_obj-2 name: assessment-objective props: @@ -22258,6 +24336,12 @@ catalog: value: CP-02(05)[02] class: sp800-53a prose: continuity is sustained until full system restoration at primary processing and/or storage sites. + links: + - href: '#cp-2.5_smt' + rel: assessment-for + links: + - href: '#cp-2.5_smt' + rel: assessment-for - id: cp-2.5_asm-examine name: assessment-method props: @@ -22369,6 +24453,9 @@ catalog: value: CP-02(08) class: sp800-53a prose: 'critical system assets supporting {{ insert: param, cp-02.08_odp }} mission and business functions are identified.' + links: + - href: '#cp-2.8_smt' + rel: assessment-for - id: cp-2.8_asm-examine name: assessment-method props: @@ -22547,6 +24634,9 @@ catalog: value: CP-03a.01 class: sp800-53a prose: 'contingency training is provided to system users consistent with assigned roles and responsibilities within {{ insert: param, cp-03_odp.01 }} of assuming a contingency role or responsibility;' + links: + - href: '#cp-3_smt.a.1' + rel: assessment-for - id: cp-3_obj.a.2 name: assessment-objective props: @@ -22554,6 +24644,9 @@ catalog: value: CP-03a.02 class: sp800-53a prose: contingency training is provided to system users consistent with assigned roles and responsibilities when required by system changes; + links: + - href: '#cp-3_smt.a.2' + rel: assessment-for - id: cp-3_obj.a.3 name: assessment-objective props: @@ -22561,6 +24654,12 @@ catalog: value: CP-03a.03 class: sp800-53a prose: 'contingency training is provided to system users consistent with assigned roles and responsibilities {{ insert: param, cp-03_odp.02 }} thereafter;' + links: + - href: '#cp-3_smt.a.3' + rel: assessment-for + links: + - href: '#cp-3_smt.a' + rel: assessment-for - id: cp-3_obj.b name: assessment-objective props: @@ -22575,6 +24674,9 @@ catalog: value: CP-03b.[01] class: sp800-53a prose: 'the contingency plan training content is reviewed and updated {{ insert: param, cp-03_odp.03 }};' + links: + - href: '#cp-3_smt.b' + rel: assessment-for - id: cp-3_obj.b-2 name: assessment-objective props: @@ -22582,6 +24684,15 @@ catalog: value: CP-03b.[02] class: sp800-53a prose: 'the contingency plan training content is reviewed and updated following {{ insert: param, cp-03_odp.04 }}.' + links: + - href: '#cp-3_smt.b' + rel: assessment-for + links: + - href: '#cp-3_smt.b' + rel: assessment-for + links: + - href: '#cp-3_smt' + rel: assessment-for - id: cp-3_asm-examine name: assessment-method props: @@ -22671,6 +24782,9 @@ catalog: value: CP-03(01) class: sp800-53a prose: simulated events are incorporated into contingency training to facilitate effective response by personnel in crisis situations. + links: + - href: '#cp-3.1_smt' + rel: assessment-for - id: cp-3.1_asm-examine name: assessment-method props: @@ -22854,6 +24968,9 @@ catalog: value: CP-04a.[01] class: sp800-53a prose: 'the contingency plan for the system is tested {{ insert: param, cp-04_odp.01 }};' + links: + - href: '#cp-4_smt.a' + rel: assessment-for - id: cp-4_obj.a-2 name: assessment-objective props: @@ -22861,6 +24978,9 @@ catalog: value: CP-04a.[02] class: sp800-53a prose: ' {{ insert: param, cp-04_odp.02 }} are used to determine the effectiveness of the plan;' + links: + - href: '#cp-4_smt.a' + rel: assessment-for - id: cp-4_obj.a-3 name: assessment-objective props: @@ -22868,6 +24988,12 @@ catalog: value: CP-04a.[03] class: sp800-53a prose: ' {{ insert: param, cp-04_odp.03 }} are used to determine the readiness to execute the plan;' + links: + - href: '#cp-4_smt.a' + rel: assessment-for + links: + - href: '#cp-4_smt.a' + rel: assessment-for - id: cp-4_obj.b name: assessment-objective props: @@ -22875,6 +25001,9 @@ catalog: value: CP-04b. class: sp800-53a prose: the contingency plan test results are reviewed; + links: + - href: '#cp-4_smt.b' + rel: assessment-for - id: cp-4_obj.c name: assessment-objective props: @@ -22882,6 +25011,12 @@ catalog: value: CP-04c. class: sp800-53a prose: corrective actions are initiated, if needed. + links: + - href: '#cp-4_smt.c' + rel: assessment-for + links: + - href: '#cp-4_smt' + rel: assessment-for - id: cp-4_asm-examine name: assessment-method props: @@ -22976,6 +25111,9 @@ catalog: value: CP-04(01) class: sp800-53a prose: contingency plan testing is coordinated with organizational elements responsible for related plans. + links: + - href: '#cp-4.1_smt' + rel: assessment-for - id: cp-4.1_asm-examine name: assessment-method props: @@ -23088,6 +25226,9 @@ catalog: value: CP-04(02)(a) class: sp800-53a prose: the contingency plan is tested at the alternate processing site to familiarize contingency personnel with the facility and available resources; + links: + - href: '#cp-4.2_smt.a' + rel: assessment-for - id: cp-4.2_obj.b name: assessment-objective props: @@ -23095,6 +25236,12 @@ catalog: value: CP-04(02)(b) class: sp800-53a prose: the contingency plan is tested at the alternate processing site to evaluate the capabilities of the alternate processing site to support contingency operations. + links: + - href: '#cp-4.2_smt.b' + rel: assessment-for + links: + - href: '#cp-4.2_smt' + rel: assessment-for - id: cp-4.2_asm-examine name: assessment-method props: @@ -23231,6 +25378,9 @@ catalog: value: CP-06a.[01] class: sp800-53a prose: an alternate storage site is established; + links: + - href: '#cp-6_smt.a' + rel: assessment-for - id: cp-6_obj.a-2 name: assessment-objective props: @@ -23238,6 +25388,12 @@ catalog: value: CP-06a.[02] class: sp800-53a prose: establishment of the alternate storage site includes necessary agreements to permit the storage and retrieval of system backup information; + links: + - href: '#cp-6_smt.a' + rel: assessment-for + links: + - href: '#cp-6_smt.a' + rel: assessment-for - id: cp-6_obj.b name: assessment-objective props: @@ -23245,6 +25401,12 @@ catalog: value: CP-06b. class: sp800-53a prose: the alternate storage site provides controls equivalent to that of the primary site. + links: + - href: '#cp-6_smt.b' + rel: assessment-for + links: + - href: '#cp-6_smt' + rel: assessment-for - id: cp-6_asm-examine name: assessment-method props: @@ -23336,6 +25498,9 @@ catalog: value: CP-06(01) class: sp800-53a prose: an alternate storage site that is sufficiently separated from the primary storage site is identified to reduce susceptibility to the same threats. + links: + - href: '#cp-6.1_smt' + rel: assessment-for - id: cp-6.1_asm-examine name: assessment-method props: @@ -23418,6 +25583,9 @@ catalog: value: CP-06(02)[01] class: sp800-53a prose: the alternate storage site is configured to facilitate recovery operations in accordance with recovery time objectives; + links: + - href: '#cp-6.2_smt' + rel: assessment-for - id: cp-6.2_obj-2 name: assessment-objective props: @@ -23425,6 +25593,12 @@ catalog: value: CP-06(02)[02] class: sp800-53a prose: the alternate storage site is configured to facilitate recovery operations in accordance with recovery point objectives. + links: + - href: '#cp-6.2_smt' + rel: assessment-for + links: + - href: '#cp-6.2_smt' + rel: assessment-for - id: cp-6.2_asm-examine name: assessment-method props: @@ -23524,6 +25698,9 @@ catalog: value: CP-06(03)[01] class: sp800-53a prose: potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster are identified; + links: + - href: '#cp-6.3_smt' + rel: assessment-for - id: cp-6.3_obj-2 name: assessment-objective props: @@ -23531,6 +25708,12 @@ catalog: value: CP-06(03)[02] class: sp800-53a prose: explicit mitigation actions to address identified accessibility problems are outlined. + links: + - href: '#cp-6.3_smt' + rel: assessment-for + links: + - href: '#cp-6.3_smt' + rel: assessment-for - id: cp-6.3_asm-examine name: assessment-method props: @@ -23681,6 +25864,9 @@ catalog: value: CP-07a. class: sp800-53a prose: 'an alternate processing site, including necessary agreements to permit the transfer and resumption of {{ insert: param, cp-07_odp.01 }} for essential mission and business functions, is established within {{ insert: param, cp-07_odp.02 }} when the primary processing capabilities are unavailable;' + links: + - href: '#cp-7_smt.a' + rel: assessment-for - id: cp-7_obj.b name: assessment-objective props: @@ -23695,6 +25881,9 @@ catalog: value: CP-07b.[01] class: sp800-53a prose: 'the equipment and supplies required to transfer operations are made available at the alternate processing site or if contracts are in place to support delivery to the site within {{ insert: param, cp-07_odp.02 }} for transfer;' + links: + - href: '#cp-7_smt.b' + rel: assessment-for - id: cp-7_obj.b-2 name: assessment-objective props: @@ -23702,6 +25891,12 @@ catalog: value: CP-07b.[02] class: sp800-53a prose: 'the equipment and supplies required to resume operations are made available at the alternate processing site or if contracts are in place to support delivery to the site within {{ insert: param, cp-07_odp.02 }} for resumption;' + links: + - href: '#cp-7_smt.b' + rel: assessment-for + links: + - href: '#cp-7_smt.b' + rel: assessment-for - id: cp-7_obj.c name: assessment-objective props: @@ -23709,6 +25904,12 @@ catalog: value: CP-07c. class: sp800-53a prose: controls provided at the alternate processing site are equivalent to those at the primary site. + links: + - href: '#cp-7_smt.c' + rel: assessment-for + links: + - href: '#cp-7_smt' + rel: assessment-for - id: cp-7_asm-examine name: assessment-method props: @@ -23804,6 +26005,9 @@ catalog: value: CP-07(01) class: sp800-53a prose: an alternate processing site that is sufficiently separated from the primary processing site to reduce susceptibility to the same threats is identified. + links: + - href: '#cp-7.1_smt' + rel: assessment-for - id: cp-7.1_asm-examine name: assessment-method props: @@ -23888,6 +26092,9 @@ catalog: value: CP-07(02)[01] class: sp800-53a prose: potential accessibility problems to alternate processing sites in the event of an area-wide disruption or disaster are identified; + links: + - href: '#cp-7.2_smt' + rel: assessment-for - id: cp-7.2_obj-2 name: assessment-objective props: @@ -23895,6 +26102,12 @@ catalog: value: CP-07(02)[02] class: sp800-53a prose: explicit mitigation actions to address identified accessibility problems are outlined. + links: + - href: '#cp-7.2_smt' + rel: assessment-for + links: + - href: '#cp-7.2_smt' + rel: assessment-for - id: cp-7.2_asm-examine name: assessment-method props: @@ -23970,6 +26183,9 @@ catalog: value: CP-07(03) class: sp800-53a prose: alternate processing site agreements that contain priority-of-service provisions in accordance with availability requirements (including recovery time objectives) are developed. + links: + - href: '#cp-7.3_smt' + rel: assessment-for - id: cp-7.3_asm-examine name: assessment-method props: @@ -24051,6 +26267,9 @@ catalog: value: CP-07(04) class: sp800-53a prose: the alternate processing site is prepared so that the site can serve as the operational site supporting essential mission and business functions. + links: + - href: '#cp-7.4_smt' + rel: assessment-for - id: cp-7.4_asm-examine name: assessment-method props: @@ -24169,6 +26388,9 @@ catalog: value: CP-08 class: sp800-53a prose: 'alternate telecommunications services, including necessary agreements to permit the resumption of {{ insert: param, cp-08_odp.01 }} , are established for essential mission and business functions within {{ insert: param, cp-08_odp.02 }} when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.' + links: + - href: '#cp-8_smt' + rel: assessment-for - id: cp-8_asm-examine name: assessment-method props: @@ -24283,6 +26505,9 @@ catalog: value: CP-08(01)(a)[01] class: sp800-53a prose: primary telecommunications service agreements that contain priority-of-service provisions in accordance with availability requirements (including recovery time objectives) are developed; + links: + - href: '#cp-8.1_smt.a' + rel: assessment-for - id: cp-8.1_obj.a-2 name: assessment-objective props: @@ -24290,6 +26515,12 @@ catalog: value: CP-08(01)(a)[02] class: sp800-53a prose: alternate telecommunications service agreements that contain priority-of-service provisions in accordance with availability requirements (including recovery time objectives) are developed; + links: + - href: '#cp-8.1_smt.a' + rel: assessment-for + links: + - href: '#cp-8.1_smt.a' + rel: assessment-for - id: cp-8.1_obj.b name: assessment-objective props: @@ -24297,6 +26528,12 @@ catalog: value: CP-08(01)(b) class: sp800-53a prose: Telecommunications Service Priority is requested for all telecommunications services used for national security emergency preparedness if the primary and/or alternate telecommunications services are provided by a common carrier. + links: + - href: '#cp-8.1_smt.b' + rel: assessment-for + links: + - href: '#cp-8.1_smt' + rel: assessment-for - id: cp-8.1_asm-examine name: assessment-method props: @@ -24384,6 +26621,9 @@ catalog: value: CP-08(02) class: sp800-53a prose: alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services are obtained. + links: + - href: '#cp-8.2_smt' + rel: assessment-for - id: cp-8.2_asm-examine name: assessment-method props: @@ -24457,6 +26697,9 @@ catalog: value: CP-08(03) class: sp800-53a prose: alternate telecommunications services from providers that are separated from primary service providers are obtained to reduce susceptibility to the same threats. + links: + - href: '#cp-8.3_smt' + rel: assessment-for - id: cp-8.3_asm-examine name: assessment-method props: @@ -24594,6 +26837,9 @@ catalog: value: CP-08(04)(a)[01] class: sp800-53a prose: primary telecommunications service providers are required to have contingency plans; + links: + - href: '#cp-8.4_smt.a' + rel: assessment-for - id: cp-8.4_obj.a-2 name: assessment-objective props: @@ -24601,6 +26847,12 @@ catalog: value: CP-08(04)(a)[02] class: sp800-53a prose: alternate telecommunications service providers are required to have contingency plans; + links: + - href: '#cp-8.4_smt.a' + rel: assessment-for + links: + - href: '#cp-8.4_smt.a' + rel: assessment-for - id: cp-8.4_obj.b name: assessment-objective props: @@ -24608,6 +26860,9 @@ catalog: value: CP-08(04)(b) class: sp800-53a prose: provider contingency plans are reviewed to ensure that the plans meet organizational contingency requirements; + links: + - href: '#cp-8.4_smt.b' + rel: assessment-for - id: cp-8.4_obj.c name: assessment-objective props: @@ -24622,6 +26877,9 @@ catalog: value: CP-08(04)(c)[01] class: sp800-53a prose: 'evidence of contingency testing by providers is obtained {{ insert: param, cp-08.04_odp.01 }}.' + links: + - href: '#cp-8.4_smt.c' + rel: assessment-for - id: cp-8.4_obj.c-2 name: assessment-objective props: @@ -24629,6 +26887,15 @@ catalog: value: CP-08(04)(c)[02] class: sp800-53a prose: 'evidence of contingency training by providers is obtained {{ insert: param, cp-08.04_odp.02 }}.' + links: + - href: '#cp-8.4_smt.c' + rel: assessment-for + links: + - href: '#cp-8.4_smt.c' + rel: assessment-for + links: + - href: '#cp-8.4_smt' + rel: assessment-for - id: cp-8.4_asm-examine name: assessment-method props: @@ -24815,6 +27082,9 @@ catalog: value: CP-09a. class: sp800-53a prose: 'backups of user-level information contained in {{ insert: param, cp-09_odp.01 }} are conducted {{ insert: param, cp-09_odp.02 }};' + links: + - href: '#cp-9_smt.a' + rel: assessment-for - id: cp-9_obj.b name: assessment-objective props: @@ -24822,6 +27092,9 @@ catalog: value: CP-09b. class: sp800-53a prose: 'backups of system-level information contained in the system are conducted {{ insert: param, cp-09_odp.03 }};' + links: + - href: '#cp-9_smt.b' + rel: assessment-for - id: cp-9_obj.c name: assessment-objective props: @@ -24829,6 +27102,9 @@ catalog: value: CP-09c. class: sp800-53a prose: 'backups of system documentation, including security- and privacy-related documentation are conducted {{ insert: param, cp-09_odp.04 }};' + links: + - href: '#cp-9_smt.c' + rel: assessment-for - id: cp-9_obj.d name: assessment-objective props: @@ -24843,6 +27119,9 @@ catalog: value: CP-09d.[01] class: sp800-53a prose: the confidentiality of backup information is protected; + links: + - href: '#cp-9_smt.d' + rel: assessment-for - id: cp-9_obj.d-2 name: assessment-objective props: @@ -24850,6 +27129,9 @@ catalog: value: CP-09d.[02] class: sp800-53a prose: the integrity of backup information is protected; + links: + - href: '#cp-9_smt.d' + rel: assessment-for - id: cp-9_obj.d-3 name: assessment-objective props: @@ -24857,6 +27139,15 @@ catalog: value: CP-09d.[03] class: sp800-53a prose: the availability of backup information is protected. + links: + - href: '#cp-9_smt.d' + rel: assessment-for + links: + - href: '#cp-9_smt.d' + rel: assessment-for + links: + - href: '#cp-9_smt' + rel: assessment-for - id: cp-9_asm-examine name: assessment-method props: @@ -24981,6 +27272,9 @@ catalog: value: CP-09(01)[01] class: sp800-53a prose: 'backup information is tested {{ insert: param, cp-09.01_odp.01 }} to verify media reliability;' + links: + - href: '#cp-9.1_smt' + rel: assessment-for - id: cp-9.1_obj-2 name: assessment-objective props: @@ -24988,6 +27282,12 @@ catalog: value: CP-09(01)[02] class: sp800-53a prose: 'backup information is tested {{ insert: param, cp-09.01_odp.02 }} to verify information integrity.' + links: + - href: '#cp-9.1_smt' + rel: assessment-for + links: + - href: '#cp-9.1_smt' + rel: assessment-for - id: cp-9.1_asm-examine name: assessment-method props: @@ -25078,6 +27378,9 @@ catalog: value: CP-09(02) class: sp800-53a prose: a sample of backup information in the restoration of selected system functions is used as part of contingency plan testing. + links: + - href: '#cp-9.2_smt' + rel: assessment-for - id: cp-9.2_asm-examine name: assessment-method props: @@ -25185,6 +27488,9 @@ catalog: value: CP-09(03) class: sp800-53a prose: 'backup copies of {{ insert: param, cp-09.03_odp }} are stored in a separate facility or in a fire rated container that is not collocated with the operational system.' + links: + - href: '#cp-9.3_smt' + rel: assessment-for - id: cp-9.3_asm-examine name: assessment-method props: @@ -25301,6 +27607,9 @@ catalog: value: CP-09(05)[01] class: sp800-53a prose: 'system backup information is transferred to the alternate storage site for {{ insert: param, cp-09.05_odp.01 }};' + links: + - href: '#cp-9.5_smt' + rel: assessment-for - id: cp-9.5_obj-2 name: assessment-objective props: @@ -25308,6 +27617,12 @@ catalog: value: CP-09(05)[02] class: sp800-53a prose: 'system backup information is transferred to the alternate storage site {{ insert: param, cp-09.05_odp.02 }}.' + links: + - href: '#cp-9.5_smt' + rel: assessment-for + links: + - href: '#cp-9.5_smt' + rel: assessment-for - id: cp-9.5_asm-examine name: assessment-method props: @@ -25415,6 +27730,9 @@ catalog: value: CP-09(08) class: sp800-53a prose: 'cryptographic mechanisms are implemented to prevent unauthorized disclosure and modification of {{ insert: param, cp-09.08_odp }}.' + links: + - href: '#cp-9.8_smt' + rel: assessment-for - id: cp-9.8_asm-examine name: assessment-method props: @@ -25549,6 +27867,9 @@ catalog: value: CP-10[01] class: sp800-53a prose: 'the recovery of the system to a known state is provided within {{ insert: param, cp-10_odp.01 }} after a disruption, compromise, or failure;' + links: + - href: '#cp-10_smt' + rel: assessment-for - id: cp-10_obj-2 name: assessment-objective props: @@ -25556,6 +27877,12 @@ catalog: value: CP-10[02] class: sp800-53a prose: 'a reconstitution of the system to a known state is provided within {{ insert: param, cp-10_odp.02 }} after a disruption, compromise, or failure.' + links: + - href: '#cp-10_smt' + rel: assessment-for + links: + - href: '#cp-10_smt' + rel: assessment-for - id: cp-10_asm-examine name: assessment-method props: @@ -25649,6 +27976,9 @@ catalog: value: CP-10(02) class: sp800-53a prose: transaction recovery is implemented for systems that are transaction-based. + links: + - href: '#cp-10.2_smt' + rel: assessment-for - id: cp-10.2_asm-examine name: assessment-method props: @@ -25755,6 +28085,9 @@ catalog: value: CP-10(04) class: sp800-53a prose: 'the capability to restore system components within {{ insert: param, cp-10.04_odp }} from configuration-controlled and integrity-protected information representing a known, operational state for the components is provided.' + links: + - href: '#cp-10.4_smt' + rel: assessment-for - id: cp-10.4_asm-examine name: assessment-method props: @@ -26039,6 +28372,9 @@ catalog: value: IA-01a.[01] class: sp800-53a prose: an identification and authentication policy is developed and documented; + links: + - href: '#ia-1_smt.a' + rel: assessment-for - id: ia-1_obj.a-2 name: assessment-objective props: @@ -26046,6 +28382,9 @@ catalog: value: IA-01a.[02] class: sp800-53a prose: 'the identification and authentication policy is disseminated to {{ insert: param, ia-01_odp.01 }};' + links: + - href: '#ia-1_smt.a' + rel: assessment-for - id: ia-1_obj.a-3 name: assessment-objective props: @@ -26053,6 +28392,9 @@ catalog: value: IA-01a.[03] class: sp800-53a prose: identification and authentication procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls are developed and documented; + links: + - href: '#ia-1_smt.a' + rel: assessment-for - id: ia-1_obj.a-4 name: assessment-objective props: @@ -26060,6 +28402,9 @@ catalog: value: IA-01a.[04] class: sp800-53a prose: 'the identification and authentication procedures are disseminated to {{ insert: param, ia-01_odp.02 }};' + links: + - href: '#ia-1_smt.a' + rel: assessment-for - id: ia-1_obj.a.1 name: assessment-objective props: @@ -26081,6 +28426,9 @@ catalog: value: IA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses purpose;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-2 name: assessment-objective props: @@ -26088,6 +28436,9 @@ catalog: value: IA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses scope;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-3 name: assessment-objective props: @@ -26095,6 +28446,9 @@ catalog: value: IA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses roles;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-4 name: assessment-objective props: @@ -26102,6 +28456,9 @@ catalog: value: IA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses responsibilities;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-5 name: assessment-objective props: @@ -26109,6 +28466,9 @@ catalog: value: IA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses management commitment;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-6 name: assessment-objective props: @@ -26116,6 +28476,9 @@ catalog: value: IA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses coordination among organizational entities;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-7 name: assessment-objective props: @@ -26123,6 +28486,12 @@ catalog: value: IA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses compliance;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.b name: assessment-objective props: @@ -26130,6 +28499,15 @@ catalog: value: IA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ia-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ia-1_smt.a.1' + rel: assessment-for + links: + - href: '#ia-1_smt.a' + rel: assessment-for - id: ia-1_obj.b name: assessment-objective props: @@ -26137,6 +28515,9 @@ catalog: value: IA-01b. class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the identification and authentication policy and procedures;' + links: + - href: '#ia-1_smt.b' + rel: assessment-for - id: ia-1_obj.c name: assessment-objective props: @@ -26158,6 +28539,9 @@ catalog: value: IA-01c.01[01] class: sp800-53a prose: 'the current identification and authentication policy is reviewed and updated {{ insert: param, ia-01_odp.05 }};' + links: + - href: '#ia-1_smt.c.1' + rel: assessment-for - id: ia-1_obj.c.1-2 name: assessment-objective props: @@ -26165,6 +28549,12 @@ catalog: value: IA-01c.01[02] class: sp800-53a prose: 'the current identification and authentication policy is reviewed and updated following {{ insert: param, ia-01_odp.06 }};' + links: + - href: '#ia-1_smt.c.1' + rel: assessment-for + links: + - href: '#ia-1_smt.c.1' + rel: assessment-for - id: ia-1_obj.c.2 name: assessment-objective props: @@ -26179,6 +28569,9 @@ catalog: value: IA-01c.02[01] class: sp800-53a prose: 'the current identification and authentication procedures are reviewed and updated {{ insert: param, ia-01_odp.07 }};' + links: + - href: '#ia-1_smt.c.2' + rel: assessment-for - id: ia-1_obj.c.2-2 name: assessment-objective props: @@ -26186,6 +28579,18 @@ catalog: value: IA-01c.02[02] class: sp800-53a prose: 'the current identification and authentication procedures are reviewed and updated following {{ insert: param, ia-01_odp.08 }}.' + links: + - href: '#ia-1_smt.c.2' + rel: assessment-for + links: + - href: '#ia-1_smt.c.2' + rel: assessment-for + links: + - href: '#ia-1_smt.c' + rel: assessment-for + links: + - href: '#ia-1_smt' + rel: assessment-for - id: ia-1_asm-examine name: assessment-method props: @@ -26298,6 +28703,8 @@ catalog: rel: related - href: '#ia-8' rel: related + - href: '#ia-13' + rel: related - href: '#ma-4' rel: related - href: '#ma-5' @@ -26336,6 +28743,9 @@ catalog: value: IA-02[01] class: sp800-53a prose: organizational users are uniquely identified and authenticated; + links: + - href: '#ia-2_smt' + rel: assessment-for - id: ia-2_obj-2 name: assessment-objective props: @@ -26343,6 +28753,12 @@ catalog: value: IA-02[02] class: sp800-53a prose: the unique identification of authenticated organizational users is associated with processes acting on behalf of those users. + links: + - href: '#ia-2_smt' + rel: assessment-for + links: + - href: '#ia-2_smt' + rel: assessment-for - id: ia-2_asm-examine name: assessment-method props: @@ -26440,6 +28856,9 @@ catalog: value: IA-02(01) class: sp800-53a prose: multi-factor authentication is implemented for access to privileged accounts. + links: + - href: '#ia-2.1_smt' + rel: assessment-for - id: ia-2.1_asm-examine name: assessment-method props: @@ -26533,6 +28952,9 @@ catalog: value: IA-02(02) class: sp800-53a prose: multi-factor authentication for access to non-privileged accounts is implemented. + links: + - href: '#ia-2.2_smt' + rel: assessment-for - id: ia-2.2_asm-examine name: assessment-method props: @@ -26627,6 +29049,9 @@ catalog: value: IA-02(05) class: sp800-53a prose: users are required to be individually authenticated before granting access to the shared accounts or resources when shared accounts or authenticators are employed. + links: + - href: '#ia-2.5_smt' + rel: assessment-for - id: ia-2.5_asm-examine name: assessment-method props: @@ -26731,6 +29156,9 @@ catalog: value: IA-02(08) class: sp800-53a prose: 'replay-resistant authentication mechanisms for access to {{ insert: param, ia-02.08_odp }} are implemented.' + links: + - href: '#ia-2.8_smt' + rel: assessment-for - id: ia-2.8_asm-examine name: assessment-method props: @@ -26825,6 +29253,9 @@ catalog: value: IA-02(12) class: sp800-53a prose: Personal Identity Verification-compliant credentials are accepted and electronically verified. + links: + - href: '#ia-2.12_smt' + rel: assessment-for - id: ia-2.12_asm-examine name: assessment-method props: @@ -26948,6 +29379,8 @@ catalog: rel: related - href: '#ia-11' rel: related + - href: '#ia-13' + rel: related - href: '#si-4' rel: related parts: @@ -26964,6 +29397,9 @@ catalog: value: IA-03 class: sp800-53a prose: ' {{ insert: param, ia-03_odp.01 }} are uniquely identified and authenticated before establishing a {{ insert: param, ia-03_odp.02 }} connection.' + links: + - href: '#ia-3_smt' + rel: assessment-for - id: ia-3_asm-examine name: assessment-method props: @@ -27148,6 +29584,9 @@ catalog: value: IA-04a. class: sp800-53a prose: 'system identifiers are managed by receiving authorization from {{ insert: param, ia-04_odp.01 }} to assign to an individual, group, role, or device identifier;' + links: + - href: '#ia-4_smt.a' + rel: assessment-for - id: ia-4_obj.b name: assessment-objective props: @@ -27155,6 +29594,9 @@ catalog: value: IA-04b. class: sp800-53a prose: system identifiers are managed by selecting an identifier that identifies an individual, group, role, service, or device; + links: + - href: '#ia-4_smt.b' + rel: assessment-for - id: ia-4_obj.c name: assessment-objective props: @@ -27162,6 +29604,9 @@ catalog: value: IA-04c. class: sp800-53a prose: system identifiers are managed by assigning the identifier to the intended individual, group, role, service, or device; + links: + - href: '#ia-4_smt.c' + rel: assessment-for - id: ia-4_obj.d name: assessment-objective props: @@ -27169,6 +29614,12 @@ catalog: value: IA-04d. class: sp800-53a prose: 'system identifiers are managed by preventing reuse of identifiers for {{ insert: param, ia-04_odp.02 }}.' + links: + - href: '#ia-4_smt.d' + rel: assessment-for + links: + - href: '#ia-4_smt' + rel: assessment-for - id: ia-4_asm-examine name: assessment-method props: @@ -27275,6 +29726,9 @@ catalog: value: IA-04(04) class: sp800-53a prose: 'individual identifiers are managed by uniquely identifying each individual as {{ insert: param, ia-04.04_odp }}.' + links: + - href: '#ia-4.4_smt' + rel: assessment-for - id: ia-4.4_asm-examine name: assessment-method props: @@ -27497,6 +29951,9 @@ catalog: value: IA-05a. class: sp800-53a prose: system authenticators are managed through the verification of the identity of the individual, group, role, service, or device receiving the authenticator as part of the initial authenticator distribution; + links: + - href: '#ia-5_smt.a' + rel: assessment-for - id: ia-5_obj.b name: assessment-objective props: @@ -27504,6 +29961,9 @@ catalog: value: IA-05b. class: sp800-53a prose: system authenticators are managed through the establishment of initial authenticator content for any authenticators issued by the organization; + links: + - href: '#ia-5_smt.b' + rel: assessment-for - id: ia-5_obj.c name: assessment-objective props: @@ -27511,6 +29971,9 @@ catalog: value: IA-05c. class: sp800-53a prose: system authenticators are managed to ensure that authenticators have sufficient strength of mechanism for their intended use; + links: + - href: '#ia-5_smt.c' + rel: assessment-for - id: ia-5_obj.d name: assessment-objective props: @@ -27518,6 +29981,9 @@ catalog: value: IA-05d. class: sp800-53a prose: system authenticators are managed through the establishment and implementation of administrative procedures for initial authenticator distribution; lost, compromised, or damaged authenticators; and the revocation of authenticators; + links: + - href: '#ia-5_smt.d' + rel: assessment-for - id: ia-5_obj.e name: assessment-objective props: @@ -27525,6 +29991,9 @@ catalog: value: IA-05e. class: sp800-53a prose: system authenticators are managed through the change of default authenticators prior to first use; + links: + - href: '#ia-5_smt.e' + rel: assessment-for - id: ia-5_obj.f name: assessment-objective props: @@ -27532,6 +30001,9 @@ catalog: value: IA-05f. class: sp800-53a prose: 'system authenticators are managed through the change or refreshment of authenticators {{ insert: param, ia-05_odp.01 }} or when {{ insert: param, ia-05_odp.02 }} occur;' + links: + - href: '#ia-5_smt.f' + rel: assessment-for - id: ia-5_obj.g name: assessment-objective props: @@ -27539,6 +30011,9 @@ catalog: value: IA-05g. class: sp800-53a prose: system authenticators are managed through the protection of authenticator content from unauthorized disclosure and modification; + links: + - href: '#ia-5_smt.g' + rel: assessment-for - id: ia-5_obj.h name: assessment-objective props: @@ -27553,6 +30028,9 @@ catalog: value: IA-05h.[01] class: sp800-53a prose: system authenticators are managed through the requirement for individuals to take specific controls to protect authenticators; + links: + - href: '#ia-5_smt.h' + rel: assessment-for - id: ia-5_obj.h-2 name: assessment-objective props: @@ -27560,6 +30038,12 @@ catalog: value: IA-05h.[02] class: sp800-53a prose: system authenticators are managed through the requirement for devices to implement specific controls to protect authenticators; + links: + - href: '#ia-5_smt.h' + rel: assessment-for + links: + - href: '#ia-5_smt.h' + rel: assessment-for - id: ia-5_obj.i name: assessment-objective props: @@ -27567,6 +30051,12 @@ catalog: value: IA-05i. class: sp800-53a prose: system authenticators are managed through the change of authenticators for group or role accounts when membership to those accounts changes. + links: + - href: '#ia-5_smt.i' + rel: assessment-for + links: + - href: '#ia-5_smt' + rel: assessment-for - id: ia-5_asm-examine name: assessment-method props: @@ -27739,6 +30229,9 @@ catalog: value: IA-05(01)(a) class: sp800-53a prose: 'for password-based authentication, a list of commonly used, expected, or compromised passwords is maintained and updated {{ insert: param, ia-05.01_odp.01 }} and when organizational passwords are suspected to have been compromised directly or indirectly;' + links: + - href: '#ia-5.1_smt.a' + rel: assessment-for - id: ia-5.1_obj.b name: assessment-objective props: @@ -27746,6 +30239,9 @@ catalog: value: IA-05(01)(b) class: sp800-53a prose: for password-based authentication when passwords are created or updated by users, the passwords are verified not to be found on the list of commonly used, expected, or compromised passwords in IA-05(01)(a); + links: + - href: '#ia-5.1_smt.b' + rel: assessment-for - id: ia-5.1_obj.c name: assessment-objective props: @@ -27753,6 +30249,9 @@ catalog: value: IA-05(01)(c) class: sp800-53a prose: for password-based authentication, passwords are only transmitted over cryptographically protected channels; + links: + - href: '#ia-5.1_smt.c' + rel: assessment-for - id: ia-5.1_obj.d name: assessment-objective props: @@ -27760,6 +30259,9 @@ catalog: value: IA-05(01)(d) class: sp800-53a prose: for password-based authentication, passwords are stored using an approved salted key derivation function, preferably using a keyed hash; + links: + - href: '#ia-5.1_smt.d' + rel: assessment-for - id: ia-5.1_obj.e name: assessment-objective props: @@ -27767,6 +30269,9 @@ catalog: value: IA-05(01)(e) class: sp800-53a prose: for password-based authentication, immediate selection of a new password is required upon account recovery; + links: + - href: '#ia-5.1_smt.e' + rel: assessment-for - id: ia-5.1_obj.f name: assessment-objective props: @@ -27774,6 +30279,9 @@ catalog: value: IA-05(01)(f) class: sp800-53a prose: for password-based authentication, user selection of long passwords and passphrases is allowed, including spaces and all printable characters; + links: + - href: '#ia-5.1_smt.f' + rel: assessment-for - id: ia-5.1_obj.g name: assessment-objective props: @@ -27781,6 +30289,9 @@ catalog: value: IA-05(01)(g) class: sp800-53a prose: for password-based authentication, automated tools are employed to assist the user in selecting strong password authenticators; + links: + - href: '#ia-5.1_smt.g' + rel: assessment-for - id: ia-5.1_obj.h name: assessment-objective props: @@ -27788,6 +30299,12 @@ catalog: value: IA-05(01)(h) class: sp800-53a prose: 'for password-based authentication, {{ insert: param, ia-05.01_odp.02 }} are enforced.' + links: + - href: '#ia-5.1_smt.h' + rel: assessment-for + links: + - href: '#ia-5.1_smt' + rel: assessment-for - id: ia-5.1_asm-examine name: assessment-method props: @@ -27933,6 +30450,9 @@ catalog: value: IA-05(02)(a)(01) class: sp800-53a prose: authorized access to the corresponding private key is enforced for public key-based authentication; + links: + - href: '#ia-5.2_smt.a.1' + rel: assessment-for - id: ia-5.2_obj.a.2 name: assessment-objective props: @@ -27940,6 +30460,12 @@ catalog: value: IA-05(02)(a)(02) class: sp800-53a prose: the authenticated identity is mapped to the account of the individual or group for public key-based authentication; + links: + - href: '#ia-5.2_smt.a.2' + rel: assessment-for + links: + - href: '#ia-5.2_smt.a' + rel: assessment-for - id: ia-5.2_obj.b name: assessment-objective props: @@ -27954,6 +30480,9 @@ catalog: value: IA-05(02)(b)(01) class: sp800-53a prose: when public key infrastructure (PKI) is used, certificates are validated by constructing and verifying a certification path to an accepted trust anchor, including checking certificate status information; + links: + - href: '#ia-5.2_smt.b.1' + rel: assessment-for - id: ia-5.2_obj.b.2 name: assessment-objective props: @@ -27961,6 +30490,15 @@ catalog: value: IA-05(02)(b)(02) class: sp800-53a prose: when public key infrastructure (PKI) is used, a local cache of revocation data is implemented to support path discovery and validation. + links: + - href: '#ia-5.2_smt.b.2' + rel: assessment-for + links: + - href: '#ia-5.2_smt.b' + rel: assessment-for + links: + - href: '#ia-5.2_smt' + rel: assessment-for - id: ia-5.2_asm-examine name: assessment-method props: @@ -28052,6 +30590,9 @@ catalog: value: IA-05(06) class: sp800-53a prose: authenticators are protected commensurate with the security category of the information to which use of the authenticator permits access. + links: + - href: '#ia-5.6_smt' + rel: assessment-for - id: ia-5.6_asm-examine name: assessment-method props: @@ -28142,6 +30683,9 @@ catalog: value: IA-06 class: sp800-53a prose: the feedback of authentication information is obscured during the authentication process to protect the information from possible exploitation and use by unauthorized individuals. + links: + - href: '#ia-6_smt' + rel: assessment-for - id: ia-6_asm-examine name: assessment-method props: @@ -28237,6 +30781,9 @@ catalog: value: IA-07 class: sp800-53a prose: mechanisms for authentication to a cryptographic module are implemented that meet the requirements of applicable laws, executive orders, directives, policies, regulations, standards, and guidelines for such authentication. + links: + - href: '#ia-7_smt' + rel: assessment-for - id: ia-7_asm-examine name: assessment-method props: @@ -28344,6 +30891,8 @@ catalog: rel: related - href: '#ia-11' rel: related + - href: '#ia-13' + rel: related - href: '#ma-4' rel: related - href: '#ra-3' @@ -28366,6 +30915,9 @@ catalog: value: IA-08 class: sp800-53a prose: non-organizational users or processes acting on behalf of non-organizational users are uniquely identified and authenticated. + links: + - href: '#ia-8_smt' + rel: assessment-for - id: ia-8_asm-examine name: assessment-method props: @@ -28467,6 +31019,9 @@ catalog: value: IA-08(01)[01] class: sp800-53a prose: Personal Identity Verification-compliant credentials from other federal agencies are accepted; + links: + - href: '#ia-8.1_smt' + rel: assessment-for - id: ia-8.1_obj-2 name: assessment-objective props: @@ -28474,6 +31029,12 @@ catalog: value: IA-08(01)[02] class: sp800-53a prose: Personal Identity Verification-compliant credentials from other federal agencies are electronically verified. + links: + - href: '#ia-8.1_smt' + rel: assessment-for + links: + - href: '#ia-8.1_smt' + rel: assessment-for - id: ia-8.1_asm-examine name: assessment-method props: @@ -28591,6 +31152,9 @@ catalog: value: IA-08(02)(a) class: sp800-53a prose: only external authenticators that are NIST-compliant are accepted; + links: + - href: '#ia-8.2_smt.a' + rel: assessment-for - id: ia-8.2_obj.b name: assessment-objective props: @@ -28605,6 +31169,9 @@ catalog: value: IA-08(02)(b)[01] class: sp800-53a prose: a list of accepted external authenticators is documented; + links: + - href: '#ia-8.2_smt.b' + rel: assessment-for - id: ia-8.2_obj.b-2 name: assessment-objective props: @@ -28612,6 +31179,15 @@ catalog: value: IA-08(02)(b)[02] class: sp800-53a prose: a list of accepted external authenticators is maintained. + links: + - href: '#ia-8.2_smt.b' + rel: assessment-for + links: + - href: '#ia-8.2_smt.b' + rel: assessment-for + links: + - href: '#ia-8.2_smt' + rel: assessment-for - id: ia-8.2_asm-examine name: assessment-method props: @@ -28723,6 +31299,9 @@ catalog: value: IA-08(04) class: sp800-53a prose: 'there is conformance with {{ insert: param, ia-08.04_odp }} for identity management.' + links: + - href: '#ia-8.4_smt' + rel: assessment-for - id: ia-8.4_asm-examine name: assessment-method props: @@ -28840,6 +31419,9 @@ catalog: value: IA-11 class: sp800-53a prose: 'users are required to re-authenticate when {{ insert: param, ia-11_odp }}.' + links: + - href: '#ia-11_smt' + rel: assessment-for - id: ia-11_asm-examine name: assessment-method props: @@ -28939,6 +31521,8 @@ catalog: rel: related - href: '#ia-8' rel: related + - href: '#ia-13' + rel: related parts: - id: ia-12_smt name: statement @@ -28978,6 +31562,9 @@ catalog: value: IA-12a. class: sp800-53a prose: users who require accounts for logical access to systems based on appropriate identity assurance level requirements as specified in applicable standards and guidelines are identity proofed; + links: + - href: '#ia-12_smt.a' + rel: assessment-for - id: ia-12_obj.b name: assessment-objective props: @@ -28985,6 +31572,9 @@ catalog: value: IA-12b. class: sp800-53a prose: user identities are resolved to a unique individual; + links: + - href: '#ia-12_smt.b' + rel: assessment-for - id: ia-12_obj.c name: assessment-objective props: @@ -28999,6 +31589,9 @@ catalog: value: IA-12c.[01] class: sp800-53a prose: identity evidence is collected; + links: + - href: '#ia-12_smt.c' + rel: assessment-for - id: ia-12_obj.c-2 name: assessment-objective props: @@ -29006,6 +31599,9 @@ catalog: value: IA-12c.[02] class: sp800-53a prose: identity evidence is validated; + links: + - href: '#ia-12_smt.c' + rel: assessment-for - id: ia-12_obj.c-3 name: assessment-objective props: @@ -29013,6 +31609,15 @@ catalog: value: IA-12c.[03] class: sp800-53a prose: identity evidence is verified. + links: + - href: '#ia-12_smt.c' + rel: assessment-for + links: + - href: '#ia-12_smt.c' + rel: assessment-for + links: + - href: '#ia-12_smt' + rel: assessment-for - id: ia-12_asm-examine name: assessment-method props: @@ -29101,6 +31706,9 @@ catalog: value: IA-12(02) class: sp800-53a prose: evidence of individual identification is presented to the registration authority. + links: + - href: '#ia-12.2_smt' + rel: assessment-for - id: ia-12.2_asm-examine name: assessment-method props: @@ -29198,6 +31806,9 @@ catalog: value: IA-12(03) class: sp800-53a prose: 'the presented identity evidence is validated and verified through {{ insert: param, ia-12.03_odp }}.' + links: + - href: '#ia-12.3_smt' + rel: assessment-for - id: ia-12.3_asm-examine name: assessment-method props: @@ -29281,6 +31892,9 @@ catalog: value: IA-12(04) class: sp800-53a prose: the validation and verification of identity evidence is conducted in person before a designated registration authority. + links: + - href: '#ia-12.4_smt' + rel: assessment-for - id: ia-12.4_asm-examine name: assessment-method props: @@ -29378,6 +31992,9 @@ catalog: value: IA-12(05) class: sp800-53a prose: 'a {{ insert: param, ia-12.05_odp }} is delivered through an out-of-band channel to verify the user’s address (physical or digital) of record.' + links: + - href: '#ia-12.5_smt' + rel: assessment-for - id: ia-12.5_asm-examine name: assessment-method props: @@ -29648,6 +32265,9 @@ catalog: value: IR-01a.[01] class: sp800-53a prose: an incident response policy is developed and documented; + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.a-2 name: assessment-objective props: @@ -29655,6 +32275,9 @@ catalog: value: IR-01a.[02] class: sp800-53a prose: 'the incident response policy is disseminated to {{ insert: param, ir-01_odp.01 }};' + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.a-3 name: assessment-objective props: @@ -29662,6 +32285,9 @@ catalog: value: IR-01a.[03] class: sp800-53a prose: incident response procedures to facilitate the implementation of the incident response policy and associated incident response controls are developed and documented; + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.a-4 name: assessment-objective props: @@ -29669,6 +32295,9 @@ catalog: value: IR-01a.[04] class: sp800-53a prose: 'the incident response procedures are disseminated to {{ insert: param, ir-01_odp.02 }};' + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.a.1 name: assessment-objective props: @@ -29690,6 +32319,9 @@ catalog: value: IR-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses purpose;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-2 name: assessment-objective props: @@ -29697,6 +32329,9 @@ catalog: value: IR-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses scope;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-3 name: assessment-objective props: @@ -29704,6 +32339,9 @@ catalog: value: IR-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses roles;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-4 name: assessment-objective props: @@ -29711,6 +32349,9 @@ catalog: value: IR-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses responsibilities;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-5 name: assessment-objective props: @@ -29718,6 +32359,9 @@ catalog: value: IR-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses management commitment;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-6 name: assessment-objective props: @@ -29725,6 +32369,9 @@ catalog: value: IR-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses coordination among organizational entities;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-7 name: assessment-objective props: @@ -29732,6 +32379,12 @@ catalog: value: IR-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses compliance;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.b name: assessment-objective props: @@ -29739,6 +32392,15 @@ catalog: value: IR-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ir-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ir-1_smt.a.1' + rel: assessment-for + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.b name: assessment-objective props: @@ -29746,6 +32408,9 @@ catalog: value: IR-01b. class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the incident response policy and procedures;' + links: + - href: '#ir-1_smt.b' + rel: assessment-for - id: ir-1_obj.c name: assessment-objective props: @@ -29767,6 +32432,9 @@ catalog: value: IR-01c.01[01] class: sp800-53a prose: 'the current incident response policy is reviewed and updated {{ insert: param, ir-01_odp.05 }};' + links: + - href: '#ir-1_smt.c.1' + rel: assessment-for - id: ir-1_obj.c.1-2 name: assessment-objective props: @@ -29774,6 +32442,12 @@ catalog: value: IR-01c.01[02] class: sp800-53a prose: 'the current incident response policy is reviewed and updated following {{ insert: param, ir-01_odp.06 }};' + links: + - href: '#ir-1_smt.c.1' + rel: assessment-for + links: + - href: '#ir-1_smt.c.1' + rel: assessment-for - id: ir-1_obj.c.2 name: assessment-objective props: @@ -29788,6 +32462,9 @@ catalog: value: IR-01c.02[01] class: sp800-53a prose: 'the current incident response procedures are reviewed and updated {{ insert: param, ir-01_odp.07 }};' + links: + - href: '#ir-1_smt.c.2' + rel: assessment-for - id: ir-1_obj.c.2-2 name: assessment-objective props: @@ -29795,6 +32472,18 @@ catalog: value: IR-01c.02[02] class: sp800-53a prose: 'the current incident response procedures are reviewed and updated following {{ insert: param, ir-01_odp.08 }}.' + links: + - href: '#ir-1_smt.c.2' + rel: assessment-for + links: + - href: '#ir-1_smt.c.2' + rel: assessment-for + links: + - href: '#ir-1_smt.c' + rel: assessment-for + links: + - href: '#ir-1_smt' + rel: assessment-for - id: ir-1_asm-examine name: assessment-method props: @@ -29967,6 +32656,9 @@ catalog: value: IR-02a.01 class: sp800-53a prose: 'incident response training is provided to system users consistent with assigned roles and responsibilities within {{ insert: param, ir-02_odp.01 }} of assuming an incident response role or responsibility or acquiring system access;' + links: + - href: '#ir-2_smt.a.1' + rel: assessment-for - id: ir-2_obj.a.2 name: assessment-objective props: @@ -29974,6 +32666,9 @@ catalog: value: IR-02a.02 class: sp800-53a prose: incident response training is provided to system users consistent with assigned roles and responsibilities when required by system changes; + links: + - href: '#ir-2_smt.a.2' + rel: assessment-for - id: ir-2_obj.a.3 name: assessment-objective props: @@ -29981,6 +32676,12 @@ catalog: value: IR-02a.03 class: sp800-53a prose: 'incident response training is provided to system users consistent with assigned roles and responsibilities {{ insert: param, ir-02_odp.02 }} thereafter;' + links: + - href: '#ir-2_smt.a.3' + rel: assessment-for + links: + - href: '#ir-2_smt.a' + rel: assessment-for - id: ir-2_obj.b name: assessment-objective props: @@ -29995,6 +32696,9 @@ catalog: value: IR-02b.[01] class: sp800-53a prose: 'incident response training content is reviewed and updated {{ insert: param, ir-02_odp.03 }};' + links: + - href: '#ir-2_smt.b' + rel: assessment-for - id: ir-2_obj.b-2 name: assessment-objective props: @@ -30002,6 +32706,15 @@ catalog: value: IR-02b.[02] class: sp800-53a prose: 'incident response training content is reviewed and updated following {{ insert: param, ir-02_odp.04 }}.' + links: + - href: '#ir-2_smt.b' + rel: assessment-for + links: + - href: '#ir-2_smt.b' + rel: assessment-for + links: + - href: '#ir-2_smt' + rel: assessment-for - id: ir-2_asm-examine name: assessment-method props: @@ -30083,6 +32796,9 @@ catalog: value: IR-02(01) class: sp800-53a prose: simulated events are incorporated into incident response training to facilitate the required response by personnel in crisis situations. + links: + - href: '#ir-2.1_smt' + rel: assessment-for - id: ir-2.1_asm-examine name: assessment-method props: @@ -30182,6 +32898,9 @@ catalog: value: IR-02(02) class: sp800-53a prose: 'an incident response training environment is provided using {{ insert: param, ir-02.02_odp }}.' + links: + - href: '#ir-2.2_smt' + rel: assessment-for - id: ir-2.2_asm-examine name: assessment-method props: @@ -30309,6 +33028,9 @@ catalog: value: IR-03 class: sp800-53a prose: 'the effectiveness of the incident response capability for the system is tested {{ insert: param, ir-03_odp.01 }} using {{ insert: param, ir-03_odp.02 }}.' + links: + - href: '#ir-3_smt' + rel: assessment-for - id: ir-3_asm-examine name: assessment-method props: @@ -30394,6 +33116,9 @@ catalog: value: IR-03(02) class: sp800-53a prose: incident response testing is coordinated with organizational elements responsible for related plans. + links: + - href: '#ir-3.2_smt' + rel: assessment-for - id: ir-3.2_asm-examine name: assessment-method props: @@ -30581,6 +33306,9 @@ catalog: value: IR-04a.[01] class: sp800-53a prose: an incident handling capability for incidents is implemented that is consistent with the incident response plan; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-2 name: assessment-objective props: @@ -30588,6 +33316,9 @@ catalog: value: IR-04a.[02] class: sp800-53a prose: the incident handling capability for incidents includes preparation; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-3 name: assessment-objective props: @@ -30595,6 +33326,9 @@ catalog: value: IR-04a.[03] class: sp800-53a prose: the incident handling capability for incidents includes detection and analysis; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-4 name: assessment-objective props: @@ -30602,6 +33336,9 @@ catalog: value: IR-04a.[04] class: sp800-53a prose: the incident handling capability for incidents includes containment; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-5 name: assessment-objective props: @@ -30609,6 +33346,9 @@ catalog: value: IR-04a.[05] class: sp800-53a prose: the incident handling capability for incidents includes eradication; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-6 name: assessment-objective props: @@ -30616,6 +33356,12 @@ catalog: value: IR-04a.[06] class: sp800-53a prose: the incident handling capability for incidents includes recovery; + links: + - href: '#ir-4_smt.a' + rel: assessment-for + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.b name: assessment-objective props: @@ -30623,6 +33369,9 @@ catalog: value: IR-04b. class: sp800-53a prose: incident handling activities are coordinated with contingency planning activities; + links: + - href: '#ir-4_smt.b' + rel: assessment-for - id: ir-4_obj.c name: assessment-objective props: @@ -30637,6 +33386,9 @@ catalog: value: IR-04c.[01] class: sp800-53a prose: lessons learned from ongoing incident handling activities are incorporated into incident response procedures, training, and testing; + links: + - href: '#ir-4_smt.c' + rel: assessment-for - id: ir-4_obj.c-2 name: assessment-objective props: @@ -30644,6 +33396,12 @@ catalog: value: IR-04c.[02] class: sp800-53a prose: the changes resulting from the incorporated lessons learned are implemented accordingly; + links: + - href: '#ir-4_smt.c' + rel: assessment-for + links: + - href: '#ir-4_smt.c' + rel: assessment-for - id: ir-4_obj.d name: assessment-objective props: @@ -30658,6 +33416,9 @@ catalog: value: IR-04d.[01] class: sp800-53a prose: the rigor of incident handling activities is comparable and predictable across the organization; + links: + - href: '#ir-4_smt.d' + rel: assessment-for - id: ir-4_obj.d-2 name: assessment-objective props: @@ -30665,6 +33426,9 @@ catalog: value: IR-04d.[02] class: sp800-53a prose: the intensity of incident handling activities is comparable and predictable across the organization; + links: + - href: '#ir-4_smt.d' + rel: assessment-for - id: ir-4_obj.d-3 name: assessment-objective props: @@ -30672,6 +33436,9 @@ catalog: value: IR-04d.[03] class: sp800-53a prose: the scope of incident handling activities is comparable and predictable across the organization; + links: + - href: '#ir-4_smt.d' + rel: assessment-for - id: ir-4_obj.d-4 name: assessment-objective props: @@ -30679,6 +33446,15 @@ catalog: value: IR-04d.[04] class: sp800-53a prose: the results of incident handling activities are comparable and predictable across the organization. + links: + - href: '#ir-4_smt.d' + rel: assessment-for + links: + - href: '#ir-4_smt.d' + rel: assessment-for + links: + - href: '#ir-4_smt' + rel: assessment-for - id: ir-4_asm-examine name: assessment-method props: @@ -30778,6 +33554,9 @@ catalog: value: IR-04(01) class: sp800-53a prose: 'the incident handling process is supported using {{ insert: param, ir-04.01_odp }}.' + links: + - href: '#ir-4.1_smt' + rel: assessment-for - id: ir-4.1_asm-examine name: assessment-method props: @@ -30865,6 +33644,9 @@ catalog: value: IR-04(04) class: sp800-53a prose: incident information and individual incident responses are correlated to achieve an organization-wide perspective on incident awareness and response. + links: + - href: '#ir-4.4_smt' + rel: assessment-for - id: ir-4.4_asm-examine name: assessment-method props: @@ -30996,6 +33778,9 @@ catalog: value: IR-04(11)[01] class: sp800-53a prose: an integrated incident response team is established and maintained; + links: + - href: '#ir-4.11_smt' + rel: assessment-for - id: ir-4.11_obj-2 name: assessment-objective props: @@ -31003,6 +33788,12 @@ catalog: value: IR-04(11)[02] class: sp800-53a prose: 'the integrated incident response team can be deployed to any location identified by the organization in {{ insert: param, ir-04.11_odp }}.' + links: + - href: '#ir-4.11_smt' + rel: assessment-for + links: + - href: '#ir-4.11_smt' + rel: assessment-for - id: ir-4.11_asm-examine name: assessment-method props: @@ -31110,6 +33901,9 @@ catalog: value: IR-05[01] class: sp800-53a prose: incidents are tracked; + links: + - href: '#ir-5_smt' + rel: assessment-for - id: ir-5_obj-2 name: assessment-objective props: @@ -31117,6 +33911,12 @@ catalog: value: IR-05[02] class: sp800-53a prose: incidents are documented. + links: + - href: '#ir-5_smt' + rel: assessment-for + links: + - href: '#ir-5_smt' + rel: assessment-for - id: ir-5_asm-examine name: assessment-method props: @@ -31251,6 +34051,9 @@ catalog: value: IR-05(01)[01] class: sp800-53a prose: 'incidents are tracked using {{ insert: param, ir-05.01_odp.01 }};' + links: + - href: '#ir-5.1_smt' + rel: assessment-for - id: ir-5.1_obj-2 name: assessment-objective props: @@ -31258,6 +34061,9 @@ catalog: value: IR-05(01)[02] class: sp800-53a prose: 'incident information is collected using {{ insert: param, ir-05.01_odp.02 }};' + links: + - href: '#ir-5.1_smt' + rel: assessment-for - id: ir-5.1_obj-3 name: assessment-objective props: @@ -31265,6 +34071,12 @@ catalog: value: IR-05(01)[03] class: sp800-53a prose: 'incident information is analyzed using {{ insert: param, ir-05.01_odp.03 }}.' + links: + - href: '#ir-5.1_smt' + rel: assessment-for + links: + - href: '#ir-5.1_smt' + rel: assessment-for - id: ir-5.1_asm-examine name: assessment-method props: @@ -31407,6 +34219,9 @@ catalog: value: IR-06a. class: sp800-53a prose: 'personnel is/are required to report suspected incidents to the organizational incident response capability within {{ insert: param, ir-06_odp.01 }};' + links: + - href: '#ir-6_smt.a' + rel: assessment-for - id: ir-6_obj.b name: assessment-objective props: @@ -31414,6 +34229,12 @@ catalog: value: IR-06b. class: sp800-53a prose: 'incident information is reported to {{ insert: param, ir-06_odp.02 }}.' + links: + - href: '#ir-6_smt.b' + rel: assessment-for + links: + - href: '#ir-6_smt' + rel: assessment-for - id: ir-6_asm-examine name: assessment-method props: @@ -31520,6 +34341,9 @@ catalog: value: IR-06(01) class: sp800-53a prose: 'incidents are reported using {{ insert: param, ir-06.01_odp }}.' + links: + - href: '#ir-6.1_smt' + rel: assessment-for - id: ir-6.1_asm-examine name: assessment-method props: @@ -31610,6 +34434,9 @@ catalog: value: IR-06(03) class: sp800-53a prose: incident information is provided to the provider of the product or service and other organizations involved in the supply chain or supply chain governance for systems or system components related to the incident. + links: + - href: '#ir-6.3_smt' + rel: assessment-for - id: ir-6.3_asm-examine name: assessment-method props: @@ -31735,6 +34562,9 @@ catalog: value: IR-07[01] class: sp800-53a prose: an incident response support resource, integral to the organizational incident response capability, is provided; + links: + - href: '#ir-7_smt' + rel: assessment-for - id: ir-7_obj-2 name: assessment-objective props: @@ -31742,6 +34572,12 @@ catalog: value: IR-07[02] class: sp800-53a prose: the incident response support resource offers advice and assistance to users of the system for the response and reporting of incidents. + links: + - href: '#ir-7_smt' + rel: assessment-for + links: + - href: '#ir-7_smt' + rel: assessment-for - id: ir-7_asm-examine name: assessment-method props: @@ -31840,6 +34676,9 @@ catalog: value: IR-07(01) class: sp800-53a prose: 'the availability of incident response information and support is increased using {{ insert: param, ir-07.01_odp }}.' + links: + - href: '#ir-7.1_smt' + rel: assessment-for - id: ir-7.1_asm-examine name: assessment-method props: @@ -32141,6 +34980,9 @@ catalog: value: IR-08a.01 class: sp800-53a prose: an incident response plan is developed that provides the organization with a roadmap for implementing its incident response capability; + links: + - href: '#ir-8_smt.a.1' + rel: assessment-for - id: ir-8_obj.a.2 name: assessment-objective props: @@ -32148,6 +34990,9 @@ catalog: value: IR-08a.02 class: sp800-53a prose: an incident response plan is developed that describes the structure and organization of the incident response capability; + links: + - href: '#ir-8_smt.a.2' + rel: assessment-for - id: ir-8_obj.a.3 name: assessment-objective props: @@ -32155,6 +35000,9 @@ catalog: value: IR-08a.03 class: sp800-53a prose: an incident response plan is developed that provides a high-level approach for how the incident response capability fits into the overall organization; + links: + - href: '#ir-8_smt.a.3' + rel: assessment-for - id: ir-8_obj.a.4 name: assessment-objective props: @@ -32162,6 +35010,9 @@ catalog: value: IR-08a.04 class: sp800-53a prose: an incident response plan is developed that meets the unique requirements of the organization with regard to mission, size, structure, and functions; + links: + - href: '#ir-8_smt.a.4' + rel: assessment-for - id: ir-8_obj.a.5 name: assessment-objective props: @@ -32169,6 +35020,9 @@ catalog: value: IR-08a.05 class: sp800-53a prose: an incident response plan is developed that defines reportable incidents; + links: + - href: '#ir-8_smt.a.5' + rel: assessment-for - id: ir-8_obj.a.6 name: assessment-objective props: @@ -32176,6 +35030,9 @@ catalog: value: IR-08a.06 class: sp800-53a prose: an incident response plan is developed that provides metrics for measuring the incident response capability within the organization; + links: + - href: '#ir-8_smt.a.6' + rel: assessment-for - id: ir-8_obj.a.7 name: assessment-objective props: @@ -32183,6 +35040,9 @@ catalog: value: IR-08a.07 class: sp800-53a prose: an incident response plan is developed that defines the resources and management support needed to effectively maintain and mature an incident response capability; + links: + - href: '#ir-8_smt.a.7' + rel: assessment-for - id: ir-8_obj.a.8 name: assessment-objective props: @@ -32190,6 +35050,9 @@ catalog: value: IR-08a.08 class: sp800-53a prose: an incident response plan is developed that addresses the sharing of incident information; + links: + - href: '#ir-8_smt.a.8' + rel: assessment-for - id: ir-8_obj.a.9 name: assessment-objective props: @@ -32197,6 +35060,9 @@ catalog: value: IR-08a.09 class: sp800-53a prose: 'an incident response plan is developed that is reviewed and approved by {{ insert: param, ir-08_odp.01 }} {{ insert: param, ir-08_odp.02 }};' + links: + - href: '#ir-8_smt.a.9' + rel: assessment-for - id: ir-8_obj.a.10 name: assessment-objective props: @@ -32204,6 +35070,12 @@ catalog: value: IR-08a.10 class: sp800-53a prose: 'an incident response plan is developed that explicitly designates responsibility for incident response to {{ insert: param, ir-08_odp.03 }}.' + links: + - href: '#ir-8_smt.a.10' + rel: assessment-for + links: + - href: '#ir-8_smt.a' + rel: assessment-for - id: ir-8_obj.b name: assessment-objective props: @@ -32218,6 +35090,9 @@ catalog: value: IR-08b.[01] class: sp800-53a prose: 'copies of the incident response plan are distributed to {{ insert: param, ir-08_odp.04 }};' + links: + - href: '#ir-8_smt.b' + rel: assessment-for - id: ir-8_obj.b-2 name: assessment-objective props: @@ -32225,6 +35100,12 @@ catalog: value: IR-08b.[02] class: sp800-53a prose: 'copies of the incident response plan are distributed to {{ insert: param, ir-08_odp.05 }};' + links: + - href: '#ir-8_smt.b' + rel: assessment-for + links: + - href: '#ir-8_smt.b' + rel: assessment-for - id: ir-8_obj.c name: assessment-objective props: @@ -32232,6 +35113,9 @@ catalog: value: IR-08c. class: sp800-53a prose: the incident response plan is updated to address system and organizational changes or problems encountered during plan implementation, execution, or testing; + links: + - href: '#ir-8_smt.c' + rel: assessment-for - id: ir-8_obj.d name: assessment-objective props: @@ -32246,6 +35130,9 @@ catalog: value: IR-08d.[01] class: sp800-53a prose: 'incident response plan changes are communicated to {{ insert: param, ir-08_odp.06 }};' + links: + - href: '#ir-8_smt.d' + rel: assessment-for - id: ir-8_obj.d-2 name: assessment-objective props: @@ -32253,6 +35140,12 @@ catalog: value: IR-08d.[02] class: sp800-53a prose: 'incident response plan changes are communicated to {{ insert: param, ir-08_odp.07 }};' + links: + - href: '#ir-8_smt.d' + rel: assessment-for + links: + - href: '#ir-8_smt.d' + rel: assessment-for - id: ir-8_obj.e name: assessment-objective props: @@ -32267,6 +35160,9 @@ catalog: value: IR-08e.[01] class: sp800-53a prose: the incident response plan is protected from unauthorized disclosure; + links: + - href: '#ir-8_smt.e' + rel: assessment-for - id: ir-8_obj.e-2 name: assessment-objective props: @@ -32274,6 +35170,15 @@ catalog: value: IR-08e.[02] class: sp800-53a prose: the incident response plan is protected from unauthorized modification. + links: + - href: '#ir-8_smt.e' + rel: assessment-for + links: + - href: '#ir-8_smt.e' + rel: assessment-for + links: + - href: '#ir-8_smt' + rel: assessment-for - id: ir-8_asm-examine name: assessment-method props: @@ -32538,6 +35443,9 @@ catalog: value: MA-01a.[01] class: sp800-53a prose: a maintenance policy is developed and documented; + links: + - href: '#ma-1_smt.a' + rel: assessment-for - id: ma-1_obj.a-2 name: assessment-objective props: @@ -32545,6 +35453,9 @@ catalog: value: MA-01a.[02] class: sp800-53a prose: 'the maintenance policy is disseminated to {{ insert: param, ma-01_odp.01 }};' + links: + - href: '#ma-1_smt.a' + rel: assessment-for - id: ma-1_obj.a-3 name: assessment-objective props: @@ -32552,6 +35463,9 @@ catalog: value: MA-01a.[03] class: sp800-53a prose: maintenance procedures to facilitate the implementation of the maintenance policy and associated maintenance controls are developed and documented; + links: + - href: '#ma-1_smt.a' + rel: assessment-for - id: ma-1_obj.a-4 name: assessment-objective props: @@ -32559,6 +35473,9 @@ catalog: value: MA-01a.[04] class: sp800-53a prose: 'the maintenance procedures are disseminated to {{ insert: param, ma-01_odp.02 }};' + links: + - href: '#ma-1_smt.a' + rel: assessment-for - id: ma-1_obj.a.1 name: assessment-objective props: @@ -32580,6 +35497,9 @@ catalog: value: MA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses purpose;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-2 name: assessment-objective props: @@ -32587,6 +35507,9 @@ catalog: value: MA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses scope;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-3 name: assessment-objective props: @@ -32594,6 +35517,9 @@ catalog: value: MA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses roles;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-4 name: assessment-objective props: @@ -32601,6 +35527,9 @@ catalog: value: MA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses responsibilities;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-5 name: assessment-objective props: @@ -32608,6 +35537,9 @@ catalog: value: MA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses management commitment;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-6 name: assessment-objective props: @@ -32615,6 +35547,9 @@ catalog: value: MA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses coordination among organizational entities;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-7 name: assessment-objective props: @@ -32622,6 +35557,12 @@ catalog: value: MA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses compliance;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.b name: assessment-objective props: @@ -32629,6 +35570,15 @@ catalog: value: MA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ma-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ma-1_smt.a.1' + rel: assessment-for + links: + - href: '#ma-1_smt.a' + rel: assessment-for - id: ma-1_obj.b name: assessment-objective props: @@ -32636,6 +35586,9 @@ catalog: value: MA-01b. class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the maintenance policy and procedures;' + links: + - href: '#ma-1_smt.b' + rel: assessment-for - id: ma-1_obj.c name: assessment-objective props: @@ -32657,6 +35610,9 @@ catalog: value: MA-01c.01[01] class: sp800-53a prose: 'the current maintenance policy is reviewed and updated {{ insert: param, ma-01_odp.05 }};' + links: + - href: '#ma-1_smt.c.1' + rel: assessment-for - id: ma-1_obj.c.1-2 name: assessment-objective props: @@ -32664,6 +35620,12 @@ catalog: value: MA-01c.01[02] class: sp800-53a prose: 'the current maintenance policy is reviewed and updated following {{ insert: param, ma-01_odp.06 }};' + links: + - href: '#ma-1_smt.c.1' + rel: assessment-for + links: + - href: '#ma-1_smt.c.1' + rel: assessment-for - id: ma-1_obj.c.2 name: assessment-objective props: @@ -32678,6 +35640,9 @@ catalog: value: MA-01c.02[01] class: sp800-53a prose: 'the current maintenance procedures are reviewed and updated {{ insert: param, ma-01_odp.07 }};' + links: + - href: '#ma-1_smt.c.2' + rel: assessment-for - id: ma-1_obj.c.2-2 name: assessment-objective props: @@ -32685,6 +35650,18 @@ catalog: value: MA-01c.02[02] class: sp800-53a prose: 'the current maintenance procedures are reviewed and updated following {{ insert: param, ma-01_odp.08 }}.' + links: + - href: '#ma-1_smt.c.2' + rel: assessment-for + links: + - href: '#ma-1_smt.c.2' + rel: assessment-for + links: + - href: '#ma-1_smt.c' + rel: assessment-for + links: + - href: '#ma-1_smt' + rel: assessment-for - id: ma-1_asm-examine name: assessment-method props: @@ -32859,6 +35836,9 @@ catalog: value: MA-02a.[01] class: sp800-53a prose: maintenance, repair, and replacement of system components are scheduled in accordance with manufacturer or vendor specifications and/or organizational requirements; + links: + - href: '#ma-2_smt.a' + rel: assessment-for - id: ma-2_obj.a-2 name: assessment-objective props: @@ -32866,6 +35846,9 @@ catalog: value: MA-02a.[02] class: sp800-53a prose: maintenance, repair, and replacement of system components are documented in accordance with manufacturer or vendor specifications and/or organizational requirements; + links: + - href: '#ma-2_smt.a' + rel: assessment-for - id: ma-2_obj.a-3 name: assessment-objective props: @@ -32873,6 +35856,12 @@ catalog: value: MA-02a.[03] class: sp800-53a prose: records of maintenance, repair, and replacement of system components are reviewed in accordance with manufacturer or vendor specifications and/or organizational requirements; + links: + - href: '#ma-2_smt.a' + rel: assessment-for + links: + - href: '#ma-2_smt.a' + rel: assessment-for - id: ma-2_obj.b name: assessment-objective props: @@ -32887,6 +35876,9 @@ catalog: value: MA-02b.[01] class: sp800-53a prose: all maintenance activities, whether performed on site or remotely and whether the system or system components are serviced on site or removed to another location, are approved; + links: + - href: '#ma-2_smt.b' + rel: assessment-for - id: ma-2_obj.b-2 name: assessment-objective props: @@ -32894,6 +35886,12 @@ catalog: value: MA-02b.[02] class: sp800-53a prose: all maintenance activities, whether performed on site or remotely and whether the system or system components are serviced on site or removed to another location, are monitored; + links: + - href: '#ma-2_smt.b' + rel: assessment-for + links: + - href: '#ma-2_smt.b' + rel: assessment-for - id: ma-2_obj.c name: assessment-objective props: @@ -32901,6 +35899,9 @@ catalog: value: MA-02c. class: sp800-53a prose: ' {{ insert: param, ma-02_odp.01 }} is/are required to explicitly approve the removal of the system or system components from organizational facilities for off-site maintenance, repair, or replacement;' + links: + - href: '#ma-2_smt.c' + rel: assessment-for - id: ma-2_obj.d name: assessment-objective props: @@ -32908,6 +35909,9 @@ catalog: value: MA-02d. class: sp800-53a prose: 'equipment is sanitized to remove {{ insert: param, ma-02_odp.02 }} from associated media prior to removal from organizational facilities for off-site maintenance, repair, or replacement;' + links: + - href: '#ma-2_smt.d' + rel: assessment-for - id: ma-2_obj.e name: assessment-objective props: @@ -32915,6 +35919,9 @@ catalog: value: MA-02e. class: sp800-53a prose: all potentially impacted controls are checked to verify that the controls are still functioning properly following maintenance, repair, or replacement actions; + links: + - href: '#ma-2_smt.e' + rel: assessment-for - id: ma-2_obj.f name: assessment-objective props: @@ -32922,6 +35929,12 @@ catalog: value: MA-02f. class: sp800-53a prose: ' {{ insert: param, ma-02_odp.03 }} is included in organizational maintenance records.' + links: + - href: '#ma-2_smt.f' + rel: assessment-for + links: + - href: '#ma-2_smt' + rel: assessment-for - id: ma-2_asm-examine name: assessment-method props: @@ -33084,6 +36097,9 @@ catalog: value: MA-02(02)(a)[01] class: sp800-53a prose: ' {{ insert: param, ma-02.02_odp.01 }} are used to schedule maintenance, repair, and replacement actions for the system;' + links: + - href: '#ma-2.2_smt.a' + rel: assessment-for - id: ma-2.2_obj.a-2 name: assessment-objective props: @@ -33091,6 +36107,9 @@ catalog: value: MA-02(02)(a)[02] class: sp800-53a prose: ' {{ insert: param, ma-02.02_odp.02 }} are used to conduct maintenance, repair, and replacement actions for the system;' + links: + - href: '#ma-2.2_smt.a' + rel: assessment-for - id: ma-2.2_obj.a-3 name: assessment-objective props: @@ -33098,6 +36117,12 @@ catalog: value: MA-02(02)(a)[03] class: sp800-53a prose: ' {{ insert: param, ma-02.02_odp.03 }} are used to document maintenance, repair, and replacement actions for the system;' + links: + - href: '#ma-2.2_smt.a' + rel: assessment-for + links: + - href: '#ma-2.2_smt.a' + rel: assessment-for - id: ma-2.2_obj.b name: assessment-objective props: @@ -33112,6 +36137,9 @@ catalog: value: MA-02(02)(b)[01] class: sp800-53a prose: up-to date, accurate, and complete records of all maintenance actions requested, scheduled, in process, and completed are produced. + links: + - href: '#ma-2.2_smt.b' + rel: assessment-for - id: ma-2.2_obj.b-2 name: assessment-objective props: @@ -33119,6 +36147,9 @@ catalog: value: MA-02(02)(b)[02] class: sp800-53a prose: up-to date, accurate, and complete records of all repair actions requested, scheduled, in process, and completed are produced. + links: + - href: '#ma-2.2_smt.b' + rel: assessment-for - id: ma-2.2_obj.b-3 name: assessment-objective props: @@ -33126,6 +36157,15 @@ catalog: value: MA-02(02)(b)[03] class: sp800-53a prose: up-to date, accurate, and complete records of all replacement actions requested, scheduled, in process, and completed are produced. + links: + - href: '#ma-2.2_smt.b' + rel: assessment-for + links: + - href: '#ma-2.2_smt.b' + rel: assessment-for + links: + - href: '#ma-2.2_smt' + rel: assessment-for - id: ma-2.2_asm-examine name: assessment-method props: @@ -33255,6 +36295,9 @@ catalog: value: MA-03a.[01] class: sp800-53a prose: the use of system maintenance tools is approved; + links: + - href: '#ma-3_smt.a' + rel: assessment-for - id: ma-3_obj.a-2 name: assessment-objective props: @@ -33262,6 +36305,9 @@ catalog: value: MA-03a.[02] class: sp800-53a prose: the use of system maintenance tools is controlled; + links: + - href: '#ma-3_smt.a' + rel: assessment-for - id: ma-3_obj.a-3 name: assessment-objective props: @@ -33269,6 +36315,12 @@ catalog: value: MA-03a.[03] class: sp800-53a prose: the use of system maintenance tools is monitored; + links: + - href: '#ma-3_smt.a' + rel: assessment-for + links: + - href: '#ma-3_smt.a' + rel: assessment-for - id: ma-3_obj.b name: assessment-objective props: @@ -33276,6 +36328,12 @@ catalog: value: MA-03b. class: sp800-53a prose: 'previously approved system maintenance tools are reviewed {{ insert: param, ma-03_odp }}.' + links: + - href: '#ma-3_smt.b' + rel: assessment-for + links: + - href: '#ma-3_smt' + rel: assessment-for - id: ma-3_asm-examine name: assessment-method props: @@ -33363,6 +36421,9 @@ catalog: value: MA-03(01) class: sp800-53a prose: maintenance tools used by maintenance personnel are inspected for improper or unauthorized modifications. + links: + - href: '#ma-3.1_smt' + rel: assessment-for - id: ma-3.1_asm-examine name: assessment-method props: @@ -33451,6 +36512,9 @@ catalog: value: MA-03(02) class: sp800-53a prose: media containing diagnostic and test programs are checked for malicious code before the media are used in the system. + links: + - href: '#ma-3.2_smt' + rel: assessment-for - id: ma-3.2_asm-examine name: assessment-method props: @@ -33580,6 +36644,9 @@ catalog: value: MA-03(03)(a) class: sp800-53a prose: the removal of maintenance equipment containing organizational information is prevented by verifying that there is no organizational information contained on the equipment; or + links: + - href: '#ma-3.3_smt.a' + rel: assessment-for - id: ma-3.3_obj.b name: assessment-objective props: @@ -33587,6 +36654,9 @@ catalog: value: MA-03(03)(b) class: sp800-53a prose: the removal of maintenance equipment containing organizational information is prevented by sanitizing or destroying the equipment; or + links: + - href: '#ma-3.3_smt.b' + rel: assessment-for - id: ma-3.3_obj.c name: assessment-objective props: @@ -33594,6 +36664,9 @@ catalog: value: MA-03(03)(c) class: sp800-53a prose: the removal of maintenance equipment containing organizational information is prevented by retaining the equipment within the facility; or + links: + - href: '#ma-3.3_smt.c' + rel: assessment-for - id: ma-3.3_obj.d name: assessment-objective props: @@ -33601,6 +36674,12 @@ catalog: value: MA-03(03)(d) class: sp800-53a prose: 'the removal of maintenance equipment containing organizational information is prevented by obtaining an exemption from {{ insert: param, ma-03.03_odp }} explicitly authorizing removal of the equipment from the facility.' + links: + - href: '#ma-3.3_smt.d' + rel: assessment-for + links: + - href: '#ma-3.3_smt' + rel: assessment-for - id: ma-3.3_asm-examine name: assessment-method props: @@ -33777,6 +36856,9 @@ catalog: value: MA-04a.[01] class: sp800-53a prose: nonlocal maintenance and diagnostic activities are approved; + links: + - href: '#ma-4_smt.a' + rel: assessment-for - id: ma-4_obj.a-2 name: assessment-objective props: @@ -33784,6 +36866,12 @@ catalog: value: MA-04a.[02] class: sp800-53a prose: nonlocal maintenance and diagnostic activities are monitored; + links: + - href: '#ma-4_smt.a' + rel: assessment-for + links: + - href: '#ma-4_smt.a' + rel: assessment-for - id: ma-4_obj.b name: assessment-objective props: @@ -33798,6 +36886,9 @@ catalog: value: MA-04b.[01] class: sp800-53a prose: the use of nonlocal maintenance and diagnostic tools are allowed only as consistent with organizational policy; + links: + - href: '#ma-4_smt.b' + rel: assessment-for - id: ma-4_obj.b-2 name: assessment-objective props: @@ -33805,6 +36896,12 @@ catalog: value: MA-04b.[02] class: sp800-53a prose: the use of nonlocal maintenance and diagnostic tools are documented in the security plan for the system; + links: + - href: '#ma-4_smt.b' + rel: assessment-for + links: + - href: '#ma-4_smt.b' + rel: assessment-for - id: ma-4_obj.c name: assessment-objective props: @@ -33812,6 +36909,9 @@ catalog: value: MA-04c. class: sp800-53a prose: strong authentication is employed in the establishment of nonlocal maintenance and diagnostic sessions; + links: + - href: '#ma-4_smt.c' + rel: assessment-for - id: ma-4_obj.d name: assessment-objective props: @@ -33819,6 +36919,9 @@ catalog: value: MA-04d. class: sp800-53a prose: records for nonlocal maintenance and diagnostic activities are maintained; + links: + - href: '#ma-4_smt.d' + rel: assessment-for - id: ma-4_obj.e name: assessment-objective props: @@ -33833,6 +36936,9 @@ catalog: value: MA-04e.[01] class: sp800-53a prose: session connections are terminated when nonlocal maintenance is completed; + links: + - href: '#ma-4_smt.e' + rel: assessment-for - id: ma-4_obj.e-2 name: assessment-objective props: @@ -33840,6 +36946,15 @@ catalog: value: MA-04e.[02] class: sp800-53a prose: network connections are terminated when nonlocal maintenance is completed. + links: + - href: '#ma-4_smt.e' + rel: assessment-for + links: + - href: '#ma-4_smt.e' + rel: assessment-for + links: + - href: '#ma-4_smt' + rel: assessment-for - id: ma-4_asm-examine name: assessment-method props: @@ -33973,6 +37088,9 @@ catalog: value: MA-04(03)(a)[01] class: sp800-53a prose: nonlocal maintenance services are required to be performed from a system that implements a security capability comparable to the capability implemented on the system being serviced; + links: + - href: '#ma-4.3_smt.a' + rel: assessment-for - id: ma-4.3_obj.a-2 name: assessment-objective props: @@ -33980,6 +37098,12 @@ catalog: value: MA-04(03)(a)[02] class: sp800-53a prose: nonlocal diagnostic services are required to be performed from a system that implements a security capability comparable to the capability implemented on the system being serviced; or + links: + - href: '#ma-4.3_smt.a' + rel: assessment-for + links: + - href: '#ma-4.3_smt.a' + rel: assessment-for - id: ma-4.3_obj.b name: assessment-objective props: @@ -33994,6 +37118,9 @@ catalog: value: MA-04(03)(b)[01] class: sp800-53a prose: the component to be serviced is removed from the system prior to nonlocal maintenance or diagnostic services; + links: + - href: '#ma-4.3_smt.b' + rel: assessment-for - id: ma-4.3_obj.b-2 name: assessment-objective props: @@ -34001,6 +37128,9 @@ catalog: value: MA-04(03)(b)[02] class: sp800-53a prose: the component to be serviced is sanitized (for organizational information); + links: + - href: '#ma-4.3_smt.b' + rel: assessment-for - id: ma-4.3_obj.b-3 name: assessment-objective props: @@ -34008,6 +37138,15 @@ catalog: value: MA-04(03)(b)[03] class: sp800-53a prose: the component is inspected and sanitized (for potentially malicious software) after the service is performed and before reconnecting the component to the system. + links: + - href: '#ma-4.3_smt.b' + rel: assessment-for + links: + - href: '#ma-4.3_smt.b' + rel: assessment-for + links: + - href: '#ma-4.3_smt' + rel: assessment-for - id: ma-4.3_asm-examine name: assessment-method props: @@ -34162,6 +37301,9 @@ catalog: value: MA-05a.[01] class: sp800-53a prose: a process for maintenance personnel authorization is established; + links: + - href: '#ma-5_smt.a' + rel: assessment-for - id: ma-5_obj.a-2 name: assessment-objective props: @@ -34169,6 +37311,12 @@ catalog: value: MA-05a.[02] class: sp800-53a prose: a list of authorized maintenance organizations or personnel is maintained; + links: + - href: '#ma-5_smt.a' + rel: assessment-for + links: + - href: '#ma-5_smt.a' + rel: assessment-for - id: ma-5_obj.b name: assessment-objective props: @@ -34176,6 +37324,9 @@ catalog: value: MA-05b. class: sp800-53a prose: non-escorted personnel performing maintenance on the system possess the required access authorizations; + links: + - href: '#ma-5_smt.b' + rel: assessment-for - id: ma-5_obj.c name: assessment-objective props: @@ -34183,6 +37334,12 @@ catalog: value: MA-05c. class: sp800-53a prose: organizational personnel with required access authorizations and technical competence is/are designated to supervise the maintenance activities of personnel who do not possess the required access authorizations. + links: + - href: '#ma-5_smt.c' + rel: assessment-for + links: + - href: '#ma-5_smt' + rel: assessment-for - id: ma-5_asm-examine name: assessment-method props: @@ -34328,6 +37485,9 @@ catalog: value: MA-05(01)(a)(01) class: sp800-53a prose: procedures for the use of maintenance personnel who lack appropriate security clearances or are not U.S. citizens are implemented and include approved organizational personnel who are fully cleared, have appropriate access authorizations, and are technically qualified escorting and supervising maintenance personnel without the needed access authorization during the performance of maintenance and diagnostic activities; + links: + - href: '#ma-5.1_smt.a.1' + rel: assessment-for - id: ma-5.1_obj.a.2 name: assessment-objective props: @@ -34335,6 +37495,12 @@ catalog: value: MA-05(01)(a)(02) class: sp800-53a prose: procedures for the use of maintenance personnel who lack appropriate security clearances or are not U.S. citizens are implemented and include all volatile information storage components within the system being sanitized and all non-volatile storage media being removed or physically disconnected from the system and secured prior to initiating maintenance or diagnostic activities; + links: + - href: '#ma-5.1_smt.a.2' + rel: assessment-for + links: + - href: '#ma-5.1_smt.a' + rel: assessment-for - id: ma-5.1_obj.b name: assessment-objective props: @@ -34342,6 +37508,12 @@ catalog: value: MA-05(01)(b) class: sp800-53a prose: ' {{ insert: param, ma-05.01_odp }} are developed and implemented in the event that a system cannot be sanitized, removed, or disconnected from the system.' + links: + - href: '#ma-5.1_smt.b' + rel: assessment-for + links: + - href: '#ma-5.1_smt' + rel: assessment-for - id: ma-5.1_asm-examine name: assessment-method props: @@ -34479,6 +37651,9 @@ catalog: value: MA-06 class: sp800-53a prose: 'maintenance support and/or spare parts are obtained for {{ insert: param, ma-06_odp.01 }} within {{ insert: param, ma-06_odp.02 }} of failure.' + links: + - href: '#ma-6_smt' + rel: assessment-for - id: ma-6_asm-examine name: assessment-method props: @@ -34747,6 +37922,9 @@ catalog: value: MP-01a.[01] class: sp800-53a prose: a media protection policy is developed and documented; + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.a-2 name: assessment-objective props: @@ -34754,6 +37932,9 @@ catalog: value: MP-01a.[02] class: sp800-53a prose: 'the media protection policy is disseminated to {{ insert: param, mp-01_odp.01 }};' + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.a-3 name: assessment-objective props: @@ -34761,6 +37942,9 @@ catalog: value: MP-01a.[03] class: sp800-53a prose: media protection procedures to facilitate the implementation of the media protection policy and associated media protection controls are developed and documented; + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.a-4 name: assessment-objective props: @@ -34768,6 +37952,9 @@ catalog: value: MP-01a.[04] class: sp800-53a prose: 'the media protection procedures are disseminated to {{ insert: param, mp-01_odp.02 }};' + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.a.1 name: assessment-objective props: @@ -34789,6 +37976,9 @@ catalog: value: MP-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses purpose;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-2 name: assessment-objective props: @@ -34796,6 +37986,9 @@ catalog: value: MP-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses scope;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-3 name: assessment-objective props: @@ -34803,6 +37996,9 @@ catalog: value: MP-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses roles;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-4 name: assessment-objective props: @@ -34810,6 +38006,9 @@ catalog: value: MP-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses responsibilities;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-5 name: assessment-objective props: @@ -34817,6 +38016,9 @@ catalog: value: MP-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses management commitment;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-6 name: assessment-objective props: @@ -34824,6 +38026,9 @@ catalog: value: MP-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses coordination among organizational entities;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-7 name: assessment-objective props: @@ -34831,6 +38036,12 @@ catalog: value: MP-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy compliance;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.b name: assessment-objective props: @@ -34838,6 +38049,15 @@ catalog: value: MP-01a.01(b) class: sp800-53a prose: the media protection policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines; + links: + - href: '#mp-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#mp-1_smt.a.1' + rel: assessment-for + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.b name: assessment-objective props: @@ -34845,6 +38065,9 @@ catalog: value: MP-01b. class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the media protection policy and procedures.' + links: + - href: '#mp-1_smt.b' + rel: assessment-for - id: mp-1_obj.c name: assessment-objective props: @@ -34866,6 +38089,9 @@ catalog: value: MP-01c.01[01] class: sp800-53a prose: 'the current media protection policy is reviewed and updated {{ insert: param, mp-01_odp.05 }}; ' + links: + - href: '#mp-1_smt.c.1' + rel: assessment-for - id: mp-1_obj.c.1-2 name: assessment-objective props: @@ -34873,6 +38099,12 @@ catalog: value: MP-01c.01[02] class: sp800-53a prose: 'the current media protection policy is reviewed and updated following {{ insert: param, mp-01_odp.06 }};' + links: + - href: '#mp-1_smt.c.1' + rel: assessment-for + links: + - href: '#mp-1_smt.c.1' + rel: assessment-for - id: mp-1_obj.c.2 name: assessment-objective props: @@ -34887,6 +38119,9 @@ catalog: value: MP-01c.02[01] class: sp800-53a prose: 'the current media protection procedures are reviewed and updated {{ insert: param, mp-01_odp.07 }}; ' + links: + - href: '#mp-1_smt.c.2' + rel: assessment-for - id: mp-1_obj.c.2-2 name: assessment-objective props: @@ -34894,6 +38129,18 @@ catalog: value: MP-01c.02[02] class: sp800-53a prose: 'the current media protection procedures are reviewed and updated following {{ insert: param, mp-01_odp.08 }}.' + links: + - href: '#mp-1_smt.c.2' + rel: assessment-for + links: + - href: '#mp-1_smt.c.2' + rel: assessment-for + links: + - href: '#mp-1_smt.c' + rel: assessment-for + links: + - href: '#mp-1_smt' + rel: assessment-for - id: mp-1_asm-examine name: assessment-method props: @@ -35051,6 +38298,9 @@ catalog: value: MP-02[01] class: sp800-53a prose: 'access to {{ insert: param, mp-02_odp.01 }} is restricted to {{ insert: param, mp-02_odp.02 }};' + links: + - href: '#mp-2_smt' + rel: assessment-for - id: mp-2_obj-2 name: assessment-objective props: @@ -35058,6 +38308,12 @@ catalog: value: MP-02[02] class: sp800-53a prose: 'access to {{ insert: param, mp-02_odp.03 }} is restricted to {{ insert: param, mp-02_odp.04 }}.' + links: + - href: '#mp-2_smt' + rel: assessment-for + links: + - href: '#mp-2_smt' + rel: assessment-for - id: mp-2_asm-examine name: assessment-method props: @@ -35205,6 +38461,9 @@ catalog: value: MP-03a. class: sp800-53a prose: system media is marked to indicate distribution limitations, handling caveats, and applicable security markings (if any) of the information; + links: + - href: '#mp-3_smt.a' + rel: assessment-for - id: mp-3_obj.b name: assessment-objective props: @@ -35212,6 +38471,12 @@ catalog: value: MP-03b. class: sp800-53a prose: ' {{ insert: param, mp-03_odp.01 }} remain within {{ insert: param, mp-03_odp.02 }}.' + links: + - href: '#mp-3_smt.b' + rel: assessment-for + links: + - href: '#mp-3_smt' + rel: assessment-for - id: mp-3_asm-examine name: assessment-method props: @@ -35439,6 +38704,9 @@ catalog: value: MP-04a.[01] class: sp800-53a prose: ' {{ insert: param, mp-04_odp.01 }} are physically controlled;' + links: + - href: '#mp-4_smt.a' + rel: assessment-for - id: mp-4_obj.a-2 name: assessment-objective props: @@ -35446,6 +38714,9 @@ catalog: value: MP-04a.[02] class: sp800-53a prose: ' {{ insert: param, mp-04_odp.02 }} are physically controlled;' + links: + - href: '#mp-4_smt.a' + rel: assessment-for - id: mp-4_obj.a-3 name: assessment-objective props: @@ -35453,6 +38724,9 @@ catalog: value: MP-04a.[03] class: sp800-53a prose: ' {{ insert: param, mp-04_odp.03 }} are securely stored within {{ insert: param, mp-04_odp.05 }};' + links: + - href: '#mp-4_smt.a' + rel: assessment-for - id: mp-4_obj.a-4 name: assessment-objective props: @@ -35460,6 +38734,12 @@ catalog: value: MP-04a.[04] class: sp800-53a prose: ' {{ insert: param, mp-04_odp.04 }} are securely stored within {{ insert: param, mp-04_odp.06 }};' + links: + - href: '#mp-4_smt.a' + rel: assessment-for + links: + - href: '#mp-4_smt.a' + rel: assessment-for - id: mp-4_obj.b name: assessment-objective props: @@ -35467,6 +38747,12 @@ catalog: value: MP-04b. class: sp800-53a prose: system media types (defined in MP-04_ODP[01], MP-04_ODP[02], MP-04_ODP[03], MP-04_ODP[04]) are protected until the media are destroyed or sanitized using approved equipment, techniques, and procedures. + links: + - href: '#mp-4_smt.b' + rel: assessment-for + links: + - href: '#mp-4_smt' + rel: assessment-for - id: mp-4_asm-examine name: assessment-method props: @@ -35657,6 +38943,9 @@ catalog: value: MP-05a.[01] class: sp800-53a prose: ' {{ insert: param, mp-05_odp.01 }} are protected during transport outside of controlled areas using {{ insert: param, mp-05_odp.02 }};' + links: + - href: '#mp-5_smt.a' + rel: assessment-for - id: mp-5_obj.a-2 name: assessment-objective props: @@ -35664,6 +38953,12 @@ catalog: value: MP-05a.[02] class: sp800-53a prose: ' {{ insert: param, mp-05_odp.01 }} are controlled during transport outside of controlled areas using {{ insert: param, mp-05_odp.03 }};' + links: + - href: '#mp-5_smt.a' + rel: assessment-for + links: + - href: '#mp-5_smt.a' + rel: assessment-for - id: mp-5_obj.b name: assessment-objective props: @@ -35671,6 +38966,9 @@ catalog: value: MP-05b. class: sp800-53a prose: accountability for system media is maintained during transport outside of controlled areas; + links: + - href: '#mp-5_smt.b' + rel: assessment-for - id: mp-5_obj.c name: assessment-objective props: @@ -35678,6 +38976,9 @@ catalog: value: MP-05c. class: sp800-53a prose: activities associated with the transport of system media are documented; + links: + - href: '#mp-5_smt.c' + rel: assessment-for - id: mp-5_obj.d name: assessment-objective props: @@ -35692,6 +38993,9 @@ catalog: value: MP-05d.[01] class: sp800-53a prose: personnel authorized to conduct media transport activities is/are identified; + links: + - href: '#mp-5_smt.d' + rel: assessment-for - id: mp-5_obj.d-2 name: assessment-objective props: @@ -35699,6 +39003,15 @@ catalog: value: MP-05d.[02] class: sp800-53a prose: activities associated with the transport of system media are restricted to identified authorized personnel. + links: + - href: '#mp-5_smt.d' + rel: assessment-for + links: + - href: '#mp-5_smt.d' + rel: assessment-for + links: + - href: '#mp-5_smt' + rel: assessment-for - id: mp-5_asm-examine name: assessment-method props: @@ -35932,6 +39245,9 @@ catalog: value: MP-06a.[01] class: sp800-53a prose: ' {{ insert: param, mp-06_odp.01 }} is sanitized using {{ insert: param, mp-06_odp.04 }} prior to disposal;' + links: + - href: '#mp-6_smt.a' + rel: assessment-for - id: mp-6_obj.a-2 name: assessment-objective props: @@ -35939,6 +39255,9 @@ catalog: value: MP-06a.[02] class: sp800-53a prose: ' {{ insert: param, mp-06_odp.02 }} is sanitized using {{ insert: param, mp-06_odp.05 }} prior to release from organizational control;' + links: + - href: '#mp-6_smt.a' + rel: assessment-for - id: mp-6_obj.a-3 name: assessment-objective props: @@ -35946,6 +39265,12 @@ catalog: value: MP-06a.[03] class: sp800-53a prose: ' {{ insert: param, mp-06_odp.03 }} is sanitized using {{ insert: param, mp-06_odp.06 }} prior to release for reuse;' + links: + - href: '#mp-6_smt.a' + rel: assessment-for + links: + - href: '#mp-6_smt.a' + rel: assessment-for - id: mp-6_obj.b name: assessment-objective props: @@ -35953,6 +39278,12 @@ catalog: value: MP-06b. class: sp800-53a prose: sanitization mechanisms with strength and integrity commensurate with the security category or classification of the information are employed. + links: + - href: '#mp-6_smt.b' + rel: assessment-for + links: + - href: '#mp-6_smt' + rel: assessment-for - id: mp-6_asm-examine name: assessment-method props: @@ -36061,6 +39392,9 @@ catalog: value: MP-06(01)[01] class: sp800-53a prose: media sanitization and disposal actions are reviewed; + links: + - href: '#mp-6.1_smt' + rel: assessment-for - id: mp-6.1_obj-2 name: assessment-objective props: @@ -36068,6 +39402,9 @@ catalog: value: MP-06(01)[02] class: sp800-53a prose: media sanitization and disposal actions are approved; + links: + - href: '#mp-6.1_smt' + rel: assessment-for - id: mp-6.1_obj-3 name: assessment-objective props: @@ -36075,6 +39412,9 @@ catalog: value: MP-06(01)[03] class: sp800-53a prose: media sanitization and disposal actions are tracked; + links: + - href: '#mp-6.1_smt' + rel: assessment-for - id: mp-6.1_obj-4 name: assessment-objective props: @@ -36082,6 +39422,9 @@ catalog: value: MP-06(01)[04] class: sp800-53a prose: media sanitization and disposal actions are documented; + links: + - href: '#mp-6.1_smt' + rel: assessment-for - id: mp-6.1_obj-5 name: assessment-objective props: @@ -36089,6 +39432,12 @@ catalog: value: MP-06(01)[05] class: sp800-53a prose: media sanitization and disposal actions are verified. + links: + - href: '#mp-6.1_smt' + rel: assessment-for + links: + - href: '#mp-6.1_smt' + rel: assessment-for - id: mp-6.1_asm-examine name: assessment-method props: @@ -36226,6 +39575,9 @@ catalog: value: MP-06(02)[01] class: sp800-53a prose: 'sanitization equipment is tested {{ insert: param, mp-06.02_odp.01 }} to ensure that the intended sanitization is being achieved;' + links: + - href: '#mp-6.2_smt' + rel: assessment-for - id: mp-6.2_obj-2 name: assessment-objective props: @@ -36233,6 +39585,12 @@ catalog: value: MP-06(02)[02] class: sp800-53a prose: 'sanitization procedures are tested {{ insert: param, mp-06.02_odp.02 }} to ensure that the intended sanitization is being achieved.' + links: + - href: '#mp-6.2_smt' + rel: assessment-for + links: + - href: '#mp-6.2_smt' + rel: assessment-for - id: mp-6.2_asm-examine name: assessment-method props: @@ -36345,6 +39703,9 @@ catalog: value: MP-06(03) class: sp800-53a prose: 'non-destructive sanitization techniques are applied to portable storage devices prior to connecting such devices to the system under {{ insert: param, mp-06.03_odp }}.' + links: + - href: '#mp-6.3_smt' + rel: assessment-for - id: mp-6.3_asm-examine name: assessment-method props: @@ -36508,6 +39869,9 @@ catalog: value: MP-07a. class: sp800-53a prose: 'the use of {{ insert: param, mp-07_odp.01 }} is {{ insert: param, mp-07_odp.02 }} on {{ insert: param, mp-07_odp.03 }} using {{ insert: param, mp-07_odp.04 }};' + links: + - href: '#mp-7_smt.a' + rel: assessment-for - id: mp-7_obj.b name: assessment-objective props: @@ -36515,6 +39879,12 @@ catalog: value: MP-07b. class: sp800-53a prose: the use of portable storage devices in organizational systems is prohibited when such devices have no identifiable owner. + links: + - href: '#mp-7_smt.b' + rel: assessment-for + links: + - href: '#mp-7_smt' + rel: assessment-for - id: mp-7_asm-examine name: assessment-method props: @@ -36788,6 +40158,9 @@ catalog: value: PE-01a.[01] class: sp800-53a prose: a physical and environmental protection policy is developed and documented; + links: + - href: '#pe-1_smt.a' + rel: assessment-for - id: pe-1_obj.a-2 name: assessment-objective props: @@ -36795,6 +40168,9 @@ catalog: value: PE-01a.[02] class: sp800-53a prose: 'the physical and environmental protection policy is disseminated to {{ insert: param, pe-01_odp.01 }};' + links: + - href: '#pe-1_smt.a' + rel: assessment-for - id: pe-1_obj.a-3 name: assessment-objective props: @@ -36802,6 +40178,9 @@ catalog: value: PE-01a.[03] class: sp800-53a prose: physical and environmental protection procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls are developed and documented; + links: + - href: '#pe-1_smt.a' + rel: assessment-for - id: pe-1_obj.a-4 name: assessment-objective props: @@ -36809,6 +40188,9 @@ catalog: value: PE-01a.[04] class: sp800-53a prose: 'the physical and environmental protection procedures are disseminated to {{ insert: param, pe-01_odp.02 }};' + links: + - href: '#pe-1_smt.a' + rel: assessment-for - id: pe-1_obj.a.1 name: assessment-objective props: @@ -36830,6 +40212,9 @@ catalog: value: PE-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses purpose;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-2 name: assessment-objective props: @@ -36837,6 +40222,9 @@ catalog: value: PE-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses scope;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-3 name: assessment-objective props: @@ -36844,6 +40232,9 @@ catalog: value: PE-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses roles;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-4 name: assessment-objective props: @@ -36851,6 +40242,9 @@ catalog: value: PE-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses responsibilities;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-5 name: assessment-objective props: @@ -36858,6 +40252,9 @@ catalog: value: PE-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses management commitment;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-6 name: assessment-objective props: @@ -36865,6 +40262,9 @@ catalog: value: PE-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses coordination among organizational entities;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-7 name: assessment-objective props: @@ -36872,6 +40272,12 @@ catalog: value: PE-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses compliance;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.b name: assessment-objective props: @@ -36879,6 +40285,15 @@ catalog: value: PE-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#pe-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#pe-1_smt.a.1' + rel: assessment-for + links: + - href: '#pe-1_smt.a' + rel: assessment-for - id: pe-1_obj.b name: assessment-objective props: @@ -36886,6 +40301,9 @@ catalog: value: PE-01b. class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the physical and environmental protection policy and procedures;' + links: + - href: '#pe-1_smt.b' + rel: assessment-for - id: pe-1_obj.c name: assessment-objective props: @@ -36907,6 +40325,9 @@ catalog: value: PE-01c.01[01] class: sp800-53a prose: 'the current physical and environmental protection policy is reviewed and updated {{ insert: param, pe-01_odp.05 }};' + links: + - href: '#pe-1_smt.c.1' + rel: assessment-for - id: pe-1_obj.c.1-2 name: assessment-objective props: @@ -36914,6 +40335,12 @@ catalog: value: PE-01c.01[02] class: sp800-53a prose: 'the current physical and environmental protection policy is reviewed and updated following {{ insert: param, pe-01_odp.06 }};' + links: + - href: '#pe-1_smt.c.1' + rel: assessment-for + links: + - href: '#pe-1_smt.c.1' + rel: assessment-for - id: pe-1_obj.c.2 name: assessment-objective props: @@ -36928,6 +40355,9 @@ catalog: value: PE-01c.02[01] class: sp800-53a prose: 'the current physical and environmental protection procedures are reviewed and updated {{ insert: param, pe-01_odp.07 }};' + links: + - href: '#pe-1_smt.c.2' + rel: assessment-for - id: pe-1_obj.c.2-2 name: assessment-objective props: @@ -36935,6 +40365,18 @@ catalog: value: PE-01c.02[02] class: sp800-53a prose: 'the current physical and environmental protection procedures are reviewed and updated following {{ insert: param, pe-01_odp.08 }}.' + links: + - href: '#pe-1_smt.c.2' + rel: assessment-for + links: + - href: '#pe-1_smt.c.2' + rel: assessment-for + links: + - href: '#pe-1_smt.c' + rel: assessment-for + links: + - href: '#pe-1_smt' + rel: assessment-for - id: pe-1_asm-examine name: assessment-method props: @@ -37085,6 +40527,9 @@ catalog: value: PE-02a.[01] class: sp800-53a prose: a list of individuals with authorized access to the facility where the system resides has been developed; + links: + - href: '#pe-2_smt.a' + rel: assessment-for - id: pe-2_obj.a-2 name: assessment-objective props: @@ -37092,6 +40537,9 @@ catalog: value: PE-02a.[02] class: sp800-53a prose: the list of individuals with authorized access to the facility where the system resides has been approved; + links: + - href: '#pe-2_smt.a' + rel: assessment-for - id: pe-2_obj.a-3 name: assessment-objective props: @@ -37099,6 +40547,12 @@ catalog: value: PE-02a.[03] class: sp800-53a prose: the list of individuals with authorized access to the facility where the system resides has been maintained; + links: + - href: '#pe-2_smt.a' + rel: assessment-for + links: + - href: '#pe-2_smt.a' + rel: assessment-for - id: pe-2_obj.b name: assessment-objective props: @@ -37106,6 +40560,9 @@ catalog: value: PE-02b. class: sp800-53a prose: authorization credentials are issued for facility access; + links: + - href: '#pe-2_smt.b' + rel: assessment-for - id: pe-2_obj.c name: assessment-objective props: @@ -37113,6 +40570,9 @@ catalog: value: PE-02c. class: sp800-53a prose: 'the access list detailing authorized facility access by individuals is reviewed {{ insert: param, pe-02_odp }};' + links: + - href: '#pe-2_smt.c' + rel: assessment-for - id: pe-2_obj.d name: assessment-objective props: @@ -37120,6 +40580,12 @@ catalog: value: PE-02d. class: sp800-53a prose: individuals are removed from the facility access list when access is no longer required. + links: + - href: '#pe-2_smt.d' + rel: assessment-for + links: + - href: '#pe-2_smt' + rel: assessment-for - id: pe-2_asm-examine name: assessment-method props: @@ -37450,6 +40916,9 @@ catalog: value: PE-03a.01 class: sp800-53a prose: 'physical access authorizations are enforced at {{ insert: param, pe-03_odp.01 }} by verifying individual access authorizations before granting access to the facility;' + links: + - href: '#pe-3_smt.a.1' + rel: assessment-for - id: pe-3_obj.a.2 name: assessment-objective props: @@ -37457,6 +40926,12 @@ catalog: value: PE-03a.02 class: sp800-53a prose: 'physical access authorizations are enforced at {{ insert: param, pe-03_odp.01 }} by controlling ingress and egress to the facility using {{ insert: param, pe-03_odp.02 }};' + links: + - href: '#pe-3_smt.a.2' + rel: assessment-for + links: + - href: '#pe-3_smt.a' + rel: assessment-for - id: pe-3_obj.b name: assessment-objective props: @@ -37464,6 +40939,9 @@ catalog: value: PE-03b. class: sp800-53a prose: 'physical access audit logs are maintained for {{ insert: param, pe-03_odp.04 }};' + links: + - href: '#pe-3_smt.b' + rel: assessment-for - id: pe-3_obj.c name: assessment-objective props: @@ -37471,6 +40949,9 @@ catalog: value: PE-03c. class: sp800-53a prose: 'access to areas within the facility designated as publicly accessible are maintained by implementing {{ insert: param, pe-03_odp.05 }};' + links: + - href: '#pe-3_smt.c' + rel: assessment-for - id: pe-3_obj.d name: assessment-objective props: @@ -37485,6 +40966,9 @@ catalog: value: PE-03d.[01] class: sp800-53a prose: visitors are escorted; + links: + - href: '#pe-3_smt.d' + rel: assessment-for - id: pe-3_obj.d-2 name: assessment-objective props: @@ -37492,6 +40976,12 @@ catalog: value: PE-03d.[02] class: sp800-53a prose: 'visitor activity is controlled {{ insert: param, pe-03_odp.06 }};' + links: + - href: '#pe-3_smt.d' + rel: assessment-for + links: + - href: '#pe-3_smt.d' + rel: assessment-for - id: pe-3_obj.e name: assessment-objective props: @@ -37506,6 +40996,9 @@ catalog: value: PE-03e.[01] class: sp800-53a prose: keys are secured; + links: + - href: '#pe-3_smt.e' + rel: assessment-for - id: pe-3_obj.e-2 name: assessment-objective props: @@ -37513,6 +41006,9 @@ catalog: value: PE-03e.[02] class: sp800-53a prose: combinations are secured; + links: + - href: '#pe-3_smt.e' + rel: assessment-for - id: pe-3_obj.e-3 name: assessment-objective props: @@ -37520,6 +41016,12 @@ catalog: value: PE-03e.[03] class: sp800-53a prose: other physical access devices are secured; + links: + - href: '#pe-3_smt.e' + rel: assessment-for + links: + - href: '#pe-3_smt.e' + rel: assessment-for - id: pe-3_obj.f name: assessment-objective props: @@ -37527,6 +41029,9 @@ catalog: value: PE-03f. class: sp800-53a prose: ' {{ insert: param, pe-03_odp.07 }} are inventoried {{ insert: param, pe-03_odp.08 }};' + links: + - href: '#pe-3_smt.f' + rel: assessment-for - id: pe-3_obj.g name: assessment-objective props: @@ -37541,6 +41046,9 @@ catalog: value: PE-03g.[01] class: sp800-53a prose: 'combinations are changed {{ insert: param, pe-03_odp.09 }} , when combinations are compromised, or when individuals possessing the combinations are transferred or terminated;' + links: + - href: '#pe-3_smt.g' + rel: assessment-for - id: pe-3_obj.g-2 name: assessment-objective props: @@ -37548,6 +41056,15 @@ catalog: value: PE-03g.[02] class: sp800-53a prose: 'keys are changed {{ insert: param, pe-03_odp.10 }} , when keys are lost, or when individuals possessing the keys are transferred or terminated.' + links: + - href: '#pe-3_smt.g' + rel: assessment-for + links: + - href: '#pe-3_smt.g' + rel: assessment-for + links: + - href: '#pe-3_smt' + rel: assessment-for - id: pe-3_asm-examine name: assessment-method props: @@ -37666,6 +41183,9 @@ catalog: value: PE-03(01)[01] class: sp800-53a prose: physical access authorizations to the system are enforced; + links: + - href: '#pe-3.1_smt' + rel: assessment-for - id: pe-3.1_obj.2 name: assessment-objective props: @@ -37673,6 +41193,12 @@ catalog: value: PE-03(01)[02] class: sp800-53a prose: 'physical access controls are enforced for the facility at {{ insert: param, pe-03.01_odp }}.' + links: + - href: '#pe-3.1_smt' + rel: assessment-for + links: + - href: '#pe-3.1_smt' + rel: assessment-for - id: pe-3.1_asm-examine name: assessment-method props: @@ -37804,6 +41330,9 @@ catalog: value: PE-04 class: sp800-53a prose: 'physical access to {{ insert: param, pe-04_odp.01 }} within organizational facilities is controlled using {{ insert: param, pe-04_odp.02 }}.' + links: + - href: '#pe-4_smt' + rel: assessment-for - id: pe-4_asm-examine name: assessment-method props: @@ -37909,6 +41438,9 @@ catalog: value: PE-05 class: sp800-53a prose: 'physical access to output from {{ insert: param, pe-05_odp }} is controlled to prevent unauthorized individuals from obtaining the output.' + links: + - href: '#pe-5_smt' + rel: assessment-for - id: pe-5_asm-examine name: assessment-method props: @@ -38063,6 +41595,9 @@ catalog: value: PE-06a. class: sp800-53a prose: physical access to the facility where the system resides is monitored to detect and respond to physical security incidents; + links: + - href: '#pe-6_smt.a' + rel: assessment-for - id: pe-6_obj.b name: assessment-objective props: @@ -38077,6 +41612,9 @@ catalog: value: PE-06b.[01] class: sp800-53a prose: 'physical access logs are reviewed {{ insert: param, pe-06_odp.01 }};' + links: + - href: '#pe-6_smt.b' + rel: assessment-for - id: pe-6_obj.b-2 name: assessment-objective props: @@ -38084,6 +41622,12 @@ catalog: value: PE-06b.[02] class: sp800-53a prose: 'physical access logs are reviewed upon occurrence of {{ insert: param, pe-06_odp.02 }};' + links: + - href: '#pe-6_smt.b' + rel: assessment-for + links: + - href: '#pe-6_smt.b' + rel: assessment-for - id: pe-6_obj.c name: assessment-objective props: @@ -38098,6 +41642,9 @@ catalog: value: PE-06c.[01] class: sp800-53a prose: results of reviews are coordinated with organizational incident response capabilities; + links: + - href: '#pe-6_smt.c' + rel: assessment-for - id: pe-6_obj.c-2 name: assessment-objective props: @@ -38105,6 +41652,15 @@ catalog: value: PE-06c.[02] class: sp800-53a prose: results of investigations are coordinated with organizational incident response capabilities. + links: + - href: '#pe-6_smt.c' + rel: assessment-for + links: + - href: '#pe-6_smt.c' + rel: assessment-for + links: + - href: '#pe-6_smt' + rel: assessment-for - id: pe-6_asm-examine name: assessment-method props: @@ -38206,6 +41762,9 @@ catalog: value: PE-06(01)[01] class: sp800-53a prose: physical access to the facility where the system resides is monitored using physical intrusion alarms; + links: + - href: '#pe-6.1_smt' + rel: assessment-for - id: pe-6.1_obj-2 name: assessment-objective props: @@ -38213,6 +41772,12 @@ catalog: value: PE-06(01)[02] class: sp800-53a prose: physical access to the facility where the system resides is monitored using physical surveillance equipment. + links: + - href: '#pe-6.1_smt' + rel: assessment-for + links: + - href: '#pe-6.1_smt' + rel: assessment-for - id: pe-6.1_asm-examine name: assessment-method props: @@ -38326,6 +41891,9 @@ catalog: value: PE-06(04) class: sp800-53a prose: 'physical access to the system is monitored in addition to the physical access monitoring of the facility at {{ insert: param, pe-06.04_odp }}.' + links: + - href: '#pe-6.4_smt' + rel: assessment-for - id: pe-6.4_asm-examine name: assessment-method props: @@ -38485,6 +42053,9 @@ catalog: value: PE-08a. class: sp800-53a prose: 'visitor access records for the facility where the system resides are maintained for {{ insert: param, pe-08_odp.01 }};' + links: + - href: '#pe-8_smt.a' + rel: assessment-for - id: pe-8_obj.b name: assessment-objective props: @@ -38492,6 +42063,9 @@ catalog: value: PE-08b. class: sp800-53a prose: 'visitor access records are reviewed {{ insert: param, pe-08_odp.02 }};' + links: + - href: '#pe-8_smt.b' + rel: assessment-for - id: pe-8_obj.c name: assessment-objective props: @@ -38499,6 +42073,12 @@ catalog: value: PE-08c. class: sp800-53a prose: 'visitor access records anomalies are reported to {{ insert: param, pe-08_odp.03 }}.' + links: + - href: '#pe-8_smt.c' + rel: assessment-for + links: + - href: '#pe-8_smt' + rel: assessment-for - id: pe-8_asm-examine name: assessment-method props: @@ -38623,6 +42203,9 @@ catalog: value: PE-08(01)[01] class: sp800-53a prose: 'visitor access records are maintained using {{ insert: param, pe-08.01_odp.01 }};' + links: + - href: '#pe-8.1_smt' + rel: assessment-for - id: pe-8.1_obj-2 name: assessment-objective props: @@ -38630,6 +42213,12 @@ catalog: value: PE-08(01)[02] class: sp800-53a prose: 'visitor access records are reviewed using {{ insert: param, pe-08.01_odp.02 }}.' + links: + - href: '#pe-8.1_smt' + rel: assessment-for + links: + - href: '#pe-8.1_smt' + rel: assessment-for - id: pe-8.1_asm-examine name: assessment-method props: @@ -38723,6 +42312,9 @@ catalog: value: PE-09[01] class: sp800-53a prose: power equipment for the system is protected from damage and destruction; + links: + - href: '#pe-9_smt' + rel: assessment-for - id: pe-9_obj-2 name: assessment-objective props: @@ -38730,6 +42322,12 @@ catalog: value: PE-09[02] class: sp800-53a prose: power cabling for the system is protected from damage and destruction. + links: + - href: '#pe-9_smt' + rel: assessment-for + links: + - href: '#pe-9_smt' + rel: assessment-for - id: pe-9_asm-examine name: assessment-method props: @@ -38858,6 +42456,9 @@ catalog: value: PE-10a. class: sp800-53a prose: 'the capability to shut off power to {{ insert: param, pe-10_odp.01 }} in emergency situations is provided;' + links: + - href: '#pe-10_smt.a' + rel: assessment-for - id: pe-10_obj.b name: assessment-objective props: @@ -38865,6 +42466,9 @@ catalog: value: PE-10b. class: sp800-53a prose: 'emergency shutoff switches or devices are placed in {{ insert: param, pe-10_odp.02 }} to facilitate access for authorized personnel;' + links: + - href: '#pe-10_smt.b' + rel: assessment-for - id: pe-10_obj.c name: assessment-objective props: @@ -38872,6 +42476,12 @@ catalog: value: PE-10c. class: sp800-53a prose: the emergency power shutoff capability is protected from unauthorized activation. + links: + - href: '#pe-10_smt.c' + rel: assessment-for + links: + - href: '#pe-10_smt' + rel: assessment-for - id: pe-10_asm-examine name: assessment-method props: @@ -38971,6 +42581,9 @@ catalog: value: PE-11 class: sp800-53a prose: 'an uninterruptible power supply is provided to facilitate {{ insert: param, pe-11_odp }} in the event of a primary power source loss.' + links: + - href: '#pe-11_smt' + rel: assessment-for - id: pe-11_asm-examine name: assessment-method props: @@ -39077,6 +42690,9 @@ catalog: value: PE-11(01)[01] class: sp800-53a prose: 'an alternate power supply provided for the system is activated {{ insert: param, pe-11.01_odp }};' + links: + - href: '#pe-11.1_smt' + rel: assessment-for - id: pe-11.1_obj-2 name: assessment-objective props: @@ -39084,6 +42700,12 @@ catalog: value: PE-11(01)[02] class: sp800-53a prose: the alternate power supply provided for the system can maintain minimally required operational capability in the event of an extended loss of the primary power source. + links: + - href: '#pe-11.1_smt' + rel: assessment-for + links: + - href: '#pe-11.1_smt' + rel: assessment-for - id: pe-11.1_asm-examine name: assessment-method props: @@ -39179,6 +42801,9 @@ catalog: value: PE-12[01] class: sp800-53a prose: automatic emergency lighting that activates in the event of a power outage or disruption is employed for the system; + links: + - href: '#pe-12_smt' + rel: assessment-for - id: pe-12_obj-2 name: assessment-objective props: @@ -39186,6 +42811,9 @@ catalog: value: PE-12[02] class: sp800-53a prose: automatic emergency lighting that activates in the event of a power outage or disruption is maintained for the system; + links: + - href: '#pe-12_smt' + rel: assessment-for - id: pe-12_obj-3 name: assessment-objective props: @@ -39193,6 +42821,9 @@ catalog: value: PE-12[03] class: sp800-53a prose: automatic emergency lighting for the system covers emergency exits within the facility; + links: + - href: '#pe-12_smt' + rel: assessment-for - id: pe-12_obj-4 name: assessment-objective props: @@ -39200,6 +42831,12 @@ catalog: value: PE-12[04] class: sp800-53a prose: automatic emergency lighting for the system covers evacuation routes within the facility. + links: + - href: '#pe-12_smt' + rel: assessment-for + links: + - href: '#pe-12_smt' + rel: assessment-for - id: pe-12_asm-examine name: assessment-method props: @@ -39290,6 +42927,9 @@ catalog: value: PE-13[01] class: sp800-53a prose: fire detection systems are employed; + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_obj-2 name: assessment-objective props: @@ -39297,6 +42937,9 @@ catalog: value: PE-13[02] class: sp800-53a prose: employed fire detection systems are supported by an independent energy source; + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_obj-3 name: assessment-objective props: @@ -39304,6 +42947,9 @@ catalog: value: PE-13[03] class: sp800-53a prose: employed fire detection systems are maintained; + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_obj-4 name: assessment-objective props: @@ -39311,6 +42957,9 @@ catalog: value: PE-13[04] class: sp800-53a prose: fire suppression systems are employed; + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_obj-5 name: assessment-objective props: @@ -39318,6 +42967,9 @@ catalog: value: PE-13[05] class: sp800-53a prose: employed fire suppression systems are supported by an independent energy source; + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_obj-6 name: assessment-objective props: @@ -39325,6 +42977,12 @@ catalog: value: PE-13[06] class: sp800-53a prose: employed fire suppression systems are maintained. + links: + - href: '#pe-13_smt' + rel: assessment-for + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_asm-examine name: assessment-method props: @@ -39437,6 +43095,9 @@ catalog: value: PE-13(01)[01] class: sp800-53a prose: fire detection systems that activate automatically are employed in the event of a fire; + links: + - href: '#pe-13.1_smt' + rel: assessment-for - id: pe-13.1_obj-2 name: assessment-objective props: @@ -39444,6 +43105,9 @@ catalog: value: PE-13(01)[02] class: sp800-53a prose: 'fire detection systems that notify {{ insert: param, pe-13.01_odp.01 }} automatically are employed in the event of a fire;' + links: + - href: '#pe-13.1_smt' + rel: assessment-for - id: pe-13.1_obj-3 name: assessment-objective props: @@ -39451,6 +43115,12 @@ catalog: value: PE-13(01)[03] class: sp800-53a prose: 'fire detection systems that notify {{ insert: param, pe-13.01_odp.02 }} automatically are employed in the event of a fire.' + links: + - href: '#pe-13.1_smt' + rel: assessment-for + links: + - href: '#pe-13.1_smt' + rel: assessment-for - id: pe-13.1_asm-examine name: assessment-method props: @@ -39592,6 +43262,9 @@ catalog: value: PE-13(02)(a)[01] class: sp800-53a prose: fire suppression systems that activate automatically are employed; + links: + - href: '#pe-13.2_smt.a' + rel: assessment-for - id: pe-13.2_obj.a-2 name: assessment-objective props: @@ -39599,6 +43272,9 @@ catalog: value: PE-13(02)(a)[02] class: sp800-53a prose: 'fire suppression systems that notify {{ insert: param, pe-13.02_odp.01 }} automatically are employed;' + links: + - href: '#pe-13.2_smt.a' + rel: assessment-for - id: pe-13.2_obj.a-3 name: assessment-objective props: @@ -39606,6 +43282,12 @@ catalog: value: PE-13(02)(a)[03] class: sp800-53a prose: 'fire suppression systems that notify {{ insert: param, pe-13.02_odp.02 }} automatically are employed;' + links: + - href: '#pe-13.2_smt.a' + rel: assessment-for + links: + - href: '#pe-13.2_smt.a' + rel: assessment-for - id: pe-13.2_obj.b name: assessment-objective props: @@ -39613,6 +43295,12 @@ catalog: value: PE-13(02)(b) class: sp800-53a prose: an automatic fire suppression capability is employed when the facility is not staffed on a continuous basis. + links: + - href: '#pe-13.2_smt.b' + rel: assessment-for + links: + - href: '#pe-13.2_smt' + rel: assessment-for - id: pe-13.2_asm-examine name: assessment-method props: @@ -39772,6 +43460,9 @@ catalog: value: PE-14a. class: sp800-53a prose: ' {{ insert: param, pe-14_odp.01 }} levels are maintained at {{ insert: param, pe-14_odp.03 }} within the facility where the system resides;' + links: + - href: '#pe-14_smt.a' + rel: assessment-for - id: pe-14_obj.b name: assessment-objective props: @@ -39779,6 +43470,12 @@ catalog: value: PE-14b. class: sp800-53a prose: 'environmental control levels are monitored {{ insert: param, pe-14_odp.04 }}.' + links: + - href: '#pe-14_smt.b' + rel: assessment-for + links: + - href: '#pe-14_smt' + rel: assessment-for - id: pe-14_asm-examine name: assessment-method props: @@ -39873,6 +43570,9 @@ catalog: value: PE-15[01] class: sp800-53a prose: the system is protected from damage resulting from water leakage by providing master shutoff or isolation valves; + links: + - href: '#pe-15_smt' + rel: assessment-for - id: pe-15_obj-2 name: assessment-objective props: @@ -39880,6 +43580,9 @@ catalog: value: PE-15[02] class: sp800-53a prose: the master shutoff or isolation valves are accessible; + links: + - href: '#pe-15_smt' + rel: assessment-for - id: pe-15_obj-3 name: assessment-objective props: @@ -39887,6 +43590,9 @@ catalog: value: PE-15[03] class: sp800-53a prose: the master shutoff or isolation valves are working properly; + links: + - href: '#pe-15_smt' + rel: assessment-for - id: pe-15_obj-4 name: assessment-objective props: @@ -39894,6 +43600,12 @@ catalog: value: PE-15[04] class: sp800-53a prose: the master shutoff or isolation valves are known to key personnel. + links: + - href: '#pe-15_smt' + rel: assessment-for + links: + - href: '#pe-15_smt' + rel: assessment-for - id: pe-15_asm-examine name: assessment-method props: @@ -40011,6 +43723,9 @@ catalog: value: PE-15(01)[01] class: sp800-53a prose: the presence of water near the system can be detected automatically; + links: + - href: '#pe-15.1_smt' + rel: assessment-for - id: pe-15.1_obj-2 name: assessment-objective props: @@ -40018,6 +43733,12 @@ catalog: value: PE-15(01)[02] class: sp800-53a prose: ' {{ insert: param, pe-15.01_odp.01 }} is/are alerted using {{ insert: param, pe-15.01_odp.02 }}.' + links: + - href: '#pe-15.1_smt' + rel: assessment-for + links: + - href: '#pe-15.1_smt' + rel: assessment-for - id: pe-15.1_asm-examine name: assessment-method props: @@ -40173,6 +43894,9 @@ catalog: value: PE-16a.[01] class: sp800-53a prose: ' {{ insert: param, pe-16_odp.01 }} are authorized when entering the facility;' + links: + - href: '#pe-16_smt.a' + rel: assessment-for - id: pe-16_obj.a-2 name: assessment-objective props: @@ -40180,6 +43904,9 @@ catalog: value: PE-16a.[02] class: sp800-53a prose: ' {{ insert: param, pe-16_odp.01 }} are controlled when entering the facility;' + links: + - href: '#pe-16_smt.a' + rel: assessment-for - id: pe-16_obj.a-3 name: assessment-objective props: @@ -40187,6 +43914,9 @@ catalog: value: PE-16a.[03] class: sp800-53a prose: ' {{ insert: param, pe-16_odp.02 }} are authorized when exiting the facility;' + links: + - href: '#pe-16_smt.a' + rel: assessment-for - id: pe-16_obj.a-4 name: assessment-objective props: @@ -40194,6 +43924,12 @@ catalog: value: PE-16a.[04] class: sp800-53a prose: ' {{ insert: param, pe-16_odp.02 }} are controlled when exiting the facility;' + links: + - href: '#pe-16_smt.a' + rel: assessment-for + links: + - href: '#pe-16_smt.a' + rel: assessment-for - id: pe-16_obj.b name: assessment-objective props: @@ -40201,6 +43937,12 @@ catalog: value: PE-16b. class: sp800-53a prose: records of the system components are maintained. + links: + - href: '#pe-16_smt.b' + rel: assessment-for + links: + - href: '#pe-16_smt' + rel: assessment-for - id: pe-16_asm-examine name: assessment-method props: @@ -40343,6 +44085,9 @@ catalog: value: PE-17a. class: sp800-53a prose: ' {{ insert: param, pe-17_odp.01 }} are determined and documented;' + links: + - href: '#pe-17_smt.a' + rel: assessment-for - id: pe-17_obj.b name: assessment-objective props: @@ -40350,6 +44095,9 @@ catalog: value: PE-17b. class: sp800-53a prose: ' {{ insert: param, pe-17_odp.02 }} are employed at alternate work sites;' + links: + - href: '#pe-17_smt.b' + rel: assessment-for - id: pe-17_obj.c name: assessment-objective props: @@ -40357,6 +44105,9 @@ catalog: value: PE-17c. class: sp800-53a prose: the effectiveness of controls at alternate work sites is assessed; + links: + - href: '#pe-17_smt.c' + rel: assessment-for - id: pe-17_obj.d name: assessment-objective props: @@ -40364,6 +44115,12 @@ catalog: value: PE-17d. class: sp800-53a prose: a means for employees to communicate with information security and privacy personnel in case of incidents is provided. + links: + - href: '#pe-17_smt.d' + rel: assessment-for + links: + - href: '#pe-17_smt' + rel: assessment-for - id: pe-17_asm-examine name: assessment-method props: @@ -40477,6 +44234,9 @@ catalog: value: PE-18 class: sp800-53a prose: 'system components are positioned within the facility to minimize potential damage from {{ insert: param, pe-18_odp }} and to minimize the opportunity for unauthorized access.' + links: + - href: '#pe-18_smt' + rel: assessment-for - id: pe-18_asm-examine name: assessment-method props: @@ -40743,6 +44503,9 @@ catalog: value: PL-01a.[01] class: sp800-53a prose: a planning policy is developed and documented. + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.a-2 name: assessment-objective props: @@ -40750,6 +44513,9 @@ catalog: value: PL-01a.[02] class: sp800-53a prose: 'the planning policy is disseminated to {{ insert: param, pl-01_odp.01 }};' + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.a-3 name: assessment-objective props: @@ -40757,6 +44523,9 @@ catalog: value: PL-01a.[03] class: sp800-53a prose: planning procedures to facilitate the implementation of the planning policy and associated planning controls are developed and documented; + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.a-4 name: assessment-objective props: @@ -40764,6 +44533,9 @@ catalog: value: PL-01a.[04] class: sp800-53a prose: 'the planning procedures are disseminated to {{ insert: param, pl-01_odp.02 }};' + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.a.1 name: assessment-objective props: @@ -40785,6 +44557,9 @@ catalog: value: PL-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses purpose;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-2 name: assessment-objective props: @@ -40792,6 +44567,9 @@ catalog: value: PL-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses scope;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-3 name: assessment-objective props: @@ -40799,6 +44577,9 @@ catalog: value: PL-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses roles;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-4 name: assessment-objective props: @@ -40806,6 +44587,9 @@ catalog: value: PL-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses responsibilities;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-5 name: assessment-objective props: @@ -40813,6 +44597,9 @@ catalog: value: PL-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses management commitment;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-6 name: assessment-objective props: @@ -40820,6 +44607,9 @@ catalog: value: PL-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses coordination among organizational entities;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-7 name: assessment-objective props: @@ -40827,6 +44617,12 @@ catalog: value: PL-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses compliance;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.b name: assessment-objective props: @@ -40834,6 +44630,15 @@ catalog: value: PL-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#pl-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#pl-1_smt.a.1' + rel: assessment-for + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.b name: assessment-objective props: @@ -40841,6 +44646,9 @@ catalog: value: PL-01b. class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the planning policy and procedures;' + links: + - href: '#pl-1_smt.b' + rel: assessment-for - id: pl-1_obj.c name: assessment-objective props: @@ -40862,6 +44670,9 @@ catalog: value: PL-01c.01[01] class: sp800-53a prose: 'the current planning policy is reviewed and updated {{ insert: param, pl-01_odp.05 }};' + links: + - href: '#pl-1_smt.c.1' + rel: assessment-for - id: pl-1_obj.c.1-2 name: assessment-objective props: @@ -40869,6 +44680,12 @@ catalog: value: PL-01c.01[02] class: sp800-53a prose: 'the current planning policy is reviewed and updated following {{ insert: param, pl-01_odp.06 }};' + links: + - href: '#pl-1_smt.c.1' + rel: assessment-for + links: + - href: '#pl-1_smt.c.1' + rel: assessment-for - id: pl-1_obj.c.2 name: assessment-objective props: @@ -40883,6 +44700,9 @@ catalog: value: PL-01c.02[01] class: sp800-53a prose: 'the current planning procedures are reviewed and updated {{ insert: param, pl-01_odp.07 }};' + links: + - href: '#pl-1_smt.c.2' + rel: assessment-for - id: pl-1_obj.c.2-2 name: assessment-objective props: @@ -40890,6 +44710,18 @@ catalog: value: PL-01c.02[02] class: sp800-53a prose: 'the current planning procedures are reviewed and updated following {{ insert: param, pl-01_odp.08 }}.' + links: + - href: '#pl-1_smt.c.2' + rel: assessment-for + links: + - href: '#pl-1_smt.c.2' + rel: assessment-for + links: + - href: '#pl-1_smt.c' + rel: assessment-for + links: + - href: '#pl-1_smt' + rel: assessment-for - id: pl-1_asm-examine name: assessment-method props: @@ -41220,6 +45052,9 @@ catalog: value: PL-02a.01[01] class: sp800-53a prose: a security plan for the system is developed that is consistent with the organization’s enterprise architecture; + links: + - href: '#pl-2_smt.a.1' + rel: assessment-for - id: pl-2_obj.a.1-2 name: assessment-objective props: @@ -41227,6 +45062,12 @@ catalog: value: PL-02a.01[02] class: sp800-53a prose: a privacy plan for the system is developed that is consistent with the organization’s enterprise architecture; + links: + - href: '#pl-2_smt.a.1' + rel: assessment-for + links: + - href: '#pl-2_smt.a.1' + rel: assessment-for - id: pl-2_obj.a.2 name: assessment-objective props: @@ -41241,6 +45082,9 @@ catalog: value: PL-02a.02[01] class: sp800-53a prose: a security plan for the system is developed that explicitly defines the constituent system components; + links: + - href: '#pl-2_smt.a.2' + rel: assessment-for - id: pl-2_obj.a.2-2 name: assessment-objective props: @@ -41248,6 +45092,12 @@ catalog: value: PL-02a.02[02] class: sp800-53a prose: a privacy plan for the system is developed that explicitly defines the constituent system components; + links: + - href: '#pl-2_smt.a.2' + rel: assessment-for + links: + - href: '#pl-2_smt.a.2' + rel: assessment-for - id: pl-2_obj.a.3 name: assessment-objective props: @@ -41262,6 +45112,9 @@ catalog: value: PL-02a.03[01] class: sp800-53a prose: a security plan for the system is developed that describes the operational context of the system in terms of mission and business processes; + links: + - href: '#pl-2_smt.a.3' + rel: assessment-for - id: pl-2_obj.a.3-2 name: assessment-objective props: @@ -41269,6 +45122,12 @@ catalog: value: PL-02a.03[02] class: sp800-53a prose: a privacy plan for the system is developed that describes the operational context of the system in terms of mission and business processes; + links: + - href: '#pl-2_smt.a.3' + rel: assessment-for + links: + - href: '#pl-2_smt.a.3' + rel: assessment-for - id: pl-2_obj.a.4 name: assessment-objective props: @@ -41283,6 +45142,9 @@ catalog: value: PL-02a.04[01] class: sp800-53a prose: a security plan for the system is developed that identifies the individuals that fulfill system roles and responsibilities; + links: + - href: '#pl-2_smt.a.4' + rel: assessment-for - id: pl-2_obj.a.4-2 name: assessment-objective props: @@ -41290,6 +45152,12 @@ catalog: value: PL-02a.04[02] class: sp800-53a prose: a privacy plan for the system is developed that identifies the individuals that fulfill system roles and responsibilities; + links: + - href: '#pl-2_smt.a.4' + rel: assessment-for + links: + - href: '#pl-2_smt.a.4' + rel: assessment-for - id: pl-2_obj.a.5 name: assessment-objective props: @@ -41304,6 +45172,9 @@ catalog: value: PL-02a.05[01] class: sp800-53a prose: a security plan for the system is developed that identifies the information types processed, stored, and transmitted by the system; + links: + - href: '#pl-2_smt.a.5' + rel: assessment-for - id: pl-2_obj.a.5-2 name: assessment-objective props: @@ -41311,6 +45182,12 @@ catalog: value: PL-02a.05[02] class: sp800-53a prose: a privacy plan for the system is developed that identifies the information types processed, stored, and transmitted by the system; + links: + - href: '#pl-2_smt.a.5' + rel: assessment-for + links: + - href: '#pl-2_smt.a.5' + rel: assessment-for - id: pl-2_obj.a.6 name: assessment-objective props: @@ -41325,6 +45202,9 @@ catalog: value: PL-02a.06[01] class: sp800-53a prose: a security plan for the system is developed that provides the security categorization of the system, including supporting rationale; + links: + - href: '#pl-2_smt.a.6' + rel: assessment-for - id: pl-2_obj.a.6-2 name: assessment-objective props: @@ -41332,6 +45212,12 @@ catalog: value: PL-02a.06[02] class: sp800-53a prose: a privacy plan for the system is developed that provides the security categorization of the system, including supporting rationale; + links: + - href: '#pl-2_smt.a.6' + rel: assessment-for + links: + - href: '#pl-2_smt.a.6' + rel: assessment-for - id: pl-2_obj.a.7 name: assessment-objective props: @@ -41346,6 +45232,9 @@ catalog: value: PL-02a.07[01] class: sp800-53a prose: a security plan for the system is developed that describes any specific threats to the system that are of concern to the organization; + links: + - href: '#pl-2_smt.a.7' + rel: assessment-for - id: pl-2_obj.a.7-2 name: assessment-objective props: @@ -41353,6 +45242,12 @@ catalog: value: PL-02a.07[02] class: sp800-53a prose: a privacy plan for the system is developed that describes any specific threats to the system that are of concern to the organization; + links: + - href: '#pl-2_smt.a.7' + rel: assessment-for + links: + - href: '#pl-2_smt.a.7' + rel: assessment-for - id: pl-2_obj.a.8 name: assessment-objective props: @@ -41367,6 +45262,9 @@ catalog: value: PL-02a.08[01] class: sp800-53a prose: a security plan for the system is developed that provides the results of a privacy risk assessment for systems processing personally identifiable information; + links: + - href: '#pl-2_smt.a.8' + rel: assessment-for - id: pl-2_obj.a.8-2 name: assessment-objective props: @@ -41374,6 +45272,12 @@ catalog: value: PL-02a.08[02] class: sp800-53a prose: a privacy plan for the system is developed that provides the results of a privacy risk assessment for systems processing personally identifiable information; + links: + - href: '#pl-2_smt.a.8' + rel: assessment-for + links: + - href: '#pl-2_smt.a.8' + rel: assessment-for - id: pl-2_obj.a.9 name: assessment-objective props: @@ -41388,6 +45292,9 @@ catalog: value: PL-02a.09[01] class: sp800-53a prose: a security plan for the system is developed that describes the operational environment for the system and any dependencies on or connections to other systems or system components; + links: + - href: '#pl-2_smt.a.9' + rel: assessment-for - id: pl-2_obj.a.9-2 name: assessment-objective props: @@ -41395,6 +45302,12 @@ catalog: value: PL-02a.09[02] class: sp800-53a prose: a privacy plan for the system is developed that describes the operational environment for the system and any dependencies on or connections to other systems or system components; + links: + - href: '#pl-2_smt.a.9' + rel: assessment-for + links: + - href: '#pl-2_smt.a.9' + rel: assessment-for - id: pl-2_obj.a.10 name: assessment-objective props: @@ -41409,6 +45322,9 @@ catalog: value: PL-02a.10[01] class: sp800-53a prose: a security plan for the system is developed that provides an overview of the security requirements for the system; + links: + - href: '#pl-2_smt.a.10' + rel: assessment-for - id: pl-2_obj.a.10-2 name: assessment-objective props: @@ -41416,6 +45332,12 @@ catalog: value: PL-02a.10[02] class: sp800-53a prose: a privacy plan for the system is developed that provides an overview of the privacy requirements for the system; + links: + - href: '#pl-2_smt.a.10' + rel: assessment-for + links: + - href: '#pl-2_smt.a.10' + rel: assessment-for - id: pl-2_obj.a.11 name: assessment-objective props: @@ -41430,6 +45352,9 @@ catalog: value: PL-02a.11[01] class: sp800-53a prose: a security plan for the system is developed that identifies any relevant control baselines or overlays, if applicable; + links: + - href: '#pl-2_smt.a.11' + rel: assessment-for - id: pl-2_obj.a.11-2 name: assessment-objective props: @@ -41437,6 +45362,12 @@ catalog: value: PL-02a.11[02] class: sp800-53a prose: a privacy plan for the system is developed that identifies any relevant control baselines or overlays, if applicable; + links: + - href: '#pl-2_smt.a.11' + rel: assessment-for + links: + - href: '#pl-2_smt.a.11' + rel: assessment-for - id: pl-2_obj.a.12 name: assessment-objective props: @@ -41451,6 +45382,9 @@ catalog: value: PL-02a.12[01] class: sp800-53a prose: a security plan for the system is developed that describes the controls in place or planned for meeting the security requirements, including rationale for any tailoring decisions; + links: + - href: '#pl-2_smt.a.12' + rel: assessment-for - id: pl-2_obj.a.12-2 name: assessment-objective props: @@ -41458,6 +45392,12 @@ catalog: value: PL-02a.12[02] class: sp800-53a prose: a privacy plan for the system is developed that describes the controls in place or planned for meeting the privacy requirements, including rationale for any tailoring decisions; + links: + - href: '#pl-2_smt.a.12' + rel: assessment-for + links: + - href: '#pl-2_smt.a.12' + rel: assessment-for - id: pl-2_obj.a.13 name: assessment-objective props: @@ -41472,6 +45412,9 @@ catalog: value: PL-02a.13[01] class: sp800-53a prose: a security plan for the system is developed that includes risk determinations for security architecture and design decisions; + links: + - href: '#pl-2_smt.a.13' + rel: assessment-for - id: pl-2_obj.a.13-2 name: assessment-objective props: @@ -41479,6 +45422,12 @@ catalog: value: PL-02a.13[02] class: sp800-53a prose: a privacy plan for the system is developed that includes risk determinations for privacy architecture and design decisions; + links: + - href: '#pl-2_smt.a.13' + rel: assessment-for + links: + - href: '#pl-2_smt.a.13' + rel: assessment-for - id: pl-2_obj.a.14 name: assessment-objective props: @@ -41493,6 +45442,9 @@ catalog: value: PL-02a.14[01] class: sp800-53a prose: 'a security plan for the system is developed that includes security-related activities affecting the system that require planning and coordination with {{ insert: param, pl-02_odp.01 }};' + links: + - href: '#pl-2_smt.a.14' + rel: assessment-for - id: pl-2_obj.a.14-2 name: assessment-objective props: @@ -41500,6 +45452,12 @@ catalog: value: PL-02a.14[02] class: sp800-53a prose: 'a privacy plan for the system is developed that includes privacy-related activities affecting the system that require planning and coordination with {{ insert: param, pl-02_odp.01 }};' + links: + - href: '#pl-2_smt.a.14' + rel: assessment-for + links: + - href: '#pl-2_smt.a.14' + rel: assessment-for - id: pl-2_obj.a.15 name: assessment-objective props: @@ -41514,6 +45472,9 @@ catalog: value: PL-02a.15[01] class: sp800-53a prose: a security plan for the system is developed that is reviewed and approved by the authorizing official or designated representative prior to plan implementation; + links: + - href: '#pl-2_smt.a.15' + rel: assessment-for - id: pl-2_obj.a.15-2 name: assessment-objective props: @@ -41521,6 +45482,15 @@ catalog: value: PL-02a.15[02] class: sp800-53a prose: a privacy plan for the system is developed that is reviewed and approved by the authorizing official or designated representative prior to plan implementation. + links: + - href: '#pl-2_smt.a.15' + rel: assessment-for + links: + - href: '#pl-2_smt.a.15' + rel: assessment-for + links: + - href: '#pl-2_smt.a' + rel: assessment-for - id: pl-2_obj.b name: assessment-objective props: @@ -41535,6 +45505,9 @@ catalog: value: PL-02b.[01] class: sp800-53a prose: 'copies of the plans are distributed to {{ insert: param, pl-02_odp.02 }};' + links: + - href: '#pl-2_smt.b' + rel: assessment-for - id: pl-2_obj.b-2 name: assessment-objective props: @@ -41542,6 +45515,12 @@ catalog: value: PL-02b.[02] class: sp800-53a prose: 'subsequent changes to the plans are communicated to {{ insert: param, pl-02_odp.02 }};' + links: + - href: '#pl-2_smt.b' + rel: assessment-for + links: + - href: '#pl-2_smt.b' + rel: assessment-for - id: pl-2_obj.c name: assessment-objective props: @@ -41549,6 +45528,9 @@ catalog: value: PL-02c. class: sp800-53a prose: 'plans are reviewed {{ insert: param, pl-02_odp.03 }};' + links: + - href: '#pl-2_smt.c' + rel: assessment-for - id: pl-2_obj.d name: assessment-objective props: @@ -41563,6 +45545,9 @@ catalog: value: PL-02d.[01] class: sp800-53a prose: plans are updated to address changes to the system and environment of operations; + links: + - href: '#pl-2_smt.d' + rel: assessment-for - id: pl-2_obj.d-2 name: assessment-objective props: @@ -41570,6 +45555,9 @@ catalog: value: PL-02d.[02] class: sp800-53a prose: plans are updated to address problems identified during the plan implementation; + links: + - href: '#pl-2_smt.d' + rel: assessment-for - id: pl-2_obj.d-3 name: assessment-objective props: @@ -41577,6 +45565,12 @@ catalog: value: PL-02d.[03] class: sp800-53a prose: plans are updated to address problems identified during control assessments; + links: + - href: '#pl-2_smt.d' + rel: assessment-for + links: + - href: '#pl-2_smt.d' + rel: assessment-for - id: pl-2_obj.e name: assessment-objective props: @@ -41591,6 +45585,9 @@ catalog: value: PL-02e.[01] class: sp800-53a prose: plans are protected from unauthorized disclosure; + links: + - href: '#pl-2_smt.e' + rel: assessment-for - id: pl-2_obj.e-2 name: assessment-objective props: @@ -41598,6 +45595,15 @@ catalog: value: PL-02e.[02] class: sp800-53a prose: plans are protected from unauthorized modification. + links: + - href: '#pl-2_smt.e' + rel: assessment-for + links: + - href: '#pl-2_smt.e' + rel: assessment-for + links: + - href: '#pl-2_smt' + rel: assessment-for - id: pl-2_asm-examine name: assessment-method props: @@ -41810,6 +45816,9 @@ catalog: value: PL-04a.[01] class: sp800-53a prose: rules that describe responsibilities and expected behavior for information and system usage, security, and privacy are established for individuals requiring access to the system; + links: + - href: '#pl-4_smt.a' + rel: assessment-for - id: pl-4_obj.a-2 name: assessment-objective props: @@ -41817,6 +45826,12 @@ catalog: value: PL-04a.[02] class: sp800-53a prose: rules that describe responsibilities and expected behavior for information and system usage, security, and privacy are provided to individuals requiring access to the system; + links: + - href: '#pl-4_smt.a' + rel: assessment-for + links: + - href: '#pl-4_smt.a' + rel: assessment-for - id: pl-4_obj.b name: assessment-objective props: @@ -41824,6 +45839,9 @@ catalog: value: PL-04b. class: sp800-53a prose: before authorizing access to information and the system, a documented acknowledgement from such individuals indicating that they have read, understand, and agree to abide by the rules of behavior is received; + links: + - href: '#pl-4_smt.b' + rel: assessment-for - id: pl-4_obj.c name: assessment-objective props: @@ -41831,6 +45849,9 @@ catalog: value: PL-04c. class: sp800-53a prose: 'rules of behavior are reviewed and updated {{ insert: param, pl-04_odp.01 }};' + links: + - href: '#pl-4_smt.c' + rel: assessment-for - id: pl-4_obj.d name: assessment-objective props: @@ -41838,6 +45859,12 @@ catalog: value: PL-04d. class: sp800-53a prose: 'individuals who have acknowledged a previous version of the rules of behavior are required to read and reacknowledge {{ insert: param, pl-04_odp.02 }}.' + links: + - href: '#pl-4_smt.d' + rel: assessment-for + links: + - href: '#pl-4_smt' + rel: assessment-for - id: pl-4_asm-examine name: assessment-method props: @@ -41960,6 +45987,9 @@ catalog: value: PL-04(01)(a) class: sp800-53a prose: the rules of behavior include restrictions on the use of social media, social networking sites, and external sites/applications; + links: + - href: '#pl-4.1_smt.a' + rel: assessment-for - id: pl-4.1_obj.b name: assessment-objective props: @@ -41967,6 +45997,9 @@ catalog: value: PL-04(01)(b) class: sp800-53a prose: the rules of behavior include restrictions on posting organizational information on public websites; + links: + - href: '#pl-4.1_smt.b' + rel: assessment-for - id: pl-4.1_obj.c name: assessment-objective props: @@ -41974,6 +46007,12 @@ catalog: value: PL-04(01)(c) class: sp800-53a prose: the rules of behavior include restrictions on the use of organization-provided identifiers (e.g., email addresses) and authentication secrets (e.g., passwords) for creating accounts on external sites/applications. + links: + - href: '#pl-4.1_smt.c' + rel: assessment-for + links: + - href: '#pl-4.1_smt' + rel: assessment-for - id: pl-4.1_asm-examine name: assessment-method props: @@ -42168,6 +46207,9 @@ catalog: value: PL-08a.01 class: sp800-53a prose: a security architecture for the system describes the requirements and approach to be taken for protecting the confidentiality, integrity, and availability of organizational information; + links: + - href: '#pl-8_smt.a.1' + rel: assessment-for - id: pl-8_obj.a.2 name: assessment-objective props: @@ -42175,6 +46217,9 @@ catalog: value: PL-08a.02 class: sp800-53a prose: a privacy architecture describes the requirements and approach to be taken for processing personally identifiable information to minimize privacy risk to individuals; + links: + - href: '#pl-8_smt.a.2' + rel: assessment-for - id: pl-8_obj.a.3 name: assessment-objective props: @@ -42189,6 +46234,9 @@ catalog: value: PL-08a.03[01] class: sp800-53a prose: a security architecture for the system describes how the architecture is integrated into and supports the enterprise architecture; + links: + - href: '#pl-8_smt.a.3' + rel: assessment-for - id: pl-8_obj.a.3-2 name: assessment-objective props: @@ -42196,6 +46244,12 @@ catalog: value: PL-08a.03[02] class: sp800-53a prose: a privacy architecture for the system describes how the architecture is integrated into and supports the enterprise architecture; + links: + - href: '#pl-8_smt.a.3' + rel: assessment-for + links: + - href: '#pl-8_smt.a.3' + rel: assessment-for - id: pl-8_obj.a.4 name: assessment-objective props: @@ -42210,6 +46264,9 @@ catalog: value: PL-08a.04[01] class: sp800-53a prose: a security architecture for the system describes any assumptions about and dependencies on external systems and services; + links: + - href: '#pl-8_smt.a.4' + rel: assessment-for - id: pl-8_obj.a.4-2 name: assessment-objective props: @@ -42217,6 +46274,15 @@ catalog: value: PL-08a.04[02] class: sp800-53a prose: a privacy architecture for the system describes any assumptions about and dependencies on external systems and services; + links: + - href: '#pl-8_smt.a.4' + rel: assessment-for + links: + - href: '#pl-8_smt.a.4' + rel: assessment-for + links: + - href: '#pl-8_smt.a' + rel: assessment-for - id: pl-8_obj.b name: assessment-objective props: @@ -42224,6 +46290,9 @@ catalog: value: PL-08b. class: sp800-53a prose: 'changes in the enterprise architecture are reviewed and updated {{ insert: param, pl-08_odp }} to reflect changes in the enterprise architecture;' + links: + - href: '#pl-8_smt.b' + rel: assessment-for - id: pl-8_obj.c name: assessment-objective props: @@ -42238,6 +46307,9 @@ catalog: value: PL-08c.[01] class: sp800-53a prose: planned architecture changes are reflected in the security plan; + links: + - href: '#pl-8_smt.c' + rel: assessment-for - id: pl-8_obj.c-2 name: assessment-objective props: @@ -42245,6 +46317,9 @@ catalog: value: PL-08c.[02] class: sp800-53a prose: planned architecture changes are reflected in the privacy plan; + links: + - href: '#pl-8_smt.c' + rel: assessment-for - id: pl-8_obj.c-3 name: assessment-objective props: @@ -42252,6 +46327,9 @@ catalog: value: PL-08c.[03] class: sp800-53a prose: planned architecture changes are reflected in the Concept of Operations (CONOPS); + links: + - href: '#pl-8_smt.c' + rel: assessment-for - id: pl-8_obj.c-4 name: assessment-objective props: @@ -42259,6 +46337,9 @@ catalog: value: PL-08c.[04] class: sp800-53a prose: planned architecture changes are reflected in criticality analysis; + links: + - href: '#pl-8_smt.c' + rel: assessment-for - id: pl-8_obj.c-5 name: assessment-objective props: @@ -42266,6 +46347,9 @@ catalog: value: PL-08c.[05] class: sp800-53a prose: planned architecture changes are reflected in organizational procedures; + links: + - href: '#pl-8_smt.c' + rel: assessment-for - id: pl-8_obj.c-6 name: assessment-objective props: @@ -42273,6 +46357,15 @@ catalog: value: PL-08c.[06] class: sp800-53a prose: planned architecture changes are reflected in procurements and acquisitions. + links: + - href: '#pl-8_smt.c' + rel: assessment-for + links: + - href: '#pl-8_smt.c' + rel: assessment-for + links: + - href: '#pl-8_smt' + rel: assessment-for - id: pl-8_asm-examine name: assessment-method props: @@ -42395,6 +46488,9 @@ catalog: value: PL-10 class: sp800-53a prose: a control baseline for the system is selected. + links: + - href: '#pl-10_smt' + rel: assessment-for - id: pl-10_asm-examine name: assessment-method props: @@ -42520,6 +46616,9 @@ catalog: value: PL-11 class: sp800-53a prose: the selected control baseline is tailored by applying specified tailoring actions. + links: + - href: '#pl-11_smt' + rel: assessment-for - id: pl-11_asm-examine name: assessment-method props: @@ -42794,6 +46893,9 @@ catalog: value: PS-01a.[01] class: sp800-53a prose: a personnel security policy is developed and documented; + links: + - href: '#ps-1_smt.a' + rel: assessment-for - id: ps-1_obj.a-2 name: assessment-objective props: @@ -42801,6 +46903,9 @@ catalog: value: PS-01a.[02] class: sp800-53a prose: 'the personnel security policy is disseminated to {{ insert: param, ps-01_odp.01 }};' + links: + - href: '#ps-1_smt.a' + rel: assessment-for - id: ps-1_obj.a-3 name: assessment-objective props: @@ -42808,6 +46913,9 @@ catalog: value: PS-01a.[03] class: sp800-53a prose: personnel security procedures to facilitate the implementation of the personnel security policy and associated personnel security controls are developed and documented; + links: + - href: '#ps-1_smt.a' + rel: assessment-for - id: ps-1_obj.a-4 name: assessment-objective props: @@ -42815,6 +46923,9 @@ catalog: value: PS-01a.[04] class: sp800-53a prose: 'the personnel security procedures are disseminated to {{ insert: param, ps-01_odp.02 }};' + links: + - href: '#ps-1_smt.a' + rel: assessment-for - id: ps-1_obj.a.1 name: assessment-objective props: @@ -42836,6 +46947,9 @@ catalog: value: PS-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses purpose;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-2 name: assessment-objective props: @@ -42843,6 +46957,9 @@ catalog: value: PS-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses scope;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-3 name: assessment-objective props: @@ -42850,6 +46967,9 @@ catalog: value: PS-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses roles;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-4 name: assessment-objective props: @@ -42857,6 +46977,9 @@ catalog: value: PS-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses responsibilities;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-5 name: assessment-objective props: @@ -42864,6 +46987,9 @@ catalog: value: PS-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses management commitment;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-6 name: assessment-objective props: @@ -42871,6 +46997,9 @@ catalog: value: PS-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses coordination among organizational entities;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-7 name: assessment-objective props: @@ -42878,6 +47007,12 @@ catalog: value: PS-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses compliance;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.b name: assessment-objective props: @@ -42885,6 +47020,15 @@ catalog: value: PS-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ps-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ps-1_smt.a.1' + rel: assessment-for + links: + - href: '#ps-1_smt.a' + rel: assessment-for - id: ps-1_obj.b name: assessment-objective props: @@ -42892,6 +47036,9 @@ catalog: value: PS-01b. class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the personnel security policy and procedures;' + links: + - href: '#ps-1_smt.b' + rel: assessment-for - id: ps-1_obj.c name: assessment-objective props: @@ -42913,6 +47060,9 @@ catalog: value: PS-01c.01[01] class: sp800-53a prose: 'the current personnel security policy is reviewed and updated {{ insert: param, ps-01_odp.05 }};' + links: + - href: '#ps-1_smt.c.1' + rel: assessment-for - id: ps-1_obj.c.1-2 name: assessment-objective props: @@ -42920,6 +47070,12 @@ catalog: value: PS-01c.01[02] class: sp800-53a prose: 'the current personnel security policy is reviewed and updated following {{ insert: param, ps-01_odp.06 }};' + links: + - href: '#ps-1_smt.c.1' + rel: assessment-for + links: + - href: '#ps-1_smt.c.1' + rel: assessment-for - id: ps-1_obj.c.2 name: assessment-objective props: @@ -42934,6 +47090,9 @@ catalog: value: PS-01c.02[01] class: sp800-53a prose: 'the current personnel security procedures are reviewed and updated {{ insert: param, ps-01_odp.07 }};' + links: + - href: '#ps-1_smt.c.2' + rel: assessment-for - id: ps-1_obj.c.2-2 name: assessment-objective props: @@ -42941,6 +47100,18 @@ catalog: value: PS-01c.02[02] class: sp800-53a prose: 'the current personnel security procedures are reviewed and updated following {{ insert: param, ps-01_odp.08 }}.' + links: + - href: '#ps-1_smt.c.2' + rel: assessment-for + links: + - href: '#ps-1_smt.c.2' + rel: assessment-for + links: + - href: '#ps-1_smt.c' + rel: assessment-for + links: + - href: '#ps-1_smt' + rel: assessment-for - id: ps-1_asm-examine name: assessment-method props: @@ -43070,6 +47241,9 @@ catalog: value: PS-02a. class: sp800-53a prose: a risk designation is assigned to all organizational positions; + links: + - href: '#ps-2_smt.a' + rel: assessment-for - id: ps-2_obj.b name: assessment-objective props: @@ -43077,6 +47251,9 @@ catalog: value: PS-02b. class: sp800-53a prose: screening criteria are established for individuals filling organizational positions; + links: + - href: '#ps-2_smt.b' + rel: assessment-for - id: ps-2_obj.c name: assessment-objective props: @@ -43084,6 +47261,12 @@ catalog: value: PS-02c. class: sp800-53a prose: 'position risk designations are reviewed and updated {{ insert: param, ps-02_odp }}.' + links: + - href: '#ps-2_smt.c' + rel: assessment-for + links: + - href: '#ps-2_smt' + rel: assessment-for - id: ps-2_asm-examine name: assessment-method props: @@ -43249,6 +47432,9 @@ catalog: value: PS-03a. class: sp800-53a prose: individuals are screened prior to authorizing access to the system; + links: + - href: '#ps-3_smt.a' + rel: assessment-for - id: ps-3_obj.b name: assessment-objective props: @@ -43263,6 +47449,9 @@ catalog: value: PS-03b.[01] class: sp800-53a prose: 'individuals are rescreened in accordance with {{ insert: param, ps-03_odp.01 }};' + links: + - href: '#ps-3_smt.b' + rel: assessment-for - id: ps-3_obj.b-2 name: assessment-objective props: @@ -43270,6 +47459,15 @@ catalog: value: PS-03b.[02] class: sp800-53a prose: 'where rescreening is so indicated, individuals are rescreened {{ insert: param, ps-03_odp.02 }}.' + links: + - href: '#ps-3_smt.b' + rel: assessment-for + links: + - href: '#ps-3_smt.b' + rel: assessment-for + links: + - href: '#ps-3_smt' + rel: assessment-for - id: ps-3_asm-examine name: assessment-method props: @@ -43418,6 +47616,9 @@ catalog: value: PS-04a. class: sp800-53a prose: 'upon termination of individual employment, system access is disabled within {{ insert: param, ps-04_odp.01 }};' + links: + - href: '#ps-4_smt.a' + rel: assessment-for - id: ps-4_obj.b name: assessment-objective props: @@ -43425,6 +47626,9 @@ catalog: value: PS-04b. class: sp800-53a prose: upon termination of individual employment, any authenticators and credentials are terminated or revoked; + links: + - href: '#ps-4_smt.b' + rel: assessment-for - id: ps-4_obj.c name: assessment-objective props: @@ -43432,6 +47636,9 @@ catalog: value: PS-04c. class: sp800-53a prose: 'upon termination of individual employment, exit interviews that include a discussion of {{ insert: param, ps-04_odp.02 }} are conducted;' + links: + - href: '#ps-4_smt.c' + rel: assessment-for - id: ps-4_obj.d name: assessment-objective props: @@ -43439,6 +47646,9 @@ catalog: value: PS-04d. class: sp800-53a prose: upon termination of individual employment, all security-related organizational system-related property is retrieved; + links: + - href: '#ps-4_smt.d' + rel: assessment-for - id: ps-4_obj.e name: assessment-objective props: @@ -43446,6 +47656,12 @@ catalog: value: PS-04e. class: sp800-53a prose: upon termination of individual employment, access to organizational information and systems formerly controlled by the terminated individual are retained. + links: + - href: '#ps-4_smt.e' + rel: assessment-for + links: + - href: '#ps-4_smt' + rel: assessment-for - id: ps-4_asm-examine name: assessment-method props: @@ -43574,6 +47790,9 @@ catalog: value: PS-04(02) class: sp800-53a prose: ' {{ insert: param, ps-04.02_odp.01 }} are used to {{ insert: param, ps-04.02_odp.02 }}.' + links: + - href: '#ps-4.2_smt' + rel: assessment-for - id: ps-4.2_asm-examine name: assessment-method props: @@ -43744,6 +47963,9 @@ catalog: value: PS-05a. class: sp800-53a prose: the ongoing operational need for current logical and physical access authorizations to systems and facilities are reviewed and confirmed when individuals are reassigned or transferred to other positions within the organization; + links: + - href: '#ps-5_smt.a' + rel: assessment-for - id: ps-5_obj.b name: assessment-objective props: @@ -43751,6 +47973,9 @@ catalog: value: PS-05b. class: sp800-53a prose: ' {{ insert: param, ps-05_odp.01 }} are initiated within {{ insert: param, ps-05_odp.02 }};' + links: + - href: '#ps-5_smt.b' + rel: assessment-for - id: ps-5_obj.c name: assessment-objective props: @@ -43758,6 +47983,9 @@ catalog: value: PS-05c. class: sp800-53a prose: access authorization is modified as needed to correspond with any changes in operational need due to reassignment or transfer; + links: + - href: '#ps-5_smt.c' + rel: assessment-for - id: ps-5_obj.d name: assessment-objective props: @@ -43765,6 +47993,12 @@ catalog: value: PS-05d. class: sp800-53a prose: ' {{ insert: param, ps-05_odp.03 }} are notified within {{ insert: param, ps-05_odp.04 }}.' + links: + - href: '#ps-5_smt.d' + rel: assessment-for + links: + - href: '#ps-5_smt' + rel: assessment-for - id: ps-5_asm-examine name: assessment-method props: @@ -43935,6 +48169,9 @@ catalog: value: PS-06a. class: sp800-53a prose: access agreements are developed and documented for organizational systems; + links: + - href: '#ps-6_smt.a' + rel: assessment-for - id: ps-6_obj.b name: assessment-objective props: @@ -43942,6 +48179,9 @@ catalog: value: PS-06b. class: sp800-53a prose: 'the access agreements are reviewed and updated {{ insert: param, ps-06_odp.01 }};' + links: + - href: '#ps-6_smt.b' + rel: assessment-for - id: ps-6_obj.c name: assessment-objective props: @@ -43956,6 +48196,9 @@ catalog: value: PS-06c.01 class: sp800-53a prose: individuals requiring access to organizational information and systems sign appropriate access agreements prior to being granted access; + links: + - href: '#ps-6_smt.c.1' + rel: assessment-for - id: ps-6_obj.c.2 name: assessment-objective props: @@ -43963,6 +48206,15 @@ catalog: value: PS-06c.02 class: sp800-53a prose: 'individuals requiring access to organizational information and systems re-sign access agreements to maintain access to organizational systems when access agreements have been updated or {{ insert: param, ps-06_odp.02 }}.' + links: + - href: '#ps-6_smt.c.2' + rel: assessment-for + links: + - href: '#ps-6_smt.c' + rel: assessment-for + links: + - href: '#ps-6_smt' + rel: assessment-for - id: ps-6_asm-examine name: assessment-method props: @@ -44144,6 +48396,9 @@ catalog: value: PS-07a. class: sp800-53a prose: personnel security requirements are established, including security roles and responsibilities for external providers; + links: + - href: '#ps-7_smt.a' + rel: assessment-for - id: ps-7_obj.b name: assessment-objective props: @@ -44151,6 +48406,9 @@ catalog: value: PS-07b. class: sp800-53a prose: external providers are required to comply with personnel security policies and procedures established by the organization; + links: + - href: '#ps-7_smt.b' + rel: assessment-for - id: ps-7_obj.c name: assessment-objective props: @@ -44158,6 +48416,9 @@ catalog: value: PS-07c. class: sp800-53a prose: personnel security requirements are documented; + links: + - href: '#ps-7_smt.c' + rel: assessment-for - id: ps-7_obj.d name: assessment-objective props: @@ -44165,6 +48426,9 @@ catalog: value: PS-07d. class: sp800-53a prose: 'external providers are required to notify {{ insert: param, ps-07_odp.01 }} of any personnel transfers or terminations of external personnel who possess organizational credentials and/or badges or who have system privileges within {{ insert: param, ps-07_odp.02 }};' + links: + - href: '#ps-7_smt.d' + rel: assessment-for - id: ps-7_obj.e name: assessment-objective props: @@ -44172,6 +48436,12 @@ catalog: value: PS-07e. class: sp800-53a prose: provider compliance with personnel security requirements is monitored. + links: + - href: '#ps-7_smt.e' + rel: assessment-for + links: + - href: '#ps-7_smt' + rel: assessment-for - id: ps-7_asm-examine name: assessment-method props: @@ -44312,6 +48582,9 @@ catalog: value: PS-08a. class: sp800-53a prose: a formal sanctions process is employed for individuals failing to comply with established information security and privacy policies and procedures; + links: + - href: '#ps-8_smt.a' + rel: assessment-for - id: ps-8_obj.b name: assessment-objective props: @@ -44319,6 +48592,12 @@ catalog: value: PS-08b. class: sp800-53a prose: ' {{ insert: param, ps-08_odp.01 }} is/are notified within {{ insert: param, ps-08_odp.02 }} when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction.' + links: + - href: '#ps-8_smt.b' + rel: assessment-for + links: + - href: '#ps-8_smt' + rel: assessment-for - id: ps-8_asm-examine name: assessment-method props: @@ -44420,6 +48699,9 @@ catalog: value: PS-09[01] class: sp800-53a prose: security roles and responsibilities are incorporated into organizational position descriptions; + links: + - href: '#ps-9_smt' + rel: assessment-for - id: ps-9_obj-2 name: assessment-objective props: @@ -44427,6 +48709,12 @@ catalog: value: PS-09[02] class: sp800-53a prose: privacy roles and responsibilities are incorporated into organizational position descriptions. + links: + - href: '#ps-9_smt' + rel: assessment-for + links: + - href: '#ps-9_smt' + rel: assessment-for - id: ps-9_asm-examine name: assessment-method props: @@ -44695,6 +48983,9 @@ catalog: value: RA-01a.[01] class: sp800-53a prose: a risk assessment policy is developed and documented; + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.a-2 name: assessment-objective props: @@ -44702,6 +48993,9 @@ catalog: value: RA-01a.[02] class: sp800-53a prose: 'the risk assessment policy is disseminated to {{ insert: param, ra-01_odp.01 }};' + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.a-3 name: assessment-objective props: @@ -44709,6 +49003,9 @@ catalog: value: RA-01a.[03] class: sp800-53a prose: risk assessment procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls are developed and documented; + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.a-4 name: assessment-objective props: @@ -44716,6 +49013,9 @@ catalog: value: RA-01a.[04] class: sp800-53a prose: 'the risk assessment procedures are disseminated to {{ insert: param, ra-01_odp.02 }};' + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.a.1 name: assessment-objective props: @@ -44737,6 +49037,9 @@ catalog: value: RA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses purpose;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-2 name: assessment-objective props: @@ -44744,6 +49047,9 @@ catalog: value: RA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses scope;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-3 name: assessment-objective props: @@ -44751,6 +49057,9 @@ catalog: value: RA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses roles;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-4 name: assessment-objective props: @@ -44758,6 +49067,9 @@ catalog: value: RA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses responsibilities;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-5 name: assessment-objective props: @@ -44765,6 +49077,9 @@ catalog: value: RA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses management commitment;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-6 name: assessment-objective props: @@ -44772,6 +49087,9 @@ catalog: value: RA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses coordination among organizational entities;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-7 name: assessment-objective props: @@ -44779,6 +49097,12 @@ catalog: value: RA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses compliance;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.b name: assessment-objective props: @@ -44786,6 +49110,15 @@ catalog: value: RA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ra-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ra-1_smt.a.1' + rel: assessment-for + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.b name: assessment-objective props: @@ -44793,6 +49126,9 @@ catalog: value: RA-01b. class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the risk assessment policy and procedures;' + links: + - href: '#ra-1_smt.b' + rel: assessment-for - id: ra-1_obj.c name: assessment-objective props: @@ -44814,6 +49150,9 @@ catalog: value: RA-01c.01[01] class: sp800-53a prose: 'the current risk assessment policy is reviewed and updated {{ insert: param, ra-01_odp.05 }};' + links: + - href: '#ra-1_smt.c.1' + rel: assessment-for - id: ra-1_obj.c.1-2 name: assessment-objective props: @@ -44821,6 +49160,12 @@ catalog: value: RA-01c.01[02] class: sp800-53a prose: 'the current risk assessment policy is reviewed and updated following {{ insert: param, ra-01_odp.06 }};' + links: + - href: '#ra-1_smt.c.1' + rel: assessment-for + links: + - href: '#ra-1_smt.c.1' + rel: assessment-for - id: ra-1_obj.c.2 name: assessment-objective props: @@ -44835,6 +49180,9 @@ catalog: value: RA-01c.02[01] class: sp800-53a prose: 'the current risk assessment procedures are reviewed and updated {{ insert: param, ra-01_odp.07 }};' + links: + - href: '#ra-1_smt.c.2' + rel: assessment-for - id: ra-1_obj.c.2-2 name: assessment-objective props: @@ -44842,6 +49190,18 @@ catalog: value: RA-01c.02[02] class: sp800-53a prose: 'the current risk assessment procedures are reviewed and updated following {{ insert: param, ra-01_odp.08 }}.' + links: + - href: '#ra-1_smt.c.2' + rel: assessment-for + links: + - href: '#ra-1_smt.c.2' + rel: assessment-for + links: + - href: '#ra-1_smt.c' + rel: assessment-for + links: + - href: '#ra-1_smt' + rel: assessment-for - id: ra-1_asm-examine name: assessment-method props: @@ -44983,6 +49343,9 @@ catalog: value: RA-02a. class: sp800-53a prose: the system and the information it processes, stores, and transmits are categorized; + links: + - href: '#ra-2_smt.a' + rel: assessment-for - id: ra-2_obj.b name: assessment-objective props: @@ -44990,6 +49353,9 @@ catalog: value: RA-02b. class: sp800-53a prose: the security categorization results, including supporting rationale, are documented in the security plan for the system; + links: + - href: '#ra-2_smt.b' + rel: assessment-for - id: ra-2_obj.c name: assessment-objective props: @@ -44997,6 +49363,12 @@ catalog: value: RA-02c. class: sp800-53a prose: the authorizing official or authorizing official designated representative reviews and approves the security categorization decision. + links: + - href: '#ra-2_smt.c' + rel: assessment-for + links: + - href: '#ra-2_smt' + rel: assessment-for - id: ra-2_asm-examine name: assessment-method props: @@ -45274,6 +49646,9 @@ catalog: value: RA-03a.01 class: sp800-53a prose: a risk assessment is conducted to identify threats to and vulnerabilities in the system; + links: + - href: '#ra-3_smt.a.1' + rel: assessment-for - id: ra-3_obj.a.2 name: assessment-objective props: @@ -45281,6 +49656,9 @@ catalog: value: RA-03a.02 class: sp800-53a prose: a risk assessment is conducted to determine the likelihood and magnitude of harm from unauthorized access, use, disclosure, disruption, modification, or destruction of the system; the information it processes, stores, or transmits; and any related information; + links: + - href: '#ra-3_smt.a.2' + rel: assessment-for - id: ra-3_obj.a.3 name: assessment-objective props: @@ -45288,6 +49666,12 @@ catalog: value: RA-03a.03 class: sp800-53a prose: a risk assessment is conducted to determine the likelihood and impact of adverse effects on individuals arising from the processing of personally identifiable information; + links: + - href: '#ra-3_smt.a.3' + rel: assessment-for + links: + - href: '#ra-3_smt.a' + rel: assessment-for - id: ra-3_obj.b name: assessment-objective props: @@ -45295,6 +49679,9 @@ catalog: value: RA-03b. class: sp800-53a prose: risk assessment results and risk management decisions from the organization and mission or business process perspectives are integrated with system-level risk assessments; + links: + - href: '#ra-3_smt.b' + rel: assessment-for - id: ra-3_obj.c name: assessment-objective props: @@ -45302,6 +49689,9 @@ catalog: value: RA-03c. class: sp800-53a prose: 'risk assessment results are documented in {{ insert: param, ra-03_odp.01 }};' + links: + - href: '#ra-3_smt.c' + rel: assessment-for - id: ra-3_obj.d name: assessment-objective props: @@ -45309,6 +49699,9 @@ catalog: value: RA-03d. class: sp800-53a prose: 'risk assessment results are reviewed {{ insert: param, ra-03_odp.03 }};' + links: + - href: '#ra-3_smt.d' + rel: assessment-for - id: ra-3_obj.e name: assessment-objective props: @@ -45316,6 +49709,9 @@ catalog: value: RA-03e. class: sp800-53a prose: 'risk assessment results are disseminated to {{ insert: param, ra-03_odp.04 }};' + links: + - href: '#ra-3_smt.e' + rel: assessment-for - id: ra-3_obj.f name: assessment-objective props: @@ -45323,6 +49719,12 @@ catalog: value: RA-03f. class: sp800-53a prose: 'the risk assessment is updated {{ insert: param, ra-03_odp.05 }} or when there are significant changes to the system, its environment of operation, or other conditions that may impact the security or privacy state of the system.' + links: + - href: '#ra-3_smt.f' + rel: assessment-for + links: + - href: '#ra-3_smt' + rel: assessment-for - id: ra-3_asm-examine name: assessment-method props: @@ -45471,6 +49873,9 @@ catalog: value: RA-03(01)(a) class: sp800-53a prose: 'supply chain risks associated with {{ insert: param, ra-03.01_odp.01 }} are assessed;' + links: + - href: '#ra-3.1_smt.a' + rel: assessment-for - id: ra-3.1_obj.b name: assessment-objective props: @@ -45478,6 +49883,12 @@ catalog: value: RA-03(01)(b) class: sp800-53a prose: 'the supply chain risk assessment is updated {{ insert: param, ra-03.01_odp.02 }} , when there are significant changes to the relevant supply chain, or when changes to the system, environments of operation, or other conditions may necessitate a change in the supply chain.' + links: + - href: '#ra-3.1_smt.b' + rel: assessment-for + links: + - href: '#ra-3.1_smt' + rel: assessment-for - id: ra-3.1_asm-examine name: assessment-method props: @@ -45753,6 +50164,9 @@ catalog: value: RA-05a.[01] class: sp800-53a prose: 'systems and hosted applications are monitored for vulnerabilities {{ insert: param, ra-05_odp.01 }} and when new vulnerabilities potentially affecting the system are identified and reported;' + links: + - href: '#ra-5_smt.a' + rel: assessment-for - id: ra-5_obj.a-2 name: assessment-objective props: @@ -45760,6 +50174,12 @@ catalog: value: RA-05a.[02] class: sp800-53a prose: 'systems and hosted applications are scanned for vulnerabilities {{ insert: param, ra-05_odp.02 }} and when new vulnerabilities potentially affecting the system are identified and reported;' + links: + - href: '#ra-5_smt.a' + rel: assessment-for + links: + - href: '#ra-5_smt.a' + rel: assessment-for - id: ra-5_obj.b name: assessment-objective props: @@ -45775,6 +50195,9 @@ catalog: value: RA-05b.01 class: sp800-53a prose: vulnerability monitoring tools and techniques are employed to automate parts of the vulnerability management process by using standards for enumerating platforms, software flaws, and improper configurations; + links: + - href: '#ra-5_smt.b.1' + rel: assessment-for - id: ra-5_obj.b.2 name: assessment-objective props: @@ -45782,6 +50205,9 @@ catalog: value: RA-05b.02 class: sp800-53a prose: vulnerability monitoring tools and techniques are employed to facilitate interoperability among tools and to automate parts of the vulnerability management process by using standards for formatting checklists and test procedures; + links: + - href: '#ra-5_smt.b.2' + rel: assessment-for - id: ra-5_obj.b.3 name: assessment-objective props: @@ -45789,6 +50215,12 @@ catalog: value: RA-05b.03 class: sp800-53a prose: vulnerability monitoring tools and techniques are employed to facilitate interoperability among tools and to automate parts of the vulnerability management process by using standards for measuring vulnerability impact; + links: + - href: '#ra-5_smt.b.3' + rel: assessment-for + links: + - href: '#ra-5_smt.b' + rel: assessment-for - id: ra-5_obj.c name: assessment-objective props: @@ -45796,6 +50228,9 @@ catalog: value: RA-05c. class: sp800-53a prose: vulnerability scan reports and results from vulnerability monitoring are analyzed; + links: + - href: '#ra-5_smt.c' + rel: assessment-for - id: ra-5_obj.d name: assessment-objective props: @@ -45803,6 +50238,9 @@ catalog: value: RA-05d. class: sp800-53a prose: 'legitimate vulnerabilities are remediated {{ insert: param, ra-05_odp.03 }} in accordance with an organizational assessment of risk;' + links: + - href: '#ra-5_smt.d' + rel: assessment-for - id: ra-5_obj.e name: assessment-objective props: @@ -45810,6 +50248,9 @@ catalog: value: RA-05e. class: sp800-53a prose: 'information obtained from the vulnerability monitoring process and control assessments is shared with {{ insert: param, ra-05_odp.04 }} to help eliminate similar vulnerabilities in other systems;' + links: + - href: '#ra-5_smt.e' + rel: assessment-for - id: ra-5_obj.f name: assessment-objective props: @@ -45817,6 +50258,12 @@ catalog: value: RA-05f. class: sp800-53a prose: vulnerability monitoring tools that include the capability to readily update the vulnerabilities to be scanned are employed. + links: + - href: '#ra-5_smt.f' + rel: assessment-for + links: + - href: '#ra-5_smt' + rel: assessment-for - id: ra-5_asm-examine name: assessment-method props: @@ -45943,6 +50390,9 @@ catalog: value: RA-05(02) class: sp800-53a prose: 'the system vulnerabilities to be scanned are updated {{ insert: param, ra-05.02_odp.01 }}.' + links: + - href: '#ra-5.2_smt' + rel: assessment-for - id: ra-5.2_asm-examine name: assessment-method props: @@ -46058,6 +50508,9 @@ catalog: value: RA-05(04)[01] class: sp800-53a prose: information about the system is discoverable; + links: + - href: '#ra-5.4_smt' + rel: assessment-for - id: ra-5.4_obj-2 name: assessment-objective props: @@ -46065,6 +50518,12 @@ catalog: value: RA-05(04)[02] class: sp800-53a prose: ' {{ insert: param, ra-05.04_odp }} are taken when information about the system is confirmed as discoverable.' + links: + - href: '#ra-5.4_smt' + rel: assessment-for + links: + - href: '#ra-5.4_smt' + rel: assessment-for - id: ra-5.4_asm-examine name: assessment-method props: @@ -46195,6 +50654,9 @@ catalog: value: RA-05(05) class: sp800-53a prose: 'privileged access authorization is implemented to {{ insert: param, ra-05.05_odp.01 }} for {{ insert: param, ra-05.05_odp.02 }}.' + links: + - href: '#ra-5.5_smt' + rel: assessment-for - id: ra-5.5_asm-examine name: assessment-method props: @@ -46302,6 +50764,9 @@ catalog: value: RA-05(11) class: sp800-53a prose: a public reporting channel is established for receiving reports of vulnerabilities in organizational systems and system components. + links: + - href: '#ra-5.11_smt' + rel: assessment-for - id: ra-5.11_asm-examine name: assessment-method props: @@ -46432,6 +50897,9 @@ catalog: value: RA-07[01] class: sp800-53a prose: findings from security assessments are responded to in accordance with organizational risk tolerance; + links: + - href: '#ra-7_smt' + rel: assessment-for - id: ra-7_obj-2 name: assessment-objective props: @@ -46439,6 +50907,9 @@ catalog: value: RA-07[02] class: sp800-53a prose: findings from privacy assessments are responded to in accordance with organizational risk tolerance; + links: + - href: '#ra-7_smt' + rel: assessment-for - id: ra-7_obj-3 name: assessment-objective props: @@ -46446,6 +50917,9 @@ catalog: value: RA-07[03] class: sp800-53a prose: findings from monitoring are responded to in accordance with organizational risk tolerance; + links: + - href: '#ra-7_smt' + rel: assessment-for - id: ra-7_obj-4 name: assessment-objective props: @@ -46453,6 +50927,12 @@ catalog: value: RA-07[04] class: sp800-53a prose: findings from audits are responded to in accordance with organizational risk tolerance. + links: + - href: '#ra-7_smt' + rel: assessment-for + links: + - href: '#ra-7_smt' + rel: assessment-for - id: ra-7_asm-examine name: assessment-method props: @@ -46587,6 +51067,9 @@ catalog: value: RA-09 class: sp800-53a prose: 'critical system components and functions are identified by performing a criticality analysis for {{ insert: param, ra-09_odp.01 }} at {{ insert: param, ra-09_odp.02 }}.' + links: + - href: '#ra-9_smt' + rel: assessment-for - id: ra-9_asm-examine name: assessment-method props: @@ -46862,6 +51345,9 @@ catalog: value: SA-01a.[01] class: sp800-53a prose: a system and services acquisition policy is developed and documented; + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.a-2 name: assessment-objective props: @@ -46869,6 +51355,9 @@ catalog: value: SA-01a.[02] class: sp800-53a prose: 'the system and services acquisition policy is disseminated to {{ insert: param, sa-01_odp.01 }};' + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.a-3 name: assessment-objective props: @@ -46876,6 +51365,9 @@ catalog: value: SA-01a.[03] class: sp800-53a prose: system and services acquisition procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls are developed and documented; + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.a-4 name: assessment-objective props: @@ -46883,6 +51375,9 @@ catalog: value: SA-01a.[04] class: sp800-53a prose: 'the system and services acquisition procedures are disseminated to {{ insert: param, sa-01_odp.02 }};' + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.a.1 name: assessment-objective props: @@ -46904,6 +51399,9 @@ catalog: value: SA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses purpose;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-2 name: assessment-objective props: @@ -46911,6 +51409,9 @@ catalog: value: SA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses scope;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-3 name: assessment-objective props: @@ -46918,6 +51419,9 @@ catalog: value: SA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses roles;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-4 name: assessment-objective props: @@ -46925,6 +51429,9 @@ catalog: value: SA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses responsibilities;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-5 name: assessment-objective props: @@ -46932,6 +51439,9 @@ catalog: value: SA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses management commitment;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-6 name: assessment-objective props: @@ -46939,6 +51449,9 @@ catalog: value: SA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses coordination among organizational entities;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-7 name: assessment-objective props: @@ -46946,6 +51459,12 @@ catalog: value: SA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses compliance;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.b name: assessment-objective props: @@ -46953,6 +51472,15 @@ catalog: value: SA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#sa-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#sa-1_smt.a.1' + rel: assessment-for + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.b name: assessment-objective props: @@ -46960,6 +51488,9 @@ catalog: value: SA-01b. class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the system and services acquisition policy and procedures;' + links: + - href: '#sa-1_smt.b' + rel: assessment-for - id: sa-1_obj.c name: assessment-objective props: @@ -46981,6 +51512,9 @@ catalog: value: SA-01c.01[01] class: sp800-53a prose: 'the system and services acquisition policy is reviewed and updated {{ insert: param, sa-01_odp.05 }};' + links: + - href: '#sa-1_smt.c.1' + rel: assessment-for - id: sa-1_obj.c.1-2 name: assessment-objective props: @@ -46988,6 +51522,12 @@ catalog: value: SA-01c.01[02] class: sp800-53a prose: 'the current system and services acquisition policy is reviewed and updated following {{ insert: param, sa-01_odp.06 }};' + links: + - href: '#sa-1_smt.c.1' + rel: assessment-for + links: + - href: '#sa-1_smt.c.1' + rel: assessment-for - id: sa-1_obj.c.2 name: assessment-objective props: @@ -47002,6 +51542,9 @@ catalog: value: SA-01c.02[01] class: sp800-53a prose: 'the current system and services acquisition procedures are reviewed and updated {{ insert: param, sa-01_odp.07 }};' + links: + - href: '#sa-1_smt.c.2' + rel: assessment-for - id: sa-1_obj.c.2-2 name: assessment-objective props: @@ -47009,6 +51552,18 @@ catalog: value: SA-01c.02[02] class: sp800-53a prose: 'the current system and services acquisition procedures are reviewed and updated following {{ insert: param, sa-01_odp.08 }}.' + links: + - href: '#sa-1_smt.c.2' + rel: assessment-for + links: + - href: '#sa-1_smt.c.2' + rel: assessment-for + links: + - href: '#sa-1_smt.c' + rel: assessment-for + links: + - href: '#sa-1_smt' + rel: assessment-for - id: sa-1_asm-examine name: assessment-method props: @@ -47135,6 +51690,9 @@ catalog: value: SA-02a.[01] class: sp800-53a prose: the high-level information security requirements for the system or system service are determined in mission and business process planning; + links: + - href: '#sa-2_smt.a' + rel: assessment-for - id: sa-2_obj.a-2 name: assessment-objective props: @@ -47142,6 +51700,12 @@ catalog: value: SA-02a.[02] class: sp800-53a prose: the high-level privacy requirements for the system or system service are determined in mission and business process planning; + links: + - href: '#sa-2_smt.a' + rel: assessment-for + links: + - href: '#sa-2_smt.a' + rel: assessment-for - id: sa-2_obj.b name: assessment-objective props: @@ -47156,6 +51720,9 @@ catalog: value: SA-02b.[01] class: sp800-53a prose: the resources required to protect the system or system service are determined and documented as part of the organizational capital planning and investment control process; + links: + - href: '#sa-2_smt.b' + rel: assessment-for - id: sa-2_obj.b-2 name: assessment-objective props: @@ -47163,6 +51730,12 @@ catalog: value: SA-02b.[02] class: sp800-53a prose: the resources required to protect the system or system service are allocated as part of the organizational capital planning and investment control process; + links: + - href: '#sa-2_smt.b' + rel: assessment-for + links: + - href: '#sa-2_smt.b' + rel: assessment-for - id: sa-2_obj.c name: assessment-objective props: @@ -47177,6 +51750,9 @@ catalog: value: SA-02c.[01] class: sp800-53a prose: a discrete line item for information security is established in organizational programming and budgeting documentation; + links: + - href: '#sa-2_smt.c' + rel: assessment-for - id: sa-2_obj.c-2 name: assessment-objective props: @@ -47184,6 +51760,15 @@ catalog: value: SA-02c.[02] class: sp800-53a prose: a discrete line item for privacy is established in organizational programming and budgeting documentation. + links: + - href: '#sa-2_smt.c' + rel: assessment-for + links: + - href: '#sa-2_smt.c' + rel: assessment-for + links: + - href: '#sa-2_smt' + rel: assessment-for - id: sa-2_asm-examine name: assessment-method props: @@ -47376,6 +51961,9 @@ catalog: value: SA-03a.[01] class: sp800-53a prose: 'the system is acquired, developed, and managed using {{ insert: param, sa-03_odp }} that incorporates information security considerations;' + links: + - href: '#sa-3_smt.a' + rel: assessment-for - id: sa-3_obj.a-2 name: assessment-objective props: @@ -47383,6 +51971,12 @@ catalog: value: SA-03a.[02] class: sp800-53a prose: 'the system is acquired, developed, and managed using {{ insert: param, sa-03_odp }} that incorporates privacy considerations;' + links: + - href: '#sa-3_smt.a' + rel: assessment-for + links: + - href: '#sa-3_smt.a' + rel: assessment-for - id: sa-3_obj.b name: assessment-objective props: @@ -47397,6 +51991,9 @@ catalog: value: SA-03b.[01] class: sp800-53a prose: information security roles and responsibilities are defined and documented throughout the system development life cycle; + links: + - href: '#sa-3_smt.b' + rel: assessment-for - id: sa-3_obj.b-2 name: assessment-objective props: @@ -47404,6 +52001,12 @@ catalog: value: SA-03b.[02] class: sp800-53a prose: privacy roles and responsibilities are defined and documented throughout the system development life cycle; + links: + - href: '#sa-3_smt.b' + rel: assessment-for + links: + - href: '#sa-3_smt.b' + rel: assessment-for - id: sa-3_obj.c name: assessment-objective props: @@ -47418,6 +52021,9 @@ catalog: value: SA-03c.[01] class: sp800-53a prose: individuals with information security roles and responsibilities are identified; + links: + - href: '#sa-3_smt.c' + rel: assessment-for - id: sa-3_obj.c-2 name: assessment-objective props: @@ -47425,6 +52031,12 @@ catalog: value: SA-03c.[02] class: sp800-53a prose: individuals with privacy roles and responsibilities are identified; + links: + - href: '#sa-3_smt.c' + rel: assessment-for + links: + - href: '#sa-3_smt.c' + rel: assessment-for - id: sa-3_obj.d name: assessment-objective props: @@ -47439,6 +52051,9 @@ catalog: value: SA-03d.[01] class: sp800-53a prose: organizational information security risk management processes are integrated into system development life cycle activities; + links: + - href: '#sa-3_smt.d' + rel: assessment-for - id: sa-3_obj.d-2 name: assessment-objective props: @@ -47446,6 +52061,15 @@ catalog: value: SA-03d.[02] class: sp800-53a prose: organizational privacy risk management processes are integrated into system development life cycle activities. + links: + - href: '#sa-3_smt.d' + rel: assessment-for + links: + - href: '#sa-3_smt.d' + rel: assessment-for + links: + - href: '#sa-3_smt' + rel: assessment-for - id: sa-3_asm-examine name: assessment-method props: @@ -47718,6 +52342,9 @@ catalog: value: SA-04a.[01] class: sp800-53a prose: 'security functional requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.a' + rel: assessment-for - id: sa-4_obj.a-2 name: assessment-objective props: @@ -47725,6 +52352,12 @@ catalog: value: SA-04a.[02] class: sp800-53a prose: 'privacy functional requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.a' + rel: assessment-for + links: + - href: '#sa-4_smt.a' + rel: assessment-for - id: sa-4_obj.b name: assessment-objective props: @@ -47732,6 +52365,9 @@ catalog: value: SA-04b. class: sp800-53a prose: 'strength of mechanism requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.b' + rel: assessment-for - id: sa-4_obj.c name: assessment-objective props: @@ -47746,6 +52382,9 @@ catalog: value: SA-04c.[01] class: sp800-53a prose: 'security assurance requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.c' + rel: assessment-for - id: sa-4_obj.c-2 name: assessment-objective props: @@ -47753,6 +52392,12 @@ catalog: value: SA-04c.[02] class: sp800-53a prose: 'privacy assurance requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.c' + rel: assessment-for + links: + - href: '#sa-4_smt.c' + rel: assessment-for - id: sa-4_obj.d name: assessment-objective props: @@ -47767,6 +52412,9 @@ catalog: value: SA-04d.[01] class: sp800-53a prose: 'controls needed to satisfy the security requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.d' + rel: assessment-for - id: sa-4_obj.d-2 name: assessment-objective props: @@ -47774,6 +52422,12 @@ catalog: value: SA-04d.[02] class: sp800-53a prose: 'controls needed to satisfy the privacy requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.d' + rel: assessment-for + links: + - href: '#sa-4_smt.d' + rel: assessment-for - id: sa-4_obj.e name: assessment-objective props: @@ -47788,6 +52442,9 @@ catalog: value: SA-04e.[01] class: sp800-53a prose: 'security documentation requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.e' + rel: assessment-for - id: sa-4_obj.e-2 name: assessment-objective props: @@ -47795,6 +52452,12 @@ catalog: value: SA-04e.[02] class: sp800-53a prose: 'privacy documentation requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.e' + rel: assessment-for + links: + - href: '#sa-4_smt.e' + rel: assessment-for - id: sa-4_obj.f name: assessment-objective props: @@ -47809,6 +52472,9 @@ catalog: value: SA-04f.[01] class: sp800-53a prose: 'requirements for protecting security documentation, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.f' + rel: assessment-for - id: sa-4_obj.f-2 name: assessment-objective props: @@ -47816,6 +52482,12 @@ catalog: value: SA-04f.[02] class: sp800-53a prose: 'requirements for protecting privacy documentation, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.f' + rel: assessment-for + links: + - href: '#sa-4_smt.f' + rel: assessment-for - id: sa-4_obj.g name: assessment-objective props: @@ -47823,6 +52495,9 @@ catalog: value: SA-04g. class: sp800-53a prose: 'the description of the system development environment and environment in which the system is intended to operate, requirements, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.g' + rel: assessment-for - id: sa-4_obj.h name: assessment-objective props: @@ -47837,6 +52512,9 @@ catalog: value: SA-04h.[01] class: sp800-53a prose: 'the allocation of responsibility or identification of parties responsible for information security requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.h' + rel: assessment-for - id: sa-4_obj.h-2 name: assessment-objective props: @@ -47844,6 +52522,9 @@ catalog: value: SA-04h.[02] class: sp800-53a prose: 'the allocation of responsibility or identification of parties responsible for privacy requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }};' + links: + - href: '#sa-4_smt.h' + rel: assessment-for - id: sa-4_obj.h-3 name: assessment-objective props: @@ -47851,6 +52532,12 @@ catalog: value: SA-04h.[03] class: sp800-53a prose: 'the allocation of responsibility or identification of parties responsible for supply chain risk management requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }};' + links: + - href: '#sa-4_smt.h' + rel: assessment-for + links: + - href: '#sa-4_smt.h' + rel: assessment-for - id: sa-4_obj.i name: assessment-objective props: @@ -47858,6 +52545,12 @@ catalog: value: SA-04i. class: sp800-53a prose: 'acceptance criteria requirements and descriptions are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service.' + links: + - href: '#sa-4_smt.i' + rel: assessment-for + links: + - href: '#sa-4_smt' + rel: assessment-for - id: sa-4_asm-examine name: assessment-method props: @@ -47960,6 +52653,9 @@ catalog: value: SA-04(01) class: sp800-53a prose: the developer of the system, system component, or system service is required to provide a description of the functional properties of the controls to be implemented. + links: + - href: '#sa-4.1_smt' + rel: assessment-for - id: sa-4.1_asm-examine name: assessment-method props: @@ -48093,6 +52789,9 @@ catalog: value: SA-04(02) class: sp800-53a prose: 'the developer of the system, system component, or system service is required to provide design and implementation information for the controls that includes using {{ insert: param, sa-04.02_odp.01 }} at {{ insert: param, sa-04.02_odp.03 }}.' + links: + - href: '#sa-4.2_smt' + rel: assessment-for - id: sa-4.2_asm-examine name: assessment-method props: @@ -48223,6 +52922,9 @@ catalog: value: SA-04(05)(a) class: sp800-53a prose: 'the developer of the system, system component, or system service is required to deliver the system, component, or service with {{ insert: param, sa-04.05_odp }} implemented;' + links: + - href: '#sa-4.5_smt.a' + rel: assessment-for - id: sa-4.5_obj.b name: assessment-objective props: @@ -48230,6 +52932,12 @@ catalog: value: SA-04(05)(b) class: sp800-53a prose: the configurations are used as the default for any subsequent system, component, or service reinstallation or upgrade. + links: + - href: '#sa-4.5_smt.b' + rel: assessment-for + links: + - href: '#sa-4.5_smt' + rel: assessment-for - id: sa-4.5_asm-examine name: assessment-method props: @@ -48335,6 +53043,9 @@ catalog: value: SA-04(09)[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to identify the functions intended for organizational use; + links: + - href: '#sa-4.9_smt' + rel: assessment-for - id: sa-4.9_obj-2 name: assessment-objective props: @@ -48342,6 +53053,9 @@ catalog: value: SA-04(09)[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to identify the ports intended for organizational use; + links: + - href: '#sa-4.9_smt' + rel: assessment-for - id: sa-4.9_obj-3 name: assessment-objective props: @@ -48349,6 +53063,9 @@ catalog: value: SA-04(09)[03] class: sp800-53a prose: the developer of the system, system component, or system service is required to identify the protocols intended for organizational use; + links: + - href: '#sa-4.9_smt' + rel: assessment-for - id: sa-4.9_obj-4 name: assessment-objective props: @@ -48356,6 +53073,12 @@ catalog: value: SA-04(09)[04] class: sp800-53a prose: the developer of the system, system component, or system service is required to identify the services intended for organizational use. + links: + - href: '#sa-4.9_smt' + rel: assessment-for + links: + - href: '#sa-4.9_smt' + rel: assessment-for - id: sa-4.9_asm-examine name: assessment-method props: @@ -48452,6 +53175,9 @@ catalog: value: SA-04(10) class: sp800-53a prose: only information technology products on the FIPS 201-approved products list for the Personal Identity Verification (PIV) capability implemented within organizational systems are employed. + links: + - href: '#sa-4.10_smt' + rel: assessment-for - id: sa-4.10_asm-examine name: assessment-method props: @@ -48690,6 +53416,9 @@ catalog: value: SA-05a.01[01] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the secure configuration of the system, component, or service is obtained or developed; + links: + - href: '#sa-5_smt.a.1' + rel: assessment-for - id: sa-5_obj.a.1-2 name: assessment-objective props: @@ -48697,6 +53426,9 @@ catalog: value: SA-05a.01[02] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the secure installation of the system, component, or service is obtained or developed; + links: + - href: '#sa-5_smt.a.1' + rel: assessment-for - id: sa-5_obj.a.1-3 name: assessment-objective props: @@ -48704,6 +53436,12 @@ catalog: value: SA-05a.01[03] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the secure operation of the system, component, or service is obtained or developed; + links: + - href: '#sa-5_smt.a.1' + rel: assessment-for + links: + - href: '#sa-5_smt.a.1' + rel: assessment-for - id: sa-5_obj.a.2 name: assessment-objective props: @@ -48718,6 +53456,9 @@ catalog: value: SA-05a.02[01] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the effective use of security functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.a.2' + rel: assessment-for - id: sa-5_obj.a.2-2 name: assessment-objective props: @@ -48725,6 +53466,9 @@ catalog: value: SA-05a.02[02] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the effective maintenance of security functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.a.2' + rel: assessment-for - id: sa-5_obj.a.2-3 name: assessment-objective props: @@ -48732,6 +53476,9 @@ catalog: value: SA-05a.02[03] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the effective use of privacy functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.a.2' + rel: assessment-for - id: sa-5_obj.a.2-4 name: assessment-objective props: @@ -48739,6 +53486,12 @@ catalog: value: SA-05a.02[04] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the effective maintenance of privacy functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.a.2' + rel: assessment-for + links: + - href: '#sa-5_smt.a.2' + rel: assessment-for - id: sa-5_obj.a.3 name: assessment-objective props: @@ -48753,6 +53506,9 @@ catalog: value: SA-05a.03[01] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes known vulnerabilities regarding the configuration of administrative or privileged functions is obtained or developed; + links: + - href: '#sa-5_smt.a.3' + rel: assessment-for - id: sa-5_obj.a.3-2 name: assessment-objective props: @@ -48760,6 +53516,15 @@ catalog: value: SA-05a.03[02] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes known vulnerabilities regarding the use of administrative or privileged functions is obtained or developed; + links: + - href: '#sa-5_smt.a.3' + rel: assessment-for + links: + - href: '#sa-5_smt.a.3' + rel: assessment-for + links: + - href: '#sa-5_smt.a' + rel: assessment-for - id: sa-5_obj.b name: assessment-objective props: @@ -48781,6 +53546,9 @@ catalog: value: SA-05b.01[01] class: sp800-53a prose: user documentation for the system, system component, or system service that describes user-accessible security functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.b.1' + rel: assessment-for - id: sa-5_obj.b.1-2 name: assessment-objective props: @@ -48788,6 +53556,9 @@ catalog: value: SA-05b.01[02] class: sp800-53a prose: user documentation for the system, system component, or system service that describes how to effectively use those (user-accessible security) functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.b.1' + rel: assessment-for - id: sa-5_obj.b.1-3 name: assessment-objective props: @@ -48795,6 +53566,9 @@ catalog: value: SA-05b.01[03] class: sp800-53a prose: user documentation for the system, system component, or system service that describes user-accessible privacy functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.b.1' + rel: assessment-for - id: sa-5_obj.b.1-4 name: assessment-objective props: @@ -48802,6 +53576,12 @@ catalog: value: SA-05b.01[04] class: sp800-53a prose: user documentation for the system, system component, or system service that describes how to effectively use those (user-accessible privacy) functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.b.1' + rel: assessment-for + links: + - href: '#sa-5_smt.b.1' + rel: assessment-for - id: sa-5_obj.b.2 name: assessment-objective props: @@ -48816,6 +53596,9 @@ catalog: value: SA-05b.02[01] class: sp800-53a prose: user documentation for the system, system component, or system service that describes methods for user interaction, which enable individuals to use the system, component, or service in a more secure manner is obtained or developed; + links: + - href: '#sa-5_smt.b.2' + rel: assessment-for - id: sa-5_obj.b.2-2 name: assessment-objective props: @@ -48823,6 +53606,12 @@ catalog: value: SA-05b.02[02] class: sp800-53a prose: user documentation for the system, system component, or system service that describes methods for user interaction, which enable individuals to use the system, component, or service to protect individual privacy is obtained or developed; + links: + - href: '#sa-5_smt.b.2' + rel: assessment-for + links: + - href: '#sa-5_smt.b.2' + rel: assessment-for - id: sa-5_obj.b.3 name: assessment-objective props: @@ -48837,6 +53626,9 @@ catalog: value: SA-05b.03[01] class: sp800-53a prose: user documentation for the system, system component, or system service that describes user responsibilities for maintaining the security of the system, component, or service is obtained or developed; + links: + - href: '#sa-5_smt.b.3' + rel: assessment-for - id: sa-5_obj.b.3-2 name: assessment-objective props: @@ -48844,6 +53636,15 @@ catalog: value: SA-05b.03[02] class: sp800-53a prose: user documentation for the system, system component, or system service that describes user responsibilities for maintaining the privacy of individuals is obtained or developed; + links: + - href: '#sa-5_smt.b.3' + rel: assessment-for + links: + - href: '#sa-5_smt.b.3' + rel: assessment-for + links: + - href: '#sa-5_smt.b' + rel: assessment-for - id: sa-5_obj.c name: assessment-objective props: @@ -48858,6 +53659,9 @@ catalog: value: SA-05c.[01] class: sp800-53a prose: attempts to obtain system, system component, or system service documentation when such documentation is either unavailable or nonexistent is documented; + links: + - href: '#sa-5_smt.c' + rel: assessment-for - id: sa-5_obj.c-2 name: assessment-objective props: @@ -48865,6 +53669,12 @@ catalog: value: SA-05c.[02] class: sp800-53a prose: 'after attempts to obtain system, system component, or system service documentation when such documentation is either unavailable or nonexistent, {{ insert: param, sa-05_odp.01 }} are taken in response;' + links: + - href: '#sa-5_smt.c' + rel: assessment-for + links: + - href: '#sa-5_smt.c' + rel: assessment-for - id: sa-5_obj.d name: assessment-objective props: @@ -48872,6 +53682,12 @@ catalog: value: SA-05d. class: sp800-53a prose: 'documentation is distributed to {{ insert: param, sa-05_odp.02 }}.' + links: + - href: '#sa-5_smt.d' + rel: assessment-for + links: + - href: '#sa-5_smt' + rel: assessment-for - id: sa-5_asm-examine name: assessment-method props: @@ -49068,6 +53884,9 @@ catalog: value: SA-08[01] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.01 }} are applied in the specification of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-2 name: assessment-objective props: @@ -49075,6 +53894,9 @@ catalog: value: SA-08[02] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.01 }} are applied in the design of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-3 name: assessment-objective props: @@ -49082,6 +53904,9 @@ catalog: value: SA-08[03] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.01 }} are applied in the development of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-4 name: assessment-objective props: @@ -49089,6 +53914,9 @@ catalog: value: SA-08[04] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.01 }} are applied in the implementation of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-5 name: assessment-objective props: @@ -49096,6 +53924,9 @@ catalog: value: SA-08[05] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.01 }} are applied in the modification of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-6 name: assessment-objective props: @@ -49103,6 +53934,9 @@ catalog: value: SA-08[06] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.02 }} are applied in the specification of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-7 name: assessment-objective props: @@ -49110,6 +53944,9 @@ catalog: value: SA-08[07] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.02 }} are applied in the design of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-8 name: assessment-objective props: @@ -49117,6 +53954,9 @@ catalog: value: SA-08[08] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.02 }} are applied in the development of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-9 name: assessment-objective props: @@ -49124,6 +53964,9 @@ catalog: value: SA-08[09] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.02 }} are applied in the implementation of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-10 name: assessment-objective props: @@ -49131,6 +53974,12 @@ catalog: value: SA-08[10] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.02 }} are applied in the modification of the system and system components.' + links: + - href: '#sa-8_smt' + rel: assessment-for + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_asm-examine name: assessment-method props: @@ -49317,6 +54166,9 @@ catalog: value: SA-09a.[01] class: sp800-53a prose: providers of external system services comply with organizational security requirements; + links: + - href: '#sa-9_smt.a' + rel: assessment-for - id: sa-9_obj.a-2 name: assessment-objective props: @@ -49324,6 +54176,9 @@ catalog: value: SA-09a.[02] class: sp800-53a prose: providers of external system services comply with organizational privacy requirements; + links: + - href: '#sa-9_smt.a' + rel: assessment-for - id: sa-9_obj.a-3 name: assessment-objective props: @@ -49331,6 +54186,12 @@ catalog: value: SA-09a.[03] class: sp800-53a prose: 'providers of external system services employ {{ insert: param, sa-09_odp.01 }};' + links: + - href: '#sa-9_smt.a' + rel: assessment-for + links: + - href: '#sa-9_smt.a' + rel: assessment-for - id: sa-9_obj.b name: assessment-objective props: @@ -49345,6 +54206,9 @@ catalog: value: SA-09b.[01] class: sp800-53a prose: organizational oversight with regard to external system services are defined and documented; + links: + - href: '#sa-9_smt.b' + rel: assessment-for - id: sa-9_obj.b-2 name: assessment-objective props: @@ -49352,6 +54216,12 @@ catalog: value: SA-09b.[02] class: sp800-53a prose: user roles and responsibilities with regard to external system services are defined and documented; + links: + - href: '#sa-9_smt.b' + rel: assessment-for + links: + - href: '#sa-9_smt.b' + rel: assessment-for - id: sa-9_obj.c name: assessment-objective props: @@ -49359,6 +54229,12 @@ catalog: value: SA-09c. class: sp800-53a prose: ' {{ insert: param, sa-09_odp.02 }} are employed to monitor control compliance by external service providers on an ongoing basis.' + links: + - href: '#sa-9_smt.c' + rel: assessment-for + links: + - href: '#sa-9_smt' + rel: assessment-for - id: sa-9_asm-examine name: assessment-method props: @@ -49482,6 +54358,9 @@ catalog: value: SA-09(02) class: sp800-53a prose: 'providers of {{ insert: param, sa-09.02_odp }} are required to identify the functions, ports, protocols, and other services required for the use of such services.' + links: + - href: '#sa-9.2_smt' + rel: assessment-for - id: sa-9.2_asm-examine name: assessment-method props: @@ -49684,6 +54563,9 @@ catalog: value: SA-10a. class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform configuration management during system, component, or service {{ insert: param, sa-10_odp.01 }};' + links: + - href: '#sa-10_smt.a' + rel: assessment-for - id: sa-10_obj.b name: assessment-objective props: @@ -49698,6 +54580,9 @@ catalog: value: SA-10b.[01] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to document the integrity of changes to {{ insert: param, sa-10_odp.02 }};' + links: + - href: '#sa-10_smt.b' + rel: assessment-for - id: sa-10_obj.b-2 name: assessment-objective props: @@ -49705,6 +54590,9 @@ catalog: value: SA-10b.[02] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to manage the integrity of changes to {{ insert: param, sa-10_odp.02 }};' + links: + - href: '#sa-10_smt.b' + rel: assessment-for - id: sa-10_obj.b-3 name: assessment-objective props: @@ -49712,6 +54600,12 @@ catalog: value: SA-10b.[03] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to control the integrity of changes to {{ insert: param, sa-10_odp.02 }};' + links: + - href: '#sa-10_smt.b' + rel: assessment-for + links: + - href: '#sa-10_smt.b' + rel: assessment-for - id: sa-10_obj.c name: assessment-objective props: @@ -49719,6 +54613,9 @@ catalog: value: SA-10c. class: sp800-53a prose: the developer of the system, system component, or system service is required to implement only organization-approved changes to the system, component, or service; + links: + - href: '#sa-10_smt.c' + rel: assessment-for - id: sa-10_obj.d name: assessment-objective props: @@ -49733,6 +54630,9 @@ catalog: value: SA-10d.[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to document approved changes to the system, component, or service; + links: + - href: '#sa-10_smt.d' + rel: assessment-for - id: sa-10_obj.d-2 name: assessment-objective props: @@ -49740,6 +54640,9 @@ catalog: value: SA-10d.[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to document the potential security impacts of approved changes; + links: + - href: '#sa-10_smt.d' + rel: assessment-for - id: sa-10_obj.d-3 name: assessment-objective props: @@ -49747,6 +54650,12 @@ catalog: value: SA-10d.[03] class: sp800-53a prose: the developer of the system, system component, or system service is required to document the potential privacy impacts of approved changes; + links: + - href: '#sa-10_smt.d' + rel: assessment-for + links: + - href: '#sa-10_smt.d' + rel: assessment-for - id: sa-10_obj.e name: assessment-objective props: @@ -49761,6 +54670,9 @@ catalog: value: SA-10e.[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to track security flaws within the system, component, or service; + links: + - href: '#sa-10_smt.e' + rel: assessment-for - id: sa-10_obj.e-2 name: assessment-objective props: @@ -49768,6 +54680,9 @@ catalog: value: SA-10e.[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to track security flaw resolutions within the system, component, or service; + links: + - href: '#sa-10_smt.e' + rel: assessment-for - id: sa-10_obj.e-3 name: assessment-objective props: @@ -49775,6 +54690,15 @@ catalog: value: SA-10e.[03] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to report findings to {{ insert: param, sa-10_odp.03 }}.' + links: + - href: '#sa-10_smt.e' + rel: assessment-for + links: + - href: '#sa-10_smt.e' + rel: assessment-for + links: + - href: '#sa-10_smt' + rel: assessment-for - id: sa-10_asm-examine name: assessment-method props: @@ -50000,6 +54924,9 @@ catalog: value: SA-11a.[01] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to develop a plan for ongoing security assessments; + links: + - href: '#sa-11_smt.a' + rel: assessment-for - id: sa-11_obj.a-2 name: assessment-objective props: @@ -50007,6 +54934,9 @@ catalog: value: SA-11a.[02] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to implement a plan for ongoing security assessments; + links: + - href: '#sa-11_smt.a' + rel: assessment-for - id: sa-11_obj.a-3 name: assessment-objective props: @@ -50014,6 +54944,9 @@ catalog: value: SA-11a.[03] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to develop a plan for privacy assessments; + links: + - href: '#sa-11_smt.a' + rel: assessment-for - id: sa-11_obj.a-4 name: assessment-objective props: @@ -50021,6 +54954,12 @@ catalog: value: SA-11a.[04] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to implement a plan for ongoing privacy assessments; + links: + - href: '#sa-11_smt.a' + rel: assessment-for + links: + - href: '#sa-11_smt.a' + rel: assessment-for - id: sa-11_obj.b name: assessment-objective props: @@ -50028,6 +54967,9 @@ catalog: value: SA-11b. class: sp800-53a prose: 'the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to perform {{ insert: param, sa-11_odp.01 }} testing/evaluation {{ insert: param, sa-11_odp.02 }} at {{ insert: param, sa-11_odp.03 }};' + links: + - href: '#sa-11_smt.b' + rel: assessment-for - id: sa-11_obj.c name: assessment-objective props: @@ -50042,6 +54984,9 @@ catalog: value: SA-11c.[01] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to produce evidence of the execution of the assessment plan; + links: + - href: '#sa-11_smt.c' + rel: assessment-for - id: sa-11_obj.c-2 name: assessment-objective props: @@ -50049,6 +54994,12 @@ catalog: value: SA-11c.[02] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to produce the results of the testing and evaluation; + links: + - href: '#sa-11_smt.c' + rel: assessment-for + links: + - href: '#sa-11_smt.c' + rel: assessment-for - id: sa-11_obj.d name: assessment-objective props: @@ -50056,6 +55007,9 @@ catalog: value: SA-11d. class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to implement a verifiable flaw remediation process; + links: + - href: '#sa-11_smt.d' + rel: assessment-for - id: sa-11_obj.e name: assessment-objective props: @@ -50063,6 +55017,12 @@ catalog: value: SA-11e. class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to correct flaws identified during testing and evaluation. + links: + - href: '#sa-11_smt.e' + rel: assessment-for + links: + - href: '#sa-11_smt' + rel: assessment-for - id: sa-11_asm-examine name: assessment-method props: @@ -50296,6 +55256,9 @@ catalog: value: SA-15a.01[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to follow a documented development process that explicitly addresses security requirements; + links: + - href: '#sa-15_smt.a.1' + rel: assessment-for - id: sa-15_obj.a.1-2 name: assessment-objective props: @@ -50303,6 +55266,12 @@ catalog: value: SA-15a.01[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to follow a documented development process that explicitly addresses privacy requirements; + links: + - href: '#sa-15_smt.a.1' + rel: assessment-for + links: + - href: '#sa-15_smt.a.1' + rel: assessment-for - id: sa-15_obj.a.2 name: assessment-objective props: @@ -50317,6 +55286,9 @@ catalog: value: SA-15a.02[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to follow a documented development process that identifies the standards used in the development process; + links: + - href: '#sa-15_smt.a.2' + rel: assessment-for - id: sa-15_obj.a.2-2 name: assessment-objective props: @@ -50324,6 +55296,12 @@ catalog: value: SA-15a.02[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to follow a documented development process that identifies the tools used in the development process; + links: + - href: '#sa-15_smt.a.2' + rel: assessment-for + links: + - href: '#sa-15_smt.a.2' + rel: assessment-for - id: sa-15_obj.a.3 name: assessment-objective props: @@ -50338,6 +55316,9 @@ catalog: value: SA-15a.03[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to follow a documented development process that documents the specific tool used in the development process; + links: + - href: '#sa-15_smt.a.3' + rel: assessment-for - id: sa-15_obj.a.3-2 name: assessment-objective props: @@ -50345,6 +55326,12 @@ catalog: value: SA-15a.03[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to follow a documented development process that documents the specific tool configurations used in the development process; + links: + - href: '#sa-15_smt.a.3' + rel: assessment-for + links: + - href: '#sa-15_smt.a.3' + rel: assessment-for - id: sa-15_obj.a.4 name: assessment-objective props: @@ -50352,6 +55339,12 @@ catalog: value: SA-15a.04 class: sp800-53a prose: the developer of the system, system component, or system service is required to follow a documented development process that documents, manages, and ensures the integrity of changes to the process and/or tools used in development; + links: + - href: '#sa-15_smt.a.4' + rel: assessment-for + links: + - href: '#sa-15_smt.a' + rel: assessment-for - id: sa-15_obj.b name: assessment-objective props: @@ -50366,6 +55359,9 @@ catalog: value: SA-15b.[01] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to follow a documented development process in which the development process, standards, tools, tool options, and tool configurations are reviewed {{ insert: param, sa-15_odp.01 }} to determine that the process, standards, tools, tool options, and tool configurations selected and employed satisfy {{ insert: param, sa-15_odp.02 }};' + links: + - href: '#sa-15_smt.b' + rel: assessment-for - id: sa-15_obj.b-2 name: assessment-objective props: @@ -50373,6 +55369,15 @@ catalog: value: SA-15b.[02] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to follow a documented development process in which the development process, standards, tools, tool options, and tool configurations are reviewed {{ insert: param, sa-15_odp.01 }} to determine that the process, standards, tools, tool options, and tool configurations selected and employed satisfy {{ insert: param, sa-15_odp.03 }}.' + links: + - href: '#sa-15_smt.b' + rel: assessment-for + links: + - href: '#sa-15_smt.b' + rel: assessment-for + links: + - href: '#sa-15_smt' + rel: assessment-for - id: sa-15_asm-examine name: assessment-method props: @@ -50539,6 +55544,9 @@ catalog: value: SA-15(03)(a) class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform a criticality analysis at {{ insert: param, sa-15.03_odp.01 }} in the system development life cycle;' + links: + - href: '#sa-15.3_smt.a' + rel: assessment-for - id: sa-15.3_obj.b name: assessment-objective props: @@ -50553,6 +55561,9 @@ catalog: value: SA-15(03)(b)[01] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform a criticality analysis at the following rigor level: {{ insert: param, sa-15.03_odp.02 }};' + links: + - href: '#sa-15.3_smt.b' + rel: assessment-for - id: sa-15.3_obj.b-2 name: assessment-objective props: @@ -50560,6 +55571,15 @@ catalog: value: SA-15(03)(b)[02] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform a criticality analysis at the following rigor level: {{ insert: param, sa-15.03_odp.03 }} .' + links: + - href: '#sa-15.3_smt.b' + rel: assessment-for + links: + - href: '#sa-15.3_smt.b' + rel: assessment-for + links: + - href: '#sa-15.3_smt' + rel: assessment-for - id: sa-15.3_asm-examine name: assessment-method props: @@ -50686,6 +55706,9 @@ catalog: value: SA-16 class: sp800-53a prose: 'the developer of the system, system component, or system service is required to provide {{ insert: param, sa-16_odp }} on the correct use and operation of the implemented security and privacy functions, controls, and/or mechanisms.' + links: + - href: '#sa-16_smt' + rel: assessment-for - id: sa-16_asm-examine name: assessment-method props: @@ -50831,6 +55854,9 @@ catalog: value: SA-17(a)[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to produce a design specification and security architecture that are consistent with the organization’s security architecture, which is an integral part the organization’s enterprise architecture; + links: + - href: '#sa-17_smt.a' + rel: assessment-for - id: sa-17_obj.a-2 name: assessment-objective props: @@ -50838,6 +55864,12 @@ catalog: value: SA-17(a)[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to produce a design specification and privacy architecture that are consistent with the organization’s privacy architecture, which is an integral part the organization’s enterprise architecture; + links: + - href: '#sa-17_smt.a' + rel: assessment-for + links: + - href: '#sa-17_smt.a' + rel: assessment-for - id: sa-17_obj.b name: assessment-objective props: @@ -50852,6 +55884,9 @@ catalog: value: SA-17(b)[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to produce a design specification and security architecture that accurately and completely describe the required security functionality and the allocation of controls among physical and logical components; + links: + - href: '#sa-17_smt.b' + rel: assessment-for - id: sa-17_obj.b-2 name: assessment-objective props: @@ -50859,6 +55894,12 @@ catalog: value: SA-17(b)[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to produce a design specification and privacy architecture that accurately and completely describe the required privacy functionality and the allocation of controls among physical and logical components; + links: + - href: '#sa-17_smt.b' + rel: assessment-for + links: + - href: '#sa-17_smt.b' + rel: assessment-for - id: sa-17_obj.c name: assessment-objective props: @@ -50873,6 +55914,9 @@ catalog: value: SA-17(c)[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to produce a design specification and security architecture that express how individual security functions, mechanisms, and services work together to provide required security capabilities and a unified approach to protection; + links: + - href: '#sa-17_smt.c' + rel: assessment-for - id: sa-17_obj.c-2 name: assessment-objective props: @@ -50880,6 +55924,15 @@ catalog: value: SA-17(c)[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to produce a design specification and privacy architecture that express how individual privacy functions, mechanisms, and services work together to provide required privacy capabilities and a unified approach to protection. + links: + - href: '#sa-17_smt.c' + rel: assessment-for + links: + - href: '#sa-17_smt.c' + rel: assessment-for + links: + - href: '#sa-17_smt' + rel: assessment-for - id: sa-17_asm-examine name: assessment-method props: @@ -51034,6 +56087,9 @@ catalog: value: SA-21a. class: sp800-53a prose: 'the developer of {{ insert: param, sa-21_odp.01 }} is required to have appropriate access authorizations as determined by assigned {{ insert: param, sa-21_odp.02 }};' + links: + - href: '#sa-21_smt.a' + rel: assessment-for - id: sa-21_obj.b name: assessment-objective props: @@ -51041,6 +56097,12 @@ catalog: value: SA-21b. class: sp800-53a prose: 'the developer of {{ insert: param, sa-21_odp.01 }} is required to satisfy {{ insert: param, sa-21_odp.03 }}.' + links: + - href: '#sa-21_smt.b' + rel: assessment-for + links: + - href: '#sa-21_smt' + rel: assessment-for - id: sa-21_asm-examine name: assessment-method props: @@ -51191,6 +56253,9 @@ catalog: value: SA-22a. class: sp800-53a prose: system components are replaced when support for the components is no longer available from the developer, vendor, or manufacturer; + links: + - href: '#sa-22_smt.a' + rel: assessment-for - id: sa-22_obj.b name: assessment-objective props: @@ -51198,6 +56263,12 @@ catalog: value: SA-22b. class: sp800-53a prose: ' {{ insert: param, sa-22_odp.01 }} provide options for alternative sources for continued support for unsupported components.' + links: + - href: '#sa-22_smt.b' + rel: assessment-for + links: + - href: '#sa-22_smt' + rel: assessment-for - id: sa-22_asm-examine name: assessment-method props: @@ -51467,6 +56538,9 @@ catalog: value: SC-01a.[01] class: sp800-53a prose: a system and communications protection policy is developed and documented; + links: + - href: '#sc-1_smt.a' + rel: assessment-for - id: sc-1_obj.a-2 name: assessment-objective props: @@ -51474,6 +56548,9 @@ catalog: value: SC-01a.[02] class: sp800-53a prose: 'the system and communications protection policy is disseminated to {{ insert: param, sc-01_odp.01 }};' + links: + - href: '#sc-1_smt.a' + rel: assessment-for - id: sc-1_obj.a-3 name: assessment-objective props: @@ -51481,6 +56558,9 @@ catalog: value: SC-01a.[03] class: sp800-53a prose: system and communications protection procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls are developed and documented; + links: + - href: '#sc-1_smt.a' + rel: assessment-for - id: sc-1_obj.a-4 name: assessment-objective props: @@ -51488,6 +56568,9 @@ catalog: value: SC-01a.[04] class: sp800-53a prose: 'the system and communications protection procedures are disseminated to {{ insert: param, sc-01_odp.02 }};' + links: + - href: '#sc-1_smt.a' + rel: assessment-for - id: sc-1_obj.a.1 name: assessment-objective props: @@ -51509,6 +56592,9 @@ catalog: value: SC-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses purpose;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-2 name: assessment-objective props: @@ -51516,6 +56602,9 @@ catalog: value: SC-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses scope;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-3 name: assessment-objective props: @@ -51523,6 +56612,9 @@ catalog: value: SC-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses roles;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-4 name: assessment-objective props: @@ -51530,6 +56622,9 @@ catalog: value: SC-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses responsibilities;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-5 name: assessment-objective props: @@ -51537,6 +56632,9 @@ catalog: value: SC-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses management commitment;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-6 name: assessment-objective props: @@ -51544,6 +56642,9 @@ catalog: value: SC-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses coordination among organizational entities;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-7 name: assessment-objective props: @@ -51551,6 +56652,12 @@ catalog: value: SC-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses compliance;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.b name: assessment-objective props: @@ -51558,6 +56665,15 @@ catalog: value: SC-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#sc-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#sc-1_smt.a.1' + rel: assessment-for + links: + - href: '#sc-1_smt.a' + rel: assessment-for - id: sc-1_obj.b name: assessment-objective props: @@ -51565,6 +56681,9 @@ catalog: value: SC-01b. class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the system and communications protection policy and procedures;' + links: + - href: '#sc-1_smt.b' + rel: assessment-for - id: sc-1_obj.c name: assessment-objective props: @@ -51586,6 +56705,9 @@ catalog: value: SC-01c.01[01] class: sp800-53a prose: 'the current system and communications protection policy is reviewed and updated {{ insert: param, sc-01_odp.05 }};' + links: + - href: '#sc-1_smt.c.1' + rel: assessment-for - id: sc-1_obj.c.1-2 name: assessment-objective props: @@ -51593,6 +56715,12 @@ catalog: value: SC-01c.01[02] class: sp800-53a prose: 'the current system and communications protection policy is reviewed and updated following {{ insert: param, sc-01_odp.06 }};' + links: + - href: '#sc-1_smt.c.1' + rel: assessment-for + links: + - href: '#sc-1_smt.c.1' + rel: assessment-for - id: sc-1_obj.c.2 name: assessment-objective props: @@ -51607,6 +56735,9 @@ catalog: value: SC-01c.02[01] class: sp800-53a prose: 'the current system and communications protection procedures are reviewed and updated {{ insert: param, sc-01_odp.07 }};' + links: + - href: '#sc-1_smt.c.2' + rel: assessment-for - id: sc-1_obj.c.2-2 name: assessment-objective props: @@ -51614,6 +56745,18 @@ catalog: value: SC-01c.02[02] class: sp800-53a prose: 'the current system and communications protection procedures are reviewed and updated following {{ insert: param, sc-01_odp.08 }}.' + links: + - href: '#sc-1_smt.c.2' + rel: assessment-for + links: + - href: '#sc-1_smt.c.2' + rel: assessment-for + links: + - href: '#sc-1_smt.c' + rel: assessment-for + links: + - href: '#sc-1_smt' + rel: assessment-for - id: sc-1_asm-examine name: assessment-method props: @@ -51702,6 +56845,9 @@ catalog: value: SC-02 class: sp800-53a prose: user functionality, including user interface services, is separated from system management functionality. + links: + - href: '#sc-2_smt' + rel: assessment-for - id: sc-2_asm-examine name: assessment-method props: @@ -51818,6 +56964,9 @@ catalog: value: SC-03 class: sp800-53a prose: security functions are isolated from non-security functions. + links: + - href: '#sc-3_smt' + rel: assessment-for - id: sc-3_asm-examine name: assessment-method props: @@ -51916,6 +57065,9 @@ catalog: value: SC-04[01] class: sp800-53a prose: unauthorized information transfer via shared system resources is prevented; + links: + - href: '#sc-4_smt' + rel: assessment-for - id: sc-4_obj-2 name: assessment-objective props: @@ -51923,6 +57075,12 @@ catalog: value: SC-04[02] class: sp800-53a prose: unintended information transfer via shared system resources is prevented. + links: + - href: '#sc-4_smt' + rel: assessment-for + links: + - href: '#sc-4_smt' + rel: assessment-for - id: sc-4_asm-examine name: assessment-method props: @@ -52069,6 +57227,9 @@ catalog: value: SC-05a. class: sp800-53a prose: 'the effects of {{ insert: param, sc-05_odp.01 }} are {{ insert: param, sc-05_odp.02 }};' + links: + - href: '#sc-5_smt.a' + rel: assessment-for - id: sc-5_obj.b name: assessment-objective props: @@ -52076,6 +57237,12 @@ catalog: value: SC-05b. class: sp800-53a prose: ' {{ insert: param, sc-05_odp.03 }} are employed to achieve the denial-of-service protection objective.' + links: + - href: '#sc-5_smt.b' + rel: assessment-for + links: + - href: '#sc-5_smt' + rel: assessment-for - id: sc-5_asm-examine name: assessment-method props: @@ -52271,6 +57438,9 @@ catalog: value: SC-07a.[01] class: sp800-53a prose: communications at external managed interfaces to the system are monitored; + links: + - href: '#sc-7_smt.a' + rel: assessment-for - id: sc-7_obj.a-2 name: assessment-objective props: @@ -52278,6 +57448,9 @@ catalog: value: SC-07a.[02] class: sp800-53a prose: communications at external managed interfaces to the system are controlled; + links: + - href: '#sc-7_smt.a' + rel: assessment-for - id: sc-7_obj.a-3 name: assessment-objective props: @@ -52285,6 +57458,9 @@ catalog: value: SC-07a.[03] class: sp800-53a prose: communications at key internal managed interfaces within the system are monitored; + links: + - href: '#sc-7_smt.a' + rel: assessment-for - id: sc-7_obj.a-4 name: assessment-objective props: @@ -52292,6 +57468,12 @@ catalog: value: SC-07a.[04] class: sp800-53a prose: communications at key internal managed interfaces within the system are controlled; + links: + - href: '#sc-7_smt.a' + rel: assessment-for + links: + - href: '#sc-7_smt.a' + rel: assessment-for - id: sc-7_obj.b name: assessment-objective props: @@ -52299,6 +57481,9 @@ catalog: value: SC-07b. class: sp800-53a prose: 'subnetworks for publicly accessible system components are {{ insert: param, sc-07_odp }} separated from internal organizational networks;' + links: + - href: '#sc-7_smt.b' + rel: assessment-for - id: sc-7_obj.c name: assessment-objective props: @@ -52306,6 +57491,12 @@ catalog: value: SC-07c. class: sp800-53a prose: external networks or systems are only connected to through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security and privacy architecture. + links: + - href: '#sc-7_smt.c' + rel: assessment-for + links: + - href: '#sc-7_smt' + rel: assessment-for - id: sc-7_asm-examine name: assessment-method props: @@ -52400,6 +57591,9 @@ catalog: value: SC-07(03) class: sp800-53a prose: the number of external network connections to the system is limited. + links: + - href: '#sc-7.3_smt' + rel: assessment-for - id: sc-7.3_asm-examine name: assessment-method props: @@ -52570,6 +57764,9 @@ catalog: value: SC-07(04)(a) class: sp800-53a prose: a managed interface is implemented for each external telecommunication service; + links: + - href: '#sc-7.4_smt.a' + rel: assessment-for - id: sc-7.4_obj.b name: assessment-objective props: @@ -52577,6 +57774,9 @@ catalog: value: SC-07(04)(b) class: sp800-53a prose: a traffic flow policy is established for each managed interface; + links: + - href: '#sc-7.4_smt.b' + rel: assessment-for - id: sc-7.4_obj.c name: assessment-objective props: @@ -52591,6 +57791,9 @@ catalog: value: SC-07(04)(c)[01] class: sp800-53a prose: the confidentiality of the information being transmitted across each interface is protected; + links: + - href: '#sc-7.4_smt.c' + rel: assessment-for - id: sc-7.4_obj.c-2 name: assessment-objective props: @@ -52598,6 +57801,12 @@ catalog: value: SC-07(04)(c)[02] class: sp800-53a prose: the integrity of the information being transmitted across each interface is protected; + links: + - href: '#sc-7.4_smt.c' + rel: assessment-for + links: + - href: '#sc-7.4_smt.c' + rel: assessment-for - id: sc-7.4_obj.d name: assessment-objective props: @@ -52605,6 +57814,9 @@ catalog: value: SC-07(04)(d) class: sp800-53a prose: each exception to the traffic flow policy is documented with a supporting mission or business need and duration of that need; + links: + - href: '#sc-7.4_smt.d' + rel: assessment-for - id: sc-7.4_obj.e name: assessment-objective props: @@ -52619,6 +57831,9 @@ catalog: value: SC-07(04)(e)[01] class: sp800-53a prose: 'exceptions to the traffic flow policy are reviewed {{ insert: param, sc-07.04_odp }};' + links: + - href: '#sc-7.4_smt.e' + rel: assessment-for - id: sc-7.4_obj.e-2 name: assessment-objective props: @@ -52626,6 +57841,12 @@ catalog: value: SC-07(04)(e)[02] class: sp800-53a prose: exceptions to the traffic flow policy that are no longer supported by an explicit mission or business need are removed; + links: + - href: '#sc-7.4_smt.e' + rel: assessment-for + links: + - href: '#sc-7.4_smt.e' + rel: assessment-for - id: sc-7.4_obj.f name: assessment-objective props: @@ -52633,6 +57854,9 @@ catalog: value: SC-07(04)(f) class: sp800-53a prose: unauthorized exchanges of control plan traffic with external networks are prevented; + links: + - href: '#sc-7.4_smt.f' + rel: assessment-for - id: sc-7.4_obj.g name: assessment-objective props: @@ -52640,6 +57864,9 @@ catalog: value: SC-07(04)(g) class: sp800-53a prose: information is published to enable remote networks to detect unauthorized control plane traffic from internal networks; + links: + - href: '#sc-7.4_smt.g' + rel: assessment-for - id: sc-7.4_obj.h name: assessment-objective props: @@ -52647,6 +57874,12 @@ catalog: value: SC-07(04)(h) class: sp800-53a prose: unauthorized control plane traffic is filtered from external networks. + links: + - href: '#sc-7.4_smt.h' + rel: assessment-for + links: + - href: '#sc-7.4_smt' + rel: assessment-for - id: sc-7.4_asm-examine name: assessment-method props: @@ -52781,6 +58014,9 @@ catalog: value: SC-07(05)[01] class: sp800-53a prose: 'network communications traffic is denied by default {{ insert: param, sc-07.05_odp.01 }};' + links: + - href: '#sc-7.5_smt' + rel: assessment-for - id: sc-7.5_obj-2 name: assessment-objective props: @@ -52788,6 +58024,12 @@ catalog: value: SC-07(05)[02] class: sp800-53a prose: 'network communications traffic is allowed by exception {{ insert: param, sc-07.05_odp.01 }}.' + links: + - href: '#sc-7.5_smt' + rel: assessment-for + links: + - href: '#sc-7.5_smt' + rel: assessment-for - id: sc-7.5_asm-examine name: assessment-method props: @@ -52886,6 +58128,9 @@ catalog: value: SC-07(07) class: sp800-53a prose: 'split tunneling is prevented for remote devices connecting to organizational systems unless the split tunnel is securely provisioned using {{ insert: param, sc-07.07_odp }}.' + links: + - href: '#sc-7.7_smt' + rel: assessment-for - id: sc-7.7_asm-examine name: assessment-method props: @@ -53003,6 +58248,9 @@ catalog: value: SC-07(08) class: sp800-53a prose: ' {{ insert: param, sc-07.08_odp.01 }} is routed to {{ insert: param, sc-07.08_odp.02 }} through authenticated proxy servers at managed interfaces.' + links: + - href: '#sc-7.8_smt' + rel: assessment-for - id: sc-7.8_asm-examine name: assessment-method props: @@ -53103,6 +58351,9 @@ catalog: value: SC-07(18) class: sp800-53a prose: systems are prevented from entering unsecure states in the event of an operational failure of a boundary protection device. + links: + - href: '#sc-7.18_smt' + rel: assessment-for - id: sc-7.18_asm-examine name: assessment-method props: @@ -53221,6 +58472,9 @@ catalog: value: SC-07(21) class: sp800-53a prose: 'boundary protection mechanisms are employed to isolate {{ insert: param, sc-07.21_odp.01 }} supporting {{ insert: param, sc-07.21_odp.02 }}.' + links: + - href: '#sc-7.21_smt' + rel: assessment-for - id: sc-7.21_asm-examine name: assessment-method props: @@ -53372,6 +58626,9 @@ catalog: value: SC-08 class: sp800-53a prose: 'the {{ insert: param, sc-08_odp }} of transmitted information is/are protected.' + links: + - href: '#sc-8_smt' + rel: assessment-for - id: sc-8_asm-examine name: assessment-method props: @@ -53475,6 +58732,9 @@ catalog: value: SC-08(01) class: sp800-53a prose: 'cryptographic mechanisms are implemented to {{ insert: param, sc-08.01_odp }} during transmission.' + links: + - href: '#sc-8.1_smt' + rel: assessment-for - id: sc-8.1_asm-examine name: assessment-method props: @@ -53578,6 +58838,9 @@ catalog: value: SC-10 class: sp800-53a prose: 'the network connection associated with a communication session is terminated at the end of the session or after {{ insert: param, sc-10_odp }} of inactivity.' + links: + - href: '#sc-10_smt' + rel: assessment-for - id: sc-10_asm-examine name: assessment-method props: @@ -53698,6 +58961,8 @@ catalog: rel: related - href: '#ia-7' rel: related + - href: '#ia-13' + rel: related - href: '#sa-4' rel: related - href: '#sa-8' @@ -53745,6 +59010,9 @@ catalog: value: SC-12[01] class: sp800-53a prose: 'cryptographic keys are established when cryptography is employed within the system in accordance with {{ insert: param, sc-12_odp }};' + links: + - href: '#sc-12_smt' + rel: assessment-for - id: sc-12_obj-2 name: assessment-objective props: @@ -53752,6 +59020,12 @@ catalog: value: SC-12[02] class: sp800-53a prose: 'cryptographic keys are managed when cryptography is employed within the system in accordance with {{ insert: param, sc-12_odp }}.' + links: + - href: '#sc-12_smt' + rel: assessment-for + links: + - href: '#sc-12_smt' + rel: assessment-for - id: sc-12_asm-examine name: assessment-method props: @@ -53843,6 +59117,9 @@ catalog: value: SC-12(01) class: sp800-53a prose: information availability is maintained in the event of the loss of cryptographic keys by users. + links: + - href: '#sc-12.1_smt' + rel: assessment-for - id: sc-12.1_asm-examine name: assessment-method props: @@ -53964,6 +59241,8 @@ catalog: rel: related - href: '#ia-7' rel: related + - href: '#ia-13' + rel: related - href: '#ma-4' rel: related - href: '#mp-2' @@ -54027,6 +59306,9 @@ catalog: value: SC-13a. class: sp800-53a prose: ' {{ insert: param, sc-13_odp.01 }} are identified;' + links: + - href: '#sc-13_smt.a' + rel: assessment-for - id: sc-13_obj.b name: assessment-objective props: @@ -54034,6 +59316,12 @@ catalog: value: SC-13b. class: sp800-53a prose: ' {{ insert: param, sc-13_odp.02 }} for each specified cryptographic use (defined in SC-13_ODP[01]) are implemented.' + links: + - href: '#sc-13_smt.b' + rel: assessment-for + links: + - href: '#sc-13_smt' + rel: assessment-for - id: sc-13_asm-examine name: assessment-method props: @@ -54157,6 +59445,9 @@ catalog: value: SC-15a. class: sp800-53a prose: 'remote activation of collaborative computing devices and applications is prohibited except {{ insert: param, sc-15_odp }};' + links: + - href: '#sc-15_smt.a' + rel: assessment-for - id: sc-15_obj.b name: assessment-objective props: @@ -54164,6 +59455,12 @@ catalog: value: SC-15b. class: sp800-53a prose: an explicit indication of use is provided to users physically present at the devices. + links: + - href: '#sc-15_smt.b' + rel: assessment-for + links: + - href: '#sc-15_smt' + rel: assessment-for - id: sc-15_asm-examine name: assessment-method props: @@ -54303,6 +59600,9 @@ catalog: value: SC-17a. class: sp800-53a prose: 'public key certificates are issued under {{ insert: param, sc-17_odp }} , or public key certificates are obtained from an approved service provider;' + links: + - href: '#sc-17_smt.a' + rel: assessment-for - id: sc-17_obj.b name: assessment-objective props: @@ -54310,6 +59610,12 @@ catalog: value: SC-17b. class: sp800-53a prose: only approved trust anchors are included in trust stores or certificate stores managed by the organization. + links: + - href: '#sc-17_smt.b' + rel: assessment-for + links: + - href: '#sc-17_smt' + rel: assessment-for - id: sc-17_asm-examine name: assessment-method props: @@ -54431,6 +59737,9 @@ catalog: value: SC-18a.[01] class: sp800-53a prose: acceptable mobile code is defined; + links: + - href: '#sc-18_smt.a' + rel: assessment-for - id: sc-18_obj.a-2 name: assessment-objective props: @@ -54438,6 +59747,9 @@ catalog: value: SC-18a.[02] class: sp800-53a prose: unacceptable mobile code is defined; + links: + - href: '#sc-18_smt.a' + rel: assessment-for - id: sc-18_obj.a-3 name: assessment-objective props: @@ -54445,6 +59757,9 @@ catalog: value: SC-18a.[03] class: sp800-53a prose: acceptable mobile code technologies are defined; + links: + - href: '#sc-18_smt.a' + rel: assessment-for - id: sc-18_obj.a-4 name: assessment-objective props: @@ -54452,6 +59767,12 @@ catalog: value: SC-18a.[04] class: sp800-53a prose: unacceptable mobile code technologies are defined; + links: + - href: '#sc-18_smt.a' + rel: assessment-for + links: + - href: '#sc-18_smt.a' + rel: assessment-for - id: sc-18_obj.b name: assessment-objective props: @@ -54466,6 +59787,9 @@ catalog: value: SC-18b.[01] class: sp800-53a prose: the use of mobile code is authorized within the system; + links: + - href: '#sc-18_smt.b' + rel: assessment-for - id: sc-18_obj.b-2 name: assessment-objective props: @@ -54473,6 +59797,9 @@ catalog: value: SC-18b.[02] class: sp800-53a prose: the use of mobile code is monitored within the system; + links: + - href: '#sc-18_smt.b' + rel: assessment-for - id: sc-18_obj.b-3 name: assessment-objective props: @@ -54480,6 +59807,15 @@ catalog: value: SC-18b.[03] class: sp800-53a prose: the use of mobile code is controlled within the system. + links: + - href: '#sc-18_smt.b' + rel: assessment-for + links: + - href: '#sc-18_smt.b' + rel: assessment-for + links: + - href: '#sc-18_smt' + rel: assessment-for - id: sc-18_asm-examine name: assessment-method props: @@ -54618,6 +59954,9 @@ catalog: value: SC-20a.[01] class: sp800-53a prose: additional data origin authentication is provided along with the authoritative name resolution data that the system returns in response to external name/address resolution queries; + links: + - href: '#sc-20_smt.a' + rel: assessment-for - id: sc-20_obj.a-2 name: assessment-objective props: @@ -54625,6 +59964,12 @@ catalog: value: SC-20a.[02] class: sp800-53a prose: integrity verification artifacts are provided along with the authoritative name resolution data that the system returns in response to external name/address resolution queries; + links: + - href: '#sc-20_smt.a' + rel: assessment-for + links: + - href: '#sc-20_smt.a' + rel: assessment-for - id: sc-20_obj.b name: assessment-objective props: @@ -54639,6 +59984,9 @@ catalog: value: SC-20b.[01] class: sp800-53a prose: the means to indicate the security status of child zones (and if the child supports secure resolution services) is provided when operating as part of a distributed, hierarchical namespace; + links: + - href: '#sc-20_smt.b' + rel: assessment-for - id: sc-20_obj.b-2 name: assessment-objective props: @@ -54646,6 +59994,15 @@ catalog: value: SC-20b.[02] class: sp800-53a prose: the means to enable verification of a chain of trust among parent and child domains when operating as part of a distributed, hierarchical namespace is provided. + links: + - href: '#sc-20_smt.b' + rel: assessment-for + links: + - href: '#sc-20_smt.b' + rel: assessment-for + links: + - href: '#sc-20_smt' + rel: assessment-for - id: sc-20_asm-examine name: assessment-method props: @@ -54740,6 +60097,9 @@ catalog: value: SC-21[01] class: sp800-53a prose: data origin authentication is requested for the name/address resolution responses that the system receives from authoritative sources; + links: + - href: '#sc-21_smt' + rel: assessment-for - id: sc-21_obj-2 name: assessment-objective props: @@ -54747,6 +60107,9 @@ catalog: value: SC-21[02] class: sp800-53a prose: data origin authentication is performed on the name/address resolution responses that the system receives from authoritative sources; + links: + - href: '#sc-21_smt' + rel: assessment-for - id: sc-21_obj-3 name: assessment-objective props: @@ -54754,6 +60117,9 @@ catalog: value: SC-21[03] class: sp800-53a prose: data integrity verification is requested for the name/address resolution responses that the system receives from authoritative sources; + links: + - href: '#sc-21_smt' + rel: assessment-for - id: sc-21_obj-4 name: assessment-objective props: @@ -54761,6 +60127,12 @@ catalog: value: SC-21[04] class: sp800-53a prose: data integrity verification is performed on the name/address resolution responses that the system receives from authoritative sources. + links: + - href: '#sc-21_smt' + rel: assessment-for + links: + - href: '#sc-21_smt' + rel: assessment-for - id: sc-21_asm-examine name: assessment-method props: @@ -54861,6 +60233,9 @@ catalog: value: SC-22[01] class: sp800-53a prose: the systems that collectively provide name/address resolution services for an organization are fault-tolerant; + links: + - href: '#sc-22_smt' + rel: assessment-for - id: sc-22_obj-2 name: assessment-objective props: @@ -54868,6 +60243,9 @@ catalog: value: SC-22[02] class: sp800-53a prose: the systems that collectively provide name/address resolution services for an organization implement internal role separation; + links: + - href: '#sc-22_smt' + rel: assessment-for - id: sc-22_obj-3 name: assessment-objective props: @@ -54875,6 +60253,12 @@ catalog: value: SC-22[03] class: sp800-53a prose: the systems that collectively provide name/address resolution services for an organization implement external role separation. + links: + - href: '#sc-22_smt' + rel: assessment-for + links: + - href: '#sc-22_smt' + rel: assessment-for - id: sc-22_asm-examine name: assessment-method props: @@ -54978,6 +60362,9 @@ catalog: value: SC-23 class: sp800-53a prose: the authenticity of communication sessions is protected. + links: + - href: '#sc-23_smt' + rel: assessment-for - id: sc-23_asm-examine name: assessment-method props: @@ -55112,6 +60499,9 @@ catalog: value: SC-24 class: sp800-53a prose: ' {{ insert: param, sc-24_odp.01 }} fail to a {{ insert: param, sc-24_odp.02 }} while preserving {{ insert: param, sc-24_odp.03 }} in failure.' + links: + - href: '#sc-24_smt' + rel: assessment-for - id: sc-24_asm-examine name: assessment-method props: @@ -55281,6 +60671,9 @@ catalog: value: SC-28 class: sp800-53a prose: 'the {{ insert: param, sc-28_odp.01 }} of {{ insert: param, sc-28_odp.02 }} is/are protected.' + links: + - href: '#sc-28_smt' + rel: assessment-for - id: sc-28_asm-examine name: assessment-method props: @@ -55403,6 +60796,9 @@ catalog: value: SC-28(01)[01] class: sp800-53a prose: 'cryptographic mechanisms are implemented to prevent unauthorized disclosure of {{ insert: param, sc-28.01_odp.01 }} at rest on {{ insert: param, sc-28.01_odp.02 }};' + links: + - href: '#sc-28.1_smt' + rel: assessment-for - id: sc-28.1_obj-2 name: assessment-objective props: @@ -55410,6 +60806,12 @@ catalog: value: SC-28(01)[02] class: sp800-53a prose: 'cryptographic mechanisms are implemented to prevent unauthorized modification of {{ insert: param, sc-28.01_odp.01 }} at rest on {{ insert: param, sc-28.01_odp.02 }}.' + links: + - href: '#sc-28.1_smt' + rel: assessment-for + links: + - href: '#sc-28.1_smt' + rel: assessment-for - id: sc-28.1_asm-examine name: assessment-method props: @@ -55516,6 +60918,9 @@ catalog: value: SC-39 class: sp800-53a prose: a separate execution domain is maintained for each executing system process. + links: + - href: '#sc-39_smt' + rel: assessment-for - id: sc-39_asm-examine name: assessment-method props: @@ -55774,6 +61179,9 @@ catalog: value: SI-01a.[01] class: sp800-53a prose: a system and information integrity policy is developed and documented; + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.a-2 name: assessment-objective props: @@ -55781,6 +61189,9 @@ catalog: value: SI-01a.[02] class: sp800-53a prose: 'the system and information integrity policy is disseminated to {{ insert: param, si-01_odp.01 }};' + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.a-3 name: assessment-objective props: @@ -55788,6 +61199,9 @@ catalog: value: SI-01a.[03] class: sp800-53a prose: system and information integrity procedures to facilitate the implementation of the system and information integrity policy and associated system and information integrity controls are developed and documented; + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.a-4 name: assessment-objective props: @@ -55795,6 +61209,9 @@ catalog: value: SI-01a.[04] class: sp800-53a prose: 'the system and information integrity procedures are disseminated to {{ insert: param, si-01_odp.02 }};' + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.a.1 name: assessment-objective props: @@ -55816,6 +61233,9 @@ catalog: value: SI-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses purpose;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-2 name: assessment-objective props: @@ -55823,6 +61243,9 @@ catalog: value: SI-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses scope;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-3 name: assessment-objective props: @@ -55830,6 +61253,9 @@ catalog: value: SI-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses roles;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-4 name: assessment-objective props: @@ -55837,6 +61263,9 @@ catalog: value: SI-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses responsibilities;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-5 name: assessment-objective props: @@ -55844,6 +61273,9 @@ catalog: value: SI-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses management commitment;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-6 name: assessment-objective props: @@ -55851,6 +61283,9 @@ catalog: value: SI-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses coordination among organizational entities;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-7 name: assessment-objective props: @@ -55858,6 +61293,12 @@ catalog: value: SI-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses compliance;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.b name: assessment-objective props: @@ -55865,6 +61306,15 @@ catalog: value: SI-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#si-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#si-1_smt.a.1' + rel: assessment-for + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.b name: assessment-objective props: @@ -55872,6 +61322,9 @@ catalog: value: SI-01b. class: sp800-53a prose: 'the {{ insert: param, si-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the system and information integrity policy and procedures;' + links: + - href: '#si-1_smt.b' + rel: assessment-for - id: si-1_obj.c name: assessment-objective props: @@ -55893,6 +61346,9 @@ catalog: value: SI-01c.01[01] class: sp800-53a prose: 'the current system and information integrity policy is reviewed and updated {{ insert: param, si-01_odp.05 }};' + links: + - href: '#si-1_smt.c.1' + rel: assessment-for - id: si-1_obj.c.1-2 name: assessment-objective props: @@ -55900,6 +61356,12 @@ catalog: value: SI-01c.01[02] class: sp800-53a prose: 'the current system and information integrity policy is reviewed and updated following {{ insert: param, si-01_odp.06 }};' + links: + - href: '#si-1_smt.c.1' + rel: assessment-for + links: + - href: '#si-1_smt.c.1' + rel: assessment-for - id: si-1_obj.c.2 name: assessment-objective props: @@ -55914,6 +61376,9 @@ catalog: value: SI-01c.02[01] class: sp800-53a prose: 'the current system and information integrity procedures are reviewed and updated {{ insert: param, si-01_odp.07 }};' + links: + - href: '#si-1_smt.c.2' + rel: assessment-for - id: si-1_obj.c.2-2 name: assessment-objective props: @@ -55921,6 +61386,18 @@ catalog: value: SI-01c.02[02] class: sp800-53a prose: 'the current system and information integrity procedures are reviewed and updated following {{ insert: param, si-01_odp.08 }}.' + links: + - href: '#si-1_smt.c.2' + rel: assessment-for + links: + - href: '#si-1_smt.c.2' + rel: assessment-for + links: + - href: '#si-1_smt.c' + rel: assessment-for + links: + - href: '#si-1_smt' + rel: assessment-for - id: si-1_asm-examine name: assessment-method props: @@ -56082,6 +61559,9 @@ catalog: value: SI-02a.[01] class: sp800-53a prose: system flaws are identified; + links: + - href: '#si-2_smt.a' + rel: assessment-for - id: si-2_obj.a-2 name: assessment-objective props: @@ -56089,6 +61569,9 @@ catalog: value: SI-02a.[02] class: sp800-53a prose: system flaws are reported; + links: + - href: '#si-2_smt.a' + rel: assessment-for - id: si-2_obj.a-3 name: assessment-objective props: @@ -56096,6 +61579,12 @@ catalog: value: SI-02a.[03] class: sp800-53a prose: system flaws are corrected; + links: + - href: '#si-2_smt.a' + rel: assessment-for + links: + - href: '#si-2_smt.a' + rel: assessment-for - id: si-2_obj.b name: assessment-objective props: @@ -56110,6 +61599,9 @@ catalog: value: SI-02b.[01] class: sp800-53a prose: software updates related to flaw remediation are tested for effectiveness before installation; + links: + - href: '#si-2_smt.b' + rel: assessment-for - id: si-2_obj.b-2 name: assessment-objective props: @@ -56117,6 +61609,9 @@ catalog: value: SI-02b.[02] class: sp800-53a prose: software updates related to flaw remediation are tested for potential side effects before installation; + links: + - href: '#si-2_smt.b' + rel: assessment-for - id: si-2_obj.b-3 name: assessment-objective props: @@ -56124,6 +61619,9 @@ catalog: value: SI-02b.[03] class: sp800-53a prose: firmware updates related to flaw remediation are tested for effectiveness before installation; + links: + - href: '#si-2_smt.b' + rel: assessment-for - id: si-2_obj.b-4 name: assessment-objective props: @@ -56131,6 +61629,12 @@ catalog: value: SI-02b.[04] class: sp800-53a prose: firmware updates related to flaw remediation are tested for potential side effects before installation; + links: + - href: '#si-2_smt.b' + rel: assessment-for + links: + - href: '#si-2_smt.b' + rel: assessment-for - id: si-2_obj.c name: assessment-objective props: @@ -56145,6 +61649,9 @@ catalog: value: SI-02c.[01] class: sp800-53a prose: 'security-relevant software updates are installed within {{ insert: param, si-02_odp }} of the release of the updates;' + links: + - href: '#si-2_smt.c' + rel: assessment-for - id: si-2_obj.c-2 name: assessment-objective props: @@ -56152,6 +61659,12 @@ catalog: value: SI-02c.[02] class: sp800-53a prose: 'security-relevant firmware updates are installed within {{ insert: param, si-02_odp }} of the release of the updates;' + links: + - href: '#si-2_smt.c' + rel: assessment-for + links: + - href: '#si-2_smt.c' + rel: assessment-for - id: si-2_obj.d name: assessment-objective props: @@ -56159,6 +61672,12 @@ catalog: value: SI-02d. class: sp800-53a prose: flaw remediation is incorporated into the organizational configuration management process. + links: + - href: '#si-2_smt.d' + rel: assessment-for + links: + - href: '#si-2_smt' + rel: assessment-for - id: si-2_asm-examine name: assessment-method props: @@ -56289,6 +61808,9 @@ catalog: value: SI-02(02) class: sp800-53a prose: 'system components have applicable security-relevant software and firmware updates installed {{ insert: param, si-02.02_odp.02 }} using {{ insert: param, si-02.02_odp.01 }}.' + links: + - href: '#si-2.2_smt' + rel: assessment-for - id: si-2.2_asm-examine name: assessment-method props: @@ -56549,6 +62071,9 @@ catalog: value: SI-03a.[01] class: sp800-53a prose: ' {{ insert: param, si-03_odp.01 }} malicious code protection mechanisms are implemented at system entry and exit points to detect malicious code;' + links: + - href: '#si-3_smt.a' + rel: assessment-for - id: si-3_obj.a-2 name: assessment-objective props: @@ -56556,6 +62081,12 @@ catalog: value: SI-03a.[02] class: sp800-53a prose: ' {{ insert: param, si-03_odp.01 }} malicious code protection mechanisms are implemented at system entry and exit points to eradicate malicious code;' + links: + - href: '#si-3_smt.a' + rel: assessment-for + links: + - href: '#si-3_smt.a' + rel: assessment-for - id: si-3_obj.b name: assessment-objective props: @@ -56563,6 +62094,9 @@ catalog: value: SI-03b. class: sp800-53a prose: malicious code protection mechanisms are updated automatically as new releases are available in accordance with organizational configuration management policy and procedures; + links: + - href: '#si-3_smt.b' + rel: assessment-for - id: si-3_obj.c name: assessment-objective props: @@ -56584,6 +62118,9 @@ catalog: value: SI-03c.01[01] class: sp800-53a prose: 'malicious code protection mechanisms are configured to perform periodic scans of the system {{ insert: param, si-03_odp.02 }};' + links: + - href: '#si-3_smt.c.1' + rel: assessment-for - id: si-3_obj.c.1-2 name: assessment-objective props: @@ -56591,6 +62128,12 @@ catalog: value: SI-03c.01[02] class: sp800-53a prose: 'malicious code protection mechanisms are configured to perform real-time scans of files from external sources at {{ insert: param, si-03_odp.03 }} as the files are downloaded, opened, or executed in accordance with organizational policy;' + links: + - href: '#si-3_smt.c.1' + rel: assessment-for + links: + - href: '#si-3_smt.c.1' + rel: assessment-for - id: si-3_obj.c.2 name: assessment-objective props: @@ -56605,6 +62148,9 @@ catalog: value: SI-03c.02[01] class: sp800-53a prose: 'malicious code protection mechanisms are configured to {{ insert: param, si-03_odp.04 }} in response to malicious code detection;' + links: + - href: '#si-3_smt.c.2' + rel: assessment-for - id: si-3_obj.c.2-2 name: assessment-objective props: @@ -56612,6 +62158,15 @@ catalog: value: SI-03c.02[02] class: sp800-53a prose: 'malicious code protection mechanisms are configured to send alerts to {{ insert: param, si-03_odp.06 }} in response to malicious code detection;' + links: + - href: '#si-3_smt.c.2' + rel: assessment-for + links: + - href: '#si-3_smt.c.2' + rel: assessment-for + links: + - href: '#si-3_smt.c' + rel: assessment-for - id: si-3_obj.d name: assessment-objective props: @@ -56619,6 +62174,12 @@ catalog: value: SI-03d. class: sp800-53a prose: the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the system are addressed. + links: + - href: '#si-3_smt.d' + rel: assessment-for + links: + - href: '#si-3_smt' + rel: assessment-for - id: si-3_asm-examine name: assessment-method props: @@ -56971,6 +62532,9 @@ catalog: value: SI-04a.01 class: sp800-53a prose: 'the system is monitored to detect attacks and indicators of potential attacks in accordance with {{ insert: param, si-04_odp.01 }};' + links: + - href: '#si-4_smt.a.1' + rel: assessment-for - id: si-4_obj.a.2 name: assessment-objective props: @@ -56985,6 +62549,9 @@ catalog: value: SI-04a.02[01] class: sp800-53a prose: the system is monitored to detect unauthorized local connections; + links: + - href: '#si-4_smt.a.2' + rel: assessment-for - id: si-4_obj.a.2-2 name: assessment-objective props: @@ -56992,6 +62559,9 @@ catalog: value: SI-04a.02[02] class: sp800-53a prose: the system is monitored to detect unauthorized network connections; + links: + - href: '#si-4_smt.a.2' + rel: assessment-for - id: si-4_obj.a.2-3 name: assessment-objective props: @@ -56999,6 +62569,15 @@ catalog: value: SI-04a.02[03] class: sp800-53a prose: the system is monitored to detect unauthorized remote connections; + links: + - href: '#si-4_smt.a.2' + rel: assessment-for + links: + - href: '#si-4_smt.a.2' + rel: assessment-for + links: + - href: '#si-4_smt.a' + rel: assessment-for - id: si-4_obj.b name: assessment-objective props: @@ -57006,6 +62585,9 @@ catalog: value: SI-04b. class: sp800-53a prose: 'unauthorized use of the system is identified through {{ insert: param, si-04_odp.02 }};' + links: + - href: '#si-4_smt.b' + rel: assessment-for - id: si-4_obj.c name: assessment-objective props: @@ -57020,6 +62602,9 @@ catalog: value: SI-04c.01 class: sp800-53a prose: internal monitoring capabilities are invoked or monitoring devices are deployed strategically within the system to collect organization-determined essential information; + links: + - href: '#si-4_smt.c.1' + rel: assessment-for - id: si-4_obj.c.2 name: assessment-objective props: @@ -57027,6 +62612,12 @@ catalog: value: SI-04c.02 class: sp800-53a prose: internal monitoring capabilities are invoked or monitoring devices are deployed at ad hoc locations within the system to track specific types of transactions of interest to the organization; + links: + - href: '#si-4_smt.c.2' + rel: assessment-for + links: + - href: '#si-4_smt.c' + rel: assessment-for - id: si-4_obj.d name: assessment-objective props: @@ -57041,6 +62632,9 @@ catalog: value: SI-04d.[01] class: sp800-53a prose: detected events are analyzed; + links: + - href: '#si-4_smt.d' + rel: assessment-for - id: si-4_obj.d-2 name: assessment-objective props: @@ -57048,6 +62642,12 @@ catalog: value: SI-04d.[02] class: sp800-53a prose: detected anomalies are analyzed; + links: + - href: '#si-4_smt.d' + rel: assessment-for + links: + - href: '#si-4_smt.d' + rel: assessment-for - id: si-4_obj.e name: assessment-objective props: @@ -57055,6 +62655,9 @@ catalog: value: SI-04e. class: sp800-53a prose: the level of system monitoring activity is adjusted when there is a change in risk to organizational operations and assets, individuals, other organizations, or the Nation; + links: + - href: '#si-4_smt.e' + rel: assessment-for - id: si-4_obj.f name: assessment-objective props: @@ -57062,6 +62665,9 @@ catalog: value: SI-04f. class: sp800-53a prose: a legal opinion regarding system monitoring activities is obtained; + links: + - href: '#si-4_smt.f' + rel: assessment-for - id: si-4_obj.g name: assessment-objective props: @@ -57069,6 +62675,12 @@ catalog: value: SI-04g. class: sp800-53a prose: ' {{ insert: param, si-04_odp.03 }} is provided to {{ insert: param, si-04_odp.04 }} {{ insert: param, si-04_odp.05 }}.' + links: + - href: '#si-4_smt.g' + rel: assessment-for + links: + - href: '#si-4_smt' + rel: assessment-for - id: si-4_asm-examine name: assessment-method props: @@ -57175,6 +62787,9 @@ catalog: value: SI-04(02) class: sp800-53a prose: automated tools and mechanisms are employed to support a near real-time analysis of events. + links: + - href: '#si-4.2_smt' + rel: assessment-for - id: si-4.2_asm-examine name: assessment-method props: @@ -57363,6 +62978,9 @@ catalog: value: SI-04(04)(a)[01] class: sp800-53a prose: criteria for unusual or unauthorized activities or conditions for inbound communications traffic are defined; + links: + - href: '#si-4.4_smt.a' + rel: assessment-for - id: si-4.4_obj.a-2 name: assessment-objective props: @@ -57370,6 +62988,12 @@ catalog: value: SI-04(04)(a)[02] class: sp800-53a prose: criteria for unusual or unauthorized activities or conditions for outbound communications traffic are defined; + links: + - href: '#si-4.4_smt.a' + rel: assessment-for + links: + - href: '#si-4.4_smt.a' + rel: assessment-for - id: si-4.4_obj.b name: assessment-objective props: @@ -57384,6 +63008,9 @@ catalog: value: SI-04(04)(b)[01] class: sp800-53a prose: 'inbound communications traffic is monitored {{ insert: param, si-04.04_odp.01 }} for {{ insert: param, si-04.04_odp.02 }};' + links: + - href: '#si-4.4_smt.b' + rel: assessment-for - id: si-4.4_obj.b-2 name: assessment-objective props: @@ -57391,6 +63018,15 @@ catalog: value: SI-04(04)(b)[02] class: sp800-53a prose: 'outbound communications traffic is monitored {{ insert: param, si-04.04_odp.03 }} for {{ insert: param, si-04.04_odp.04 }}.' + links: + - href: '#si-4.4_smt.b' + rel: assessment-for + links: + - href: '#si-4.4_smt.b' + rel: assessment-for + links: + - href: '#si-4.4_smt' + rel: assessment-for - id: si-4.4_asm-examine name: assessment-method props: @@ -57521,6 +63157,9 @@ catalog: value: SI-04(05) class: sp800-53a prose: ' {{ insert: param, si-04.05_odp.01 }} are alerted when system-generated {{ insert: param, si-04.05_odp.02 }} occur.' + links: + - href: '#si-4.5_smt' + rel: assessment-for - id: si-4.5_asm-examine name: assessment-method props: @@ -57651,6 +63290,9 @@ catalog: value: SI-04(10) class: sp800-53a prose: 'provisions are made so that {{ insert: param, si-04.10_odp.01 }} is visible to {{ insert: param, si-04.10_odp.02 }}.' + links: + - href: '#si-4.10_smt' + rel: assessment-for - id: si-4.10_asm-examine name: assessment-method props: @@ -57786,6 +63428,9 @@ catalog: value: SI-04(12) class: sp800-53a prose: ' {{ insert: param, si-04.12_odp.01 }} is/are alerted using {{ insert: param, si-04.12_odp.02 }} when {{ insert: param, si-04.12_odp.03 }} indicate inappropriate or unusual activities with security or privacy implications.' + links: + - href: '#si-4.12_smt' + rel: assessment-for - id: si-4.12_asm-examine name: assessment-method props: @@ -57910,6 +63555,9 @@ catalog: value: SI-04(14)[01] class: sp800-53a prose: a wireless intrusion detection system is employed to identify rogue wireless devices; + links: + - href: '#si-4.14_smt' + rel: assessment-for - id: si-4.14_obj-2 name: assessment-objective props: @@ -57917,6 +63565,9 @@ catalog: value: SI-04(14)[02] class: sp800-53a prose: a wireless intrusion detection system is employed to detect attack attempts on the system; + links: + - href: '#si-4.14_smt' + rel: assessment-for - id: si-4.14_obj-3 name: assessment-objective props: @@ -57924,6 +63575,12 @@ catalog: value: SI-04(14)[03] class: sp800-53a prose: a wireless intrusion detection system is employed to detect potential compromises or breaches to the system. + links: + - href: '#si-4.14_smt' + rel: assessment-for + links: + - href: '#si-4.14_smt' + rel: assessment-for - id: si-4.14_asm-examine name: assessment-method props: @@ -58038,6 +63695,9 @@ catalog: value: SI-04(20) class: sp800-53a prose: ' {{ insert: param, si-04.20_odp }} of privileged users is implemented.' + links: + - href: '#si-4.20_smt' + rel: assessment-for - id: si-4.20_asm-examine name: assessment-method props: @@ -58191,6 +63851,9 @@ catalog: value: SI-04(22)(a) class: sp800-53a prose: 'network services that have not been authorized or approved by {{ insert: param, si-04.22_odp.01 }} are detected;' + links: + - href: '#si-4.22_smt.a' + rel: assessment-for - id: si-4.22_obj.b name: assessment-objective props: @@ -58198,6 +63861,12 @@ catalog: value: SI-04(22)(b) class: sp800-53a prose: ' {{ insert: param, si-04.22_odp.02 }} is/are initiated when network services that have not been authorized or approved by authorization or approval processes are detected.' + links: + - href: '#si-4.22_smt.b' + rel: assessment-for + links: + - href: '#si-4.22_smt' + rel: assessment-for - id: si-4.22_asm-examine name: assessment-method props: @@ -58401,6 +64070,9 @@ catalog: value: SI-05a. class: sp800-53a prose: 'system security alerts, advisories, and directives are received from {{ insert: param, si-05_odp.01 }} on an ongoing basis;' + links: + - href: '#si-5_smt.a' + rel: assessment-for - id: si-5_obj.b name: assessment-objective props: @@ -58408,6 +64080,9 @@ catalog: value: SI-05b. class: sp800-53a prose: internal security alerts, advisories, and directives are generated as deemed necessary; + links: + - href: '#si-5_smt.b' + rel: assessment-for - id: si-5_obj.c name: assessment-objective props: @@ -58415,6 +64090,9 @@ catalog: value: SI-05c. class: sp800-53a prose: 'security alerts, advisories, and directives are disseminated to {{ insert: param, si-05_odp.02 }};' + links: + - href: '#si-5_smt.c' + rel: assessment-for - id: si-5_obj.d name: assessment-objective props: @@ -58422,6 +64100,12 @@ catalog: value: SI-05d. class: sp800-53a prose: security directives are implemented in accordance with established time frames or if the issuing organization is notified of the degree of noncompliance. + links: + - href: '#si-5_smt.d' + rel: assessment-for + links: + - href: '#si-5_smt' + rel: assessment-for - id: si-5_asm-examine name: assessment-method props: @@ -58529,6 +64213,9 @@ catalog: value: SI-05(01) class: sp800-53a prose: ' {{ insert: param, si-05.01_odp }} are used to broadcast security alert and advisory information throughout the organization.' + links: + - href: '#si-5.1_smt' + rel: assessment-for - id: si-5.1_asm-examine name: assessment-method props: @@ -58768,6 +64455,9 @@ catalog: value: SI-06a.[01] class: sp800-53a prose: ' {{ insert: param, si-06_odp.01 }} are verified to be operating correctly;' + links: + - href: '#si-6_smt.a' + rel: assessment-for - id: si-6_obj.a-2 name: assessment-objective props: @@ -58775,6 +64465,12 @@ catalog: value: SI-06a.[02] class: sp800-53a prose: ' {{ insert: param, si-06_odp.02 }} are verified to be operating correctly;' + links: + - href: '#si-6_smt.a' + rel: assessment-for + links: + - href: '#si-6_smt.a' + rel: assessment-for - id: si-6_obj.b name: assessment-objective props: @@ -58789,6 +64485,9 @@ catalog: value: SI-06b.[01] class: sp800-53a prose: ' {{ insert: param, si-06_odp.01 }} are verified {{ insert: param, si-06_odp.03 }};' + links: + - href: '#si-6_smt.b' + rel: assessment-for - id: si-6_obj.b-2 name: assessment-objective props: @@ -58796,6 +64495,12 @@ catalog: value: SI-06b.[02] class: sp800-53a prose: ' {{ insert: param, si-06_odp.02 }} are verified {{ insert: param, si-06_odp.03 }};' + links: + - href: '#si-6_smt.b' + rel: assessment-for + links: + - href: '#si-6_smt.b' + rel: assessment-for - id: si-6_obj.c name: assessment-objective props: @@ -58810,6 +64515,9 @@ catalog: value: SI-06c.[01] class: sp800-53a prose: ' {{ insert: param, si-06_odp.06 }} is/are alerted to failed security verification tests;' + links: + - href: '#si-6_smt.c' + rel: assessment-for - id: si-6_obj.c-2 name: assessment-objective props: @@ -58817,6 +64525,12 @@ catalog: value: SI-06c.[02] class: sp800-53a prose: ' {{ insert: param, si-06_odp.06 }} is/are alerted to failed privacy verification tests;' + links: + - href: '#si-6_smt.c' + rel: assessment-for + links: + - href: '#si-6_smt.c' + rel: assessment-for - id: si-6_obj.d name: assessment-objective props: @@ -58824,6 +64538,12 @@ catalog: value: SI-06d. class: sp800-53a prose: ' {{ insert: param, si-06_odp.07 }} is/are initiated when anomalies are discovered.' + links: + - href: '#si-6_smt.d' + rel: assessment-for + links: + - href: '#si-6_smt' + rel: assessment-for - id: si-6_asm-examine name: assessment-method props: @@ -59087,6 +64807,9 @@ catalog: value: SI-07a.[01] class: sp800-53a prose: 'integrity verification tools are employed to detect unauthorized changes to {{ insert: param, si-07_odp.01 }};' + links: + - href: '#si-7_smt.a' + rel: assessment-for - id: si-7_obj.a-2 name: assessment-objective props: @@ -59094,6 +64817,9 @@ catalog: value: SI-07a.[02] class: sp800-53a prose: 'integrity verification tools are employed to detect unauthorized changes to {{ insert: param, si-07_odp.02 }};' + links: + - href: '#si-7_smt.a' + rel: assessment-for - id: si-7_obj.a-3 name: assessment-objective props: @@ -59101,6 +64827,12 @@ catalog: value: SI-07a.[03] class: sp800-53a prose: 'integrity verification tools are employed to detect unauthorized changes to {{ insert: param, si-07_odp.03 }};' + links: + - href: '#si-7_smt.a' + rel: assessment-for + links: + - href: '#si-7_smt.a' + rel: assessment-for - id: si-7_obj.b name: assessment-objective props: @@ -59115,6 +64847,9 @@ catalog: value: SI-07b.[01] class: sp800-53a prose: ' {{ insert: param, si-07_odp.04 }} are taken when unauthorized changes to the software, are detected;' + links: + - href: '#si-7_smt.b' + rel: assessment-for - id: si-7_obj.b-2 name: assessment-objective props: @@ -59122,6 +64857,9 @@ catalog: value: SI-07b.[02] class: sp800-53a prose: ' {{ insert: param, si-07_odp.05 }} are taken when unauthorized changes to the firmware are detected;' + links: + - href: '#si-7_smt.b' + rel: assessment-for - id: si-7_obj.b-3 name: assessment-objective props: @@ -59129,6 +64867,15 @@ catalog: value: SI-07b.[03] class: sp800-53a prose: ' {{ insert: param, si-07_odp.06 }} are taken when unauthorized changes to the information are detected.' + links: + - href: '#si-7_smt.b' + rel: assessment-for + links: + - href: '#si-7_smt.b' + rel: assessment-for + links: + - href: '#si-7_smt' + rel: assessment-for - id: si-7_asm-examine name: assessment-method props: @@ -59394,6 +65141,9 @@ catalog: value: SI-07(01)[01] class: sp800-53a prose: 'an integrity check of {{ insert: param, si-07.01_odp.01 }} is performed {{ insert: param, si-07.01_odp.02 }};' + links: + - href: '#si-7.1_smt' + rel: assessment-for - id: si-7.1_obj-2 name: assessment-objective props: @@ -59401,6 +65151,9 @@ catalog: value: SI-07(01)[02] class: sp800-53a prose: 'an integrity check of {{ insert: param, si-07.01_odp.05 }} is performed {{ insert: param, si-07.01_odp.06 }};' + links: + - href: '#si-7.1_smt' + rel: assessment-for - id: si-7.1_obj-3 name: assessment-objective props: @@ -59408,6 +65161,12 @@ catalog: value: SI-07(01)[03] class: sp800-53a prose: 'an integrity check of {{ insert: param, si-07.01_odp.09 }} is performed {{ insert: param, si-07.01_odp.10 }}.' + links: + - href: '#si-7.1_smt' + rel: assessment-for + links: + - href: '#si-7.1_smt' + rel: assessment-for - id: si-7.1_asm-examine name: assessment-method props: @@ -59513,6 +65272,9 @@ catalog: value: SI-07(02) class: sp800-53a prose: 'automated tools that provide notification to {{ insert: param, si-07.02_odp }} upon discovering discrepancies during integrity verification are employed.' + links: + - href: '#si-7.2_smt' + rel: assessment-for - id: si-7.2_asm-examine name: assessment-method props: @@ -59644,6 +65406,9 @@ catalog: value: SI-07(05) class: sp800-53a prose: ' {{ insert: param, si-07.05_odp.01 }} are automatically performed when integrity violations are discovered.' + links: + - href: '#si-7.5_smt' + rel: assessment-for - id: si-7.5_asm-examine name: assessment-method props: @@ -59771,6 +65536,9 @@ catalog: value: SI-07(07) class: sp800-53a prose: 'the detection of {{ insert: param, si-07.07_odp }} are incorporated into the organizational incident response capability.' + links: + - href: '#si-7.7_smt' + rel: assessment-for - id: si-7.7_asm-examine name: assessment-method props: @@ -59887,6 +65655,9 @@ catalog: value: SI-07(15) class: sp800-53a prose: 'cryptographic mechanisms are implemented to authenticate {{ insert: param, si-07.15_odp }} prior to installation.' + links: + - href: '#si-7.15_smt' + rel: assessment-for - id: si-7.15_asm-examine name: assessment-method props: @@ -60018,6 +65789,9 @@ catalog: value: SI-08a.[01] class: sp800-53a prose: spam protection mechanisms are employed at system entry points to detect unsolicited messages; + links: + - href: '#si-8_smt.a' + rel: assessment-for - id: si-8_obj.a-2 name: assessment-objective props: @@ -60025,6 +65799,9 @@ catalog: value: SI-08a.[02] class: sp800-53a prose: spam protection mechanisms are employed at system exit points to detect unsolicited messages; + links: + - href: '#si-8_smt.a' + rel: assessment-for - id: si-8_obj.a-3 name: assessment-objective props: @@ -60032,6 +65809,9 @@ catalog: value: SI-08a.[03] class: sp800-53a prose: spam protection mechanisms are employed at system entry points to act on unsolicited messages; + links: + - href: '#si-8_smt.a' + rel: assessment-for - id: si-8_obj.a-4 name: assessment-objective props: @@ -60039,6 +65819,12 @@ catalog: value: SI-08a.[04] class: sp800-53a prose: spam protection mechanisms are employed at system exit points to act on unsolicited messages; + links: + - href: '#si-8_smt.a' + rel: assessment-for + links: + - href: '#si-8_smt.a' + rel: assessment-for - id: si-8_obj.b name: assessment-objective props: @@ -60046,6 +65832,12 @@ catalog: value: SI-08b. class: sp800-53a prose: spam protection mechanisms are updated when new releases are available in accordance with organizational configuration management policies and procedures. + links: + - href: '#si-8_smt.b' + rel: assessment-for + links: + - href: '#si-8_smt' + rel: assessment-for - id: si-8_asm-examine name: assessment-method props: @@ -60156,6 +65948,9 @@ catalog: value: SI-08(02) class: sp800-53a prose: 'spam protection mechanisms are automatically updated {{ insert: param, si-08.02_odp }}.' + links: + - href: '#si-8.2_smt' + rel: assessment-for - id: si-8.2_asm-examine name: assessment-method props: @@ -60271,6 +66066,9 @@ catalog: value: SI-10 class: sp800-53a prose: 'the validity of the {{ insert: param, si-10_odp }} is checked.' + links: + - href: '#si-10_smt' + rel: assessment-for - id: si-10_asm-examine name: assessment-method props: @@ -60406,6 +66204,9 @@ catalog: value: SI-11a. class: sp800-53a prose: error messages that provide the information necessary for corrective actions are generated without revealing information that could be exploited; + links: + - href: '#si-11_smt.a' + rel: assessment-for - id: si-11_obj.b name: assessment-objective props: @@ -60413,6 +66214,12 @@ catalog: value: SI-11b. class: sp800-53a prose: 'error messages are revealed only to {{ insert: param, si-11_odp }}.' + links: + - href: '#si-11_smt.b' + rel: assessment-for + links: + - href: '#si-11_smt' + rel: assessment-for - id: si-11_asm-examine name: assessment-method props: @@ -60580,6 +66387,9 @@ catalog: value: SI-12[01] class: sp800-53a prose: information within the system is managed in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, guidelines, and operational requirements; + links: + - href: '#si-12_smt' + rel: assessment-for - id: si-12_obj-2 name: assessment-objective props: @@ -60587,6 +66397,9 @@ catalog: value: SI-12[02] class: sp800-53a prose: information within the system is retained in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, guidelines, and operational requirements; + links: + - href: '#si-12_smt' + rel: assessment-for - id: si-12_obj-3 name: assessment-objective props: @@ -60594,6 +66407,9 @@ catalog: value: SI-12[03] class: sp800-53a prose: information output from the system is managed in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, guidelines, and operational requirements; + links: + - href: '#si-12_smt' + rel: assessment-for - id: si-12_obj-4 name: assessment-objective props: @@ -60601,6 +66417,12 @@ catalog: value: SI-12[04] class: sp800-53a prose: information output from the system is retained in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, guidelines, and operational requirements. + links: + - href: '#si-12_smt' + rel: assessment-for + links: + - href: '#si-12_smt' + rel: assessment-for - id: si-12_asm-examine name: assessment-method props: @@ -60725,6 +66547,9 @@ catalog: value: SI-16 class: sp800-53a prose: ' {{ insert: param, si-16_odp }} are implemented to protect the system memory from unauthorized code execution.' + links: + - href: '#si-16_smt' + rel: assessment-for - id: si-16_asm-examine name: assessment-method props: @@ -61007,6 +66832,9 @@ catalog: value: SR-01a.[01] class: sp800-53a prose: a supply chain risk management policy is developed and documented; + links: + - href: '#sr-1_smt.a' + rel: assessment-for - id: sr-1_obj.a-2 name: assessment-objective props: @@ -61014,6 +66842,9 @@ catalog: value: SR-01a.[02] class: sp800-53a prose: 'the supply chain risk management policy is disseminated to {{ insert: param, sr-01_odp.01 }};' + links: + - href: '#sr-1_smt.a' + rel: assessment-for - id: sr-1_obj.a-3 name: assessment-objective props: @@ -61021,6 +66852,9 @@ catalog: value: SR-01a.[03] class: sp800-53a prose: supply chain risk management procedures to facilitate the implementation of the supply chain risk management policy and the associated supply chain risk management controls are developed and documented; + links: + - href: '#sr-1_smt.a' + rel: assessment-for - id: sr-1_obj.a-4 name: assessment-objective props: @@ -61028,6 +66862,9 @@ catalog: value: SR-01a.[04] class: sp800-53a prose: 'the supply chain risk management procedures are disseminated to {{ insert: param, sr-01_odp.02 }}.' + links: + - href: '#sr-1_smt.a' + rel: assessment-for - id: sr-1_obj.a.1 name: assessment-objective props: @@ -61049,6 +66886,9 @@ catalog: value: SR-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses purpose;' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-2 name: assessment-objective props: @@ -61056,6 +66896,9 @@ catalog: value: SR-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses scope; ' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-3 name: assessment-objective props: @@ -61063,6 +66906,9 @@ catalog: value: SR-01a.01(a)[03] class: sp800-53a prose: ' {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses roles;' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-4 name: assessment-objective props: @@ -61070,6 +66916,9 @@ catalog: value: SR-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses responsibilities;' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-5 name: assessment-objective props: @@ -61077,6 +66926,9 @@ catalog: value: SR-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses management commitment;' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-6 name: assessment-objective props: @@ -61084,6 +66936,9 @@ catalog: value: SR-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses coordination among organizational entities;' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-7 name: assessment-objective props: @@ -61091,6 +66946,12 @@ catalog: value: SR-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses compliance.' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.b name: assessment-objective props: @@ -61098,6 +66959,15 @@ catalog: value: SR-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#sr-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#sr-1_smt.a.1' + rel: assessment-for + links: + - href: '#sr-1_smt.a' + rel: assessment-for - id: sr-1_obj.b name: assessment-objective props: @@ -61105,6 +66975,9 @@ catalog: value: SR-01b. class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the supply chain risk management policy and procedures;' + links: + - href: '#sr-1_smt.b' + rel: assessment-for - id: sr-1_obj.c name: assessment-objective props: @@ -61126,6 +66999,9 @@ catalog: value: SR-01c.01[01] class: sp800-53a prose: 'the current supply chain risk management policy is reviewed and updated {{ insert: param, sr-01_odp.05 }};' + links: + - href: '#sr-1_smt.c.1' + rel: assessment-for - id: sr-1_obj.c.1-2 name: assessment-objective props: @@ -61133,6 +67009,12 @@ catalog: value: SR-01c.01[02] class: sp800-53a prose: 'the current supply chain risk management policy is reviewed and updated following {{ insert: param, sr-01_odp.06 }};' + links: + - href: '#sr-1_smt.c.1' + rel: assessment-for + links: + - href: '#sr-1_smt.c.1' + rel: assessment-for - id: sr-1_obj.c.2 name: assessment-objective props: @@ -61147,6 +67029,9 @@ catalog: value: SR-01c.02[01] class: sp800-53a prose: 'the current supply chain risk management procedures are reviewed and updated {{ insert: param, sr-01_odp.07 }};' + links: + - href: '#sr-1_smt.c.2' + rel: assessment-for - id: sr-1_obj.c.2-2 name: assessment-objective props: @@ -61154,6 +67039,18 @@ catalog: value: SR-01c.02[02] class: sp800-53a prose: 'the current supply chain risk management procedures are reviewed and updated following {{ insert: param, sr-01_odp.08 }}.' + links: + - href: '#sr-1_smt.c.2' + rel: assessment-for + links: + - href: '#sr-1_smt.c.2' + rel: assessment-for + links: + - href: '#sr-1_smt.c' + rel: assessment-for + links: + - href: '#sr-1_smt' + rel: assessment-for - id: sr-1_asm-examine name: assessment-method props: @@ -61330,6 +67227,9 @@ catalog: value: SR-02a.[01] class: sp800-53a prose: a plan for managing supply chain risks is developed; + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-2 name: assessment-objective props: @@ -61337,6 +67237,9 @@ catalog: value: SR-02a.[02] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the research and development of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-3 name: assessment-objective props: @@ -61344,6 +67247,9 @@ catalog: value: SR-02a.[03] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the design of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-4 name: assessment-objective props: @@ -61351,6 +67257,9 @@ catalog: value: SR-02a.[04] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the manufacturing of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-5 name: assessment-objective props: @@ -61358,6 +67267,9 @@ catalog: value: SR-02a.[05] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the acquisition of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-6 name: assessment-objective props: @@ -61365,6 +67277,9 @@ catalog: value: SR-02a.[06] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the delivery of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-7 name: assessment-objective props: @@ -61372,6 +67287,9 @@ catalog: value: SR-02a.[07] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the integration of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-8 name: assessment-objective props: @@ -61379,6 +67297,9 @@ catalog: value: SR-02a.[08] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the operation and maintenance of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-9 name: assessment-objective props: @@ -61386,6 +67307,12 @@ catalog: value: SR-02a.[09] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the disposal of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.b name: assessment-objective props: @@ -61393,6 +67320,9 @@ catalog: value: SR-02b. class: sp800-53a prose: 'the supply chain risk management plan is reviewed and updated {{ insert: param, sr-02_odp.02 }} or as required to address threat, organizational, or environmental changes;' + links: + - href: '#sr-2_smt.b' + rel: assessment-for - id: sr-2_obj.c name: assessment-objective props: @@ -61407,6 +67337,9 @@ catalog: value: SR-02c.[01] class: sp800-53a prose: the supply chain risk management plan is protected from unauthorized disclosure; + links: + - href: '#sr-2_smt.c' + rel: assessment-for - id: sr-2_obj.c-2 name: assessment-objective props: @@ -61414,6 +67347,15 @@ catalog: value: SR-02c.[02] class: sp800-53a prose: the supply chain risk management plan is protected from unauthorized modification. + links: + - href: '#sr-2_smt.c' + rel: assessment-for + links: + - href: '#sr-2_smt.c' + rel: assessment-for + links: + - href: '#sr-2_smt' + rel: assessment-for - id: sr-2_asm-examine name: assessment-method props: @@ -61560,6 +67502,9 @@ catalog: value: SR-02(01) class: sp800-53a prose: 'a supply chain risk management team consisting of {{ insert: param, sr-02.01_odp.01 }} is established to lead and support {{ insert: param, sr-02.01_odp.02 }}.' + links: + - href: '#sr-2.1_smt' + rel: assessment-for - id: sr-2.1_asm-examine name: assessment-method props: @@ -61793,6 +67738,9 @@ catalog: value: SR-03a.[01] class: sp800-53a prose: 'a process or processes is/are established to identify and address weaknesses or deficiencies in the supply chain elements and processes of {{ insert: param, sr-03_odp.01 }};' + links: + - href: '#sr-3_smt.a' + rel: assessment-for - id: sr-3_obj.a-2 name: assessment-objective props: @@ -61800,6 +67748,12 @@ catalog: value: SR-03a.[02] class: sp800-53a prose: 'the process or processes to identify and address weaknesses or deficiencies in the supply chain elements and processes of {{ insert: param, sr-03_odp.01 }} is/are coordinated with {{ insert: param, sr-03_odp.02 }};' + links: + - href: '#sr-3_smt.a' + rel: assessment-for + links: + - href: '#sr-3_smt.a' + rel: assessment-for - id: sr-3_obj.b name: assessment-objective props: @@ -61807,6 +67761,9 @@ catalog: value: SR-03b. class: sp800-53a prose: ' {{ insert: param, sr-03_odp.03 }} are employed to protect against supply chain risks to the system, system component, or system service and to limit the harm or consequences from supply chain-related events;' + links: + - href: '#sr-3_smt.b' + rel: assessment-for - id: sr-3_obj.c name: assessment-objective props: @@ -61814,6 +67771,12 @@ catalog: value: SR-03c. class: sp800-53a prose: 'the selected and implemented supply chain processes and controls are documented in {{ insert: param, sr-03_odp.04 }}.' + links: + - href: '#sr-3_smt.c' + rel: assessment-for + links: + - href: '#sr-3_smt' + rel: assessment-for - id: sr-3_asm-examine name: assessment-method props: @@ -61983,6 +67946,9 @@ catalog: value: SR-05[01] class: sp800-53a prose: ' {{ insert: param, sr-05_odp }} are employed to protect against supply chain risks;' + links: + - href: '#sr-5_smt' + rel: assessment-for - id: sr-5_obj-2 name: assessment-objective props: @@ -61990,6 +67956,9 @@ catalog: value: SR-05[02] class: sp800-53a prose: ' {{ insert: param, sr-05_odp }} are employed to identify supply chain risks;' + links: + - href: '#sr-5_smt' + rel: assessment-for - id: sr-5_obj-3 name: assessment-objective props: @@ -61997,6 +67966,12 @@ catalog: value: SR-05[03] class: sp800-53a prose: ' {{ insert: param, sr-05_odp }} are employed to mitigate supply chain risks.' + links: + - href: '#sr-5_smt' + rel: assessment-for + links: + - href: '#sr-5_smt' + rel: assessment-for - id: sr-5_asm-examine name: assessment-method props: @@ -62143,6 +68118,9 @@ catalog: value: SR-06 class: sp800-53a prose: 'the supply chain-related risks associated with suppliers or contractors and the systems, system components, or system services they provide are assessed and reviewed {{ insert: param, sr-06_odp }}.' + links: + - href: '#sr-6_smt' + rel: assessment-for - id: sr-6_asm-examine name: assessment-method props: @@ -62282,6 +68260,9 @@ catalog: value: SR-08 class: sp800-53a prose: 'agreements and procedures are established with entities involved in the supply chain for the system, system components, or system service for {{ insert: param, sr-08_odp.01 }}.' + links: + - href: '#sr-8_smt' + rel: assessment-for - id: sr-8_asm-examine name: assessment-method props: @@ -62396,6 +68377,9 @@ catalog: value: SR-09 class: sp800-53a prose: a tamper protection program is implemented for the system, system component, or system service. + links: + - href: '#sr-9_smt' + rel: assessment-for - id: sr-9_asm-examine name: assessment-method props: @@ -62502,6 +68486,9 @@ catalog: value: SR-09(01) class: sp800-53a prose: anti-tamper technologies, tools, and techniques are employed throughout the system development life cycle. + links: + - href: '#sr-9.1_smt' + rel: assessment-for - id: sr-9.1_asm-examine name: assessment-method props: @@ -62675,6 +68662,9 @@ catalog: value: SR-10 class: sp800-53a prose: ' {{ insert: param, sr-10_odp.01 }} are inspected {{ insert: param, sr-10_odp.02 }} to detect tampering.' + links: + - href: '#sr-10_smt' + rel: assessment-for - id: sr-10_asm-examine name: assessment-method props: @@ -62846,6 +68836,9 @@ catalog: value: SR-11a.[01] class: sp800-53a prose: an anti-counterfeit policy is developed and implemented; + links: + - href: '#sr-11_smt.a' + rel: assessment-for - id: sr-11_obj.a-2 name: assessment-objective props: @@ -62853,6 +68846,9 @@ catalog: value: SR-11a.[02] class: sp800-53a prose: anti-counterfeit procedures are developed and implemented; + links: + - href: '#sr-11_smt.a' + rel: assessment-for - id: sr-11_obj.a-3 name: assessment-objective props: @@ -62860,6 +68856,9 @@ catalog: value: SR-11a.[03] class: sp800-53a prose: the anti-counterfeit procedures include the means to detect counterfeit components entering the system; + links: + - href: '#sr-11_smt.a' + rel: assessment-for - id: sr-11_obj.a-4 name: assessment-objective props: @@ -62867,6 +68866,12 @@ catalog: value: SR-11a.[04] class: sp800-53a prose: the anti-counterfeit procedures include the means to prevent counterfeit components from entering the system; + links: + - href: '#sr-11_smt.a' + rel: assessment-for + links: + - href: '#sr-11_smt.a' + rel: assessment-for - id: sr-11_obj.b name: assessment-objective props: @@ -62874,6 +68879,12 @@ catalog: value: SR-11b. class: sp800-53a prose: 'counterfeit system components are reported to {{ insert: param, sr-11_odp.01 }}.' + links: + - href: '#sr-11_smt.b' + rel: assessment-for + links: + - href: '#sr-11_smt' + rel: assessment-for - id: sr-11_asm-examine name: assessment-method props: @@ -62999,6 +69010,9 @@ catalog: value: SR-11(01) class: sp800-53a prose: ' {{ insert: param, sr-11.01_odp }} are trained to detect counterfeit system components (including hardware, software, and firmware).' + links: + - href: '#sr-11.1_smt' + rel: assessment-for - id: sr-11.1_asm-examine name: assessment-method props: @@ -63123,6 +69137,9 @@ catalog: value: SR-11(02)[01] class: sp800-53a prose: 'configuration control over {{ insert: param, sr-11.02_odp }} awaiting service or repair is maintained;' + links: + - href: '#sr-11.2_smt' + rel: assessment-for - id: sr-11.2_obj-2 name: assessment-objective props: @@ -63130,6 +69147,12 @@ catalog: value: SR-11(02)[02] class: sp800-53a prose: 'configuration control over serviced or repaired {{ insert: param, sr-11.02_odp }} awaiting return to service is maintained.' + links: + - href: '#sr-11.2_smt' + rel: assessment-for + links: + - href: '#sr-11.2_smt' + rel: assessment-for - id: sr-11.2_asm-examine name: assessment-method props: @@ -63246,6 +69269,9 @@ catalog: value: SR-12 class: sp800-53a prose: ' {{ insert: param, sr-12_odp.01 }} are disposed of using {{ insert: param, sr-12_odp.02 }}.' + links: + - href: '#sr-12_smt' + rel: assessment-for - id: sr-12_asm-examine name: assessment-method props: diff --git a/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_HIGH-baseline_profile.yaml b/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_HIGH-baseline_profile.yaml index d4483eb9..5aa994ca 100644 --- a/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_HIGH-baseline_profile.yaml +++ b/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_HIGH-baseline_profile.yaml @@ -1,9 +1,9 @@ profile: - uuid: beade175-48ad-47c0-ac38-e9c2514cba22 + uuid: cd073316-7c58-4c34-9f5c-9eb5aa722683 metadata: - title: NIST Special Publication 800-53 Revision 5 HIGH IMPACT BASELINE - last-modified: "2023-10-12T00:00:00.000000-04:00" - version: Final + title: NIST Special Publication 800-53 Revision 5.1.1 HIGH IMPACT BASELINE + last-modified: "2023-12-04T14:55:00.000000-04:00" + version: 5.1.1+u2 oscal-version: 1.1.1 roles: - id: creator diff --git a/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_LOW-baseline-resolved-profile_catalog.yaml b/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_LOW-baseline-resolved-profile_catalog.yaml index 38c11048..e290f33f 100644 --- a/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_LOW-baseline-resolved-profile_catalog.yaml +++ b/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_LOW-baseline-resolved-profile_catalog.yaml @@ -1,9 +1,9 @@ catalog: - uuid: 8a6a307c-2c1d-47ef-9bcb-6362480d31cb + uuid: 64d89a61-c70c-49bc-9e1b-b620e2b3d855 metadata: - title: NIST Special Publication 800-53 Revision 5 LOW IMPACT BASELINE - last-modified: "2023-11-02T11:49:44.518316-04:00" - version: Final + title: NIST Special Publication 800-53 Revision 5.1.1 LOW IMPACT BASELINE + last-modified: "2023-12-05T21:54:50.284874Z" + version: 5.1.1+u2 oscal-version: 1.1.1 props: - name: resolution-tool @@ -257,6 +257,9 @@ catalog: value: AC-01a.[01] class: sp800-53a prose: an access control policy is developed and documented; + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.a-2 name: assessment-objective props: @@ -264,6 +267,9 @@ catalog: value: AC-01a.[02] class: sp800-53a prose: 'the access control policy is disseminated to {{ insert: param, ac-01_odp.01 }};' + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.a-3 name: assessment-objective props: @@ -271,6 +277,9 @@ catalog: value: AC-01a.[03] class: sp800-53a prose: access control procedures to facilitate the implementation of the access control policy and associated controls are developed and documented; + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.a-4 name: assessment-objective props: @@ -278,6 +287,9 @@ catalog: value: AC-01a.[04] class: sp800-53a prose: 'the access control procedures are disseminated to {{ insert: param, ac-01_odp.02 }};' + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.a.1 name: assessment-objective props: @@ -299,6 +311,9 @@ catalog: value: AC-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses purpose;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-2 name: assessment-objective props: @@ -306,6 +321,9 @@ catalog: value: AC-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses scope;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-3 name: assessment-objective props: @@ -313,6 +331,9 @@ catalog: value: AC-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses roles;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-4 name: assessment-objective props: @@ -320,6 +341,9 @@ catalog: value: AC-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses responsibilities;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-5 name: assessment-objective props: @@ -327,6 +351,9 @@ catalog: value: AC-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses management commitment;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-6 name: assessment-objective props: @@ -334,6 +361,9 @@ catalog: value: AC-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses coordination among organizational entities;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-7 name: assessment-objective props: @@ -341,6 +371,12 @@ catalog: value: AC-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses compliance;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.b name: assessment-objective props: @@ -348,6 +384,15 @@ catalog: value: AC-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ac-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ac-1_smt.a.1' + rel: assessment-for + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.b name: assessment-objective props: @@ -355,6 +400,9 @@ catalog: value: AC-01b. class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the access control policy and procedures;' + links: + - href: '#ac-1_smt.b' + rel: assessment-for - id: ac-1_obj.c name: assessment-objective props: @@ -376,6 +424,9 @@ catalog: value: AC-01c.01[01] class: sp800-53a prose: 'the current access control policy is reviewed and updated {{ insert: param, ac-01_odp.05 }};' + links: + - href: '#ac-1_smt.c.1' + rel: assessment-for - id: ac-1_obj.c.1-2 name: assessment-objective props: @@ -383,6 +434,12 @@ catalog: value: AC-01c.01[02] class: sp800-53a prose: 'the current access control policy is reviewed and updated following {{ insert: param, ac-01_odp.06 }};' + links: + - href: '#ac-1_smt.c.1' + rel: assessment-for + links: + - href: '#ac-1_smt.c.1' + rel: assessment-for - id: ac-1_obj.c.2 name: assessment-objective props: @@ -397,6 +454,9 @@ catalog: value: AC-01c.02[01] class: sp800-53a prose: 'the current access control procedures are reviewed and updated {{ insert: param, ac-01_odp.07 }};' + links: + - href: '#ac-1_smt.c.2' + rel: assessment-for - id: ac-1_obj.c.2-2 name: assessment-objective props: @@ -404,6 +464,18 @@ catalog: value: AC-01c.02[02] class: sp800-53a prose: 'the current access control procedures are reviewed and updated following {{ insert: param, ac-01_odp.08 }}.' + links: + - href: '#ac-1_smt.c.2' + rel: assessment-for + links: + - href: '#ac-1_smt.c.2' + rel: assessment-for + links: + - href: '#ac-1_smt.c' + rel: assessment-for + links: + - href: '#ac-1_smt' + rel: assessment-for - id: ac-1_asm-examine name: assessment-method props: @@ -778,6 +850,9 @@ catalog: value: AC-02a.[01] class: sp800-53a prose: account types allowed for use within the system are defined and documented; + links: + - href: '#ac-2_smt.a' + rel: assessment-for - id: ac-2_obj.a-2 name: assessment-objective props: @@ -785,6 +860,12 @@ catalog: value: AC-02a.[02] class: sp800-53a prose: account types specifically prohibited for use within the system are defined and documented; + links: + - href: '#ac-2_smt.a' + rel: assessment-for + links: + - href: '#ac-2_smt.a' + rel: assessment-for - id: ac-2_obj.b name: assessment-objective props: @@ -792,6 +873,9 @@ catalog: value: AC-02b. class: sp800-53a prose: account managers are assigned; + links: + - href: '#ac-2_smt.b' + rel: assessment-for - id: ac-2_obj.c name: assessment-objective props: @@ -799,6 +883,9 @@ catalog: value: AC-02c. class: sp800-53a prose: ' {{ insert: param, ac-02_odp.01 }} for group and role membership are required;' + links: + - href: '#ac-2_smt.c' + rel: assessment-for - id: ac-2_obj.d name: assessment-objective props: @@ -813,6 +900,9 @@ catalog: value: AC-02d.01 class: sp800-53a prose: authorized users of the system are specified; + links: + - href: '#ac-2_smt.d.1' + rel: assessment-for - id: ac-2_obj.d.2 name: assessment-objective props: @@ -820,6 +910,9 @@ catalog: value: AC-02d.02 class: sp800-53a prose: group and role membership are specified; + links: + - href: '#ac-2_smt.d.2' + rel: assessment-for - id: ac-2_obj.d.3 name: assessment-objective props: @@ -834,6 +927,9 @@ catalog: value: AC-02d.03[01] class: sp800-53a prose: access authorizations (i.e., privileges) are specified for each account; + links: + - href: '#ac-2_smt.d.3' + rel: assessment-for - id: ac-2_obj.d.3-2 name: assessment-objective props: @@ -841,6 +937,15 @@ catalog: value: AC-02d.03[02] class: sp800-53a prose: ' {{ insert: param, ac-02_odp.02 }} are specified for each account;' + links: + - href: '#ac-2_smt.d.3' + rel: assessment-for + links: + - href: '#ac-2_smt.d.3' + rel: assessment-for + links: + - href: '#ac-2_smt.d' + rel: assessment-for - id: ac-2_obj.e name: assessment-objective props: @@ -848,6 +953,9 @@ catalog: value: AC-02e. class: sp800-53a prose: 'approvals are required by {{ insert: param, ac-02_odp.03 }} for requests to create accounts;' + links: + - href: '#ac-2_smt.e' + rel: assessment-for - id: ac-2_obj.f name: assessment-objective props: @@ -862,6 +970,9 @@ catalog: value: AC-02f.[01] class: sp800-53a prose: 'accounts are created in accordance with {{ insert: param, ac-02_odp.04 }};' + links: + - href: '#ac-2_smt.f' + rel: assessment-for - id: ac-2_obj.f-2 name: assessment-objective props: @@ -869,6 +980,9 @@ catalog: value: AC-02f.[02] class: sp800-53a prose: 'accounts are enabled in accordance with {{ insert: param, ac-02_odp.04 }};' + links: + - href: '#ac-2_smt.f' + rel: assessment-for - id: ac-2_obj.f-3 name: assessment-objective props: @@ -876,6 +990,9 @@ catalog: value: AC-02f.[03] class: sp800-53a prose: 'accounts are modified in accordance with {{ insert: param, ac-02_odp.04 }};' + links: + - href: '#ac-2_smt.f' + rel: assessment-for - id: ac-2_obj.f-4 name: assessment-objective props: @@ -883,6 +1000,9 @@ catalog: value: AC-02f.[04] class: sp800-53a prose: 'accounts are disabled in accordance with {{ insert: param, ac-02_odp.04 }};' + links: + - href: '#ac-2_smt.f' + rel: assessment-for - id: ac-2_obj.f-5 name: assessment-objective props: @@ -890,6 +1010,12 @@ catalog: value: AC-02f.[05] class: sp800-53a prose: 'accounts are removed in accordance with {{ insert: param, ac-02_odp.04 }};' + links: + - href: '#ac-2_smt.f' + rel: assessment-for + links: + - href: '#ac-2_smt.f' + rel: assessment-for - id: ac-2_obj.g name: assessment-objective props: @@ -897,6 +1023,9 @@ catalog: value: AC-02g. class: sp800-53a prose: 'the use of accounts is monitored; ' + links: + - href: '#ac-2_smt.g' + rel: assessment-for - id: ac-2_obj.h name: assessment-objective props: @@ -911,6 +1040,9 @@ catalog: value: AC-02h.01 class: sp800-53a prose: 'account managers and {{ insert: param, ac-02_odp.05 }} are notified within {{ insert: param, ac-02_odp.06 }} when accounts are no longer required;' + links: + - href: '#ac-2_smt.h.1' + rel: assessment-for - id: ac-2_obj.h.2 name: assessment-objective props: @@ -918,6 +1050,9 @@ catalog: value: AC-02h.02 class: sp800-53a prose: 'account managers and {{ insert: param, ac-02_odp.05 }} are notified within {{ insert: param, ac-02_odp.07 }} when users are terminated or transferred;' + links: + - href: '#ac-2_smt.h.2' + rel: assessment-for - id: ac-2_obj.h.3 name: assessment-objective props: @@ -925,6 +1060,12 @@ catalog: value: AC-02h.03 class: sp800-53a prose: 'account managers and {{ insert: param, ac-02_odp.05 }} are notified within {{ insert: param, ac-02_odp.08 }} when system usage or the need to know changes for an individual;' + links: + - href: '#ac-2_smt.h.3' + rel: assessment-for + links: + - href: '#ac-2_smt.h' + rel: assessment-for - id: ac-2_obj.i name: assessment-objective props: @@ -939,6 +1080,9 @@ catalog: value: AC-02i.01 class: sp800-53a prose: access to the system is authorized based on a valid access authorization; + links: + - href: '#ac-2_smt.i.1' + rel: assessment-for - id: ac-2_obj.i.2 name: assessment-objective props: @@ -946,6 +1090,9 @@ catalog: value: AC-02i.02 class: sp800-53a prose: access to the system is authorized based on intended system usage; + links: + - href: '#ac-2_smt.i.2' + rel: assessment-for - id: ac-2_obj.i.3 name: assessment-objective props: @@ -953,6 +1100,12 @@ catalog: value: AC-02i.03 class: sp800-53a prose: 'access to the system is authorized based on {{ insert: param, ac-02_odp.09 }};' + links: + - href: '#ac-2_smt.i.3' + rel: assessment-for + links: + - href: '#ac-2_smt.i' + rel: assessment-for - id: ac-2_obj.j name: assessment-objective props: @@ -960,6 +1113,9 @@ catalog: value: AC-02j. class: sp800-53a prose: 'accounts are reviewed for compliance with account management requirements {{ insert: param, ac-02_odp.10 }};' + links: + - href: '#ac-2_smt.j' + rel: assessment-for - id: ac-2_obj.k name: assessment-objective props: @@ -974,6 +1130,9 @@ catalog: value: AC-02k.[01] class: sp800-53a prose: a process is established for changing shared or group account authenticators (if deployed) when individuals are removed from the group; + links: + - href: '#ac-2_smt.k' + rel: assessment-for - id: ac-2_obj.k-2 name: assessment-objective props: @@ -981,6 +1140,12 @@ catalog: value: AC-02k.[02] class: sp800-53a prose: a process is implemented for changing shared or group account authenticators (if deployed) when individuals are removed from the group; + links: + - href: '#ac-2_smt.k' + rel: assessment-for + links: + - href: '#ac-2_smt.k' + rel: assessment-for - id: ac-2_obj.l name: assessment-objective props: @@ -995,6 +1160,9 @@ catalog: value: AC-02l.[01] class: sp800-53a prose: account management processes are aligned with personnel termination processes; + links: + - href: '#ac-2_smt.l' + rel: assessment-for - id: ac-2_obj.l-2 name: assessment-objective props: @@ -1002,6 +1170,15 @@ catalog: value: AC-02l.[02] class: sp800-53a prose: account management processes are aligned with personnel transfer processes. + links: + - href: '#ac-2_smt.l' + rel: assessment-for + links: + - href: '#ac-2_smt.l' + rel: assessment-for + links: + - href: '#ac-2_smt' + rel: assessment-for - id: ac-2_asm-examine name: assessment-method props: @@ -1158,6 +1335,8 @@ catalog: rel: related - href: '#ia-11' rel: related + - href: '#ia-13' + rel: related - href: '#ma-3' rel: related - href: '#ma-4' @@ -1210,6 +1389,9 @@ catalog: value: AC-03 class: sp800-53a prose: approved authorizations for logical access to information and system resources are enforced in accordance with applicable access control policies. + links: + - href: '#ac-3_smt' + rel: assessment-for - id: ac-3_asm-examine name: assessment-method props: @@ -1398,6 +1580,9 @@ catalog: value: AC-07a. class: sp800-53a prose: 'a limit of {{ insert: param, ac-07_odp.01 }} consecutive invalid logon attempts by a user during {{ insert: param, ac-07_odp.02 }} is enforced;' + links: + - href: '#ac-7_smt.a' + rel: assessment-for - id: ac-7_obj.b name: assessment-objective props: @@ -1405,6 +1590,12 @@ catalog: value: AC-07b. class: sp800-53a prose: 'automatically {{ insert: param, ac-07_odp.03 }} when the maximum number of unsuccessful attempts is exceeded.' + links: + - href: '#ac-7_smt.b' + rel: assessment-for + links: + - href: '#ac-7_smt' + rel: assessment-for - id: ac-7_asm-examine name: assessment-method props: @@ -1598,6 +1789,9 @@ catalog: value: AC-08a.01 class: sp800-53a prose: the system use notification states that users are accessing a U.S. Government system; + links: + - href: '#ac-8_smt.a.1' + rel: assessment-for - id: ac-8_obj.a.2 name: assessment-objective props: @@ -1605,6 +1799,9 @@ catalog: value: AC-08a.02 class: sp800-53a prose: the system use notification states that system usage may be monitored, recorded, and subject to audit; + links: + - href: '#ac-8_smt.a.2' + rel: assessment-for - id: ac-8_obj.a.3 name: assessment-objective props: @@ -1612,6 +1809,9 @@ catalog: value: AC-08a.03 class: sp800-53a prose: the system use notification states that unauthorized use of the system is prohibited and subject to criminal and civil penalties; and + links: + - href: '#ac-8_smt.a.3' + rel: assessment-for - id: ac-8_obj.a.4 name: assessment-objective props: @@ -1619,6 +1819,12 @@ catalog: value: AC-08a.04 class: sp800-53a prose: the system use notification states that use of the system indicates consent to monitoring and recording; + links: + - href: '#ac-8_smt.a.4' + rel: assessment-for + links: + - href: '#ac-8_smt.a' + rel: assessment-for - id: ac-8_obj.b name: assessment-objective props: @@ -1626,6 +1832,9 @@ catalog: value: AC-08b. class: sp800-53a prose: the notification message or banner is retained on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the system; + links: + - href: '#ac-8_smt.b' + rel: assessment-for - id: ac-8_obj.c name: assessment-objective props: @@ -1640,6 +1849,9 @@ catalog: value: AC-08c.01 class: sp800-53a prose: 'for publicly accessible systems, system use information {{ insert: param, ac-08_odp.02 }} is displayed before granting further access to the publicly accessible system;' + links: + - href: '#ac-8_smt.c.1' + rel: assessment-for - id: ac-8_obj.c.2 name: assessment-objective props: @@ -1647,6 +1859,9 @@ catalog: value: AC-08c.02 class: sp800-53a prose: for publicly accessible systems, any references to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities are displayed; + links: + - href: '#ac-8_smt.c.2' + rel: assessment-for - id: ac-8_obj.c.3 name: assessment-objective props: @@ -1654,6 +1869,15 @@ catalog: value: AC-08c.03 class: sp800-53a prose: for publicly accessible systems, a description of the authorized uses of the system is included. + links: + - href: '#ac-8_smt.c.3' + rel: assessment-for + links: + - href: '#ac-8_smt.c' + rel: assessment-for + links: + - href: '#ac-8_smt' + rel: assessment-for - id: ac-8_asm-examine name: assessment-method props: @@ -1787,6 +2011,9 @@ catalog: value: AC-14a. class: sp800-53a prose: ' {{ insert: param, ac-14_odp }} that can be performed on the system without identification or authentication consistent with organizational mission and business functions are identified;' + links: + - href: '#ac-14_smt.a' + rel: assessment-for - id: ac-14_obj.b name: assessment-objective props: @@ -1801,6 +2028,9 @@ catalog: value: AC-14b.[01] class: sp800-53a prose: user actions not requiring identification or authentication are documented in the security plan for the system; + links: + - href: '#ac-14_smt.b' + rel: assessment-for - id: ac-14_obj.b-2 name: assessment-objective props: @@ -1808,6 +2038,15 @@ catalog: value: AC-14b.[02] class: sp800-53a prose: a rationale for user actions not requiring identification or authentication is provided in the security plan for the system. + links: + - href: '#ac-14_smt.b' + rel: assessment-for + links: + - href: '#ac-14_smt.b' + rel: assessment-for + links: + - href: '#ac-14_smt' + rel: assessment-for - id: ac-14_asm-examine name: assessment-method props: @@ -1955,6 +2194,9 @@ catalog: value: AC-17a.[01] class: sp800-53a prose: usage restrictions are established and documented for each type of remote access allowed; + links: + - href: '#ac-17_smt.a' + rel: assessment-for - id: ac-17_obj.a-2 name: assessment-objective props: @@ -1962,6 +2204,9 @@ catalog: value: AC-17a.[02] class: sp800-53a prose: configuration/connection requirements are established and documented for each type of remote access allowed; + links: + - href: '#ac-17_smt.a' + rel: assessment-for - id: ac-17_obj.a-3 name: assessment-objective props: @@ -1969,6 +2214,12 @@ catalog: value: AC-17a.[03] class: sp800-53a prose: implementation guidance is established and documented for each type of remote access allowed; + links: + - href: '#ac-17_smt.a' + rel: assessment-for + links: + - href: '#ac-17_smt.a' + rel: assessment-for - id: ac-17_obj.b name: assessment-objective props: @@ -1976,6 +2227,12 @@ catalog: value: AC-17b. class: sp800-53a prose: each type of remote access to the system is authorized prior to allowing such connections. + links: + - href: '#ac-17_smt.b' + rel: assessment-for + links: + - href: '#ac-17_smt' + rel: assessment-for - id: ac-17_asm-examine name: assessment-method props: @@ -2117,6 +2374,9 @@ catalog: value: AC-18a.[01] class: sp800-53a prose: configuration requirements are established for each type of wireless access; + links: + - href: '#ac-18_smt.a' + rel: assessment-for - id: ac-18_obj.a-2 name: assessment-objective props: @@ -2124,6 +2384,9 @@ catalog: value: AC-18a.[02] class: sp800-53a prose: connection requirements are established for each type of wireless access; + links: + - href: '#ac-18_smt.a' + rel: assessment-for - id: ac-18_obj.a-3 name: assessment-objective props: @@ -2131,6 +2394,12 @@ catalog: value: AC-18a.[03] class: sp800-53a prose: implementation guidance is established for each type of wireless access; + links: + - href: '#ac-18_smt.a' + rel: assessment-for + links: + - href: '#ac-18_smt.a' + rel: assessment-for - id: ac-18_obj.b name: assessment-objective props: @@ -2138,6 +2407,12 @@ catalog: value: AC-18b. class: sp800-53a prose: each type of wireless access to the system is authorized prior to allowing such connections. + links: + - href: '#ac-18_smt.b' + rel: assessment-for + links: + - href: '#ac-18_smt' + rel: assessment-for - id: ac-18_asm-examine name: assessment-method props: @@ -2302,6 +2577,9 @@ catalog: value: AC-19a.[01] class: sp800-53a prose: configuration requirements are established for organization-controlled mobile devices, including when such devices are outside of the controlled area; + links: + - href: '#ac-19_smt.a' + rel: assessment-for - id: ac-19_obj.a-2 name: assessment-objective props: @@ -2309,6 +2587,9 @@ catalog: value: AC-19a.[02] class: sp800-53a prose: connection requirements are established for organization-controlled mobile devices, including when such devices are outside of the controlled area; + links: + - href: '#ac-19_smt.a' + rel: assessment-for - id: ac-19_obj.a-3 name: assessment-objective props: @@ -2316,6 +2597,12 @@ catalog: value: AC-19a.[03] class: sp800-53a prose: implementation guidance is established for organization-controlled mobile devices, including when such devices are outside of the controlled area; + links: + - href: '#ac-19_smt.a' + rel: assessment-for + links: + - href: '#ac-19_smt.a' + rel: assessment-for - id: ac-19_obj.b name: assessment-objective props: @@ -2323,6 +2610,12 @@ catalog: value: AC-19b. class: sp800-53a prose: the connection of mobile devices to organizational systems is authorized. + links: + - href: '#ac-19_smt.b' + rel: assessment-for + links: + - href: '#ac-19_smt' + rel: assessment-for - id: ac-19_asm-examine name: assessment-method props: @@ -2527,16 +2820,25 @@ catalog: name: assessment-objective props: - name: label - value: AC-20a.1 + value: AC-20a.01 class: sp800-53a prose: ' {{ insert: param, ac-20_odp.01 }} is/are consistent with the trust relationships established with other organizations owning, operating, and/or maintaining external systems, allowing authorized individuals to access the system from external systems (if applicable);' + links: + - href: '#ac-20_smt.a.1' + rel: assessment-for - id: ac-20_obj.a.2 name: assessment-objective props: - name: label - value: AC-20a.2 + value: AC-20a.02 class: sp800-53a prose: ' {{ insert: param, ac-20_odp.01 }} is/are consistent with the trust relationships established with other organizations owning, operating, and/or maintaining external systems, allowing authorized individuals to process, store, or transmit organization-controlled information using external systems (if applicable);' + links: + - href: '#ac-20_smt.a.2' + rel: assessment-for + links: + - href: '#ac-20_smt.a' + rel: assessment-for - id: ac-20_obj.b name: assessment-objective props: @@ -2544,6 +2846,12 @@ catalog: value: AC-20b. class: sp800-53a prose: 'the use of {{ insert: param, ac-20_odp.04 }} is prohibited (if applicable).' + links: + - href: '#ac-20_smt.b' + rel: assessment-for + links: + - href: '#ac-20_smt' + rel: assessment-for - id: ac-20_asm-examine name: assessment-method props: @@ -2681,6 +2989,9 @@ catalog: value: AC-22a. class: sp800-53a prose: designated individuals are authorized to make information publicly accessible; + links: + - href: '#ac-22_smt.a' + rel: assessment-for - id: ac-22_obj.b name: assessment-objective props: @@ -2688,6 +2999,9 @@ catalog: value: AC-22b. class: sp800-53a prose: authorized individuals are trained to ensure that publicly accessible information does not contain non-public information; + links: + - href: '#ac-22_smt.b' + rel: assessment-for - id: ac-22_obj.c name: assessment-objective props: @@ -2695,6 +3009,9 @@ catalog: value: AC-22c. class: sp800-53a prose: the proposed content of information is reviewed prior to posting onto the publicly accessible system to ensure that non-public information is not included; + links: + - href: '#ac-22_smt.c' + rel: assessment-for - id: ac-22_obj.d name: assessment-objective props: @@ -2709,6 +3026,9 @@ catalog: value: AC-22d.[01] class: sp800-53a prose: 'the content on the publicly accessible system is reviewed for non-public information {{ insert: param, ac-22_odp }};' + links: + - href: '#ac-22_smt.d' + rel: assessment-for - id: ac-22_obj.d-2 name: assessment-objective props: @@ -2716,6 +3036,15 @@ catalog: value: AC-22d.[02] class: sp800-53a prose: non-public information is removed from the publicly accessible system, if discovered. + links: + - href: '#ac-22_smt.d' + rel: assessment-for + links: + - href: '#ac-22_smt.d' + rel: assessment-for + links: + - href: '#ac-22_smt' + rel: assessment-for - id: ac-22_asm-examine name: assessment-method props: @@ -2988,6 +3317,9 @@ catalog: value: AT-01a.[01] class: sp800-53a prose: 'an awareness and training policy is developed and documented; ' + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.a-2 name: assessment-objective props: @@ -2995,6 +3327,9 @@ catalog: value: AT-01a.[02] class: sp800-53a prose: 'the awareness and training policy is disseminated to {{ insert: param, at-01_odp.01 }};' + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.a-3 name: assessment-objective props: @@ -3002,6 +3337,9 @@ catalog: value: AT-01a.[03] class: sp800-53a prose: awareness and training procedures to facilitate the implementation of the awareness and training policy and associated access controls are developed and documented; + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.a-4 name: assessment-objective props: @@ -3009,6 +3347,9 @@ catalog: value: AT-01a.[04] class: sp800-53a prose: 'the awareness and training procedures are disseminated to {{ insert: param, at-01_odp.02 }}.' + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.a.1 name: assessment-objective props: @@ -3030,6 +3371,9 @@ catalog: value: AT-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses purpose;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-2 name: assessment-objective props: @@ -3037,6 +3381,9 @@ catalog: value: AT-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses scope;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-3 name: assessment-objective props: @@ -3044,6 +3391,9 @@ catalog: value: AT-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses roles;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-4 name: assessment-objective props: @@ -3051,6 +3401,9 @@ catalog: value: AT-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses responsibilities;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-5 name: assessment-objective props: @@ -3058,6 +3411,9 @@ catalog: value: AT-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses management commitment;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-6 name: assessment-objective props: @@ -3065,6 +3421,9 @@ catalog: value: AT-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses coordination among organizational entities;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-7 name: assessment-objective props: @@ -3072,6 +3431,12 @@ catalog: value: AT-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses compliance; and' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.b name: assessment-objective props: @@ -3079,6 +3444,15 @@ catalog: value: AT-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines; and' + links: + - href: '#at-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#at-1_smt.a.1' + rel: assessment-for + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.b name: assessment-objective props: @@ -3086,6 +3460,9 @@ catalog: value: AT-01b. class: sp800-53a prose: 'the {{ insert: param, at-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the awareness and training policy and procedures;' + links: + - href: '#at-1_smt.b' + rel: assessment-for - id: at-1_obj.c name: assessment-objective props: @@ -3107,6 +3484,9 @@ catalog: value: AT-01c.01[01] class: sp800-53a prose: 'the current awareness and training policy is reviewed and updated {{ insert: param, at-01_odp.05 }}; ' + links: + - href: '#at-1_smt.c.1' + rel: assessment-for - id: at-1_obj.c.1-2 name: assessment-objective props: @@ -3114,6 +3494,12 @@ catalog: value: AT-01c.01[02] class: sp800-53a prose: 'the current awareness and training policy is reviewed and updated following {{ insert: param, at-01_odp.06 }};' + links: + - href: '#at-1_smt.c.1' + rel: assessment-for + links: + - href: '#at-1_smt.c.1' + rel: assessment-for - id: at-1_obj.c.2 name: assessment-objective props: @@ -3128,6 +3514,9 @@ catalog: value: AT-01c.02[01] class: sp800-53a prose: 'the current awareness and training procedures are reviewed and updated {{ insert: param, at-01_odp.07 }};' + links: + - href: '#at-1_smt.c.2' + rel: assessment-for - id: at-1_obj.c.2-2 name: assessment-objective props: @@ -3135,6 +3524,18 @@ catalog: value: AT-01c.02[02] class: sp800-53a prose: 'the current awareness and training procedures are reviewed and updated following {{ insert: param, at-01_odp.08 }}.' + links: + - href: '#at-1_smt.c.2' + rel: assessment-for + links: + - href: '#at-1_smt.c.2' + rel: assessment-for + links: + - href: '#at-1_smt.c' + rel: assessment-for + links: + - href: '#at-1_smt' + rel: assessment-for - id: at-1_asm-examine name: assessment-method props: @@ -3387,6 +3788,9 @@ catalog: value: AT-02a.01[01] class: sp800-53a prose: security literacy training is provided to system users (including managers, senior executives, and contractors) as part of initial training for new users; + links: + - href: '#at-2_smt.a.1' + rel: assessment-for - id: at-2_obj.a.1-2 name: assessment-objective props: @@ -3394,6 +3798,9 @@ catalog: value: AT-02a.01[02] class: sp800-53a prose: privacy literacy training is provided to system users (including managers, senior executives, and contractors) as part of initial training for new users; + links: + - href: '#at-2_smt.a.1' + rel: assessment-for - id: at-2_obj.a.1-3 name: assessment-objective props: @@ -3401,6 +3808,9 @@ catalog: value: AT-02a.01[03] class: sp800-53a prose: 'security literacy training is provided to system users (including managers, senior executives, and contractors) {{ insert: param, at-02_odp.01 }} thereafter;' + links: + - href: '#at-2_smt.a.1' + rel: assessment-for - id: at-2_obj.a.1-4 name: assessment-objective props: @@ -3408,6 +3818,12 @@ catalog: value: AT-02a.01[04] class: sp800-53a prose: 'privacy literacy training is provided to system users (including managers, senior executives, and contractors) {{ insert: param, at-02_odp.02 }} thereafter;' + links: + - href: '#at-2_smt.a.1' + rel: assessment-for + links: + - href: '#at-2_smt.a.1' + rel: assessment-for - id: at-2_obj.a.2 name: assessment-objective props: @@ -3422,6 +3838,9 @@ catalog: value: AT-02a.02[01] class: sp800-53a prose: 'security literacy training is provided to system users (including managers, senior executives, and contractors) when required by system changes or following {{ insert: param, at-02_odp.03 }};' + links: + - href: '#at-2_smt.a.2' + rel: assessment-for - id: at-2_obj.a.2-2 name: assessment-objective props: @@ -3429,6 +3848,15 @@ catalog: value: AT-02a.02[02] class: sp800-53a prose: 'privacy literacy training is provided to system users (including managers, senior executives, and contractors) when required by system changes or following {{ insert: param, at-02_odp.04 }};' + links: + - href: '#at-2_smt.a.2' + rel: assessment-for + links: + - href: '#at-2_smt.a.2' + rel: assessment-for + links: + - href: '#at-2_smt.a' + rel: assessment-for - id: at-2_obj.b name: assessment-objective props: @@ -3436,6 +3864,9 @@ catalog: value: AT-02b. class: sp800-53a prose: ' {{ insert: param, at-02_odp.05 }} are employed to increase the security and privacy awareness of system users;' + links: + - href: '#at-2_smt.b' + rel: assessment-for - id: at-2_obj.c name: assessment-objective props: @@ -3450,6 +3881,9 @@ catalog: value: AT-02c.[01] class: sp800-53a prose: 'literacy training and awareness content is updated {{ insert: param, at-02_odp.06 }};' + links: + - href: '#at-2_smt.c' + rel: assessment-for - id: at-2_obj.c-2 name: assessment-objective props: @@ -3457,6 +3891,12 @@ catalog: value: AT-02c.[02] class: sp800-53a prose: 'literacy training and awareness content is updated following {{ insert: param, at-02_odp.07 }};' + links: + - href: '#at-2_smt.c' + rel: assessment-for + links: + - href: '#at-2_smt.c' + rel: assessment-for - id: at-2_obj.d name: assessment-objective props: @@ -3464,6 +3904,12 @@ catalog: value: AT-02d. class: sp800-53a prose: lessons learned from internal or external security incidents or breaches are incorporated into literacy training and awareness techniques. + links: + - href: '#at-2_smt.d' + rel: assessment-for + links: + - href: '#at-2_smt' + rel: assessment-for - id: at-2_asm-examine name: assessment-method props: @@ -3566,6 +4012,9 @@ catalog: value: AT-02(02)[01] class: sp800-53a prose: literacy training on recognizing potential indicators of insider threat is provided; + links: + - href: '#at-2.2_smt' + rel: assessment-for - id: at-2.2_obj-2 name: assessment-objective props: @@ -3573,6 +4022,12 @@ catalog: value: AT-02(02)[02] class: sp800-53a prose: literacy training on reporting potential indicators of insider threat is provided. + links: + - href: '#at-2.2_smt' + rel: assessment-for + links: + - href: '#at-2.2_smt' + rel: assessment-for - id: at-2.2_asm-examine name: assessment-method props: @@ -3808,6 +4263,9 @@ catalog: value: AT-03a.01[01] class: sp800-53a prose: 'role-based security training is provided to {{ insert: param, at-03_odp.01 }} before authorizing access to the system, information, or performing assigned duties;' + links: + - href: '#at-3_smt.a.1' + rel: assessment-for - id: at-3_obj.a.1-2 name: assessment-objective props: @@ -3815,6 +4273,9 @@ catalog: value: AT-03a.01[02] class: sp800-53a prose: 'role-based privacy training is provided to {{ insert: param, at-03_odp.02 }} before authorizing access to the system, information, or performing assigned duties;' + links: + - href: '#at-3_smt.a.1' + rel: assessment-for - id: at-3_obj.a.1-3 name: assessment-objective props: @@ -3822,6 +4283,9 @@ catalog: value: AT-03a.01[03] class: sp800-53a prose: 'role-based security training is provided to {{ insert: param, at-03_odp.01 }} {{ insert: param, at-03_odp.03 }} thereafter;' + links: + - href: '#at-3_smt.a.1' + rel: assessment-for - id: at-3_obj.a.1-4 name: assessment-objective props: @@ -3829,6 +4293,12 @@ catalog: value: AT-03a.01[04] class: sp800-53a prose: 'role-based privacy training is provided to {{ insert: param, at-03_odp.02 }} {{ insert: param, at-03_odp.03 }} thereafter;' + links: + - href: '#at-3_smt.a.1' + rel: assessment-for + links: + - href: '#at-3_smt.a.1' + rel: assessment-for - id: at-3_obj.a.2 name: assessment-objective props: @@ -3843,6 +4313,9 @@ catalog: value: AT-03a.02[01] class: sp800-53a prose: role-based security training is provided to personnel with assigned security roles and responsibilities when required by system changes; + links: + - href: '#at-3_smt.a.2' + rel: assessment-for - id: at-3_obj.a.2-2 name: assessment-objective props: @@ -3850,6 +4323,15 @@ catalog: value: AT-03a.02[02] class: sp800-53a prose: role-based privacy training is provided to personnel with assigned security roles and responsibilities when required by system changes; + links: + - href: '#at-3_smt.a.2' + rel: assessment-for + links: + - href: '#at-3_smt.a.2' + rel: assessment-for + links: + - href: '#at-3_smt.a' + rel: assessment-for - id: at-3_obj.b name: assessment-objective props: @@ -3864,6 +4346,9 @@ catalog: value: AT-03b.[01] class: sp800-53a prose: 'role-based training content is updated {{ insert: param, at-03_odp.04 }};' + links: + - href: '#at-3_smt.b' + rel: assessment-for - id: at-3_obj.b-2 name: assessment-objective props: @@ -3871,6 +4356,12 @@ catalog: value: AT-03b.[02] class: sp800-53a prose: 'role-based training content is updated following {{ insert: param, at-03_odp.05 }};' + links: + - href: '#at-3_smt.b' + rel: assessment-for + links: + - href: '#at-3_smt.b' + rel: assessment-for - id: at-3_obj.c name: assessment-objective props: @@ -3878,6 +4369,12 @@ catalog: value: AT-03c. class: sp800-53a prose: lessons learned from internal or external security incidents or breaches are incorporated into role-based training. + links: + - href: '#at-3_smt.c' + rel: assessment-for + links: + - href: '#at-3_smt' + rel: assessment-for - id: at-3_asm-examine name: assessment-method props: @@ -4017,6 +4514,9 @@ catalog: value: AT-04a.[01] class: sp800-53a prose: information security and privacy training activities, including security and privacy awareness training and specific role-based security and privacy training, are documented; + links: + - href: '#at-4_smt.a' + rel: assessment-for - id: at-4_obj.a-2 name: assessment-objective props: @@ -4024,6 +4524,12 @@ catalog: value: AT-04a.[02] class: sp800-53a prose: information security and privacy training activities, including security and privacy awareness training and specific role-based security and privacy training, are monitored; + links: + - href: '#at-4_smt.a' + rel: assessment-for + links: + - href: '#at-4_smt.a' + rel: assessment-for - id: at-4_obj.b name: assessment-objective props: @@ -4031,6 +4537,12 @@ catalog: value: AT-04b. class: sp800-53a prose: 'individual training records are retained for {{ insert: param, at-04_odp }}.' + links: + - href: '#at-4_smt.b' + rel: assessment-for + links: + - href: '#at-4_smt' + rel: assessment-for - id: at-4_asm-examine name: assessment-method props: @@ -4288,6 +4800,9 @@ catalog: value: AU-01a.[01] class: sp800-53a prose: an audit and accountability policy is developed and documented; + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.a-2 name: assessment-objective props: @@ -4295,6 +4810,9 @@ catalog: value: AU-01a.[02] class: sp800-53a prose: 'the audit and accountability policy is disseminated to {{ insert: param, au-01_odp.01 }};' + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.a-3 name: assessment-objective props: @@ -4302,6 +4820,9 @@ catalog: value: AU-01a.[03] class: sp800-53a prose: audit and accountability procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls are developed and documented; + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.a-4 name: assessment-objective props: @@ -4309,6 +4830,9 @@ catalog: value: AU-01a.[04] class: sp800-53a prose: 'the audit and accountability procedures are disseminated to {{ insert: param, au-01_odp.02 }};' + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.a.1 name: assessment-objective props: @@ -4330,6 +4854,9 @@ catalog: value: AU-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses purpose;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-2 name: assessment-objective props: @@ -4337,6 +4864,9 @@ catalog: value: AU-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses scope;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-3 name: assessment-objective props: @@ -4344,6 +4874,9 @@ catalog: value: AU-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses roles;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-4 name: assessment-objective props: @@ -4351,6 +4884,9 @@ catalog: value: AU-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses responsibilities;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-5 name: assessment-objective props: @@ -4358,6 +4894,9 @@ catalog: value: AU-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses management commitment;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-6 name: assessment-objective props: @@ -4365,6 +4904,9 @@ catalog: value: AU-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses coordination among organizational entities;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-7 name: assessment-objective props: @@ -4372,6 +4914,12 @@ catalog: value: AU-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses compliance;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.b name: assessment-objective props: @@ -4379,6 +4927,15 @@ catalog: value: AU-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#au-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#au-1_smt.a.1' + rel: assessment-for + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.b name: assessment-objective props: @@ -4386,6 +4943,9 @@ catalog: value: AU-01b. class: sp800-53a prose: 'the {{ insert: param, au-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the audit and accountability policy and procedures;' + links: + - href: '#au-1_smt.b' + rel: assessment-for - id: au-1_obj.c name: assessment-objective props: @@ -4407,6 +4967,9 @@ catalog: value: AU-01c.01[01] class: sp800-53a prose: 'the current audit and accountability policy is reviewed and updated {{ insert: param, au-01_odp.05 }};' + links: + - href: '#au-1_smt.c.1' + rel: assessment-for - id: au-1_obj.c.1-2 name: assessment-objective props: @@ -4414,6 +4977,12 @@ catalog: value: AU-01c.01[02] class: sp800-53a prose: 'the current audit and accountability policy is reviewed and updated following {{ insert: param, au-01_odp.06 }};' + links: + - href: '#au-1_smt.c.1' + rel: assessment-for + links: + - href: '#au-1_smt.c.1' + rel: assessment-for - id: au-1_obj.c.2 name: assessment-objective props: @@ -4428,6 +4997,9 @@ catalog: value: AU-01c.02[01] class: sp800-53a prose: 'the current audit and accountability procedures are reviewed and updated {{ insert: param, au-01_odp.07 }};' + links: + - href: '#au-1_smt.c.2' + rel: assessment-for - id: au-1_obj.c.2-2 name: assessment-objective props: @@ -4435,6 +5007,18 @@ catalog: value: AU-01c.02[02] class: sp800-53a prose: 'the current audit and accountability procedures are reviewed and updated following {{ insert: param, au-01_odp.08 }}.' + links: + - href: '#au-1_smt.c.2' + rel: assessment-for + links: + - href: '#au-1_smt.c.2' + rel: assessment-for + links: + - href: '#au-1_smt.c' + rel: assessment-for + links: + - href: '#au-1_smt' + rel: assessment-for - id: au-1_asm-examine name: assessment-method props: @@ -4661,6 +5245,9 @@ catalog: value: AU-02a. class: sp800-53a prose: ' {{ insert: param, au-02_odp.01 }} that the system is capable of logging are identified in support of the audit logging function;' + links: + - href: '#au-2_smt.a' + rel: assessment-for - id: au-2_obj.b name: assessment-objective props: @@ -4668,6 +5255,9 @@ catalog: value: AU-02b. class: sp800-53a prose: the event logging function is coordinated with other organizational entities requiring audit-related information to guide and inform the selection criteria for events to be logged; + links: + - href: '#au-2_smt.b' + rel: assessment-for - id: au-2_obj.c name: assessment-objective props: @@ -4682,6 +5272,9 @@ catalog: value: AU-02c.[01] class: sp800-53a prose: ' {{ insert: param, au-02_odp.02 }} are specified for logging within the system;' + links: + - href: '#au-2_smt.c' + rel: assessment-for - id: au-2_obj.c-2 name: assessment-objective props: @@ -4689,6 +5282,12 @@ catalog: value: AU-02c.[02] class: sp800-53a prose: 'the specified event types are logged within the system {{ insert: param, au-02_odp.03 }};' + links: + - href: '#au-2_smt.c' + rel: assessment-for + links: + - href: '#au-2_smt.c' + rel: assessment-for - id: au-2_obj.d name: assessment-objective props: @@ -4696,6 +5295,9 @@ catalog: value: AU-02d. class: sp800-53a prose: a rationale is provided for why the event types selected for logging are deemed to be adequate to support after-the-fact investigations of incidents; + links: + - href: '#au-2_smt.d' + rel: assessment-for - id: au-2_obj.e name: assessment-objective props: @@ -4703,6 +5305,12 @@ catalog: value: AU-02e. class: sp800-53a prose: 'the event types selected for logging are reviewed and updated {{ insert: param, au-02_odp.04 }}.' + links: + - href: '#au-2_smt.e' + rel: assessment-for + links: + - href: '#au-2_smt' + rel: assessment-for - id: au-2_asm-examine name: assessment-method props: @@ -4856,6 +5464,9 @@ catalog: value: AU-03a. class: sp800-53a prose: audit records contain information that establishes what type of event occurred; + links: + - href: '#au-3_smt.a' + rel: assessment-for - id: au-3_obj.b name: assessment-objective props: @@ -4863,6 +5474,9 @@ catalog: value: AU-03b. class: sp800-53a prose: audit records contain information that establishes when the event occurred; + links: + - href: '#au-3_smt.b' + rel: assessment-for - id: au-3_obj.c name: assessment-objective props: @@ -4870,6 +5484,9 @@ catalog: value: AU-03c. class: sp800-53a prose: audit records contain information that establishes where the event occurred; + links: + - href: '#au-3_smt.c' + rel: assessment-for - id: au-3_obj.d name: assessment-objective props: @@ -4877,6 +5494,9 @@ catalog: value: AU-03d. class: sp800-53a prose: audit records contain information that establishes the source of the event; + links: + - href: '#au-3_smt.d' + rel: assessment-for - id: au-3_obj.e name: assessment-objective props: @@ -4884,6 +5504,9 @@ catalog: value: AU-03e. class: sp800-53a prose: audit records contain information that establishes the outcome of the event; + links: + - href: '#au-3_smt.e' + rel: assessment-for - id: au-3_obj.f name: assessment-objective props: @@ -4891,6 +5514,12 @@ catalog: value: AU-03f. class: sp800-53a prose: audit records contain information that establishes the identity of any individuals, subjects, or objects/entities associated with the event. + links: + - href: '#au-3_smt.f' + rel: assessment-for + links: + - href: '#au-3_smt' + rel: assessment-for - id: au-3_asm-examine name: assessment-method props: @@ -5012,6 +5641,9 @@ catalog: value: AU-04 class: sp800-53a prose: 'audit log storage capacity is allocated to accommodate {{ insert: param, au-04_odp }}.' + links: + - href: '#au-4_smt' + rel: assessment-for - id: au-4_asm-examine name: assessment-method props: @@ -5171,6 +5803,9 @@ catalog: value: AU-05a. class: sp800-53a prose: ' {{ insert: param, au-05_odp.01 }} are alerted in the event of an audit logging process failure within {{ insert: param, au-05_odp.02 }};' + links: + - href: '#au-5_smt.a' + rel: assessment-for - id: au-5_obj.b name: assessment-objective props: @@ -5178,6 +5813,12 @@ catalog: value: AU-05b. class: sp800-53a prose: ' {{ insert: param, au-05_odp.03 }} are taken in the event of an audit logging process failure.' + links: + - href: '#au-5_smt.b' + rel: assessment-for + links: + - href: '#au-5_smt' + rel: assessment-for - id: au-5_asm-examine name: assessment-method props: @@ -5390,6 +6031,9 @@ catalog: value: AU-06a. class: sp800-53a prose: 'system audit records are reviewed and analyzed {{ insert: param, au-06_odp.01 }} for indications of {{ insert: param, au-06_odp.02 }} and the potential impact of the inappropriate or unusual activity;' + links: + - href: '#au-6_smt.a' + rel: assessment-for - id: au-6_obj.b name: assessment-objective props: @@ -5397,6 +6041,9 @@ catalog: value: AU-06b. class: sp800-53a prose: 'findings are reported to {{ insert: param, au-06_odp.03 }};' + links: + - href: '#au-6_smt.b' + rel: assessment-for - id: au-6_obj.c name: assessment-objective props: @@ -5404,6 +6051,12 @@ catalog: value: AU-06c. class: sp800-53a prose: the level of audit record review, analysis, and reporting within the system is adjusted when there is a change in risk based on law enforcement information, intelligence information, or other credible sources of information. + links: + - href: '#au-6_smt.c' + rel: assessment-for + links: + - href: '#au-6_smt' + rel: assessment-for - id: au-6_asm-examine name: assessment-method props: @@ -5511,6 +6164,9 @@ catalog: value: AU-08a. class: sp800-53a prose: internal system clocks are used to generate timestamps for audit records; + links: + - href: '#au-8_smt.a' + rel: assessment-for - id: au-8_obj.b name: assessment-objective props: @@ -5518,6 +6174,12 @@ catalog: value: AU-08b. class: sp800-53a prose: 'timestamps are recorded for audit records that meet {{ insert: param, au-08_odp }} and that use Coordinated Universal Time, have a fixed local time offset from Coordinated Universal Time, or include the local time offset as part of the timestamp.' + links: + - href: '#au-8_smt.b' + rel: assessment-for + links: + - href: '#au-8_smt' + rel: assessment-for - id: au-8_asm-examine name: assessment-method props: @@ -5667,6 +6329,9 @@ catalog: value: AU-09a. class: sp800-53a prose: audit information and audit logging tools are protected from unauthorized access, modification, and deletion; + links: + - href: '#au-9_smt.a' + rel: assessment-for - id: au-9_obj.b name: assessment-objective props: @@ -5674,6 +6339,12 @@ catalog: value: AU-09b. class: sp800-53a prose: ' {{ insert: param, au-09_odp }} are alerted upon detection of unauthorized access, modification, or deletion of audit information.' + links: + - href: '#au-9_smt.b' + rel: assessment-for + links: + - href: '#au-9_smt' + rel: assessment-for - id: au-9_asm-examine name: assessment-method props: @@ -5799,6 +6470,9 @@ catalog: value: AU-11 class: sp800-53a prose: 'audit records are retained for {{ insert: param, au-11_odp }} to provide support for after-the-fact investigations of incidents and to meet regulatory and organizational information retention requirements.' + links: + - href: '#au-11_smt' + rel: assessment-for - id: au-11_asm-examine name: assessment-method props: @@ -5960,6 +6634,9 @@ catalog: value: AU-12a. class: sp800-53a prose: 'audit record generation capability for the event types the system is capable of auditing (defined in AU-02_ODP[01]) is provided by {{ insert: param, au-12_odp.01 }};' + links: + - href: '#au-12_smt.a' + rel: assessment-for - id: au-12_obj.b name: assessment-objective props: @@ -5967,6 +6644,9 @@ catalog: value: AU-12b. class: sp800-53a prose: ' {{ insert: param, au-12_odp.02 }} is/are allowed to select the event types that are to be logged by specific components of the system;' + links: + - href: '#au-12_smt.b' + rel: assessment-for - id: au-12_obj.c name: assessment-objective props: @@ -5974,6 +6654,12 @@ catalog: value: AU-12c. class: sp800-53a prose: audit records for the event types defined in AU-02_ODP[02] that include the audit record content defined in AU-03 are generated. + links: + - href: '#au-12_smt.c' + rel: assessment-for + links: + - href: '#au-12_smt' + rel: assessment-for - id: au-12_asm-examine name: assessment-method props: @@ -6256,6 +6942,9 @@ catalog: value: CA-01a.[01] class: sp800-53a prose: an assessment, authorization, and monitoring policy is developed and documented; + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.a-2 name: assessment-objective props: @@ -6263,6 +6952,9 @@ catalog: value: CA-01a.[02] class: sp800-53a prose: 'the assessment, authorization, and monitoring policy is disseminated to {{ insert: param, ca-01_odp.01 }};' + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.a-3 name: assessment-objective props: @@ -6270,6 +6962,9 @@ catalog: value: CA-01a.[03] class: sp800-53a prose: assessment, authorization, and monitoring procedures to facilitate the implementation of the assessment, authorization, and monitoring policy and associated assessment, authorization, and monitoring controls are developed and documented; + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.a-4 name: assessment-objective props: @@ -6277,6 +6972,9 @@ catalog: value: CA-01a.[04] class: sp800-53a prose: 'the assessment, authorization, and monitoring procedures are disseminated to {{ insert: param, ca-01_odp.02 }};' + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.a.1 name: assessment-objective props: @@ -6298,6 +6996,9 @@ catalog: value: CA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses purpose;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-2 name: assessment-objective props: @@ -6305,6 +7006,9 @@ catalog: value: CA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses scope;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-3 name: assessment-objective props: @@ -6312,6 +7016,9 @@ catalog: value: CA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses roles;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-4 name: assessment-objective props: @@ -6319,6 +7026,9 @@ catalog: value: CA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses responsibilities;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-5 name: assessment-objective props: @@ -6326,6 +7036,9 @@ catalog: value: CA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses management commitment;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-6 name: assessment-objective props: @@ -6333,6 +7046,9 @@ catalog: value: CA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses coordination among organizational entities;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-7 name: assessment-objective props: @@ -6340,6 +7056,12 @@ catalog: value: CA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses compliance;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.b name: assessment-objective props: @@ -6347,6 +7069,15 @@ catalog: value: CA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ca-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ca-1_smt.a.1' + rel: assessment-for + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.b name: assessment-objective props: @@ -6354,6 +7085,9 @@ catalog: value: CA-01b. class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the assessment, authorization, and monitoring policy and procedures;' + links: + - href: '#ca-1_smt.b' + rel: assessment-for - id: ca-1_obj.c name: assessment-objective props: @@ -6375,6 +7109,9 @@ catalog: value: CA-01c.01[01] class: sp800-53a prose: 'the current assessment, authorization, and monitoring policy is reviewed and updated {{ insert: param, ca-01_odp.05 }}; ' + links: + - href: '#ca-1_smt.c.1' + rel: assessment-for - id: ca-1_obj.c.1-2 name: assessment-objective props: @@ -6382,6 +7119,12 @@ catalog: value: CA-01c.01[02] class: sp800-53a prose: 'the current assessment, authorization, and monitoring policy is reviewed and updated following {{ insert: param, ca-01_odp.06 }};' + links: + - href: '#ca-1_smt.c.1' + rel: assessment-for + links: + - href: '#ca-1_smt.c.1' + rel: assessment-for - id: ca-1_obj.c.2 name: assessment-objective props: @@ -6396,6 +7139,9 @@ catalog: value: CA-01c.02[01] class: sp800-53a prose: 'the current assessment, authorization, and monitoring procedures are reviewed and updated {{ insert: param, ca-01_odp.07 }}; ' + links: + - href: '#ca-1_smt.c.2' + rel: assessment-for - id: ca-1_obj.c.2-2 name: assessment-objective props: @@ -6403,6 +7149,18 @@ catalog: value: CA-01c.02[02] class: sp800-53a prose: 'the current assessment, authorization, and monitoring procedures are reviewed and updated following {{ insert: param, ca-01_odp.08 }}.' + links: + - href: '#ca-1_smt.c.2' + rel: assessment-for + links: + - href: '#ca-1_smt.c.2' + rel: assessment-for + links: + - href: '#ca-1_smt.c' + rel: assessment-for + links: + - href: '#ca-1_smt' + rel: assessment-for - id: ca-1_asm-examine name: assessment-method props: @@ -6610,6 +7368,9 @@ catalog: value: CA-02a. class: sp800-53a prose: an appropriate assessor or assessment team is selected for the type of assessment to be conducted; + links: + - href: '#ca-2_smt.a' + rel: assessment-for - id: ca-2_obj.b name: assessment-objective props: @@ -6624,6 +7385,9 @@ catalog: value: CA-02b.01 class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including controls and control enhancements under assessment; + links: + - href: '#ca-2_smt.b.1' + rel: assessment-for - id: ca-2_obj.b.2 name: assessment-objective props: @@ -6631,6 +7395,9 @@ catalog: value: CA-02b.02 class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including assessment procedures to be used to determine control effectiveness; + links: + - href: '#ca-2_smt.b.2' + rel: assessment-for - id: ca-2_obj.b.3 name: assessment-objective props: @@ -6645,6 +7412,9 @@ catalog: value: CA-02b.03[01] class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including the assessment environment; + links: + - href: '#ca-2_smt.b.3' + rel: assessment-for - id: ca-2_obj.b.3-2 name: assessment-objective props: @@ -6652,6 +7422,9 @@ catalog: value: CA-02b.03[02] class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including the assessment team; + links: + - href: '#ca-2_smt.b.3' + rel: assessment-for - id: ca-2_obj.b.3-3 name: assessment-objective props: @@ -6659,6 +7432,15 @@ catalog: value: CA-02b.03[03] class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including assessment roles and responsibilities; + links: + - href: '#ca-2_smt.b.3' + rel: assessment-for + links: + - href: '#ca-2_smt.b.3' + rel: assessment-for + links: + - href: '#ca-2_smt.b' + rel: assessment-for - id: ca-2_obj.c name: assessment-objective props: @@ -6666,6 +7448,9 @@ catalog: value: CA-02c. class: sp800-53a prose: the control assessment plan is reviewed and approved by the authorizing official or designated representative prior to conducting the assessment; + links: + - href: '#ca-2_smt.c' + rel: assessment-for - id: ca-2_obj.d name: assessment-objective props: @@ -6680,6 +7465,9 @@ catalog: value: CA-02d.[01] class: sp800-53a prose: 'controls are assessed in the system and its environment of operation {{ insert: param, ca-02_odp.01 }} to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;' + links: + - href: '#ca-2_smt.d' + rel: assessment-for - id: ca-2_obj.d-2 name: assessment-objective props: @@ -6687,6 +7475,12 @@ catalog: value: CA-02d.[02] class: sp800-53a prose: 'controls are assessed in the system and its environment of operation {{ insert: param, ca-02_odp.01 }} to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established privacy requirements;' + links: + - href: '#ca-2_smt.d' + rel: assessment-for + links: + - href: '#ca-2_smt.d' + rel: assessment-for - id: ca-2_obj.e name: assessment-objective props: @@ -6694,6 +7488,9 @@ catalog: value: CA-02e. class: sp800-53a prose: a control assessment report is produced that documents the results of the assessment; + links: + - href: '#ca-2_smt.e' + rel: assessment-for - id: ca-2_obj.f name: assessment-objective props: @@ -6701,6 +7498,12 @@ catalog: value: CA-02f. class: sp800-53a prose: 'the results of the control assessment are provided to {{ insert: param, ca-02_odp.02 }}.' + links: + - href: '#ca-2_smt.f' + rel: assessment-for + links: + - href: '#ca-2_smt' + rel: assessment-for - id: ca-2_asm-examine name: assessment-method props: @@ -6883,6 +7686,9 @@ catalog: value: CA-03a. class: sp800-53a prose: 'the exchange of information between the system and other systems is approved and managed using {{ insert: param, ca-03_odp.01 }};' + links: + - href: '#ca-3_smt.a' + rel: assessment-for - id: ca-3_obj.b name: assessment-objective props: @@ -6897,6 +7703,9 @@ catalog: value: CA-03b.[01] class: sp800-53a prose: the interface characteristics are documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.b-2 name: assessment-objective props: @@ -6904,6 +7713,9 @@ catalog: value: CA-03b.[02] class: sp800-53a prose: security requirements are documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.b-3 name: assessment-objective props: @@ -6911,6 +7723,9 @@ catalog: value: CA-03b.[03] class: sp800-53a prose: privacy requirements are documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.b-4 name: assessment-objective props: @@ -6918,6 +7733,9 @@ catalog: value: CA-03b.[04] class: sp800-53a prose: controls are documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.b-5 name: assessment-objective props: @@ -6925,6 +7743,9 @@ catalog: value: CA-03b.[05] class: sp800-53a prose: responsibilities for each system are documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.b-6 name: assessment-objective props: @@ -6932,6 +7753,12 @@ catalog: value: CA-03b.[06] class: sp800-53a prose: the impact level of the information communicated is documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.c name: assessment-objective props: @@ -6939,6 +7766,12 @@ catalog: value: CA-03c. class: sp800-53a prose: 'agreements are reviewed and updated {{ insert: param, ca-03_odp.03 }}.' + links: + - href: '#ca-3_smt.c' + rel: assessment-for + links: + - href: '#ca-3_smt' + rel: assessment-for - id: ca-3_asm-examine name: assessment-method props: @@ -7077,6 +7910,9 @@ catalog: value: CA-05a. class: sp800-53a prose: a plan of action and milestones for the system is developed to document the planned remediation actions of the organization to correct weaknesses or deficiencies noted during the assessment of the controls and to reduce or eliminate known vulnerabilities in the system; + links: + - href: '#ca-5_smt.a' + rel: assessment-for - id: ca-5_obj.b name: assessment-objective props: @@ -7084,6 +7920,12 @@ catalog: value: CA-05b. class: sp800-53a prose: 'existing plan of action and milestones are updated {{ insert: param, ca-05_odp }} based on the findings from control assessments, independent audits or reviews, and continuous monitoring activities.' + links: + - href: '#ca-5_smt.b' + rel: assessment-for + links: + - href: '#ca-5_smt' + rel: assessment-for - id: ca-5_asm-examine name: assessment-method props: @@ -7258,6 +8100,9 @@ catalog: value: CA-06a. class: sp800-53a prose: a senior official is assigned as the authorizing official for the system; + links: + - href: '#ca-6_smt.a' + rel: assessment-for - id: ca-6_obj.b name: assessment-objective props: @@ -7265,6 +8110,9 @@ catalog: value: CA-06b. class: sp800-53a prose: a senior official is assigned as the authorizing official for common controls available for inheritance by organizational systems; + links: + - href: '#ca-6_smt.b' + rel: assessment-for - id: ca-6_obj.c name: assessment-objective props: @@ -7279,6 +8127,9 @@ catalog: value: CA-06c.01 class: sp800-53a prose: before commencing operations, the authorizing official for the system accepts the use of common controls inherited by the system; + links: + - href: '#ca-6_smt.c.1' + rel: assessment-for - id: ca-6_obj.c.2 name: assessment-objective props: @@ -7286,6 +8137,12 @@ catalog: value: CA-06c.02 class: sp800-53a prose: before commencing operations, the authorizing official for the system authorizes the system to operate; + links: + - href: '#ca-6_smt.c.2' + rel: assessment-for + links: + - href: '#ca-6_smt.c' + rel: assessment-for - id: ca-6_obj.d name: assessment-objective props: @@ -7293,6 +8150,9 @@ catalog: value: CA-06d. class: sp800-53a prose: the authorizing official for common controls authorizes the use of those controls for inheritance by organizational systems; + links: + - href: '#ca-6_smt.d' + rel: assessment-for - id: ca-6_obj.e name: assessment-objective props: @@ -7300,6 +8160,12 @@ catalog: value: CA-06e. class: sp800-53a prose: 'the authorizations are updated {{ insert: param, ca-06_odp }}.' + links: + - href: '#ca-6_smt.e' + rel: assessment-for + links: + - href: '#ca-6_smt' + rel: assessment-for - id: ca-6_asm-examine name: assessment-method props: @@ -7632,6 +8498,9 @@ catalog: value: CA-07[01] class: sp800-53a prose: a system-level continuous monitoring strategy is developed; + links: + - href: '#ca-7_smt' + rel: assessment-for - id: ca-7_obj-2 name: assessment-objective props: @@ -7639,6 +8508,9 @@ catalog: value: CA-07[02] class: sp800-53a prose: system-level continuous monitoring is implemented in accordance with the organization-level continuous monitoring strategy; + links: + - href: '#ca-7_smt' + rel: assessment-for - id: ca-7_obj.a name: assessment-objective props: @@ -7646,6 +8518,9 @@ catalog: value: CA-07a. class: sp800-53a prose: 'system-level continuous monitoring includes establishment of the following system-level metrics to be monitored: {{ insert: param, ca-07_odp.01 }};' + links: + - href: '#ca-7_smt.a' + rel: assessment-for - id: ca-7_obj.b name: assessment-objective props: @@ -7660,6 +8535,9 @@ catalog: value: CA-07b.[01] class: sp800-53a prose: 'system-level continuous monitoring includes established {{ insert: param, ca-07_odp.02 }} for monitoring;' + links: + - href: '#ca-7_smt.b' + rel: assessment-for - id: ca-7_obj.b-2 name: assessment-objective props: @@ -7667,6 +8545,12 @@ catalog: value: CA-07b.[02] class: sp800-53a prose: 'system-level continuous monitoring includes established {{ insert: param, ca-07_odp.03 }} for assessment of control effectiveness;' + links: + - href: '#ca-7_smt.b' + rel: assessment-for + links: + - href: '#ca-7_smt.b' + rel: assessment-for - id: ca-7_obj.c name: assessment-objective props: @@ -7674,6 +8558,9 @@ catalog: value: CA-07c. class: sp800-53a prose: system-level continuous monitoring includes ongoing control assessments in accordance with the continuous monitoring strategy; + links: + - href: '#ca-7_smt.c' + rel: assessment-for - id: ca-7_obj.d name: assessment-objective props: @@ -7681,6 +8568,9 @@ catalog: value: CA-07d. class: sp800-53a prose: system-level continuous monitoring includes ongoing monitoring of system and organization-defined metrics in accordance with the continuous monitoring strategy; + links: + - href: '#ca-7_smt.d' + rel: assessment-for - id: ca-7_obj.e name: assessment-objective props: @@ -7688,6 +8578,9 @@ catalog: value: CA-07e. class: sp800-53a prose: system-level continuous monitoring includes correlation and analysis of information generated by control assessments and monitoring; + links: + - href: '#ca-7_smt.e' + rel: assessment-for - id: ca-7_obj.f name: assessment-objective props: @@ -7695,6 +8588,9 @@ catalog: value: CA-07f. class: sp800-53a prose: system-level continuous monitoring includes response actions to address the results of the analysis of control assessment and monitoring information; + links: + - href: '#ca-7_smt.f' + rel: assessment-for - id: ca-7_obj.g name: assessment-objective props: @@ -7709,6 +8605,9 @@ catalog: value: CA-07g.[01] class: sp800-53a prose: 'system-level continuous monitoring includes reporting the security status of the system to {{ insert: param, ca-07_odp.04 }} {{ insert: param, ca-07_odp.05 }};' + links: + - href: '#ca-7_smt.g' + rel: assessment-for - id: ca-7_obj.g-2 name: assessment-objective props: @@ -7716,6 +8615,15 @@ catalog: value: CA-07g.[02] class: sp800-53a prose: 'system-level continuous monitoring includes reporting the privacy status of the system to {{ insert: param, ca-07_odp.06 }} {{ insert: param, ca-07_odp.07 }}.' + links: + - href: '#ca-7_smt.g' + rel: assessment-for + links: + - href: '#ca-7_smt.g' + rel: assessment-for + links: + - href: '#ca-7_smt' + rel: assessment-for - id: ca-7_asm-examine name: assessment-method props: @@ -7854,6 +8762,9 @@ catalog: value: CA-07(04)(a) class: sp800-53a prose: effectiveness monitoring is included in risk monitoring; + links: + - href: '#ca-7.4_smt.a' + rel: assessment-for - id: ca-7.4_obj.b name: assessment-objective props: @@ -7861,6 +8772,9 @@ catalog: value: CA-07(04)(b) class: sp800-53a prose: compliance monitoring is included in risk monitoring; + links: + - href: '#ca-7.4_smt.b' + rel: assessment-for - id: ca-7.4_obj.c name: assessment-objective props: @@ -7868,6 +8782,12 @@ catalog: value: CA-07(04)(c) class: sp800-53a prose: change monitoring is included in risk monitoring. + links: + - href: '#ca-7.4_smt.c' + rel: assessment-for + links: + - href: '#ca-7.4_smt' + rel: assessment-for - id: ca-7.4_asm-examine name: assessment-method props: @@ -8047,6 +8967,9 @@ catalog: value: CA-09a. class: sp800-53a prose: 'internal connections of {{ insert: param, ca-09_odp.01 }} to the system are authorized;' + links: + - href: '#ca-9_smt.a' + rel: assessment-for - id: ca-9_obj.b name: assessment-objective props: @@ -8061,6 +8984,9 @@ catalog: value: CA-09b.[01] class: sp800-53a prose: for each internal connection, the interface characteristics are documented; + links: + - href: '#ca-9_smt.b' + rel: assessment-for - id: ca-9_obj.b-2 name: assessment-objective props: @@ -8068,6 +8994,9 @@ catalog: value: CA-09b.[02] class: sp800-53a prose: for each internal connection, the security requirements are documented; + links: + - href: '#ca-9_smt.b' + rel: assessment-for - id: ca-9_obj.b-3 name: assessment-objective props: @@ -8075,6 +9004,9 @@ catalog: value: CA-09b.[03] class: sp800-53a prose: for each internal connection, the privacy requirements are documented; + links: + - href: '#ca-9_smt.b' + rel: assessment-for - id: ca-9_obj.b-4 name: assessment-objective props: @@ -8082,6 +9014,12 @@ catalog: value: CA-09b.[04] class: sp800-53a prose: for each internal connection, the nature of the information communicated is documented; + links: + - href: '#ca-9_smt.b' + rel: assessment-for + links: + - href: '#ca-9_smt.b' + rel: assessment-for - id: ca-9_obj.c name: assessment-objective props: @@ -8089,6 +9027,9 @@ catalog: value: CA-09c. class: sp800-53a prose: 'internal system connections are terminated after {{ insert: param, ca-09_odp.02 }};' + links: + - href: '#ca-9_smt.c' + rel: assessment-for - id: ca-9_obj.d name: assessment-objective props: @@ -8096,6 +9037,12 @@ catalog: value: CA-09d. class: sp800-53a prose: 'the continued need for each internal connection is reviewed {{ insert: param, ca-09_odp.03 }}.' + links: + - href: '#ca-9_smt.d' + rel: assessment-for + links: + - href: '#ca-9_smt' + rel: assessment-for - id: ca-9_asm-examine name: assessment-method props: @@ -8372,6 +9319,9 @@ catalog: value: CM-01a.[01] class: sp800-53a prose: a configuration management policy is developed and documented; + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.a-2 name: assessment-objective props: @@ -8379,6 +9329,9 @@ catalog: value: CM-01a.[02] class: sp800-53a prose: 'the configuration management policy is disseminated to {{ insert: param, cm-01_odp.01 }};' + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.a-3 name: assessment-objective props: @@ -8386,6 +9339,9 @@ catalog: value: CM-01a.[03] class: sp800-53a prose: configuration management procedures to facilitate the implementation of the configuration management policy and associated configuration management controls are developed and documented; + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.a-4 name: assessment-objective props: @@ -8393,6 +9349,9 @@ catalog: value: CM-01a.[04] class: sp800-53a prose: 'the configuration management procedures are disseminated to {{ insert: param, cm-01_odp.02 }};' + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.a.1 name: assessment-objective props: @@ -8414,6 +9373,9 @@ catalog: value: CM-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses purpose;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-2 name: assessment-objective props: @@ -8421,6 +9383,9 @@ catalog: value: CM-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses scope;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-3 name: assessment-objective props: @@ -8428,6 +9393,9 @@ catalog: value: CM-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses roles;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-4 name: assessment-objective props: @@ -8435,6 +9403,9 @@ catalog: value: CM-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses responsibilities;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-5 name: assessment-objective props: @@ -8442,6 +9413,9 @@ catalog: value: CM-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses management commitment;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-6 name: assessment-objective props: @@ -8449,6 +9423,9 @@ catalog: value: CM-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses coordination among organizational entities;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-7 name: assessment-objective props: @@ -8456,6 +9433,12 @@ catalog: value: CM-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses compliance;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.b name: assessment-objective props: @@ -8463,6 +9446,15 @@ catalog: value: CM-01a.01(b) class: sp800-53a prose: the configuration management policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines; + links: + - href: '#cm-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#cm-1_smt.a.1' + rel: assessment-for + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.b name: assessment-objective props: @@ -8470,6 +9462,9 @@ catalog: value: CM-01b. class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the configuration management policy and procedures;' + links: + - href: '#cm-1_smt.b' + rel: assessment-for - id: cm-1_obj.c name: assessment-objective props: @@ -8491,6 +9486,9 @@ catalog: value: CM-01c.01[01] class: sp800-53a prose: 'the current configuration management policy is reviewed and updated {{ insert: param, cm-01_odp.05 }}; ' + links: + - href: '#cm-1_smt.c.1' + rel: assessment-for - id: cm-1_obj.c.1-2 name: assessment-objective props: @@ -8498,6 +9496,12 @@ catalog: value: CM-01c.01[02] class: sp800-53a prose: 'the current configuration management policy is reviewed and updated following {{ insert: param, cm-01_odp.06 }};' + links: + - href: '#cm-1_smt.c.1' + rel: assessment-for + links: + - href: '#cm-1_smt.c.1' + rel: assessment-for - id: cm-1_obj.c.2 name: assessment-objective props: @@ -8512,6 +9516,9 @@ catalog: value: CM-01c.02[01] class: sp800-53a prose: 'the current configuration management procedures are reviewed and updated {{ insert: param, cm-01_odp.07 }}; ' + links: + - href: '#cm-1_smt.c.2' + rel: assessment-for - id: cm-1_obj.c.2-2 name: assessment-objective props: @@ -8519,6 +9526,18 @@ catalog: value: CM-01c.02[02] class: sp800-53a prose: 'the current configuration management procedures are reviewed and updated following {{ insert: param, cm-01_odp.08 }}.' + links: + - href: '#cm-1_smt.c.2' + rel: assessment-for + links: + - href: '#cm-1_smt.c.2' + rel: assessment-for + links: + - href: '#cm-1_smt.c' + rel: assessment-for + links: + - href: '#cm-1_smt' + rel: assessment-for - id: cm-1_asm-examine name: assessment-method props: @@ -8701,6 +9720,9 @@ catalog: value: CM-02a.[01] class: sp800-53a prose: a current baseline configuration of the system is developed and documented; + links: + - href: '#cm-2_smt.a' + rel: assessment-for - id: cm-2_obj.a-2 name: assessment-objective props: @@ -8708,6 +9730,12 @@ catalog: value: CM-02a.[02] class: sp800-53a prose: a current baseline configuration of the system is maintained under configuration control; + links: + - href: '#cm-2_smt.a' + rel: assessment-for + links: + - href: '#cm-2_smt.a' + rel: assessment-for - id: cm-2_obj.b name: assessment-objective props: @@ -8722,6 +9750,9 @@ catalog: value: CM-02b.01 class: sp800-53a prose: 'the baseline configuration of the system is reviewed and updated {{ insert: param, cm-02_odp.01 }};' + links: + - href: '#cm-2_smt.b.1' + rel: assessment-for - id: cm-2_obj.b.2 name: assessment-objective props: @@ -8729,6 +9760,9 @@ catalog: value: CM-02b.02 class: sp800-53a prose: 'the baseline configuration of the system is reviewed and updated when required due to {{ insert: param, cm-02_odp.02 }};' + links: + - href: '#cm-2_smt.b.2' + rel: assessment-for - id: cm-2_obj.b.3 name: assessment-objective props: @@ -8736,6 +9770,15 @@ catalog: value: CM-02b.03 class: sp800-53a prose: the baseline configuration of the system is reviewed and updated when system components are installed or upgraded. + links: + - href: '#cm-2_smt.b.3' + rel: assessment-for + links: + - href: '#cm-2_smt.b' + rel: assessment-for + links: + - href: '#cm-2_smt' + rel: assessment-for - id: cm-2_asm-examine name: assessment-method props: @@ -8868,6 +9911,9 @@ catalog: value: CM-04[01] class: sp800-53a prose: changes to the system are analyzed to determine potential security impacts prior to change implementation; + links: + - href: '#cm-4_smt' + rel: assessment-for - id: cm-4_obj-2 name: assessment-objective props: @@ -8875,6 +9921,12 @@ catalog: value: CM-04[02] class: sp800-53a prose: changes to the system are analyzed to determine potential privacy impacts prior to change implementation. + links: + - href: '#cm-4_smt' + rel: assessment-for + links: + - href: '#cm-4_smt' + rel: assessment-for - id: cm-4_asm-examine name: assessment-method props: @@ -9012,6 +10064,9 @@ catalog: value: CM-05[01] class: sp800-53a prose: physical access restrictions associated with changes to the system are defined and documented; + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_obj-2 name: assessment-objective props: @@ -9019,6 +10074,9 @@ catalog: value: CM-05[02] class: sp800-53a prose: physical access restrictions associated with changes to the system are approved; + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_obj-3 name: assessment-objective props: @@ -9026,6 +10084,9 @@ catalog: value: CM-05[03] class: sp800-53a prose: physical access restrictions associated with changes to the system are enforced; + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_obj-4 name: assessment-objective props: @@ -9033,6 +10094,9 @@ catalog: value: CM-05[04] class: sp800-53a prose: logical access restrictions associated with changes to the system are defined and documented; + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_obj-5 name: assessment-objective props: @@ -9040,6 +10104,9 @@ catalog: value: CM-05[05] class: sp800-53a prose: logical access restrictions associated with changes to the system are approved; + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_obj-6 name: assessment-objective props: @@ -9047,6 +10114,12 @@ catalog: value: CM-05[06] class: sp800-53a prose: logical access restrictions associated with changes to the system are enforced. + links: + - href: '#cm-5_smt' + rel: assessment-for + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_asm-examine name: assessment-method props: @@ -9285,6 +10358,9 @@ catalog: value: CM-06a. class: sp800-53a prose: 'configuration settings that reflect the most restrictive mode consistent with operational requirements are established and documented for components employed within the system using {{ insert: param, cm-06_odp.01 }};' + links: + - href: '#cm-6_smt.a' + rel: assessment-for - id: cm-6_obj.b name: assessment-objective props: @@ -9292,6 +10368,9 @@ catalog: value: CM-06b. class: sp800-53a prose: the configuration settings documented in CM-06a are implemented; + links: + - href: '#cm-6_smt.b' + rel: assessment-for - id: cm-6_obj.c name: assessment-objective props: @@ -9306,6 +10385,9 @@ catalog: value: CM-06c.[01] class: sp800-53a prose: 'any deviations from established configuration settings for {{ insert: param, cm-06_odp.02 }} are identified and documented based on {{ insert: param, cm-06_odp.03 }};' + links: + - href: '#cm-6_smt.c' + rel: assessment-for - id: cm-6_obj.c-2 name: assessment-objective props: @@ -9313,6 +10395,12 @@ catalog: value: CM-06c.[02] class: sp800-53a prose: 'any deviations from established configuration settings for {{ insert: param, cm-06_odp.02 }} are approved;' + links: + - href: '#cm-6_smt.c' + rel: assessment-for + links: + - href: '#cm-6_smt.c' + rel: assessment-for - id: cm-6_obj.d name: assessment-objective props: @@ -9327,6 +10415,9 @@ catalog: value: CM-06d.[01] class: sp800-53a prose: changes to the configuration settings are monitored in accordance with organizational policies and procedures; + links: + - href: '#cm-6_smt.d' + rel: assessment-for - id: cm-6_obj.d-2 name: assessment-objective props: @@ -9334,6 +10425,15 @@ catalog: value: CM-06d.[02] class: sp800-53a prose: changes to the configuration settings are controlled in accordance with organizational policies and procedures. + links: + - href: '#cm-6_smt.d' + rel: assessment-for + links: + - href: '#cm-6_smt.d' + rel: assessment-for + links: + - href: '#cm-6_smt' + rel: assessment-for - id: cm-6_asm-examine name: assessment-method props: @@ -9576,6 +10676,9 @@ catalog: value: CM-07a. class: sp800-53a prose: 'the system is configured to provide only {{ insert: param, cm-07_odp.01 }};' + links: + - href: '#cm-7_smt.a' + rel: assessment-for - id: cm-7_obj.b name: assessment-objective props: @@ -9590,6 +10693,9 @@ catalog: value: CM-07b.[01] class: sp800-53a prose: 'the use of {{ insert: param, cm-07_odp.02 }} is prohibited or restricted;' + links: + - href: '#cm-7_smt.b' + rel: assessment-for - id: cm-7_obj.b-2 name: assessment-objective props: @@ -9597,6 +10703,9 @@ catalog: value: CM-07b.[02] class: sp800-53a prose: 'the use of {{ insert: param, cm-07_odp.03 }} is prohibited or restricted;' + links: + - href: '#cm-7_smt.b' + rel: assessment-for - id: cm-7_obj.b-3 name: assessment-objective props: @@ -9604,6 +10713,9 @@ catalog: value: CM-07b.[03] class: sp800-53a prose: 'the use of {{ insert: param, cm-07_odp.04 }} is prohibited or restricted;' + links: + - href: '#cm-7_smt.b' + rel: assessment-for - id: cm-7_obj.b-4 name: assessment-objective props: @@ -9611,6 +10723,9 @@ catalog: value: CM-07b.[04] class: sp800-53a prose: 'the use of {{ insert: param, cm-07_odp.05 }} is prohibited or restricted;' + links: + - href: '#cm-7_smt.b' + rel: assessment-for - id: cm-7_obj.b-5 name: assessment-objective props: @@ -9618,6 +10733,15 @@ catalog: value: CM-07b.[05] class: sp800-53a prose: 'the use of {{ insert: param, cm-07_odp.06 }} is prohibited or restricted.' + links: + - href: '#cm-7_smt.b' + rel: assessment-for + links: + - href: '#cm-7_smt.b' + rel: assessment-for + links: + - href: '#cm-7_smt' + rel: assessment-for - id: cm-7_asm-examine name: assessment-method props: @@ -9845,6 +10969,9 @@ catalog: value: CM-08a.01 class: sp800-53a prose: an inventory of system components that accurately reflects the system is developed and documented; + links: + - href: '#cm-8_smt.a.1' + rel: assessment-for - id: cm-8_obj.a.2 name: assessment-objective props: @@ -9852,6 +10979,9 @@ catalog: value: CM-08a.02 class: sp800-53a prose: an inventory of system components that includes all components within the system is developed and documented; + links: + - href: '#cm-8_smt.a.2' + rel: assessment-for - id: cm-8_obj.a.3 name: assessment-objective props: @@ -9859,6 +10989,9 @@ catalog: value: CM-08a.03 class: sp800-53a prose: an inventory of system components that does not include duplicate accounting of components or components assigned to any other system is developed and documented; + links: + - href: '#cm-8_smt.a.3' + rel: assessment-for - id: cm-8_obj.a.4 name: assessment-objective props: @@ -9866,6 +10999,9 @@ catalog: value: CM-08a.04 class: sp800-53a prose: an inventory of system components that is at the level of granularity deemed necessary for tracking and reporting is developed and documented; + links: + - href: '#cm-8_smt.a.4' + rel: assessment-for - id: cm-8_obj.a.5 name: assessment-objective props: @@ -9873,6 +11009,12 @@ catalog: value: CM-08a.05 class: sp800-53a prose: 'an inventory of system components that includes {{ insert: param, cm-08_odp.01 }} is developed and documented;' + links: + - href: '#cm-8_smt.a.5' + rel: assessment-for + links: + - href: '#cm-8_smt.a' + rel: assessment-for - id: cm-8_obj.b name: assessment-objective props: @@ -9880,6 +11022,12 @@ catalog: value: CM-08b. class: sp800-53a prose: 'the system component inventory is reviewed and updated {{ insert: param, cm-08_odp.02 }}.' + links: + - href: '#cm-8_smt.b' + rel: assessment-for + links: + - href: '#cm-8_smt' + rel: assessment-for - id: cm-8_asm-examine name: assessment-method props: @@ -10007,6 +11155,9 @@ catalog: value: CM-10a. class: sp800-53a prose: software and associated documentation are used in accordance with contract agreements and copyright laws; + links: + - href: '#cm-10_smt.a' + rel: assessment-for - id: cm-10_obj.b name: assessment-objective props: @@ -10014,6 +11165,9 @@ catalog: value: CM-10b. class: sp800-53a prose: the use of software and associated documentation protected by quantity licenses is tracked to control copying and distribution; + links: + - href: '#cm-10_smt.b' + rel: assessment-for - id: cm-10_obj.c name: assessment-objective props: @@ -10021,6 +11175,12 @@ catalog: value: CM-10c. class: sp800-53a prose: the use of peer-to-peer file sharing technology is controlled and documented to ensure that peer-to-peer file sharing is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work. + links: + - href: '#cm-10_smt.c' + rel: assessment-for + links: + - href: '#cm-10_smt' + rel: assessment-for - id: cm-10_asm-examine name: assessment-method props: @@ -10197,6 +11357,9 @@ catalog: value: CM-11a. class: sp800-53a prose: ' {{ insert: param, cm-11_odp.01 }} governing the installation of software by users are established;' + links: + - href: '#cm-11_smt.a' + rel: assessment-for - id: cm-11_obj.b name: assessment-objective props: @@ -10204,6 +11367,9 @@ catalog: value: CM-11b. class: sp800-53a prose: 'software installation policies are enforced through {{ insert: param, cm-11_odp.02 }};' + links: + - href: '#cm-11_smt.b' + rel: assessment-for - id: cm-11_obj.c name: assessment-objective props: @@ -10211,6 +11377,12 @@ catalog: value: CM-11c. class: sp800-53a prose: 'compliance with {{ insert: param, cm-11_odp.01 }} is monitored {{ insert: param, cm-11_odp.03 }}.' + links: + - href: '#cm-11_smt.c' + rel: assessment-for + links: + - href: '#cm-11_smt' + rel: assessment-for - id: cm-11_asm-examine name: assessment-method props: @@ -10498,6 +11670,9 @@ catalog: value: CP-01a.[01] class: sp800-53a prose: a contingency planning policy is developed and documented; + links: + - href: '#cp-1_smt.a' + rel: assessment-for - id: cp-1_obj.a-2 name: assessment-objective props: @@ -10505,6 +11680,9 @@ catalog: value: CP-01a.[02] class: sp800-53a prose: 'the contingency planning policy is disseminated to {{ insert: param, cp-01_odp.01 }};' + links: + - href: '#cp-1_smt.a' + rel: assessment-for - id: cp-1_obj.a-3 name: assessment-objective props: @@ -10512,6 +11690,9 @@ catalog: value: CP-01a.[03] class: sp800-53a prose: contingency planning procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls are developed and documented; + links: + - href: '#cp-1_smt.a' + rel: assessment-for - id: cp-1_obj.a-4 name: assessment-objective props: @@ -10519,6 +11700,9 @@ catalog: value: CP-01a.[04] class: sp800-53a prose: 'the contingency planning procedures are disseminated to {{ insert: param, cp-01_odp.02 }};' + links: + - href: '#cp-1_smt.a' + rel: assessment-for - id: cp-1_obj.a.1 name: assessment-objective props: @@ -10540,6 +11724,9 @@ catalog: value: CP-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses purpose;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-2 name: assessment-objective props: @@ -10547,6 +11734,9 @@ catalog: value: CP-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses scope;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-3 name: assessment-objective props: @@ -10554,6 +11744,9 @@ catalog: value: CP-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses roles;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-4 name: assessment-objective props: @@ -10561,6 +11754,9 @@ catalog: value: CP-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses responsibilities;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-5 name: assessment-objective props: @@ -10568,6 +11764,9 @@ catalog: value: CP-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses management commitment;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-6 name: assessment-objective props: @@ -10575,6 +11774,9 @@ catalog: value: CP-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses coordination among organizational entities;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-7 name: assessment-objective props: @@ -10582,6 +11784,12 @@ catalog: value: CP-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses compliance;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.b name: assessment-objective props: @@ -10589,6 +11797,15 @@ catalog: value: CP-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#cp-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#cp-1_smt.a.1' + rel: assessment-for + links: + - href: '#cp-1_smt.a' + rel: assessment-for - id: cp-1_obj.b name: assessment-objective props: @@ -10596,6 +11813,9 @@ catalog: value: CP-01b. class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the contingency planning policy and procedures;' + links: + - href: '#cp-1_smt.b' + rel: assessment-for - id: cp-1_obj.c name: assessment-objective props: @@ -10617,6 +11837,9 @@ catalog: value: CP-01c.01[01] class: sp800-53a prose: 'the current contingency planning policy is reviewed and updated {{ insert: param, cp-01_odp.05 }};' + links: + - href: '#cp-1_smt.c.1' + rel: assessment-for - id: cp-1_obj.c.1-2 name: assessment-objective props: @@ -10624,6 +11847,12 @@ catalog: value: CP-01c.01[02] class: sp800-53a prose: 'the current contingency planning policy is reviewed and updated following {{ insert: param, cp-01_odp.06 }};' + links: + - href: '#cp-1_smt.c.1' + rel: assessment-for + links: + - href: '#cp-1_smt.c.1' + rel: assessment-for - id: cp-1_obj.c.2 name: assessment-objective props: @@ -10638,6 +11867,9 @@ catalog: value: CP-01c.02[01] class: sp800-53a prose: 'the current contingency planning procedures are reviewed and updated {{ insert: param, cp-01_odp.07 }};' + links: + - href: '#cp-1_smt.c.2' + rel: assessment-for - id: cp-1_obj.c.2-2 name: assessment-objective props: @@ -10645,6 +11877,18 @@ catalog: value: CP-01c.02[02] class: sp800-53a prose: 'the current contingency planning procedures are reviewed and updated following {{ insert: param, cp-01_odp.08 }}.' + links: + - href: '#cp-1_smt.c.2' + rel: assessment-for + links: + - href: '#cp-1_smt.c.2' + rel: assessment-for + links: + - href: '#cp-1_smt.c' + rel: assessment-for + links: + - href: '#cp-1_smt' + rel: assessment-for - id: cp-1_asm-examine name: assessment-method props: @@ -10956,6 +12200,9 @@ catalog: value: CP-02a.01 class: sp800-53a prose: a contingency plan for the system is developed that identifies essential mission and business functions and associated contingency requirements; + links: + - href: '#cp-2_smt.a.1' + rel: assessment-for - id: cp-2_obj.a.2 name: assessment-objective props: @@ -10970,6 +12217,9 @@ catalog: value: CP-02a.02[01] class: sp800-53a prose: a contingency plan for the system is developed that provides recovery objectives; + links: + - href: '#cp-2_smt.a.2' + rel: assessment-for - id: cp-2_obj.a.2-2 name: assessment-objective props: @@ -10977,6 +12227,9 @@ catalog: value: CP-02a.02[02] class: sp800-53a prose: a contingency plan for the system is developed that provides restoration priorities; + links: + - href: '#cp-2_smt.a.2' + rel: assessment-for - id: cp-2_obj.a.2-3 name: assessment-objective props: @@ -10984,6 +12237,12 @@ catalog: value: CP-02a.02[03] class: sp800-53a prose: a contingency plan for the system is developed that provides metrics; + links: + - href: '#cp-2_smt.a.2' + rel: assessment-for + links: + - href: '#cp-2_smt.a.2' + rel: assessment-for - id: cp-2_obj.a.3 name: assessment-objective props: @@ -10998,6 +12257,9 @@ catalog: value: CP-02a.03[01] class: sp800-53a prose: a contingency plan for the system is developed that addresses contingency roles; + links: + - href: '#cp-2_smt.a.3' + rel: assessment-for - id: cp-2_obj.a.3-2 name: assessment-objective props: @@ -11005,6 +12267,9 @@ catalog: value: CP-02a.03[02] class: sp800-53a prose: a contingency plan for the system is developed that addresses contingency responsibilities; + links: + - href: '#cp-2_smt.a.3' + rel: assessment-for - id: cp-2_obj.a.3-3 name: assessment-objective props: @@ -11012,6 +12277,12 @@ catalog: value: CP-02a.03[03] class: sp800-53a prose: a contingency plan for the system is developed that addresses assigned individuals with contact information; + links: + - href: '#cp-2_smt.a.3' + rel: assessment-for + links: + - href: '#cp-2_smt.a.3' + rel: assessment-for - id: cp-2_obj.a.4 name: assessment-objective props: @@ -11019,6 +12290,9 @@ catalog: value: CP-02a.04 class: sp800-53a prose: a contingency plan for the system is developed that addresses maintaining essential mission and business functions despite a system disruption, compromise, or failure; + links: + - href: '#cp-2_smt.a.4' + rel: assessment-for - id: cp-2_obj.a.5 name: assessment-objective props: @@ -11026,6 +12300,9 @@ catalog: value: CP-02a.05 class: sp800-53a prose: a contingency plan for the system is developed that addresses eventual, full-system restoration without deterioration of the controls originally planned and implemented; + links: + - href: '#cp-2_smt.a.5' + rel: assessment-for - id: cp-2_obj.a.6 name: assessment-objective props: @@ -11033,6 +12310,9 @@ catalog: value: CP-02a.06 class: sp800-53a prose: a contingency plan for the system is developed that addresses the sharing of contingency information; + links: + - href: '#cp-2_smt.a.6' + rel: assessment-for - id: cp-2_obj.a.7 name: assessment-objective props: @@ -11047,6 +12327,9 @@ catalog: value: CP-02a.07[01] class: sp800-53a prose: 'a contingency plan for the system is developed that is reviewed by {{ insert: param, cp-02_odp.01 }};' + links: + - href: '#cp-2_smt.a.7' + rel: assessment-for - id: cp-2_obj.a.7-2 name: assessment-objective props: @@ -11054,6 +12337,15 @@ catalog: value: CP-02a.07[02] class: sp800-53a prose: 'a contingency plan for the system is developed that is approved by {{ insert: param, cp-02_odp.02 }};' + links: + - href: '#cp-2_smt.a.7' + rel: assessment-for + links: + - href: '#cp-2_smt.a.7' + rel: assessment-for + links: + - href: '#cp-2_smt.a' + rel: assessment-for - id: cp-2_obj.b name: assessment-objective props: @@ -11068,6 +12360,9 @@ catalog: value: CP-02b.[01] class: sp800-53a prose: 'copies of the contingency plan are distributed to {{ insert: param, cp-02_odp.03 }};' + links: + - href: '#cp-2_smt.b' + rel: assessment-for - id: cp-2_obj.b-2 name: assessment-objective props: @@ -11075,6 +12370,12 @@ catalog: value: CP-02b.[02] class: sp800-53a prose: 'copies of the contingency plan are distributed to {{ insert: param, cp-02_odp.04 }};' + links: + - href: '#cp-2_smt.b' + rel: assessment-for + links: + - href: '#cp-2_smt.b' + rel: assessment-for - id: cp-2_obj.c name: assessment-objective props: @@ -11082,6 +12383,9 @@ catalog: value: CP-02c. class: sp800-53a prose: contingency planning activities are coordinated with incident handling activities; + links: + - href: '#cp-2_smt.c' + rel: assessment-for - id: cp-2_obj.d name: assessment-objective props: @@ -11089,6 +12393,9 @@ catalog: value: CP-02d. class: sp800-53a prose: 'the contingency plan for the system is reviewed {{ insert: param, cp-02_odp.05 }};' + links: + - href: '#cp-2_smt.d' + rel: assessment-for - id: cp-2_obj.e name: assessment-objective props: @@ -11103,6 +12410,9 @@ catalog: value: CP-02e.[01] class: sp800-53a prose: the contingency plan is updated to address changes to the organization, system, or environment of operation; + links: + - href: '#cp-2_smt.e' + rel: assessment-for - id: cp-2_obj.e-2 name: assessment-objective props: @@ -11110,6 +12420,12 @@ catalog: value: CP-02e.[02] class: sp800-53a prose: the contingency plan is updated to address problems encountered during contingency plan implementation, execution, or testing; + links: + - href: '#cp-2_smt.e' + rel: assessment-for + links: + - href: '#cp-2_smt.e' + rel: assessment-for - id: cp-2_obj.f name: assessment-objective props: @@ -11124,6 +12440,9 @@ catalog: value: CP-02f.[01] class: sp800-53a prose: 'contingency plan changes are communicated to {{ insert: param, cp-02_odp.06 }};' + links: + - href: '#cp-2_smt.f' + rel: assessment-for - id: cp-2_obj.f-2 name: assessment-objective props: @@ -11131,6 +12450,12 @@ catalog: value: CP-02f.[02] class: sp800-53a prose: 'contingency plan changes are communicated to {{ insert: param, cp-02_odp.07 }};' + links: + - href: '#cp-2_smt.f' + rel: assessment-for + links: + - href: '#cp-2_smt.f' + rel: assessment-for - id: cp-2_obj.g name: assessment-objective props: @@ -11145,6 +12470,9 @@ catalog: value: CP-02g.[01] class: sp800-53a prose: lessons learned from contingency plan testing or actual contingency activities are incorporated into contingency testing; + links: + - href: '#cp-2_smt.g' + rel: assessment-for - id: cp-2_obj.g-2 name: assessment-objective props: @@ -11152,6 +12480,12 @@ catalog: value: CP-02g.[02] class: sp800-53a prose: lessons learned from contingency plan training or actual contingency activities are incorporated into contingency testing and training; + links: + - href: '#cp-2_smt.g' + rel: assessment-for + links: + - href: '#cp-2_smt.g' + rel: assessment-for - id: cp-2_obj.h name: assessment-objective props: @@ -11166,6 +12500,9 @@ catalog: value: CP-02h.[01] class: sp800-53a prose: the contingency plan is protected from unauthorized disclosure; + links: + - href: '#cp-2_smt.h' + rel: assessment-for - id: cp-2_obj.h-2 name: assessment-objective props: @@ -11173,6 +12510,15 @@ catalog: value: CP-02h.[02] class: sp800-53a prose: the contingency plan is protected from unauthorized modification. + links: + - href: '#cp-2_smt.h' + rel: assessment-for + links: + - href: '#cp-2_smt.h' + rel: assessment-for + links: + - href: '#cp-2_smt' + rel: assessment-for - id: cp-2_asm-examine name: assessment-method props: @@ -11368,6 +12714,9 @@ catalog: value: CP-03a.01 class: sp800-53a prose: 'contingency training is provided to system users consistent with assigned roles and responsibilities within {{ insert: param, cp-03_odp.01 }} of assuming a contingency role or responsibility;' + links: + - href: '#cp-3_smt.a.1' + rel: assessment-for - id: cp-3_obj.a.2 name: assessment-objective props: @@ -11375,6 +12724,9 @@ catalog: value: CP-03a.02 class: sp800-53a prose: contingency training is provided to system users consistent with assigned roles and responsibilities when required by system changes; + links: + - href: '#cp-3_smt.a.2' + rel: assessment-for - id: cp-3_obj.a.3 name: assessment-objective props: @@ -11382,6 +12734,12 @@ catalog: value: CP-03a.03 class: sp800-53a prose: 'contingency training is provided to system users consistent with assigned roles and responsibilities {{ insert: param, cp-03_odp.02 }} thereafter;' + links: + - href: '#cp-3_smt.a.3' + rel: assessment-for + links: + - href: '#cp-3_smt.a' + rel: assessment-for - id: cp-3_obj.b name: assessment-objective props: @@ -11396,6 +12754,9 @@ catalog: value: CP-03b.[01] class: sp800-53a prose: 'the contingency plan training content is reviewed and updated {{ insert: param, cp-03_odp.03 }};' + links: + - href: '#cp-3_smt.b' + rel: assessment-for - id: cp-3_obj.b-2 name: assessment-objective props: @@ -11403,6 +12764,15 @@ catalog: value: CP-03b.[02] class: sp800-53a prose: 'the contingency plan training content is reviewed and updated following {{ insert: param, cp-03_odp.04 }}.' + links: + - href: '#cp-3_smt.b' + rel: assessment-for + links: + - href: '#cp-3_smt.b' + rel: assessment-for + links: + - href: '#cp-3_smt' + rel: assessment-for - id: cp-3_asm-examine name: assessment-method props: @@ -11585,6 +12955,9 @@ catalog: value: CP-04a.[01] class: sp800-53a prose: 'the contingency plan for the system is tested {{ insert: param, cp-04_odp.01 }};' + links: + - href: '#cp-4_smt.a' + rel: assessment-for - id: cp-4_obj.a-2 name: assessment-objective props: @@ -11592,6 +12965,9 @@ catalog: value: CP-04a.[02] class: sp800-53a prose: ' {{ insert: param, cp-04_odp.02 }} are used to determine the effectiveness of the plan;' + links: + - href: '#cp-4_smt.a' + rel: assessment-for - id: cp-4_obj.a-3 name: assessment-objective props: @@ -11599,6 +12975,12 @@ catalog: value: CP-04a.[03] class: sp800-53a prose: ' {{ insert: param, cp-04_odp.03 }} are used to determine the readiness to execute the plan;' + links: + - href: '#cp-4_smt.a' + rel: assessment-for + links: + - href: '#cp-4_smt.a' + rel: assessment-for - id: cp-4_obj.b name: assessment-objective props: @@ -11606,6 +12988,9 @@ catalog: value: CP-04b. class: sp800-53a prose: the contingency plan test results are reviewed; + links: + - href: '#cp-4_smt.b' + rel: assessment-for - id: cp-4_obj.c name: assessment-objective props: @@ -11613,6 +12998,12 @@ catalog: value: CP-04c. class: sp800-53a prose: corrective actions are initiated, if needed. + links: + - href: '#cp-4_smt.c' + rel: assessment-for + links: + - href: '#cp-4_smt' + rel: assessment-for - id: cp-4_asm-examine name: assessment-method props: @@ -11808,6 +13199,9 @@ catalog: value: CP-09a. class: sp800-53a prose: 'backups of user-level information contained in {{ insert: param, cp-09_odp.01 }} are conducted {{ insert: param, cp-09_odp.02 }};' + links: + - href: '#cp-9_smt.a' + rel: assessment-for - id: cp-9_obj.b name: assessment-objective props: @@ -11815,6 +13209,9 @@ catalog: value: CP-09b. class: sp800-53a prose: 'backups of system-level information contained in the system are conducted {{ insert: param, cp-09_odp.03 }};' + links: + - href: '#cp-9_smt.b' + rel: assessment-for - id: cp-9_obj.c name: assessment-objective props: @@ -11822,6 +13219,9 @@ catalog: value: CP-09c. class: sp800-53a prose: 'backups of system documentation, including security- and privacy-related documentation are conducted {{ insert: param, cp-09_odp.04 }};' + links: + - href: '#cp-9_smt.c' + rel: assessment-for - id: cp-9_obj.d name: assessment-objective props: @@ -11836,6 +13236,9 @@ catalog: value: CP-09d.[01] class: sp800-53a prose: the confidentiality of backup information is protected; + links: + - href: '#cp-9_smt.d' + rel: assessment-for - id: cp-9_obj.d-2 name: assessment-objective props: @@ -11843,6 +13246,9 @@ catalog: value: CP-09d.[02] class: sp800-53a prose: the integrity of backup information is protected; + links: + - href: '#cp-9_smt.d' + rel: assessment-for - id: cp-9_obj.d-3 name: assessment-objective props: @@ -11850,6 +13256,15 @@ catalog: value: CP-09d.[03] class: sp800-53a prose: the availability of backup information is protected. + links: + - href: '#cp-9_smt.d' + rel: assessment-for + links: + - href: '#cp-9_smt.d' + rel: assessment-for + links: + - href: '#cp-9_smt' + rel: assessment-for - id: cp-9_asm-examine name: assessment-method props: @@ -11989,6 +13404,9 @@ catalog: value: CP-10[01] class: sp800-53a prose: 'the recovery of the system to a known state is provided within {{ insert: param, cp-10_odp.01 }} after a disruption, compromise, or failure;' + links: + - href: '#cp-10_smt' + rel: assessment-for - id: cp-10_obj-2 name: assessment-objective props: @@ -11996,6 +13414,12 @@ catalog: value: CP-10[02] class: sp800-53a prose: 'a reconstitution of the system to a known state is provided within {{ insert: param, cp-10_odp.02 }} after a disruption, compromise, or failure.' + links: + - href: '#cp-10_smt' + rel: assessment-for + links: + - href: '#cp-10_smt' + rel: assessment-for - id: cp-10_asm-examine name: assessment-method props: @@ -12283,6 +13707,9 @@ catalog: value: IA-01a.[01] class: sp800-53a prose: an identification and authentication policy is developed and documented; + links: + - href: '#ia-1_smt.a' + rel: assessment-for - id: ia-1_obj.a-2 name: assessment-objective props: @@ -12290,6 +13717,9 @@ catalog: value: IA-01a.[02] class: sp800-53a prose: 'the identification and authentication policy is disseminated to {{ insert: param, ia-01_odp.01 }};' + links: + - href: '#ia-1_smt.a' + rel: assessment-for - id: ia-1_obj.a-3 name: assessment-objective props: @@ -12297,6 +13727,9 @@ catalog: value: IA-01a.[03] class: sp800-53a prose: identification and authentication procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls are developed and documented; + links: + - href: '#ia-1_smt.a' + rel: assessment-for - id: ia-1_obj.a-4 name: assessment-objective props: @@ -12304,6 +13737,9 @@ catalog: value: IA-01a.[04] class: sp800-53a prose: 'the identification and authentication procedures are disseminated to {{ insert: param, ia-01_odp.02 }};' + links: + - href: '#ia-1_smt.a' + rel: assessment-for - id: ia-1_obj.a.1 name: assessment-objective props: @@ -12325,6 +13761,9 @@ catalog: value: IA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses purpose;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-2 name: assessment-objective props: @@ -12332,6 +13771,9 @@ catalog: value: IA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses scope;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-3 name: assessment-objective props: @@ -12339,6 +13781,9 @@ catalog: value: IA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses roles;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-4 name: assessment-objective props: @@ -12346,6 +13791,9 @@ catalog: value: IA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses responsibilities;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-5 name: assessment-objective props: @@ -12353,6 +13801,9 @@ catalog: value: IA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses management commitment;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-6 name: assessment-objective props: @@ -12360,6 +13811,9 @@ catalog: value: IA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses coordination among organizational entities;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-7 name: assessment-objective props: @@ -12367,6 +13821,12 @@ catalog: value: IA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses compliance;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.b name: assessment-objective props: @@ -12374,6 +13834,15 @@ catalog: value: IA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ia-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ia-1_smt.a.1' + rel: assessment-for + links: + - href: '#ia-1_smt.a' + rel: assessment-for - id: ia-1_obj.b name: assessment-objective props: @@ -12381,6 +13850,9 @@ catalog: value: IA-01b. class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the identification and authentication policy and procedures;' + links: + - href: '#ia-1_smt.b' + rel: assessment-for - id: ia-1_obj.c name: assessment-objective props: @@ -12402,6 +13874,9 @@ catalog: value: IA-01c.01[01] class: sp800-53a prose: 'the current identification and authentication policy is reviewed and updated {{ insert: param, ia-01_odp.05 }};' + links: + - href: '#ia-1_smt.c.1' + rel: assessment-for - id: ia-1_obj.c.1-2 name: assessment-objective props: @@ -12409,6 +13884,12 @@ catalog: value: IA-01c.01[02] class: sp800-53a prose: 'the current identification and authentication policy is reviewed and updated following {{ insert: param, ia-01_odp.06 }};' + links: + - href: '#ia-1_smt.c.1' + rel: assessment-for + links: + - href: '#ia-1_smt.c.1' + rel: assessment-for - id: ia-1_obj.c.2 name: assessment-objective props: @@ -12423,6 +13904,9 @@ catalog: value: IA-01c.02[01] class: sp800-53a prose: 'the current identification and authentication procedures are reviewed and updated {{ insert: param, ia-01_odp.07 }};' + links: + - href: '#ia-1_smt.c.2' + rel: assessment-for - id: ia-1_obj.c.2-2 name: assessment-objective props: @@ -12430,6 +13914,18 @@ catalog: value: IA-01c.02[02] class: sp800-53a prose: 'the current identification and authentication procedures are reviewed and updated following {{ insert: param, ia-01_odp.08 }}.' + links: + - href: '#ia-1_smt.c.2' + rel: assessment-for + links: + - href: '#ia-1_smt.c.2' + rel: assessment-for + links: + - href: '#ia-1_smt.c' + rel: assessment-for + links: + - href: '#ia-1_smt' + rel: assessment-for - id: ia-1_asm-examine name: assessment-method props: @@ -12542,6 +14038,8 @@ catalog: rel: related - href: '#ia-8' rel: related + - href: '#ia-13' + rel: related - href: '#ma-4' rel: related - href: '#ma-5' @@ -12580,6 +14078,9 @@ catalog: value: IA-02[01] class: sp800-53a prose: organizational users are uniquely identified and authenticated; + links: + - href: '#ia-2_smt' + rel: assessment-for - id: ia-2_obj-2 name: assessment-objective props: @@ -12587,6 +14088,12 @@ catalog: value: IA-02[02] class: sp800-53a prose: the unique identification of authenticated organizational users is associated with processes acting on behalf of those users. + links: + - href: '#ia-2_smt' + rel: assessment-for + links: + - href: '#ia-2_smt' + rel: assessment-for - id: ia-2_asm-examine name: assessment-method props: @@ -12684,6 +14191,9 @@ catalog: value: IA-02(01) class: sp800-53a prose: multi-factor authentication is implemented for access to privileged accounts. + links: + - href: '#ia-2.1_smt' + rel: assessment-for - id: ia-2.1_asm-examine name: assessment-method props: @@ -12777,6 +14287,9 @@ catalog: value: IA-02(02) class: sp800-53a prose: multi-factor authentication for access to non-privileged accounts is implemented. + links: + - href: '#ia-2.2_smt' + rel: assessment-for - id: ia-2.2_asm-examine name: assessment-method props: @@ -12881,6 +14394,9 @@ catalog: value: IA-02(08) class: sp800-53a prose: 'replay-resistant authentication mechanisms for access to {{ insert: param, ia-02.08_odp }} are implemented.' + links: + - href: '#ia-2.8_smt' + rel: assessment-for - id: ia-2.8_asm-examine name: assessment-method props: @@ -12975,6 +14491,9 @@ catalog: value: IA-02(12) class: sp800-53a prose: Personal Identity Verification-compliant credentials are accepted and electronically verified. + links: + - href: '#ia-2.12_smt' + rel: assessment-for - id: ia-2.12_asm-examine name: assessment-method props: @@ -13165,6 +14684,9 @@ catalog: value: IA-04a. class: sp800-53a prose: 'system identifiers are managed by receiving authorization from {{ insert: param, ia-04_odp.01 }} to assign to an individual, group, role, or device identifier;' + links: + - href: '#ia-4_smt.a' + rel: assessment-for - id: ia-4_obj.b name: assessment-objective props: @@ -13172,6 +14694,9 @@ catalog: value: IA-04b. class: sp800-53a prose: system identifiers are managed by selecting an identifier that identifies an individual, group, role, service, or device; + links: + - href: '#ia-4_smt.b' + rel: assessment-for - id: ia-4_obj.c name: assessment-objective props: @@ -13179,6 +14704,9 @@ catalog: value: IA-04c. class: sp800-53a prose: system identifiers are managed by assigning the identifier to the intended individual, group, role, service, or device; + links: + - href: '#ia-4_smt.c' + rel: assessment-for - id: ia-4_obj.d name: assessment-objective props: @@ -13186,6 +14714,12 @@ catalog: value: IA-04d. class: sp800-53a prose: 'system identifiers are managed by preventing reuse of identifiers for {{ insert: param, ia-04_odp.02 }}.' + links: + - href: '#ia-4_smt.d' + rel: assessment-for + links: + - href: '#ia-4_smt' + rel: assessment-for - id: ia-4_asm-examine name: assessment-method props: @@ -13416,6 +14950,9 @@ catalog: value: IA-05a. class: sp800-53a prose: system authenticators are managed through the verification of the identity of the individual, group, role, service, or device receiving the authenticator as part of the initial authenticator distribution; + links: + - href: '#ia-5_smt.a' + rel: assessment-for - id: ia-5_obj.b name: assessment-objective props: @@ -13423,6 +14960,9 @@ catalog: value: IA-05b. class: sp800-53a prose: system authenticators are managed through the establishment of initial authenticator content for any authenticators issued by the organization; + links: + - href: '#ia-5_smt.b' + rel: assessment-for - id: ia-5_obj.c name: assessment-objective props: @@ -13430,6 +14970,9 @@ catalog: value: IA-05c. class: sp800-53a prose: system authenticators are managed to ensure that authenticators have sufficient strength of mechanism for their intended use; + links: + - href: '#ia-5_smt.c' + rel: assessment-for - id: ia-5_obj.d name: assessment-objective props: @@ -13437,6 +14980,9 @@ catalog: value: IA-05d. class: sp800-53a prose: system authenticators are managed through the establishment and implementation of administrative procedures for initial authenticator distribution; lost, compromised, or damaged authenticators; and the revocation of authenticators; + links: + - href: '#ia-5_smt.d' + rel: assessment-for - id: ia-5_obj.e name: assessment-objective props: @@ -13444,6 +14990,9 @@ catalog: value: IA-05e. class: sp800-53a prose: system authenticators are managed through the change of default authenticators prior to first use; + links: + - href: '#ia-5_smt.e' + rel: assessment-for - id: ia-5_obj.f name: assessment-objective props: @@ -13451,6 +15000,9 @@ catalog: value: IA-05f. class: sp800-53a prose: 'system authenticators are managed through the change or refreshment of authenticators {{ insert: param, ia-05_odp.01 }} or when {{ insert: param, ia-05_odp.02 }} occur;' + links: + - href: '#ia-5_smt.f' + rel: assessment-for - id: ia-5_obj.g name: assessment-objective props: @@ -13458,6 +15010,9 @@ catalog: value: IA-05g. class: sp800-53a prose: system authenticators are managed through the protection of authenticator content from unauthorized disclosure and modification; + links: + - href: '#ia-5_smt.g' + rel: assessment-for - id: ia-5_obj.h name: assessment-objective props: @@ -13472,6 +15027,9 @@ catalog: value: IA-05h.[01] class: sp800-53a prose: system authenticators are managed through the requirement for individuals to take specific controls to protect authenticators; + links: + - href: '#ia-5_smt.h' + rel: assessment-for - id: ia-5_obj.h-2 name: assessment-objective props: @@ -13479,6 +15037,12 @@ catalog: value: IA-05h.[02] class: sp800-53a prose: system authenticators are managed through the requirement for devices to implement specific controls to protect authenticators; + links: + - href: '#ia-5_smt.h' + rel: assessment-for + links: + - href: '#ia-5_smt.h' + rel: assessment-for - id: ia-5_obj.i name: assessment-objective props: @@ -13486,6 +15050,12 @@ catalog: value: IA-05i. class: sp800-53a prose: system authenticators are managed through the change of authenticators for group or role accounts when membership to those accounts changes. + links: + - href: '#ia-5_smt.i' + rel: assessment-for + links: + - href: '#ia-5_smt' + rel: assessment-for - id: ia-5_asm-examine name: assessment-method props: @@ -13658,6 +15228,9 @@ catalog: value: IA-05(01)(a) class: sp800-53a prose: 'for password-based authentication, a list of commonly used, expected, or compromised passwords is maintained and updated {{ insert: param, ia-05.01_odp.01 }} and when organizational passwords are suspected to have been compromised directly or indirectly;' + links: + - href: '#ia-5.1_smt.a' + rel: assessment-for - id: ia-5.1_obj.b name: assessment-objective props: @@ -13665,6 +15238,9 @@ catalog: value: IA-05(01)(b) class: sp800-53a prose: for password-based authentication when passwords are created or updated by users, the passwords are verified not to be found on the list of commonly used, expected, or compromised passwords in IA-05(01)(a); + links: + - href: '#ia-5.1_smt.b' + rel: assessment-for - id: ia-5.1_obj.c name: assessment-objective props: @@ -13672,6 +15248,9 @@ catalog: value: IA-05(01)(c) class: sp800-53a prose: for password-based authentication, passwords are only transmitted over cryptographically protected channels; + links: + - href: '#ia-5.1_smt.c' + rel: assessment-for - id: ia-5.1_obj.d name: assessment-objective props: @@ -13679,6 +15258,9 @@ catalog: value: IA-05(01)(d) class: sp800-53a prose: for password-based authentication, passwords are stored using an approved salted key derivation function, preferably using a keyed hash; + links: + - href: '#ia-5.1_smt.d' + rel: assessment-for - id: ia-5.1_obj.e name: assessment-objective props: @@ -13686,6 +15268,9 @@ catalog: value: IA-05(01)(e) class: sp800-53a prose: for password-based authentication, immediate selection of a new password is required upon account recovery; + links: + - href: '#ia-5.1_smt.e' + rel: assessment-for - id: ia-5.1_obj.f name: assessment-objective props: @@ -13693,6 +15278,9 @@ catalog: value: IA-05(01)(f) class: sp800-53a prose: for password-based authentication, user selection of long passwords and passphrases is allowed, including spaces and all printable characters; + links: + - href: '#ia-5.1_smt.f' + rel: assessment-for - id: ia-5.1_obj.g name: assessment-objective props: @@ -13700,6 +15288,9 @@ catalog: value: IA-05(01)(g) class: sp800-53a prose: for password-based authentication, automated tools are employed to assist the user in selecting strong password authenticators; + links: + - href: '#ia-5.1_smt.g' + rel: assessment-for - id: ia-5.1_obj.h name: assessment-objective props: @@ -13707,6 +15298,12 @@ catalog: value: IA-05(01)(h) class: sp800-53a prose: 'for password-based authentication, {{ insert: param, ia-05.01_odp.02 }} are enforced.' + links: + - href: '#ia-5.1_smt.h' + rel: assessment-for + links: + - href: '#ia-5.1_smt' + rel: assessment-for - id: ia-5.1_asm-examine name: assessment-method props: @@ -13796,6 +15393,9 @@ catalog: value: IA-06 class: sp800-53a prose: the feedback of authentication information is obscured during the authentication process to protect the information from possible exploitation and use by unauthorized individuals. + links: + - href: '#ia-6_smt' + rel: assessment-for - id: ia-6_asm-examine name: assessment-method props: @@ -13891,6 +15491,9 @@ catalog: value: IA-07 class: sp800-53a prose: mechanisms for authentication to a cryptographic module are implemented that meet the requirements of applicable laws, executive orders, directives, policies, regulations, standards, and guidelines for such authentication. + links: + - href: '#ia-7_smt' + rel: assessment-for - id: ia-7_asm-examine name: assessment-method props: @@ -13998,6 +15601,8 @@ catalog: rel: related - href: '#ia-11' rel: related + - href: '#ia-13' + rel: related - href: '#ma-4' rel: related - href: '#ra-3' @@ -14020,6 +15625,9 @@ catalog: value: IA-08 class: sp800-53a prose: non-organizational users or processes acting on behalf of non-organizational users are uniquely identified and authenticated. + links: + - href: '#ia-8_smt' + rel: assessment-for - id: ia-8_asm-examine name: assessment-method props: @@ -14121,6 +15729,9 @@ catalog: value: IA-08(01)[01] class: sp800-53a prose: Personal Identity Verification-compliant credentials from other federal agencies are accepted; + links: + - href: '#ia-8.1_smt' + rel: assessment-for - id: ia-8.1_obj-2 name: assessment-objective props: @@ -14128,6 +15739,12 @@ catalog: value: IA-08(01)[02] class: sp800-53a prose: Personal Identity Verification-compliant credentials from other federal agencies are electronically verified. + links: + - href: '#ia-8.1_smt' + rel: assessment-for + links: + - href: '#ia-8.1_smt' + rel: assessment-for - id: ia-8.1_asm-examine name: assessment-method props: @@ -14245,6 +15862,9 @@ catalog: value: IA-08(02)(a) class: sp800-53a prose: only external authenticators that are NIST-compliant are accepted; + links: + - href: '#ia-8.2_smt.a' + rel: assessment-for - id: ia-8.2_obj.b name: assessment-objective props: @@ -14259,6 +15879,9 @@ catalog: value: IA-08(02)(b)[01] class: sp800-53a prose: a list of accepted external authenticators is documented; + links: + - href: '#ia-8.2_smt.b' + rel: assessment-for - id: ia-8.2_obj.b-2 name: assessment-objective props: @@ -14266,6 +15889,15 @@ catalog: value: IA-08(02)(b)[02] class: sp800-53a prose: a list of accepted external authenticators is maintained. + links: + - href: '#ia-8.2_smt.b' + rel: assessment-for + links: + - href: '#ia-8.2_smt.b' + rel: assessment-for + links: + - href: '#ia-8.2_smt' + rel: assessment-for - id: ia-8.2_asm-examine name: assessment-method props: @@ -14377,6 +16009,9 @@ catalog: value: IA-08(04) class: sp800-53a prose: 'there is conformance with {{ insert: param, ia-08.04_odp }} for identity management.' + links: + - href: '#ia-8.4_smt' + rel: assessment-for - id: ia-8.4_asm-examine name: assessment-method props: @@ -14494,6 +16129,9 @@ catalog: value: IA-11 class: sp800-53a prose: 'users are required to re-authenticate when {{ insert: param, ia-11_odp }}.' + links: + - href: '#ia-11_smt' + rel: assessment-for - id: ia-11_asm-examine name: assessment-method props: @@ -14772,6 +16410,9 @@ catalog: value: IR-01a.[01] class: sp800-53a prose: an incident response policy is developed and documented; + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.a-2 name: assessment-objective props: @@ -14779,6 +16420,9 @@ catalog: value: IR-01a.[02] class: sp800-53a prose: 'the incident response policy is disseminated to {{ insert: param, ir-01_odp.01 }};' + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.a-3 name: assessment-objective props: @@ -14786,6 +16430,9 @@ catalog: value: IR-01a.[03] class: sp800-53a prose: incident response procedures to facilitate the implementation of the incident response policy and associated incident response controls are developed and documented; + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.a-4 name: assessment-objective props: @@ -14793,6 +16440,9 @@ catalog: value: IR-01a.[04] class: sp800-53a prose: 'the incident response procedures are disseminated to {{ insert: param, ir-01_odp.02 }};' + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.a.1 name: assessment-objective props: @@ -14814,6 +16464,9 @@ catalog: value: IR-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses purpose;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-2 name: assessment-objective props: @@ -14821,6 +16474,9 @@ catalog: value: IR-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses scope;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-3 name: assessment-objective props: @@ -14828,6 +16484,9 @@ catalog: value: IR-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses roles;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-4 name: assessment-objective props: @@ -14835,6 +16494,9 @@ catalog: value: IR-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses responsibilities;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-5 name: assessment-objective props: @@ -14842,6 +16504,9 @@ catalog: value: IR-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses management commitment;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-6 name: assessment-objective props: @@ -14849,6 +16514,9 @@ catalog: value: IR-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses coordination among organizational entities;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-7 name: assessment-objective props: @@ -14856,6 +16524,12 @@ catalog: value: IR-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses compliance;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.b name: assessment-objective props: @@ -14863,6 +16537,15 @@ catalog: value: IR-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ir-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ir-1_smt.a.1' + rel: assessment-for + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.b name: assessment-objective props: @@ -14870,6 +16553,9 @@ catalog: value: IR-01b. class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the incident response policy and procedures;' + links: + - href: '#ir-1_smt.b' + rel: assessment-for - id: ir-1_obj.c name: assessment-objective props: @@ -14891,6 +16577,9 @@ catalog: value: IR-01c.01[01] class: sp800-53a prose: 'the current incident response policy is reviewed and updated {{ insert: param, ir-01_odp.05 }};' + links: + - href: '#ir-1_smt.c.1' + rel: assessment-for - id: ir-1_obj.c.1-2 name: assessment-objective props: @@ -14898,6 +16587,12 @@ catalog: value: IR-01c.01[02] class: sp800-53a prose: 'the current incident response policy is reviewed and updated following {{ insert: param, ir-01_odp.06 }};' + links: + - href: '#ir-1_smt.c.1' + rel: assessment-for + links: + - href: '#ir-1_smt.c.1' + rel: assessment-for - id: ir-1_obj.c.2 name: assessment-objective props: @@ -14912,6 +16607,9 @@ catalog: value: IR-01c.02[01] class: sp800-53a prose: 'the current incident response procedures are reviewed and updated {{ insert: param, ir-01_odp.07 }};' + links: + - href: '#ir-1_smt.c.2' + rel: assessment-for - id: ir-1_obj.c.2-2 name: assessment-objective props: @@ -14919,6 +16617,18 @@ catalog: value: IR-01c.02[02] class: sp800-53a prose: 'the current incident response procedures are reviewed and updated following {{ insert: param, ir-01_odp.08 }}.' + links: + - href: '#ir-1_smt.c.2' + rel: assessment-for + links: + - href: '#ir-1_smt.c.2' + rel: assessment-for + links: + - href: '#ir-1_smt.c' + rel: assessment-for + links: + - href: '#ir-1_smt' + rel: assessment-for - id: ir-1_asm-examine name: assessment-method props: @@ -15091,6 +16801,9 @@ catalog: value: IR-02a.01 class: sp800-53a prose: 'incident response training is provided to system users consistent with assigned roles and responsibilities within {{ insert: param, ir-02_odp.01 }} of assuming an incident response role or responsibility or acquiring system access;' + links: + - href: '#ir-2_smt.a.1' + rel: assessment-for - id: ir-2_obj.a.2 name: assessment-objective props: @@ -15098,6 +16811,9 @@ catalog: value: IR-02a.02 class: sp800-53a prose: incident response training is provided to system users consistent with assigned roles and responsibilities when required by system changes; + links: + - href: '#ir-2_smt.a.2' + rel: assessment-for - id: ir-2_obj.a.3 name: assessment-objective props: @@ -15105,6 +16821,12 @@ catalog: value: IR-02a.03 class: sp800-53a prose: 'incident response training is provided to system users consistent with assigned roles and responsibilities {{ insert: param, ir-02_odp.02 }} thereafter;' + links: + - href: '#ir-2_smt.a.3' + rel: assessment-for + links: + - href: '#ir-2_smt.a' + rel: assessment-for - id: ir-2_obj.b name: assessment-objective props: @@ -15119,6 +16841,9 @@ catalog: value: IR-02b.[01] class: sp800-53a prose: 'incident response training content is reviewed and updated {{ insert: param, ir-02_odp.03 }};' + links: + - href: '#ir-2_smt.b' + rel: assessment-for - id: ir-2_obj.b-2 name: assessment-objective props: @@ -15126,6 +16851,15 @@ catalog: value: IR-02b.[02] class: sp800-53a prose: 'incident response training content is reviewed and updated following {{ insert: param, ir-02_odp.04 }}.' + links: + - href: '#ir-2_smt.b' + rel: assessment-for + links: + - href: '#ir-2_smt.b' + rel: assessment-for + links: + - href: '#ir-2_smt' + rel: assessment-for - id: ir-2_asm-examine name: assessment-method props: @@ -15301,6 +17035,9 @@ catalog: value: IR-04a.[01] class: sp800-53a prose: an incident handling capability for incidents is implemented that is consistent with the incident response plan; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-2 name: assessment-objective props: @@ -15308,6 +17045,9 @@ catalog: value: IR-04a.[02] class: sp800-53a prose: the incident handling capability for incidents includes preparation; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-3 name: assessment-objective props: @@ -15315,6 +17055,9 @@ catalog: value: IR-04a.[03] class: sp800-53a prose: the incident handling capability for incidents includes detection and analysis; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-4 name: assessment-objective props: @@ -15322,6 +17065,9 @@ catalog: value: IR-04a.[04] class: sp800-53a prose: the incident handling capability for incidents includes containment; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-5 name: assessment-objective props: @@ -15329,6 +17075,9 @@ catalog: value: IR-04a.[05] class: sp800-53a prose: the incident handling capability for incidents includes eradication; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-6 name: assessment-objective props: @@ -15336,6 +17085,12 @@ catalog: value: IR-04a.[06] class: sp800-53a prose: the incident handling capability for incidents includes recovery; + links: + - href: '#ir-4_smt.a' + rel: assessment-for + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.b name: assessment-objective props: @@ -15343,6 +17098,9 @@ catalog: value: IR-04b. class: sp800-53a prose: incident handling activities are coordinated with contingency planning activities; + links: + - href: '#ir-4_smt.b' + rel: assessment-for - id: ir-4_obj.c name: assessment-objective props: @@ -15357,6 +17115,9 @@ catalog: value: IR-04c.[01] class: sp800-53a prose: lessons learned from ongoing incident handling activities are incorporated into incident response procedures, training, and testing; + links: + - href: '#ir-4_smt.c' + rel: assessment-for - id: ir-4_obj.c-2 name: assessment-objective props: @@ -15364,6 +17125,12 @@ catalog: value: IR-04c.[02] class: sp800-53a prose: the changes resulting from the incorporated lessons learned are implemented accordingly; + links: + - href: '#ir-4_smt.c' + rel: assessment-for + links: + - href: '#ir-4_smt.c' + rel: assessment-for - id: ir-4_obj.d name: assessment-objective props: @@ -15378,6 +17145,9 @@ catalog: value: IR-04d.[01] class: sp800-53a prose: the rigor of incident handling activities is comparable and predictable across the organization; + links: + - href: '#ir-4_smt.d' + rel: assessment-for - id: ir-4_obj.d-2 name: assessment-objective props: @@ -15385,6 +17155,9 @@ catalog: value: IR-04d.[02] class: sp800-53a prose: the intensity of incident handling activities is comparable and predictable across the organization; + links: + - href: '#ir-4_smt.d' + rel: assessment-for - id: ir-4_obj.d-3 name: assessment-objective props: @@ -15392,6 +17165,9 @@ catalog: value: IR-04d.[03] class: sp800-53a prose: the scope of incident handling activities is comparable and predictable across the organization; + links: + - href: '#ir-4_smt.d' + rel: assessment-for - id: ir-4_obj.d-4 name: assessment-objective props: @@ -15399,6 +17175,15 @@ catalog: value: IR-04d.[04] class: sp800-53a prose: the results of incident handling activities are comparable and predictable across the organization. + links: + - href: '#ir-4_smt.d' + rel: assessment-for + links: + - href: '#ir-4_smt.d' + rel: assessment-for + links: + - href: '#ir-4_smt' + rel: assessment-for - id: ir-4_asm-examine name: assessment-method props: @@ -15520,6 +17305,9 @@ catalog: value: IR-05[01] class: sp800-53a prose: incidents are tracked; + links: + - href: '#ir-5_smt' + rel: assessment-for - id: ir-5_obj-2 name: assessment-objective props: @@ -15527,6 +17315,12 @@ catalog: value: IR-05[02] class: sp800-53a prose: incidents are documented. + links: + - href: '#ir-5_smt' + rel: assessment-for + links: + - href: '#ir-5_smt' + rel: assessment-for - id: ir-5_asm-examine name: assessment-method props: @@ -15671,6 +17465,9 @@ catalog: value: IR-06a. class: sp800-53a prose: 'personnel is/are required to report suspected incidents to the organizational incident response capability within {{ insert: param, ir-06_odp.01 }};' + links: + - href: '#ir-6_smt.a' + rel: assessment-for - id: ir-6_obj.b name: assessment-objective props: @@ -15678,6 +17475,12 @@ catalog: value: IR-06b. class: sp800-53a prose: 'incident information is reported to {{ insert: param, ir-06_odp.02 }}.' + links: + - href: '#ir-6_smt.b' + rel: assessment-for + links: + - href: '#ir-6_smt' + rel: assessment-for - id: ir-6_asm-examine name: assessment-method props: @@ -15797,6 +17600,9 @@ catalog: value: IR-07[01] class: sp800-53a prose: an incident response support resource, integral to the organizational incident response capability, is provided; + links: + - href: '#ir-7_smt' + rel: assessment-for - id: ir-7_obj-2 name: assessment-objective props: @@ -15804,6 +17610,12 @@ catalog: value: IR-07[02] class: sp800-53a prose: the incident response support resource offers advice and assistance to users of the system for the response and reporting of incidents. + links: + - href: '#ir-7_smt' + rel: assessment-for + links: + - href: '#ir-7_smt' + rel: assessment-for - id: ir-7_asm-examine name: assessment-method props: @@ -16101,6 +17913,9 @@ catalog: value: IR-08a.01 class: sp800-53a prose: an incident response plan is developed that provides the organization with a roadmap for implementing its incident response capability; + links: + - href: '#ir-8_smt.a.1' + rel: assessment-for - id: ir-8_obj.a.2 name: assessment-objective props: @@ -16108,6 +17923,9 @@ catalog: value: IR-08a.02 class: sp800-53a prose: an incident response plan is developed that describes the structure and organization of the incident response capability; + links: + - href: '#ir-8_smt.a.2' + rel: assessment-for - id: ir-8_obj.a.3 name: assessment-objective props: @@ -16115,6 +17933,9 @@ catalog: value: IR-08a.03 class: sp800-53a prose: an incident response plan is developed that provides a high-level approach for how the incident response capability fits into the overall organization; + links: + - href: '#ir-8_smt.a.3' + rel: assessment-for - id: ir-8_obj.a.4 name: assessment-objective props: @@ -16122,6 +17943,9 @@ catalog: value: IR-08a.04 class: sp800-53a prose: an incident response plan is developed that meets the unique requirements of the organization with regard to mission, size, structure, and functions; + links: + - href: '#ir-8_smt.a.4' + rel: assessment-for - id: ir-8_obj.a.5 name: assessment-objective props: @@ -16129,6 +17953,9 @@ catalog: value: IR-08a.05 class: sp800-53a prose: an incident response plan is developed that defines reportable incidents; + links: + - href: '#ir-8_smt.a.5' + rel: assessment-for - id: ir-8_obj.a.6 name: assessment-objective props: @@ -16136,6 +17963,9 @@ catalog: value: IR-08a.06 class: sp800-53a prose: an incident response plan is developed that provides metrics for measuring the incident response capability within the organization; + links: + - href: '#ir-8_smt.a.6' + rel: assessment-for - id: ir-8_obj.a.7 name: assessment-objective props: @@ -16143,6 +17973,9 @@ catalog: value: IR-08a.07 class: sp800-53a prose: an incident response plan is developed that defines the resources and management support needed to effectively maintain and mature an incident response capability; + links: + - href: '#ir-8_smt.a.7' + rel: assessment-for - id: ir-8_obj.a.8 name: assessment-objective props: @@ -16150,6 +17983,9 @@ catalog: value: IR-08a.08 class: sp800-53a prose: an incident response plan is developed that addresses the sharing of incident information; + links: + - href: '#ir-8_smt.a.8' + rel: assessment-for - id: ir-8_obj.a.9 name: assessment-objective props: @@ -16157,6 +17993,9 @@ catalog: value: IR-08a.09 class: sp800-53a prose: 'an incident response plan is developed that is reviewed and approved by {{ insert: param, ir-08_odp.01 }} {{ insert: param, ir-08_odp.02 }};' + links: + - href: '#ir-8_smt.a.9' + rel: assessment-for - id: ir-8_obj.a.10 name: assessment-objective props: @@ -16164,6 +18003,12 @@ catalog: value: IR-08a.10 class: sp800-53a prose: 'an incident response plan is developed that explicitly designates responsibility for incident response to {{ insert: param, ir-08_odp.03 }}.' + links: + - href: '#ir-8_smt.a.10' + rel: assessment-for + links: + - href: '#ir-8_smt.a' + rel: assessment-for - id: ir-8_obj.b name: assessment-objective props: @@ -16178,6 +18023,9 @@ catalog: value: IR-08b.[01] class: sp800-53a prose: 'copies of the incident response plan are distributed to {{ insert: param, ir-08_odp.04 }};' + links: + - href: '#ir-8_smt.b' + rel: assessment-for - id: ir-8_obj.b-2 name: assessment-objective props: @@ -16185,6 +18033,12 @@ catalog: value: IR-08b.[02] class: sp800-53a prose: 'copies of the incident response plan are distributed to {{ insert: param, ir-08_odp.05 }};' + links: + - href: '#ir-8_smt.b' + rel: assessment-for + links: + - href: '#ir-8_smt.b' + rel: assessment-for - id: ir-8_obj.c name: assessment-objective props: @@ -16192,6 +18046,9 @@ catalog: value: IR-08c. class: sp800-53a prose: the incident response plan is updated to address system and organizational changes or problems encountered during plan implementation, execution, or testing; + links: + - href: '#ir-8_smt.c' + rel: assessment-for - id: ir-8_obj.d name: assessment-objective props: @@ -16206,6 +18063,9 @@ catalog: value: IR-08d.[01] class: sp800-53a prose: 'incident response plan changes are communicated to {{ insert: param, ir-08_odp.06 }};' + links: + - href: '#ir-8_smt.d' + rel: assessment-for - id: ir-8_obj.d-2 name: assessment-objective props: @@ -16213,6 +18073,12 @@ catalog: value: IR-08d.[02] class: sp800-53a prose: 'incident response plan changes are communicated to {{ insert: param, ir-08_odp.07 }};' + links: + - href: '#ir-8_smt.d' + rel: assessment-for + links: + - href: '#ir-8_smt.d' + rel: assessment-for - id: ir-8_obj.e name: assessment-objective props: @@ -16227,6 +18093,9 @@ catalog: value: IR-08e.[01] class: sp800-53a prose: the incident response plan is protected from unauthorized disclosure; + links: + - href: '#ir-8_smt.e' + rel: assessment-for - id: ir-8_obj.e-2 name: assessment-objective props: @@ -16234,6 +18103,15 @@ catalog: value: IR-08e.[02] class: sp800-53a prose: the incident response plan is protected from unauthorized modification. + links: + - href: '#ir-8_smt.e' + rel: assessment-for + links: + - href: '#ir-8_smt.e' + rel: assessment-for + links: + - href: '#ir-8_smt' + rel: assessment-for - id: ir-8_asm-examine name: assessment-method props: @@ -16498,6 +18376,9 @@ catalog: value: MA-01a.[01] class: sp800-53a prose: a maintenance policy is developed and documented; + links: + - href: '#ma-1_smt.a' + rel: assessment-for - id: ma-1_obj.a-2 name: assessment-objective props: @@ -16505,6 +18386,9 @@ catalog: value: MA-01a.[02] class: sp800-53a prose: 'the maintenance policy is disseminated to {{ insert: param, ma-01_odp.01 }};' + links: + - href: '#ma-1_smt.a' + rel: assessment-for - id: ma-1_obj.a-3 name: assessment-objective props: @@ -16512,6 +18396,9 @@ catalog: value: MA-01a.[03] class: sp800-53a prose: maintenance procedures to facilitate the implementation of the maintenance policy and associated maintenance controls are developed and documented; + links: + - href: '#ma-1_smt.a' + rel: assessment-for - id: ma-1_obj.a-4 name: assessment-objective props: @@ -16519,6 +18406,9 @@ catalog: value: MA-01a.[04] class: sp800-53a prose: 'the maintenance procedures are disseminated to {{ insert: param, ma-01_odp.02 }};' + links: + - href: '#ma-1_smt.a' + rel: assessment-for - id: ma-1_obj.a.1 name: assessment-objective props: @@ -16540,6 +18430,9 @@ catalog: value: MA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses purpose;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-2 name: assessment-objective props: @@ -16547,6 +18440,9 @@ catalog: value: MA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses scope;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-3 name: assessment-objective props: @@ -16554,6 +18450,9 @@ catalog: value: MA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses roles;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-4 name: assessment-objective props: @@ -16561,6 +18460,9 @@ catalog: value: MA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses responsibilities;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-5 name: assessment-objective props: @@ -16568,6 +18470,9 @@ catalog: value: MA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses management commitment;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-6 name: assessment-objective props: @@ -16575,6 +18480,9 @@ catalog: value: MA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses coordination among organizational entities;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-7 name: assessment-objective props: @@ -16582,6 +18490,12 @@ catalog: value: MA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses compliance;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.b name: assessment-objective props: @@ -16589,6 +18503,15 @@ catalog: value: MA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ma-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ma-1_smt.a.1' + rel: assessment-for + links: + - href: '#ma-1_smt.a' + rel: assessment-for - id: ma-1_obj.b name: assessment-objective props: @@ -16596,6 +18519,9 @@ catalog: value: MA-01b. class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the maintenance policy and procedures;' + links: + - href: '#ma-1_smt.b' + rel: assessment-for - id: ma-1_obj.c name: assessment-objective props: @@ -16617,6 +18543,9 @@ catalog: value: MA-01c.01[01] class: sp800-53a prose: 'the current maintenance policy is reviewed and updated {{ insert: param, ma-01_odp.05 }};' + links: + - href: '#ma-1_smt.c.1' + rel: assessment-for - id: ma-1_obj.c.1-2 name: assessment-objective props: @@ -16624,6 +18553,12 @@ catalog: value: MA-01c.01[02] class: sp800-53a prose: 'the current maintenance policy is reviewed and updated following {{ insert: param, ma-01_odp.06 }};' + links: + - href: '#ma-1_smt.c.1' + rel: assessment-for + links: + - href: '#ma-1_smt.c.1' + rel: assessment-for - id: ma-1_obj.c.2 name: assessment-objective props: @@ -16638,6 +18573,9 @@ catalog: value: MA-01c.02[01] class: sp800-53a prose: 'the current maintenance procedures are reviewed and updated {{ insert: param, ma-01_odp.07 }};' + links: + - href: '#ma-1_smt.c.2' + rel: assessment-for - id: ma-1_obj.c.2-2 name: assessment-objective props: @@ -16645,6 +18583,18 @@ catalog: value: MA-01c.02[02] class: sp800-53a prose: 'the current maintenance procedures are reviewed and updated following {{ insert: param, ma-01_odp.08 }}.' + links: + - href: '#ma-1_smt.c.2' + rel: assessment-for + links: + - href: '#ma-1_smt.c.2' + rel: assessment-for + links: + - href: '#ma-1_smt.c' + rel: assessment-for + links: + - href: '#ma-1_smt' + rel: assessment-for - id: ma-1_asm-examine name: assessment-method props: @@ -16819,6 +18769,9 @@ catalog: value: MA-02a.[01] class: sp800-53a prose: maintenance, repair, and replacement of system components are scheduled in accordance with manufacturer or vendor specifications and/or organizational requirements; + links: + - href: '#ma-2_smt.a' + rel: assessment-for - id: ma-2_obj.a-2 name: assessment-objective props: @@ -16826,6 +18779,9 @@ catalog: value: MA-02a.[02] class: sp800-53a prose: maintenance, repair, and replacement of system components are documented in accordance with manufacturer or vendor specifications and/or organizational requirements; + links: + - href: '#ma-2_smt.a' + rel: assessment-for - id: ma-2_obj.a-3 name: assessment-objective props: @@ -16833,6 +18789,12 @@ catalog: value: MA-02a.[03] class: sp800-53a prose: records of maintenance, repair, and replacement of system components are reviewed in accordance with manufacturer or vendor specifications and/or organizational requirements; + links: + - href: '#ma-2_smt.a' + rel: assessment-for + links: + - href: '#ma-2_smt.a' + rel: assessment-for - id: ma-2_obj.b name: assessment-objective props: @@ -16847,6 +18809,9 @@ catalog: value: MA-02b.[01] class: sp800-53a prose: all maintenance activities, whether performed on site or remotely and whether the system or system components are serviced on site or removed to another location, are approved; + links: + - href: '#ma-2_smt.b' + rel: assessment-for - id: ma-2_obj.b-2 name: assessment-objective props: @@ -16854,6 +18819,12 @@ catalog: value: MA-02b.[02] class: sp800-53a prose: all maintenance activities, whether performed on site or remotely and whether the system or system components are serviced on site or removed to another location, are monitored; + links: + - href: '#ma-2_smt.b' + rel: assessment-for + links: + - href: '#ma-2_smt.b' + rel: assessment-for - id: ma-2_obj.c name: assessment-objective props: @@ -16861,6 +18832,9 @@ catalog: value: MA-02c. class: sp800-53a prose: ' {{ insert: param, ma-02_odp.01 }} is/are required to explicitly approve the removal of the system or system components from organizational facilities for off-site maintenance, repair, or replacement;' + links: + - href: '#ma-2_smt.c' + rel: assessment-for - id: ma-2_obj.d name: assessment-objective props: @@ -16868,6 +18842,9 @@ catalog: value: MA-02d. class: sp800-53a prose: 'equipment is sanitized to remove {{ insert: param, ma-02_odp.02 }} from associated media prior to removal from organizational facilities for off-site maintenance, repair, or replacement;' + links: + - href: '#ma-2_smt.d' + rel: assessment-for - id: ma-2_obj.e name: assessment-objective props: @@ -16875,6 +18852,9 @@ catalog: value: MA-02e. class: sp800-53a prose: all potentially impacted controls are checked to verify that the controls are still functioning properly following maintenance, repair, or replacement actions; + links: + - href: '#ma-2_smt.e' + rel: assessment-for - id: ma-2_obj.f name: assessment-objective props: @@ -16882,6 +18862,12 @@ catalog: value: MA-02f. class: sp800-53a prose: ' {{ insert: param, ma-02_odp.03 }} is included in organizational maintenance records.' + links: + - href: '#ma-2_smt.f' + rel: assessment-for + links: + - href: '#ma-2_smt' + rel: assessment-for - id: ma-2_asm-examine name: assessment-method props: @@ -17060,6 +19046,9 @@ catalog: value: MA-04a.[01] class: sp800-53a prose: nonlocal maintenance and diagnostic activities are approved; + links: + - href: '#ma-4_smt.a' + rel: assessment-for - id: ma-4_obj.a-2 name: assessment-objective props: @@ -17067,6 +19056,12 @@ catalog: value: MA-04a.[02] class: sp800-53a prose: nonlocal maintenance and diagnostic activities are monitored; + links: + - href: '#ma-4_smt.a' + rel: assessment-for + links: + - href: '#ma-4_smt.a' + rel: assessment-for - id: ma-4_obj.b name: assessment-objective props: @@ -17081,6 +19076,9 @@ catalog: value: MA-04b.[01] class: sp800-53a prose: the use of nonlocal maintenance and diagnostic tools are allowed only as consistent with organizational policy; + links: + - href: '#ma-4_smt.b' + rel: assessment-for - id: ma-4_obj.b-2 name: assessment-objective props: @@ -17088,6 +19086,12 @@ catalog: value: MA-04b.[02] class: sp800-53a prose: the use of nonlocal maintenance and diagnostic tools are documented in the security plan for the system; + links: + - href: '#ma-4_smt.b' + rel: assessment-for + links: + - href: '#ma-4_smt.b' + rel: assessment-for - id: ma-4_obj.c name: assessment-objective props: @@ -17095,6 +19099,9 @@ catalog: value: MA-04c. class: sp800-53a prose: strong authentication is employed in the establishment of nonlocal maintenance and diagnostic sessions; + links: + - href: '#ma-4_smt.c' + rel: assessment-for - id: ma-4_obj.d name: assessment-objective props: @@ -17102,6 +19109,9 @@ catalog: value: MA-04d. class: sp800-53a prose: records for nonlocal maintenance and diagnostic activities are maintained; + links: + - href: '#ma-4_smt.d' + rel: assessment-for - id: ma-4_obj.e name: assessment-objective props: @@ -17116,6 +19126,9 @@ catalog: value: MA-04e.[01] class: sp800-53a prose: session connections are terminated when nonlocal maintenance is completed; + links: + - href: '#ma-4_smt.e' + rel: assessment-for - id: ma-4_obj.e-2 name: assessment-objective props: @@ -17123,6 +19136,15 @@ catalog: value: MA-04e.[02] class: sp800-53a prose: network connections are terminated when nonlocal maintenance is completed. + links: + - href: '#ma-4_smt.e' + rel: assessment-for + links: + - href: '#ma-4_smt.e' + rel: assessment-for + links: + - href: '#ma-4_smt' + rel: assessment-for - id: ma-4_asm-examine name: assessment-method props: @@ -17277,6 +19299,9 @@ catalog: value: MA-05a.[01] class: sp800-53a prose: a process for maintenance personnel authorization is established; + links: + - href: '#ma-5_smt.a' + rel: assessment-for - id: ma-5_obj.a-2 name: assessment-objective props: @@ -17284,6 +19309,12 @@ catalog: value: MA-05a.[02] class: sp800-53a prose: a list of authorized maintenance organizations or personnel is maintained; + links: + - href: '#ma-5_smt.a' + rel: assessment-for + links: + - href: '#ma-5_smt.a' + rel: assessment-for - id: ma-5_obj.b name: assessment-objective props: @@ -17291,6 +19322,9 @@ catalog: value: MA-05b. class: sp800-53a prose: non-escorted personnel performing maintenance on the system possess the required access authorizations; + links: + - href: '#ma-5_smt.b' + rel: assessment-for - id: ma-5_obj.c name: assessment-objective props: @@ -17298,6 +19332,12 @@ catalog: value: MA-05c. class: sp800-53a prose: organizational personnel with required access authorizations and technical competence is/are designated to supervise the maintenance activities of personnel who do not possess the required access authorizations. + links: + - href: '#ma-5_smt.c' + rel: assessment-for + links: + - href: '#ma-5_smt' + rel: assessment-for - id: ma-5_asm-examine name: assessment-method props: @@ -17569,6 +19609,9 @@ catalog: value: MP-01a.[01] class: sp800-53a prose: a media protection policy is developed and documented; + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.a-2 name: assessment-objective props: @@ -17576,6 +19619,9 @@ catalog: value: MP-01a.[02] class: sp800-53a prose: 'the media protection policy is disseminated to {{ insert: param, mp-01_odp.01 }};' + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.a-3 name: assessment-objective props: @@ -17583,6 +19629,9 @@ catalog: value: MP-01a.[03] class: sp800-53a prose: media protection procedures to facilitate the implementation of the media protection policy and associated media protection controls are developed and documented; + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.a-4 name: assessment-objective props: @@ -17590,6 +19639,9 @@ catalog: value: MP-01a.[04] class: sp800-53a prose: 'the media protection procedures are disseminated to {{ insert: param, mp-01_odp.02 }};' + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.a.1 name: assessment-objective props: @@ -17611,6 +19663,9 @@ catalog: value: MP-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses purpose;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-2 name: assessment-objective props: @@ -17618,6 +19673,9 @@ catalog: value: MP-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses scope;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-3 name: assessment-objective props: @@ -17625,6 +19683,9 @@ catalog: value: MP-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses roles;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-4 name: assessment-objective props: @@ -17632,6 +19693,9 @@ catalog: value: MP-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses responsibilities;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-5 name: assessment-objective props: @@ -17639,6 +19703,9 @@ catalog: value: MP-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses management commitment;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-6 name: assessment-objective props: @@ -17646,6 +19713,9 @@ catalog: value: MP-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses coordination among organizational entities;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-7 name: assessment-objective props: @@ -17653,6 +19723,12 @@ catalog: value: MP-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy compliance;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.b name: assessment-objective props: @@ -17660,6 +19736,15 @@ catalog: value: MP-01a.01(b) class: sp800-53a prose: the media protection policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines; + links: + - href: '#mp-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#mp-1_smt.a.1' + rel: assessment-for + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.b name: assessment-objective props: @@ -17667,6 +19752,9 @@ catalog: value: MP-01b. class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the media protection policy and procedures.' + links: + - href: '#mp-1_smt.b' + rel: assessment-for - id: mp-1_obj.c name: assessment-objective props: @@ -17688,6 +19776,9 @@ catalog: value: MP-01c.01[01] class: sp800-53a prose: 'the current media protection policy is reviewed and updated {{ insert: param, mp-01_odp.05 }}; ' + links: + - href: '#mp-1_smt.c.1' + rel: assessment-for - id: mp-1_obj.c.1-2 name: assessment-objective props: @@ -17695,6 +19786,12 @@ catalog: value: MP-01c.01[02] class: sp800-53a prose: 'the current media protection policy is reviewed and updated following {{ insert: param, mp-01_odp.06 }};' + links: + - href: '#mp-1_smt.c.1' + rel: assessment-for + links: + - href: '#mp-1_smt.c.1' + rel: assessment-for - id: mp-1_obj.c.2 name: assessment-objective props: @@ -17709,6 +19806,9 @@ catalog: value: MP-01c.02[01] class: sp800-53a prose: 'the current media protection procedures are reviewed and updated {{ insert: param, mp-01_odp.07 }}; ' + links: + - href: '#mp-1_smt.c.2' + rel: assessment-for - id: mp-1_obj.c.2-2 name: assessment-objective props: @@ -17716,6 +19816,18 @@ catalog: value: MP-01c.02[02] class: sp800-53a prose: 'the current media protection procedures are reviewed and updated following {{ insert: param, mp-01_odp.08 }}.' + links: + - href: '#mp-1_smt.c.2' + rel: assessment-for + links: + - href: '#mp-1_smt.c.2' + rel: assessment-for + links: + - href: '#mp-1_smt.c' + rel: assessment-for + links: + - href: '#mp-1_smt' + rel: assessment-for - id: mp-1_asm-examine name: assessment-method props: @@ -17873,6 +19985,9 @@ catalog: value: MP-02[01] class: sp800-53a prose: 'access to {{ insert: param, mp-02_odp.01 }} is restricted to {{ insert: param, mp-02_odp.02 }};' + links: + - href: '#mp-2_smt' + rel: assessment-for - id: mp-2_obj-2 name: assessment-objective props: @@ -17880,6 +19995,12 @@ catalog: value: MP-02[02] class: sp800-53a prose: 'access to {{ insert: param, mp-02_odp.03 }} is restricted to {{ insert: param, mp-02_odp.04 }}.' + links: + - href: '#mp-2_smt' + rel: assessment-for + links: + - href: '#mp-2_smt' + rel: assessment-for - id: mp-2_asm-examine name: assessment-method props: @@ -18111,6 +20232,9 @@ catalog: value: MP-06a.[01] class: sp800-53a prose: ' {{ insert: param, mp-06_odp.01 }} is sanitized using {{ insert: param, mp-06_odp.04 }} prior to disposal;' + links: + - href: '#mp-6_smt.a' + rel: assessment-for - id: mp-6_obj.a-2 name: assessment-objective props: @@ -18118,6 +20242,9 @@ catalog: value: MP-06a.[02] class: sp800-53a prose: ' {{ insert: param, mp-06_odp.02 }} is sanitized using {{ insert: param, mp-06_odp.05 }} prior to release from organizational control;' + links: + - href: '#mp-6_smt.a' + rel: assessment-for - id: mp-6_obj.a-3 name: assessment-objective props: @@ -18125,6 +20252,12 @@ catalog: value: MP-06a.[03] class: sp800-53a prose: ' {{ insert: param, mp-06_odp.03 }} is sanitized using {{ insert: param, mp-06_odp.06 }} prior to release for reuse;' + links: + - href: '#mp-6_smt.a' + rel: assessment-for + links: + - href: '#mp-6_smt.a' + rel: assessment-for - id: mp-6_obj.b name: assessment-objective props: @@ -18132,6 +20265,12 @@ catalog: value: MP-06b. class: sp800-53a prose: sanitization mechanisms with strength and integrity commensurate with the security category or classification of the information are employed. + links: + - href: '#mp-6_smt.b' + rel: assessment-for + links: + - href: '#mp-6_smt' + rel: assessment-for - id: mp-6_asm-examine name: assessment-method props: @@ -18307,6 +20446,9 @@ catalog: value: MP-07a. class: sp800-53a prose: 'the use of {{ insert: param, mp-07_odp.01 }} is {{ insert: param, mp-07_odp.02 }} on {{ insert: param, mp-07_odp.03 }} using {{ insert: param, mp-07_odp.04 }};' + links: + - href: '#mp-7_smt.a' + rel: assessment-for - id: mp-7_obj.b name: assessment-objective props: @@ -18314,6 +20456,12 @@ catalog: value: MP-07b. class: sp800-53a prose: the use of portable storage devices in organizational systems is prohibited when such devices have no identifiable owner. + links: + - href: '#mp-7_smt.b' + rel: assessment-for + links: + - href: '#mp-7_smt' + rel: assessment-for - id: mp-7_asm-examine name: assessment-method props: @@ -18587,6 +20735,9 @@ catalog: value: PE-01a.[01] class: sp800-53a prose: a physical and environmental protection policy is developed and documented; + links: + - href: '#pe-1_smt.a' + rel: assessment-for - id: pe-1_obj.a-2 name: assessment-objective props: @@ -18594,6 +20745,9 @@ catalog: value: PE-01a.[02] class: sp800-53a prose: 'the physical and environmental protection policy is disseminated to {{ insert: param, pe-01_odp.01 }};' + links: + - href: '#pe-1_smt.a' + rel: assessment-for - id: pe-1_obj.a-3 name: assessment-objective props: @@ -18601,6 +20755,9 @@ catalog: value: PE-01a.[03] class: sp800-53a prose: physical and environmental protection procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls are developed and documented; + links: + - href: '#pe-1_smt.a' + rel: assessment-for - id: pe-1_obj.a-4 name: assessment-objective props: @@ -18608,6 +20765,9 @@ catalog: value: PE-01a.[04] class: sp800-53a prose: 'the physical and environmental protection procedures are disseminated to {{ insert: param, pe-01_odp.02 }};' + links: + - href: '#pe-1_smt.a' + rel: assessment-for - id: pe-1_obj.a.1 name: assessment-objective props: @@ -18629,6 +20789,9 @@ catalog: value: PE-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses purpose;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-2 name: assessment-objective props: @@ -18636,6 +20799,9 @@ catalog: value: PE-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses scope;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-3 name: assessment-objective props: @@ -18643,6 +20809,9 @@ catalog: value: PE-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses roles;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-4 name: assessment-objective props: @@ -18650,6 +20819,9 @@ catalog: value: PE-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses responsibilities;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-5 name: assessment-objective props: @@ -18657,6 +20829,9 @@ catalog: value: PE-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses management commitment;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-6 name: assessment-objective props: @@ -18664,6 +20839,9 @@ catalog: value: PE-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses coordination among organizational entities;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-7 name: assessment-objective props: @@ -18671,6 +20849,12 @@ catalog: value: PE-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses compliance;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.b name: assessment-objective props: @@ -18678,6 +20862,15 @@ catalog: value: PE-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#pe-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#pe-1_smt.a.1' + rel: assessment-for + links: + - href: '#pe-1_smt.a' + rel: assessment-for - id: pe-1_obj.b name: assessment-objective props: @@ -18685,6 +20878,9 @@ catalog: value: PE-01b. class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the physical and environmental protection policy and procedures;' + links: + - href: '#pe-1_smt.b' + rel: assessment-for - id: pe-1_obj.c name: assessment-objective props: @@ -18706,6 +20902,9 @@ catalog: value: PE-01c.01[01] class: sp800-53a prose: 'the current physical and environmental protection policy is reviewed and updated {{ insert: param, pe-01_odp.05 }};' + links: + - href: '#pe-1_smt.c.1' + rel: assessment-for - id: pe-1_obj.c.1-2 name: assessment-objective props: @@ -18713,6 +20912,12 @@ catalog: value: PE-01c.01[02] class: sp800-53a prose: 'the current physical and environmental protection policy is reviewed and updated following {{ insert: param, pe-01_odp.06 }};' + links: + - href: '#pe-1_smt.c.1' + rel: assessment-for + links: + - href: '#pe-1_smt.c.1' + rel: assessment-for - id: pe-1_obj.c.2 name: assessment-objective props: @@ -18727,6 +20932,9 @@ catalog: value: PE-01c.02[01] class: sp800-53a prose: 'the current physical and environmental protection procedures are reviewed and updated {{ insert: param, pe-01_odp.07 }};' + links: + - href: '#pe-1_smt.c.2' + rel: assessment-for - id: pe-1_obj.c.2-2 name: assessment-objective props: @@ -18734,6 +20942,18 @@ catalog: value: PE-01c.02[02] class: sp800-53a prose: 'the current physical and environmental protection procedures are reviewed and updated following {{ insert: param, pe-01_odp.08 }}.' + links: + - href: '#pe-1_smt.c.2' + rel: assessment-for + links: + - href: '#pe-1_smt.c.2' + rel: assessment-for + links: + - href: '#pe-1_smt.c' + rel: assessment-for + links: + - href: '#pe-1_smt' + rel: assessment-for - id: pe-1_asm-examine name: assessment-method props: @@ -18884,6 +21104,9 @@ catalog: value: PE-02a.[01] class: sp800-53a prose: a list of individuals with authorized access to the facility where the system resides has been developed; + links: + - href: '#pe-2_smt.a' + rel: assessment-for - id: pe-2_obj.a-2 name: assessment-objective props: @@ -18891,6 +21114,9 @@ catalog: value: PE-02a.[02] class: sp800-53a prose: the list of individuals with authorized access to the facility where the system resides has been approved; + links: + - href: '#pe-2_smt.a' + rel: assessment-for - id: pe-2_obj.a-3 name: assessment-objective props: @@ -18898,6 +21124,12 @@ catalog: value: PE-02a.[03] class: sp800-53a prose: the list of individuals with authorized access to the facility where the system resides has been maintained; + links: + - href: '#pe-2_smt.a' + rel: assessment-for + links: + - href: '#pe-2_smt.a' + rel: assessment-for - id: pe-2_obj.b name: assessment-objective props: @@ -18905,6 +21137,9 @@ catalog: value: PE-02b. class: sp800-53a prose: authorization credentials are issued for facility access; + links: + - href: '#pe-2_smt.b' + rel: assessment-for - id: pe-2_obj.c name: assessment-objective props: @@ -18912,6 +21147,9 @@ catalog: value: PE-02c. class: sp800-53a prose: 'the access list detailing authorized facility access by individuals is reviewed {{ insert: param, pe-02_odp }};' + links: + - href: '#pe-2_smt.c' + rel: assessment-for - id: pe-2_obj.d name: assessment-objective props: @@ -18919,6 +21157,12 @@ catalog: value: PE-02d. class: sp800-53a prose: individuals are removed from the facility access list when access is no longer required. + links: + - href: '#pe-2_smt.d' + rel: assessment-for + links: + - href: '#pe-2_smt' + rel: assessment-for - id: pe-2_asm-examine name: assessment-method props: @@ -19249,6 +21493,9 @@ catalog: value: PE-03a.01 class: sp800-53a prose: 'physical access authorizations are enforced at {{ insert: param, pe-03_odp.01 }} by verifying individual access authorizations before granting access to the facility;' + links: + - href: '#pe-3_smt.a.1' + rel: assessment-for - id: pe-3_obj.a.2 name: assessment-objective props: @@ -19256,6 +21503,12 @@ catalog: value: PE-03a.02 class: sp800-53a prose: 'physical access authorizations are enforced at {{ insert: param, pe-03_odp.01 }} by controlling ingress and egress to the facility using {{ insert: param, pe-03_odp.02 }};' + links: + - href: '#pe-3_smt.a.2' + rel: assessment-for + links: + - href: '#pe-3_smt.a' + rel: assessment-for - id: pe-3_obj.b name: assessment-objective props: @@ -19263,6 +21516,9 @@ catalog: value: PE-03b. class: sp800-53a prose: 'physical access audit logs are maintained for {{ insert: param, pe-03_odp.04 }};' + links: + - href: '#pe-3_smt.b' + rel: assessment-for - id: pe-3_obj.c name: assessment-objective props: @@ -19270,6 +21526,9 @@ catalog: value: PE-03c. class: sp800-53a prose: 'access to areas within the facility designated as publicly accessible are maintained by implementing {{ insert: param, pe-03_odp.05 }};' + links: + - href: '#pe-3_smt.c' + rel: assessment-for - id: pe-3_obj.d name: assessment-objective props: @@ -19284,6 +21543,9 @@ catalog: value: PE-03d.[01] class: sp800-53a prose: visitors are escorted; + links: + - href: '#pe-3_smt.d' + rel: assessment-for - id: pe-3_obj.d-2 name: assessment-objective props: @@ -19291,6 +21553,12 @@ catalog: value: PE-03d.[02] class: sp800-53a prose: 'visitor activity is controlled {{ insert: param, pe-03_odp.06 }};' + links: + - href: '#pe-3_smt.d' + rel: assessment-for + links: + - href: '#pe-3_smt.d' + rel: assessment-for - id: pe-3_obj.e name: assessment-objective props: @@ -19305,6 +21573,9 @@ catalog: value: PE-03e.[01] class: sp800-53a prose: keys are secured; + links: + - href: '#pe-3_smt.e' + rel: assessment-for - id: pe-3_obj.e-2 name: assessment-objective props: @@ -19312,6 +21583,9 @@ catalog: value: PE-03e.[02] class: sp800-53a prose: combinations are secured; + links: + - href: '#pe-3_smt.e' + rel: assessment-for - id: pe-3_obj.e-3 name: assessment-objective props: @@ -19319,6 +21593,12 @@ catalog: value: PE-03e.[03] class: sp800-53a prose: other physical access devices are secured; + links: + - href: '#pe-3_smt.e' + rel: assessment-for + links: + - href: '#pe-3_smt.e' + rel: assessment-for - id: pe-3_obj.f name: assessment-objective props: @@ -19326,6 +21606,9 @@ catalog: value: PE-03f. class: sp800-53a prose: ' {{ insert: param, pe-03_odp.07 }} are inventoried {{ insert: param, pe-03_odp.08 }};' + links: + - href: '#pe-3_smt.f' + rel: assessment-for - id: pe-3_obj.g name: assessment-objective props: @@ -19340,6 +21623,9 @@ catalog: value: PE-03g.[01] class: sp800-53a prose: 'combinations are changed {{ insert: param, pe-03_odp.09 }} , when combinations are compromised, or when individuals possessing the combinations are transferred or terminated;' + links: + - href: '#pe-3_smt.g' + rel: assessment-for - id: pe-3_obj.g-2 name: assessment-objective props: @@ -19347,6 +21633,15 @@ catalog: value: PE-03g.[02] class: sp800-53a prose: 'keys are changed {{ insert: param, pe-03_odp.10 }} , when keys are lost, or when individuals possessing the keys are transferred or terminated.' + links: + - href: '#pe-3_smt.g' + rel: assessment-for + links: + - href: '#pe-3_smt.g' + rel: assessment-for + links: + - href: '#pe-3_smt' + rel: assessment-for - id: pe-3_asm-examine name: assessment-method props: @@ -19509,6 +21804,9 @@ catalog: value: PE-06a. class: sp800-53a prose: physical access to the facility where the system resides is monitored to detect and respond to physical security incidents; + links: + - href: '#pe-6_smt.a' + rel: assessment-for - id: pe-6_obj.b name: assessment-objective props: @@ -19523,6 +21821,9 @@ catalog: value: PE-06b.[01] class: sp800-53a prose: 'physical access logs are reviewed {{ insert: param, pe-06_odp.01 }};' + links: + - href: '#pe-6_smt.b' + rel: assessment-for - id: pe-6_obj.b-2 name: assessment-objective props: @@ -19530,6 +21831,12 @@ catalog: value: PE-06b.[02] class: sp800-53a prose: 'physical access logs are reviewed upon occurrence of {{ insert: param, pe-06_odp.02 }};' + links: + - href: '#pe-6_smt.b' + rel: assessment-for + links: + - href: '#pe-6_smt.b' + rel: assessment-for - id: pe-6_obj.c name: assessment-objective props: @@ -19544,6 +21851,9 @@ catalog: value: PE-06c.[01] class: sp800-53a prose: results of reviews are coordinated with organizational incident response capabilities; + links: + - href: '#pe-6_smt.c' + rel: assessment-for - id: pe-6_obj.c-2 name: assessment-objective props: @@ -19551,6 +21861,15 @@ catalog: value: PE-06c.[02] class: sp800-53a prose: results of investigations are coordinated with organizational incident response capabilities. + links: + - href: '#pe-6_smt.c' + rel: assessment-for + links: + - href: '#pe-6_smt.c' + rel: assessment-for + links: + - href: '#pe-6_smt' + rel: assessment-for - id: pe-6_asm-examine name: assessment-method props: @@ -19704,6 +22023,9 @@ catalog: value: PE-08a. class: sp800-53a prose: 'visitor access records for the facility where the system resides are maintained for {{ insert: param, pe-08_odp.01 }};' + links: + - href: '#pe-8_smt.a' + rel: assessment-for - id: pe-8_obj.b name: assessment-objective props: @@ -19711,6 +22033,9 @@ catalog: value: PE-08b. class: sp800-53a prose: 'visitor access records are reviewed {{ insert: param, pe-08_odp.02 }};' + links: + - href: '#pe-8_smt.b' + rel: assessment-for - id: pe-8_obj.c name: assessment-objective props: @@ -19718,6 +22043,12 @@ catalog: value: PE-08c. class: sp800-53a prose: 'visitor access records anomalies are reported to {{ insert: param, pe-08_odp.03 }}.' + links: + - href: '#pe-8_smt.c' + rel: assessment-for + links: + - href: '#pe-8_smt' + rel: assessment-for - id: pe-8_asm-examine name: assessment-method props: @@ -19817,6 +22148,9 @@ catalog: value: PE-12[01] class: sp800-53a prose: automatic emergency lighting that activates in the event of a power outage or disruption is employed for the system; + links: + - href: '#pe-12_smt' + rel: assessment-for - id: pe-12_obj-2 name: assessment-objective props: @@ -19824,6 +22158,9 @@ catalog: value: PE-12[02] class: sp800-53a prose: automatic emergency lighting that activates in the event of a power outage or disruption is maintained for the system; + links: + - href: '#pe-12_smt' + rel: assessment-for - id: pe-12_obj-3 name: assessment-objective props: @@ -19831,6 +22168,9 @@ catalog: value: PE-12[03] class: sp800-53a prose: automatic emergency lighting for the system covers emergency exits within the facility; + links: + - href: '#pe-12_smt' + rel: assessment-for - id: pe-12_obj-4 name: assessment-objective props: @@ -19838,6 +22178,12 @@ catalog: value: PE-12[04] class: sp800-53a prose: automatic emergency lighting for the system covers evacuation routes within the facility. + links: + - href: '#pe-12_smt' + rel: assessment-for + links: + - href: '#pe-12_smt' + rel: assessment-for - id: pe-12_asm-examine name: assessment-method props: @@ -19928,6 +22274,9 @@ catalog: value: PE-13[01] class: sp800-53a prose: fire detection systems are employed; + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_obj-2 name: assessment-objective props: @@ -19935,6 +22284,9 @@ catalog: value: PE-13[02] class: sp800-53a prose: employed fire detection systems are supported by an independent energy source; + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_obj-3 name: assessment-objective props: @@ -19942,6 +22294,9 @@ catalog: value: PE-13[03] class: sp800-53a prose: employed fire detection systems are maintained; + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_obj-4 name: assessment-objective props: @@ -19949,6 +22304,9 @@ catalog: value: PE-13[04] class: sp800-53a prose: fire suppression systems are employed; + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_obj-5 name: assessment-objective props: @@ -19956,6 +22314,9 @@ catalog: value: PE-13[05] class: sp800-53a prose: employed fire suppression systems are supported by an independent energy source; + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_obj-6 name: assessment-objective props: @@ -19963,6 +22324,12 @@ catalog: value: PE-13[06] class: sp800-53a prose: employed fire suppression systems are maintained. + links: + - href: '#pe-13_smt' + rel: assessment-for + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_asm-examine name: assessment-method props: @@ -20113,6 +22480,9 @@ catalog: value: PE-14a. class: sp800-53a prose: ' {{ insert: param, pe-14_odp.01 }} levels are maintained at {{ insert: param, pe-14_odp.03 }} within the facility where the system resides;' + links: + - href: '#pe-14_smt.a' + rel: assessment-for - id: pe-14_obj.b name: assessment-objective props: @@ -20120,6 +22490,12 @@ catalog: value: PE-14b. class: sp800-53a prose: 'environmental control levels are monitored {{ insert: param, pe-14_odp.04 }}.' + links: + - href: '#pe-14_smt.b' + rel: assessment-for + links: + - href: '#pe-14_smt' + rel: assessment-for - id: pe-14_asm-examine name: assessment-method props: @@ -20214,6 +22590,9 @@ catalog: value: PE-15[01] class: sp800-53a prose: the system is protected from damage resulting from water leakage by providing master shutoff or isolation valves; + links: + - href: '#pe-15_smt' + rel: assessment-for - id: pe-15_obj-2 name: assessment-objective props: @@ -20221,6 +22600,9 @@ catalog: value: PE-15[02] class: sp800-53a prose: the master shutoff or isolation valves are accessible; + links: + - href: '#pe-15_smt' + rel: assessment-for - id: pe-15_obj-3 name: assessment-objective props: @@ -20228,6 +22610,9 @@ catalog: value: PE-15[03] class: sp800-53a prose: the master shutoff or isolation valves are working properly; + links: + - href: '#pe-15_smt' + rel: assessment-for - id: pe-15_obj-4 name: assessment-objective props: @@ -20235,6 +22620,12 @@ catalog: value: PE-15[04] class: sp800-53a prose: the master shutoff or isolation valves are known to key personnel. + links: + - href: '#pe-15_smt' + rel: assessment-for + links: + - href: '#pe-15_smt' + rel: assessment-for - id: pe-15_asm-examine name: assessment-method props: @@ -20393,6 +22784,9 @@ catalog: value: PE-16a.[01] class: sp800-53a prose: ' {{ insert: param, pe-16_odp.01 }} are authorized when entering the facility;' + links: + - href: '#pe-16_smt.a' + rel: assessment-for - id: pe-16_obj.a-2 name: assessment-objective props: @@ -20400,6 +22794,9 @@ catalog: value: PE-16a.[02] class: sp800-53a prose: ' {{ insert: param, pe-16_odp.01 }} are controlled when entering the facility;' + links: + - href: '#pe-16_smt.a' + rel: assessment-for - id: pe-16_obj.a-3 name: assessment-objective props: @@ -20407,6 +22804,9 @@ catalog: value: PE-16a.[03] class: sp800-53a prose: ' {{ insert: param, pe-16_odp.02 }} are authorized when exiting the facility;' + links: + - href: '#pe-16_smt.a' + rel: assessment-for - id: pe-16_obj.a-4 name: assessment-objective props: @@ -20414,6 +22814,12 @@ catalog: value: PE-16a.[04] class: sp800-53a prose: ' {{ insert: param, pe-16_odp.02 }} are controlled when exiting the facility;' + links: + - href: '#pe-16_smt.a' + rel: assessment-for + links: + - href: '#pe-16_smt.a' + rel: assessment-for - id: pe-16_obj.b name: assessment-objective props: @@ -20421,6 +22827,12 @@ catalog: value: PE-16b. class: sp800-53a prose: records of the system components are maintained. + links: + - href: '#pe-16_smt.b' + rel: assessment-for + links: + - href: '#pe-16_smt' + rel: assessment-for - id: pe-16_asm-examine name: assessment-method props: @@ -20688,6 +23100,9 @@ catalog: value: PL-01a.[01] class: sp800-53a prose: a planning policy is developed and documented. + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.a-2 name: assessment-objective props: @@ -20695,6 +23110,9 @@ catalog: value: PL-01a.[02] class: sp800-53a prose: 'the planning policy is disseminated to {{ insert: param, pl-01_odp.01 }};' + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.a-3 name: assessment-objective props: @@ -20702,6 +23120,9 @@ catalog: value: PL-01a.[03] class: sp800-53a prose: planning procedures to facilitate the implementation of the planning policy and associated planning controls are developed and documented; + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.a-4 name: assessment-objective props: @@ -20709,6 +23130,9 @@ catalog: value: PL-01a.[04] class: sp800-53a prose: 'the planning procedures are disseminated to {{ insert: param, pl-01_odp.02 }};' + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.a.1 name: assessment-objective props: @@ -20730,6 +23154,9 @@ catalog: value: PL-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses purpose;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-2 name: assessment-objective props: @@ -20737,6 +23164,9 @@ catalog: value: PL-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses scope;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-3 name: assessment-objective props: @@ -20744,6 +23174,9 @@ catalog: value: PL-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses roles;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-4 name: assessment-objective props: @@ -20751,6 +23184,9 @@ catalog: value: PL-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses responsibilities;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-5 name: assessment-objective props: @@ -20758,6 +23194,9 @@ catalog: value: PL-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses management commitment;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-6 name: assessment-objective props: @@ -20765,6 +23204,9 @@ catalog: value: PL-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses coordination among organizational entities;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-7 name: assessment-objective props: @@ -20772,6 +23214,12 @@ catalog: value: PL-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses compliance;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.b name: assessment-objective props: @@ -20779,6 +23227,15 @@ catalog: value: PL-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#pl-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#pl-1_smt.a.1' + rel: assessment-for + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.b name: assessment-objective props: @@ -20786,6 +23243,9 @@ catalog: value: PL-01b. class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the planning policy and procedures;' + links: + - href: '#pl-1_smt.b' + rel: assessment-for - id: pl-1_obj.c name: assessment-objective props: @@ -20807,6 +23267,9 @@ catalog: value: PL-01c.01[01] class: sp800-53a prose: 'the current planning policy is reviewed and updated {{ insert: param, pl-01_odp.05 }};' + links: + - href: '#pl-1_smt.c.1' + rel: assessment-for - id: pl-1_obj.c.1-2 name: assessment-objective props: @@ -20814,6 +23277,12 @@ catalog: value: PL-01c.01[02] class: sp800-53a prose: 'the current planning policy is reviewed and updated following {{ insert: param, pl-01_odp.06 }};' + links: + - href: '#pl-1_smt.c.1' + rel: assessment-for + links: + - href: '#pl-1_smt.c.1' + rel: assessment-for - id: pl-1_obj.c.2 name: assessment-objective props: @@ -20828,6 +23297,9 @@ catalog: value: PL-01c.02[01] class: sp800-53a prose: 'the current planning procedures are reviewed and updated {{ insert: param, pl-01_odp.07 }};' + links: + - href: '#pl-1_smt.c.2' + rel: assessment-for - id: pl-1_obj.c.2-2 name: assessment-objective props: @@ -20835,6 +23307,18 @@ catalog: value: PL-01c.02[02] class: sp800-53a prose: 'the current planning procedures are reviewed and updated following {{ insert: param, pl-01_odp.08 }}.' + links: + - href: '#pl-1_smt.c.2' + rel: assessment-for + links: + - href: '#pl-1_smt.c.2' + rel: assessment-for + links: + - href: '#pl-1_smt.c' + rel: assessment-for + links: + - href: '#pl-1_smt' + rel: assessment-for - id: pl-1_asm-examine name: assessment-method props: @@ -21165,6 +23649,9 @@ catalog: value: PL-02a.01[01] class: sp800-53a prose: a security plan for the system is developed that is consistent with the organization’s enterprise architecture; + links: + - href: '#pl-2_smt.a.1' + rel: assessment-for - id: pl-2_obj.a.1-2 name: assessment-objective props: @@ -21172,6 +23659,12 @@ catalog: value: PL-02a.01[02] class: sp800-53a prose: a privacy plan for the system is developed that is consistent with the organization’s enterprise architecture; + links: + - href: '#pl-2_smt.a.1' + rel: assessment-for + links: + - href: '#pl-2_smt.a.1' + rel: assessment-for - id: pl-2_obj.a.2 name: assessment-objective props: @@ -21186,6 +23679,9 @@ catalog: value: PL-02a.02[01] class: sp800-53a prose: a security plan for the system is developed that explicitly defines the constituent system components; + links: + - href: '#pl-2_smt.a.2' + rel: assessment-for - id: pl-2_obj.a.2-2 name: assessment-objective props: @@ -21193,6 +23689,12 @@ catalog: value: PL-02a.02[02] class: sp800-53a prose: a privacy plan for the system is developed that explicitly defines the constituent system components; + links: + - href: '#pl-2_smt.a.2' + rel: assessment-for + links: + - href: '#pl-2_smt.a.2' + rel: assessment-for - id: pl-2_obj.a.3 name: assessment-objective props: @@ -21207,6 +23709,9 @@ catalog: value: PL-02a.03[01] class: sp800-53a prose: a security plan for the system is developed that describes the operational context of the system in terms of mission and business processes; + links: + - href: '#pl-2_smt.a.3' + rel: assessment-for - id: pl-2_obj.a.3-2 name: assessment-objective props: @@ -21214,6 +23719,12 @@ catalog: value: PL-02a.03[02] class: sp800-53a prose: a privacy plan for the system is developed that describes the operational context of the system in terms of mission and business processes; + links: + - href: '#pl-2_smt.a.3' + rel: assessment-for + links: + - href: '#pl-2_smt.a.3' + rel: assessment-for - id: pl-2_obj.a.4 name: assessment-objective props: @@ -21228,6 +23739,9 @@ catalog: value: PL-02a.04[01] class: sp800-53a prose: a security plan for the system is developed that identifies the individuals that fulfill system roles and responsibilities; + links: + - href: '#pl-2_smt.a.4' + rel: assessment-for - id: pl-2_obj.a.4-2 name: assessment-objective props: @@ -21235,6 +23749,12 @@ catalog: value: PL-02a.04[02] class: sp800-53a prose: a privacy plan for the system is developed that identifies the individuals that fulfill system roles and responsibilities; + links: + - href: '#pl-2_smt.a.4' + rel: assessment-for + links: + - href: '#pl-2_smt.a.4' + rel: assessment-for - id: pl-2_obj.a.5 name: assessment-objective props: @@ -21249,6 +23769,9 @@ catalog: value: PL-02a.05[01] class: sp800-53a prose: a security plan for the system is developed that identifies the information types processed, stored, and transmitted by the system; + links: + - href: '#pl-2_smt.a.5' + rel: assessment-for - id: pl-2_obj.a.5-2 name: assessment-objective props: @@ -21256,6 +23779,12 @@ catalog: value: PL-02a.05[02] class: sp800-53a prose: a privacy plan for the system is developed that identifies the information types processed, stored, and transmitted by the system; + links: + - href: '#pl-2_smt.a.5' + rel: assessment-for + links: + - href: '#pl-2_smt.a.5' + rel: assessment-for - id: pl-2_obj.a.6 name: assessment-objective props: @@ -21270,6 +23799,9 @@ catalog: value: PL-02a.06[01] class: sp800-53a prose: a security plan for the system is developed that provides the security categorization of the system, including supporting rationale; + links: + - href: '#pl-2_smt.a.6' + rel: assessment-for - id: pl-2_obj.a.6-2 name: assessment-objective props: @@ -21277,6 +23809,12 @@ catalog: value: PL-02a.06[02] class: sp800-53a prose: a privacy plan for the system is developed that provides the security categorization of the system, including supporting rationale; + links: + - href: '#pl-2_smt.a.6' + rel: assessment-for + links: + - href: '#pl-2_smt.a.6' + rel: assessment-for - id: pl-2_obj.a.7 name: assessment-objective props: @@ -21291,6 +23829,9 @@ catalog: value: PL-02a.07[01] class: sp800-53a prose: a security plan for the system is developed that describes any specific threats to the system that are of concern to the organization; + links: + - href: '#pl-2_smt.a.7' + rel: assessment-for - id: pl-2_obj.a.7-2 name: assessment-objective props: @@ -21298,6 +23839,12 @@ catalog: value: PL-02a.07[02] class: sp800-53a prose: a privacy plan for the system is developed that describes any specific threats to the system that are of concern to the organization; + links: + - href: '#pl-2_smt.a.7' + rel: assessment-for + links: + - href: '#pl-2_smt.a.7' + rel: assessment-for - id: pl-2_obj.a.8 name: assessment-objective props: @@ -21312,6 +23859,9 @@ catalog: value: PL-02a.08[01] class: sp800-53a prose: a security plan for the system is developed that provides the results of a privacy risk assessment for systems processing personally identifiable information; + links: + - href: '#pl-2_smt.a.8' + rel: assessment-for - id: pl-2_obj.a.8-2 name: assessment-objective props: @@ -21319,6 +23869,12 @@ catalog: value: PL-02a.08[02] class: sp800-53a prose: a privacy plan for the system is developed that provides the results of a privacy risk assessment for systems processing personally identifiable information; + links: + - href: '#pl-2_smt.a.8' + rel: assessment-for + links: + - href: '#pl-2_smt.a.8' + rel: assessment-for - id: pl-2_obj.a.9 name: assessment-objective props: @@ -21333,6 +23889,9 @@ catalog: value: PL-02a.09[01] class: sp800-53a prose: a security plan for the system is developed that describes the operational environment for the system and any dependencies on or connections to other systems or system components; + links: + - href: '#pl-2_smt.a.9' + rel: assessment-for - id: pl-2_obj.a.9-2 name: assessment-objective props: @@ -21340,6 +23899,12 @@ catalog: value: PL-02a.09[02] class: sp800-53a prose: a privacy plan for the system is developed that describes the operational environment for the system and any dependencies on or connections to other systems or system components; + links: + - href: '#pl-2_smt.a.9' + rel: assessment-for + links: + - href: '#pl-2_smt.a.9' + rel: assessment-for - id: pl-2_obj.a.10 name: assessment-objective props: @@ -21354,6 +23919,9 @@ catalog: value: PL-02a.10[01] class: sp800-53a prose: a security plan for the system is developed that provides an overview of the security requirements for the system; + links: + - href: '#pl-2_smt.a.10' + rel: assessment-for - id: pl-2_obj.a.10-2 name: assessment-objective props: @@ -21361,6 +23929,12 @@ catalog: value: PL-02a.10[02] class: sp800-53a prose: a privacy plan for the system is developed that provides an overview of the privacy requirements for the system; + links: + - href: '#pl-2_smt.a.10' + rel: assessment-for + links: + - href: '#pl-2_smt.a.10' + rel: assessment-for - id: pl-2_obj.a.11 name: assessment-objective props: @@ -21375,6 +23949,9 @@ catalog: value: PL-02a.11[01] class: sp800-53a prose: a security plan for the system is developed that identifies any relevant control baselines or overlays, if applicable; + links: + - href: '#pl-2_smt.a.11' + rel: assessment-for - id: pl-2_obj.a.11-2 name: assessment-objective props: @@ -21382,6 +23959,12 @@ catalog: value: PL-02a.11[02] class: sp800-53a prose: a privacy plan for the system is developed that identifies any relevant control baselines or overlays, if applicable; + links: + - href: '#pl-2_smt.a.11' + rel: assessment-for + links: + - href: '#pl-2_smt.a.11' + rel: assessment-for - id: pl-2_obj.a.12 name: assessment-objective props: @@ -21396,6 +23979,9 @@ catalog: value: PL-02a.12[01] class: sp800-53a prose: a security plan for the system is developed that describes the controls in place or planned for meeting the security requirements, including rationale for any tailoring decisions; + links: + - href: '#pl-2_smt.a.12' + rel: assessment-for - id: pl-2_obj.a.12-2 name: assessment-objective props: @@ -21403,6 +23989,12 @@ catalog: value: PL-02a.12[02] class: sp800-53a prose: a privacy plan for the system is developed that describes the controls in place or planned for meeting the privacy requirements, including rationale for any tailoring decisions; + links: + - href: '#pl-2_smt.a.12' + rel: assessment-for + links: + - href: '#pl-2_smt.a.12' + rel: assessment-for - id: pl-2_obj.a.13 name: assessment-objective props: @@ -21417,6 +24009,9 @@ catalog: value: PL-02a.13[01] class: sp800-53a prose: a security plan for the system is developed that includes risk determinations for security architecture and design decisions; + links: + - href: '#pl-2_smt.a.13' + rel: assessment-for - id: pl-2_obj.a.13-2 name: assessment-objective props: @@ -21424,6 +24019,12 @@ catalog: value: PL-02a.13[02] class: sp800-53a prose: a privacy plan for the system is developed that includes risk determinations for privacy architecture and design decisions; + links: + - href: '#pl-2_smt.a.13' + rel: assessment-for + links: + - href: '#pl-2_smt.a.13' + rel: assessment-for - id: pl-2_obj.a.14 name: assessment-objective props: @@ -21438,6 +24039,9 @@ catalog: value: PL-02a.14[01] class: sp800-53a prose: 'a security plan for the system is developed that includes security-related activities affecting the system that require planning and coordination with {{ insert: param, pl-02_odp.01 }};' + links: + - href: '#pl-2_smt.a.14' + rel: assessment-for - id: pl-2_obj.a.14-2 name: assessment-objective props: @@ -21445,6 +24049,12 @@ catalog: value: PL-02a.14[02] class: sp800-53a prose: 'a privacy plan for the system is developed that includes privacy-related activities affecting the system that require planning and coordination with {{ insert: param, pl-02_odp.01 }};' + links: + - href: '#pl-2_smt.a.14' + rel: assessment-for + links: + - href: '#pl-2_smt.a.14' + rel: assessment-for - id: pl-2_obj.a.15 name: assessment-objective props: @@ -21459,6 +24069,9 @@ catalog: value: PL-02a.15[01] class: sp800-53a prose: a security plan for the system is developed that is reviewed and approved by the authorizing official or designated representative prior to plan implementation; + links: + - href: '#pl-2_smt.a.15' + rel: assessment-for - id: pl-2_obj.a.15-2 name: assessment-objective props: @@ -21466,6 +24079,15 @@ catalog: value: PL-02a.15[02] class: sp800-53a prose: a privacy plan for the system is developed that is reviewed and approved by the authorizing official or designated representative prior to plan implementation. + links: + - href: '#pl-2_smt.a.15' + rel: assessment-for + links: + - href: '#pl-2_smt.a.15' + rel: assessment-for + links: + - href: '#pl-2_smt.a' + rel: assessment-for - id: pl-2_obj.b name: assessment-objective props: @@ -21480,6 +24102,9 @@ catalog: value: PL-02b.[01] class: sp800-53a prose: 'copies of the plans are distributed to {{ insert: param, pl-02_odp.02 }};' + links: + - href: '#pl-2_smt.b' + rel: assessment-for - id: pl-2_obj.b-2 name: assessment-objective props: @@ -21487,6 +24112,12 @@ catalog: value: PL-02b.[02] class: sp800-53a prose: 'subsequent changes to the plans are communicated to {{ insert: param, pl-02_odp.02 }};' + links: + - href: '#pl-2_smt.b' + rel: assessment-for + links: + - href: '#pl-2_smt.b' + rel: assessment-for - id: pl-2_obj.c name: assessment-objective props: @@ -21494,6 +24125,9 @@ catalog: value: PL-02c. class: sp800-53a prose: 'plans are reviewed {{ insert: param, pl-02_odp.03 }};' + links: + - href: '#pl-2_smt.c' + rel: assessment-for - id: pl-2_obj.d name: assessment-objective props: @@ -21508,6 +24142,9 @@ catalog: value: PL-02d.[01] class: sp800-53a prose: plans are updated to address changes to the system and environment of operations; + links: + - href: '#pl-2_smt.d' + rel: assessment-for - id: pl-2_obj.d-2 name: assessment-objective props: @@ -21515,6 +24152,9 @@ catalog: value: PL-02d.[02] class: sp800-53a prose: plans are updated to address problems identified during the plan implementation; + links: + - href: '#pl-2_smt.d' + rel: assessment-for - id: pl-2_obj.d-3 name: assessment-objective props: @@ -21522,6 +24162,12 @@ catalog: value: PL-02d.[03] class: sp800-53a prose: plans are updated to address problems identified during control assessments; + links: + - href: '#pl-2_smt.d' + rel: assessment-for + links: + - href: '#pl-2_smt.d' + rel: assessment-for - id: pl-2_obj.e name: assessment-objective props: @@ -21536,6 +24182,9 @@ catalog: value: PL-02e.[01] class: sp800-53a prose: plans are protected from unauthorized disclosure; + links: + - href: '#pl-2_smt.e' + rel: assessment-for - id: pl-2_obj.e-2 name: assessment-objective props: @@ -21543,6 +24192,15 @@ catalog: value: PL-02e.[02] class: sp800-53a prose: plans are protected from unauthorized modification. + links: + - href: '#pl-2_smt.e' + rel: assessment-for + links: + - href: '#pl-2_smt.e' + rel: assessment-for + links: + - href: '#pl-2_smt' + rel: assessment-for - id: pl-2_asm-examine name: assessment-method props: @@ -21755,6 +24413,9 @@ catalog: value: PL-04a.[01] class: sp800-53a prose: rules that describe responsibilities and expected behavior for information and system usage, security, and privacy are established for individuals requiring access to the system; + links: + - href: '#pl-4_smt.a' + rel: assessment-for - id: pl-4_obj.a-2 name: assessment-objective props: @@ -21762,6 +24423,12 @@ catalog: value: PL-04a.[02] class: sp800-53a prose: rules that describe responsibilities and expected behavior for information and system usage, security, and privacy are provided to individuals requiring access to the system; + links: + - href: '#pl-4_smt.a' + rel: assessment-for + links: + - href: '#pl-4_smt.a' + rel: assessment-for - id: pl-4_obj.b name: assessment-objective props: @@ -21769,6 +24436,9 @@ catalog: value: PL-04b. class: sp800-53a prose: before authorizing access to information and the system, a documented acknowledgement from such individuals indicating that they have read, understand, and agree to abide by the rules of behavior is received; + links: + - href: '#pl-4_smt.b' + rel: assessment-for - id: pl-4_obj.c name: assessment-objective props: @@ -21776,6 +24446,9 @@ catalog: value: PL-04c. class: sp800-53a prose: 'rules of behavior are reviewed and updated {{ insert: param, pl-04_odp.01 }};' + links: + - href: '#pl-4_smt.c' + rel: assessment-for - id: pl-4_obj.d name: assessment-objective props: @@ -21783,6 +24456,12 @@ catalog: value: PL-04d. class: sp800-53a prose: 'individuals who have acknowledged a previous version of the rules of behavior are required to read and reacknowledge {{ insert: param, pl-04_odp.02 }}.' + links: + - href: '#pl-4_smt.d' + rel: assessment-for + links: + - href: '#pl-4_smt' + rel: assessment-for - id: pl-4_asm-examine name: assessment-method props: @@ -21905,6 +24584,9 @@ catalog: value: PL-04(01)(a) class: sp800-53a prose: the rules of behavior include restrictions on the use of social media, social networking sites, and external sites/applications; + links: + - href: '#pl-4.1_smt.a' + rel: assessment-for - id: pl-4.1_obj.b name: assessment-objective props: @@ -21912,6 +24594,9 @@ catalog: value: PL-04(01)(b) class: sp800-53a prose: the rules of behavior include restrictions on posting organizational information on public websites; + links: + - href: '#pl-4.1_smt.b' + rel: assessment-for - id: pl-4.1_obj.c name: assessment-objective props: @@ -21919,6 +24604,12 @@ catalog: value: PL-04(01)(c) class: sp800-53a prose: the rules of behavior include restrictions on the use of organization-provided identifiers (e.g., email addresses) and authentication secrets (e.g., passwords) for creating accounts on external sites/applications. + links: + - href: '#pl-4.1_smt.c' + rel: assessment-for + links: + - href: '#pl-4.1_smt' + rel: assessment-for - id: pl-4.1_asm-examine name: assessment-method props: @@ -22033,6 +24724,9 @@ catalog: value: PL-10 class: sp800-53a prose: a control baseline for the system is selected. + links: + - href: '#pl-10_smt' + rel: assessment-for - id: pl-10_asm-examine name: assessment-method props: @@ -22158,6 +24852,9 @@ catalog: value: PL-11 class: sp800-53a prose: the selected control baseline is tailored by applying specified tailoring actions. + links: + - href: '#pl-11_smt' + rel: assessment-for - id: pl-11_asm-examine name: assessment-method props: @@ -22432,6 +25129,9 @@ catalog: value: PS-01a.[01] class: sp800-53a prose: a personnel security policy is developed and documented; + links: + - href: '#ps-1_smt.a' + rel: assessment-for - id: ps-1_obj.a-2 name: assessment-objective props: @@ -22439,6 +25139,9 @@ catalog: value: PS-01a.[02] class: sp800-53a prose: 'the personnel security policy is disseminated to {{ insert: param, ps-01_odp.01 }};' + links: + - href: '#ps-1_smt.a' + rel: assessment-for - id: ps-1_obj.a-3 name: assessment-objective props: @@ -22446,6 +25149,9 @@ catalog: value: PS-01a.[03] class: sp800-53a prose: personnel security procedures to facilitate the implementation of the personnel security policy and associated personnel security controls are developed and documented; + links: + - href: '#ps-1_smt.a' + rel: assessment-for - id: ps-1_obj.a-4 name: assessment-objective props: @@ -22453,6 +25159,9 @@ catalog: value: PS-01a.[04] class: sp800-53a prose: 'the personnel security procedures are disseminated to {{ insert: param, ps-01_odp.02 }};' + links: + - href: '#ps-1_smt.a' + rel: assessment-for - id: ps-1_obj.a.1 name: assessment-objective props: @@ -22474,6 +25183,9 @@ catalog: value: PS-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses purpose;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-2 name: assessment-objective props: @@ -22481,6 +25193,9 @@ catalog: value: PS-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses scope;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-3 name: assessment-objective props: @@ -22488,6 +25203,9 @@ catalog: value: PS-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses roles;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-4 name: assessment-objective props: @@ -22495,6 +25213,9 @@ catalog: value: PS-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses responsibilities;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-5 name: assessment-objective props: @@ -22502,6 +25223,9 @@ catalog: value: PS-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses management commitment;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-6 name: assessment-objective props: @@ -22509,6 +25233,9 @@ catalog: value: PS-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses coordination among organizational entities;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-7 name: assessment-objective props: @@ -22516,6 +25243,12 @@ catalog: value: PS-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses compliance;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.b name: assessment-objective props: @@ -22523,6 +25256,15 @@ catalog: value: PS-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ps-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ps-1_smt.a.1' + rel: assessment-for + links: + - href: '#ps-1_smt.a' + rel: assessment-for - id: ps-1_obj.b name: assessment-objective props: @@ -22530,6 +25272,9 @@ catalog: value: PS-01b. class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the personnel security policy and procedures;' + links: + - href: '#ps-1_smt.b' + rel: assessment-for - id: ps-1_obj.c name: assessment-objective props: @@ -22551,6 +25296,9 @@ catalog: value: PS-01c.01[01] class: sp800-53a prose: 'the current personnel security policy is reviewed and updated {{ insert: param, ps-01_odp.05 }};' + links: + - href: '#ps-1_smt.c.1' + rel: assessment-for - id: ps-1_obj.c.1-2 name: assessment-objective props: @@ -22558,6 +25306,12 @@ catalog: value: PS-01c.01[02] class: sp800-53a prose: 'the current personnel security policy is reviewed and updated following {{ insert: param, ps-01_odp.06 }};' + links: + - href: '#ps-1_smt.c.1' + rel: assessment-for + links: + - href: '#ps-1_smt.c.1' + rel: assessment-for - id: ps-1_obj.c.2 name: assessment-objective props: @@ -22572,6 +25326,9 @@ catalog: value: PS-01c.02[01] class: sp800-53a prose: 'the current personnel security procedures are reviewed and updated {{ insert: param, ps-01_odp.07 }};' + links: + - href: '#ps-1_smt.c.2' + rel: assessment-for - id: ps-1_obj.c.2-2 name: assessment-objective props: @@ -22579,6 +25336,18 @@ catalog: value: PS-01c.02[02] class: sp800-53a prose: 'the current personnel security procedures are reviewed and updated following {{ insert: param, ps-01_odp.08 }}.' + links: + - href: '#ps-1_smt.c.2' + rel: assessment-for + links: + - href: '#ps-1_smt.c.2' + rel: assessment-for + links: + - href: '#ps-1_smt.c' + rel: assessment-for + links: + - href: '#ps-1_smt' + rel: assessment-for - id: ps-1_asm-examine name: assessment-method props: @@ -22708,6 +25477,9 @@ catalog: value: PS-02a. class: sp800-53a prose: a risk designation is assigned to all organizational positions; + links: + - href: '#ps-2_smt.a' + rel: assessment-for - id: ps-2_obj.b name: assessment-objective props: @@ -22715,6 +25487,9 @@ catalog: value: PS-02b. class: sp800-53a prose: screening criteria are established for individuals filling organizational positions; + links: + - href: '#ps-2_smt.b' + rel: assessment-for - id: ps-2_obj.c name: assessment-objective props: @@ -22722,6 +25497,12 @@ catalog: value: PS-02c. class: sp800-53a prose: 'position risk designations are reviewed and updated {{ insert: param, ps-02_odp }}.' + links: + - href: '#ps-2_smt.c' + rel: assessment-for + links: + - href: '#ps-2_smt' + rel: assessment-for - id: ps-2_asm-examine name: assessment-method props: @@ -22887,6 +25668,9 @@ catalog: value: PS-03a. class: sp800-53a prose: individuals are screened prior to authorizing access to the system; + links: + - href: '#ps-3_smt.a' + rel: assessment-for - id: ps-3_obj.b name: assessment-objective props: @@ -22901,6 +25685,9 @@ catalog: value: PS-03b.[01] class: sp800-53a prose: 'individuals are rescreened in accordance with {{ insert: param, ps-03_odp.01 }};' + links: + - href: '#ps-3_smt.b' + rel: assessment-for - id: ps-3_obj.b-2 name: assessment-objective props: @@ -22908,6 +25695,15 @@ catalog: value: PS-03b.[02] class: sp800-53a prose: 'where rescreening is so indicated, individuals are rescreened {{ insert: param, ps-03_odp.02 }}.' + links: + - href: '#ps-3_smt.b' + rel: assessment-for + links: + - href: '#ps-3_smt.b' + rel: assessment-for + links: + - href: '#ps-3_smt' + rel: assessment-for - id: ps-3_asm-examine name: assessment-method props: @@ -23056,6 +25852,9 @@ catalog: value: PS-04a. class: sp800-53a prose: 'upon termination of individual employment, system access is disabled within {{ insert: param, ps-04_odp.01 }};' + links: + - href: '#ps-4_smt.a' + rel: assessment-for - id: ps-4_obj.b name: assessment-objective props: @@ -23063,6 +25862,9 @@ catalog: value: PS-04b. class: sp800-53a prose: upon termination of individual employment, any authenticators and credentials are terminated or revoked; + links: + - href: '#ps-4_smt.b' + rel: assessment-for - id: ps-4_obj.c name: assessment-objective props: @@ -23070,6 +25872,9 @@ catalog: value: PS-04c. class: sp800-53a prose: 'upon termination of individual employment, exit interviews that include a discussion of {{ insert: param, ps-04_odp.02 }} are conducted;' + links: + - href: '#ps-4_smt.c' + rel: assessment-for - id: ps-4_obj.d name: assessment-objective props: @@ -23077,6 +25882,9 @@ catalog: value: PS-04d. class: sp800-53a prose: upon termination of individual employment, all security-related organizational system-related property is retrieved; + links: + - href: '#ps-4_smt.d' + rel: assessment-for - id: ps-4_obj.e name: assessment-objective props: @@ -23084,6 +25892,12 @@ catalog: value: PS-04e. class: sp800-53a prose: upon termination of individual employment, access to organizational information and systems formerly controlled by the terminated individual are retained. + links: + - href: '#ps-4_smt.e' + rel: assessment-for + links: + - href: '#ps-4_smt' + rel: assessment-for - id: ps-4_asm-examine name: assessment-method props: @@ -23260,6 +26074,9 @@ catalog: value: PS-05a. class: sp800-53a prose: the ongoing operational need for current logical and physical access authorizations to systems and facilities are reviewed and confirmed when individuals are reassigned or transferred to other positions within the organization; + links: + - href: '#ps-5_smt.a' + rel: assessment-for - id: ps-5_obj.b name: assessment-objective props: @@ -23267,6 +26084,9 @@ catalog: value: PS-05b. class: sp800-53a prose: ' {{ insert: param, ps-05_odp.01 }} are initiated within {{ insert: param, ps-05_odp.02 }};' + links: + - href: '#ps-5_smt.b' + rel: assessment-for - id: ps-5_obj.c name: assessment-objective props: @@ -23274,6 +26094,9 @@ catalog: value: PS-05c. class: sp800-53a prose: access authorization is modified as needed to correspond with any changes in operational need due to reassignment or transfer; + links: + - href: '#ps-5_smt.c' + rel: assessment-for - id: ps-5_obj.d name: assessment-objective props: @@ -23281,6 +26104,12 @@ catalog: value: PS-05d. class: sp800-53a prose: ' {{ insert: param, ps-05_odp.03 }} are notified within {{ insert: param, ps-05_odp.04 }}.' + links: + - href: '#ps-5_smt.d' + rel: assessment-for + links: + - href: '#ps-5_smt' + rel: assessment-for - id: ps-5_asm-examine name: assessment-method props: @@ -23451,6 +26280,9 @@ catalog: value: PS-06a. class: sp800-53a prose: access agreements are developed and documented for organizational systems; + links: + - href: '#ps-6_smt.a' + rel: assessment-for - id: ps-6_obj.b name: assessment-objective props: @@ -23458,6 +26290,9 @@ catalog: value: PS-06b. class: sp800-53a prose: 'the access agreements are reviewed and updated {{ insert: param, ps-06_odp.01 }};' + links: + - href: '#ps-6_smt.b' + rel: assessment-for - id: ps-6_obj.c name: assessment-objective props: @@ -23472,6 +26307,9 @@ catalog: value: PS-06c.01 class: sp800-53a prose: individuals requiring access to organizational information and systems sign appropriate access agreements prior to being granted access; + links: + - href: '#ps-6_smt.c.1' + rel: assessment-for - id: ps-6_obj.c.2 name: assessment-objective props: @@ -23479,6 +26317,15 @@ catalog: value: PS-06c.02 class: sp800-53a prose: 'individuals requiring access to organizational information and systems re-sign access agreements to maintain access to organizational systems when access agreements have been updated or {{ insert: param, ps-06_odp.02 }}.' + links: + - href: '#ps-6_smt.c.2' + rel: assessment-for + links: + - href: '#ps-6_smt.c' + rel: assessment-for + links: + - href: '#ps-6_smt' + rel: assessment-for - id: ps-6_asm-examine name: assessment-method props: @@ -23660,6 +26507,9 @@ catalog: value: PS-07a. class: sp800-53a prose: personnel security requirements are established, including security roles and responsibilities for external providers; + links: + - href: '#ps-7_smt.a' + rel: assessment-for - id: ps-7_obj.b name: assessment-objective props: @@ -23667,6 +26517,9 @@ catalog: value: PS-07b. class: sp800-53a prose: external providers are required to comply with personnel security policies and procedures established by the organization; + links: + - href: '#ps-7_smt.b' + rel: assessment-for - id: ps-7_obj.c name: assessment-objective props: @@ -23674,6 +26527,9 @@ catalog: value: PS-07c. class: sp800-53a prose: personnel security requirements are documented; + links: + - href: '#ps-7_smt.c' + rel: assessment-for - id: ps-7_obj.d name: assessment-objective props: @@ -23681,6 +26537,9 @@ catalog: value: PS-07d. class: sp800-53a prose: 'external providers are required to notify {{ insert: param, ps-07_odp.01 }} of any personnel transfers or terminations of external personnel who possess organizational credentials and/or badges or who have system privileges within {{ insert: param, ps-07_odp.02 }};' + links: + - href: '#ps-7_smt.d' + rel: assessment-for - id: ps-7_obj.e name: assessment-objective props: @@ -23688,6 +26547,12 @@ catalog: value: PS-07e. class: sp800-53a prose: provider compliance with personnel security requirements is monitored. + links: + - href: '#ps-7_smt.e' + rel: assessment-for + links: + - href: '#ps-7_smt' + rel: assessment-for - id: ps-7_asm-examine name: assessment-method props: @@ -23828,6 +26693,9 @@ catalog: value: PS-08a. class: sp800-53a prose: a formal sanctions process is employed for individuals failing to comply with established information security and privacy policies and procedures; + links: + - href: '#ps-8_smt.a' + rel: assessment-for - id: ps-8_obj.b name: assessment-objective props: @@ -23835,6 +26703,12 @@ catalog: value: PS-08b. class: sp800-53a prose: ' {{ insert: param, ps-08_odp.01 }} is/are notified within {{ insert: param, ps-08_odp.02 }} when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction.' + links: + - href: '#ps-8_smt.b' + rel: assessment-for + links: + - href: '#ps-8_smt' + rel: assessment-for - id: ps-8_asm-examine name: assessment-method props: @@ -23936,6 +26810,9 @@ catalog: value: PS-09[01] class: sp800-53a prose: security roles and responsibilities are incorporated into organizational position descriptions; + links: + - href: '#ps-9_smt' + rel: assessment-for - id: ps-9_obj-2 name: assessment-objective props: @@ -23943,6 +26820,12 @@ catalog: value: PS-09[02] class: sp800-53a prose: privacy roles and responsibilities are incorporated into organizational position descriptions. + links: + - href: '#ps-9_smt' + rel: assessment-for + links: + - href: '#ps-9_smt' + rel: assessment-for - id: ps-9_asm-examine name: assessment-method props: @@ -24211,6 +27094,9 @@ catalog: value: RA-01a.[01] class: sp800-53a prose: a risk assessment policy is developed and documented; + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.a-2 name: assessment-objective props: @@ -24218,6 +27104,9 @@ catalog: value: RA-01a.[02] class: sp800-53a prose: 'the risk assessment policy is disseminated to {{ insert: param, ra-01_odp.01 }};' + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.a-3 name: assessment-objective props: @@ -24225,6 +27114,9 @@ catalog: value: RA-01a.[03] class: sp800-53a prose: risk assessment procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls are developed and documented; + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.a-4 name: assessment-objective props: @@ -24232,6 +27124,9 @@ catalog: value: RA-01a.[04] class: sp800-53a prose: 'the risk assessment procedures are disseminated to {{ insert: param, ra-01_odp.02 }};' + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.a.1 name: assessment-objective props: @@ -24253,6 +27148,9 @@ catalog: value: RA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses purpose;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-2 name: assessment-objective props: @@ -24260,6 +27158,9 @@ catalog: value: RA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses scope;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-3 name: assessment-objective props: @@ -24267,6 +27168,9 @@ catalog: value: RA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses roles;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-4 name: assessment-objective props: @@ -24274,6 +27178,9 @@ catalog: value: RA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses responsibilities;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-5 name: assessment-objective props: @@ -24281,6 +27188,9 @@ catalog: value: RA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses management commitment;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-6 name: assessment-objective props: @@ -24288,6 +27198,9 @@ catalog: value: RA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses coordination among organizational entities;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-7 name: assessment-objective props: @@ -24295,6 +27208,12 @@ catalog: value: RA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses compliance;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.b name: assessment-objective props: @@ -24302,6 +27221,15 @@ catalog: value: RA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ra-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ra-1_smt.a.1' + rel: assessment-for + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.b name: assessment-objective props: @@ -24309,6 +27237,9 @@ catalog: value: RA-01b. class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the risk assessment policy and procedures;' + links: + - href: '#ra-1_smt.b' + rel: assessment-for - id: ra-1_obj.c name: assessment-objective props: @@ -24330,6 +27261,9 @@ catalog: value: RA-01c.01[01] class: sp800-53a prose: 'the current risk assessment policy is reviewed and updated {{ insert: param, ra-01_odp.05 }};' + links: + - href: '#ra-1_smt.c.1' + rel: assessment-for - id: ra-1_obj.c.1-2 name: assessment-objective props: @@ -24337,6 +27271,12 @@ catalog: value: RA-01c.01[02] class: sp800-53a prose: 'the current risk assessment policy is reviewed and updated following {{ insert: param, ra-01_odp.06 }};' + links: + - href: '#ra-1_smt.c.1' + rel: assessment-for + links: + - href: '#ra-1_smt.c.1' + rel: assessment-for - id: ra-1_obj.c.2 name: assessment-objective props: @@ -24351,6 +27291,9 @@ catalog: value: RA-01c.02[01] class: sp800-53a prose: 'the current risk assessment procedures are reviewed and updated {{ insert: param, ra-01_odp.07 }};' + links: + - href: '#ra-1_smt.c.2' + rel: assessment-for - id: ra-1_obj.c.2-2 name: assessment-objective props: @@ -24358,6 +27301,18 @@ catalog: value: RA-01c.02[02] class: sp800-53a prose: 'the current risk assessment procedures are reviewed and updated following {{ insert: param, ra-01_odp.08 }}.' + links: + - href: '#ra-1_smt.c.2' + rel: assessment-for + links: + - href: '#ra-1_smt.c.2' + rel: assessment-for + links: + - href: '#ra-1_smt.c' + rel: assessment-for + links: + - href: '#ra-1_smt' + rel: assessment-for - id: ra-1_asm-examine name: assessment-method props: @@ -24499,6 +27454,9 @@ catalog: value: RA-02a. class: sp800-53a prose: the system and the information it processes, stores, and transmits are categorized; + links: + - href: '#ra-2_smt.a' + rel: assessment-for - id: ra-2_obj.b name: assessment-objective props: @@ -24506,6 +27464,9 @@ catalog: value: RA-02b. class: sp800-53a prose: the security categorization results, including supporting rationale, are documented in the security plan for the system; + links: + - href: '#ra-2_smt.b' + rel: assessment-for - id: ra-2_obj.c name: assessment-objective props: @@ -24513,6 +27474,12 @@ catalog: value: RA-02c. class: sp800-53a prose: the authorizing official or authorizing official designated representative reviews and approves the security categorization decision. + links: + - href: '#ra-2_smt.c' + rel: assessment-for + links: + - href: '#ra-2_smt' + rel: assessment-for - id: ra-2_asm-examine name: assessment-method props: @@ -24790,6 +27757,9 @@ catalog: value: RA-03a.01 class: sp800-53a prose: a risk assessment is conducted to identify threats to and vulnerabilities in the system; + links: + - href: '#ra-3_smt.a.1' + rel: assessment-for - id: ra-3_obj.a.2 name: assessment-objective props: @@ -24797,6 +27767,9 @@ catalog: value: RA-03a.02 class: sp800-53a prose: a risk assessment is conducted to determine the likelihood and magnitude of harm from unauthorized access, use, disclosure, disruption, modification, or destruction of the system; the information it processes, stores, or transmits; and any related information; + links: + - href: '#ra-3_smt.a.2' + rel: assessment-for - id: ra-3_obj.a.3 name: assessment-objective props: @@ -24804,6 +27777,12 @@ catalog: value: RA-03a.03 class: sp800-53a prose: a risk assessment is conducted to determine the likelihood and impact of adverse effects on individuals arising from the processing of personally identifiable information; + links: + - href: '#ra-3_smt.a.3' + rel: assessment-for + links: + - href: '#ra-3_smt.a' + rel: assessment-for - id: ra-3_obj.b name: assessment-objective props: @@ -24811,6 +27790,9 @@ catalog: value: RA-03b. class: sp800-53a prose: risk assessment results and risk management decisions from the organization and mission or business process perspectives are integrated with system-level risk assessments; + links: + - href: '#ra-3_smt.b' + rel: assessment-for - id: ra-3_obj.c name: assessment-objective props: @@ -24818,6 +27800,9 @@ catalog: value: RA-03c. class: sp800-53a prose: 'risk assessment results are documented in {{ insert: param, ra-03_odp.01 }};' + links: + - href: '#ra-3_smt.c' + rel: assessment-for - id: ra-3_obj.d name: assessment-objective props: @@ -24825,6 +27810,9 @@ catalog: value: RA-03d. class: sp800-53a prose: 'risk assessment results are reviewed {{ insert: param, ra-03_odp.03 }};' + links: + - href: '#ra-3_smt.d' + rel: assessment-for - id: ra-3_obj.e name: assessment-objective props: @@ -24832,6 +27820,9 @@ catalog: value: RA-03e. class: sp800-53a prose: 'risk assessment results are disseminated to {{ insert: param, ra-03_odp.04 }};' + links: + - href: '#ra-3_smt.e' + rel: assessment-for - id: ra-3_obj.f name: assessment-objective props: @@ -24839,6 +27830,12 @@ catalog: value: RA-03f. class: sp800-53a prose: 'the risk assessment is updated {{ insert: param, ra-03_odp.05 }} or when there are significant changes to the system, its environment of operation, or other conditions that may impact the security or privacy state of the system.' + links: + - href: '#ra-3_smt.f' + rel: assessment-for + links: + - href: '#ra-3_smt' + rel: assessment-for - id: ra-3_asm-examine name: assessment-method props: @@ -24987,6 +27984,9 @@ catalog: value: RA-03(01)(a) class: sp800-53a prose: 'supply chain risks associated with {{ insert: param, ra-03.01_odp.01 }} are assessed;' + links: + - href: '#ra-3.1_smt.a' + rel: assessment-for - id: ra-3.1_obj.b name: assessment-objective props: @@ -24994,6 +27994,12 @@ catalog: value: RA-03(01)(b) class: sp800-53a prose: 'the supply chain risk assessment is updated {{ insert: param, ra-03.01_odp.02 }} , when there are significant changes to the relevant supply chain, or when changes to the system, environments of operation, or other conditions may necessitate a change in the supply chain.' + links: + - href: '#ra-3.1_smt.b' + rel: assessment-for + links: + - href: '#ra-3.1_smt' + rel: assessment-for - id: ra-3.1_asm-examine name: assessment-method props: @@ -25269,6 +28275,9 @@ catalog: value: RA-05a.[01] class: sp800-53a prose: 'systems and hosted applications are monitored for vulnerabilities {{ insert: param, ra-05_odp.01 }} and when new vulnerabilities potentially affecting the system are identified and reported;' + links: + - href: '#ra-5_smt.a' + rel: assessment-for - id: ra-5_obj.a-2 name: assessment-objective props: @@ -25276,6 +28285,12 @@ catalog: value: RA-05a.[02] class: sp800-53a prose: 'systems and hosted applications are scanned for vulnerabilities {{ insert: param, ra-05_odp.02 }} and when new vulnerabilities potentially affecting the system are identified and reported;' + links: + - href: '#ra-5_smt.a' + rel: assessment-for + links: + - href: '#ra-5_smt.a' + rel: assessment-for - id: ra-5_obj.b name: assessment-objective props: @@ -25291,6 +28306,9 @@ catalog: value: RA-05b.01 class: sp800-53a prose: vulnerability monitoring tools and techniques are employed to automate parts of the vulnerability management process by using standards for enumerating platforms, software flaws, and improper configurations; + links: + - href: '#ra-5_smt.b.1' + rel: assessment-for - id: ra-5_obj.b.2 name: assessment-objective props: @@ -25298,6 +28316,9 @@ catalog: value: RA-05b.02 class: sp800-53a prose: vulnerability monitoring tools and techniques are employed to facilitate interoperability among tools and to automate parts of the vulnerability management process by using standards for formatting checklists and test procedures; + links: + - href: '#ra-5_smt.b.2' + rel: assessment-for - id: ra-5_obj.b.3 name: assessment-objective props: @@ -25305,6 +28326,12 @@ catalog: value: RA-05b.03 class: sp800-53a prose: vulnerability monitoring tools and techniques are employed to facilitate interoperability among tools and to automate parts of the vulnerability management process by using standards for measuring vulnerability impact; + links: + - href: '#ra-5_smt.b.3' + rel: assessment-for + links: + - href: '#ra-5_smt.b' + rel: assessment-for - id: ra-5_obj.c name: assessment-objective props: @@ -25312,6 +28339,9 @@ catalog: value: RA-05c. class: sp800-53a prose: vulnerability scan reports and results from vulnerability monitoring are analyzed; + links: + - href: '#ra-5_smt.c' + rel: assessment-for - id: ra-5_obj.d name: assessment-objective props: @@ -25319,6 +28349,9 @@ catalog: value: RA-05d. class: sp800-53a prose: 'legitimate vulnerabilities are remediated {{ insert: param, ra-05_odp.03 }} in accordance with an organizational assessment of risk;' + links: + - href: '#ra-5_smt.d' + rel: assessment-for - id: ra-5_obj.e name: assessment-objective props: @@ -25326,6 +28359,9 @@ catalog: value: RA-05e. class: sp800-53a prose: 'information obtained from the vulnerability monitoring process and control assessments is shared with {{ insert: param, ra-05_odp.04 }} to help eliminate similar vulnerabilities in other systems;' + links: + - href: '#ra-5_smt.e' + rel: assessment-for - id: ra-5_obj.f name: assessment-objective props: @@ -25333,6 +28369,12 @@ catalog: value: RA-05f. class: sp800-53a prose: vulnerability monitoring tools that include the capability to readily update the vulnerabilities to be scanned are employed. + links: + - href: '#ra-5_smt.f' + rel: assessment-for + links: + - href: '#ra-5_smt' + rel: assessment-for - id: ra-5_asm-examine name: assessment-method props: @@ -25459,6 +28501,9 @@ catalog: value: RA-05(02) class: sp800-53a prose: 'the system vulnerabilities to be scanned are updated {{ insert: param, ra-05.02_odp.01 }}.' + links: + - href: '#ra-5.2_smt' + rel: assessment-for - id: ra-5.2_asm-examine name: assessment-method props: @@ -25552,6 +28597,9 @@ catalog: value: RA-05(11) class: sp800-53a prose: a public reporting channel is established for receiving reports of vulnerabilities in organizational systems and system components. + links: + - href: '#ra-5.11_smt' + rel: assessment-for - id: ra-5.11_asm-examine name: assessment-method props: @@ -25682,6 +28730,9 @@ catalog: value: RA-07[01] class: sp800-53a prose: findings from security assessments are responded to in accordance with organizational risk tolerance; + links: + - href: '#ra-7_smt' + rel: assessment-for - id: ra-7_obj-2 name: assessment-objective props: @@ -25689,6 +28740,9 @@ catalog: value: RA-07[02] class: sp800-53a prose: findings from privacy assessments are responded to in accordance with organizational risk tolerance; + links: + - href: '#ra-7_smt' + rel: assessment-for - id: ra-7_obj-3 name: assessment-objective props: @@ -25696,6 +28750,9 @@ catalog: value: RA-07[03] class: sp800-53a prose: findings from monitoring are responded to in accordance with organizational risk tolerance; + links: + - href: '#ra-7_smt' + rel: assessment-for - id: ra-7_obj-4 name: assessment-objective props: @@ -25703,6 +28760,12 @@ catalog: value: RA-07[04] class: sp800-53a prose: findings from audits are responded to in accordance with organizational risk tolerance. + links: + - href: '#ra-7_smt' + rel: assessment-for + links: + - href: '#ra-7_smt' + rel: assessment-for - id: ra-7_asm-examine name: assessment-method props: @@ -25974,6 +29037,9 @@ catalog: value: SA-01a.[01] class: sp800-53a prose: a system and services acquisition policy is developed and documented; + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.a-2 name: assessment-objective props: @@ -25981,6 +29047,9 @@ catalog: value: SA-01a.[02] class: sp800-53a prose: 'the system and services acquisition policy is disseminated to {{ insert: param, sa-01_odp.01 }};' + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.a-3 name: assessment-objective props: @@ -25988,6 +29057,9 @@ catalog: value: SA-01a.[03] class: sp800-53a prose: system and services acquisition procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls are developed and documented; + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.a-4 name: assessment-objective props: @@ -25995,6 +29067,9 @@ catalog: value: SA-01a.[04] class: sp800-53a prose: 'the system and services acquisition procedures are disseminated to {{ insert: param, sa-01_odp.02 }};' + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.a.1 name: assessment-objective props: @@ -26016,6 +29091,9 @@ catalog: value: SA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses purpose;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-2 name: assessment-objective props: @@ -26023,6 +29101,9 @@ catalog: value: SA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses scope;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-3 name: assessment-objective props: @@ -26030,6 +29111,9 @@ catalog: value: SA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses roles;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-4 name: assessment-objective props: @@ -26037,6 +29121,9 @@ catalog: value: SA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses responsibilities;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-5 name: assessment-objective props: @@ -26044,6 +29131,9 @@ catalog: value: SA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses management commitment;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-6 name: assessment-objective props: @@ -26051,6 +29141,9 @@ catalog: value: SA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses coordination among organizational entities;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-7 name: assessment-objective props: @@ -26058,6 +29151,12 @@ catalog: value: SA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses compliance;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.b name: assessment-objective props: @@ -26065,6 +29164,15 @@ catalog: value: SA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#sa-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#sa-1_smt.a.1' + rel: assessment-for + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.b name: assessment-objective props: @@ -26072,6 +29180,9 @@ catalog: value: SA-01b. class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the system and services acquisition policy and procedures;' + links: + - href: '#sa-1_smt.b' + rel: assessment-for - id: sa-1_obj.c name: assessment-objective props: @@ -26093,6 +29204,9 @@ catalog: value: SA-01c.01[01] class: sp800-53a prose: 'the system and services acquisition policy is reviewed and updated {{ insert: param, sa-01_odp.05 }};' + links: + - href: '#sa-1_smt.c.1' + rel: assessment-for - id: sa-1_obj.c.1-2 name: assessment-objective props: @@ -26100,6 +29214,12 @@ catalog: value: SA-01c.01[02] class: sp800-53a prose: 'the current system and services acquisition policy is reviewed and updated following {{ insert: param, sa-01_odp.06 }};' + links: + - href: '#sa-1_smt.c.1' + rel: assessment-for + links: + - href: '#sa-1_smt.c.1' + rel: assessment-for - id: sa-1_obj.c.2 name: assessment-objective props: @@ -26114,6 +29234,9 @@ catalog: value: SA-01c.02[01] class: sp800-53a prose: 'the current system and services acquisition procedures are reviewed and updated {{ insert: param, sa-01_odp.07 }};' + links: + - href: '#sa-1_smt.c.2' + rel: assessment-for - id: sa-1_obj.c.2-2 name: assessment-objective props: @@ -26121,6 +29244,18 @@ catalog: value: SA-01c.02[02] class: sp800-53a prose: 'the current system and services acquisition procedures are reviewed and updated following {{ insert: param, sa-01_odp.08 }}.' + links: + - href: '#sa-1_smt.c.2' + rel: assessment-for + links: + - href: '#sa-1_smt.c.2' + rel: assessment-for + links: + - href: '#sa-1_smt.c' + rel: assessment-for + links: + - href: '#sa-1_smt' + rel: assessment-for - id: sa-1_asm-examine name: assessment-method props: @@ -26247,6 +29382,9 @@ catalog: value: SA-02a.[01] class: sp800-53a prose: the high-level information security requirements for the system or system service are determined in mission and business process planning; + links: + - href: '#sa-2_smt.a' + rel: assessment-for - id: sa-2_obj.a-2 name: assessment-objective props: @@ -26254,6 +29392,12 @@ catalog: value: SA-02a.[02] class: sp800-53a prose: the high-level privacy requirements for the system or system service are determined in mission and business process planning; + links: + - href: '#sa-2_smt.a' + rel: assessment-for + links: + - href: '#sa-2_smt.a' + rel: assessment-for - id: sa-2_obj.b name: assessment-objective props: @@ -26268,6 +29412,9 @@ catalog: value: SA-02b.[01] class: sp800-53a prose: the resources required to protect the system or system service are determined and documented as part of the organizational capital planning and investment control process; + links: + - href: '#sa-2_smt.b' + rel: assessment-for - id: sa-2_obj.b-2 name: assessment-objective props: @@ -26275,6 +29422,12 @@ catalog: value: SA-02b.[02] class: sp800-53a prose: the resources required to protect the system or system service are allocated as part of the organizational capital planning and investment control process; + links: + - href: '#sa-2_smt.b' + rel: assessment-for + links: + - href: '#sa-2_smt.b' + rel: assessment-for - id: sa-2_obj.c name: assessment-objective props: @@ -26289,6 +29442,9 @@ catalog: value: SA-02c.[01] class: sp800-53a prose: a discrete line item for information security is established in organizational programming and budgeting documentation; + links: + - href: '#sa-2_smt.c' + rel: assessment-for - id: sa-2_obj.c-2 name: assessment-objective props: @@ -26296,6 +29452,15 @@ catalog: value: SA-02c.[02] class: sp800-53a prose: a discrete line item for privacy is established in organizational programming and budgeting documentation. + links: + - href: '#sa-2_smt.c' + rel: assessment-for + links: + - href: '#sa-2_smt.c' + rel: assessment-for + links: + - href: '#sa-2_smt' + rel: assessment-for - id: sa-2_asm-examine name: assessment-method props: @@ -26488,6 +29653,9 @@ catalog: value: SA-03a.[01] class: sp800-53a prose: 'the system is acquired, developed, and managed using {{ insert: param, sa-03_odp }} that incorporates information security considerations;' + links: + - href: '#sa-3_smt.a' + rel: assessment-for - id: sa-3_obj.a-2 name: assessment-objective props: @@ -26495,6 +29663,12 @@ catalog: value: SA-03a.[02] class: sp800-53a prose: 'the system is acquired, developed, and managed using {{ insert: param, sa-03_odp }} that incorporates privacy considerations;' + links: + - href: '#sa-3_smt.a' + rel: assessment-for + links: + - href: '#sa-3_smt.a' + rel: assessment-for - id: sa-3_obj.b name: assessment-objective props: @@ -26509,6 +29683,9 @@ catalog: value: SA-03b.[01] class: sp800-53a prose: information security roles and responsibilities are defined and documented throughout the system development life cycle; + links: + - href: '#sa-3_smt.b' + rel: assessment-for - id: sa-3_obj.b-2 name: assessment-objective props: @@ -26516,6 +29693,12 @@ catalog: value: SA-03b.[02] class: sp800-53a prose: privacy roles and responsibilities are defined and documented throughout the system development life cycle; + links: + - href: '#sa-3_smt.b' + rel: assessment-for + links: + - href: '#sa-3_smt.b' + rel: assessment-for - id: sa-3_obj.c name: assessment-objective props: @@ -26530,6 +29713,9 @@ catalog: value: SA-03c.[01] class: sp800-53a prose: individuals with information security roles and responsibilities are identified; + links: + - href: '#sa-3_smt.c' + rel: assessment-for - id: sa-3_obj.c-2 name: assessment-objective props: @@ -26537,6 +29723,12 @@ catalog: value: SA-03c.[02] class: sp800-53a prose: individuals with privacy roles and responsibilities are identified; + links: + - href: '#sa-3_smt.c' + rel: assessment-for + links: + - href: '#sa-3_smt.c' + rel: assessment-for - id: sa-3_obj.d name: assessment-objective props: @@ -26551,6 +29743,9 @@ catalog: value: SA-03d.[01] class: sp800-53a prose: organizational information security risk management processes are integrated into system development life cycle activities; + links: + - href: '#sa-3_smt.d' + rel: assessment-for - id: sa-3_obj.d-2 name: assessment-objective props: @@ -26558,6 +29753,15 @@ catalog: value: SA-03d.[02] class: sp800-53a prose: organizational privacy risk management processes are integrated into system development life cycle activities. + links: + - href: '#sa-3_smt.d' + rel: assessment-for + links: + - href: '#sa-3_smt.d' + rel: assessment-for + links: + - href: '#sa-3_smt' + rel: assessment-for - id: sa-3_asm-examine name: assessment-method props: @@ -26830,6 +30034,9 @@ catalog: value: SA-04a.[01] class: sp800-53a prose: 'security functional requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.a' + rel: assessment-for - id: sa-4_obj.a-2 name: assessment-objective props: @@ -26837,6 +30044,12 @@ catalog: value: SA-04a.[02] class: sp800-53a prose: 'privacy functional requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.a' + rel: assessment-for + links: + - href: '#sa-4_smt.a' + rel: assessment-for - id: sa-4_obj.b name: assessment-objective props: @@ -26844,6 +30057,9 @@ catalog: value: SA-04b. class: sp800-53a prose: 'strength of mechanism requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.b' + rel: assessment-for - id: sa-4_obj.c name: assessment-objective props: @@ -26858,6 +30074,9 @@ catalog: value: SA-04c.[01] class: sp800-53a prose: 'security assurance requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.c' + rel: assessment-for - id: sa-4_obj.c-2 name: assessment-objective props: @@ -26865,6 +30084,12 @@ catalog: value: SA-04c.[02] class: sp800-53a prose: 'privacy assurance requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.c' + rel: assessment-for + links: + - href: '#sa-4_smt.c' + rel: assessment-for - id: sa-4_obj.d name: assessment-objective props: @@ -26879,6 +30104,9 @@ catalog: value: SA-04d.[01] class: sp800-53a prose: 'controls needed to satisfy the security requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.d' + rel: assessment-for - id: sa-4_obj.d-2 name: assessment-objective props: @@ -26886,6 +30114,12 @@ catalog: value: SA-04d.[02] class: sp800-53a prose: 'controls needed to satisfy the privacy requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.d' + rel: assessment-for + links: + - href: '#sa-4_smt.d' + rel: assessment-for - id: sa-4_obj.e name: assessment-objective props: @@ -26900,6 +30134,9 @@ catalog: value: SA-04e.[01] class: sp800-53a prose: 'security documentation requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.e' + rel: assessment-for - id: sa-4_obj.e-2 name: assessment-objective props: @@ -26907,6 +30144,12 @@ catalog: value: SA-04e.[02] class: sp800-53a prose: 'privacy documentation requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.e' + rel: assessment-for + links: + - href: '#sa-4_smt.e' + rel: assessment-for - id: sa-4_obj.f name: assessment-objective props: @@ -26921,6 +30164,9 @@ catalog: value: SA-04f.[01] class: sp800-53a prose: 'requirements for protecting security documentation, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.f' + rel: assessment-for - id: sa-4_obj.f-2 name: assessment-objective props: @@ -26928,6 +30174,12 @@ catalog: value: SA-04f.[02] class: sp800-53a prose: 'requirements for protecting privacy documentation, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.f' + rel: assessment-for + links: + - href: '#sa-4_smt.f' + rel: assessment-for - id: sa-4_obj.g name: assessment-objective props: @@ -26935,6 +30187,9 @@ catalog: value: SA-04g. class: sp800-53a prose: 'the description of the system development environment and environment in which the system is intended to operate, requirements, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.g' + rel: assessment-for - id: sa-4_obj.h name: assessment-objective props: @@ -26949,6 +30204,9 @@ catalog: value: SA-04h.[01] class: sp800-53a prose: 'the allocation of responsibility or identification of parties responsible for information security requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.h' + rel: assessment-for - id: sa-4_obj.h-2 name: assessment-objective props: @@ -26956,6 +30214,9 @@ catalog: value: SA-04h.[02] class: sp800-53a prose: 'the allocation of responsibility or identification of parties responsible for privacy requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }};' + links: + - href: '#sa-4_smt.h' + rel: assessment-for - id: sa-4_obj.h-3 name: assessment-objective props: @@ -26963,6 +30224,12 @@ catalog: value: SA-04h.[03] class: sp800-53a prose: 'the allocation of responsibility or identification of parties responsible for supply chain risk management requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }};' + links: + - href: '#sa-4_smt.h' + rel: assessment-for + links: + - href: '#sa-4_smt.h' + rel: assessment-for - id: sa-4_obj.i name: assessment-objective props: @@ -26970,6 +30237,12 @@ catalog: value: SA-04i. class: sp800-53a prose: 'acceptance criteria requirements and descriptions are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service.' + links: + - href: '#sa-4_smt.i' + rel: assessment-for + links: + - href: '#sa-4_smt' + rel: assessment-for - id: sa-4_asm-examine name: assessment-method props: @@ -27078,6 +30351,9 @@ catalog: value: SA-04(10) class: sp800-53a prose: only information technology products on the FIPS 201-approved products list for the Personal Identity Verification (PIV) capability implemented within organizational systems are employed. + links: + - href: '#sa-4.10_smt' + rel: assessment-for - id: sa-4.10_asm-examine name: assessment-method props: @@ -27316,6 +30592,9 @@ catalog: value: SA-05a.01[01] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the secure configuration of the system, component, or service is obtained or developed; + links: + - href: '#sa-5_smt.a.1' + rel: assessment-for - id: sa-5_obj.a.1-2 name: assessment-objective props: @@ -27323,6 +30602,9 @@ catalog: value: SA-05a.01[02] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the secure installation of the system, component, or service is obtained or developed; + links: + - href: '#sa-5_smt.a.1' + rel: assessment-for - id: sa-5_obj.a.1-3 name: assessment-objective props: @@ -27330,6 +30612,12 @@ catalog: value: SA-05a.01[03] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the secure operation of the system, component, or service is obtained or developed; + links: + - href: '#sa-5_smt.a.1' + rel: assessment-for + links: + - href: '#sa-5_smt.a.1' + rel: assessment-for - id: sa-5_obj.a.2 name: assessment-objective props: @@ -27344,6 +30632,9 @@ catalog: value: SA-05a.02[01] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the effective use of security functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.a.2' + rel: assessment-for - id: sa-5_obj.a.2-2 name: assessment-objective props: @@ -27351,6 +30642,9 @@ catalog: value: SA-05a.02[02] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the effective maintenance of security functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.a.2' + rel: assessment-for - id: sa-5_obj.a.2-3 name: assessment-objective props: @@ -27358,6 +30652,9 @@ catalog: value: SA-05a.02[03] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the effective use of privacy functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.a.2' + rel: assessment-for - id: sa-5_obj.a.2-4 name: assessment-objective props: @@ -27365,6 +30662,12 @@ catalog: value: SA-05a.02[04] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the effective maintenance of privacy functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.a.2' + rel: assessment-for + links: + - href: '#sa-5_smt.a.2' + rel: assessment-for - id: sa-5_obj.a.3 name: assessment-objective props: @@ -27379,6 +30682,9 @@ catalog: value: SA-05a.03[01] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes known vulnerabilities regarding the configuration of administrative or privileged functions is obtained or developed; + links: + - href: '#sa-5_smt.a.3' + rel: assessment-for - id: sa-5_obj.a.3-2 name: assessment-objective props: @@ -27386,6 +30692,15 @@ catalog: value: SA-05a.03[02] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes known vulnerabilities regarding the use of administrative or privileged functions is obtained or developed; + links: + - href: '#sa-5_smt.a.3' + rel: assessment-for + links: + - href: '#sa-5_smt.a.3' + rel: assessment-for + links: + - href: '#sa-5_smt.a' + rel: assessment-for - id: sa-5_obj.b name: assessment-objective props: @@ -27407,6 +30722,9 @@ catalog: value: SA-05b.01[01] class: sp800-53a prose: user documentation for the system, system component, or system service that describes user-accessible security functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.b.1' + rel: assessment-for - id: sa-5_obj.b.1-2 name: assessment-objective props: @@ -27414,6 +30732,9 @@ catalog: value: SA-05b.01[02] class: sp800-53a prose: user documentation for the system, system component, or system service that describes how to effectively use those (user-accessible security) functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.b.1' + rel: assessment-for - id: sa-5_obj.b.1-3 name: assessment-objective props: @@ -27421,6 +30742,9 @@ catalog: value: SA-05b.01[03] class: sp800-53a prose: user documentation for the system, system component, or system service that describes user-accessible privacy functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.b.1' + rel: assessment-for - id: sa-5_obj.b.1-4 name: assessment-objective props: @@ -27428,6 +30752,12 @@ catalog: value: SA-05b.01[04] class: sp800-53a prose: user documentation for the system, system component, or system service that describes how to effectively use those (user-accessible privacy) functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.b.1' + rel: assessment-for + links: + - href: '#sa-5_smt.b.1' + rel: assessment-for - id: sa-5_obj.b.2 name: assessment-objective props: @@ -27442,6 +30772,9 @@ catalog: value: SA-05b.02[01] class: sp800-53a prose: user documentation for the system, system component, or system service that describes methods for user interaction, which enable individuals to use the system, component, or service in a more secure manner is obtained or developed; + links: + - href: '#sa-5_smt.b.2' + rel: assessment-for - id: sa-5_obj.b.2-2 name: assessment-objective props: @@ -27449,6 +30782,12 @@ catalog: value: SA-05b.02[02] class: sp800-53a prose: user documentation for the system, system component, or system service that describes methods for user interaction, which enable individuals to use the system, component, or service to protect individual privacy is obtained or developed; + links: + - href: '#sa-5_smt.b.2' + rel: assessment-for + links: + - href: '#sa-5_smt.b.2' + rel: assessment-for - id: sa-5_obj.b.3 name: assessment-objective props: @@ -27463,6 +30802,9 @@ catalog: value: SA-05b.03[01] class: sp800-53a prose: user documentation for the system, system component, or system service that describes user responsibilities for maintaining the security of the system, component, or service is obtained or developed; + links: + - href: '#sa-5_smt.b.3' + rel: assessment-for - id: sa-5_obj.b.3-2 name: assessment-objective props: @@ -27470,6 +30812,15 @@ catalog: value: SA-05b.03[02] class: sp800-53a prose: user documentation for the system, system component, or system service that describes user responsibilities for maintaining the privacy of individuals is obtained or developed; + links: + - href: '#sa-5_smt.b.3' + rel: assessment-for + links: + - href: '#sa-5_smt.b.3' + rel: assessment-for + links: + - href: '#sa-5_smt.b' + rel: assessment-for - id: sa-5_obj.c name: assessment-objective props: @@ -27484,6 +30835,9 @@ catalog: value: SA-05c.[01] class: sp800-53a prose: attempts to obtain system, system component, or system service documentation when such documentation is either unavailable or nonexistent is documented; + links: + - href: '#sa-5_smt.c' + rel: assessment-for - id: sa-5_obj.c-2 name: assessment-objective props: @@ -27491,6 +30845,12 @@ catalog: value: SA-05c.[02] class: sp800-53a prose: 'after attempts to obtain system, system component, or system service documentation when such documentation is either unavailable or nonexistent, {{ insert: param, sa-05_odp.01 }} are taken in response;' + links: + - href: '#sa-5_smt.c' + rel: assessment-for + links: + - href: '#sa-5_smt.c' + rel: assessment-for - id: sa-5_obj.d name: assessment-objective props: @@ -27498,6 +30858,12 @@ catalog: value: SA-05d. class: sp800-53a prose: 'documentation is distributed to {{ insert: param, sa-05_odp.02 }}.' + links: + - href: '#sa-5_smt.d' + rel: assessment-for + links: + - href: '#sa-5_smt' + rel: assessment-for - id: sa-5_asm-examine name: assessment-method props: @@ -27694,6 +31060,9 @@ catalog: value: SA-08[01] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.01 }} are applied in the specification of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-2 name: assessment-objective props: @@ -27701,6 +31070,9 @@ catalog: value: SA-08[02] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.01 }} are applied in the design of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-3 name: assessment-objective props: @@ -27708,6 +31080,9 @@ catalog: value: SA-08[03] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.01 }} are applied in the development of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-4 name: assessment-objective props: @@ -27715,6 +31090,9 @@ catalog: value: SA-08[04] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.01 }} are applied in the implementation of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-5 name: assessment-objective props: @@ -27722,6 +31100,9 @@ catalog: value: SA-08[05] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.01 }} are applied in the modification of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-6 name: assessment-objective props: @@ -27729,6 +31110,9 @@ catalog: value: SA-08[06] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.02 }} are applied in the specification of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-7 name: assessment-objective props: @@ -27736,6 +31120,9 @@ catalog: value: SA-08[07] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.02 }} are applied in the design of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-8 name: assessment-objective props: @@ -27743,6 +31130,9 @@ catalog: value: SA-08[08] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.02 }} are applied in the development of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-9 name: assessment-objective props: @@ -27750,6 +31140,9 @@ catalog: value: SA-08[09] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.02 }} are applied in the implementation of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-10 name: assessment-objective props: @@ -27757,6 +31150,12 @@ catalog: value: SA-08[10] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.02 }} are applied in the modification of the system and system components.' + links: + - href: '#sa-8_smt' + rel: assessment-for + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_asm-examine name: assessment-method props: @@ -27943,6 +31342,9 @@ catalog: value: SA-09a.[01] class: sp800-53a prose: providers of external system services comply with organizational security requirements; + links: + - href: '#sa-9_smt.a' + rel: assessment-for - id: sa-9_obj.a-2 name: assessment-objective props: @@ -27950,6 +31352,9 @@ catalog: value: SA-09a.[02] class: sp800-53a prose: providers of external system services comply with organizational privacy requirements; + links: + - href: '#sa-9_smt.a' + rel: assessment-for - id: sa-9_obj.a-3 name: assessment-objective props: @@ -27957,6 +31362,12 @@ catalog: value: SA-09a.[03] class: sp800-53a prose: 'providers of external system services employ {{ insert: param, sa-09_odp.01 }};' + links: + - href: '#sa-9_smt.a' + rel: assessment-for + links: + - href: '#sa-9_smt.a' + rel: assessment-for - id: sa-9_obj.b name: assessment-objective props: @@ -27971,6 +31382,9 @@ catalog: value: SA-09b.[01] class: sp800-53a prose: organizational oversight with regard to external system services are defined and documented; + links: + - href: '#sa-9_smt.b' + rel: assessment-for - id: sa-9_obj.b-2 name: assessment-objective props: @@ -27978,6 +31392,12 @@ catalog: value: SA-09b.[02] class: sp800-53a prose: user roles and responsibilities with regard to external system services are defined and documented; + links: + - href: '#sa-9_smt.b' + rel: assessment-for + links: + - href: '#sa-9_smt.b' + rel: assessment-for - id: sa-9_obj.c name: assessment-objective props: @@ -27985,6 +31405,12 @@ catalog: value: SA-09c. class: sp800-53a prose: ' {{ insert: param, sa-09_odp.02 }} are employed to monitor control compliance by external service providers on an ongoing basis.' + links: + - href: '#sa-9_smt.c' + rel: assessment-for + links: + - href: '#sa-9_smt' + rel: assessment-for - id: sa-9_asm-examine name: assessment-method props: @@ -28139,6 +31565,9 @@ catalog: value: SA-22a. class: sp800-53a prose: system components are replaced when support for the components is no longer available from the developer, vendor, or manufacturer; + links: + - href: '#sa-22_smt.a' + rel: assessment-for - id: sa-22_obj.b name: assessment-objective props: @@ -28146,6 +31575,12 @@ catalog: value: SA-22b. class: sp800-53a prose: ' {{ insert: param, sa-22_odp.01 }} provide options for alternative sources for continued support for unsupported components.' + links: + - href: '#sa-22_smt.b' + rel: assessment-for + links: + - href: '#sa-22_smt' + rel: assessment-for - id: sa-22_asm-examine name: assessment-method props: @@ -28415,6 +31850,9 @@ catalog: value: SC-01a.[01] class: sp800-53a prose: a system and communications protection policy is developed and documented; + links: + - href: '#sc-1_smt.a' + rel: assessment-for - id: sc-1_obj.a-2 name: assessment-objective props: @@ -28422,6 +31860,9 @@ catalog: value: SC-01a.[02] class: sp800-53a prose: 'the system and communications protection policy is disseminated to {{ insert: param, sc-01_odp.01 }};' + links: + - href: '#sc-1_smt.a' + rel: assessment-for - id: sc-1_obj.a-3 name: assessment-objective props: @@ -28429,6 +31870,9 @@ catalog: value: SC-01a.[03] class: sp800-53a prose: system and communications protection procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls are developed and documented; + links: + - href: '#sc-1_smt.a' + rel: assessment-for - id: sc-1_obj.a-4 name: assessment-objective props: @@ -28436,6 +31880,9 @@ catalog: value: SC-01a.[04] class: sp800-53a prose: 'the system and communications protection procedures are disseminated to {{ insert: param, sc-01_odp.02 }};' + links: + - href: '#sc-1_smt.a' + rel: assessment-for - id: sc-1_obj.a.1 name: assessment-objective props: @@ -28457,6 +31904,9 @@ catalog: value: SC-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses purpose;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-2 name: assessment-objective props: @@ -28464,6 +31914,9 @@ catalog: value: SC-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses scope;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-3 name: assessment-objective props: @@ -28471,6 +31924,9 @@ catalog: value: SC-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses roles;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-4 name: assessment-objective props: @@ -28478,6 +31934,9 @@ catalog: value: SC-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses responsibilities;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-5 name: assessment-objective props: @@ -28485,6 +31944,9 @@ catalog: value: SC-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses management commitment;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-6 name: assessment-objective props: @@ -28492,6 +31954,9 @@ catalog: value: SC-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses coordination among organizational entities;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-7 name: assessment-objective props: @@ -28499,6 +31964,12 @@ catalog: value: SC-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses compliance;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.b name: assessment-objective props: @@ -28506,6 +31977,15 @@ catalog: value: SC-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#sc-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#sc-1_smt.a.1' + rel: assessment-for + links: + - href: '#sc-1_smt.a' + rel: assessment-for - id: sc-1_obj.b name: assessment-objective props: @@ -28513,6 +31993,9 @@ catalog: value: SC-01b. class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the system and communications protection policy and procedures;' + links: + - href: '#sc-1_smt.b' + rel: assessment-for - id: sc-1_obj.c name: assessment-objective props: @@ -28534,6 +32017,9 @@ catalog: value: SC-01c.01[01] class: sp800-53a prose: 'the current system and communications protection policy is reviewed and updated {{ insert: param, sc-01_odp.05 }};' + links: + - href: '#sc-1_smt.c.1' + rel: assessment-for - id: sc-1_obj.c.1-2 name: assessment-objective props: @@ -28541,6 +32027,12 @@ catalog: value: SC-01c.01[02] class: sp800-53a prose: 'the current system and communications protection policy is reviewed and updated following {{ insert: param, sc-01_odp.06 }};' + links: + - href: '#sc-1_smt.c.1' + rel: assessment-for + links: + - href: '#sc-1_smt.c.1' + rel: assessment-for - id: sc-1_obj.c.2 name: assessment-objective props: @@ -28555,6 +32047,9 @@ catalog: value: SC-01c.02[01] class: sp800-53a prose: 'the current system and communications protection procedures are reviewed and updated {{ insert: param, sc-01_odp.07 }};' + links: + - href: '#sc-1_smt.c.2' + rel: assessment-for - id: sc-1_obj.c.2-2 name: assessment-objective props: @@ -28562,6 +32057,18 @@ catalog: value: SC-01c.02[02] class: sp800-53a prose: 'the current system and communications protection procedures are reviewed and updated following {{ insert: param, sc-01_odp.08 }}.' + links: + - href: '#sc-1_smt.c.2' + rel: assessment-for + links: + - href: '#sc-1_smt.c.2' + rel: assessment-for + links: + - href: '#sc-1_smt.c' + rel: assessment-for + links: + - href: '#sc-1_smt' + rel: assessment-for - id: sc-1_asm-examine name: assessment-method props: @@ -28694,6 +32201,9 @@ catalog: value: SC-05a. class: sp800-53a prose: 'the effects of {{ insert: param, sc-05_odp.01 }} are {{ insert: param, sc-05_odp.02 }};' + links: + - href: '#sc-5_smt.a' + rel: assessment-for - id: sc-5_obj.b name: assessment-objective props: @@ -28701,6 +32211,12 @@ catalog: value: SC-05b. class: sp800-53a prose: ' {{ insert: param, sc-05_odp.03 }} are employed to achieve the denial-of-service protection objective.' + links: + - href: '#sc-5_smt.b' + rel: assessment-for + links: + - href: '#sc-5_smt' + rel: assessment-for - id: sc-5_asm-examine name: assessment-method props: @@ -28896,6 +32412,9 @@ catalog: value: SC-07a.[01] class: sp800-53a prose: communications at external managed interfaces to the system are monitored; + links: + - href: '#sc-7_smt.a' + rel: assessment-for - id: sc-7_obj.a-2 name: assessment-objective props: @@ -28903,6 +32422,9 @@ catalog: value: SC-07a.[02] class: sp800-53a prose: communications at external managed interfaces to the system are controlled; + links: + - href: '#sc-7_smt.a' + rel: assessment-for - id: sc-7_obj.a-3 name: assessment-objective props: @@ -28910,6 +32432,9 @@ catalog: value: SC-07a.[03] class: sp800-53a prose: communications at key internal managed interfaces within the system are monitored; + links: + - href: '#sc-7_smt.a' + rel: assessment-for - id: sc-7_obj.a-4 name: assessment-objective props: @@ -28917,6 +32442,12 @@ catalog: value: SC-07a.[04] class: sp800-53a prose: communications at key internal managed interfaces within the system are controlled; + links: + - href: '#sc-7_smt.a' + rel: assessment-for + links: + - href: '#sc-7_smt.a' + rel: assessment-for - id: sc-7_obj.b name: assessment-objective props: @@ -28924,6 +32455,9 @@ catalog: value: SC-07b. class: sp800-53a prose: 'subnetworks for publicly accessible system components are {{ insert: param, sc-07_odp }} separated from internal organizational networks;' + links: + - href: '#sc-7_smt.b' + rel: assessment-for - id: sc-7_obj.c name: assessment-objective props: @@ -28931,6 +32465,12 @@ catalog: value: SC-07c. class: sp800-53a prose: external networks or systems are only connected to through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security and privacy architecture. + links: + - href: '#sc-7_smt.c' + rel: assessment-for + links: + - href: '#sc-7_smt' + rel: assessment-for - id: sc-7_asm-examine name: assessment-method props: @@ -29057,6 +32597,8 @@ catalog: rel: related - href: '#ia-7' rel: related + - href: '#ia-13' + rel: related - href: '#sa-4' rel: related - href: '#sa-8' @@ -29104,6 +32646,9 @@ catalog: value: SC-12[01] class: sp800-53a prose: 'cryptographic keys are established when cryptography is employed within the system in accordance with {{ insert: param, sc-12_odp }};' + links: + - href: '#sc-12_smt' + rel: assessment-for - id: sc-12_obj-2 name: assessment-objective props: @@ -29111,6 +32656,12 @@ catalog: value: SC-12[02] class: sp800-53a prose: 'cryptographic keys are managed when cryptography is employed within the system in accordance with {{ insert: param, sc-12_odp }}.' + links: + - href: '#sc-12_smt' + rel: assessment-for + links: + - href: '#sc-12_smt' + rel: assessment-for - id: sc-12_asm-examine name: assessment-method props: @@ -29234,6 +32785,8 @@ catalog: rel: related - href: '#ia-7' rel: related + - href: '#ia-13' + rel: related - href: '#ma-4' rel: related - href: '#mp-2' @@ -29297,6 +32850,9 @@ catalog: value: SC-13a. class: sp800-53a prose: ' {{ insert: param, sc-13_odp.01 }} are identified;' + links: + - href: '#sc-13_smt.a' + rel: assessment-for - id: sc-13_obj.b name: assessment-objective props: @@ -29304,6 +32860,12 @@ catalog: value: SC-13b. class: sp800-53a prose: ' {{ insert: param, sc-13_odp.02 }} for each specified cryptographic use (defined in SC-13_ODP[01]) are implemented.' + links: + - href: '#sc-13_smt.b' + rel: assessment-for + links: + - href: '#sc-13_smt' + rel: assessment-for - id: sc-13_asm-examine name: assessment-method props: @@ -29427,6 +32989,9 @@ catalog: value: SC-15a. class: sp800-53a prose: 'remote activation of collaborative computing devices and applications is prohibited except {{ insert: param, sc-15_odp }};' + links: + - href: '#sc-15_smt.a' + rel: assessment-for - id: sc-15_obj.b name: assessment-objective props: @@ -29434,6 +32999,12 @@ catalog: value: SC-15b. class: sp800-53a prose: an explicit indication of use is provided to users physically present at the devices. + links: + - href: '#sc-15_smt.b' + rel: assessment-for + links: + - href: '#sc-15_smt' + rel: assessment-for - id: sc-15_asm-examine name: assessment-method props: @@ -29568,6 +33139,9 @@ catalog: value: SC-20a.[01] class: sp800-53a prose: additional data origin authentication is provided along with the authoritative name resolution data that the system returns in response to external name/address resolution queries; + links: + - href: '#sc-20_smt.a' + rel: assessment-for - id: sc-20_obj.a-2 name: assessment-objective props: @@ -29575,6 +33149,12 @@ catalog: value: SC-20a.[02] class: sp800-53a prose: integrity verification artifacts are provided along with the authoritative name resolution data that the system returns in response to external name/address resolution queries; + links: + - href: '#sc-20_smt.a' + rel: assessment-for + links: + - href: '#sc-20_smt.a' + rel: assessment-for - id: sc-20_obj.b name: assessment-objective props: @@ -29589,6 +33169,9 @@ catalog: value: SC-20b.[01] class: sp800-53a prose: the means to indicate the security status of child zones (and if the child supports secure resolution services) is provided when operating as part of a distributed, hierarchical namespace; + links: + - href: '#sc-20_smt.b' + rel: assessment-for - id: sc-20_obj.b-2 name: assessment-objective props: @@ -29596,6 +33179,15 @@ catalog: value: SC-20b.[02] class: sp800-53a prose: the means to enable verification of a chain of trust among parent and child domains when operating as part of a distributed, hierarchical namespace is provided. + links: + - href: '#sc-20_smt.b' + rel: assessment-for + links: + - href: '#sc-20_smt.b' + rel: assessment-for + links: + - href: '#sc-20_smt' + rel: assessment-for - id: sc-20_asm-examine name: assessment-method props: @@ -29690,6 +33282,9 @@ catalog: value: SC-21[01] class: sp800-53a prose: data origin authentication is requested for the name/address resolution responses that the system receives from authoritative sources; + links: + - href: '#sc-21_smt' + rel: assessment-for - id: sc-21_obj-2 name: assessment-objective props: @@ -29697,6 +33292,9 @@ catalog: value: SC-21[02] class: sp800-53a prose: data origin authentication is performed on the name/address resolution responses that the system receives from authoritative sources; + links: + - href: '#sc-21_smt' + rel: assessment-for - id: sc-21_obj-3 name: assessment-objective props: @@ -29704,6 +33302,9 @@ catalog: value: SC-21[03] class: sp800-53a prose: data integrity verification is requested for the name/address resolution responses that the system receives from authoritative sources; + links: + - href: '#sc-21_smt' + rel: assessment-for - id: sc-21_obj-4 name: assessment-objective props: @@ -29711,6 +33312,12 @@ catalog: value: SC-21[04] class: sp800-53a prose: data integrity verification is performed on the name/address resolution responses that the system receives from authoritative sources. + links: + - href: '#sc-21_smt' + rel: assessment-for + links: + - href: '#sc-21_smt' + rel: assessment-for - id: sc-21_asm-examine name: assessment-method props: @@ -29811,6 +33418,9 @@ catalog: value: SC-22[01] class: sp800-53a prose: the systems that collectively provide name/address resolution services for an organization are fault-tolerant; + links: + - href: '#sc-22_smt' + rel: assessment-for - id: sc-22_obj-2 name: assessment-objective props: @@ -29818,6 +33428,9 @@ catalog: value: SC-22[02] class: sp800-53a prose: the systems that collectively provide name/address resolution services for an organization implement internal role separation; + links: + - href: '#sc-22_smt' + rel: assessment-for - id: sc-22_obj-3 name: assessment-objective props: @@ -29825,6 +33438,12 @@ catalog: value: SC-22[03] class: sp800-53a prose: the systems that collectively provide name/address resolution services for an organization implement external role separation. + links: + - href: '#sc-22_smt' + rel: assessment-for + links: + - href: '#sc-22_smt' + rel: assessment-for - id: sc-22_asm-examine name: assessment-method props: @@ -29933,6 +33552,9 @@ catalog: value: SC-39 class: sp800-53a prose: a separate execution domain is maintained for each executing system process. + links: + - href: '#sc-39_smt' + rel: assessment-for - id: sc-39_asm-examine name: assessment-method props: @@ -30191,6 +33813,9 @@ catalog: value: SI-01a.[01] class: sp800-53a prose: a system and information integrity policy is developed and documented; + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.a-2 name: assessment-objective props: @@ -30198,6 +33823,9 @@ catalog: value: SI-01a.[02] class: sp800-53a prose: 'the system and information integrity policy is disseminated to {{ insert: param, si-01_odp.01 }};' + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.a-3 name: assessment-objective props: @@ -30205,6 +33833,9 @@ catalog: value: SI-01a.[03] class: sp800-53a prose: system and information integrity procedures to facilitate the implementation of the system and information integrity policy and associated system and information integrity controls are developed and documented; + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.a-4 name: assessment-objective props: @@ -30212,6 +33843,9 @@ catalog: value: SI-01a.[04] class: sp800-53a prose: 'the system and information integrity procedures are disseminated to {{ insert: param, si-01_odp.02 }};' + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.a.1 name: assessment-objective props: @@ -30233,6 +33867,9 @@ catalog: value: SI-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses purpose;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-2 name: assessment-objective props: @@ -30240,6 +33877,9 @@ catalog: value: SI-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses scope;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-3 name: assessment-objective props: @@ -30247,6 +33887,9 @@ catalog: value: SI-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses roles;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-4 name: assessment-objective props: @@ -30254,6 +33897,9 @@ catalog: value: SI-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses responsibilities;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-5 name: assessment-objective props: @@ -30261,6 +33907,9 @@ catalog: value: SI-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses management commitment;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-6 name: assessment-objective props: @@ -30268,6 +33917,9 @@ catalog: value: SI-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses coordination among organizational entities;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-7 name: assessment-objective props: @@ -30275,6 +33927,12 @@ catalog: value: SI-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses compliance;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.b name: assessment-objective props: @@ -30282,6 +33940,15 @@ catalog: value: SI-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#si-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#si-1_smt.a.1' + rel: assessment-for + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.b name: assessment-objective props: @@ -30289,6 +33956,9 @@ catalog: value: SI-01b. class: sp800-53a prose: 'the {{ insert: param, si-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the system and information integrity policy and procedures;' + links: + - href: '#si-1_smt.b' + rel: assessment-for - id: si-1_obj.c name: assessment-objective props: @@ -30310,6 +33980,9 @@ catalog: value: SI-01c.01[01] class: sp800-53a prose: 'the current system and information integrity policy is reviewed and updated {{ insert: param, si-01_odp.05 }};' + links: + - href: '#si-1_smt.c.1' + rel: assessment-for - id: si-1_obj.c.1-2 name: assessment-objective props: @@ -30317,6 +33990,12 @@ catalog: value: SI-01c.01[02] class: sp800-53a prose: 'the current system and information integrity policy is reviewed and updated following {{ insert: param, si-01_odp.06 }};' + links: + - href: '#si-1_smt.c.1' + rel: assessment-for + links: + - href: '#si-1_smt.c.1' + rel: assessment-for - id: si-1_obj.c.2 name: assessment-objective props: @@ -30331,6 +34010,9 @@ catalog: value: SI-01c.02[01] class: sp800-53a prose: 'the current system and information integrity procedures are reviewed and updated {{ insert: param, si-01_odp.07 }};' + links: + - href: '#si-1_smt.c.2' + rel: assessment-for - id: si-1_obj.c.2-2 name: assessment-objective props: @@ -30338,6 +34020,18 @@ catalog: value: SI-01c.02[02] class: sp800-53a prose: 'the current system and information integrity procedures are reviewed and updated following {{ insert: param, si-01_odp.08 }}.' + links: + - href: '#si-1_smt.c.2' + rel: assessment-for + links: + - href: '#si-1_smt.c.2' + rel: assessment-for + links: + - href: '#si-1_smt.c' + rel: assessment-for + links: + - href: '#si-1_smt' + rel: assessment-for - id: si-1_asm-examine name: assessment-method props: @@ -30499,6 +34193,9 @@ catalog: value: SI-02a.[01] class: sp800-53a prose: system flaws are identified; + links: + - href: '#si-2_smt.a' + rel: assessment-for - id: si-2_obj.a-2 name: assessment-objective props: @@ -30506,6 +34203,9 @@ catalog: value: SI-02a.[02] class: sp800-53a prose: system flaws are reported; + links: + - href: '#si-2_smt.a' + rel: assessment-for - id: si-2_obj.a-3 name: assessment-objective props: @@ -30513,6 +34213,12 @@ catalog: value: SI-02a.[03] class: sp800-53a prose: system flaws are corrected; + links: + - href: '#si-2_smt.a' + rel: assessment-for + links: + - href: '#si-2_smt.a' + rel: assessment-for - id: si-2_obj.b name: assessment-objective props: @@ -30527,6 +34233,9 @@ catalog: value: SI-02b.[01] class: sp800-53a prose: software updates related to flaw remediation are tested for effectiveness before installation; + links: + - href: '#si-2_smt.b' + rel: assessment-for - id: si-2_obj.b-2 name: assessment-objective props: @@ -30534,6 +34243,9 @@ catalog: value: SI-02b.[02] class: sp800-53a prose: software updates related to flaw remediation are tested for potential side effects before installation; + links: + - href: '#si-2_smt.b' + rel: assessment-for - id: si-2_obj.b-3 name: assessment-objective props: @@ -30541,6 +34253,9 @@ catalog: value: SI-02b.[03] class: sp800-53a prose: firmware updates related to flaw remediation are tested for effectiveness before installation; + links: + - href: '#si-2_smt.b' + rel: assessment-for - id: si-2_obj.b-4 name: assessment-objective props: @@ -30548,6 +34263,12 @@ catalog: value: SI-02b.[04] class: sp800-53a prose: firmware updates related to flaw remediation are tested for potential side effects before installation; + links: + - href: '#si-2_smt.b' + rel: assessment-for + links: + - href: '#si-2_smt.b' + rel: assessment-for - id: si-2_obj.c name: assessment-objective props: @@ -30562,6 +34283,9 @@ catalog: value: SI-02c.[01] class: sp800-53a prose: 'security-relevant software updates are installed within {{ insert: param, si-02_odp }} of the release of the updates;' + links: + - href: '#si-2_smt.c' + rel: assessment-for - id: si-2_obj.c-2 name: assessment-objective props: @@ -30569,6 +34293,12 @@ catalog: value: SI-02c.[02] class: sp800-53a prose: 'security-relevant firmware updates are installed within {{ insert: param, si-02_odp }} of the release of the updates;' + links: + - href: '#si-2_smt.c' + rel: assessment-for + links: + - href: '#si-2_smt.c' + rel: assessment-for - id: si-2_obj.d name: assessment-objective props: @@ -30576,6 +34306,12 @@ catalog: value: SI-02d. class: sp800-53a prose: flaw remediation is incorporated into the organizational configuration management process. + links: + - href: '#si-2_smt.d' + rel: assessment-for + links: + - href: '#si-2_smt' + rel: assessment-for - id: si-2_asm-examine name: assessment-method props: @@ -30849,6 +34585,9 @@ catalog: value: SI-03a.[01] class: sp800-53a prose: ' {{ insert: param, si-03_odp.01 }} malicious code protection mechanisms are implemented at system entry and exit points to detect malicious code;' + links: + - href: '#si-3_smt.a' + rel: assessment-for - id: si-3_obj.a-2 name: assessment-objective props: @@ -30856,6 +34595,12 @@ catalog: value: SI-03a.[02] class: sp800-53a prose: ' {{ insert: param, si-03_odp.01 }} malicious code protection mechanisms are implemented at system entry and exit points to eradicate malicious code;' + links: + - href: '#si-3_smt.a' + rel: assessment-for + links: + - href: '#si-3_smt.a' + rel: assessment-for - id: si-3_obj.b name: assessment-objective props: @@ -30863,6 +34608,9 @@ catalog: value: SI-03b. class: sp800-53a prose: malicious code protection mechanisms are updated automatically as new releases are available in accordance with organizational configuration management policy and procedures; + links: + - href: '#si-3_smt.b' + rel: assessment-for - id: si-3_obj.c name: assessment-objective props: @@ -30884,6 +34632,9 @@ catalog: value: SI-03c.01[01] class: sp800-53a prose: 'malicious code protection mechanisms are configured to perform periodic scans of the system {{ insert: param, si-03_odp.02 }};' + links: + - href: '#si-3_smt.c.1' + rel: assessment-for - id: si-3_obj.c.1-2 name: assessment-objective props: @@ -30891,6 +34642,12 @@ catalog: value: SI-03c.01[02] class: sp800-53a prose: 'malicious code protection mechanisms are configured to perform real-time scans of files from external sources at {{ insert: param, si-03_odp.03 }} as the files are downloaded, opened, or executed in accordance with organizational policy;' + links: + - href: '#si-3_smt.c.1' + rel: assessment-for + links: + - href: '#si-3_smt.c.1' + rel: assessment-for - id: si-3_obj.c.2 name: assessment-objective props: @@ -30905,6 +34662,9 @@ catalog: value: SI-03c.02[01] class: sp800-53a prose: 'malicious code protection mechanisms are configured to {{ insert: param, si-03_odp.04 }} in response to malicious code detection;' + links: + - href: '#si-3_smt.c.2' + rel: assessment-for - id: si-3_obj.c.2-2 name: assessment-objective props: @@ -30912,6 +34672,15 @@ catalog: value: SI-03c.02[02] class: sp800-53a prose: 'malicious code protection mechanisms are configured to send alerts to {{ insert: param, si-03_odp.06 }} in response to malicious code detection;' + links: + - href: '#si-3_smt.c.2' + rel: assessment-for + links: + - href: '#si-3_smt.c.2' + rel: assessment-for + links: + - href: '#si-3_smt.c' + rel: assessment-for - id: si-3_obj.d name: assessment-objective props: @@ -30919,6 +34688,12 @@ catalog: value: SI-03d. class: sp800-53a prose: the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the system are addressed. + links: + - href: '#si-3_smt.d' + rel: assessment-for + links: + - href: '#si-3_smt' + rel: assessment-for - id: si-3_asm-examine name: assessment-method props: @@ -31271,6 +35046,9 @@ catalog: value: SI-04a.01 class: sp800-53a prose: 'the system is monitored to detect attacks and indicators of potential attacks in accordance with {{ insert: param, si-04_odp.01 }};' + links: + - href: '#si-4_smt.a.1' + rel: assessment-for - id: si-4_obj.a.2 name: assessment-objective props: @@ -31285,6 +35063,9 @@ catalog: value: SI-04a.02[01] class: sp800-53a prose: the system is monitored to detect unauthorized local connections; + links: + - href: '#si-4_smt.a.2' + rel: assessment-for - id: si-4_obj.a.2-2 name: assessment-objective props: @@ -31292,6 +35073,9 @@ catalog: value: SI-04a.02[02] class: sp800-53a prose: the system is monitored to detect unauthorized network connections; + links: + - href: '#si-4_smt.a.2' + rel: assessment-for - id: si-4_obj.a.2-3 name: assessment-objective props: @@ -31299,6 +35083,15 @@ catalog: value: SI-04a.02[03] class: sp800-53a prose: the system is monitored to detect unauthorized remote connections; + links: + - href: '#si-4_smt.a.2' + rel: assessment-for + links: + - href: '#si-4_smt.a.2' + rel: assessment-for + links: + - href: '#si-4_smt.a' + rel: assessment-for - id: si-4_obj.b name: assessment-objective props: @@ -31306,6 +35099,9 @@ catalog: value: SI-04b. class: sp800-53a prose: 'unauthorized use of the system is identified through {{ insert: param, si-04_odp.02 }};' + links: + - href: '#si-4_smt.b' + rel: assessment-for - id: si-4_obj.c name: assessment-objective props: @@ -31320,6 +35116,9 @@ catalog: value: SI-04c.01 class: sp800-53a prose: internal monitoring capabilities are invoked or monitoring devices are deployed strategically within the system to collect organization-determined essential information; + links: + - href: '#si-4_smt.c.1' + rel: assessment-for - id: si-4_obj.c.2 name: assessment-objective props: @@ -31327,6 +35126,12 @@ catalog: value: SI-04c.02 class: sp800-53a prose: internal monitoring capabilities are invoked or monitoring devices are deployed at ad hoc locations within the system to track specific types of transactions of interest to the organization; + links: + - href: '#si-4_smt.c.2' + rel: assessment-for + links: + - href: '#si-4_smt.c' + rel: assessment-for - id: si-4_obj.d name: assessment-objective props: @@ -31341,6 +35146,9 @@ catalog: value: SI-04d.[01] class: sp800-53a prose: detected events are analyzed; + links: + - href: '#si-4_smt.d' + rel: assessment-for - id: si-4_obj.d-2 name: assessment-objective props: @@ -31348,6 +35156,12 @@ catalog: value: SI-04d.[02] class: sp800-53a prose: detected anomalies are analyzed; + links: + - href: '#si-4_smt.d' + rel: assessment-for + links: + - href: '#si-4_smt.d' + rel: assessment-for - id: si-4_obj.e name: assessment-objective props: @@ -31355,6 +35169,9 @@ catalog: value: SI-04e. class: sp800-53a prose: the level of system monitoring activity is adjusted when there is a change in risk to organizational operations and assets, individuals, other organizations, or the Nation; + links: + - href: '#si-4_smt.e' + rel: assessment-for - id: si-4_obj.f name: assessment-objective props: @@ -31362,6 +35179,9 @@ catalog: value: SI-04f. class: sp800-53a prose: a legal opinion regarding system monitoring activities is obtained; + links: + - href: '#si-4_smt.f' + rel: assessment-for - id: si-4_obj.g name: assessment-objective props: @@ -31369,6 +35189,12 @@ catalog: value: SI-04g. class: sp800-53a prose: ' {{ insert: param, si-04_odp.03 }} is provided to {{ insert: param, si-04_odp.04 }} {{ insert: param, si-04_odp.05 }}.' + links: + - href: '#si-4_smt.g' + rel: assessment-for + links: + - href: '#si-4_smt' + rel: assessment-for - id: si-4_asm-examine name: assessment-method props: @@ -31564,6 +35390,9 @@ catalog: value: SI-05a. class: sp800-53a prose: 'system security alerts, advisories, and directives are received from {{ insert: param, si-05_odp.01 }} on an ongoing basis;' + links: + - href: '#si-5_smt.a' + rel: assessment-for - id: si-5_obj.b name: assessment-objective props: @@ -31571,6 +35400,9 @@ catalog: value: SI-05b. class: sp800-53a prose: internal security alerts, advisories, and directives are generated as deemed necessary; + links: + - href: '#si-5_smt.b' + rel: assessment-for - id: si-5_obj.c name: assessment-objective props: @@ -31578,6 +35410,9 @@ catalog: value: SI-05c. class: sp800-53a prose: 'security alerts, advisories, and directives are disseminated to {{ insert: param, si-05_odp.02 }};' + links: + - href: '#si-5_smt.c' + rel: assessment-for - id: si-5_obj.d name: assessment-objective props: @@ -31585,6 +35420,12 @@ catalog: value: SI-05d. class: sp800-53a prose: security directives are implemented in accordance with established time frames or if the issuing organization is notified of the degree of noncompliance. + links: + - href: '#si-5_smt.d' + rel: assessment-for + links: + - href: '#si-5_smt' + rel: assessment-for - id: si-5_asm-examine name: assessment-method props: @@ -31748,6 +35589,9 @@ catalog: value: SI-12[01] class: sp800-53a prose: information within the system is managed in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, guidelines, and operational requirements; + links: + - href: '#si-12_smt' + rel: assessment-for - id: si-12_obj-2 name: assessment-objective props: @@ -31755,6 +35599,9 @@ catalog: value: SI-12[02] class: sp800-53a prose: information within the system is retained in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, guidelines, and operational requirements; + links: + - href: '#si-12_smt' + rel: assessment-for - id: si-12_obj-3 name: assessment-objective props: @@ -31762,6 +35609,9 @@ catalog: value: SI-12[03] class: sp800-53a prose: information output from the system is managed in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, guidelines, and operational requirements; + links: + - href: '#si-12_smt' + rel: assessment-for - id: si-12_obj-4 name: assessment-objective props: @@ -31769,6 +35619,12 @@ catalog: value: SI-12[04] class: sp800-53a prose: information output from the system is retained in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, guidelines, and operational requirements. + links: + - href: '#si-12_smt' + rel: assessment-for + links: + - href: '#si-12_smt' + rel: assessment-for - id: si-12_asm-examine name: assessment-method props: @@ -32066,6 +35922,9 @@ catalog: value: SR-01a.[01] class: sp800-53a prose: a supply chain risk management policy is developed and documented; + links: + - href: '#sr-1_smt.a' + rel: assessment-for - id: sr-1_obj.a-2 name: assessment-objective props: @@ -32073,6 +35932,9 @@ catalog: value: SR-01a.[02] class: sp800-53a prose: 'the supply chain risk management policy is disseminated to {{ insert: param, sr-01_odp.01 }};' + links: + - href: '#sr-1_smt.a' + rel: assessment-for - id: sr-1_obj.a-3 name: assessment-objective props: @@ -32080,6 +35942,9 @@ catalog: value: SR-01a.[03] class: sp800-53a prose: supply chain risk management procedures to facilitate the implementation of the supply chain risk management policy and the associated supply chain risk management controls are developed and documented; + links: + - href: '#sr-1_smt.a' + rel: assessment-for - id: sr-1_obj.a-4 name: assessment-objective props: @@ -32087,6 +35952,9 @@ catalog: value: SR-01a.[04] class: sp800-53a prose: 'the supply chain risk management procedures are disseminated to {{ insert: param, sr-01_odp.02 }}.' + links: + - href: '#sr-1_smt.a' + rel: assessment-for - id: sr-1_obj.a.1 name: assessment-objective props: @@ -32108,6 +35976,9 @@ catalog: value: SR-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses purpose;' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-2 name: assessment-objective props: @@ -32115,6 +35986,9 @@ catalog: value: SR-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses scope; ' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-3 name: assessment-objective props: @@ -32122,6 +35996,9 @@ catalog: value: SR-01a.01(a)[03] class: sp800-53a prose: ' {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses roles;' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-4 name: assessment-objective props: @@ -32129,6 +36006,9 @@ catalog: value: SR-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses responsibilities;' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-5 name: assessment-objective props: @@ -32136,6 +36016,9 @@ catalog: value: SR-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses management commitment;' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-6 name: assessment-objective props: @@ -32143,6 +36026,9 @@ catalog: value: SR-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses coordination among organizational entities;' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-7 name: assessment-objective props: @@ -32150,6 +36036,12 @@ catalog: value: SR-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses compliance.' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.b name: assessment-objective props: @@ -32157,6 +36049,15 @@ catalog: value: SR-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#sr-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#sr-1_smt.a.1' + rel: assessment-for + links: + - href: '#sr-1_smt.a' + rel: assessment-for - id: sr-1_obj.b name: assessment-objective props: @@ -32164,6 +36065,9 @@ catalog: value: SR-01b. class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the supply chain risk management policy and procedures;' + links: + - href: '#sr-1_smt.b' + rel: assessment-for - id: sr-1_obj.c name: assessment-objective props: @@ -32185,6 +36089,9 @@ catalog: value: SR-01c.01[01] class: sp800-53a prose: 'the current supply chain risk management policy is reviewed and updated {{ insert: param, sr-01_odp.05 }};' + links: + - href: '#sr-1_smt.c.1' + rel: assessment-for - id: sr-1_obj.c.1-2 name: assessment-objective props: @@ -32192,6 +36099,12 @@ catalog: value: SR-01c.01[02] class: sp800-53a prose: 'the current supply chain risk management policy is reviewed and updated following {{ insert: param, sr-01_odp.06 }};' + links: + - href: '#sr-1_smt.c.1' + rel: assessment-for + links: + - href: '#sr-1_smt.c.1' + rel: assessment-for - id: sr-1_obj.c.2 name: assessment-objective props: @@ -32206,6 +36119,9 @@ catalog: value: SR-01c.02[01] class: sp800-53a prose: 'the current supply chain risk management procedures are reviewed and updated {{ insert: param, sr-01_odp.07 }};' + links: + - href: '#sr-1_smt.c.2' + rel: assessment-for - id: sr-1_obj.c.2-2 name: assessment-objective props: @@ -32213,6 +36129,18 @@ catalog: value: SR-01c.02[02] class: sp800-53a prose: 'the current supply chain risk management procedures are reviewed and updated following {{ insert: param, sr-01_odp.08 }}.' + links: + - href: '#sr-1_smt.c.2' + rel: assessment-for + links: + - href: '#sr-1_smt.c.2' + rel: assessment-for + links: + - href: '#sr-1_smt.c' + rel: assessment-for + links: + - href: '#sr-1_smt' + rel: assessment-for - id: sr-1_asm-examine name: assessment-method props: @@ -32389,6 +36317,9 @@ catalog: value: SR-02a.[01] class: sp800-53a prose: a plan for managing supply chain risks is developed; + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-2 name: assessment-objective props: @@ -32396,6 +36327,9 @@ catalog: value: SR-02a.[02] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the research and development of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-3 name: assessment-objective props: @@ -32403,6 +36337,9 @@ catalog: value: SR-02a.[03] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the design of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-4 name: assessment-objective props: @@ -32410,6 +36347,9 @@ catalog: value: SR-02a.[04] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the manufacturing of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-5 name: assessment-objective props: @@ -32417,6 +36357,9 @@ catalog: value: SR-02a.[05] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the acquisition of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-6 name: assessment-objective props: @@ -32424,6 +36367,9 @@ catalog: value: SR-02a.[06] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the delivery of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-7 name: assessment-objective props: @@ -32431,6 +36377,9 @@ catalog: value: SR-02a.[07] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the integration of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-8 name: assessment-objective props: @@ -32438,6 +36387,9 @@ catalog: value: SR-02a.[08] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the operation and maintenance of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-9 name: assessment-objective props: @@ -32445,6 +36397,12 @@ catalog: value: SR-02a.[09] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the disposal of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.b name: assessment-objective props: @@ -32452,6 +36410,9 @@ catalog: value: SR-02b. class: sp800-53a prose: 'the supply chain risk management plan is reviewed and updated {{ insert: param, sr-02_odp.02 }} or as required to address threat, organizational, or environmental changes;' + links: + - href: '#sr-2_smt.b' + rel: assessment-for - id: sr-2_obj.c name: assessment-objective props: @@ -32466,6 +36427,9 @@ catalog: value: SR-02c.[01] class: sp800-53a prose: the supply chain risk management plan is protected from unauthorized disclosure; + links: + - href: '#sr-2_smt.c' + rel: assessment-for - id: sr-2_obj.c-2 name: assessment-objective props: @@ -32473,6 +36437,15 @@ catalog: value: SR-02c.[02] class: sp800-53a prose: the supply chain risk management plan is protected from unauthorized modification. + links: + - href: '#sr-2_smt.c' + rel: assessment-for + links: + - href: '#sr-2_smt.c' + rel: assessment-for + links: + - href: '#sr-2_smt' + rel: assessment-for - id: sr-2_asm-examine name: assessment-method props: @@ -32619,6 +36592,9 @@ catalog: value: SR-02(01) class: sp800-53a prose: 'a supply chain risk management team consisting of {{ insert: param, sr-02.01_odp.01 }} is established to lead and support {{ insert: param, sr-02.01_odp.02 }}.' + links: + - href: '#sr-2.1_smt' + rel: assessment-for - id: sr-2.1_asm-examine name: assessment-method props: @@ -32852,6 +36828,9 @@ catalog: value: SR-03a.[01] class: sp800-53a prose: 'a process or processes is/are established to identify and address weaknesses or deficiencies in the supply chain elements and processes of {{ insert: param, sr-03_odp.01 }};' + links: + - href: '#sr-3_smt.a' + rel: assessment-for - id: sr-3_obj.a-2 name: assessment-objective props: @@ -32859,6 +36838,12 @@ catalog: value: SR-03a.[02] class: sp800-53a prose: 'the process or processes to identify and address weaknesses or deficiencies in the supply chain elements and processes of {{ insert: param, sr-03_odp.01 }} is/are coordinated with {{ insert: param, sr-03_odp.02 }};' + links: + - href: '#sr-3_smt.a' + rel: assessment-for + links: + - href: '#sr-3_smt.a' + rel: assessment-for - id: sr-3_obj.b name: assessment-objective props: @@ -32866,6 +36851,9 @@ catalog: value: SR-03b. class: sp800-53a prose: ' {{ insert: param, sr-03_odp.03 }} are employed to protect against supply chain risks to the system, system component, or system service and to limit the harm or consequences from supply chain-related events;' + links: + - href: '#sr-3_smt.b' + rel: assessment-for - id: sr-3_obj.c name: assessment-objective props: @@ -32873,6 +36861,12 @@ catalog: value: SR-03c. class: sp800-53a prose: 'the selected and implemented supply chain processes and controls are documented in {{ insert: param, sr-03_odp.04 }}.' + links: + - href: '#sr-3_smt.c' + rel: assessment-for + links: + - href: '#sr-3_smt' + rel: assessment-for - id: sr-3_asm-examine name: assessment-method props: @@ -33042,6 +37036,9 @@ catalog: value: SR-05[01] class: sp800-53a prose: ' {{ insert: param, sr-05_odp }} are employed to protect against supply chain risks;' + links: + - href: '#sr-5_smt' + rel: assessment-for - id: sr-5_obj-2 name: assessment-objective props: @@ -33049,6 +37046,9 @@ catalog: value: SR-05[02] class: sp800-53a prose: ' {{ insert: param, sr-05_odp }} are employed to identify supply chain risks;' + links: + - href: '#sr-5_smt' + rel: assessment-for - id: sr-5_obj-3 name: assessment-objective props: @@ -33056,6 +37056,12 @@ catalog: value: SR-05[03] class: sp800-53a prose: ' {{ insert: param, sr-05_odp }} are employed to mitigate supply chain risks.' + links: + - href: '#sr-5_smt' + rel: assessment-for + links: + - href: '#sr-5_smt' + rel: assessment-for - id: sr-5_asm-examine name: assessment-method props: @@ -33207,6 +37213,9 @@ catalog: value: SR-08 class: sp800-53a prose: 'agreements and procedures are established with entities involved in the supply chain for the system, system components, or system service for {{ insert: param, sr-08_odp.01 }}.' + links: + - href: '#sr-8_smt' + rel: assessment-for - id: sr-8_asm-examine name: assessment-method props: @@ -33363,6 +37372,9 @@ catalog: value: SR-10 class: sp800-53a prose: ' {{ insert: param, sr-10_odp.01 }} are inspected {{ insert: param, sr-10_odp.02 }} to detect tampering.' + links: + - href: '#sr-10_smt' + rel: assessment-for - id: sr-10_asm-examine name: assessment-method props: @@ -33534,6 +37546,9 @@ catalog: value: SR-11a.[01] class: sp800-53a prose: an anti-counterfeit policy is developed and implemented; + links: + - href: '#sr-11_smt.a' + rel: assessment-for - id: sr-11_obj.a-2 name: assessment-objective props: @@ -33541,6 +37556,9 @@ catalog: value: SR-11a.[02] class: sp800-53a prose: anti-counterfeit procedures are developed and implemented; + links: + - href: '#sr-11_smt.a' + rel: assessment-for - id: sr-11_obj.a-3 name: assessment-objective props: @@ -33548,6 +37566,9 @@ catalog: value: SR-11a.[03] class: sp800-53a prose: the anti-counterfeit procedures include the means to detect counterfeit components entering the system; + links: + - href: '#sr-11_smt.a' + rel: assessment-for - id: sr-11_obj.a-4 name: assessment-objective props: @@ -33555,6 +37576,12 @@ catalog: value: SR-11a.[04] class: sp800-53a prose: the anti-counterfeit procedures include the means to prevent counterfeit components from entering the system; + links: + - href: '#sr-11_smt.a' + rel: assessment-for + links: + - href: '#sr-11_smt.a' + rel: assessment-for - id: sr-11_obj.b name: assessment-objective props: @@ -33562,6 +37589,12 @@ catalog: value: SR-11b. class: sp800-53a prose: 'counterfeit system components are reported to {{ insert: param, sr-11_odp.01 }}.' + links: + - href: '#sr-11_smt.b' + rel: assessment-for + links: + - href: '#sr-11_smt' + rel: assessment-for - id: sr-11_asm-examine name: assessment-method props: @@ -33687,6 +37720,9 @@ catalog: value: SR-11(01) class: sp800-53a prose: ' {{ insert: param, sr-11.01_odp }} are trained to detect counterfeit system components (including hardware, software, and firmware).' + links: + - href: '#sr-11.1_smt' + rel: assessment-for - id: sr-11.1_asm-examine name: assessment-method props: @@ -33811,6 +37847,9 @@ catalog: value: SR-11(02)[01] class: sp800-53a prose: 'configuration control over {{ insert: param, sr-11.02_odp }} awaiting service or repair is maintained;' + links: + - href: '#sr-11.2_smt' + rel: assessment-for - id: sr-11.2_obj-2 name: assessment-objective props: @@ -33818,6 +37857,12 @@ catalog: value: SR-11(02)[02] class: sp800-53a prose: 'configuration control over serviced or repaired {{ insert: param, sr-11.02_odp }} awaiting return to service is maintained.' + links: + - href: '#sr-11.2_smt' + rel: assessment-for + links: + - href: '#sr-11.2_smt' + rel: assessment-for - id: sr-11.2_asm-examine name: assessment-method props: @@ -33934,6 +37979,9 @@ catalog: value: SR-12 class: sp800-53a prose: ' {{ insert: param, sr-12_odp.01 }} are disposed of using {{ insert: param, sr-12_odp.02 }}.' + links: + - href: '#sr-12_smt' + rel: assessment-for - id: sr-12_asm-examine name: assessment-method props: diff --git a/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_LOW-baseline_profile.yaml b/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_LOW-baseline_profile.yaml index 3a0eb947..0019fc14 100644 --- a/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_LOW-baseline_profile.yaml +++ b/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_LOW-baseline_profile.yaml @@ -1,9 +1,9 @@ profile: - uuid: 8742196d-86ba-4e72-a411-28867dab43bb + uuid: b648ca9e-da6d-4159-b28d-f2df9a044137 metadata: - title: NIST Special Publication 800-53 Revision 5 LOW IMPACT BASELINE - last-modified: "2023-10-12T00:00:00.000000-04:00" - version: Final + title: NIST Special Publication 800-53 Revision 5.1.1 LOW IMPACT BASELINE + last-modified: "2023-12-04T14:55:00.000000-04:00" + version: 5.1.1+u2 oscal-version: 1.1.1 roles: - id: creator diff --git a/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_MODERATE-baseline-resolved-profile_catalog.yaml b/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_MODERATE-baseline-resolved-profile_catalog.yaml index 40240208..9751921a 100644 --- a/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_MODERATE-baseline-resolved-profile_catalog.yaml +++ b/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_MODERATE-baseline-resolved-profile_catalog.yaml @@ -1,9 +1,9 @@ catalog: - uuid: 64dd932d-a3d3-4369-8fa3-09c7b202e580 + uuid: 6ce800da-ce21-48b7-8da4-715337b033e6 metadata: - title: NIST Special Publication 800-53 Revision 5 MODERATE IMPACT BASELINE - last-modified: "2023-11-02T11:49:44.380433-04:00" - version: Final + title: NIST Special Publication 800-53 Revision 5.1.1 MODERATE IMPACT BASELINE + last-modified: "2023-12-05T21:54:58.514658Z" + version: 5.1.1+u2 oscal-version: 1.1.1 props: - name: resolution-tool @@ -257,6 +257,9 @@ catalog: value: AC-01a.[01] class: sp800-53a prose: an access control policy is developed and documented; + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.a-2 name: assessment-objective props: @@ -264,6 +267,9 @@ catalog: value: AC-01a.[02] class: sp800-53a prose: 'the access control policy is disseminated to {{ insert: param, ac-01_odp.01 }};' + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.a-3 name: assessment-objective props: @@ -271,6 +277,9 @@ catalog: value: AC-01a.[03] class: sp800-53a prose: access control procedures to facilitate the implementation of the access control policy and associated controls are developed and documented; + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.a-4 name: assessment-objective props: @@ -278,6 +287,9 @@ catalog: value: AC-01a.[04] class: sp800-53a prose: 'the access control procedures are disseminated to {{ insert: param, ac-01_odp.02 }};' + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.a.1 name: assessment-objective props: @@ -299,6 +311,9 @@ catalog: value: AC-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses purpose;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-2 name: assessment-objective props: @@ -306,6 +321,9 @@ catalog: value: AC-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses scope;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-3 name: assessment-objective props: @@ -313,6 +331,9 @@ catalog: value: AC-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses roles;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-4 name: assessment-objective props: @@ -320,6 +341,9 @@ catalog: value: AC-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses responsibilities;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-5 name: assessment-objective props: @@ -327,6 +351,9 @@ catalog: value: AC-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses management commitment;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-6 name: assessment-objective props: @@ -334,6 +361,9 @@ catalog: value: AC-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses coordination among organizational entities;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-7 name: assessment-objective props: @@ -341,6 +371,12 @@ catalog: value: AC-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses compliance;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.b name: assessment-objective props: @@ -348,6 +384,15 @@ catalog: value: AC-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ac-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ac-1_smt.a.1' + rel: assessment-for + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.b name: assessment-objective props: @@ -355,6 +400,9 @@ catalog: value: AC-01b. class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the access control policy and procedures;' + links: + - href: '#ac-1_smt.b' + rel: assessment-for - id: ac-1_obj.c name: assessment-objective props: @@ -376,6 +424,9 @@ catalog: value: AC-01c.01[01] class: sp800-53a prose: 'the current access control policy is reviewed and updated {{ insert: param, ac-01_odp.05 }};' + links: + - href: '#ac-1_smt.c.1' + rel: assessment-for - id: ac-1_obj.c.1-2 name: assessment-objective props: @@ -383,6 +434,12 @@ catalog: value: AC-01c.01[02] class: sp800-53a prose: 'the current access control policy is reviewed and updated following {{ insert: param, ac-01_odp.06 }};' + links: + - href: '#ac-1_smt.c.1' + rel: assessment-for + links: + - href: '#ac-1_smt.c.1' + rel: assessment-for - id: ac-1_obj.c.2 name: assessment-objective props: @@ -397,6 +454,9 @@ catalog: value: AC-01c.02[01] class: sp800-53a prose: 'the current access control procedures are reviewed and updated {{ insert: param, ac-01_odp.07 }};' + links: + - href: '#ac-1_smt.c.2' + rel: assessment-for - id: ac-1_obj.c.2-2 name: assessment-objective props: @@ -404,6 +464,18 @@ catalog: value: AC-01c.02[02] class: sp800-53a prose: 'the current access control procedures are reviewed and updated following {{ insert: param, ac-01_odp.08 }}.' + links: + - href: '#ac-1_smt.c.2' + rel: assessment-for + links: + - href: '#ac-1_smt.c.2' + rel: assessment-for + links: + - href: '#ac-1_smt.c' + rel: assessment-for + links: + - href: '#ac-1_smt' + rel: assessment-for - id: ac-1_asm-examine name: assessment-method props: @@ -778,6 +850,9 @@ catalog: value: AC-02a.[01] class: sp800-53a prose: account types allowed for use within the system are defined and documented; + links: + - href: '#ac-2_smt.a' + rel: assessment-for - id: ac-2_obj.a-2 name: assessment-objective props: @@ -785,6 +860,12 @@ catalog: value: AC-02a.[02] class: sp800-53a prose: account types specifically prohibited for use within the system are defined and documented; + links: + - href: '#ac-2_smt.a' + rel: assessment-for + links: + - href: '#ac-2_smt.a' + rel: assessment-for - id: ac-2_obj.b name: assessment-objective props: @@ -792,6 +873,9 @@ catalog: value: AC-02b. class: sp800-53a prose: account managers are assigned; + links: + - href: '#ac-2_smt.b' + rel: assessment-for - id: ac-2_obj.c name: assessment-objective props: @@ -799,6 +883,9 @@ catalog: value: AC-02c. class: sp800-53a prose: ' {{ insert: param, ac-02_odp.01 }} for group and role membership are required;' + links: + - href: '#ac-2_smt.c' + rel: assessment-for - id: ac-2_obj.d name: assessment-objective props: @@ -813,6 +900,9 @@ catalog: value: AC-02d.01 class: sp800-53a prose: authorized users of the system are specified; + links: + - href: '#ac-2_smt.d.1' + rel: assessment-for - id: ac-2_obj.d.2 name: assessment-objective props: @@ -820,6 +910,9 @@ catalog: value: AC-02d.02 class: sp800-53a prose: group and role membership are specified; + links: + - href: '#ac-2_smt.d.2' + rel: assessment-for - id: ac-2_obj.d.3 name: assessment-objective props: @@ -834,6 +927,9 @@ catalog: value: AC-02d.03[01] class: sp800-53a prose: access authorizations (i.e., privileges) are specified for each account; + links: + - href: '#ac-2_smt.d.3' + rel: assessment-for - id: ac-2_obj.d.3-2 name: assessment-objective props: @@ -841,6 +937,15 @@ catalog: value: AC-02d.03[02] class: sp800-53a prose: ' {{ insert: param, ac-02_odp.02 }} are specified for each account;' + links: + - href: '#ac-2_smt.d.3' + rel: assessment-for + links: + - href: '#ac-2_smt.d.3' + rel: assessment-for + links: + - href: '#ac-2_smt.d' + rel: assessment-for - id: ac-2_obj.e name: assessment-objective props: @@ -848,6 +953,9 @@ catalog: value: AC-02e. class: sp800-53a prose: 'approvals are required by {{ insert: param, ac-02_odp.03 }} for requests to create accounts;' + links: + - href: '#ac-2_smt.e' + rel: assessment-for - id: ac-2_obj.f name: assessment-objective props: @@ -862,6 +970,9 @@ catalog: value: AC-02f.[01] class: sp800-53a prose: 'accounts are created in accordance with {{ insert: param, ac-02_odp.04 }};' + links: + - href: '#ac-2_smt.f' + rel: assessment-for - id: ac-2_obj.f-2 name: assessment-objective props: @@ -869,6 +980,9 @@ catalog: value: AC-02f.[02] class: sp800-53a prose: 'accounts are enabled in accordance with {{ insert: param, ac-02_odp.04 }};' + links: + - href: '#ac-2_smt.f' + rel: assessment-for - id: ac-2_obj.f-3 name: assessment-objective props: @@ -876,6 +990,9 @@ catalog: value: AC-02f.[03] class: sp800-53a prose: 'accounts are modified in accordance with {{ insert: param, ac-02_odp.04 }};' + links: + - href: '#ac-2_smt.f' + rel: assessment-for - id: ac-2_obj.f-4 name: assessment-objective props: @@ -883,6 +1000,9 @@ catalog: value: AC-02f.[04] class: sp800-53a prose: 'accounts are disabled in accordance with {{ insert: param, ac-02_odp.04 }};' + links: + - href: '#ac-2_smt.f' + rel: assessment-for - id: ac-2_obj.f-5 name: assessment-objective props: @@ -890,6 +1010,12 @@ catalog: value: AC-02f.[05] class: sp800-53a prose: 'accounts are removed in accordance with {{ insert: param, ac-02_odp.04 }};' + links: + - href: '#ac-2_smt.f' + rel: assessment-for + links: + - href: '#ac-2_smt.f' + rel: assessment-for - id: ac-2_obj.g name: assessment-objective props: @@ -897,6 +1023,9 @@ catalog: value: AC-02g. class: sp800-53a prose: 'the use of accounts is monitored; ' + links: + - href: '#ac-2_smt.g' + rel: assessment-for - id: ac-2_obj.h name: assessment-objective props: @@ -911,6 +1040,9 @@ catalog: value: AC-02h.01 class: sp800-53a prose: 'account managers and {{ insert: param, ac-02_odp.05 }} are notified within {{ insert: param, ac-02_odp.06 }} when accounts are no longer required;' + links: + - href: '#ac-2_smt.h.1' + rel: assessment-for - id: ac-2_obj.h.2 name: assessment-objective props: @@ -918,6 +1050,9 @@ catalog: value: AC-02h.02 class: sp800-53a prose: 'account managers and {{ insert: param, ac-02_odp.05 }} are notified within {{ insert: param, ac-02_odp.07 }} when users are terminated or transferred;' + links: + - href: '#ac-2_smt.h.2' + rel: assessment-for - id: ac-2_obj.h.3 name: assessment-objective props: @@ -925,6 +1060,12 @@ catalog: value: AC-02h.03 class: sp800-53a prose: 'account managers and {{ insert: param, ac-02_odp.05 }} are notified within {{ insert: param, ac-02_odp.08 }} when system usage or the need to know changes for an individual;' + links: + - href: '#ac-2_smt.h.3' + rel: assessment-for + links: + - href: '#ac-2_smt.h' + rel: assessment-for - id: ac-2_obj.i name: assessment-objective props: @@ -939,6 +1080,9 @@ catalog: value: AC-02i.01 class: sp800-53a prose: access to the system is authorized based on a valid access authorization; + links: + - href: '#ac-2_smt.i.1' + rel: assessment-for - id: ac-2_obj.i.2 name: assessment-objective props: @@ -946,6 +1090,9 @@ catalog: value: AC-02i.02 class: sp800-53a prose: access to the system is authorized based on intended system usage; + links: + - href: '#ac-2_smt.i.2' + rel: assessment-for - id: ac-2_obj.i.3 name: assessment-objective props: @@ -953,6 +1100,12 @@ catalog: value: AC-02i.03 class: sp800-53a prose: 'access to the system is authorized based on {{ insert: param, ac-02_odp.09 }};' + links: + - href: '#ac-2_smt.i.3' + rel: assessment-for + links: + - href: '#ac-2_smt.i' + rel: assessment-for - id: ac-2_obj.j name: assessment-objective props: @@ -960,6 +1113,9 @@ catalog: value: AC-02j. class: sp800-53a prose: 'accounts are reviewed for compliance with account management requirements {{ insert: param, ac-02_odp.10 }};' + links: + - href: '#ac-2_smt.j' + rel: assessment-for - id: ac-2_obj.k name: assessment-objective props: @@ -974,6 +1130,9 @@ catalog: value: AC-02k.[01] class: sp800-53a prose: a process is established for changing shared or group account authenticators (if deployed) when individuals are removed from the group; + links: + - href: '#ac-2_smt.k' + rel: assessment-for - id: ac-2_obj.k-2 name: assessment-objective props: @@ -981,6 +1140,12 @@ catalog: value: AC-02k.[02] class: sp800-53a prose: a process is implemented for changing shared or group account authenticators (if deployed) when individuals are removed from the group; + links: + - href: '#ac-2_smt.k' + rel: assessment-for + links: + - href: '#ac-2_smt.k' + rel: assessment-for - id: ac-2_obj.l name: assessment-objective props: @@ -995,6 +1160,9 @@ catalog: value: AC-02l.[01] class: sp800-53a prose: account management processes are aligned with personnel termination processes; + links: + - href: '#ac-2_smt.l' + rel: assessment-for - id: ac-2_obj.l-2 name: assessment-objective props: @@ -1002,6 +1170,15 @@ catalog: value: AC-02l.[02] class: sp800-53a prose: account management processes are aligned with personnel transfer processes. + links: + - href: '#ac-2_smt.l' + rel: assessment-for + links: + - href: '#ac-2_smt.l' + rel: assessment-for + links: + - href: '#ac-2_smt' + rel: assessment-for - id: ac-2_asm-examine name: assessment-method props: @@ -1122,6 +1299,9 @@ catalog: value: AC-02(01) class: sp800-53a prose: 'the management of system accounts is supported using {{ insert: param, ac-02.01_odp }}.' + links: + - href: '#ac-2.1_smt' + rel: assessment-for - id: ac-2.1_asm-examine name: assessment-method props: @@ -1234,6 +1414,9 @@ catalog: value: AC-02(02) class: sp800-53a prose: 'temporary and emergency accounts are automatically {{ insert: param, ac-02.02_odp.01 }} after {{ insert: param, ac-02.02_odp.02 }}.' + links: + - href: '#ac-2.2_smt' + rel: assessment-for - id: ac-2.2_asm-examine name: assessment-method props: @@ -1378,6 +1561,9 @@ catalog: value: AC-02(03)(a) class: sp800-53a prose: 'accounts are disabled within {{ insert: param, ac-02.03_odp.01 }} when the accounts have expired;' + links: + - href: '#ac-2.3_smt.a' + rel: assessment-for - id: ac-2.3_obj.b name: assessment-objective props: @@ -1385,6 +1571,9 @@ catalog: value: AC-02(03)(b) class: sp800-53a prose: 'accounts are disabled within {{ insert: param, ac-02.03_odp.01 }} when the accounts are no longer associated with a user or individual;' + links: + - href: '#ac-2.3_smt.b' + rel: assessment-for - id: ac-2.3_obj.c name: assessment-objective props: @@ -1392,6 +1581,9 @@ catalog: value: AC-02(03)(c) class: sp800-53a prose: 'accounts are disabled within {{ insert: param, ac-02.03_odp.01 }} when the accounts are in violation of organizational policy;' + links: + - href: '#ac-2.3_smt.c' + rel: assessment-for - id: ac-2.3_obj.d name: assessment-objective props: @@ -1399,6 +1591,12 @@ catalog: value: AC-02(03)(d) class: sp800-53a prose: 'accounts are disabled within {{ insert: param, ac-02.03_odp.01 }} when the accounts have been inactive for {{ insert: param, ac-02.03_odp.02 }}.' + links: + - href: '#ac-2.3_smt.d' + rel: assessment-for + links: + - href: '#ac-2.3_smt' + rel: assessment-for - id: ac-2.3_asm-examine name: assessment-method props: @@ -1503,6 +1701,9 @@ catalog: value: AC-02(04)[01] class: sp800-53a prose: account creation is automatically audited; + links: + - href: '#ac-2.4_smt' + rel: assessment-for - id: ac-2.4_obj-2 name: assessment-objective props: @@ -1510,6 +1711,9 @@ catalog: value: AC-02(04)[02] class: sp800-53a prose: account modification is automatically audited; + links: + - href: '#ac-2.4_smt' + rel: assessment-for - id: ac-2.4_obj-3 name: assessment-objective props: @@ -1517,6 +1721,9 @@ catalog: value: AC-02(04)[03] class: sp800-53a prose: account enabling is automatically audited; + links: + - href: '#ac-2.4_smt' + rel: assessment-for - id: ac-2.4_obj-4 name: assessment-objective props: @@ -1524,6 +1731,9 @@ catalog: value: AC-02(04)[04] class: sp800-53a prose: account disabling is automatically audited; + links: + - href: '#ac-2.4_smt' + rel: assessment-for - id: ac-2.4_obj-5 name: assessment-objective props: @@ -1531,6 +1741,12 @@ catalog: value: AC-02(04)[05] class: sp800-53a prose: account removal actions are automatically audited. + links: + - href: '#ac-2.4_smt' + rel: assessment-for + links: + - href: '#ac-2.4_smt' + rel: assessment-for - id: ac-2.4_asm-examine name: assessment-method props: @@ -1634,6 +1850,9 @@ catalog: value: AC-02(05) class: sp800-53a prose: 'users are required to log out when {{ insert: param, ac-02.05_odp }}.' + links: + - href: '#ac-2.5_smt' + rel: assessment-for - id: ac-2.5_asm-examine name: assessment-method props: @@ -1736,6 +1955,9 @@ catalog: value: AC-02(13) class: sp800-53a prose: 'accounts of individuals are disabled within {{ insert: param, ac-02.13_odp.01 }} of discovery of {{ insert: param, ac-02.13_odp.02 }}.' + links: + - href: '#ac-2.13_smt' + rel: assessment-for - id: ac-2.13_asm-examine name: assessment-method props: @@ -1873,6 +2095,8 @@ catalog: rel: related - href: '#ia-11' rel: related + - href: '#ia-13' + rel: related - href: '#ma-3' rel: related - href: '#ma-4' @@ -1925,6 +2149,9 @@ catalog: value: AC-03 class: sp800-53a prose: approved authorizations for logical access to information and system resources are enforced in accordance with applicable access control policies. + links: + - href: '#ac-3_smt' + rel: assessment-for - id: ac-3_asm-examine name: assessment-method props: @@ -2070,6 +2297,9 @@ catalog: value: AC-04 class: sp800-53a prose: 'approved authorizations are enforced for controlling the flow of information within the system and between connected systems based on {{ insert: param, ac-04_odp }}.' + links: + - href: '#ac-4_smt' + rel: assessment-for - id: ac-4_asm-examine name: assessment-method props: @@ -2232,6 +2462,9 @@ catalog: value: AC-05a. class: sp800-53a prose: ' {{ insert: param, ac-05_odp }} are identified and documented;' + links: + - href: '#ac-5_smt.a' + rel: assessment-for - id: ac-5_obj.b name: assessment-objective props: @@ -2239,6 +2472,12 @@ catalog: value: AC-05b. class: sp800-53a prose: system access authorizations to support separation of duties are defined. + links: + - href: '#ac-5_smt.b' + rel: assessment-for + links: + - href: '#ac-5_smt' + rel: assessment-for - id: ac-5_asm-examine name: assessment-method props: @@ -2348,6 +2587,9 @@ catalog: value: AC-06 class: sp800-53a prose: the principle of least privilege is employed, allowing only authorized accesses for users (or processes acting on behalf of users) that are necessary to accomplish assigned organizational tasks. + links: + - href: '#ac-6_smt' + rel: assessment-for - id: ac-6_asm-examine name: assessment-method props: @@ -2531,6 +2773,9 @@ catalog: value: AC-06(01)(a)[01] class: sp800-53a prose: 'access is authorized for {{ insert: param, ac-06.01_odp.01 }} to {{ insert: param, ac-06.01_odp.02 }};' + links: + - href: '#ac-6.1_smt.a' + rel: assessment-for - id: ac-6.1_obj.a-2 name: assessment-objective props: @@ -2538,6 +2783,9 @@ catalog: value: AC-06(01)(a)[02] class: sp800-53a prose: 'access is authorized for {{ insert: param, ac-06.01_odp.01 }} to {{ insert: param, ac-06.01_odp.03 }};' + links: + - href: '#ac-6.1_smt.a' + rel: assessment-for - id: ac-6.1_obj.a-3 name: assessment-objective props: @@ -2545,6 +2793,12 @@ catalog: value: AC-06(01)(a)[03] class: sp800-53a prose: 'access is authorized for {{ insert: param, ac-06.01_odp.01 }} to {{ insert: param, ac-06.01_odp.04 }};' + links: + - href: '#ac-6.1_smt.a' + rel: assessment-for + links: + - href: '#ac-6.1_smt.a' + rel: assessment-for - id: ac-6.1_obj.b name: assessment-objective props: @@ -2552,6 +2806,12 @@ catalog: value: AC-06(01)(b) class: sp800-53a prose: 'access is authorized for {{ insert: param, ac-06.01_odp.01 }} to {{ insert: param, ac-06.01_odp.05 }}.' + links: + - href: '#ac-6.1_smt.b' + rel: assessment-for + links: + - href: '#ac-6.1_smt' + rel: assessment-for - id: ac-6.1_asm-examine name: assessment-method props: @@ -2656,6 +2916,9 @@ catalog: value: AC-06(02) class: sp800-53a prose: 'users of system accounts (or roles) with access to {{ insert: param, ac-06.02_odp }} are required to use non-privileged accounts or roles when accessing non-security functions.' + links: + - href: '#ac-6.2_smt' + rel: assessment-for - id: ac-6.2_asm-examine name: assessment-method props: @@ -2758,6 +3021,9 @@ catalog: value: AC-06(05) class: sp800-53a prose: 'privileged accounts on the system are restricted to {{ insert: param, ac-06.05_odp }}.' + links: + - href: '#ac-6.5_smt' + rel: assessment-for - id: ac-6.5_asm-examine name: assessment-method props: @@ -2890,6 +3156,9 @@ catalog: value: AC-06(07)(a) class: sp800-53a prose: 'privileges assigned to {{ insert: param, ac-06.07_odp.02 }} are reviewed {{ insert: param, ac-06.07_odp.01 }} to validate the need for such privileges;' + links: + - href: '#ac-6.7_smt.a' + rel: assessment-for - id: ac-6.7_obj.b name: assessment-objective props: @@ -2897,6 +3166,12 @@ catalog: value: AC-06(07)(b) class: sp800-53a prose: privileges are reassigned or removed, if necessary, to correctly reflect organizational mission and business needs. + links: + - href: '#ac-6.7_smt.b' + rel: assessment-for + links: + - href: '#ac-6.7_smt' + rel: assessment-for - id: ac-6.7_asm-examine name: assessment-method props: @@ -2994,6 +3269,9 @@ catalog: value: AC-06(09) class: sp800-53a prose: the execution of privileged functions is logged. + links: + - href: '#ac-6.9_smt' + rel: assessment-for - id: ac-6.9_asm-examine name: assessment-method props: @@ -3085,6 +3363,9 @@ catalog: value: AC-06(10) class: sp800-53a prose: non-privileged users are prevented from executing privileged functions. + links: + - href: '#ac-6.10_smt' + rel: assessment-for - id: ac-6.10_asm-examine name: assessment-method props: @@ -3269,6 +3550,9 @@ catalog: value: AC-07a. class: sp800-53a prose: 'a limit of {{ insert: param, ac-07_odp.01 }} consecutive invalid logon attempts by a user during {{ insert: param, ac-07_odp.02 }} is enforced;' + links: + - href: '#ac-7_smt.a' + rel: assessment-for - id: ac-7_obj.b name: assessment-objective props: @@ -3276,6 +3560,12 @@ catalog: value: AC-07b. class: sp800-53a prose: 'automatically {{ insert: param, ac-07_odp.03 }} when the maximum number of unsuccessful attempts is exceeded.' + links: + - href: '#ac-7_smt.b' + rel: assessment-for + links: + - href: '#ac-7_smt' + rel: assessment-for - id: ac-7_asm-examine name: assessment-method props: @@ -3469,6 +3759,9 @@ catalog: value: AC-08a.01 class: sp800-53a prose: the system use notification states that users are accessing a U.S. Government system; + links: + - href: '#ac-8_smt.a.1' + rel: assessment-for - id: ac-8_obj.a.2 name: assessment-objective props: @@ -3476,6 +3769,9 @@ catalog: value: AC-08a.02 class: sp800-53a prose: the system use notification states that system usage may be monitored, recorded, and subject to audit; + links: + - href: '#ac-8_smt.a.2' + rel: assessment-for - id: ac-8_obj.a.3 name: assessment-objective props: @@ -3483,6 +3779,9 @@ catalog: value: AC-08a.03 class: sp800-53a prose: the system use notification states that unauthorized use of the system is prohibited and subject to criminal and civil penalties; and + links: + - href: '#ac-8_smt.a.3' + rel: assessment-for - id: ac-8_obj.a.4 name: assessment-objective props: @@ -3490,6 +3789,12 @@ catalog: value: AC-08a.04 class: sp800-53a prose: the system use notification states that use of the system indicates consent to monitoring and recording; + links: + - href: '#ac-8_smt.a.4' + rel: assessment-for + links: + - href: '#ac-8_smt.a' + rel: assessment-for - id: ac-8_obj.b name: assessment-objective props: @@ -3497,6 +3802,9 @@ catalog: value: AC-08b. class: sp800-53a prose: the notification message or banner is retained on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the system; + links: + - href: '#ac-8_smt.b' + rel: assessment-for - id: ac-8_obj.c name: assessment-objective props: @@ -3511,6 +3819,9 @@ catalog: value: AC-08c.01 class: sp800-53a prose: 'for publicly accessible systems, system use information {{ insert: param, ac-08_odp.02 }} is displayed before granting further access to the publicly accessible system;' + links: + - href: '#ac-8_smt.c.1' + rel: assessment-for - id: ac-8_obj.c.2 name: assessment-objective props: @@ -3518,6 +3829,9 @@ catalog: value: AC-08c.02 class: sp800-53a prose: for publicly accessible systems, any references to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities are displayed; + links: + - href: '#ac-8_smt.c.2' + rel: assessment-for - id: ac-8_obj.c.3 name: assessment-objective props: @@ -3525,6 +3839,15 @@ catalog: value: AC-08c.03 class: sp800-53a prose: for publicly accessible systems, a description of the authorized uses of the system is included. + links: + - href: '#ac-8_smt.c.3' + rel: assessment-for + links: + - href: '#ac-8_smt.c' + rel: assessment-for + links: + - href: '#ac-8_smt' + rel: assessment-for - id: ac-8_asm-examine name: assessment-method props: @@ -3672,6 +3995,9 @@ catalog: value: AC-11a. class: sp800-53a prose: 'further access to the system is prevented by {{ insert: param, ac-11_odp.01 }};' + links: + - href: '#ac-11_smt.a' + rel: assessment-for - id: ac-11_obj.b name: assessment-objective props: @@ -3679,6 +4005,12 @@ catalog: value: AC-11b. class: sp800-53a prose: device lock is retained until the user re-establishes access using established identification and authentication procedures. + links: + - href: '#ac-11_smt.b' + rel: assessment-for + links: + - href: '#ac-11_smt' + rel: assessment-for - id: ac-11_asm-examine name: assessment-method props: @@ -3767,6 +4099,9 @@ catalog: value: AC-11(01) class: sp800-53a prose: information previously visible on the display is concealed, via device lock, with a publicly viewable image. + links: + - href: '#ac-11.1_smt' + rel: assessment-for - id: ac-11.1_asm-examine name: assessment-method props: @@ -3870,6 +4205,9 @@ catalog: value: AC-12 class: sp800-53a prose: 'a user session is automatically terminated after {{ insert: param, ac-12_odp }}.' + links: + - href: '#ac-12_smt' + rel: assessment-for - id: ac-12_asm-examine name: assessment-method props: @@ -3991,6 +4329,9 @@ catalog: value: AC-14a. class: sp800-53a prose: ' {{ insert: param, ac-14_odp }} that can be performed on the system without identification or authentication consistent with organizational mission and business functions are identified;' + links: + - href: '#ac-14_smt.a' + rel: assessment-for - id: ac-14_obj.b name: assessment-objective props: @@ -4005,6 +4346,9 @@ catalog: value: AC-14b.[01] class: sp800-53a prose: user actions not requiring identification or authentication are documented in the security plan for the system; + links: + - href: '#ac-14_smt.b' + rel: assessment-for - id: ac-14_obj.b-2 name: assessment-objective props: @@ -4012,6 +4356,15 @@ catalog: value: AC-14b.[02] class: sp800-53a prose: a rationale for user actions not requiring identification or authentication is provided in the security plan for the system. + links: + - href: '#ac-14_smt.b' + rel: assessment-for + links: + - href: '#ac-14_smt.b' + rel: assessment-for + links: + - href: '#ac-14_smt' + rel: assessment-for - id: ac-14_asm-examine name: assessment-method props: @@ -4159,6 +4512,9 @@ catalog: value: AC-17a.[01] class: sp800-53a prose: usage restrictions are established and documented for each type of remote access allowed; + links: + - href: '#ac-17_smt.a' + rel: assessment-for - id: ac-17_obj.a-2 name: assessment-objective props: @@ -4166,6 +4522,9 @@ catalog: value: AC-17a.[02] class: sp800-53a prose: configuration/connection requirements are established and documented for each type of remote access allowed; + links: + - href: '#ac-17_smt.a' + rel: assessment-for - id: ac-17_obj.a-3 name: assessment-objective props: @@ -4173,6 +4532,12 @@ catalog: value: AC-17a.[03] class: sp800-53a prose: implementation guidance is established and documented for each type of remote access allowed; + links: + - href: '#ac-17_smt.a' + rel: assessment-for + links: + - href: '#ac-17_smt.a' + rel: assessment-for - id: ac-17_obj.b name: assessment-objective props: @@ -4180,6 +4545,12 @@ catalog: value: AC-17b. class: sp800-53a prose: each type of remote access to the system is authorized prior to allowing such connections. + links: + - href: '#ac-17_smt.b' + rel: assessment-for + links: + - href: '#ac-17_smt' + rel: assessment-for - id: ac-17_asm-examine name: assessment-method props: @@ -4286,6 +4657,9 @@ catalog: value: AC-17(01)[01] class: sp800-53a prose: automated mechanisms are employed to monitor remote access methods; + links: + - href: '#ac-17.1_smt' + rel: assessment-for - id: ac-17.1_obj-2 name: assessment-objective props: @@ -4293,6 +4667,12 @@ catalog: value: AC-17(01)[02] class: sp800-53a prose: automated mechanisms are employed to control remote access methods. + links: + - href: '#ac-17.1_smt' + rel: assessment-for + links: + - href: '#ac-17.1_smt' + rel: assessment-for - id: ac-17.1_asm-examine name: assessment-method props: @@ -4386,6 +4766,9 @@ catalog: value: AC-17(02) class: sp800-53a prose: cryptographic mechanisms are implemented to protect the confidentiality and integrity of remote access sessions. + links: + - href: '#ac-17.2_smt' + rel: assessment-for - id: ac-17.2_asm-examine name: assessment-method props: @@ -4475,6 +4858,9 @@ catalog: value: AC-17(03) class: sp800-53a prose: remote accesses are routed through authorized and managed network access control points. + links: + - href: '#ac-17.3_smt' + rel: assessment-for - id: ac-17.3_asm-examine name: assessment-method props: @@ -4618,6 +5004,9 @@ catalog: value: AC-17(04)(a)[01] class: sp800-53a prose: the execution of privileged commands via remote access is authorized only in a format that provides assessable evidence; + links: + - href: '#ac-17.4_smt.a' + rel: assessment-for - id: ac-17.4_obj.a-2 name: assessment-objective props: @@ -4625,6 +5014,9 @@ catalog: value: AC-17(04)(a)[02] class: sp800-53a prose: access to security-relevant information via remote access is authorized only in a format that provides assessable evidence; + links: + - href: '#ac-17.4_smt.a' + rel: assessment-for - id: ac-17.4_obj.a-3 name: assessment-objective props: @@ -4632,6 +5024,9 @@ catalog: value: AC-17(04)(a)[03] class: sp800-53a prose: 'the execution of privileged commands via remote access is authorized only for the following needs: {{ insert: param, ac-17.04_odp.01 }};' + links: + - href: '#ac-17.4_smt.a' + rel: assessment-for - id: ac-17.4_obj.a-4 name: assessment-objective props: @@ -4639,6 +5034,12 @@ catalog: value: AC-17(04)(a)[04] class: sp800-53a prose: 'access to security-relevant information via remote access is authorized only for the following needs: {{ insert: param, ac-17.04_odp.02 }};' + links: + - href: '#ac-17.4_smt.a' + rel: assessment-for + links: + - href: '#ac-17.4_smt.a' + rel: assessment-for - id: ac-17.4_obj.b name: assessment-objective props: @@ -4646,6 +5047,12 @@ catalog: value: AC-17(04)(b) class: sp800-53a prose: the rationale for remote access is documented in the security plan for the system. + links: + - href: '#ac-17.4_smt.b' + rel: assessment-for + links: + - href: '#ac-17.4_smt' + rel: assessment-for - id: ac-17.4_asm-examine name: assessment-method props: @@ -4783,6 +5190,9 @@ catalog: value: AC-18a.[01] class: sp800-53a prose: configuration requirements are established for each type of wireless access; + links: + - href: '#ac-18_smt.a' + rel: assessment-for - id: ac-18_obj.a-2 name: assessment-objective props: @@ -4790,6 +5200,9 @@ catalog: value: AC-18a.[02] class: sp800-53a prose: connection requirements are established for each type of wireless access; + links: + - href: '#ac-18_smt.a' + rel: assessment-for - id: ac-18_obj.a-3 name: assessment-objective props: @@ -4797,6 +5210,12 @@ catalog: value: AC-18a.[03] class: sp800-53a prose: implementation guidance is established for each type of wireless access; + links: + - href: '#ac-18_smt.a' + rel: assessment-for + links: + - href: '#ac-18_smt.a' + rel: assessment-for - id: ac-18_obj.b name: assessment-objective props: @@ -4804,6 +5223,12 @@ catalog: value: AC-18b. class: sp800-53a prose: each type of wireless access to the system is authorized prior to allowing such connections. + links: + - href: '#ac-18_smt.b' + rel: assessment-for + links: + - href: '#ac-18_smt' + rel: assessment-for - id: ac-18_asm-examine name: assessment-method props: @@ -4918,6 +5343,9 @@ catalog: value: AC-18(01)[01] class: sp800-53a prose: 'wireless access to the system is protected using authentication of {{ insert: param, ac-18.01_odp }};' + links: + - href: '#ac-18.1_smt' + rel: assessment-for - id: ac-18.1_obj-2 name: assessment-objective props: @@ -4925,6 +5353,12 @@ catalog: value: AC-18(01)[02] class: sp800-53a prose: wireless access to the system is protected using encryption. + links: + - href: '#ac-18.1_smt' + rel: assessment-for + links: + - href: '#ac-18.1_smt' + rel: assessment-for - id: ac-18.1_asm-examine name: assessment-method props: @@ -5013,6 +5447,9 @@ catalog: value: AC-18(03) class: sp800-53a prose: when not intended for use, wireless networking capabilities embedded within system components are disabled prior to issuance and deployment. + links: + - href: '#ac-18.3_smt' + rel: assessment-for - id: ac-18.3_asm-examine name: assessment-method props: @@ -5173,6 +5610,9 @@ catalog: value: AC-19a.[01] class: sp800-53a prose: configuration requirements are established for organization-controlled mobile devices, including when such devices are outside of the controlled area; + links: + - href: '#ac-19_smt.a' + rel: assessment-for - id: ac-19_obj.a-2 name: assessment-objective props: @@ -5180,6 +5620,9 @@ catalog: value: AC-19a.[02] class: sp800-53a prose: connection requirements are established for organization-controlled mobile devices, including when such devices are outside of the controlled area; + links: + - href: '#ac-19_smt.a' + rel: assessment-for - id: ac-19_obj.a-3 name: assessment-objective props: @@ -5187,6 +5630,12 @@ catalog: value: AC-19a.[03] class: sp800-53a prose: implementation guidance is established for organization-controlled mobile devices, including when such devices are outside of the controlled area; + links: + - href: '#ac-19_smt.a' + rel: assessment-for + links: + - href: '#ac-19_smt.a' + rel: assessment-for - id: ac-19_obj.b name: assessment-objective props: @@ -5194,6 +5643,12 @@ catalog: value: AC-19b. class: sp800-53a prose: the connection of mobile devices to organizational systems is authorized. + links: + - href: '#ac-19_smt.b' + rel: assessment-for + links: + - href: '#ac-19_smt' + rel: assessment-for - id: ac-19_asm-examine name: assessment-method props: @@ -5315,6 +5770,9 @@ catalog: value: AC-19(05) class: sp800-53a prose: ' {{ insert: param, ac-19.05_odp.01 }} is employed to protect the confidentiality and integrity of information on {{ insert: param, ac-19.05_odp.02 }}.' + links: + - href: '#ac-19.5_smt' + rel: assessment-for - id: ac-19.5_asm-examine name: assessment-method props: @@ -5514,16 +5972,25 @@ catalog: name: assessment-objective props: - name: label - value: AC-20a.1 + value: AC-20a.01 class: sp800-53a prose: ' {{ insert: param, ac-20_odp.01 }} is/are consistent with the trust relationships established with other organizations owning, operating, and/or maintaining external systems, allowing authorized individuals to access the system from external systems (if applicable);' + links: + - href: '#ac-20_smt.a.1' + rel: assessment-for - id: ac-20_obj.a.2 name: assessment-objective props: - name: label - value: AC-20a.2 + value: AC-20a.02 class: sp800-53a prose: ' {{ insert: param, ac-20_odp.01 }} is/are consistent with the trust relationships established with other organizations owning, operating, and/or maintaining external systems, allowing authorized individuals to process, store, or transmit organization-controlled information using external systems (if applicable);' + links: + - href: '#ac-20_smt.a.2' + rel: assessment-for + links: + - href: '#ac-20_smt.a' + rel: assessment-for - id: ac-20_obj.b name: assessment-objective props: @@ -5531,6 +5998,12 @@ catalog: value: AC-20b. class: sp800-53a prose: 'the use of {{ insert: param, ac-20_odp.04 }} is prohibited (if applicable).' + links: + - href: '#ac-20_smt.b' + rel: assessment-for + links: + - href: '#ac-20_smt' + rel: assessment-for - id: ac-20_asm-examine name: assessment-method props: @@ -5641,6 +6114,9 @@ catalog: value: AC-20(01)(a) class: sp800-53a prose: authorized individuals are permitted to use an external system to access the system or to process, store, or transmit organization-controlled information only after verification of the implementation of controls on the external system as specified in the organization’s security and privacy policies and security and privacy plans (if applicable); + links: + - href: '#ac-20.1_smt.a' + rel: assessment-for - id: ac-20.1_obj.b name: assessment-objective props: @@ -5648,6 +6124,12 @@ catalog: value: AC-20(01)(b) class: sp800-53a prose: authorized individuals are permitted to use an external system to access the system or to process, store, or transmit organization-controlled information only after retention of approved system connection or processing agreements with the organizational entity hosting the external system (if applicable). + links: + - href: '#ac-20.1_smt.b' + rel: assessment-for + links: + - href: '#ac-20.1_smt' + rel: assessment-for - id: ac-20.1_asm-examine name: assessment-method props: @@ -5744,6 +6226,9 @@ catalog: value: AC-20(02) class: sp800-53a prose: 'the use of organization-controlled portable storage devices by authorized individuals is restricted on external systems using {{ insert: param, ac-20.02_odp }}.' + links: + - href: '#ac-20.2_smt' + rel: assessment-for - id: ac-20.2_asm-examine name: assessment-method props: @@ -5893,6 +6378,9 @@ catalog: value: AC-21a. class: sp800-53a prose: 'authorized users are enabled to determine whether access authorizations assigned to a sharing partner match the information’s access and use restrictions for {{ insert: param, ac-21_odp.01 }};' + links: + - href: '#ac-21_smt.a' + rel: assessment-for - id: ac-21_obj.b name: assessment-objective props: @@ -5900,6 +6388,12 @@ catalog: value: AC-21b. class: sp800-53a prose: ' {{ insert: param, ac-21_odp.02 }} are employed to assist users in making information-sharing and collaboration decisions.' + links: + - href: '#ac-21_smt.b' + rel: assessment-for + links: + - href: '#ac-21_smt' + rel: assessment-for - id: ac-21_asm-examine name: assessment-method props: @@ -6049,6 +6543,9 @@ catalog: value: AC-22a. class: sp800-53a prose: designated individuals are authorized to make information publicly accessible; + links: + - href: '#ac-22_smt.a' + rel: assessment-for - id: ac-22_obj.b name: assessment-objective props: @@ -6056,6 +6553,9 @@ catalog: value: AC-22b. class: sp800-53a prose: authorized individuals are trained to ensure that publicly accessible information does not contain non-public information; + links: + - href: '#ac-22_smt.b' + rel: assessment-for - id: ac-22_obj.c name: assessment-objective props: @@ -6063,6 +6563,9 @@ catalog: value: AC-22c. class: sp800-53a prose: the proposed content of information is reviewed prior to posting onto the publicly accessible system to ensure that non-public information is not included; + links: + - href: '#ac-22_smt.c' + rel: assessment-for - id: ac-22_obj.d name: assessment-objective props: @@ -6077,6 +6580,9 @@ catalog: value: AC-22d.[01] class: sp800-53a prose: 'the content on the publicly accessible system is reviewed for non-public information {{ insert: param, ac-22_odp }};' + links: + - href: '#ac-22_smt.d' + rel: assessment-for - id: ac-22_obj.d-2 name: assessment-objective props: @@ -6084,6 +6590,15 @@ catalog: value: AC-22d.[02] class: sp800-53a prose: non-public information is removed from the publicly accessible system, if discovered. + links: + - href: '#ac-22_smt.d' + rel: assessment-for + links: + - href: '#ac-22_smt.d' + rel: assessment-for + links: + - href: '#ac-22_smt' + rel: assessment-for - id: ac-22_asm-examine name: assessment-method props: @@ -6356,6 +6871,9 @@ catalog: value: AT-01a.[01] class: sp800-53a prose: 'an awareness and training policy is developed and documented; ' + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.a-2 name: assessment-objective props: @@ -6363,6 +6881,9 @@ catalog: value: AT-01a.[02] class: sp800-53a prose: 'the awareness and training policy is disseminated to {{ insert: param, at-01_odp.01 }};' + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.a-3 name: assessment-objective props: @@ -6370,6 +6891,9 @@ catalog: value: AT-01a.[03] class: sp800-53a prose: awareness and training procedures to facilitate the implementation of the awareness and training policy and associated access controls are developed and documented; + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.a-4 name: assessment-objective props: @@ -6377,6 +6901,9 @@ catalog: value: AT-01a.[04] class: sp800-53a prose: 'the awareness and training procedures are disseminated to {{ insert: param, at-01_odp.02 }}.' + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.a.1 name: assessment-objective props: @@ -6398,6 +6925,9 @@ catalog: value: AT-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses purpose;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-2 name: assessment-objective props: @@ -6405,6 +6935,9 @@ catalog: value: AT-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses scope;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-3 name: assessment-objective props: @@ -6412,6 +6945,9 @@ catalog: value: AT-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses roles;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-4 name: assessment-objective props: @@ -6419,6 +6955,9 @@ catalog: value: AT-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses responsibilities;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-5 name: assessment-objective props: @@ -6426,6 +6965,9 @@ catalog: value: AT-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses management commitment;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-6 name: assessment-objective props: @@ -6433,6 +6975,9 @@ catalog: value: AT-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses coordination among organizational entities;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-7 name: assessment-objective props: @@ -6440,6 +6985,12 @@ catalog: value: AT-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses compliance; and' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.b name: assessment-objective props: @@ -6447,6 +6998,15 @@ catalog: value: AT-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines; and' + links: + - href: '#at-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#at-1_smt.a.1' + rel: assessment-for + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.b name: assessment-objective props: @@ -6454,6 +7014,9 @@ catalog: value: AT-01b. class: sp800-53a prose: 'the {{ insert: param, at-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the awareness and training policy and procedures;' + links: + - href: '#at-1_smt.b' + rel: assessment-for - id: at-1_obj.c name: assessment-objective props: @@ -6475,6 +7038,9 @@ catalog: value: AT-01c.01[01] class: sp800-53a prose: 'the current awareness and training policy is reviewed and updated {{ insert: param, at-01_odp.05 }}; ' + links: + - href: '#at-1_smt.c.1' + rel: assessment-for - id: at-1_obj.c.1-2 name: assessment-objective props: @@ -6482,6 +7048,12 @@ catalog: value: AT-01c.01[02] class: sp800-53a prose: 'the current awareness and training policy is reviewed and updated following {{ insert: param, at-01_odp.06 }};' + links: + - href: '#at-1_smt.c.1' + rel: assessment-for + links: + - href: '#at-1_smt.c.1' + rel: assessment-for - id: at-1_obj.c.2 name: assessment-objective props: @@ -6496,6 +7068,9 @@ catalog: value: AT-01c.02[01] class: sp800-53a prose: 'the current awareness and training procedures are reviewed and updated {{ insert: param, at-01_odp.07 }};' + links: + - href: '#at-1_smt.c.2' + rel: assessment-for - id: at-1_obj.c.2-2 name: assessment-objective props: @@ -6503,6 +7078,18 @@ catalog: value: AT-01c.02[02] class: sp800-53a prose: 'the current awareness and training procedures are reviewed and updated following {{ insert: param, at-01_odp.08 }}.' + links: + - href: '#at-1_smt.c.2' + rel: assessment-for + links: + - href: '#at-1_smt.c.2' + rel: assessment-for + links: + - href: '#at-1_smt.c' + rel: assessment-for + links: + - href: '#at-1_smt' + rel: assessment-for - id: at-1_asm-examine name: assessment-method props: @@ -6755,6 +7342,9 @@ catalog: value: AT-02a.01[01] class: sp800-53a prose: security literacy training is provided to system users (including managers, senior executives, and contractors) as part of initial training for new users; + links: + - href: '#at-2_smt.a.1' + rel: assessment-for - id: at-2_obj.a.1-2 name: assessment-objective props: @@ -6762,6 +7352,9 @@ catalog: value: AT-02a.01[02] class: sp800-53a prose: privacy literacy training is provided to system users (including managers, senior executives, and contractors) as part of initial training for new users; + links: + - href: '#at-2_smt.a.1' + rel: assessment-for - id: at-2_obj.a.1-3 name: assessment-objective props: @@ -6769,6 +7362,9 @@ catalog: value: AT-02a.01[03] class: sp800-53a prose: 'security literacy training is provided to system users (including managers, senior executives, and contractors) {{ insert: param, at-02_odp.01 }} thereafter;' + links: + - href: '#at-2_smt.a.1' + rel: assessment-for - id: at-2_obj.a.1-4 name: assessment-objective props: @@ -6776,6 +7372,12 @@ catalog: value: AT-02a.01[04] class: sp800-53a prose: 'privacy literacy training is provided to system users (including managers, senior executives, and contractors) {{ insert: param, at-02_odp.02 }} thereafter;' + links: + - href: '#at-2_smt.a.1' + rel: assessment-for + links: + - href: '#at-2_smt.a.1' + rel: assessment-for - id: at-2_obj.a.2 name: assessment-objective props: @@ -6790,6 +7392,9 @@ catalog: value: AT-02a.02[01] class: sp800-53a prose: 'security literacy training is provided to system users (including managers, senior executives, and contractors) when required by system changes or following {{ insert: param, at-02_odp.03 }};' + links: + - href: '#at-2_smt.a.2' + rel: assessment-for - id: at-2_obj.a.2-2 name: assessment-objective props: @@ -6797,6 +7402,15 @@ catalog: value: AT-02a.02[02] class: sp800-53a prose: 'privacy literacy training is provided to system users (including managers, senior executives, and contractors) when required by system changes or following {{ insert: param, at-02_odp.04 }};' + links: + - href: '#at-2_smt.a.2' + rel: assessment-for + links: + - href: '#at-2_smt.a.2' + rel: assessment-for + links: + - href: '#at-2_smt.a' + rel: assessment-for - id: at-2_obj.b name: assessment-objective props: @@ -6804,6 +7418,9 @@ catalog: value: AT-02b. class: sp800-53a prose: ' {{ insert: param, at-02_odp.05 }} are employed to increase the security and privacy awareness of system users;' + links: + - href: '#at-2_smt.b' + rel: assessment-for - id: at-2_obj.c name: assessment-objective props: @@ -6818,6 +7435,9 @@ catalog: value: AT-02c.[01] class: sp800-53a prose: 'literacy training and awareness content is updated {{ insert: param, at-02_odp.06 }};' + links: + - href: '#at-2_smt.c' + rel: assessment-for - id: at-2_obj.c-2 name: assessment-objective props: @@ -6825,6 +7445,12 @@ catalog: value: AT-02c.[02] class: sp800-53a prose: 'literacy training and awareness content is updated following {{ insert: param, at-02_odp.07 }};' + links: + - href: '#at-2_smt.c' + rel: assessment-for + links: + - href: '#at-2_smt.c' + rel: assessment-for - id: at-2_obj.d name: assessment-objective props: @@ -6832,6 +7458,12 @@ catalog: value: AT-02d. class: sp800-53a prose: lessons learned from internal or external security incidents or breaches are incorporated into literacy training and awareness techniques. + links: + - href: '#at-2_smt.d' + rel: assessment-for + links: + - href: '#at-2_smt' + rel: assessment-for - id: at-2_asm-examine name: assessment-method props: @@ -6934,6 +7566,9 @@ catalog: value: AT-02(02)[01] class: sp800-53a prose: literacy training on recognizing potential indicators of insider threat is provided; + links: + - href: '#at-2.2_smt' + rel: assessment-for - id: at-2.2_obj-2 name: assessment-objective props: @@ -6941,6 +7576,12 @@ catalog: value: AT-02(02)[02] class: sp800-53a prose: literacy training on reporting potential indicators of insider threat is provided. + links: + - href: '#at-2.2_smt' + rel: assessment-for + links: + - href: '#at-2.2_smt' + rel: assessment-for - id: at-2.2_asm-examine name: assessment-method props: @@ -7024,6 +7665,9 @@ catalog: value: AT-02(03)[01] class: sp800-53a prose: literacy training on recognizing potential and actual instances of social engineering is provided; + links: + - href: '#at-2.3_smt' + rel: assessment-for - id: at-2.3_obj-2 name: assessment-objective props: @@ -7031,6 +7675,9 @@ catalog: value: AT-02(03)[02] class: sp800-53a prose: literacy training on reporting potential and actual instances of social engineering is provided; + links: + - href: '#at-2.3_smt' + rel: assessment-for - id: at-2.3_obj-3 name: assessment-objective props: @@ -7038,6 +7685,9 @@ catalog: value: AT-02(03)[03] class: sp800-53a prose: literacy training on recognizing potential and actual instances of social mining is provided; + links: + - href: '#at-2.3_smt' + rel: assessment-for - id: at-2.3_obj-4 name: assessment-objective props: @@ -7045,6 +7695,12 @@ catalog: value: AT-02(03)[04] class: sp800-53a prose: literacy training on reporting potential and actual instances of social mining is provided. + links: + - href: '#at-2.3_smt' + rel: assessment-for + links: + - href: '#at-2.3_smt' + rel: assessment-for - id: at-2.3_asm-examine name: assessment-method props: @@ -7280,6 +7936,9 @@ catalog: value: AT-03a.01[01] class: sp800-53a prose: 'role-based security training is provided to {{ insert: param, at-03_odp.01 }} before authorizing access to the system, information, or performing assigned duties;' + links: + - href: '#at-3_smt.a.1' + rel: assessment-for - id: at-3_obj.a.1-2 name: assessment-objective props: @@ -7287,6 +7946,9 @@ catalog: value: AT-03a.01[02] class: sp800-53a prose: 'role-based privacy training is provided to {{ insert: param, at-03_odp.02 }} before authorizing access to the system, information, or performing assigned duties;' + links: + - href: '#at-3_smt.a.1' + rel: assessment-for - id: at-3_obj.a.1-3 name: assessment-objective props: @@ -7294,6 +7956,9 @@ catalog: value: AT-03a.01[03] class: sp800-53a prose: 'role-based security training is provided to {{ insert: param, at-03_odp.01 }} {{ insert: param, at-03_odp.03 }} thereafter;' + links: + - href: '#at-3_smt.a.1' + rel: assessment-for - id: at-3_obj.a.1-4 name: assessment-objective props: @@ -7301,6 +7966,12 @@ catalog: value: AT-03a.01[04] class: sp800-53a prose: 'role-based privacy training is provided to {{ insert: param, at-03_odp.02 }} {{ insert: param, at-03_odp.03 }} thereafter;' + links: + - href: '#at-3_smt.a.1' + rel: assessment-for + links: + - href: '#at-3_smt.a.1' + rel: assessment-for - id: at-3_obj.a.2 name: assessment-objective props: @@ -7315,6 +7986,9 @@ catalog: value: AT-03a.02[01] class: sp800-53a prose: role-based security training is provided to personnel with assigned security roles and responsibilities when required by system changes; + links: + - href: '#at-3_smt.a.2' + rel: assessment-for - id: at-3_obj.a.2-2 name: assessment-objective props: @@ -7322,6 +7996,15 @@ catalog: value: AT-03a.02[02] class: sp800-53a prose: role-based privacy training is provided to personnel with assigned security roles and responsibilities when required by system changes; + links: + - href: '#at-3_smt.a.2' + rel: assessment-for + links: + - href: '#at-3_smt.a.2' + rel: assessment-for + links: + - href: '#at-3_smt.a' + rel: assessment-for - id: at-3_obj.b name: assessment-objective props: @@ -7336,6 +8019,9 @@ catalog: value: AT-03b.[01] class: sp800-53a prose: 'role-based training content is updated {{ insert: param, at-03_odp.04 }};' + links: + - href: '#at-3_smt.b' + rel: assessment-for - id: at-3_obj.b-2 name: assessment-objective props: @@ -7343,6 +8029,12 @@ catalog: value: AT-03b.[02] class: sp800-53a prose: 'role-based training content is updated following {{ insert: param, at-03_odp.05 }};' + links: + - href: '#at-3_smt.b' + rel: assessment-for + links: + - href: '#at-3_smt.b' + rel: assessment-for - id: at-3_obj.c name: assessment-objective props: @@ -7350,6 +8042,12 @@ catalog: value: AT-03c. class: sp800-53a prose: lessons learned from internal or external security incidents or breaches are incorporated into role-based training. + links: + - href: '#at-3_smt.c' + rel: assessment-for + links: + - href: '#at-3_smt' + rel: assessment-for - id: at-3_asm-examine name: assessment-method props: @@ -7489,6 +8187,9 @@ catalog: value: AT-04a.[01] class: sp800-53a prose: information security and privacy training activities, including security and privacy awareness training and specific role-based security and privacy training, are documented; + links: + - href: '#at-4_smt.a' + rel: assessment-for - id: at-4_obj.a-2 name: assessment-objective props: @@ -7496,6 +8197,12 @@ catalog: value: AT-04a.[02] class: sp800-53a prose: information security and privacy training activities, including security and privacy awareness training and specific role-based security and privacy training, are monitored; + links: + - href: '#at-4_smt.a' + rel: assessment-for + links: + - href: '#at-4_smt.a' + rel: assessment-for - id: at-4_obj.b name: assessment-objective props: @@ -7503,6 +8210,12 @@ catalog: value: AT-04b. class: sp800-53a prose: 'individual training records are retained for {{ insert: param, at-04_odp }}.' + links: + - href: '#at-4_smt.b' + rel: assessment-for + links: + - href: '#at-4_smt' + rel: assessment-for - id: at-4_asm-examine name: assessment-method props: @@ -7760,6 +8473,9 @@ catalog: value: AU-01a.[01] class: sp800-53a prose: an audit and accountability policy is developed and documented; + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.a-2 name: assessment-objective props: @@ -7767,6 +8483,9 @@ catalog: value: AU-01a.[02] class: sp800-53a prose: 'the audit and accountability policy is disseminated to {{ insert: param, au-01_odp.01 }};' + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.a-3 name: assessment-objective props: @@ -7774,6 +8493,9 @@ catalog: value: AU-01a.[03] class: sp800-53a prose: audit and accountability procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls are developed and documented; + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.a-4 name: assessment-objective props: @@ -7781,6 +8503,9 @@ catalog: value: AU-01a.[04] class: sp800-53a prose: 'the audit and accountability procedures are disseminated to {{ insert: param, au-01_odp.02 }};' + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.a.1 name: assessment-objective props: @@ -7802,6 +8527,9 @@ catalog: value: AU-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses purpose;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-2 name: assessment-objective props: @@ -7809,6 +8537,9 @@ catalog: value: AU-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses scope;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-3 name: assessment-objective props: @@ -7816,6 +8547,9 @@ catalog: value: AU-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses roles;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-4 name: assessment-objective props: @@ -7823,6 +8557,9 @@ catalog: value: AU-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses responsibilities;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-5 name: assessment-objective props: @@ -7830,6 +8567,9 @@ catalog: value: AU-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses management commitment;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-6 name: assessment-objective props: @@ -7837,6 +8577,9 @@ catalog: value: AU-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses coordination among organizational entities;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-7 name: assessment-objective props: @@ -7844,6 +8587,12 @@ catalog: value: AU-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses compliance;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.b name: assessment-objective props: @@ -7851,6 +8600,15 @@ catalog: value: AU-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#au-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#au-1_smt.a.1' + rel: assessment-for + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.b name: assessment-objective props: @@ -7858,6 +8616,9 @@ catalog: value: AU-01b. class: sp800-53a prose: 'the {{ insert: param, au-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the audit and accountability policy and procedures;' + links: + - href: '#au-1_smt.b' + rel: assessment-for - id: au-1_obj.c name: assessment-objective props: @@ -7879,6 +8640,9 @@ catalog: value: AU-01c.01[01] class: sp800-53a prose: 'the current audit and accountability policy is reviewed and updated {{ insert: param, au-01_odp.05 }};' + links: + - href: '#au-1_smt.c.1' + rel: assessment-for - id: au-1_obj.c.1-2 name: assessment-objective props: @@ -7886,6 +8650,12 @@ catalog: value: AU-01c.01[02] class: sp800-53a prose: 'the current audit and accountability policy is reviewed and updated following {{ insert: param, au-01_odp.06 }};' + links: + - href: '#au-1_smt.c.1' + rel: assessment-for + links: + - href: '#au-1_smt.c.1' + rel: assessment-for - id: au-1_obj.c.2 name: assessment-objective props: @@ -7900,6 +8670,9 @@ catalog: value: AU-01c.02[01] class: sp800-53a prose: 'the current audit and accountability procedures are reviewed and updated {{ insert: param, au-01_odp.07 }};' + links: + - href: '#au-1_smt.c.2' + rel: assessment-for - id: au-1_obj.c.2-2 name: assessment-objective props: @@ -7907,6 +8680,18 @@ catalog: value: AU-01c.02[02] class: sp800-53a prose: 'the current audit and accountability procedures are reviewed and updated following {{ insert: param, au-01_odp.08 }}.' + links: + - href: '#au-1_smt.c.2' + rel: assessment-for + links: + - href: '#au-1_smt.c.2' + rel: assessment-for + links: + - href: '#au-1_smt.c' + rel: assessment-for + links: + - href: '#au-1_smt' + rel: assessment-for - id: au-1_asm-examine name: assessment-method props: @@ -8133,6 +8918,9 @@ catalog: value: AU-02a. class: sp800-53a prose: ' {{ insert: param, au-02_odp.01 }} that the system is capable of logging are identified in support of the audit logging function;' + links: + - href: '#au-2_smt.a' + rel: assessment-for - id: au-2_obj.b name: assessment-objective props: @@ -8140,6 +8928,9 @@ catalog: value: AU-02b. class: sp800-53a prose: the event logging function is coordinated with other organizational entities requiring audit-related information to guide and inform the selection criteria for events to be logged; + links: + - href: '#au-2_smt.b' + rel: assessment-for - id: au-2_obj.c name: assessment-objective props: @@ -8154,6 +8945,9 @@ catalog: value: AU-02c.[01] class: sp800-53a prose: ' {{ insert: param, au-02_odp.02 }} are specified for logging within the system;' + links: + - href: '#au-2_smt.c' + rel: assessment-for - id: au-2_obj.c-2 name: assessment-objective props: @@ -8161,6 +8955,12 @@ catalog: value: AU-02c.[02] class: sp800-53a prose: 'the specified event types are logged within the system {{ insert: param, au-02_odp.03 }};' + links: + - href: '#au-2_smt.c' + rel: assessment-for + links: + - href: '#au-2_smt.c' + rel: assessment-for - id: au-2_obj.d name: assessment-objective props: @@ -8168,6 +8968,9 @@ catalog: value: AU-02d. class: sp800-53a prose: a rationale is provided for why the event types selected for logging are deemed to be adequate to support after-the-fact investigations of incidents; + links: + - href: '#au-2_smt.d' + rel: assessment-for - id: au-2_obj.e name: assessment-objective props: @@ -8175,6 +8978,12 @@ catalog: value: AU-02e. class: sp800-53a prose: 'the event types selected for logging are reviewed and updated {{ insert: param, au-02_odp.04 }}.' + links: + - href: '#au-2_smt.e' + rel: assessment-for + links: + - href: '#au-2_smt' + rel: assessment-for - id: au-2_asm-examine name: assessment-method props: @@ -8328,6 +9137,9 @@ catalog: value: AU-03a. class: sp800-53a prose: audit records contain information that establishes what type of event occurred; + links: + - href: '#au-3_smt.a' + rel: assessment-for - id: au-3_obj.b name: assessment-objective props: @@ -8335,6 +9147,9 @@ catalog: value: AU-03b. class: sp800-53a prose: audit records contain information that establishes when the event occurred; + links: + - href: '#au-3_smt.b' + rel: assessment-for - id: au-3_obj.c name: assessment-objective props: @@ -8342,6 +9157,9 @@ catalog: value: AU-03c. class: sp800-53a prose: audit records contain information that establishes where the event occurred; + links: + - href: '#au-3_smt.c' + rel: assessment-for - id: au-3_obj.d name: assessment-objective props: @@ -8349,6 +9167,9 @@ catalog: value: AU-03d. class: sp800-53a prose: audit records contain information that establishes the source of the event; + links: + - href: '#au-3_smt.d' + rel: assessment-for - id: au-3_obj.e name: assessment-objective props: @@ -8356,6 +9177,9 @@ catalog: value: AU-03e. class: sp800-53a prose: audit records contain information that establishes the outcome of the event; + links: + - href: '#au-3_smt.e' + rel: assessment-for - id: au-3_obj.f name: assessment-objective props: @@ -8363,6 +9187,12 @@ catalog: value: AU-03f. class: sp800-53a prose: audit records contain information that establishes the identity of any individuals, subjects, or objects/entities associated with the event. + links: + - href: '#au-3_smt.f' + rel: assessment-for + links: + - href: '#au-3_smt' + rel: assessment-for - id: au-3_asm-examine name: assessment-method props: @@ -8466,6 +9296,9 @@ catalog: value: AU-03(01) class: sp800-53a prose: 'generated audit records contain the following {{ insert: param, au-03.01_odp }}.' + links: + - href: '#au-3.1_smt' + rel: assessment-for - id: au-3.1_asm-examine name: assessment-method props: @@ -8587,6 +9420,9 @@ catalog: value: AU-04 class: sp800-53a prose: 'audit log storage capacity is allocated to accommodate {{ insert: param, au-04_odp }}.' + links: + - href: '#au-4_smt' + rel: assessment-for - id: au-4_asm-examine name: assessment-method props: @@ -8746,6 +9582,9 @@ catalog: value: AU-05a. class: sp800-53a prose: ' {{ insert: param, au-05_odp.01 }} are alerted in the event of an audit logging process failure within {{ insert: param, au-05_odp.02 }};' + links: + - href: '#au-5_smt.a' + rel: assessment-for - id: au-5_obj.b name: assessment-objective props: @@ -8753,6 +9592,12 @@ catalog: value: AU-05b. class: sp800-53a prose: ' {{ insert: param, au-05_odp.03 }} are taken in the event of an audit logging process failure.' + links: + - href: '#au-5_smt.b' + rel: assessment-for + links: + - href: '#au-5_smt' + rel: assessment-for - id: au-5_asm-examine name: assessment-method props: @@ -8965,6 +9810,9 @@ catalog: value: AU-06a. class: sp800-53a prose: 'system audit records are reviewed and analyzed {{ insert: param, au-06_odp.01 }} for indications of {{ insert: param, au-06_odp.02 }} and the potential impact of the inappropriate or unusual activity;' + links: + - href: '#au-6_smt.a' + rel: assessment-for - id: au-6_obj.b name: assessment-objective props: @@ -8972,6 +9820,9 @@ catalog: value: AU-06b. class: sp800-53a prose: 'findings are reported to {{ insert: param, au-06_odp.03 }};' + links: + - href: '#au-6_smt.b' + rel: assessment-for - id: au-6_obj.c name: assessment-objective props: @@ -8979,6 +9830,12 @@ catalog: value: AU-06c. class: sp800-53a prose: the level of audit record review, analysis, and reporting within the system is adjusted when there is a change in risk based on law enforcement information, intelligence information, or other credible sources of information. + links: + - href: '#au-6_smt.c' + rel: assessment-for + links: + - href: '#au-6_smt' + rel: assessment-for - id: au-6_asm-examine name: assessment-method props: @@ -9067,6 +9924,9 @@ catalog: value: AU-06(01) class: sp800-53a prose: 'audit record review, analysis, and reporting processes are integrated using {{ insert: param, au-06.01_odp }}.' + links: + - href: '#au-6.1_smt' + rel: assessment-for - id: au-6.1_asm-examine name: assessment-method props: @@ -9161,6 +10021,9 @@ catalog: value: AU-06(03) class: sp800-53a prose: audit records across different repositories are analyzed and correlated to gain organization-wide situational awareness. + links: + - href: '#au-6.3_smt' + rel: assessment-for - id: au-6.3_asm-examine name: assessment-method props: @@ -9300,6 +10163,9 @@ catalog: value: AU-07a.[01] class: sp800-53a prose: an audit record reduction and report generation capability is provided that supports on-demand audit record review, analysis, and reporting requirements and after-the-fact investigations of incidents; + links: + - href: '#au-7_smt.a' + rel: assessment-for - id: au-7_obj.a-2 name: assessment-objective props: @@ -9307,6 +10173,12 @@ catalog: value: AU-07a.[02] class: sp800-53a prose: an audit record reduction and report generation capability is implemented that supports on-demand audit record review, analysis, and reporting requirements and after-the-fact investigations of incidents; + links: + - href: '#au-7_smt.a' + rel: assessment-for + links: + - href: '#au-7_smt.a' + rel: assessment-for - id: au-7_obj.b name: assessment-objective props: @@ -9321,6 +10193,9 @@ catalog: value: AU-07b.[01] class: sp800-53a prose: an audit record reduction and report generation capability is provided that does not alter the original content or time ordering of audit records; + links: + - href: '#au-7_smt.b' + rel: assessment-for - id: au-7_obj.b-2 name: assessment-objective props: @@ -9328,6 +10203,15 @@ catalog: value: AU-07b.[02] class: sp800-53a prose: an audit record reduction and report generation capability is implemented that does not alter the original content or time ordering of audit records. + links: + - href: '#au-7_smt.b' + rel: assessment-for + links: + - href: '#au-7_smt.b' + rel: assessment-for + links: + - href: '#au-7_smt' + rel: assessment-for - id: au-7_asm-examine name: assessment-method props: @@ -9437,6 +10321,9 @@ catalog: value: AU-07(01)[01] class: sp800-53a prose: 'the capability to process, sort, and search audit records for events of interest based on {{ insert: param, au-07.01_odp }} are provided;' + links: + - href: '#au-7.1_smt' + rel: assessment-for - id: au-7.1_obj-2 name: assessment-objective props: @@ -9444,6 +10331,12 @@ catalog: value: AU-07(01)[02] class: sp800-53a prose: 'the capability to process, sort, and search audit records for events of interest based on {{ insert: param, au-07.01_odp }} are implemented.' + links: + - href: '#au-7.1_smt' + rel: assessment-for + links: + - href: '#au-7.1_smt' + rel: assessment-for - id: au-7.1_asm-examine name: assessment-method props: @@ -9571,6 +10464,9 @@ catalog: value: AU-08a. class: sp800-53a prose: internal system clocks are used to generate timestamps for audit records; + links: + - href: '#au-8_smt.a' + rel: assessment-for - id: au-8_obj.b name: assessment-objective props: @@ -9578,6 +10474,12 @@ catalog: value: AU-08b. class: sp800-53a prose: 'timestamps are recorded for audit records that meet {{ insert: param, au-08_odp }} and that use Coordinated Universal Time, have a fixed local time offset from Coordinated Universal Time, or include the local time offset as part of the timestamp.' + links: + - href: '#au-8_smt.b' + rel: assessment-for + links: + - href: '#au-8_smt' + rel: assessment-for - id: au-8_asm-examine name: assessment-method props: @@ -9727,6 +10629,9 @@ catalog: value: AU-09a. class: sp800-53a prose: audit information and audit logging tools are protected from unauthorized access, modification, and deletion; + links: + - href: '#au-9_smt.a' + rel: assessment-for - id: au-9_obj.b name: assessment-objective props: @@ -9734,6 +10639,12 @@ catalog: value: AU-09b. class: sp800-53a prose: ' {{ insert: param, au-09_odp }} are alerted upon detection of unauthorized access, modification, or deletion of audit information.' + links: + - href: '#au-9_smt.b' + rel: assessment-for + links: + - href: '#au-9_smt' + rel: assessment-for - id: au-9_asm-examine name: assessment-method props: @@ -9841,6 +10752,9 @@ catalog: value: AU-09(04) class: sp800-53a prose: 'access to management of audit logging functionality is authorized only to {{ insert: param, au-09.04_odp }}.' + links: + - href: '#au-9.4_smt' + rel: assessment-for - id: au-9.4_asm-examine name: assessment-method props: @@ -9968,6 +10882,9 @@ catalog: value: AU-11 class: sp800-53a prose: 'audit records are retained for {{ insert: param, au-11_odp }} to provide support for after-the-fact investigations of incidents and to meet regulatory and organizational information retention requirements.' + links: + - href: '#au-11_smt' + rel: assessment-for - id: au-11_asm-examine name: assessment-method props: @@ -10129,6 +11046,9 @@ catalog: value: AU-12a. class: sp800-53a prose: 'audit record generation capability for the event types the system is capable of auditing (defined in AU-02_ODP[01]) is provided by {{ insert: param, au-12_odp.01 }};' + links: + - href: '#au-12_smt.a' + rel: assessment-for - id: au-12_obj.b name: assessment-objective props: @@ -10136,6 +11056,9 @@ catalog: value: AU-12b. class: sp800-53a prose: ' {{ insert: param, au-12_odp.02 }} is/are allowed to select the event types that are to be logged by specific components of the system;' + links: + - href: '#au-12_smt.b' + rel: assessment-for - id: au-12_obj.c name: assessment-objective props: @@ -10143,6 +11066,12 @@ catalog: value: AU-12c. class: sp800-53a prose: audit records for the event types defined in AU-02_ODP[02] that include the audit record content defined in AU-03 are generated. + links: + - href: '#au-12_smt.c' + rel: assessment-for + links: + - href: '#au-12_smt' + rel: assessment-for - id: au-12_asm-examine name: assessment-method props: @@ -10425,6 +11354,9 @@ catalog: value: CA-01a.[01] class: sp800-53a prose: an assessment, authorization, and monitoring policy is developed and documented; + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.a-2 name: assessment-objective props: @@ -10432,6 +11364,9 @@ catalog: value: CA-01a.[02] class: sp800-53a prose: 'the assessment, authorization, and monitoring policy is disseminated to {{ insert: param, ca-01_odp.01 }};' + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.a-3 name: assessment-objective props: @@ -10439,6 +11374,9 @@ catalog: value: CA-01a.[03] class: sp800-53a prose: assessment, authorization, and monitoring procedures to facilitate the implementation of the assessment, authorization, and monitoring policy and associated assessment, authorization, and monitoring controls are developed and documented; + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.a-4 name: assessment-objective props: @@ -10446,6 +11384,9 @@ catalog: value: CA-01a.[04] class: sp800-53a prose: 'the assessment, authorization, and monitoring procedures are disseminated to {{ insert: param, ca-01_odp.02 }};' + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.a.1 name: assessment-objective props: @@ -10467,6 +11408,9 @@ catalog: value: CA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses purpose;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-2 name: assessment-objective props: @@ -10474,6 +11418,9 @@ catalog: value: CA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses scope;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-3 name: assessment-objective props: @@ -10481,6 +11428,9 @@ catalog: value: CA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses roles;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-4 name: assessment-objective props: @@ -10488,6 +11438,9 @@ catalog: value: CA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses responsibilities;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-5 name: assessment-objective props: @@ -10495,6 +11448,9 @@ catalog: value: CA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses management commitment;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-6 name: assessment-objective props: @@ -10502,6 +11458,9 @@ catalog: value: CA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses coordination among organizational entities;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-7 name: assessment-objective props: @@ -10509,6 +11468,12 @@ catalog: value: CA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses compliance;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.b name: assessment-objective props: @@ -10516,6 +11481,15 @@ catalog: value: CA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ca-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ca-1_smt.a.1' + rel: assessment-for + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.b name: assessment-objective props: @@ -10523,6 +11497,9 @@ catalog: value: CA-01b. class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the assessment, authorization, and monitoring policy and procedures;' + links: + - href: '#ca-1_smt.b' + rel: assessment-for - id: ca-1_obj.c name: assessment-objective props: @@ -10544,6 +11521,9 @@ catalog: value: CA-01c.01[01] class: sp800-53a prose: 'the current assessment, authorization, and monitoring policy is reviewed and updated {{ insert: param, ca-01_odp.05 }}; ' + links: + - href: '#ca-1_smt.c.1' + rel: assessment-for - id: ca-1_obj.c.1-2 name: assessment-objective props: @@ -10551,6 +11531,12 @@ catalog: value: CA-01c.01[02] class: sp800-53a prose: 'the current assessment, authorization, and monitoring policy is reviewed and updated following {{ insert: param, ca-01_odp.06 }};' + links: + - href: '#ca-1_smt.c.1' + rel: assessment-for + links: + - href: '#ca-1_smt.c.1' + rel: assessment-for - id: ca-1_obj.c.2 name: assessment-objective props: @@ -10565,6 +11551,9 @@ catalog: value: CA-01c.02[01] class: sp800-53a prose: 'the current assessment, authorization, and monitoring procedures are reviewed and updated {{ insert: param, ca-01_odp.07 }}; ' + links: + - href: '#ca-1_smt.c.2' + rel: assessment-for - id: ca-1_obj.c.2-2 name: assessment-objective props: @@ -10572,6 +11561,18 @@ catalog: value: CA-01c.02[02] class: sp800-53a prose: 'the current assessment, authorization, and monitoring procedures are reviewed and updated following {{ insert: param, ca-01_odp.08 }}.' + links: + - href: '#ca-1_smt.c.2' + rel: assessment-for + links: + - href: '#ca-1_smt.c.2' + rel: assessment-for + links: + - href: '#ca-1_smt.c' + rel: assessment-for + links: + - href: '#ca-1_smt' + rel: assessment-for - id: ca-1_asm-examine name: assessment-method props: @@ -10779,6 +11780,9 @@ catalog: value: CA-02a. class: sp800-53a prose: an appropriate assessor or assessment team is selected for the type of assessment to be conducted; + links: + - href: '#ca-2_smt.a' + rel: assessment-for - id: ca-2_obj.b name: assessment-objective props: @@ -10793,6 +11797,9 @@ catalog: value: CA-02b.01 class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including controls and control enhancements under assessment; + links: + - href: '#ca-2_smt.b.1' + rel: assessment-for - id: ca-2_obj.b.2 name: assessment-objective props: @@ -10800,6 +11807,9 @@ catalog: value: CA-02b.02 class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including assessment procedures to be used to determine control effectiveness; + links: + - href: '#ca-2_smt.b.2' + rel: assessment-for - id: ca-2_obj.b.3 name: assessment-objective props: @@ -10814,6 +11824,9 @@ catalog: value: CA-02b.03[01] class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including the assessment environment; + links: + - href: '#ca-2_smt.b.3' + rel: assessment-for - id: ca-2_obj.b.3-2 name: assessment-objective props: @@ -10821,6 +11834,9 @@ catalog: value: CA-02b.03[02] class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including the assessment team; + links: + - href: '#ca-2_smt.b.3' + rel: assessment-for - id: ca-2_obj.b.3-3 name: assessment-objective props: @@ -10828,6 +11844,15 @@ catalog: value: CA-02b.03[03] class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including assessment roles and responsibilities; + links: + - href: '#ca-2_smt.b.3' + rel: assessment-for + links: + - href: '#ca-2_smt.b.3' + rel: assessment-for + links: + - href: '#ca-2_smt.b' + rel: assessment-for - id: ca-2_obj.c name: assessment-objective props: @@ -10835,6 +11860,9 @@ catalog: value: CA-02c. class: sp800-53a prose: the control assessment plan is reviewed and approved by the authorizing official or designated representative prior to conducting the assessment; + links: + - href: '#ca-2_smt.c' + rel: assessment-for - id: ca-2_obj.d name: assessment-objective props: @@ -10849,6 +11877,9 @@ catalog: value: CA-02d.[01] class: sp800-53a prose: 'controls are assessed in the system and its environment of operation {{ insert: param, ca-02_odp.01 }} to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;' + links: + - href: '#ca-2_smt.d' + rel: assessment-for - id: ca-2_obj.d-2 name: assessment-objective props: @@ -10856,6 +11887,12 @@ catalog: value: CA-02d.[02] class: sp800-53a prose: 'controls are assessed in the system and its environment of operation {{ insert: param, ca-02_odp.01 }} to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established privacy requirements;' + links: + - href: '#ca-2_smt.d' + rel: assessment-for + links: + - href: '#ca-2_smt.d' + rel: assessment-for - id: ca-2_obj.e name: assessment-objective props: @@ -10863,6 +11900,9 @@ catalog: value: CA-02e. class: sp800-53a prose: a control assessment report is produced that documents the results of the assessment; + links: + - href: '#ca-2_smt.e' + rel: assessment-for - id: ca-2_obj.f name: assessment-objective props: @@ -10870,6 +11910,12 @@ catalog: value: CA-02f. class: sp800-53a prose: 'the results of the control assessment are provided to {{ insert: param, ca-02_odp.02 }}.' + links: + - href: '#ca-2_smt.f' + rel: assessment-for + links: + - href: '#ca-2_smt' + rel: assessment-for - id: ca-2_asm-examine name: assessment-method props: @@ -10964,6 +12010,9 @@ catalog: value: CA-02(01) class: sp800-53a prose: independent assessors or assessment teams are employed to conduct control assessments. + links: + - href: '#ca-2.1_smt' + rel: assessment-for - id: ca-2.1_asm-examine name: assessment-method props: @@ -11136,6 +12185,9 @@ catalog: value: CA-03a. class: sp800-53a prose: 'the exchange of information between the system and other systems is approved and managed using {{ insert: param, ca-03_odp.01 }};' + links: + - href: '#ca-3_smt.a' + rel: assessment-for - id: ca-3_obj.b name: assessment-objective props: @@ -11150,6 +12202,9 @@ catalog: value: CA-03b.[01] class: sp800-53a prose: the interface characteristics are documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.b-2 name: assessment-objective props: @@ -11157,6 +12212,9 @@ catalog: value: CA-03b.[02] class: sp800-53a prose: security requirements are documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.b-3 name: assessment-objective props: @@ -11164,6 +12222,9 @@ catalog: value: CA-03b.[03] class: sp800-53a prose: privacy requirements are documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.b-4 name: assessment-objective props: @@ -11171,6 +12232,9 @@ catalog: value: CA-03b.[04] class: sp800-53a prose: controls are documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.b-5 name: assessment-objective props: @@ -11178,6 +12242,9 @@ catalog: value: CA-03b.[05] class: sp800-53a prose: responsibilities for each system are documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.b-6 name: assessment-objective props: @@ -11185,6 +12252,12 @@ catalog: value: CA-03b.[06] class: sp800-53a prose: the impact level of the information communicated is documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.c name: assessment-objective props: @@ -11192,6 +12265,12 @@ catalog: value: CA-03c. class: sp800-53a prose: 'agreements are reviewed and updated {{ insert: param, ca-03_odp.03 }}.' + links: + - href: '#ca-3_smt.c' + rel: assessment-for + links: + - href: '#ca-3_smt' + rel: assessment-for - id: ca-3_asm-examine name: assessment-method props: @@ -11330,6 +12409,9 @@ catalog: value: CA-05a. class: sp800-53a prose: a plan of action and milestones for the system is developed to document the planned remediation actions of the organization to correct weaknesses or deficiencies noted during the assessment of the controls and to reduce or eliminate known vulnerabilities in the system; + links: + - href: '#ca-5_smt.a' + rel: assessment-for - id: ca-5_obj.b name: assessment-objective props: @@ -11337,6 +12419,12 @@ catalog: value: CA-05b. class: sp800-53a prose: 'existing plan of action and milestones are updated {{ insert: param, ca-05_odp }} based on the findings from control assessments, independent audits or reviews, and continuous monitoring activities.' + links: + - href: '#ca-5_smt.b' + rel: assessment-for + links: + - href: '#ca-5_smt' + rel: assessment-for - id: ca-5_asm-examine name: assessment-method props: @@ -11511,6 +12599,9 @@ catalog: value: CA-06a. class: sp800-53a prose: a senior official is assigned as the authorizing official for the system; + links: + - href: '#ca-6_smt.a' + rel: assessment-for - id: ca-6_obj.b name: assessment-objective props: @@ -11518,6 +12609,9 @@ catalog: value: CA-06b. class: sp800-53a prose: a senior official is assigned as the authorizing official for common controls available for inheritance by organizational systems; + links: + - href: '#ca-6_smt.b' + rel: assessment-for - id: ca-6_obj.c name: assessment-objective props: @@ -11532,6 +12626,9 @@ catalog: value: CA-06c.01 class: sp800-53a prose: before commencing operations, the authorizing official for the system accepts the use of common controls inherited by the system; + links: + - href: '#ca-6_smt.c.1' + rel: assessment-for - id: ca-6_obj.c.2 name: assessment-objective props: @@ -11539,6 +12636,12 @@ catalog: value: CA-06c.02 class: sp800-53a prose: before commencing operations, the authorizing official for the system authorizes the system to operate; + links: + - href: '#ca-6_smt.c.2' + rel: assessment-for + links: + - href: '#ca-6_smt.c' + rel: assessment-for - id: ca-6_obj.d name: assessment-objective props: @@ -11546,6 +12649,9 @@ catalog: value: CA-06d. class: sp800-53a prose: the authorizing official for common controls authorizes the use of those controls for inheritance by organizational systems; + links: + - href: '#ca-6_smt.d' + rel: assessment-for - id: ca-6_obj.e name: assessment-objective props: @@ -11553,6 +12659,12 @@ catalog: value: CA-06e. class: sp800-53a prose: 'the authorizations are updated {{ insert: param, ca-06_odp }}.' + links: + - href: '#ca-6_smt.e' + rel: assessment-for + links: + - href: '#ca-6_smt' + rel: assessment-for - id: ca-6_asm-examine name: assessment-method props: @@ -11885,6 +12997,9 @@ catalog: value: CA-07[01] class: sp800-53a prose: a system-level continuous monitoring strategy is developed; + links: + - href: '#ca-7_smt' + rel: assessment-for - id: ca-7_obj-2 name: assessment-objective props: @@ -11892,6 +13007,9 @@ catalog: value: CA-07[02] class: sp800-53a prose: system-level continuous monitoring is implemented in accordance with the organization-level continuous monitoring strategy; + links: + - href: '#ca-7_smt' + rel: assessment-for - id: ca-7_obj.a name: assessment-objective props: @@ -11899,6 +13017,9 @@ catalog: value: CA-07a. class: sp800-53a prose: 'system-level continuous monitoring includes establishment of the following system-level metrics to be monitored: {{ insert: param, ca-07_odp.01 }};' + links: + - href: '#ca-7_smt.a' + rel: assessment-for - id: ca-7_obj.b name: assessment-objective props: @@ -11913,6 +13034,9 @@ catalog: value: CA-07b.[01] class: sp800-53a prose: 'system-level continuous monitoring includes established {{ insert: param, ca-07_odp.02 }} for monitoring;' + links: + - href: '#ca-7_smt.b' + rel: assessment-for - id: ca-7_obj.b-2 name: assessment-objective props: @@ -11920,6 +13044,12 @@ catalog: value: CA-07b.[02] class: sp800-53a prose: 'system-level continuous monitoring includes established {{ insert: param, ca-07_odp.03 }} for assessment of control effectiveness;' + links: + - href: '#ca-7_smt.b' + rel: assessment-for + links: + - href: '#ca-7_smt.b' + rel: assessment-for - id: ca-7_obj.c name: assessment-objective props: @@ -11927,6 +13057,9 @@ catalog: value: CA-07c. class: sp800-53a prose: system-level continuous monitoring includes ongoing control assessments in accordance with the continuous monitoring strategy; + links: + - href: '#ca-7_smt.c' + rel: assessment-for - id: ca-7_obj.d name: assessment-objective props: @@ -11934,6 +13067,9 @@ catalog: value: CA-07d. class: sp800-53a prose: system-level continuous monitoring includes ongoing monitoring of system and organization-defined metrics in accordance with the continuous monitoring strategy; + links: + - href: '#ca-7_smt.d' + rel: assessment-for - id: ca-7_obj.e name: assessment-objective props: @@ -11941,6 +13077,9 @@ catalog: value: CA-07e. class: sp800-53a prose: system-level continuous monitoring includes correlation and analysis of information generated by control assessments and monitoring; + links: + - href: '#ca-7_smt.e' + rel: assessment-for - id: ca-7_obj.f name: assessment-objective props: @@ -11948,6 +13087,9 @@ catalog: value: CA-07f. class: sp800-53a prose: system-level continuous monitoring includes response actions to address the results of the analysis of control assessment and monitoring information; + links: + - href: '#ca-7_smt.f' + rel: assessment-for - id: ca-7_obj.g name: assessment-objective props: @@ -11962,6 +13104,9 @@ catalog: value: CA-07g.[01] class: sp800-53a prose: 'system-level continuous monitoring includes reporting the security status of the system to {{ insert: param, ca-07_odp.04 }} {{ insert: param, ca-07_odp.05 }};' + links: + - href: '#ca-7_smt.g' + rel: assessment-for - id: ca-7_obj.g-2 name: assessment-objective props: @@ -11969,6 +13114,15 @@ catalog: value: CA-07g.[02] class: sp800-53a prose: 'system-level continuous monitoring includes reporting the privacy status of the system to {{ insert: param, ca-07_odp.06 }} {{ insert: param, ca-07_odp.07 }}.' + links: + - href: '#ca-7_smt.g' + rel: assessment-for + links: + - href: '#ca-7_smt.g' + rel: assessment-for + links: + - href: '#ca-7_smt' + rel: assessment-for - id: ca-7_asm-examine name: assessment-method props: @@ -12077,6 +13231,9 @@ catalog: value: CA-07(01) class: sp800-53a prose: independent assessors or assessment teams are employed to monitor the controls in the system on an ongoing basis. + links: + - href: '#ca-7.1_smt' + rel: assessment-for - id: ca-7.1_asm-examine name: assessment-method props: @@ -12191,6 +13348,9 @@ catalog: value: CA-07(04)(a) class: sp800-53a prose: effectiveness monitoring is included in risk monitoring; + links: + - href: '#ca-7.4_smt.a' + rel: assessment-for - id: ca-7.4_obj.b name: assessment-objective props: @@ -12198,6 +13358,9 @@ catalog: value: CA-07(04)(b) class: sp800-53a prose: compliance monitoring is included in risk monitoring; + links: + - href: '#ca-7.4_smt.b' + rel: assessment-for - id: ca-7.4_obj.c name: assessment-objective props: @@ -12205,6 +13368,12 @@ catalog: value: CA-07(04)(c) class: sp800-53a prose: change monitoring is included in risk monitoring. + links: + - href: '#ca-7.4_smt.c' + rel: assessment-for + links: + - href: '#ca-7.4_smt' + rel: assessment-for - id: ca-7.4_asm-examine name: assessment-method props: @@ -12384,6 +13553,9 @@ catalog: value: CA-09a. class: sp800-53a prose: 'internal connections of {{ insert: param, ca-09_odp.01 }} to the system are authorized;' + links: + - href: '#ca-9_smt.a' + rel: assessment-for - id: ca-9_obj.b name: assessment-objective props: @@ -12398,6 +13570,9 @@ catalog: value: CA-09b.[01] class: sp800-53a prose: for each internal connection, the interface characteristics are documented; + links: + - href: '#ca-9_smt.b' + rel: assessment-for - id: ca-9_obj.b-2 name: assessment-objective props: @@ -12405,6 +13580,9 @@ catalog: value: CA-09b.[02] class: sp800-53a prose: for each internal connection, the security requirements are documented; + links: + - href: '#ca-9_smt.b' + rel: assessment-for - id: ca-9_obj.b-3 name: assessment-objective props: @@ -12412,6 +13590,9 @@ catalog: value: CA-09b.[03] class: sp800-53a prose: for each internal connection, the privacy requirements are documented; + links: + - href: '#ca-9_smt.b' + rel: assessment-for - id: ca-9_obj.b-4 name: assessment-objective props: @@ -12419,6 +13600,12 @@ catalog: value: CA-09b.[04] class: sp800-53a prose: for each internal connection, the nature of the information communicated is documented; + links: + - href: '#ca-9_smt.b' + rel: assessment-for + links: + - href: '#ca-9_smt.b' + rel: assessment-for - id: ca-9_obj.c name: assessment-objective props: @@ -12426,6 +13613,9 @@ catalog: value: CA-09c. class: sp800-53a prose: 'internal system connections are terminated after {{ insert: param, ca-09_odp.02 }};' + links: + - href: '#ca-9_smt.c' + rel: assessment-for - id: ca-9_obj.d name: assessment-objective props: @@ -12433,6 +13623,12 @@ catalog: value: CA-09d. class: sp800-53a prose: 'the continued need for each internal connection is reviewed {{ insert: param, ca-09_odp.03 }}.' + links: + - href: '#ca-9_smt.d' + rel: assessment-for + links: + - href: '#ca-9_smt' + rel: assessment-for - id: ca-9_asm-examine name: assessment-method props: @@ -12709,6 +13905,9 @@ catalog: value: CM-01a.[01] class: sp800-53a prose: a configuration management policy is developed and documented; + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.a-2 name: assessment-objective props: @@ -12716,6 +13915,9 @@ catalog: value: CM-01a.[02] class: sp800-53a prose: 'the configuration management policy is disseminated to {{ insert: param, cm-01_odp.01 }};' + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.a-3 name: assessment-objective props: @@ -12723,6 +13925,9 @@ catalog: value: CM-01a.[03] class: sp800-53a prose: configuration management procedures to facilitate the implementation of the configuration management policy and associated configuration management controls are developed and documented; + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.a-4 name: assessment-objective props: @@ -12730,6 +13935,9 @@ catalog: value: CM-01a.[04] class: sp800-53a prose: 'the configuration management procedures are disseminated to {{ insert: param, cm-01_odp.02 }};' + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.a.1 name: assessment-objective props: @@ -12751,6 +13959,9 @@ catalog: value: CM-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses purpose;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-2 name: assessment-objective props: @@ -12758,6 +13969,9 @@ catalog: value: CM-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses scope;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-3 name: assessment-objective props: @@ -12765,6 +13979,9 @@ catalog: value: CM-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses roles;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-4 name: assessment-objective props: @@ -12772,6 +13989,9 @@ catalog: value: CM-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses responsibilities;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-5 name: assessment-objective props: @@ -12779,6 +13999,9 @@ catalog: value: CM-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses management commitment;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-6 name: assessment-objective props: @@ -12786,6 +14009,9 @@ catalog: value: CM-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses coordination among organizational entities;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-7 name: assessment-objective props: @@ -12793,6 +14019,12 @@ catalog: value: CM-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses compliance;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.b name: assessment-objective props: @@ -12800,6 +14032,15 @@ catalog: value: CM-01a.01(b) class: sp800-53a prose: the configuration management policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines; + links: + - href: '#cm-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#cm-1_smt.a.1' + rel: assessment-for + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.b name: assessment-objective props: @@ -12807,6 +14048,9 @@ catalog: value: CM-01b. class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the configuration management policy and procedures;' + links: + - href: '#cm-1_smt.b' + rel: assessment-for - id: cm-1_obj.c name: assessment-objective props: @@ -12828,6 +14072,9 @@ catalog: value: CM-01c.01[01] class: sp800-53a prose: 'the current configuration management policy is reviewed and updated {{ insert: param, cm-01_odp.05 }}; ' + links: + - href: '#cm-1_smt.c.1' + rel: assessment-for - id: cm-1_obj.c.1-2 name: assessment-objective props: @@ -12835,6 +14082,12 @@ catalog: value: CM-01c.01[02] class: sp800-53a prose: 'the current configuration management policy is reviewed and updated following {{ insert: param, cm-01_odp.06 }};' + links: + - href: '#cm-1_smt.c.1' + rel: assessment-for + links: + - href: '#cm-1_smt.c.1' + rel: assessment-for - id: cm-1_obj.c.2 name: assessment-objective props: @@ -12849,6 +14102,9 @@ catalog: value: CM-01c.02[01] class: sp800-53a prose: 'the current configuration management procedures are reviewed and updated {{ insert: param, cm-01_odp.07 }}; ' + links: + - href: '#cm-1_smt.c.2' + rel: assessment-for - id: cm-1_obj.c.2-2 name: assessment-objective props: @@ -12856,6 +14112,18 @@ catalog: value: CM-01c.02[02] class: sp800-53a prose: 'the current configuration management procedures are reviewed and updated following {{ insert: param, cm-01_odp.08 }}.' + links: + - href: '#cm-1_smt.c.2' + rel: assessment-for + links: + - href: '#cm-1_smt.c.2' + rel: assessment-for + links: + - href: '#cm-1_smt.c' + rel: assessment-for + links: + - href: '#cm-1_smt' + rel: assessment-for - id: cm-1_asm-examine name: assessment-method props: @@ -13038,6 +14306,9 @@ catalog: value: CM-02a.[01] class: sp800-53a prose: a current baseline configuration of the system is developed and documented; + links: + - href: '#cm-2_smt.a' + rel: assessment-for - id: cm-2_obj.a-2 name: assessment-objective props: @@ -13045,6 +14316,12 @@ catalog: value: CM-02a.[02] class: sp800-53a prose: a current baseline configuration of the system is maintained under configuration control; + links: + - href: '#cm-2_smt.a' + rel: assessment-for + links: + - href: '#cm-2_smt.a' + rel: assessment-for - id: cm-2_obj.b name: assessment-objective props: @@ -13059,6 +14336,9 @@ catalog: value: CM-02b.01 class: sp800-53a prose: 'the baseline configuration of the system is reviewed and updated {{ insert: param, cm-02_odp.01 }};' + links: + - href: '#cm-2_smt.b.1' + rel: assessment-for - id: cm-2_obj.b.2 name: assessment-objective props: @@ -13066,6 +14346,9 @@ catalog: value: CM-02b.02 class: sp800-53a prose: 'the baseline configuration of the system is reviewed and updated when required due to {{ insert: param, cm-02_odp.02 }};' + links: + - href: '#cm-2_smt.b.2' + rel: assessment-for - id: cm-2_obj.b.3 name: assessment-objective props: @@ -13073,6 +14356,15 @@ catalog: value: CM-02b.03 class: sp800-53a prose: the baseline configuration of the system is reviewed and updated when system components are installed or upgraded. + links: + - href: '#cm-2_smt.b.3' + rel: assessment-for + links: + - href: '#cm-2_smt.b' + rel: assessment-for + links: + - href: '#cm-2_smt' + rel: assessment-for - id: cm-2_asm-examine name: assessment-method props: @@ -13199,6 +14491,9 @@ catalog: value: CM-02(02)[01] class: sp800-53a prose: 'the currency of the baseline configuration of the system is maintained using {{ insert: param, cm-02.02_odp }};' + links: + - href: '#cm-2.2_smt' + rel: assessment-for - id: cm-2.2_obj-2 name: assessment-objective props: @@ -13206,6 +14501,9 @@ catalog: value: CM-02(02)[02] class: sp800-53a prose: 'the completeness of the baseline configuration of the system is maintained using {{ insert: param, cm-02.02_odp }};' + links: + - href: '#cm-2.2_smt' + rel: assessment-for - id: cm-2.2_obj-3 name: assessment-objective props: @@ -13213,6 +14511,9 @@ catalog: value: CM-02(02)[03] class: sp800-53a prose: 'the accuracy of the baseline configuration of the system is maintained using {{ insert: param, cm-02.02_odp }};' + links: + - href: '#cm-2.2_smt' + rel: assessment-for - id: cm-2.2_obj-4 name: assessment-objective props: @@ -13220,6 +14521,12 @@ catalog: value: CM-02(02)[04] class: sp800-53a prose: 'the availability of the baseline configuration of the system is maintained using {{ insert: param, cm-02.02_odp }}.' + links: + - href: '#cm-2.2_smt' + rel: assessment-for + links: + - href: '#cm-2.2_smt' + rel: assessment-for - id: cm-2.2_asm-examine name: assessment-method props: @@ -13328,6 +14635,9 @@ catalog: value: CM-02(03) class: sp800-53a prose: ' {{ insert: param, cm-02.03_odp }} of previous baseline configuration version(s) of the system is/are retained to support rollback.' + links: + - href: '#cm-2.3_smt' + rel: assessment-for - id: cm-2.3_asm-examine name: assessment-method props: @@ -13472,6 +14782,9 @@ catalog: value: CM-02(07)(a) class: sp800-53a prose: ' {{ insert: param, cm-02.07_odp.01 }} with {{ insert: param, cm-02.07_odp.02 }} are issued to individuals traveling to locations that the organization deems to be of significant risk;' + links: + - href: '#cm-2.7_smt.a' + rel: assessment-for - id: cm-2.7_obj.b name: assessment-objective props: @@ -13479,6 +14792,12 @@ catalog: value: CM-02(07)(b) class: sp800-53a prose: ' {{ insert: param, cm-02.07_odp.03 }} are applied to the systems or system components when the individuals return from travel.' + links: + - href: '#cm-2.7_smt.b' + rel: assessment-for + links: + - href: '#cm-2.7_smt' + rel: assessment-for - id: cm-2.7_asm-examine name: assessment-method props: @@ -13729,6 +15048,9 @@ catalog: value: CM-03a. class: sp800-53a prose: the types of changes to the system that are configuration-controlled are determined and documented; + links: + - href: '#cm-3_smt.a' + rel: assessment-for - id: cm-3_obj.b name: assessment-objective props: @@ -13743,6 +15065,9 @@ catalog: value: CM-03b.[01] class: sp800-53a prose: proposed configuration-controlled changes to the system are reviewed; + links: + - href: '#cm-3_smt.b' + rel: assessment-for - id: cm-3_obj.b-2 name: assessment-objective props: @@ -13750,6 +15075,12 @@ catalog: value: CM-03b.[02] class: sp800-53a prose: proposed configuration-controlled changes to the system are approved or disapproved with explicit consideration for security and privacy impact analyses; + links: + - href: '#cm-3_smt.b' + rel: assessment-for + links: + - href: '#cm-3_smt.b' + rel: assessment-for - id: cm-3_obj.c name: assessment-objective props: @@ -13757,6 +15088,9 @@ catalog: value: CM-03c. class: sp800-53a prose: configuration change decisions associated with the system are documented; + links: + - href: '#cm-3_smt.c' + rel: assessment-for - id: cm-3_obj.d name: assessment-objective props: @@ -13764,6 +15098,9 @@ catalog: value: CM-03d. class: sp800-53a prose: approved configuration-controlled changes to the system are implemented; + links: + - href: '#cm-3_smt.d' + rel: assessment-for - id: cm-3_obj.e name: assessment-objective props: @@ -13771,6 +15108,9 @@ catalog: value: CM-03e. class: sp800-53a prose: 'records of configuration-controlled changes to the system are retained for {{ insert: param, cm-03_odp.01 }};' + links: + - href: '#cm-3_smt.e' + rel: assessment-for - id: cm-3_obj.f name: assessment-objective props: @@ -13785,6 +15125,9 @@ catalog: value: CM-03f.[01] class: sp800-53a prose: activities associated with configuration-controlled changes to the system are monitored; + links: + - href: '#cm-3_smt.f' + rel: assessment-for - id: cm-3_obj.f-2 name: assessment-objective props: @@ -13792,6 +15135,12 @@ catalog: value: CM-03f.[02] class: sp800-53a prose: activities associated with configuration-controlled changes to the system are reviewed; + links: + - href: '#cm-3_smt.f' + rel: assessment-for + links: + - href: '#cm-3_smt.f' + rel: assessment-for - id: cm-3_obj.g name: assessment-objective props: @@ -13806,6 +15155,9 @@ catalog: value: CM-03g.[01] class: sp800-53a prose: 'configuration change control activities are coordinated and overseen by {{ insert: param, cm-03_odp.02 }};' + links: + - href: '#cm-3_smt.g' + rel: assessment-for - id: cm-3_obj.g-2 name: assessment-objective props: @@ -13813,6 +15165,15 @@ catalog: value: CM-03g.[02] class: sp800-53a prose: 'the configuration control element convenes {{ insert: param, cm-03_odp.03 }}.' + links: + - href: '#cm-3_smt.g' + rel: assessment-for + links: + - href: '#cm-3_smt.g' + rel: assessment-for + links: + - href: '#cm-3_smt' + rel: assessment-for - id: cm-3_asm-examine name: assessment-method props: @@ -13926,6 +15287,9 @@ catalog: value: CM-03(02)[01] class: sp800-53a prose: changes to the system are tested before finalizing the implementation of the changes; + links: + - href: '#cm-3.2_smt' + rel: assessment-for - id: cm-3.2_obj-2 name: assessment-objective props: @@ -13933,6 +15297,9 @@ catalog: value: CM-03(02)[02] class: sp800-53a prose: changes to the system are validated before finalizing the implementation of the changes; + links: + - href: '#cm-3.2_smt' + rel: assessment-for - id: cm-3.2_obj-3 name: assessment-objective props: @@ -13940,6 +15307,12 @@ catalog: value: CM-03(02)[03] class: sp800-53a prose: changes to the system are documented before finalizing the implementation of the changes. + links: + - href: '#cm-3.2_smt' + rel: assessment-for + links: + - href: '#cm-3.2_smt' + rel: assessment-for - id: cm-3.2_asm-examine name: assessment-method props: @@ -14085,6 +15458,9 @@ catalog: value: CM-03(04)[01] class: sp800-53a prose: ' {{ insert: param, cm-03.04_odp.01 }} are required to be members of the {{ insert: param, cm-03.04_odp.03 }};' + links: + - href: '#cm-3.4_smt' + rel: assessment-for - id: cm-3.4_obj-2 name: assessment-objective props: @@ -14092,6 +15468,12 @@ catalog: value: CM-03(04)[02] class: sp800-53a prose: ' {{ insert: param, cm-03.04_odp.02 }} are required to be members of the {{ insert: param, cm-03.04_odp.03 }}.' + links: + - href: '#cm-3.4_smt' + rel: assessment-for + links: + - href: '#cm-3.4_smt' + rel: assessment-for - id: cm-3.4_asm-examine name: assessment-method props: @@ -14209,6 +15591,9 @@ catalog: value: CM-04[01] class: sp800-53a prose: changes to the system are analyzed to determine potential security impacts prior to change implementation; + links: + - href: '#cm-4_smt' + rel: assessment-for - id: cm-4_obj-2 name: assessment-objective props: @@ -14216,6 +15601,12 @@ catalog: value: CM-04[02] class: sp800-53a prose: changes to the system are analyzed to determine potential privacy impacts prior to change implementation. + links: + - href: '#cm-4_smt' + rel: assessment-for + links: + - href: '#cm-4_smt' + rel: assessment-for - id: cm-4_asm-examine name: assessment-method props: @@ -14341,6 +15732,9 @@ catalog: value: CM-04(02)[01] class: sp800-53a prose: the impacted controls are implemented correctly with regard to meeting the security requirements for the system after system changes; + links: + - href: '#cm-4.2_smt' + rel: assessment-for - id: cm-4.2_obj-2 name: assessment-objective props: @@ -14348,6 +15742,9 @@ catalog: value: CM-04(02)[02] class: sp800-53a prose: the impacted controls are implemented correctly with regard to meeting the privacy requirements for the system after system changes; + links: + - href: '#cm-4.2_smt' + rel: assessment-for - id: cm-4.2_obj-3 name: assessment-objective props: @@ -14355,6 +15752,9 @@ catalog: value: CM-04(02)[03] class: sp800-53a prose: the impacted controls are operating as intended with regard to meeting the security requirements for the system after system changes; + links: + - href: '#cm-4.2_smt' + rel: assessment-for - id: cm-4.2_obj-4 name: assessment-objective props: @@ -14362,6 +15762,9 @@ catalog: value: CM-04(02)[04] class: sp800-53a prose: the impacted controls are operating as intended with regard to meeting the privacy requirements for the system after system changes; + links: + - href: '#cm-4.2_smt' + rel: assessment-for - id: cm-4.2_obj-5 name: assessment-objective props: @@ -14369,6 +15772,9 @@ catalog: value: CM-04(02)[05] class: sp800-53a prose: the impacted controls are producing the desired outcome with regard to meeting the security requirements for the system after system changes; + links: + - href: '#cm-4.2_smt' + rel: assessment-for - id: cm-4.2_obj-6 name: assessment-objective props: @@ -14376,6 +15782,12 @@ catalog: value: CM-04(02)[06] class: sp800-53a prose: the impacted controls are producing the desired outcome with regard to meeting the privacy requirements for the system after system changes. + links: + - href: '#cm-4.2_smt' + rel: assessment-for + links: + - href: '#cm-4.2_smt' + rel: assessment-for - id: cm-4.2_asm-examine name: assessment-method props: @@ -14511,6 +15923,9 @@ catalog: value: CM-05[01] class: sp800-53a prose: physical access restrictions associated with changes to the system are defined and documented; + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_obj-2 name: assessment-objective props: @@ -14518,6 +15933,9 @@ catalog: value: CM-05[02] class: sp800-53a prose: physical access restrictions associated with changes to the system are approved; + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_obj-3 name: assessment-objective props: @@ -14525,6 +15943,9 @@ catalog: value: CM-05[03] class: sp800-53a prose: physical access restrictions associated with changes to the system are enforced; + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_obj-4 name: assessment-objective props: @@ -14532,6 +15953,9 @@ catalog: value: CM-05[04] class: sp800-53a prose: logical access restrictions associated with changes to the system are defined and documented; + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_obj-5 name: assessment-objective props: @@ -14539,6 +15963,9 @@ catalog: value: CM-05[05] class: sp800-53a prose: logical access restrictions associated with changes to the system are approved; + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_obj-6 name: assessment-objective props: @@ -14546,6 +15973,12 @@ catalog: value: CM-05[06] class: sp800-53a prose: logical access restrictions associated with changes to the system are enforced. + links: + - href: '#cm-5_smt' + rel: assessment-for + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_asm-examine name: assessment-method props: @@ -14784,6 +16217,9 @@ catalog: value: CM-06a. class: sp800-53a prose: 'configuration settings that reflect the most restrictive mode consistent with operational requirements are established and documented for components employed within the system using {{ insert: param, cm-06_odp.01 }};' + links: + - href: '#cm-6_smt.a' + rel: assessment-for - id: cm-6_obj.b name: assessment-objective props: @@ -14791,6 +16227,9 @@ catalog: value: CM-06b. class: sp800-53a prose: the configuration settings documented in CM-06a are implemented; + links: + - href: '#cm-6_smt.b' + rel: assessment-for - id: cm-6_obj.c name: assessment-objective props: @@ -14805,6 +16244,9 @@ catalog: value: CM-06c.[01] class: sp800-53a prose: 'any deviations from established configuration settings for {{ insert: param, cm-06_odp.02 }} are identified and documented based on {{ insert: param, cm-06_odp.03 }};' + links: + - href: '#cm-6_smt.c' + rel: assessment-for - id: cm-6_obj.c-2 name: assessment-objective props: @@ -14812,6 +16254,12 @@ catalog: value: CM-06c.[02] class: sp800-53a prose: 'any deviations from established configuration settings for {{ insert: param, cm-06_odp.02 }} are approved;' + links: + - href: '#cm-6_smt.c' + rel: assessment-for + links: + - href: '#cm-6_smt.c' + rel: assessment-for - id: cm-6_obj.d name: assessment-objective props: @@ -14826,6 +16274,9 @@ catalog: value: CM-06d.[01] class: sp800-53a prose: changes to the configuration settings are monitored in accordance with organizational policies and procedures; + links: + - href: '#cm-6_smt.d' + rel: assessment-for - id: cm-6_obj.d-2 name: assessment-objective props: @@ -14833,6 +16284,15 @@ catalog: value: CM-06d.[02] class: sp800-53a prose: changes to the configuration settings are controlled in accordance with organizational policies and procedures. + links: + - href: '#cm-6_smt.d' + rel: assessment-for + links: + - href: '#cm-6_smt.d' + rel: assessment-for + links: + - href: '#cm-6_smt' + rel: assessment-for - id: cm-6_asm-examine name: assessment-method props: @@ -15075,6 +16535,9 @@ catalog: value: CM-07a. class: sp800-53a prose: 'the system is configured to provide only {{ insert: param, cm-07_odp.01 }};' + links: + - href: '#cm-7_smt.a' + rel: assessment-for - id: cm-7_obj.b name: assessment-objective props: @@ -15089,6 +16552,9 @@ catalog: value: CM-07b.[01] class: sp800-53a prose: 'the use of {{ insert: param, cm-07_odp.02 }} is prohibited or restricted;' + links: + - href: '#cm-7_smt.b' + rel: assessment-for - id: cm-7_obj.b-2 name: assessment-objective props: @@ -15096,6 +16562,9 @@ catalog: value: CM-07b.[02] class: sp800-53a prose: 'the use of {{ insert: param, cm-07_odp.03 }} is prohibited or restricted;' + links: + - href: '#cm-7_smt.b' + rel: assessment-for - id: cm-7_obj.b-3 name: assessment-objective props: @@ -15103,6 +16572,9 @@ catalog: value: CM-07b.[03] class: sp800-53a prose: 'the use of {{ insert: param, cm-07_odp.04 }} is prohibited or restricted;' + links: + - href: '#cm-7_smt.b' + rel: assessment-for - id: cm-7_obj.b-4 name: assessment-objective props: @@ -15110,6 +16582,9 @@ catalog: value: CM-07b.[04] class: sp800-53a prose: 'the use of {{ insert: param, cm-07_odp.05 }} is prohibited or restricted;' + links: + - href: '#cm-7_smt.b' + rel: assessment-for - id: cm-7_obj.b-5 name: assessment-objective props: @@ -15117,6 +16592,15 @@ catalog: value: CM-07b.[05] class: sp800-53a prose: 'the use of {{ insert: param, cm-07_odp.06 }} is prohibited or restricted.' + links: + - href: '#cm-7_smt.b' + rel: assessment-for + links: + - href: '#cm-7_smt.b' + rel: assessment-for + links: + - href: '#cm-7_smt' + rel: assessment-for - id: cm-7_asm-examine name: assessment-method props: @@ -15305,6 +16789,9 @@ catalog: value: CM-07(01)(a) class: sp800-53a prose: 'the system is reviewed {{ insert: param, cm-07.01_odp.01 }} to identify unnecessary and/or non-secure functions, ports, protocols, software, and services:' + links: + - href: '#cm-7.1_smt.a' + rel: assessment-for - id: cm-7.1_obj.b name: assessment-objective props: @@ -15319,6 +16806,9 @@ catalog: value: CM-07(01)(b)[01] class: sp800-53a prose: ' {{ insert: param, cm-07.01_odp.02 }} deemed to be unnecessary and/or non-secure are disabled or removed;' + links: + - href: '#cm-7.1_smt.b' + rel: assessment-for - id: cm-7.1_obj.b-2 name: assessment-objective props: @@ -15326,6 +16816,9 @@ catalog: value: CM-07(01)(b)[02] class: sp800-53a prose: ' {{ insert: param, cm-07.01_odp.03 }} deemed to be unnecessary and/or non-secure are disabled or removed;' + links: + - href: '#cm-7.1_smt.b' + rel: assessment-for - id: cm-7.1_obj.b-3 name: assessment-objective props: @@ -15333,6 +16826,9 @@ catalog: value: CM-07(01)(b)[03] class: sp800-53a prose: ' {{ insert: param, cm-07.01_odp.04 }} deemed to be unnecessary and/or non-secure are disabled or removed;' + links: + - href: '#cm-7.1_smt.b' + rel: assessment-for - id: cm-7.1_obj.b-4 name: assessment-objective props: @@ -15340,6 +16836,9 @@ catalog: value: CM-07(01)(b)[04] class: sp800-53a prose: ' {{ insert: param, cm-07.01_odp.05 }} deemed to be unnecessary and/or non-secure is disabled or removed;' + links: + - href: '#cm-7.1_smt.b' + rel: assessment-for - id: cm-7.1_obj.b-5 name: assessment-objective props: @@ -15347,6 +16846,15 @@ catalog: value: CM-07(01)(b)[05] class: sp800-53a prose: ' {{ insert: param, cm-07.01_odp.06 }} deemed to be unnecessary and/or non-secure are disabled or removed.' + links: + - href: '#cm-7.1_smt.b' + rel: assessment-for + links: + - href: '#cm-7.1_smt.b' + rel: assessment-for + links: + - href: '#cm-7.1_smt' + rel: assessment-for - id: cm-7.1_asm-examine name: assessment-method props: @@ -15478,6 +16986,9 @@ catalog: value: CM-07(02) class: sp800-53a prose: 'program execution is prevented in accordance with {{ insert: param, cm-07.02_odp.01 }}.' + links: + - href: '#cm-7.2_smt' + rel: assessment-for - id: cm-7.2_asm-examine name: assessment-method props: @@ -15650,6 +17161,9 @@ catalog: value: CM-07(05)(a) class: sp800-53a prose: ' {{ insert: param, cm-07.05_odp.01 }} are identified;' + links: + - href: '#cm-7.5_smt.a' + rel: assessment-for - id: cm-7.5_obj.b name: assessment-objective props: @@ -15657,6 +17171,9 @@ catalog: value: CM-07(05)(b) class: sp800-53a prose: a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the system is employed; + links: + - href: '#cm-7.5_smt.b' + rel: assessment-for - id: cm-7.5_obj.c name: assessment-objective props: @@ -15664,6 +17181,12 @@ catalog: value: CM-07(05)(c) class: sp800-53a prose: 'the list of authorized software programs is reviewed and updated {{ insert: param, cm-07.05_odp.02 }}.' + links: + - href: '#cm-7.5_smt.c' + rel: assessment-for + links: + - href: '#cm-7.5_smt' + rel: assessment-for - id: cm-7.5_asm-examine name: assessment-method props: @@ -15899,6 +17422,9 @@ catalog: value: CM-08a.01 class: sp800-53a prose: an inventory of system components that accurately reflects the system is developed and documented; + links: + - href: '#cm-8_smt.a.1' + rel: assessment-for - id: cm-8_obj.a.2 name: assessment-objective props: @@ -15906,6 +17432,9 @@ catalog: value: CM-08a.02 class: sp800-53a prose: an inventory of system components that includes all components within the system is developed and documented; + links: + - href: '#cm-8_smt.a.2' + rel: assessment-for - id: cm-8_obj.a.3 name: assessment-objective props: @@ -15913,6 +17442,9 @@ catalog: value: CM-08a.03 class: sp800-53a prose: an inventory of system components that does not include duplicate accounting of components or components assigned to any other system is developed and documented; + links: + - href: '#cm-8_smt.a.3' + rel: assessment-for - id: cm-8_obj.a.4 name: assessment-objective props: @@ -15920,6 +17452,9 @@ catalog: value: CM-08a.04 class: sp800-53a prose: an inventory of system components that is at the level of granularity deemed necessary for tracking and reporting is developed and documented; + links: + - href: '#cm-8_smt.a.4' + rel: assessment-for - id: cm-8_obj.a.5 name: assessment-objective props: @@ -15927,6 +17462,12 @@ catalog: value: CM-08a.05 class: sp800-53a prose: 'an inventory of system components that includes {{ insert: param, cm-08_odp.01 }} is developed and documented;' + links: + - href: '#cm-8_smt.a.5' + rel: assessment-for + links: + - href: '#cm-8_smt.a' + rel: assessment-for - id: cm-8_obj.b name: assessment-objective props: @@ -15934,6 +17475,12 @@ catalog: value: CM-08b. class: sp800-53a prose: 'the system component inventory is reviewed and updated {{ insert: param, cm-08_odp.02 }}.' + links: + - href: '#cm-8_smt.b' + rel: assessment-for + links: + - href: '#cm-8_smt' + rel: assessment-for - id: cm-8_asm-examine name: assessment-method props: @@ -16039,6 +17586,9 @@ catalog: value: CM-08(01)[01] class: sp800-53a prose: the inventory of system components is updated as part of component installations; + links: + - href: '#cm-8.1_smt' + rel: assessment-for - id: cm-8.1_obj-2 name: assessment-objective props: @@ -16046,6 +17596,9 @@ catalog: value: CM-08(01)[02] class: sp800-53a prose: the inventory of system components is updated as part of component removals; + links: + - href: '#cm-8.1_smt' + rel: assessment-for - id: cm-8.1_obj-3 name: assessment-objective props: @@ -16053,6 +17606,12 @@ catalog: value: CM-08(01)[03] class: sp800-53a prose: the inventory of system components is updated as part of system updates. + links: + - href: '#cm-8.1_smt' + rel: assessment-for + links: + - href: '#cm-8.1_smt' + rel: assessment-for - id: cm-8.1_asm-examine name: assessment-method props: @@ -16266,6 +17825,9 @@ catalog: value: CM-08(03)(a)[01] class: sp800-53a prose: 'the presence of unauthorized hardware within the system is detected using {{ insert: param, cm-08.03_odp.01 }} {{ insert: param, cm-08.03_odp.04 }};' + links: + - href: '#cm-8.3_smt.a' + rel: assessment-for - id: cm-8.3_obj.a-2 name: assessment-objective props: @@ -16273,6 +17835,9 @@ catalog: value: CM-08(03)(a)[02] class: sp800-53a prose: 'the presence of unauthorized software within the system is detected using {{ insert: param, cm-08.03_odp.02 }} {{ insert: param, cm-08.03_odp.04 }};' + links: + - href: '#cm-8.3_smt.a' + rel: assessment-for - id: cm-8.3_obj.a-3 name: assessment-objective props: @@ -16280,6 +17845,12 @@ catalog: value: CM-08(03)(a)[03] class: sp800-53a prose: 'the presence of unauthorized firmware within the system is detected using {{ insert: param, cm-08.03_odp.03 }} {{ insert: param, cm-08.03_odp.04 }};' + links: + - href: '#cm-8.3_smt.a' + rel: assessment-for + links: + - href: '#cm-8.3_smt.a' + rel: assessment-for - id: cm-8.3_obj.b name: assessment-objective props: @@ -16294,6 +17865,9 @@ catalog: value: CM-08(03)(b)[01] class: sp800-53a prose: ' {{ insert: param, cm-08.03_odp.05 }} are taken when unauthorized hardware is detected;' + links: + - href: '#cm-8.3_smt.b' + rel: assessment-for - id: cm-8.3_obj.b-2 name: assessment-objective props: @@ -16301,6 +17875,9 @@ catalog: value: CM-08(03)(b)[02] class: sp800-53a prose: ' {{ insert: param, cm-08.03_odp.05 }} are taken when unauthorized software is detected;' + links: + - href: '#cm-8.3_smt.b' + rel: assessment-for - id: cm-8.3_obj.b-3 name: assessment-objective props: @@ -16308,6 +17885,15 @@ catalog: value: CM-08(03)(b)[03] class: sp800-53a prose: ' {{ insert: param, cm-08.03_odp.05 }} are taken when unauthorized firmware is detected.' + links: + - href: '#cm-8.3_smt.b' + rel: assessment-for + links: + - href: '#cm-8.3_smt.b' + rel: assessment-for + links: + - href: '#cm-8.3_smt' + rel: assessment-for - id: cm-8.3_asm-examine name: assessment-method props: @@ -16488,6 +18074,9 @@ catalog: value: CM-09[01] class: sp800-53a prose: a configuration management plan for the system is developed and documented; + links: + - href: '#cm-9_smt' + rel: assessment-for - id: cm-9_obj-2 name: assessment-objective props: @@ -16495,6 +18084,9 @@ catalog: value: CM-09[02] class: sp800-53a prose: a configuration management plan for the system is implemented; + links: + - href: '#cm-9_smt' + rel: assessment-for - id: cm-9_obj.a name: assessment-objective props: @@ -16509,6 +18101,9 @@ catalog: value: CM-09a.[01] class: sp800-53a prose: the configuration management plan addresses roles; + links: + - href: '#cm-9_smt.a' + rel: assessment-for - id: cm-9_obj.a-2 name: assessment-objective props: @@ -16516,6 +18111,9 @@ catalog: value: CM-09a.[02] class: sp800-53a prose: the configuration management plan addresses responsibilities; + links: + - href: '#cm-9_smt.a' + rel: assessment-for - id: cm-9_obj.a-3 name: assessment-objective props: @@ -16523,6 +18121,12 @@ catalog: value: CM-09a.[03] class: sp800-53a prose: the configuration management plan addresses configuration management processes and procedures; + links: + - href: '#cm-9_smt.a' + rel: assessment-for + links: + - href: '#cm-9_smt.a' + rel: assessment-for - id: cm-9_obj.b name: assessment-objective props: @@ -16537,6 +18141,9 @@ catalog: value: CM-09b.[01] class: sp800-53a prose: the configuration management plan establishes a process for identifying configuration items throughout the system development life cycle; + links: + - href: '#cm-9_smt.b' + rel: assessment-for - id: cm-9_obj.b-2 name: assessment-objective props: @@ -16544,6 +18151,12 @@ catalog: value: CM-09b.[02] class: sp800-53a prose: the configuration management plan establishes a process for managing the configuration of the configuration items; + links: + - href: '#cm-9_smt.b' + rel: assessment-for + links: + - href: '#cm-9_smt.b' + rel: assessment-for - id: cm-9_obj.c name: assessment-objective props: @@ -16558,6 +18171,9 @@ catalog: value: CM-09c.[01] class: sp800-53a prose: the configuration management plan defines the configuration items for the system; + links: + - href: '#cm-9_smt.c' + rel: assessment-for - id: cm-9_obj.c-2 name: assessment-objective props: @@ -16565,6 +18181,12 @@ catalog: value: CM-09c.[02] class: sp800-53a prose: the configuration management plan places the configuration items under configuration management; + links: + - href: '#cm-9_smt.c' + rel: assessment-for + links: + - href: '#cm-9_smt.c' + rel: assessment-for - id: cm-9_obj.d name: assessment-objective props: @@ -16572,6 +18194,9 @@ catalog: value: CM-09d. class: sp800-53a prose: 'the configuration management plan is reviewed and approved by {{ insert: param, cm-09_odp }};' + links: + - href: '#cm-9_smt.d' + rel: assessment-for - id: cm-9_obj.e name: assessment-objective props: @@ -16586,6 +18211,9 @@ catalog: value: CM-09e.[01] class: sp800-53a prose: the configuration management plan is protected from unauthorized disclosure; + links: + - href: '#cm-9_smt.e' + rel: assessment-for - id: cm-9_obj.e-2 name: assessment-objective props: @@ -16593,6 +18221,15 @@ catalog: value: CM-09e.[02] class: sp800-53a prose: the configuration management plan is protected from unauthorized modification. + links: + - href: '#cm-9_smt.e' + rel: assessment-for + links: + - href: '#cm-9_smt.e' + rel: assessment-for + links: + - href: '#cm-9_smt' + rel: assessment-for - id: cm-9_asm-examine name: assessment-method props: @@ -16728,6 +18365,9 @@ catalog: value: CM-10a. class: sp800-53a prose: software and associated documentation are used in accordance with contract agreements and copyright laws; + links: + - href: '#cm-10_smt.a' + rel: assessment-for - id: cm-10_obj.b name: assessment-objective props: @@ -16735,6 +18375,9 @@ catalog: value: CM-10b. class: sp800-53a prose: the use of software and associated documentation protected by quantity licenses is tracked to control copying and distribution; + links: + - href: '#cm-10_smt.b' + rel: assessment-for - id: cm-10_obj.c name: assessment-objective props: @@ -16742,6 +18385,12 @@ catalog: value: CM-10c. class: sp800-53a prose: the use of peer-to-peer file sharing technology is controlled and documented to ensure that peer-to-peer file sharing is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work. + links: + - href: '#cm-10_smt.c' + rel: assessment-for + links: + - href: '#cm-10_smt' + rel: assessment-for - id: cm-10_asm-examine name: assessment-method props: @@ -16918,6 +18567,9 @@ catalog: value: CM-11a. class: sp800-53a prose: ' {{ insert: param, cm-11_odp.01 }} governing the installation of software by users are established;' + links: + - href: '#cm-11_smt.a' + rel: assessment-for - id: cm-11_obj.b name: assessment-objective props: @@ -16925,6 +18577,9 @@ catalog: value: CM-11b. class: sp800-53a prose: 'software installation policies are enforced through {{ insert: param, cm-11_odp.02 }};' + links: + - href: '#cm-11_smt.b' + rel: assessment-for - id: cm-11_obj.c name: assessment-objective props: @@ -16932,6 +18587,12 @@ catalog: value: CM-11c. class: sp800-53a prose: 'compliance with {{ insert: param, cm-11_odp.01 }} is monitored {{ insert: param, cm-11_odp.03 }}.' + links: + - href: '#cm-11_smt.c' + rel: assessment-for + links: + - href: '#cm-11_smt' + rel: assessment-for - id: cm-11_asm-examine name: assessment-method props: @@ -17118,6 +18779,9 @@ catalog: value: CM-12a.[01] class: sp800-53a prose: 'the location of {{ insert: param, cm-12_odp }} is identified and documented;' + links: + - href: '#cm-12_smt.a' + rel: assessment-for - id: cm-12_obj.a-2 name: assessment-objective props: @@ -17125,6 +18789,9 @@ catalog: value: CM-12a.[02] class: sp800-53a prose: 'the specific system components on which {{ insert: param, cm-12_odp }} is processed are identified and documented;' + links: + - href: '#cm-12_smt.a' + rel: assessment-for - id: cm-12_obj.a-3 name: assessment-objective props: @@ -17132,6 +18799,12 @@ catalog: value: CM-12a.[03] class: sp800-53a prose: 'the specific system components on which {{ insert: param, cm-12_odp }} is stored are identified and documented;' + links: + - href: '#cm-12_smt.a' + rel: assessment-for + links: + - href: '#cm-12_smt.a' + rel: assessment-for - id: cm-12_obj.b name: assessment-objective props: @@ -17146,6 +18819,9 @@ catalog: value: CM-12b.[01] class: sp800-53a prose: 'the users who have access to the system and system components where {{ insert: param, cm-12_odp }} is processed are identified and documented;' + links: + - href: '#cm-12_smt.b' + rel: assessment-for - id: cm-12_obj.b-2 name: assessment-objective props: @@ -17153,6 +18829,12 @@ catalog: value: CM-12b.[02] class: sp800-53a prose: 'the users who have access to the system and system components where {{ insert: param, cm-12_odp }} is stored are identified and documented;' + links: + - href: '#cm-12_smt.b' + rel: assessment-for + links: + - href: '#cm-12_smt.b' + rel: assessment-for - id: cm-12_obj.c name: assessment-objective props: @@ -17167,6 +18849,9 @@ catalog: value: CM-12c.[01] class: sp800-53a prose: 'changes to the location (i.e., system or system components) where {{ insert: param, cm-12_odp }} is processed are documented;' + links: + - href: '#cm-12_smt.c' + rel: assessment-for - id: cm-12_obj.c-2 name: assessment-objective props: @@ -17174,6 +18859,15 @@ catalog: value: CM-12c.[02] class: sp800-53a prose: 'changes to the location (i.e., system or system components) where {{ insert: param, cm-12_odp }} is stored are documented.' + links: + - href: '#cm-12_smt.c' + rel: assessment-for + links: + - href: '#cm-12_smt.c' + rel: assessment-for + links: + - href: '#cm-12_smt' + rel: assessment-for - id: cm-12_asm-examine name: assessment-method props: @@ -17305,6 +18999,9 @@ catalog: value: CM-12(01) class: sp800-53a prose: 'automated tools are used to identify {{ insert: param, cm-12.01_odp.01 }} on {{ insert: param, cm-12.01_odp.02 }} to ensure that controls are in place to protect organizational information and individual privacy.' + links: + - href: '#cm-12.1_smt' + rel: assessment-for - id: cm-12.1_asm-examine name: assessment-method props: @@ -17588,6 +19285,9 @@ catalog: value: CP-01a.[01] class: sp800-53a prose: a contingency planning policy is developed and documented; + links: + - href: '#cp-1_smt.a' + rel: assessment-for - id: cp-1_obj.a-2 name: assessment-objective props: @@ -17595,6 +19295,9 @@ catalog: value: CP-01a.[02] class: sp800-53a prose: 'the contingency planning policy is disseminated to {{ insert: param, cp-01_odp.01 }};' + links: + - href: '#cp-1_smt.a' + rel: assessment-for - id: cp-1_obj.a-3 name: assessment-objective props: @@ -17602,6 +19305,9 @@ catalog: value: CP-01a.[03] class: sp800-53a prose: contingency planning procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls are developed and documented; + links: + - href: '#cp-1_smt.a' + rel: assessment-for - id: cp-1_obj.a-4 name: assessment-objective props: @@ -17609,6 +19315,9 @@ catalog: value: CP-01a.[04] class: sp800-53a prose: 'the contingency planning procedures are disseminated to {{ insert: param, cp-01_odp.02 }};' + links: + - href: '#cp-1_smt.a' + rel: assessment-for - id: cp-1_obj.a.1 name: assessment-objective props: @@ -17630,6 +19339,9 @@ catalog: value: CP-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses purpose;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-2 name: assessment-objective props: @@ -17637,6 +19349,9 @@ catalog: value: CP-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses scope;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-3 name: assessment-objective props: @@ -17644,6 +19359,9 @@ catalog: value: CP-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses roles;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-4 name: assessment-objective props: @@ -17651,6 +19369,9 @@ catalog: value: CP-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses responsibilities;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-5 name: assessment-objective props: @@ -17658,6 +19379,9 @@ catalog: value: CP-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses management commitment;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-6 name: assessment-objective props: @@ -17665,6 +19389,9 @@ catalog: value: CP-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses coordination among organizational entities;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-7 name: assessment-objective props: @@ -17672,6 +19399,12 @@ catalog: value: CP-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses compliance;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.b name: assessment-objective props: @@ -17679,6 +19412,15 @@ catalog: value: CP-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#cp-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#cp-1_smt.a.1' + rel: assessment-for + links: + - href: '#cp-1_smt.a' + rel: assessment-for - id: cp-1_obj.b name: assessment-objective props: @@ -17686,6 +19428,9 @@ catalog: value: CP-01b. class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the contingency planning policy and procedures;' + links: + - href: '#cp-1_smt.b' + rel: assessment-for - id: cp-1_obj.c name: assessment-objective props: @@ -17707,6 +19452,9 @@ catalog: value: CP-01c.01[01] class: sp800-53a prose: 'the current contingency planning policy is reviewed and updated {{ insert: param, cp-01_odp.05 }};' + links: + - href: '#cp-1_smt.c.1' + rel: assessment-for - id: cp-1_obj.c.1-2 name: assessment-objective props: @@ -17714,6 +19462,12 @@ catalog: value: CP-01c.01[02] class: sp800-53a prose: 'the current contingency planning policy is reviewed and updated following {{ insert: param, cp-01_odp.06 }};' + links: + - href: '#cp-1_smt.c.1' + rel: assessment-for + links: + - href: '#cp-1_smt.c.1' + rel: assessment-for - id: cp-1_obj.c.2 name: assessment-objective props: @@ -17728,6 +19482,9 @@ catalog: value: CP-01c.02[01] class: sp800-53a prose: 'the current contingency planning procedures are reviewed and updated {{ insert: param, cp-01_odp.07 }};' + links: + - href: '#cp-1_smt.c.2' + rel: assessment-for - id: cp-1_obj.c.2-2 name: assessment-objective props: @@ -17735,6 +19492,18 @@ catalog: value: CP-01c.02[02] class: sp800-53a prose: 'the current contingency planning procedures are reviewed and updated following {{ insert: param, cp-01_odp.08 }}.' + links: + - href: '#cp-1_smt.c.2' + rel: assessment-for + links: + - href: '#cp-1_smt.c.2' + rel: assessment-for + links: + - href: '#cp-1_smt.c' + rel: assessment-for + links: + - href: '#cp-1_smt' + rel: assessment-for - id: cp-1_asm-examine name: assessment-method props: @@ -18046,6 +19815,9 @@ catalog: value: CP-02a.01 class: sp800-53a prose: a contingency plan for the system is developed that identifies essential mission and business functions and associated contingency requirements; + links: + - href: '#cp-2_smt.a.1' + rel: assessment-for - id: cp-2_obj.a.2 name: assessment-objective props: @@ -18060,6 +19832,9 @@ catalog: value: CP-02a.02[01] class: sp800-53a prose: a contingency plan for the system is developed that provides recovery objectives; + links: + - href: '#cp-2_smt.a.2' + rel: assessment-for - id: cp-2_obj.a.2-2 name: assessment-objective props: @@ -18067,6 +19842,9 @@ catalog: value: CP-02a.02[02] class: sp800-53a prose: a contingency plan for the system is developed that provides restoration priorities; + links: + - href: '#cp-2_smt.a.2' + rel: assessment-for - id: cp-2_obj.a.2-3 name: assessment-objective props: @@ -18074,6 +19852,12 @@ catalog: value: CP-02a.02[03] class: sp800-53a prose: a contingency plan for the system is developed that provides metrics; + links: + - href: '#cp-2_smt.a.2' + rel: assessment-for + links: + - href: '#cp-2_smt.a.2' + rel: assessment-for - id: cp-2_obj.a.3 name: assessment-objective props: @@ -18088,6 +19872,9 @@ catalog: value: CP-02a.03[01] class: sp800-53a prose: a contingency plan for the system is developed that addresses contingency roles; + links: + - href: '#cp-2_smt.a.3' + rel: assessment-for - id: cp-2_obj.a.3-2 name: assessment-objective props: @@ -18095,6 +19882,9 @@ catalog: value: CP-02a.03[02] class: sp800-53a prose: a contingency plan for the system is developed that addresses contingency responsibilities; + links: + - href: '#cp-2_smt.a.3' + rel: assessment-for - id: cp-2_obj.a.3-3 name: assessment-objective props: @@ -18102,6 +19892,12 @@ catalog: value: CP-02a.03[03] class: sp800-53a prose: a contingency plan for the system is developed that addresses assigned individuals with contact information; + links: + - href: '#cp-2_smt.a.3' + rel: assessment-for + links: + - href: '#cp-2_smt.a.3' + rel: assessment-for - id: cp-2_obj.a.4 name: assessment-objective props: @@ -18109,6 +19905,9 @@ catalog: value: CP-02a.04 class: sp800-53a prose: a contingency plan for the system is developed that addresses maintaining essential mission and business functions despite a system disruption, compromise, or failure; + links: + - href: '#cp-2_smt.a.4' + rel: assessment-for - id: cp-2_obj.a.5 name: assessment-objective props: @@ -18116,6 +19915,9 @@ catalog: value: CP-02a.05 class: sp800-53a prose: a contingency plan for the system is developed that addresses eventual, full-system restoration without deterioration of the controls originally planned and implemented; + links: + - href: '#cp-2_smt.a.5' + rel: assessment-for - id: cp-2_obj.a.6 name: assessment-objective props: @@ -18123,6 +19925,9 @@ catalog: value: CP-02a.06 class: sp800-53a prose: a contingency plan for the system is developed that addresses the sharing of contingency information; + links: + - href: '#cp-2_smt.a.6' + rel: assessment-for - id: cp-2_obj.a.7 name: assessment-objective props: @@ -18137,6 +19942,9 @@ catalog: value: CP-02a.07[01] class: sp800-53a prose: 'a contingency plan for the system is developed that is reviewed by {{ insert: param, cp-02_odp.01 }};' + links: + - href: '#cp-2_smt.a.7' + rel: assessment-for - id: cp-2_obj.a.7-2 name: assessment-objective props: @@ -18144,6 +19952,15 @@ catalog: value: CP-02a.07[02] class: sp800-53a prose: 'a contingency plan for the system is developed that is approved by {{ insert: param, cp-02_odp.02 }};' + links: + - href: '#cp-2_smt.a.7' + rel: assessment-for + links: + - href: '#cp-2_smt.a.7' + rel: assessment-for + links: + - href: '#cp-2_smt.a' + rel: assessment-for - id: cp-2_obj.b name: assessment-objective props: @@ -18158,6 +19975,9 @@ catalog: value: CP-02b.[01] class: sp800-53a prose: 'copies of the contingency plan are distributed to {{ insert: param, cp-02_odp.03 }};' + links: + - href: '#cp-2_smt.b' + rel: assessment-for - id: cp-2_obj.b-2 name: assessment-objective props: @@ -18165,6 +19985,12 @@ catalog: value: CP-02b.[02] class: sp800-53a prose: 'copies of the contingency plan are distributed to {{ insert: param, cp-02_odp.04 }};' + links: + - href: '#cp-2_smt.b' + rel: assessment-for + links: + - href: '#cp-2_smt.b' + rel: assessment-for - id: cp-2_obj.c name: assessment-objective props: @@ -18172,6 +19998,9 @@ catalog: value: CP-02c. class: sp800-53a prose: contingency planning activities are coordinated with incident handling activities; + links: + - href: '#cp-2_smt.c' + rel: assessment-for - id: cp-2_obj.d name: assessment-objective props: @@ -18179,6 +20008,9 @@ catalog: value: CP-02d. class: sp800-53a prose: 'the contingency plan for the system is reviewed {{ insert: param, cp-02_odp.05 }};' + links: + - href: '#cp-2_smt.d' + rel: assessment-for - id: cp-2_obj.e name: assessment-objective props: @@ -18193,6 +20025,9 @@ catalog: value: CP-02e.[01] class: sp800-53a prose: the contingency plan is updated to address changes to the organization, system, or environment of operation; + links: + - href: '#cp-2_smt.e' + rel: assessment-for - id: cp-2_obj.e-2 name: assessment-objective props: @@ -18200,6 +20035,12 @@ catalog: value: CP-02e.[02] class: sp800-53a prose: the contingency plan is updated to address problems encountered during contingency plan implementation, execution, or testing; + links: + - href: '#cp-2_smt.e' + rel: assessment-for + links: + - href: '#cp-2_smt.e' + rel: assessment-for - id: cp-2_obj.f name: assessment-objective props: @@ -18214,6 +20055,9 @@ catalog: value: CP-02f.[01] class: sp800-53a prose: 'contingency plan changes are communicated to {{ insert: param, cp-02_odp.06 }};' + links: + - href: '#cp-2_smt.f' + rel: assessment-for - id: cp-2_obj.f-2 name: assessment-objective props: @@ -18221,6 +20065,12 @@ catalog: value: CP-02f.[02] class: sp800-53a prose: 'contingency plan changes are communicated to {{ insert: param, cp-02_odp.07 }};' + links: + - href: '#cp-2_smt.f' + rel: assessment-for + links: + - href: '#cp-2_smt.f' + rel: assessment-for - id: cp-2_obj.g name: assessment-objective props: @@ -18235,6 +20085,9 @@ catalog: value: CP-02g.[01] class: sp800-53a prose: lessons learned from contingency plan testing or actual contingency activities are incorporated into contingency testing; + links: + - href: '#cp-2_smt.g' + rel: assessment-for - id: cp-2_obj.g-2 name: assessment-objective props: @@ -18242,6 +20095,12 @@ catalog: value: CP-02g.[02] class: sp800-53a prose: lessons learned from contingency plan training or actual contingency activities are incorporated into contingency testing and training; + links: + - href: '#cp-2_smt.g' + rel: assessment-for + links: + - href: '#cp-2_smt.g' + rel: assessment-for - id: cp-2_obj.h name: assessment-objective props: @@ -18256,6 +20115,9 @@ catalog: value: CP-02h.[01] class: sp800-53a prose: the contingency plan is protected from unauthorized disclosure; + links: + - href: '#cp-2_smt.h' + rel: assessment-for - id: cp-2_obj.h-2 name: assessment-objective props: @@ -18263,6 +20125,15 @@ catalog: value: CP-02h.[02] class: sp800-53a prose: the contingency plan is protected from unauthorized modification. + links: + - href: '#cp-2_smt.h' + rel: assessment-for + links: + - href: '#cp-2_smt.h' + rel: assessment-for + links: + - href: '#cp-2_smt' + rel: assessment-for - id: cp-2_asm-examine name: assessment-method props: @@ -18352,6 +20223,9 @@ catalog: value: CP-02(01) class: sp800-53a prose: contingency plan development is coordinated with organizational elements responsible for related plans. + links: + - href: '#cp-2.1_smt' + rel: assessment-for - id: cp-2.1_asm-examine name: assessment-method props: @@ -18459,6 +20333,9 @@ catalog: value: CP-02(03) class: sp800-53a prose: 'the resumption of {{ insert: param, cp-02.03_odp.01 }} mission and business functions are planned for within {{ insert: param, cp-02.03_odp.02 }} of contingency plan activation.' + links: + - href: '#cp-2.3_smt' + rel: assessment-for - id: cp-2.3_asm-examine name: assessment-method props: @@ -18564,6 +20441,9 @@ catalog: value: CP-02(08) class: sp800-53a prose: 'critical system assets supporting {{ insert: param, cp-02.08_odp }} mission and business functions are identified.' + links: + - href: '#cp-2.8_smt' + rel: assessment-for - id: cp-2.8_asm-examine name: assessment-method props: @@ -18742,6 +20622,9 @@ catalog: value: CP-03a.01 class: sp800-53a prose: 'contingency training is provided to system users consistent with assigned roles and responsibilities within {{ insert: param, cp-03_odp.01 }} of assuming a contingency role or responsibility;' + links: + - href: '#cp-3_smt.a.1' + rel: assessment-for - id: cp-3_obj.a.2 name: assessment-objective props: @@ -18749,6 +20632,9 @@ catalog: value: CP-03a.02 class: sp800-53a prose: contingency training is provided to system users consistent with assigned roles and responsibilities when required by system changes; + links: + - href: '#cp-3_smt.a.2' + rel: assessment-for - id: cp-3_obj.a.3 name: assessment-objective props: @@ -18756,6 +20642,12 @@ catalog: value: CP-03a.03 class: sp800-53a prose: 'contingency training is provided to system users consistent with assigned roles and responsibilities {{ insert: param, cp-03_odp.02 }} thereafter;' + links: + - href: '#cp-3_smt.a.3' + rel: assessment-for + links: + - href: '#cp-3_smt.a' + rel: assessment-for - id: cp-3_obj.b name: assessment-objective props: @@ -18770,6 +20662,9 @@ catalog: value: CP-03b.[01] class: sp800-53a prose: 'the contingency plan training content is reviewed and updated {{ insert: param, cp-03_odp.03 }};' + links: + - href: '#cp-3_smt.b' + rel: assessment-for - id: cp-3_obj.b-2 name: assessment-objective props: @@ -18777,6 +20672,15 @@ catalog: value: CP-03b.[02] class: sp800-53a prose: 'the contingency plan training content is reviewed and updated following {{ insert: param, cp-03_odp.04 }}.' + links: + - href: '#cp-3_smt.b' + rel: assessment-for + links: + - href: '#cp-3_smt.b' + rel: assessment-for + links: + - href: '#cp-3_smt' + rel: assessment-for - id: cp-3_asm-examine name: assessment-method props: @@ -18959,6 +20863,9 @@ catalog: value: CP-04a.[01] class: sp800-53a prose: 'the contingency plan for the system is tested {{ insert: param, cp-04_odp.01 }};' + links: + - href: '#cp-4_smt.a' + rel: assessment-for - id: cp-4_obj.a-2 name: assessment-objective props: @@ -18966,6 +20873,9 @@ catalog: value: CP-04a.[02] class: sp800-53a prose: ' {{ insert: param, cp-04_odp.02 }} are used to determine the effectiveness of the plan;' + links: + - href: '#cp-4_smt.a' + rel: assessment-for - id: cp-4_obj.a-3 name: assessment-objective props: @@ -18973,6 +20883,12 @@ catalog: value: CP-04a.[03] class: sp800-53a prose: ' {{ insert: param, cp-04_odp.03 }} are used to determine the readiness to execute the plan;' + links: + - href: '#cp-4_smt.a' + rel: assessment-for + links: + - href: '#cp-4_smt.a' + rel: assessment-for - id: cp-4_obj.b name: assessment-objective props: @@ -18980,6 +20896,9 @@ catalog: value: CP-04b. class: sp800-53a prose: the contingency plan test results are reviewed; + links: + - href: '#cp-4_smt.b' + rel: assessment-for - id: cp-4_obj.c name: assessment-objective props: @@ -18987,6 +20906,12 @@ catalog: value: CP-04c. class: sp800-53a prose: corrective actions are initiated, if needed. + links: + - href: '#cp-4_smt.c' + rel: assessment-for + links: + - href: '#cp-4_smt' + rel: assessment-for - id: cp-4_asm-examine name: assessment-method props: @@ -19081,6 +21006,9 @@ catalog: value: CP-04(01) class: sp800-53a prose: contingency plan testing is coordinated with organizational elements responsible for related plans. + links: + - href: '#cp-4.1_smt' + rel: assessment-for - id: cp-4.1_asm-examine name: assessment-method props: @@ -19214,6 +21142,9 @@ catalog: value: CP-06a.[01] class: sp800-53a prose: an alternate storage site is established; + links: + - href: '#cp-6_smt.a' + rel: assessment-for - id: cp-6_obj.a-2 name: assessment-objective props: @@ -19221,6 +21152,12 @@ catalog: value: CP-06a.[02] class: sp800-53a prose: establishment of the alternate storage site includes necessary agreements to permit the storage and retrieval of system backup information; + links: + - href: '#cp-6_smt.a' + rel: assessment-for + links: + - href: '#cp-6_smt.a' + rel: assessment-for - id: cp-6_obj.b name: assessment-objective props: @@ -19228,6 +21165,12 @@ catalog: value: CP-06b. class: sp800-53a prose: the alternate storage site provides controls equivalent to that of the primary site. + links: + - href: '#cp-6_smt.b' + rel: assessment-for + links: + - href: '#cp-6_smt' + rel: assessment-for - id: cp-6_asm-examine name: assessment-method props: @@ -19319,6 +21262,9 @@ catalog: value: CP-06(01) class: sp800-53a prose: an alternate storage site that is sufficiently separated from the primary storage site is identified to reduce susceptibility to the same threats. + links: + - href: '#cp-6.1_smt' + rel: assessment-for - id: cp-6.1_asm-examine name: assessment-method props: @@ -19403,6 +21349,9 @@ catalog: value: CP-06(03)[01] class: sp800-53a prose: potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster are identified; + links: + - href: '#cp-6.3_smt' + rel: assessment-for - id: cp-6.3_obj-2 name: assessment-objective props: @@ -19410,6 +21359,12 @@ catalog: value: CP-06(03)[02] class: sp800-53a prose: explicit mitigation actions to address identified accessibility problems are outlined. + links: + - href: '#cp-6.3_smt' + rel: assessment-for + links: + - href: '#cp-6.3_smt' + rel: assessment-for - id: cp-6.3_asm-examine name: assessment-method props: @@ -19560,6 +21515,9 @@ catalog: value: CP-07a. class: sp800-53a prose: 'an alternate processing site, including necessary agreements to permit the transfer and resumption of {{ insert: param, cp-07_odp.01 }} for essential mission and business functions, is established within {{ insert: param, cp-07_odp.02 }} when the primary processing capabilities are unavailable;' + links: + - href: '#cp-7_smt.a' + rel: assessment-for - id: cp-7_obj.b name: assessment-objective props: @@ -19574,6 +21532,9 @@ catalog: value: CP-07b.[01] class: sp800-53a prose: 'the equipment and supplies required to transfer operations are made available at the alternate processing site or if contracts are in place to support delivery to the site within {{ insert: param, cp-07_odp.02 }} for transfer;' + links: + - href: '#cp-7_smt.b' + rel: assessment-for - id: cp-7_obj.b-2 name: assessment-objective props: @@ -19581,6 +21542,12 @@ catalog: value: CP-07b.[02] class: sp800-53a prose: 'the equipment and supplies required to resume operations are made available at the alternate processing site or if contracts are in place to support delivery to the site within {{ insert: param, cp-07_odp.02 }} for resumption;' + links: + - href: '#cp-7_smt.b' + rel: assessment-for + links: + - href: '#cp-7_smt.b' + rel: assessment-for - id: cp-7_obj.c name: assessment-objective props: @@ -19588,6 +21555,12 @@ catalog: value: CP-07c. class: sp800-53a prose: controls provided at the alternate processing site are equivalent to those at the primary site. + links: + - href: '#cp-7_smt.c' + rel: assessment-for + links: + - href: '#cp-7_smt' + rel: assessment-for - id: cp-7_asm-examine name: assessment-method props: @@ -19683,6 +21656,9 @@ catalog: value: CP-07(01) class: sp800-53a prose: an alternate processing site that is sufficiently separated from the primary processing site to reduce susceptibility to the same threats is identified. + links: + - href: '#cp-7.1_smt' + rel: assessment-for - id: cp-7.1_asm-examine name: assessment-method props: @@ -19767,6 +21743,9 @@ catalog: value: CP-07(02)[01] class: sp800-53a prose: potential accessibility problems to alternate processing sites in the event of an area-wide disruption or disaster are identified; + links: + - href: '#cp-7.2_smt' + rel: assessment-for - id: cp-7.2_obj-2 name: assessment-objective props: @@ -19774,6 +21753,12 @@ catalog: value: CP-07(02)[02] class: sp800-53a prose: explicit mitigation actions to address identified accessibility problems are outlined. + links: + - href: '#cp-7.2_smt' + rel: assessment-for + links: + - href: '#cp-7.2_smt' + rel: assessment-for - id: cp-7.2_asm-examine name: assessment-method props: @@ -19849,6 +21834,9 @@ catalog: value: CP-07(03) class: sp800-53a prose: alternate processing site agreements that contain priority-of-service provisions in accordance with availability requirements (including recovery time objectives) are developed. + links: + - href: '#cp-7.3_smt' + rel: assessment-for - id: cp-7.3_asm-examine name: assessment-method props: @@ -19955,6 +21943,9 @@ catalog: value: CP-08 class: sp800-53a prose: 'alternate telecommunications services, including necessary agreements to permit the resumption of {{ insert: param, cp-08_odp.01 }} , are established for essential mission and business functions within {{ insert: param, cp-08_odp.02 }} when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.' + links: + - href: '#cp-8_smt' + rel: assessment-for - id: cp-8_asm-examine name: assessment-method props: @@ -20069,6 +22060,9 @@ catalog: value: CP-08(01)(a)[01] class: sp800-53a prose: primary telecommunications service agreements that contain priority-of-service provisions in accordance with availability requirements (including recovery time objectives) are developed; + links: + - href: '#cp-8.1_smt.a' + rel: assessment-for - id: cp-8.1_obj.a-2 name: assessment-objective props: @@ -20076,6 +22070,12 @@ catalog: value: CP-08(01)(a)[02] class: sp800-53a prose: alternate telecommunications service agreements that contain priority-of-service provisions in accordance with availability requirements (including recovery time objectives) are developed; + links: + - href: '#cp-8.1_smt.a' + rel: assessment-for + links: + - href: '#cp-8.1_smt.a' + rel: assessment-for - id: cp-8.1_obj.b name: assessment-objective props: @@ -20083,6 +22083,12 @@ catalog: value: CP-08(01)(b) class: sp800-53a prose: Telecommunications Service Priority is requested for all telecommunications services used for national security emergency preparedness if the primary and/or alternate telecommunications services are provided by a common carrier. + links: + - href: '#cp-8.1_smt.b' + rel: assessment-for + links: + - href: '#cp-8.1_smt' + rel: assessment-for - id: cp-8.1_asm-examine name: assessment-method props: @@ -20170,6 +22176,9 @@ catalog: value: CP-08(02) class: sp800-53a prose: alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services are obtained. + links: + - href: '#cp-8.2_smt' + rel: assessment-for - id: cp-8.2_asm-examine name: assessment-method props: @@ -20352,6 +22361,9 @@ catalog: value: CP-09a. class: sp800-53a prose: 'backups of user-level information contained in {{ insert: param, cp-09_odp.01 }} are conducted {{ insert: param, cp-09_odp.02 }};' + links: + - href: '#cp-9_smt.a' + rel: assessment-for - id: cp-9_obj.b name: assessment-objective props: @@ -20359,6 +22371,9 @@ catalog: value: CP-09b. class: sp800-53a prose: 'backups of system-level information contained in the system are conducted {{ insert: param, cp-09_odp.03 }};' + links: + - href: '#cp-9_smt.b' + rel: assessment-for - id: cp-9_obj.c name: assessment-objective props: @@ -20366,6 +22381,9 @@ catalog: value: CP-09c. class: sp800-53a prose: 'backups of system documentation, including security- and privacy-related documentation are conducted {{ insert: param, cp-09_odp.04 }};' + links: + - href: '#cp-9_smt.c' + rel: assessment-for - id: cp-9_obj.d name: assessment-objective props: @@ -20380,6 +22398,9 @@ catalog: value: CP-09d.[01] class: sp800-53a prose: the confidentiality of backup information is protected; + links: + - href: '#cp-9_smt.d' + rel: assessment-for - id: cp-9_obj.d-2 name: assessment-objective props: @@ -20387,6 +22408,9 @@ catalog: value: CP-09d.[02] class: sp800-53a prose: the integrity of backup information is protected; + links: + - href: '#cp-9_smt.d' + rel: assessment-for - id: cp-9_obj.d-3 name: assessment-objective props: @@ -20394,6 +22418,15 @@ catalog: value: CP-09d.[03] class: sp800-53a prose: the availability of backup information is protected. + links: + - href: '#cp-9_smt.d' + rel: assessment-for + links: + - href: '#cp-9_smt.d' + rel: assessment-for + links: + - href: '#cp-9_smt' + rel: assessment-for - id: cp-9_asm-examine name: assessment-method props: @@ -20518,6 +22551,9 @@ catalog: value: CP-09(01)[01] class: sp800-53a prose: 'backup information is tested {{ insert: param, cp-09.01_odp.01 }} to verify media reliability;' + links: + - href: '#cp-9.1_smt' + rel: assessment-for - id: cp-9.1_obj-2 name: assessment-objective props: @@ -20525,6 +22561,12 @@ catalog: value: CP-09(01)[02] class: sp800-53a prose: 'backup information is tested {{ insert: param, cp-09.01_odp.02 }} to verify information integrity.' + links: + - href: '#cp-9.1_smt' + rel: assessment-for + links: + - href: '#cp-9.1_smt' + rel: assessment-for - id: cp-9.1_asm-examine name: assessment-method props: @@ -20630,6 +22672,9 @@ catalog: value: CP-09(08) class: sp800-53a prose: 'cryptographic mechanisms are implemented to prevent unauthorized disclosure and modification of {{ insert: param, cp-09.08_odp }}.' + links: + - href: '#cp-9.8_smt' + rel: assessment-for - id: cp-9.8_asm-examine name: assessment-method props: @@ -20764,6 +22809,9 @@ catalog: value: CP-10[01] class: sp800-53a prose: 'the recovery of the system to a known state is provided within {{ insert: param, cp-10_odp.01 }} after a disruption, compromise, or failure;' + links: + - href: '#cp-10_smt' + rel: assessment-for - id: cp-10_obj-2 name: assessment-objective props: @@ -20771,6 +22819,12 @@ catalog: value: CP-10[02] class: sp800-53a prose: 'a reconstitution of the system to a known state is provided within {{ insert: param, cp-10_odp.02 }} after a disruption, compromise, or failure.' + links: + - href: '#cp-10_smt' + rel: assessment-for + links: + - href: '#cp-10_smt' + rel: assessment-for - id: cp-10_asm-examine name: assessment-method props: @@ -20864,6 +22918,9 @@ catalog: value: CP-10(02) class: sp800-53a prose: transaction recovery is implemented for systems that are transaction-based. + links: + - href: '#cp-10.2_smt' + rel: assessment-for - id: cp-10.2_asm-examine name: assessment-method props: @@ -21150,6 +23207,9 @@ catalog: value: IA-01a.[01] class: sp800-53a prose: an identification and authentication policy is developed and documented; + links: + - href: '#ia-1_smt.a' + rel: assessment-for - id: ia-1_obj.a-2 name: assessment-objective props: @@ -21157,6 +23217,9 @@ catalog: value: IA-01a.[02] class: sp800-53a prose: 'the identification and authentication policy is disseminated to {{ insert: param, ia-01_odp.01 }};' + links: + - href: '#ia-1_smt.a' + rel: assessment-for - id: ia-1_obj.a-3 name: assessment-objective props: @@ -21164,6 +23227,9 @@ catalog: value: IA-01a.[03] class: sp800-53a prose: identification and authentication procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls are developed and documented; + links: + - href: '#ia-1_smt.a' + rel: assessment-for - id: ia-1_obj.a-4 name: assessment-objective props: @@ -21171,6 +23237,9 @@ catalog: value: IA-01a.[04] class: sp800-53a prose: 'the identification and authentication procedures are disseminated to {{ insert: param, ia-01_odp.02 }};' + links: + - href: '#ia-1_smt.a' + rel: assessment-for - id: ia-1_obj.a.1 name: assessment-objective props: @@ -21192,6 +23261,9 @@ catalog: value: IA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses purpose;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-2 name: assessment-objective props: @@ -21199,6 +23271,9 @@ catalog: value: IA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses scope;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-3 name: assessment-objective props: @@ -21206,6 +23281,9 @@ catalog: value: IA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses roles;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-4 name: assessment-objective props: @@ -21213,6 +23291,9 @@ catalog: value: IA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses responsibilities;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-5 name: assessment-objective props: @@ -21220,6 +23301,9 @@ catalog: value: IA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses management commitment;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-6 name: assessment-objective props: @@ -21227,6 +23311,9 @@ catalog: value: IA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses coordination among organizational entities;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-7 name: assessment-objective props: @@ -21234,6 +23321,12 @@ catalog: value: IA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses compliance;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.b name: assessment-objective props: @@ -21241,6 +23334,15 @@ catalog: value: IA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ia-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ia-1_smt.a.1' + rel: assessment-for + links: + - href: '#ia-1_smt.a' + rel: assessment-for - id: ia-1_obj.b name: assessment-objective props: @@ -21248,6 +23350,9 @@ catalog: value: IA-01b. class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the identification and authentication policy and procedures;' + links: + - href: '#ia-1_smt.b' + rel: assessment-for - id: ia-1_obj.c name: assessment-objective props: @@ -21269,6 +23374,9 @@ catalog: value: IA-01c.01[01] class: sp800-53a prose: 'the current identification and authentication policy is reviewed and updated {{ insert: param, ia-01_odp.05 }};' + links: + - href: '#ia-1_smt.c.1' + rel: assessment-for - id: ia-1_obj.c.1-2 name: assessment-objective props: @@ -21276,6 +23384,12 @@ catalog: value: IA-01c.01[02] class: sp800-53a prose: 'the current identification and authentication policy is reviewed and updated following {{ insert: param, ia-01_odp.06 }};' + links: + - href: '#ia-1_smt.c.1' + rel: assessment-for + links: + - href: '#ia-1_smt.c.1' + rel: assessment-for - id: ia-1_obj.c.2 name: assessment-objective props: @@ -21290,6 +23404,9 @@ catalog: value: IA-01c.02[01] class: sp800-53a prose: 'the current identification and authentication procedures are reviewed and updated {{ insert: param, ia-01_odp.07 }};' + links: + - href: '#ia-1_smt.c.2' + rel: assessment-for - id: ia-1_obj.c.2-2 name: assessment-objective props: @@ -21297,6 +23414,18 @@ catalog: value: IA-01c.02[02] class: sp800-53a prose: 'the current identification and authentication procedures are reviewed and updated following {{ insert: param, ia-01_odp.08 }}.' + links: + - href: '#ia-1_smt.c.2' + rel: assessment-for + links: + - href: '#ia-1_smt.c.2' + rel: assessment-for + links: + - href: '#ia-1_smt.c' + rel: assessment-for + links: + - href: '#ia-1_smt' + rel: assessment-for - id: ia-1_asm-examine name: assessment-method props: @@ -21409,6 +23538,8 @@ catalog: rel: related - href: '#ia-8' rel: related + - href: '#ia-13' + rel: related - href: '#ma-4' rel: related - href: '#ma-5' @@ -21447,6 +23578,9 @@ catalog: value: IA-02[01] class: sp800-53a prose: organizational users are uniquely identified and authenticated; + links: + - href: '#ia-2_smt' + rel: assessment-for - id: ia-2_obj-2 name: assessment-objective props: @@ -21454,6 +23588,12 @@ catalog: value: IA-02[02] class: sp800-53a prose: the unique identification of authenticated organizational users is associated with processes acting on behalf of those users. + links: + - href: '#ia-2_smt' + rel: assessment-for + links: + - href: '#ia-2_smt' + rel: assessment-for - id: ia-2_asm-examine name: assessment-method props: @@ -21551,6 +23691,9 @@ catalog: value: IA-02(01) class: sp800-53a prose: multi-factor authentication is implemented for access to privileged accounts. + links: + - href: '#ia-2.1_smt' + rel: assessment-for - id: ia-2.1_asm-examine name: assessment-method props: @@ -21644,6 +23787,9 @@ catalog: value: IA-02(02) class: sp800-53a prose: multi-factor authentication for access to non-privileged accounts is implemented. + links: + - href: '#ia-2.2_smt' + rel: assessment-for - id: ia-2.2_asm-examine name: assessment-method props: @@ -21748,6 +23894,9 @@ catalog: value: IA-02(08) class: sp800-53a prose: 'replay-resistant authentication mechanisms for access to {{ insert: param, ia-02.08_odp }} are implemented.' + links: + - href: '#ia-2.8_smt' + rel: assessment-for - id: ia-2.8_asm-examine name: assessment-method props: @@ -21842,6 +23991,9 @@ catalog: value: IA-02(12) class: sp800-53a prose: Personal Identity Verification-compliant credentials are accepted and electronically verified. + links: + - href: '#ia-2.12_smt' + rel: assessment-for - id: ia-2.12_asm-examine name: assessment-method props: @@ -21965,6 +24117,8 @@ catalog: rel: related - href: '#ia-11' rel: related + - href: '#ia-13' + rel: related - href: '#si-4' rel: related parts: @@ -21981,6 +24135,9 @@ catalog: value: IA-03 class: sp800-53a prose: ' {{ insert: param, ia-03_odp.01 }} are uniquely identified and authenticated before establishing a {{ insert: param, ia-03_odp.02 }} connection.' + links: + - href: '#ia-3_smt' + rel: assessment-for - id: ia-3_asm-examine name: assessment-method props: @@ -22165,6 +24322,9 @@ catalog: value: IA-04a. class: sp800-53a prose: 'system identifiers are managed by receiving authorization from {{ insert: param, ia-04_odp.01 }} to assign to an individual, group, role, or device identifier;' + links: + - href: '#ia-4_smt.a' + rel: assessment-for - id: ia-4_obj.b name: assessment-objective props: @@ -22172,6 +24332,9 @@ catalog: value: IA-04b. class: sp800-53a prose: system identifiers are managed by selecting an identifier that identifies an individual, group, role, service, or device; + links: + - href: '#ia-4_smt.b' + rel: assessment-for - id: ia-4_obj.c name: assessment-objective props: @@ -22179,6 +24342,9 @@ catalog: value: IA-04c. class: sp800-53a prose: system identifiers are managed by assigning the identifier to the intended individual, group, role, service, or device; + links: + - href: '#ia-4_smt.c' + rel: assessment-for - id: ia-4_obj.d name: assessment-objective props: @@ -22186,6 +24352,12 @@ catalog: value: IA-04d. class: sp800-53a prose: 'system identifiers are managed by preventing reuse of identifiers for {{ insert: param, ia-04_odp.02 }}.' + links: + - href: '#ia-4_smt.d' + rel: assessment-for + links: + - href: '#ia-4_smt' + rel: assessment-for - id: ia-4_asm-examine name: assessment-method props: @@ -22292,6 +24464,9 @@ catalog: value: IA-04(04) class: sp800-53a prose: 'individual identifiers are managed by uniquely identifying each individual as {{ insert: param, ia-04.04_odp }}.' + links: + - href: '#ia-4.4_smt' + rel: assessment-for - id: ia-4.4_asm-examine name: assessment-method props: @@ -22514,6 +24689,9 @@ catalog: value: IA-05a. class: sp800-53a prose: system authenticators are managed through the verification of the identity of the individual, group, role, service, or device receiving the authenticator as part of the initial authenticator distribution; + links: + - href: '#ia-5_smt.a' + rel: assessment-for - id: ia-5_obj.b name: assessment-objective props: @@ -22521,6 +24699,9 @@ catalog: value: IA-05b. class: sp800-53a prose: system authenticators are managed through the establishment of initial authenticator content for any authenticators issued by the organization; + links: + - href: '#ia-5_smt.b' + rel: assessment-for - id: ia-5_obj.c name: assessment-objective props: @@ -22528,6 +24709,9 @@ catalog: value: IA-05c. class: sp800-53a prose: system authenticators are managed to ensure that authenticators have sufficient strength of mechanism for their intended use; + links: + - href: '#ia-5_smt.c' + rel: assessment-for - id: ia-5_obj.d name: assessment-objective props: @@ -22535,6 +24719,9 @@ catalog: value: IA-05d. class: sp800-53a prose: system authenticators are managed through the establishment and implementation of administrative procedures for initial authenticator distribution; lost, compromised, or damaged authenticators; and the revocation of authenticators; + links: + - href: '#ia-5_smt.d' + rel: assessment-for - id: ia-5_obj.e name: assessment-objective props: @@ -22542,6 +24729,9 @@ catalog: value: IA-05e. class: sp800-53a prose: system authenticators are managed through the change of default authenticators prior to first use; + links: + - href: '#ia-5_smt.e' + rel: assessment-for - id: ia-5_obj.f name: assessment-objective props: @@ -22549,6 +24739,9 @@ catalog: value: IA-05f. class: sp800-53a prose: 'system authenticators are managed through the change or refreshment of authenticators {{ insert: param, ia-05_odp.01 }} or when {{ insert: param, ia-05_odp.02 }} occur;' + links: + - href: '#ia-5_smt.f' + rel: assessment-for - id: ia-5_obj.g name: assessment-objective props: @@ -22556,6 +24749,9 @@ catalog: value: IA-05g. class: sp800-53a prose: system authenticators are managed through the protection of authenticator content from unauthorized disclosure and modification; + links: + - href: '#ia-5_smt.g' + rel: assessment-for - id: ia-5_obj.h name: assessment-objective props: @@ -22570,6 +24766,9 @@ catalog: value: IA-05h.[01] class: sp800-53a prose: system authenticators are managed through the requirement for individuals to take specific controls to protect authenticators; + links: + - href: '#ia-5_smt.h' + rel: assessment-for - id: ia-5_obj.h-2 name: assessment-objective props: @@ -22577,6 +24776,12 @@ catalog: value: IA-05h.[02] class: sp800-53a prose: system authenticators are managed through the requirement for devices to implement specific controls to protect authenticators; + links: + - href: '#ia-5_smt.h' + rel: assessment-for + links: + - href: '#ia-5_smt.h' + rel: assessment-for - id: ia-5_obj.i name: assessment-objective props: @@ -22584,6 +24789,12 @@ catalog: value: IA-05i. class: sp800-53a prose: system authenticators are managed through the change of authenticators for group or role accounts when membership to those accounts changes. + links: + - href: '#ia-5_smt.i' + rel: assessment-for + links: + - href: '#ia-5_smt' + rel: assessment-for - id: ia-5_asm-examine name: assessment-method props: @@ -22756,6 +24967,9 @@ catalog: value: IA-05(01)(a) class: sp800-53a prose: 'for password-based authentication, a list of commonly used, expected, or compromised passwords is maintained and updated {{ insert: param, ia-05.01_odp.01 }} and when organizational passwords are suspected to have been compromised directly or indirectly;' + links: + - href: '#ia-5.1_smt.a' + rel: assessment-for - id: ia-5.1_obj.b name: assessment-objective props: @@ -22763,6 +24977,9 @@ catalog: value: IA-05(01)(b) class: sp800-53a prose: for password-based authentication when passwords are created or updated by users, the passwords are verified not to be found on the list of commonly used, expected, or compromised passwords in IA-05(01)(a); + links: + - href: '#ia-5.1_smt.b' + rel: assessment-for - id: ia-5.1_obj.c name: assessment-objective props: @@ -22770,6 +24987,9 @@ catalog: value: IA-05(01)(c) class: sp800-53a prose: for password-based authentication, passwords are only transmitted over cryptographically protected channels; + links: + - href: '#ia-5.1_smt.c' + rel: assessment-for - id: ia-5.1_obj.d name: assessment-objective props: @@ -22777,6 +24997,9 @@ catalog: value: IA-05(01)(d) class: sp800-53a prose: for password-based authentication, passwords are stored using an approved salted key derivation function, preferably using a keyed hash; + links: + - href: '#ia-5.1_smt.d' + rel: assessment-for - id: ia-5.1_obj.e name: assessment-objective props: @@ -22784,6 +25007,9 @@ catalog: value: IA-05(01)(e) class: sp800-53a prose: for password-based authentication, immediate selection of a new password is required upon account recovery; + links: + - href: '#ia-5.1_smt.e' + rel: assessment-for - id: ia-5.1_obj.f name: assessment-objective props: @@ -22791,6 +25017,9 @@ catalog: value: IA-05(01)(f) class: sp800-53a prose: for password-based authentication, user selection of long passwords and passphrases is allowed, including spaces and all printable characters; + links: + - href: '#ia-5.1_smt.f' + rel: assessment-for - id: ia-5.1_obj.g name: assessment-objective props: @@ -22798,6 +25027,9 @@ catalog: value: IA-05(01)(g) class: sp800-53a prose: for password-based authentication, automated tools are employed to assist the user in selecting strong password authenticators; + links: + - href: '#ia-5.1_smt.g' + rel: assessment-for - id: ia-5.1_obj.h name: assessment-objective props: @@ -22805,6 +25037,12 @@ catalog: value: IA-05(01)(h) class: sp800-53a prose: 'for password-based authentication, {{ insert: param, ia-05.01_odp.02 }} are enforced.' + links: + - href: '#ia-5.1_smt.h' + rel: assessment-for + links: + - href: '#ia-5.1_smt' + rel: assessment-for - id: ia-5.1_asm-examine name: assessment-method props: @@ -22950,6 +25188,9 @@ catalog: value: IA-05(02)(a)(01) class: sp800-53a prose: authorized access to the corresponding private key is enforced for public key-based authentication; + links: + - href: '#ia-5.2_smt.a.1' + rel: assessment-for - id: ia-5.2_obj.a.2 name: assessment-objective props: @@ -22957,6 +25198,12 @@ catalog: value: IA-05(02)(a)(02) class: sp800-53a prose: the authenticated identity is mapped to the account of the individual or group for public key-based authentication; + links: + - href: '#ia-5.2_smt.a.2' + rel: assessment-for + links: + - href: '#ia-5.2_smt.a' + rel: assessment-for - id: ia-5.2_obj.b name: assessment-objective props: @@ -22971,6 +25218,9 @@ catalog: value: IA-05(02)(b)(01) class: sp800-53a prose: when public key infrastructure (PKI) is used, certificates are validated by constructing and verifying a certification path to an accepted trust anchor, including checking certificate status information; + links: + - href: '#ia-5.2_smt.b.1' + rel: assessment-for - id: ia-5.2_obj.b.2 name: assessment-objective props: @@ -22978,6 +25228,15 @@ catalog: value: IA-05(02)(b)(02) class: sp800-53a prose: when public key infrastructure (PKI) is used, a local cache of revocation data is implemented to support path discovery and validation. + links: + - href: '#ia-5.2_smt.b.2' + rel: assessment-for + links: + - href: '#ia-5.2_smt.b' + rel: assessment-for + links: + - href: '#ia-5.2_smt' + rel: assessment-for - id: ia-5.2_asm-examine name: assessment-method props: @@ -23069,6 +25328,9 @@ catalog: value: IA-05(06) class: sp800-53a prose: authenticators are protected commensurate with the security category of the information to which use of the authenticator permits access. + links: + - href: '#ia-5.6_smt' + rel: assessment-for - id: ia-5.6_asm-examine name: assessment-method props: @@ -23159,6 +25421,9 @@ catalog: value: IA-06 class: sp800-53a prose: the feedback of authentication information is obscured during the authentication process to protect the information from possible exploitation and use by unauthorized individuals. + links: + - href: '#ia-6_smt' + rel: assessment-for - id: ia-6_asm-examine name: assessment-method props: @@ -23254,6 +25519,9 @@ catalog: value: IA-07 class: sp800-53a prose: mechanisms for authentication to a cryptographic module are implemented that meet the requirements of applicable laws, executive orders, directives, policies, regulations, standards, and guidelines for such authentication. + links: + - href: '#ia-7_smt' + rel: assessment-for - id: ia-7_asm-examine name: assessment-method props: @@ -23361,6 +25629,8 @@ catalog: rel: related - href: '#ia-11' rel: related + - href: '#ia-13' + rel: related - href: '#ma-4' rel: related - href: '#ra-3' @@ -23383,6 +25653,9 @@ catalog: value: IA-08 class: sp800-53a prose: non-organizational users or processes acting on behalf of non-organizational users are uniquely identified and authenticated. + links: + - href: '#ia-8_smt' + rel: assessment-for - id: ia-8_asm-examine name: assessment-method props: @@ -23484,6 +25757,9 @@ catalog: value: IA-08(01)[01] class: sp800-53a prose: Personal Identity Verification-compliant credentials from other federal agencies are accepted; + links: + - href: '#ia-8.1_smt' + rel: assessment-for - id: ia-8.1_obj-2 name: assessment-objective props: @@ -23491,6 +25767,12 @@ catalog: value: IA-08(01)[02] class: sp800-53a prose: Personal Identity Verification-compliant credentials from other federal agencies are electronically verified. + links: + - href: '#ia-8.1_smt' + rel: assessment-for + links: + - href: '#ia-8.1_smt' + rel: assessment-for - id: ia-8.1_asm-examine name: assessment-method props: @@ -23608,6 +25890,9 @@ catalog: value: IA-08(02)(a) class: sp800-53a prose: only external authenticators that are NIST-compliant are accepted; + links: + - href: '#ia-8.2_smt.a' + rel: assessment-for - id: ia-8.2_obj.b name: assessment-objective props: @@ -23622,6 +25907,9 @@ catalog: value: IA-08(02)(b)[01] class: sp800-53a prose: a list of accepted external authenticators is documented; + links: + - href: '#ia-8.2_smt.b' + rel: assessment-for - id: ia-8.2_obj.b-2 name: assessment-objective props: @@ -23629,6 +25917,15 @@ catalog: value: IA-08(02)(b)[02] class: sp800-53a prose: a list of accepted external authenticators is maintained. + links: + - href: '#ia-8.2_smt.b' + rel: assessment-for + links: + - href: '#ia-8.2_smt.b' + rel: assessment-for + links: + - href: '#ia-8.2_smt' + rel: assessment-for - id: ia-8.2_asm-examine name: assessment-method props: @@ -23740,6 +26037,9 @@ catalog: value: IA-08(04) class: sp800-53a prose: 'there is conformance with {{ insert: param, ia-08.04_odp }} for identity management.' + links: + - href: '#ia-8.4_smt' + rel: assessment-for - id: ia-8.4_asm-examine name: assessment-method props: @@ -23857,6 +26157,9 @@ catalog: value: IA-11 class: sp800-53a prose: 'users are required to re-authenticate when {{ insert: param, ia-11_odp }}.' + links: + - href: '#ia-11_smt' + rel: assessment-for - id: ia-11_asm-examine name: assessment-method props: @@ -23956,6 +26259,8 @@ catalog: rel: related - href: '#ia-8' rel: related + - href: '#ia-13' + rel: related parts: - id: ia-12_smt name: statement @@ -23995,6 +26300,9 @@ catalog: value: IA-12a. class: sp800-53a prose: users who require accounts for logical access to systems based on appropriate identity assurance level requirements as specified in applicable standards and guidelines are identity proofed; + links: + - href: '#ia-12_smt.a' + rel: assessment-for - id: ia-12_obj.b name: assessment-objective props: @@ -24002,6 +26310,9 @@ catalog: value: IA-12b. class: sp800-53a prose: user identities are resolved to a unique individual; + links: + - href: '#ia-12_smt.b' + rel: assessment-for - id: ia-12_obj.c name: assessment-objective props: @@ -24016,6 +26327,9 @@ catalog: value: IA-12c.[01] class: sp800-53a prose: identity evidence is collected; + links: + - href: '#ia-12_smt.c' + rel: assessment-for - id: ia-12_obj.c-2 name: assessment-objective props: @@ -24023,6 +26337,9 @@ catalog: value: IA-12c.[02] class: sp800-53a prose: identity evidence is validated; + links: + - href: '#ia-12_smt.c' + rel: assessment-for - id: ia-12_obj.c-3 name: assessment-objective props: @@ -24030,6 +26347,15 @@ catalog: value: IA-12c.[03] class: sp800-53a prose: identity evidence is verified. + links: + - href: '#ia-12_smt.c' + rel: assessment-for + links: + - href: '#ia-12_smt.c' + rel: assessment-for + links: + - href: '#ia-12_smt' + rel: assessment-for - id: ia-12_asm-examine name: assessment-method props: @@ -24118,6 +26444,9 @@ catalog: value: IA-12(02) class: sp800-53a prose: evidence of individual identification is presented to the registration authority. + links: + - href: '#ia-12.2_smt' + rel: assessment-for - id: ia-12.2_asm-examine name: assessment-method props: @@ -24215,6 +26544,9 @@ catalog: value: IA-12(03) class: sp800-53a prose: 'the presented identity evidence is validated and verified through {{ insert: param, ia-12.03_odp }}.' + links: + - href: '#ia-12.3_smt' + rel: assessment-for - id: ia-12.3_asm-examine name: assessment-method props: @@ -24312,6 +26644,9 @@ catalog: value: IA-12(05) class: sp800-53a prose: 'a {{ insert: param, ia-12.05_odp }} is delivered through an out-of-band channel to verify the user’s address (physical or digital) of record.' + links: + - href: '#ia-12.5_smt' + rel: assessment-for - id: ia-12.5_asm-examine name: assessment-method props: @@ -24582,6 +26917,9 @@ catalog: value: IR-01a.[01] class: sp800-53a prose: an incident response policy is developed and documented; + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.a-2 name: assessment-objective props: @@ -24589,6 +26927,9 @@ catalog: value: IR-01a.[02] class: sp800-53a prose: 'the incident response policy is disseminated to {{ insert: param, ir-01_odp.01 }};' + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.a-3 name: assessment-objective props: @@ -24596,6 +26937,9 @@ catalog: value: IR-01a.[03] class: sp800-53a prose: incident response procedures to facilitate the implementation of the incident response policy and associated incident response controls are developed and documented; + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.a-4 name: assessment-objective props: @@ -24603,6 +26947,9 @@ catalog: value: IR-01a.[04] class: sp800-53a prose: 'the incident response procedures are disseminated to {{ insert: param, ir-01_odp.02 }};' + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.a.1 name: assessment-objective props: @@ -24624,6 +26971,9 @@ catalog: value: IR-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses purpose;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-2 name: assessment-objective props: @@ -24631,6 +26981,9 @@ catalog: value: IR-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses scope;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-3 name: assessment-objective props: @@ -24638,6 +26991,9 @@ catalog: value: IR-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses roles;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-4 name: assessment-objective props: @@ -24645,6 +27001,9 @@ catalog: value: IR-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses responsibilities;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-5 name: assessment-objective props: @@ -24652,6 +27011,9 @@ catalog: value: IR-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses management commitment;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-6 name: assessment-objective props: @@ -24659,6 +27021,9 @@ catalog: value: IR-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses coordination among organizational entities;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-7 name: assessment-objective props: @@ -24666,6 +27031,12 @@ catalog: value: IR-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses compliance;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.b name: assessment-objective props: @@ -24673,6 +27044,15 @@ catalog: value: IR-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ir-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ir-1_smt.a.1' + rel: assessment-for + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.b name: assessment-objective props: @@ -24680,6 +27060,9 @@ catalog: value: IR-01b. class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the incident response policy and procedures;' + links: + - href: '#ir-1_smt.b' + rel: assessment-for - id: ir-1_obj.c name: assessment-objective props: @@ -24701,6 +27084,9 @@ catalog: value: IR-01c.01[01] class: sp800-53a prose: 'the current incident response policy is reviewed and updated {{ insert: param, ir-01_odp.05 }};' + links: + - href: '#ir-1_smt.c.1' + rel: assessment-for - id: ir-1_obj.c.1-2 name: assessment-objective props: @@ -24708,6 +27094,12 @@ catalog: value: IR-01c.01[02] class: sp800-53a prose: 'the current incident response policy is reviewed and updated following {{ insert: param, ir-01_odp.06 }};' + links: + - href: '#ir-1_smt.c.1' + rel: assessment-for + links: + - href: '#ir-1_smt.c.1' + rel: assessment-for - id: ir-1_obj.c.2 name: assessment-objective props: @@ -24722,6 +27114,9 @@ catalog: value: IR-01c.02[01] class: sp800-53a prose: 'the current incident response procedures are reviewed and updated {{ insert: param, ir-01_odp.07 }};' + links: + - href: '#ir-1_smt.c.2' + rel: assessment-for - id: ir-1_obj.c.2-2 name: assessment-objective props: @@ -24729,6 +27124,18 @@ catalog: value: IR-01c.02[02] class: sp800-53a prose: 'the current incident response procedures are reviewed and updated following {{ insert: param, ir-01_odp.08 }}.' + links: + - href: '#ir-1_smt.c.2' + rel: assessment-for + links: + - href: '#ir-1_smt.c.2' + rel: assessment-for + links: + - href: '#ir-1_smt.c' + rel: assessment-for + links: + - href: '#ir-1_smt' + rel: assessment-for - id: ir-1_asm-examine name: assessment-method props: @@ -24901,6 +27308,9 @@ catalog: value: IR-02a.01 class: sp800-53a prose: 'incident response training is provided to system users consistent with assigned roles and responsibilities within {{ insert: param, ir-02_odp.01 }} of assuming an incident response role or responsibility or acquiring system access;' + links: + - href: '#ir-2_smt.a.1' + rel: assessment-for - id: ir-2_obj.a.2 name: assessment-objective props: @@ -24908,6 +27318,9 @@ catalog: value: IR-02a.02 class: sp800-53a prose: incident response training is provided to system users consistent with assigned roles and responsibilities when required by system changes; + links: + - href: '#ir-2_smt.a.2' + rel: assessment-for - id: ir-2_obj.a.3 name: assessment-objective props: @@ -24915,6 +27328,12 @@ catalog: value: IR-02a.03 class: sp800-53a prose: 'incident response training is provided to system users consistent with assigned roles and responsibilities {{ insert: param, ir-02_odp.02 }} thereafter;' + links: + - href: '#ir-2_smt.a.3' + rel: assessment-for + links: + - href: '#ir-2_smt.a' + rel: assessment-for - id: ir-2_obj.b name: assessment-objective props: @@ -24929,6 +27348,9 @@ catalog: value: IR-02b.[01] class: sp800-53a prose: 'incident response training content is reviewed and updated {{ insert: param, ir-02_odp.03 }};' + links: + - href: '#ir-2_smt.b' + rel: assessment-for - id: ir-2_obj.b-2 name: assessment-objective props: @@ -24936,6 +27358,15 @@ catalog: value: IR-02b.[02] class: sp800-53a prose: 'incident response training content is reviewed and updated following {{ insert: param, ir-02_odp.04 }}.' + links: + - href: '#ir-2_smt.b' + rel: assessment-for + links: + - href: '#ir-2_smt.b' + rel: assessment-for + links: + - href: '#ir-2_smt' + rel: assessment-for - id: ir-2_asm-examine name: assessment-method props: @@ -25053,6 +27484,9 @@ catalog: value: IR-03 class: sp800-53a prose: 'the effectiveness of the incident response capability for the system is tested {{ insert: param, ir-03_odp.01 }} using {{ insert: param, ir-03_odp.02 }}.' + links: + - href: '#ir-3_smt' + rel: assessment-for - id: ir-3_asm-examine name: assessment-method props: @@ -25138,6 +27572,9 @@ catalog: value: IR-03(02) class: sp800-53a prose: incident response testing is coordinated with organizational elements responsible for related plans. + links: + - href: '#ir-3.2_smt' + rel: assessment-for - id: ir-3.2_asm-examine name: assessment-method props: @@ -25325,6 +27762,9 @@ catalog: value: IR-04a.[01] class: sp800-53a prose: an incident handling capability for incidents is implemented that is consistent with the incident response plan; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-2 name: assessment-objective props: @@ -25332,6 +27772,9 @@ catalog: value: IR-04a.[02] class: sp800-53a prose: the incident handling capability for incidents includes preparation; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-3 name: assessment-objective props: @@ -25339,6 +27782,9 @@ catalog: value: IR-04a.[03] class: sp800-53a prose: the incident handling capability for incidents includes detection and analysis; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-4 name: assessment-objective props: @@ -25346,6 +27792,9 @@ catalog: value: IR-04a.[04] class: sp800-53a prose: the incident handling capability for incidents includes containment; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-5 name: assessment-objective props: @@ -25353,6 +27802,9 @@ catalog: value: IR-04a.[05] class: sp800-53a prose: the incident handling capability for incidents includes eradication; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-6 name: assessment-objective props: @@ -25360,6 +27812,12 @@ catalog: value: IR-04a.[06] class: sp800-53a prose: the incident handling capability for incidents includes recovery; + links: + - href: '#ir-4_smt.a' + rel: assessment-for + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.b name: assessment-objective props: @@ -25367,6 +27825,9 @@ catalog: value: IR-04b. class: sp800-53a prose: incident handling activities are coordinated with contingency planning activities; + links: + - href: '#ir-4_smt.b' + rel: assessment-for - id: ir-4_obj.c name: assessment-objective props: @@ -25381,6 +27842,9 @@ catalog: value: IR-04c.[01] class: sp800-53a prose: lessons learned from ongoing incident handling activities are incorporated into incident response procedures, training, and testing; + links: + - href: '#ir-4_smt.c' + rel: assessment-for - id: ir-4_obj.c-2 name: assessment-objective props: @@ -25388,6 +27852,12 @@ catalog: value: IR-04c.[02] class: sp800-53a prose: the changes resulting from the incorporated lessons learned are implemented accordingly; + links: + - href: '#ir-4_smt.c' + rel: assessment-for + links: + - href: '#ir-4_smt.c' + rel: assessment-for - id: ir-4_obj.d name: assessment-objective props: @@ -25402,6 +27872,9 @@ catalog: value: IR-04d.[01] class: sp800-53a prose: the rigor of incident handling activities is comparable and predictable across the organization; + links: + - href: '#ir-4_smt.d' + rel: assessment-for - id: ir-4_obj.d-2 name: assessment-objective props: @@ -25409,6 +27882,9 @@ catalog: value: IR-04d.[02] class: sp800-53a prose: the intensity of incident handling activities is comparable and predictable across the organization; + links: + - href: '#ir-4_smt.d' + rel: assessment-for - id: ir-4_obj.d-3 name: assessment-objective props: @@ -25416,6 +27892,9 @@ catalog: value: IR-04d.[03] class: sp800-53a prose: the scope of incident handling activities is comparable and predictable across the organization; + links: + - href: '#ir-4_smt.d' + rel: assessment-for - id: ir-4_obj.d-4 name: assessment-objective props: @@ -25423,6 +27902,15 @@ catalog: value: IR-04d.[04] class: sp800-53a prose: the results of incident handling activities are comparable and predictable across the organization. + links: + - href: '#ir-4_smt.d' + rel: assessment-for + links: + - href: '#ir-4_smt.d' + rel: assessment-for + links: + - href: '#ir-4_smt' + rel: assessment-for - id: ir-4_asm-examine name: assessment-method props: @@ -25522,6 +28010,9 @@ catalog: value: IR-04(01) class: sp800-53a prose: 'the incident handling process is supported using {{ insert: param, ir-04.01_odp }}.' + links: + - href: '#ir-4.1_smt' + rel: assessment-for - id: ir-4.1_asm-examine name: assessment-method props: @@ -25643,6 +28134,9 @@ catalog: value: IR-05[01] class: sp800-53a prose: incidents are tracked; + links: + - href: '#ir-5_smt' + rel: assessment-for - id: ir-5_obj-2 name: assessment-objective props: @@ -25650,6 +28144,12 @@ catalog: value: IR-05[02] class: sp800-53a prose: incidents are documented. + links: + - href: '#ir-5_smt' + rel: assessment-for + links: + - href: '#ir-5_smt' + rel: assessment-for - id: ir-5_asm-examine name: assessment-method props: @@ -25794,6 +28294,9 @@ catalog: value: IR-06a. class: sp800-53a prose: 'personnel is/are required to report suspected incidents to the organizational incident response capability within {{ insert: param, ir-06_odp.01 }};' + links: + - href: '#ir-6_smt.a' + rel: assessment-for - id: ir-6_obj.b name: assessment-objective props: @@ -25801,6 +28304,12 @@ catalog: value: IR-06b. class: sp800-53a prose: 'incident information is reported to {{ insert: param, ir-06_odp.02 }}.' + links: + - href: '#ir-6_smt.b' + rel: assessment-for + links: + - href: '#ir-6_smt' + rel: assessment-for - id: ir-6_asm-examine name: assessment-method props: @@ -25907,6 +28416,9 @@ catalog: value: IR-06(01) class: sp800-53a prose: 'incidents are reported using {{ insert: param, ir-06.01_odp }}.' + links: + - href: '#ir-6.1_smt' + rel: assessment-for - id: ir-6.1_asm-examine name: assessment-method props: @@ -25997,6 +28509,9 @@ catalog: value: IR-06(03) class: sp800-53a prose: incident information is provided to the provider of the product or service and other organizations involved in the supply chain or supply chain governance for systems or system components related to the incident. + links: + - href: '#ir-6.3_smt' + rel: assessment-for - id: ir-6.3_asm-examine name: assessment-method props: @@ -26122,6 +28637,9 @@ catalog: value: IR-07[01] class: sp800-53a prose: an incident response support resource, integral to the organizational incident response capability, is provided; + links: + - href: '#ir-7_smt' + rel: assessment-for - id: ir-7_obj-2 name: assessment-objective props: @@ -26129,6 +28647,12 @@ catalog: value: IR-07[02] class: sp800-53a prose: the incident response support resource offers advice and assistance to users of the system for the response and reporting of incidents. + links: + - href: '#ir-7_smt' + rel: assessment-for + links: + - href: '#ir-7_smt' + rel: assessment-for - id: ir-7_asm-examine name: assessment-method props: @@ -26227,6 +28751,9 @@ catalog: value: IR-07(01) class: sp800-53a prose: 'the availability of incident response information and support is increased using {{ insert: param, ir-07.01_odp }}.' + links: + - href: '#ir-7.1_smt' + rel: assessment-for - id: ir-7.1_asm-examine name: assessment-method props: @@ -26528,6 +29055,9 @@ catalog: value: IR-08a.01 class: sp800-53a prose: an incident response plan is developed that provides the organization with a roadmap for implementing its incident response capability; + links: + - href: '#ir-8_smt.a.1' + rel: assessment-for - id: ir-8_obj.a.2 name: assessment-objective props: @@ -26535,6 +29065,9 @@ catalog: value: IR-08a.02 class: sp800-53a prose: an incident response plan is developed that describes the structure and organization of the incident response capability; + links: + - href: '#ir-8_smt.a.2' + rel: assessment-for - id: ir-8_obj.a.3 name: assessment-objective props: @@ -26542,6 +29075,9 @@ catalog: value: IR-08a.03 class: sp800-53a prose: an incident response plan is developed that provides a high-level approach for how the incident response capability fits into the overall organization; + links: + - href: '#ir-8_smt.a.3' + rel: assessment-for - id: ir-8_obj.a.4 name: assessment-objective props: @@ -26549,6 +29085,9 @@ catalog: value: IR-08a.04 class: sp800-53a prose: an incident response plan is developed that meets the unique requirements of the organization with regard to mission, size, structure, and functions; + links: + - href: '#ir-8_smt.a.4' + rel: assessment-for - id: ir-8_obj.a.5 name: assessment-objective props: @@ -26556,6 +29095,9 @@ catalog: value: IR-08a.05 class: sp800-53a prose: an incident response plan is developed that defines reportable incidents; + links: + - href: '#ir-8_smt.a.5' + rel: assessment-for - id: ir-8_obj.a.6 name: assessment-objective props: @@ -26563,6 +29105,9 @@ catalog: value: IR-08a.06 class: sp800-53a prose: an incident response plan is developed that provides metrics for measuring the incident response capability within the organization; + links: + - href: '#ir-8_smt.a.6' + rel: assessment-for - id: ir-8_obj.a.7 name: assessment-objective props: @@ -26570,6 +29115,9 @@ catalog: value: IR-08a.07 class: sp800-53a prose: an incident response plan is developed that defines the resources and management support needed to effectively maintain and mature an incident response capability; + links: + - href: '#ir-8_smt.a.7' + rel: assessment-for - id: ir-8_obj.a.8 name: assessment-objective props: @@ -26577,6 +29125,9 @@ catalog: value: IR-08a.08 class: sp800-53a prose: an incident response plan is developed that addresses the sharing of incident information; + links: + - href: '#ir-8_smt.a.8' + rel: assessment-for - id: ir-8_obj.a.9 name: assessment-objective props: @@ -26584,6 +29135,9 @@ catalog: value: IR-08a.09 class: sp800-53a prose: 'an incident response plan is developed that is reviewed and approved by {{ insert: param, ir-08_odp.01 }} {{ insert: param, ir-08_odp.02 }};' + links: + - href: '#ir-8_smt.a.9' + rel: assessment-for - id: ir-8_obj.a.10 name: assessment-objective props: @@ -26591,6 +29145,12 @@ catalog: value: IR-08a.10 class: sp800-53a prose: 'an incident response plan is developed that explicitly designates responsibility for incident response to {{ insert: param, ir-08_odp.03 }}.' + links: + - href: '#ir-8_smt.a.10' + rel: assessment-for + links: + - href: '#ir-8_smt.a' + rel: assessment-for - id: ir-8_obj.b name: assessment-objective props: @@ -26605,6 +29165,9 @@ catalog: value: IR-08b.[01] class: sp800-53a prose: 'copies of the incident response plan are distributed to {{ insert: param, ir-08_odp.04 }};' + links: + - href: '#ir-8_smt.b' + rel: assessment-for - id: ir-8_obj.b-2 name: assessment-objective props: @@ -26612,6 +29175,12 @@ catalog: value: IR-08b.[02] class: sp800-53a prose: 'copies of the incident response plan are distributed to {{ insert: param, ir-08_odp.05 }};' + links: + - href: '#ir-8_smt.b' + rel: assessment-for + links: + - href: '#ir-8_smt.b' + rel: assessment-for - id: ir-8_obj.c name: assessment-objective props: @@ -26619,6 +29188,9 @@ catalog: value: IR-08c. class: sp800-53a prose: the incident response plan is updated to address system and organizational changes or problems encountered during plan implementation, execution, or testing; + links: + - href: '#ir-8_smt.c' + rel: assessment-for - id: ir-8_obj.d name: assessment-objective props: @@ -26633,6 +29205,9 @@ catalog: value: IR-08d.[01] class: sp800-53a prose: 'incident response plan changes are communicated to {{ insert: param, ir-08_odp.06 }};' + links: + - href: '#ir-8_smt.d' + rel: assessment-for - id: ir-8_obj.d-2 name: assessment-objective props: @@ -26640,6 +29215,12 @@ catalog: value: IR-08d.[02] class: sp800-53a prose: 'incident response plan changes are communicated to {{ insert: param, ir-08_odp.07 }};' + links: + - href: '#ir-8_smt.d' + rel: assessment-for + links: + - href: '#ir-8_smt.d' + rel: assessment-for - id: ir-8_obj.e name: assessment-objective props: @@ -26654,6 +29235,9 @@ catalog: value: IR-08e.[01] class: sp800-53a prose: the incident response plan is protected from unauthorized disclosure; + links: + - href: '#ir-8_smt.e' + rel: assessment-for - id: ir-8_obj.e-2 name: assessment-objective props: @@ -26661,6 +29245,15 @@ catalog: value: IR-08e.[02] class: sp800-53a prose: the incident response plan is protected from unauthorized modification. + links: + - href: '#ir-8_smt.e' + rel: assessment-for + links: + - href: '#ir-8_smt.e' + rel: assessment-for + links: + - href: '#ir-8_smt' + rel: assessment-for - id: ir-8_asm-examine name: assessment-method props: @@ -26925,6 +29518,9 @@ catalog: value: MA-01a.[01] class: sp800-53a prose: a maintenance policy is developed and documented; + links: + - href: '#ma-1_smt.a' + rel: assessment-for - id: ma-1_obj.a-2 name: assessment-objective props: @@ -26932,6 +29528,9 @@ catalog: value: MA-01a.[02] class: sp800-53a prose: 'the maintenance policy is disseminated to {{ insert: param, ma-01_odp.01 }};' + links: + - href: '#ma-1_smt.a' + rel: assessment-for - id: ma-1_obj.a-3 name: assessment-objective props: @@ -26939,6 +29538,9 @@ catalog: value: MA-01a.[03] class: sp800-53a prose: maintenance procedures to facilitate the implementation of the maintenance policy and associated maintenance controls are developed and documented; + links: + - href: '#ma-1_smt.a' + rel: assessment-for - id: ma-1_obj.a-4 name: assessment-objective props: @@ -26946,6 +29548,9 @@ catalog: value: MA-01a.[04] class: sp800-53a prose: 'the maintenance procedures are disseminated to {{ insert: param, ma-01_odp.02 }};' + links: + - href: '#ma-1_smt.a' + rel: assessment-for - id: ma-1_obj.a.1 name: assessment-objective props: @@ -26967,6 +29572,9 @@ catalog: value: MA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses purpose;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-2 name: assessment-objective props: @@ -26974,6 +29582,9 @@ catalog: value: MA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses scope;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-3 name: assessment-objective props: @@ -26981,6 +29592,9 @@ catalog: value: MA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses roles;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-4 name: assessment-objective props: @@ -26988,6 +29602,9 @@ catalog: value: MA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses responsibilities;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-5 name: assessment-objective props: @@ -26995,6 +29612,9 @@ catalog: value: MA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses management commitment;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-6 name: assessment-objective props: @@ -27002,6 +29622,9 @@ catalog: value: MA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses coordination among organizational entities;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-7 name: assessment-objective props: @@ -27009,6 +29632,12 @@ catalog: value: MA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses compliance;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.b name: assessment-objective props: @@ -27016,6 +29645,15 @@ catalog: value: MA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ma-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ma-1_smt.a.1' + rel: assessment-for + links: + - href: '#ma-1_smt.a' + rel: assessment-for - id: ma-1_obj.b name: assessment-objective props: @@ -27023,6 +29661,9 @@ catalog: value: MA-01b. class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the maintenance policy and procedures;' + links: + - href: '#ma-1_smt.b' + rel: assessment-for - id: ma-1_obj.c name: assessment-objective props: @@ -27044,6 +29685,9 @@ catalog: value: MA-01c.01[01] class: sp800-53a prose: 'the current maintenance policy is reviewed and updated {{ insert: param, ma-01_odp.05 }};' + links: + - href: '#ma-1_smt.c.1' + rel: assessment-for - id: ma-1_obj.c.1-2 name: assessment-objective props: @@ -27051,6 +29695,12 @@ catalog: value: MA-01c.01[02] class: sp800-53a prose: 'the current maintenance policy is reviewed and updated following {{ insert: param, ma-01_odp.06 }};' + links: + - href: '#ma-1_smt.c.1' + rel: assessment-for + links: + - href: '#ma-1_smt.c.1' + rel: assessment-for - id: ma-1_obj.c.2 name: assessment-objective props: @@ -27065,6 +29715,9 @@ catalog: value: MA-01c.02[01] class: sp800-53a prose: 'the current maintenance procedures are reviewed and updated {{ insert: param, ma-01_odp.07 }};' + links: + - href: '#ma-1_smt.c.2' + rel: assessment-for - id: ma-1_obj.c.2-2 name: assessment-objective props: @@ -27072,6 +29725,18 @@ catalog: value: MA-01c.02[02] class: sp800-53a prose: 'the current maintenance procedures are reviewed and updated following {{ insert: param, ma-01_odp.08 }}.' + links: + - href: '#ma-1_smt.c.2' + rel: assessment-for + links: + - href: '#ma-1_smt.c.2' + rel: assessment-for + links: + - href: '#ma-1_smt.c' + rel: assessment-for + links: + - href: '#ma-1_smt' + rel: assessment-for - id: ma-1_asm-examine name: assessment-method props: @@ -27246,6 +29911,9 @@ catalog: value: MA-02a.[01] class: sp800-53a prose: maintenance, repair, and replacement of system components are scheduled in accordance with manufacturer or vendor specifications and/or organizational requirements; + links: + - href: '#ma-2_smt.a' + rel: assessment-for - id: ma-2_obj.a-2 name: assessment-objective props: @@ -27253,6 +29921,9 @@ catalog: value: MA-02a.[02] class: sp800-53a prose: maintenance, repair, and replacement of system components are documented in accordance with manufacturer or vendor specifications and/or organizational requirements; + links: + - href: '#ma-2_smt.a' + rel: assessment-for - id: ma-2_obj.a-3 name: assessment-objective props: @@ -27260,6 +29931,12 @@ catalog: value: MA-02a.[03] class: sp800-53a prose: records of maintenance, repair, and replacement of system components are reviewed in accordance with manufacturer or vendor specifications and/or organizational requirements; + links: + - href: '#ma-2_smt.a' + rel: assessment-for + links: + - href: '#ma-2_smt.a' + rel: assessment-for - id: ma-2_obj.b name: assessment-objective props: @@ -27274,6 +29951,9 @@ catalog: value: MA-02b.[01] class: sp800-53a prose: all maintenance activities, whether performed on site or remotely and whether the system or system components are serviced on site or removed to another location, are approved; + links: + - href: '#ma-2_smt.b' + rel: assessment-for - id: ma-2_obj.b-2 name: assessment-objective props: @@ -27281,6 +29961,12 @@ catalog: value: MA-02b.[02] class: sp800-53a prose: all maintenance activities, whether performed on site or remotely and whether the system or system components are serviced on site or removed to another location, are monitored; + links: + - href: '#ma-2_smt.b' + rel: assessment-for + links: + - href: '#ma-2_smt.b' + rel: assessment-for - id: ma-2_obj.c name: assessment-objective props: @@ -27288,6 +29974,9 @@ catalog: value: MA-02c. class: sp800-53a prose: ' {{ insert: param, ma-02_odp.01 }} is/are required to explicitly approve the removal of the system or system components from organizational facilities for off-site maintenance, repair, or replacement;' + links: + - href: '#ma-2_smt.c' + rel: assessment-for - id: ma-2_obj.d name: assessment-objective props: @@ -27295,6 +29984,9 @@ catalog: value: MA-02d. class: sp800-53a prose: 'equipment is sanitized to remove {{ insert: param, ma-02_odp.02 }} from associated media prior to removal from organizational facilities for off-site maintenance, repair, or replacement;' + links: + - href: '#ma-2_smt.d' + rel: assessment-for - id: ma-2_obj.e name: assessment-objective props: @@ -27302,6 +29994,9 @@ catalog: value: MA-02e. class: sp800-53a prose: all potentially impacted controls are checked to verify that the controls are still functioning properly following maintenance, repair, or replacement actions; + links: + - href: '#ma-2_smt.e' + rel: assessment-for - id: ma-2_obj.f name: assessment-objective props: @@ -27309,6 +30004,12 @@ catalog: value: MA-02f. class: sp800-53a prose: ' {{ insert: param, ma-02_odp.03 }} is included in organizational maintenance records.' + links: + - href: '#ma-2_smt.f' + rel: assessment-for + links: + - href: '#ma-2_smt' + rel: assessment-for - id: ma-2_asm-examine name: assessment-method props: @@ -27446,6 +30147,9 @@ catalog: value: MA-03a.[01] class: sp800-53a prose: the use of system maintenance tools is approved; + links: + - href: '#ma-3_smt.a' + rel: assessment-for - id: ma-3_obj.a-2 name: assessment-objective props: @@ -27453,6 +30157,9 @@ catalog: value: MA-03a.[02] class: sp800-53a prose: the use of system maintenance tools is controlled; + links: + - href: '#ma-3_smt.a' + rel: assessment-for - id: ma-3_obj.a-3 name: assessment-objective props: @@ -27460,6 +30167,12 @@ catalog: value: MA-03a.[03] class: sp800-53a prose: the use of system maintenance tools is monitored; + links: + - href: '#ma-3_smt.a' + rel: assessment-for + links: + - href: '#ma-3_smt.a' + rel: assessment-for - id: ma-3_obj.b name: assessment-objective props: @@ -27467,6 +30180,12 @@ catalog: value: MA-03b. class: sp800-53a prose: 'previously approved system maintenance tools are reviewed {{ insert: param, ma-03_odp }}.' + links: + - href: '#ma-3_smt.b' + rel: assessment-for + links: + - href: '#ma-3_smt' + rel: assessment-for - id: ma-3_asm-examine name: assessment-method props: @@ -27554,6 +30273,9 @@ catalog: value: MA-03(01) class: sp800-53a prose: maintenance tools used by maintenance personnel are inspected for improper or unauthorized modifications. + links: + - href: '#ma-3.1_smt' + rel: assessment-for - id: ma-3.1_asm-examine name: assessment-method props: @@ -27642,6 +30364,9 @@ catalog: value: MA-03(02) class: sp800-53a prose: media containing diagnostic and test programs are checked for malicious code before the media are used in the system. + links: + - href: '#ma-3.2_smt' + rel: assessment-for - id: ma-3.2_asm-examine name: assessment-method props: @@ -27771,6 +30496,9 @@ catalog: value: MA-03(03)(a) class: sp800-53a prose: the removal of maintenance equipment containing organizational information is prevented by verifying that there is no organizational information contained on the equipment; or + links: + - href: '#ma-3.3_smt.a' + rel: assessment-for - id: ma-3.3_obj.b name: assessment-objective props: @@ -27778,6 +30506,9 @@ catalog: value: MA-03(03)(b) class: sp800-53a prose: the removal of maintenance equipment containing organizational information is prevented by sanitizing or destroying the equipment; or + links: + - href: '#ma-3.3_smt.b' + rel: assessment-for - id: ma-3.3_obj.c name: assessment-objective props: @@ -27785,6 +30516,9 @@ catalog: value: MA-03(03)(c) class: sp800-53a prose: the removal of maintenance equipment containing organizational information is prevented by retaining the equipment within the facility; or + links: + - href: '#ma-3.3_smt.c' + rel: assessment-for - id: ma-3.3_obj.d name: assessment-objective props: @@ -27792,6 +30526,12 @@ catalog: value: MA-03(03)(d) class: sp800-53a prose: 'the removal of maintenance equipment containing organizational information is prevented by obtaining an exemption from {{ insert: param, ma-03.03_odp }} explicitly authorizing removal of the equipment from the facility.' + links: + - href: '#ma-3.3_smt.d' + rel: assessment-for + links: + - href: '#ma-3.3_smt' + rel: assessment-for - id: ma-3.3_asm-examine name: assessment-method props: @@ -27968,6 +30708,9 @@ catalog: value: MA-04a.[01] class: sp800-53a prose: nonlocal maintenance and diagnostic activities are approved; + links: + - href: '#ma-4_smt.a' + rel: assessment-for - id: ma-4_obj.a-2 name: assessment-objective props: @@ -27975,6 +30718,12 @@ catalog: value: MA-04a.[02] class: sp800-53a prose: nonlocal maintenance and diagnostic activities are monitored; + links: + - href: '#ma-4_smt.a' + rel: assessment-for + links: + - href: '#ma-4_smt.a' + rel: assessment-for - id: ma-4_obj.b name: assessment-objective props: @@ -27989,6 +30738,9 @@ catalog: value: MA-04b.[01] class: sp800-53a prose: the use of nonlocal maintenance and diagnostic tools are allowed only as consistent with organizational policy; + links: + - href: '#ma-4_smt.b' + rel: assessment-for - id: ma-4_obj.b-2 name: assessment-objective props: @@ -27996,6 +30748,12 @@ catalog: value: MA-04b.[02] class: sp800-53a prose: the use of nonlocal maintenance and diagnostic tools are documented in the security plan for the system; + links: + - href: '#ma-4_smt.b' + rel: assessment-for + links: + - href: '#ma-4_smt.b' + rel: assessment-for - id: ma-4_obj.c name: assessment-objective props: @@ -28003,6 +30761,9 @@ catalog: value: MA-04c. class: sp800-53a prose: strong authentication is employed in the establishment of nonlocal maintenance and diagnostic sessions; + links: + - href: '#ma-4_smt.c' + rel: assessment-for - id: ma-4_obj.d name: assessment-objective props: @@ -28010,6 +30771,9 @@ catalog: value: MA-04d. class: sp800-53a prose: records for nonlocal maintenance and diagnostic activities are maintained; + links: + - href: '#ma-4_smt.d' + rel: assessment-for - id: ma-4_obj.e name: assessment-objective props: @@ -28024,6 +30788,9 @@ catalog: value: MA-04e.[01] class: sp800-53a prose: session connections are terminated when nonlocal maintenance is completed; + links: + - href: '#ma-4_smt.e' + rel: assessment-for - id: ma-4_obj.e-2 name: assessment-objective props: @@ -28031,6 +30798,15 @@ catalog: value: MA-04e.[02] class: sp800-53a prose: network connections are terminated when nonlocal maintenance is completed. + links: + - href: '#ma-4_smt.e' + rel: assessment-for + links: + - href: '#ma-4_smt.e' + rel: assessment-for + links: + - href: '#ma-4_smt' + rel: assessment-for - id: ma-4_asm-examine name: assessment-method props: @@ -28185,6 +30961,9 @@ catalog: value: MA-05a.[01] class: sp800-53a prose: a process for maintenance personnel authorization is established; + links: + - href: '#ma-5_smt.a' + rel: assessment-for - id: ma-5_obj.a-2 name: assessment-objective props: @@ -28192,6 +30971,12 @@ catalog: value: MA-05a.[02] class: sp800-53a prose: a list of authorized maintenance organizations or personnel is maintained; + links: + - href: '#ma-5_smt.a' + rel: assessment-for + links: + - href: '#ma-5_smt.a' + rel: assessment-for - id: ma-5_obj.b name: assessment-objective props: @@ -28199,6 +30984,9 @@ catalog: value: MA-05b. class: sp800-53a prose: non-escorted personnel performing maintenance on the system possess the required access authorizations; + links: + - href: '#ma-5_smt.b' + rel: assessment-for - id: ma-5_obj.c name: assessment-objective props: @@ -28206,6 +30994,12 @@ catalog: value: MA-05c. class: sp800-53a prose: organizational personnel with required access authorizations and technical competence is/are designated to supervise the maintenance activities of personnel who do not possess the required access authorizations. + links: + - href: '#ma-5_smt.c' + rel: assessment-for + links: + - href: '#ma-5_smt' + rel: assessment-for - id: ma-5_asm-examine name: assessment-method props: @@ -28333,6 +31127,9 @@ catalog: value: MA-06 class: sp800-53a prose: 'maintenance support and/or spare parts are obtained for {{ insert: param, ma-06_odp.01 }} within {{ insert: param, ma-06_odp.02 }} of failure.' + links: + - href: '#ma-6_smt' + rel: assessment-for - id: ma-6_asm-examine name: assessment-method props: @@ -28601,6 +31398,9 @@ catalog: value: MP-01a.[01] class: sp800-53a prose: a media protection policy is developed and documented; + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.a-2 name: assessment-objective props: @@ -28608,6 +31408,9 @@ catalog: value: MP-01a.[02] class: sp800-53a prose: 'the media protection policy is disseminated to {{ insert: param, mp-01_odp.01 }};' + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.a-3 name: assessment-objective props: @@ -28615,6 +31418,9 @@ catalog: value: MP-01a.[03] class: sp800-53a prose: media protection procedures to facilitate the implementation of the media protection policy and associated media protection controls are developed and documented; + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.a-4 name: assessment-objective props: @@ -28622,6 +31428,9 @@ catalog: value: MP-01a.[04] class: sp800-53a prose: 'the media protection procedures are disseminated to {{ insert: param, mp-01_odp.02 }};' + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.a.1 name: assessment-objective props: @@ -28643,6 +31452,9 @@ catalog: value: MP-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses purpose;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-2 name: assessment-objective props: @@ -28650,6 +31462,9 @@ catalog: value: MP-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses scope;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-3 name: assessment-objective props: @@ -28657,6 +31472,9 @@ catalog: value: MP-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses roles;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-4 name: assessment-objective props: @@ -28664,6 +31482,9 @@ catalog: value: MP-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses responsibilities;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-5 name: assessment-objective props: @@ -28671,6 +31492,9 @@ catalog: value: MP-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses management commitment;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-6 name: assessment-objective props: @@ -28678,6 +31502,9 @@ catalog: value: MP-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses coordination among organizational entities;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-7 name: assessment-objective props: @@ -28685,6 +31512,12 @@ catalog: value: MP-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy compliance;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.b name: assessment-objective props: @@ -28692,6 +31525,15 @@ catalog: value: MP-01a.01(b) class: sp800-53a prose: the media protection policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines; + links: + - href: '#mp-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#mp-1_smt.a.1' + rel: assessment-for + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.b name: assessment-objective props: @@ -28699,6 +31541,9 @@ catalog: value: MP-01b. class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the media protection policy and procedures.' + links: + - href: '#mp-1_smt.b' + rel: assessment-for - id: mp-1_obj.c name: assessment-objective props: @@ -28720,6 +31565,9 @@ catalog: value: MP-01c.01[01] class: sp800-53a prose: 'the current media protection policy is reviewed and updated {{ insert: param, mp-01_odp.05 }}; ' + links: + - href: '#mp-1_smt.c.1' + rel: assessment-for - id: mp-1_obj.c.1-2 name: assessment-objective props: @@ -28727,6 +31575,12 @@ catalog: value: MP-01c.01[02] class: sp800-53a prose: 'the current media protection policy is reviewed and updated following {{ insert: param, mp-01_odp.06 }};' + links: + - href: '#mp-1_smt.c.1' + rel: assessment-for + links: + - href: '#mp-1_smt.c.1' + rel: assessment-for - id: mp-1_obj.c.2 name: assessment-objective props: @@ -28741,6 +31595,9 @@ catalog: value: MP-01c.02[01] class: sp800-53a prose: 'the current media protection procedures are reviewed and updated {{ insert: param, mp-01_odp.07 }}; ' + links: + - href: '#mp-1_smt.c.2' + rel: assessment-for - id: mp-1_obj.c.2-2 name: assessment-objective props: @@ -28748,6 +31605,18 @@ catalog: value: MP-01c.02[02] class: sp800-53a prose: 'the current media protection procedures are reviewed and updated following {{ insert: param, mp-01_odp.08 }}.' + links: + - href: '#mp-1_smt.c.2' + rel: assessment-for + links: + - href: '#mp-1_smt.c.2' + rel: assessment-for + links: + - href: '#mp-1_smt.c' + rel: assessment-for + links: + - href: '#mp-1_smt' + rel: assessment-for - id: mp-1_asm-examine name: assessment-method props: @@ -28905,6 +31774,9 @@ catalog: value: MP-02[01] class: sp800-53a prose: 'access to {{ insert: param, mp-02_odp.01 }} is restricted to {{ insert: param, mp-02_odp.02 }};' + links: + - href: '#mp-2_smt' + rel: assessment-for - id: mp-2_obj-2 name: assessment-objective props: @@ -28912,6 +31784,12 @@ catalog: value: MP-02[02] class: sp800-53a prose: 'access to {{ insert: param, mp-02_odp.03 }} is restricted to {{ insert: param, mp-02_odp.04 }}.' + links: + - href: '#mp-2_smt' + rel: assessment-for + links: + - href: '#mp-2_smt' + rel: assessment-for - id: mp-2_asm-examine name: assessment-method props: @@ -29059,6 +31937,9 @@ catalog: value: MP-03a. class: sp800-53a prose: system media is marked to indicate distribution limitations, handling caveats, and applicable security markings (if any) of the information; + links: + - href: '#mp-3_smt.a' + rel: assessment-for - id: mp-3_obj.b name: assessment-objective props: @@ -29066,6 +31947,12 @@ catalog: value: MP-03b. class: sp800-53a prose: ' {{ insert: param, mp-03_odp.01 }} remain within {{ insert: param, mp-03_odp.02 }}.' + links: + - href: '#mp-3_smt.b' + rel: assessment-for + links: + - href: '#mp-3_smt' + rel: assessment-for - id: mp-3_asm-examine name: assessment-method props: @@ -29293,6 +32180,9 @@ catalog: value: MP-04a.[01] class: sp800-53a prose: ' {{ insert: param, mp-04_odp.01 }} are physically controlled;' + links: + - href: '#mp-4_smt.a' + rel: assessment-for - id: mp-4_obj.a-2 name: assessment-objective props: @@ -29300,6 +32190,9 @@ catalog: value: MP-04a.[02] class: sp800-53a prose: ' {{ insert: param, mp-04_odp.02 }} are physically controlled;' + links: + - href: '#mp-4_smt.a' + rel: assessment-for - id: mp-4_obj.a-3 name: assessment-objective props: @@ -29307,6 +32200,9 @@ catalog: value: MP-04a.[03] class: sp800-53a prose: ' {{ insert: param, mp-04_odp.03 }} are securely stored within {{ insert: param, mp-04_odp.05 }};' + links: + - href: '#mp-4_smt.a' + rel: assessment-for - id: mp-4_obj.a-4 name: assessment-objective props: @@ -29314,6 +32210,12 @@ catalog: value: MP-04a.[04] class: sp800-53a prose: ' {{ insert: param, mp-04_odp.04 }} are securely stored within {{ insert: param, mp-04_odp.06 }};' + links: + - href: '#mp-4_smt.a' + rel: assessment-for + links: + - href: '#mp-4_smt.a' + rel: assessment-for - id: mp-4_obj.b name: assessment-objective props: @@ -29321,6 +32223,12 @@ catalog: value: MP-04b. class: sp800-53a prose: system media types (defined in MP-04_ODP[01], MP-04_ODP[02], MP-04_ODP[03], MP-04_ODP[04]) are protected until the media are destroyed or sanitized using approved equipment, techniques, and procedures. + links: + - href: '#mp-4_smt.b' + rel: assessment-for + links: + - href: '#mp-4_smt' + rel: assessment-for - id: mp-4_asm-examine name: assessment-method props: @@ -29511,6 +32419,9 @@ catalog: value: MP-05a.[01] class: sp800-53a prose: ' {{ insert: param, mp-05_odp.01 }} are protected during transport outside of controlled areas using {{ insert: param, mp-05_odp.02 }};' + links: + - href: '#mp-5_smt.a' + rel: assessment-for - id: mp-5_obj.a-2 name: assessment-objective props: @@ -29518,6 +32429,12 @@ catalog: value: MP-05a.[02] class: sp800-53a prose: ' {{ insert: param, mp-05_odp.01 }} are controlled during transport outside of controlled areas using {{ insert: param, mp-05_odp.03 }};' + links: + - href: '#mp-5_smt.a' + rel: assessment-for + links: + - href: '#mp-5_smt.a' + rel: assessment-for - id: mp-5_obj.b name: assessment-objective props: @@ -29525,6 +32442,9 @@ catalog: value: MP-05b. class: sp800-53a prose: accountability for system media is maintained during transport outside of controlled areas; + links: + - href: '#mp-5_smt.b' + rel: assessment-for - id: mp-5_obj.c name: assessment-objective props: @@ -29532,6 +32452,9 @@ catalog: value: MP-05c. class: sp800-53a prose: activities associated with the transport of system media are documented; + links: + - href: '#mp-5_smt.c' + rel: assessment-for - id: mp-5_obj.d name: assessment-objective props: @@ -29546,6 +32469,9 @@ catalog: value: MP-05d.[01] class: sp800-53a prose: personnel authorized to conduct media transport activities is/are identified; + links: + - href: '#mp-5_smt.d' + rel: assessment-for - id: mp-5_obj.d-2 name: assessment-objective props: @@ -29553,6 +32479,15 @@ catalog: value: MP-05d.[02] class: sp800-53a prose: activities associated with the transport of system media are restricted to identified authorized personnel. + links: + - href: '#mp-5_smt.d' + rel: assessment-for + links: + - href: '#mp-5_smt.d' + rel: assessment-for + links: + - href: '#mp-5_smt' + rel: assessment-for - id: mp-5_asm-examine name: assessment-method props: @@ -29786,6 +32721,9 @@ catalog: value: MP-06a.[01] class: sp800-53a prose: ' {{ insert: param, mp-06_odp.01 }} is sanitized using {{ insert: param, mp-06_odp.04 }} prior to disposal;' + links: + - href: '#mp-6_smt.a' + rel: assessment-for - id: mp-6_obj.a-2 name: assessment-objective props: @@ -29793,6 +32731,9 @@ catalog: value: MP-06a.[02] class: sp800-53a prose: ' {{ insert: param, mp-06_odp.02 }} is sanitized using {{ insert: param, mp-06_odp.05 }} prior to release from organizational control;' + links: + - href: '#mp-6_smt.a' + rel: assessment-for - id: mp-6_obj.a-3 name: assessment-objective props: @@ -29800,6 +32741,12 @@ catalog: value: MP-06a.[03] class: sp800-53a prose: ' {{ insert: param, mp-06_odp.03 }} is sanitized using {{ insert: param, mp-06_odp.06 }} prior to release for reuse;' + links: + - href: '#mp-6_smt.a' + rel: assessment-for + links: + - href: '#mp-6_smt.a' + rel: assessment-for - id: mp-6_obj.b name: assessment-objective props: @@ -29807,6 +32754,12 @@ catalog: value: MP-06b. class: sp800-53a prose: sanitization mechanisms with strength and integrity commensurate with the security category or classification of the information are employed. + links: + - href: '#mp-6_smt.b' + rel: assessment-for + links: + - href: '#mp-6_smt' + rel: assessment-for - id: mp-6_asm-examine name: assessment-method props: @@ -29982,6 +32935,9 @@ catalog: value: MP-07a. class: sp800-53a prose: 'the use of {{ insert: param, mp-07_odp.01 }} is {{ insert: param, mp-07_odp.02 }} on {{ insert: param, mp-07_odp.03 }} using {{ insert: param, mp-07_odp.04 }};' + links: + - href: '#mp-7_smt.a' + rel: assessment-for - id: mp-7_obj.b name: assessment-objective props: @@ -29989,6 +32945,12 @@ catalog: value: MP-07b. class: sp800-53a prose: the use of portable storage devices in organizational systems is prohibited when such devices have no identifiable owner. + links: + - href: '#mp-7_smt.b' + rel: assessment-for + links: + - href: '#mp-7_smt' + rel: assessment-for - id: mp-7_asm-examine name: assessment-method props: @@ -30262,6 +33224,9 @@ catalog: value: PE-01a.[01] class: sp800-53a prose: a physical and environmental protection policy is developed and documented; + links: + - href: '#pe-1_smt.a' + rel: assessment-for - id: pe-1_obj.a-2 name: assessment-objective props: @@ -30269,6 +33234,9 @@ catalog: value: PE-01a.[02] class: sp800-53a prose: 'the physical and environmental protection policy is disseminated to {{ insert: param, pe-01_odp.01 }};' + links: + - href: '#pe-1_smt.a' + rel: assessment-for - id: pe-1_obj.a-3 name: assessment-objective props: @@ -30276,6 +33244,9 @@ catalog: value: PE-01a.[03] class: sp800-53a prose: physical and environmental protection procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls are developed and documented; + links: + - href: '#pe-1_smt.a' + rel: assessment-for - id: pe-1_obj.a-4 name: assessment-objective props: @@ -30283,6 +33254,9 @@ catalog: value: PE-01a.[04] class: sp800-53a prose: 'the physical and environmental protection procedures are disseminated to {{ insert: param, pe-01_odp.02 }};' + links: + - href: '#pe-1_smt.a' + rel: assessment-for - id: pe-1_obj.a.1 name: assessment-objective props: @@ -30304,6 +33278,9 @@ catalog: value: PE-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses purpose;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-2 name: assessment-objective props: @@ -30311,6 +33288,9 @@ catalog: value: PE-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses scope;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-3 name: assessment-objective props: @@ -30318,6 +33298,9 @@ catalog: value: PE-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses roles;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-4 name: assessment-objective props: @@ -30325,6 +33308,9 @@ catalog: value: PE-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses responsibilities;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-5 name: assessment-objective props: @@ -30332,6 +33318,9 @@ catalog: value: PE-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses management commitment;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-6 name: assessment-objective props: @@ -30339,6 +33328,9 @@ catalog: value: PE-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses coordination among organizational entities;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-7 name: assessment-objective props: @@ -30346,6 +33338,12 @@ catalog: value: PE-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses compliance;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.b name: assessment-objective props: @@ -30353,6 +33351,15 @@ catalog: value: PE-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#pe-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#pe-1_smt.a.1' + rel: assessment-for + links: + - href: '#pe-1_smt.a' + rel: assessment-for - id: pe-1_obj.b name: assessment-objective props: @@ -30360,6 +33367,9 @@ catalog: value: PE-01b. class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the physical and environmental protection policy and procedures;' + links: + - href: '#pe-1_smt.b' + rel: assessment-for - id: pe-1_obj.c name: assessment-objective props: @@ -30381,6 +33391,9 @@ catalog: value: PE-01c.01[01] class: sp800-53a prose: 'the current physical and environmental protection policy is reviewed and updated {{ insert: param, pe-01_odp.05 }};' + links: + - href: '#pe-1_smt.c.1' + rel: assessment-for - id: pe-1_obj.c.1-2 name: assessment-objective props: @@ -30388,6 +33401,12 @@ catalog: value: PE-01c.01[02] class: sp800-53a prose: 'the current physical and environmental protection policy is reviewed and updated following {{ insert: param, pe-01_odp.06 }};' + links: + - href: '#pe-1_smt.c.1' + rel: assessment-for + links: + - href: '#pe-1_smt.c.1' + rel: assessment-for - id: pe-1_obj.c.2 name: assessment-objective props: @@ -30402,6 +33421,9 @@ catalog: value: PE-01c.02[01] class: sp800-53a prose: 'the current physical and environmental protection procedures are reviewed and updated {{ insert: param, pe-01_odp.07 }};' + links: + - href: '#pe-1_smt.c.2' + rel: assessment-for - id: pe-1_obj.c.2-2 name: assessment-objective props: @@ -30409,6 +33431,18 @@ catalog: value: PE-01c.02[02] class: sp800-53a prose: 'the current physical and environmental protection procedures are reviewed and updated following {{ insert: param, pe-01_odp.08 }}.' + links: + - href: '#pe-1_smt.c.2' + rel: assessment-for + links: + - href: '#pe-1_smt.c.2' + rel: assessment-for + links: + - href: '#pe-1_smt.c' + rel: assessment-for + links: + - href: '#pe-1_smt' + rel: assessment-for - id: pe-1_asm-examine name: assessment-method props: @@ -30559,6 +33593,9 @@ catalog: value: PE-02a.[01] class: sp800-53a prose: a list of individuals with authorized access to the facility where the system resides has been developed; + links: + - href: '#pe-2_smt.a' + rel: assessment-for - id: pe-2_obj.a-2 name: assessment-objective props: @@ -30566,6 +33603,9 @@ catalog: value: PE-02a.[02] class: sp800-53a prose: the list of individuals with authorized access to the facility where the system resides has been approved; + links: + - href: '#pe-2_smt.a' + rel: assessment-for - id: pe-2_obj.a-3 name: assessment-objective props: @@ -30573,6 +33613,12 @@ catalog: value: PE-02a.[03] class: sp800-53a prose: the list of individuals with authorized access to the facility where the system resides has been maintained; + links: + - href: '#pe-2_smt.a' + rel: assessment-for + links: + - href: '#pe-2_smt.a' + rel: assessment-for - id: pe-2_obj.b name: assessment-objective props: @@ -30580,6 +33626,9 @@ catalog: value: PE-02b. class: sp800-53a prose: authorization credentials are issued for facility access; + links: + - href: '#pe-2_smt.b' + rel: assessment-for - id: pe-2_obj.c name: assessment-objective props: @@ -30587,6 +33636,9 @@ catalog: value: PE-02c. class: sp800-53a prose: 'the access list detailing authorized facility access by individuals is reviewed {{ insert: param, pe-02_odp }};' + links: + - href: '#pe-2_smt.c' + rel: assessment-for - id: pe-2_obj.d name: assessment-objective props: @@ -30594,6 +33646,12 @@ catalog: value: PE-02d. class: sp800-53a prose: individuals are removed from the facility access list when access is no longer required. + links: + - href: '#pe-2_smt.d' + rel: assessment-for + links: + - href: '#pe-2_smt' + rel: assessment-for - id: pe-2_asm-examine name: assessment-method props: @@ -30924,6 +33982,9 @@ catalog: value: PE-03a.01 class: sp800-53a prose: 'physical access authorizations are enforced at {{ insert: param, pe-03_odp.01 }} by verifying individual access authorizations before granting access to the facility;' + links: + - href: '#pe-3_smt.a.1' + rel: assessment-for - id: pe-3_obj.a.2 name: assessment-objective props: @@ -30931,6 +33992,12 @@ catalog: value: PE-03a.02 class: sp800-53a prose: 'physical access authorizations are enforced at {{ insert: param, pe-03_odp.01 }} by controlling ingress and egress to the facility using {{ insert: param, pe-03_odp.02 }};' + links: + - href: '#pe-3_smt.a.2' + rel: assessment-for + links: + - href: '#pe-3_smt.a' + rel: assessment-for - id: pe-3_obj.b name: assessment-objective props: @@ -30938,6 +34005,9 @@ catalog: value: PE-03b. class: sp800-53a prose: 'physical access audit logs are maintained for {{ insert: param, pe-03_odp.04 }};' + links: + - href: '#pe-3_smt.b' + rel: assessment-for - id: pe-3_obj.c name: assessment-objective props: @@ -30945,6 +34015,9 @@ catalog: value: PE-03c. class: sp800-53a prose: 'access to areas within the facility designated as publicly accessible are maintained by implementing {{ insert: param, pe-03_odp.05 }};' + links: + - href: '#pe-3_smt.c' + rel: assessment-for - id: pe-3_obj.d name: assessment-objective props: @@ -30959,6 +34032,9 @@ catalog: value: PE-03d.[01] class: sp800-53a prose: visitors are escorted; + links: + - href: '#pe-3_smt.d' + rel: assessment-for - id: pe-3_obj.d-2 name: assessment-objective props: @@ -30966,6 +34042,12 @@ catalog: value: PE-03d.[02] class: sp800-53a prose: 'visitor activity is controlled {{ insert: param, pe-03_odp.06 }};' + links: + - href: '#pe-3_smt.d' + rel: assessment-for + links: + - href: '#pe-3_smt.d' + rel: assessment-for - id: pe-3_obj.e name: assessment-objective props: @@ -30980,6 +34062,9 @@ catalog: value: PE-03e.[01] class: sp800-53a prose: keys are secured; + links: + - href: '#pe-3_smt.e' + rel: assessment-for - id: pe-3_obj.e-2 name: assessment-objective props: @@ -30987,6 +34072,9 @@ catalog: value: PE-03e.[02] class: sp800-53a prose: combinations are secured; + links: + - href: '#pe-3_smt.e' + rel: assessment-for - id: pe-3_obj.e-3 name: assessment-objective props: @@ -30994,6 +34082,12 @@ catalog: value: PE-03e.[03] class: sp800-53a prose: other physical access devices are secured; + links: + - href: '#pe-3_smt.e' + rel: assessment-for + links: + - href: '#pe-3_smt.e' + rel: assessment-for - id: pe-3_obj.f name: assessment-objective props: @@ -31001,6 +34095,9 @@ catalog: value: PE-03f. class: sp800-53a prose: ' {{ insert: param, pe-03_odp.07 }} are inventoried {{ insert: param, pe-03_odp.08 }};' + links: + - href: '#pe-3_smt.f' + rel: assessment-for - id: pe-3_obj.g name: assessment-objective props: @@ -31015,6 +34112,9 @@ catalog: value: PE-03g.[01] class: sp800-53a prose: 'combinations are changed {{ insert: param, pe-03_odp.09 }} , when combinations are compromised, or when individuals possessing the combinations are transferred or terminated;' + links: + - href: '#pe-3_smt.g' + rel: assessment-for - id: pe-3_obj.g-2 name: assessment-objective props: @@ -31022,6 +34122,15 @@ catalog: value: PE-03g.[02] class: sp800-53a prose: 'keys are changed {{ insert: param, pe-03_odp.10 }} , when keys are lost, or when individuals possessing the keys are transferred or terminated.' + links: + - href: '#pe-3_smt.g' + rel: assessment-for + links: + - href: '#pe-3_smt.g' + rel: assessment-for + links: + - href: '#pe-3_smt' + rel: assessment-for - id: pe-3_asm-examine name: assessment-method props: @@ -31157,6 +34266,9 @@ catalog: value: PE-04 class: sp800-53a prose: 'physical access to {{ insert: param, pe-04_odp.01 }} within organizational facilities is controlled using {{ insert: param, pe-04_odp.02 }}.' + links: + - href: '#pe-4_smt' + rel: assessment-for - id: pe-4_asm-examine name: assessment-method props: @@ -31262,6 +34374,9 @@ catalog: value: PE-05 class: sp800-53a prose: 'physical access to output from {{ insert: param, pe-05_odp }} is controlled to prevent unauthorized individuals from obtaining the output.' + links: + - href: '#pe-5_smt' + rel: assessment-for - id: pe-5_asm-examine name: assessment-method props: @@ -31416,6 +34531,9 @@ catalog: value: PE-06a. class: sp800-53a prose: physical access to the facility where the system resides is monitored to detect and respond to physical security incidents; + links: + - href: '#pe-6_smt.a' + rel: assessment-for - id: pe-6_obj.b name: assessment-objective props: @@ -31430,6 +34548,9 @@ catalog: value: PE-06b.[01] class: sp800-53a prose: 'physical access logs are reviewed {{ insert: param, pe-06_odp.01 }};' + links: + - href: '#pe-6_smt.b' + rel: assessment-for - id: pe-6_obj.b-2 name: assessment-objective props: @@ -31437,6 +34558,12 @@ catalog: value: PE-06b.[02] class: sp800-53a prose: 'physical access logs are reviewed upon occurrence of {{ insert: param, pe-06_odp.02 }};' + links: + - href: '#pe-6_smt.b' + rel: assessment-for + links: + - href: '#pe-6_smt.b' + rel: assessment-for - id: pe-6_obj.c name: assessment-objective props: @@ -31451,6 +34578,9 @@ catalog: value: PE-06c.[01] class: sp800-53a prose: results of reviews are coordinated with organizational incident response capabilities; + links: + - href: '#pe-6_smt.c' + rel: assessment-for - id: pe-6_obj.c-2 name: assessment-objective props: @@ -31458,6 +34588,15 @@ catalog: value: PE-06c.[02] class: sp800-53a prose: results of investigations are coordinated with organizational incident response capabilities. + links: + - href: '#pe-6_smt.c' + rel: assessment-for + links: + - href: '#pe-6_smt.c' + rel: assessment-for + links: + - href: '#pe-6_smt' + rel: assessment-for - id: pe-6_asm-examine name: assessment-method props: @@ -31559,6 +34698,9 @@ catalog: value: PE-06(01)[01] class: sp800-53a prose: physical access to the facility where the system resides is monitored using physical intrusion alarms; + links: + - href: '#pe-6.1_smt' + rel: assessment-for - id: pe-6.1_obj-2 name: assessment-objective props: @@ -31566,6 +34708,12 @@ catalog: value: PE-06(01)[02] class: sp800-53a prose: physical access to the facility where the system resides is monitored using physical surveillance equipment. + links: + - href: '#pe-6.1_smt' + rel: assessment-for + links: + - href: '#pe-6.1_smt' + rel: assessment-for - id: pe-6.1_asm-examine name: assessment-method props: @@ -31725,6 +34873,9 @@ catalog: value: PE-08a. class: sp800-53a prose: 'visitor access records for the facility where the system resides are maintained for {{ insert: param, pe-08_odp.01 }};' + links: + - href: '#pe-8_smt.a' + rel: assessment-for - id: pe-8_obj.b name: assessment-objective props: @@ -31732,6 +34883,9 @@ catalog: value: PE-08b. class: sp800-53a prose: 'visitor access records are reviewed {{ insert: param, pe-08_odp.02 }};' + links: + - href: '#pe-8_smt.b' + rel: assessment-for - id: pe-8_obj.c name: assessment-objective props: @@ -31739,6 +34893,12 @@ catalog: value: PE-08c. class: sp800-53a prose: 'visitor access records anomalies are reported to {{ insert: param, pe-08_odp.03 }}.' + links: + - href: '#pe-8_smt.c' + rel: assessment-for + links: + - href: '#pe-8_smt' + rel: assessment-for - id: pe-8_asm-examine name: assessment-method props: @@ -31836,6 +34996,9 @@ catalog: value: PE-09[01] class: sp800-53a prose: power equipment for the system is protected from damage and destruction; + links: + - href: '#pe-9_smt' + rel: assessment-for - id: pe-9_obj-2 name: assessment-objective props: @@ -31843,6 +35006,12 @@ catalog: value: PE-09[02] class: sp800-53a prose: power cabling for the system is protected from damage and destruction. + links: + - href: '#pe-9_smt' + rel: assessment-for + links: + - href: '#pe-9_smt' + rel: assessment-for - id: pe-9_asm-examine name: assessment-method props: @@ -31971,6 +35140,9 @@ catalog: value: PE-10a. class: sp800-53a prose: 'the capability to shut off power to {{ insert: param, pe-10_odp.01 }} in emergency situations is provided;' + links: + - href: '#pe-10_smt.a' + rel: assessment-for - id: pe-10_obj.b name: assessment-objective props: @@ -31978,6 +35150,9 @@ catalog: value: PE-10b. class: sp800-53a prose: 'emergency shutoff switches or devices are placed in {{ insert: param, pe-10_odp.02 }} to facilitate access for authorized personnel;' + links: + - href: '#pe-10_smt.b' + rel: assessment-for - id: pe-10_obj.c name: assessment-objective props: @@ -31985,6 +35160,12 @@ catalog: value: PE-10c. class: sp800-53a prose: the emergency power shutoff capability is protected from unauthorized activation. + links: + - href: '#pe-10_smt.c' + rel: assessment-for + links: + - href: '#pe-10_smt' + rel: assessment-for - id: pe-10_asm-examine name: assessment-method props: @@ -32084,6 +35265,9 @@ catalog: value: PE-11 class: sp800-53a prose: 'an uninterruptible power supply is provided to facilitate {{ insert: param, pe-11_odp }} in the event of a primary power source loss.' + links: + - href: '#pe-11_smt' + rel: assessment-for - id: pe-11_asm-examine name: assessment-method props: @@ -32179,6 +35363,9 @@ catalog: value: PE-12[01] class: sp800-53a prose: automatic emergency lighting that activates in the event of a power outage or disruption is employed for the system; + links: + - href: '#pe-12_smt' + rel: assessment-for - id: pe-12_obj-2 name: assessment-objective props: @@ -32186,6 +35373,9 @@ catalog: value: PE-12[02] class: sp800-53a prose: automatic emergency lighting that activates in the event of a power outage or disruption is maintained for the system; + links: + - href: '#pe-12_smt' + rel: assessment-for - id: pe-12_obj-3 name: assessment-objective props: @@ -32193,6 +35383,9 @@ catalog: value: PE-12[03] class: sp800-53a prose: automatic emergency lighting for the system covers emergency exits within the facility; + links: + - href: '#pe-12_smt' + rel: assessment-for - id: pe-12_obj-4 name: assessment-objective props: @@ -32200,6 +35393,12 @@ catalog: value: PE-12[04] class: sp800-53a prose: automatic emergency lighting for the system covers evacuation routes within the facility. + links: + - href: '#pe-12_smt' + rel: assessment-for + links: + - href: '#pe-12_smt' + rel: assessment-for - id: pe-12_asm-examine name: assessment-method props: @@ -32290,6 +35489,9 @@ catalog: value: PE-13[01] class: sp800-53a prose: fire detection systems are employed; + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_obj-2 name: assessment-objective props: @@ -32297,6 +35499,9 @@ catalog: value: PE-13[02] class: sp800-53a prose: employed fire detection systems are supported by an independent energy source; + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_obj-3 name: assessment-objective props: @@ -32304,6 +35509,9 @@ catalog: value: PE-13[03] class: sp800-53a prose: employed fire detection systems are maintained; + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_obj-4 name: assessment-objective props: @@ -32311,6 +35519,9 @@ catalog: value: PE-13[04] class: sp800-53a prose: fire suppression systems are employed; + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_obj-5 name: assessment-objective props: @@ -32318,6 +35529,9 @@ catalog: value: PE-13[05] class: sp800-53a prose: employed fire suppression systems are supported by an independent energy source; + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_obj-6 name: assessment-objective props: @@ -32325,6 +35539,12 @@ catalog: value: PE-13[06] class: sp800-53a prose: employed fire suppression systems are maintained. + links: + - href: '#pe-13_smt' + rel: assessment-for + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_asm-examine name: assessment-method props: @@ -32437,6 +35657,9 @@ catalog: value: PE-13(01)[01] class: sp800-53a prose: fire detection systems that activate automatically are employed in the event of a fire; + links: + - href: '#pe-13.1_smt' + rel: assessment-for - id: pe-13.1_obj-2 name: assessment-objective props: @@ -32444,6 +35667,9 @@ catalog: value: PE-13(01)[02] class: sp800-53a prose: 'fire detection systems that notify {{ insert: param, pe-13.01_odp.01 }} automatically are employed in the event of a fire;' + links: + - href: '#pe-13.1_smt' + rel: assessment-for - id: pe-13.1_obj-3 name: assessment-objective props: @@ -32451,6 +35677,12 @@ catalog: value: PE-13(01)[03] class: sp800-53a prose: 'fire detection systems that notify {{ insert: param, pe-13.01_odp.02 }} automatically are employed in the event of a fire.' + links: + - href: '#pe-13.1_smt' + rel: assessment-for + links: + - href: '#pe-13.1_smt' + rel: assessment-for - id: pe-13.1_asm-examine name: assessment-method props: @@ -32612,6 +35844,9 @@ catalog: value: PE-14a. class: sp800-53a prose: ' {{ insert: param, pe-14_odp.01 }} levels are maintained at {{ insert: param, pe-14_odp.03 }} within the facility where the system resides;' + links: + - href: '#pe-14_smt.a' + rel: assessment-for - id: pe-14_obj.b name: assessment-objective props: @@ -32619,6 +35854,12 @@ catalog: value: PE-14b. class: sp800-53a prose: 'environmental control levels are monitored {{ insert: param, pe-14_odp.04 }}.' + links: + - href: '#pe-14_smt.b' + rel: assessment-for + links: + - href: '#pe-14_smt' + rel: assessment-for - id: pe-14_asm-examine name: assessment-method props: @@ -32713,6 +35954,9 @@ catalog: value: PE-15[01] class: sp800-53a prose: the system is protected from damage resulting from water leakage by providing master shutoff or isolation valves; + links: + - href: '#pe-15_smt' + rel: assessment-for - id: pe-15_obj-2 name: assessment-objective props: @@ -32720,6 +35964,9 @@ catalog: value: PE-15[02] class: sp800-53a prose: the master shutoff or isolation valves are accessible; + links: + - href: '#pe-15_smt' + rel: assessment-for - id: pe-15_obj-3 name: assessment-objective props: @@ -32727,6 +35974,9 @@ catalog: value: PE-15[03] class: sp800-53a prose: the master shutoff or isolation valves are working properly; + links: + - href: '#pe-15_smt' + rel: assessment-for - id: pe-15_obj-4 name: assessment-objective props: @@ -32734,6 +35984,12 @@ catalog: value: PE-15[04] class: sp800-53a prose: the master shutoff or isolation valves are known to key personnel. + links: + - href: '#pe-15_smt' + rel: assessment-for + links: + - href: '#pe-15_smt' + rel: assessment-for - id: pe-15_asm-examine name: assessment-method props: @@ -32892,6 +36148,9 @@ catalog: value: PE-16a.[01] class: sp800-53a prose: ' {{ insert: param, pe-16_odp.01 }} are authorized when entering the facility;' + links: + - href: '#pe-16_smt.a' + rel: assessment-for - id: pe-16_obj.a-2 name: assessment-objective props: @@ -32899,6 +36158,9 @@ catalog: value: PE-16a.[02] class: sp800-53a prose: ' {{ insert: param, pe-16_odp.01 }} are controlled when entering the facility;' + links: + - href: '#pe-16_smt.a' + rel: assessment-for - id: pe-16_obj.a-3 name: assessment-objective props: @@ -32906,6 +36168,9 @@ catalog: value: PE-16a.[03] class: sp800-53a prose: ' {{ insert: param, pe-16_odp.02 }} are authorized when exiting the facility;' + links: + - href: '#pe-16_smt.a' + rel: assessment-for - id: pe-16_obj.a-4 name: assessment-objective props: @@ -32913,6 +36178,12 @@ catalog: value: PE-16a.[04] class: sp800-53a prose: ' {{ insert: param, pe-16_odp.02 }} are controlled when exiting the facility;' + links: + - href: '#pe-16_smt.a' + rel: assessment-for + links: + - href: '#pe-16_smt.a' + rel: assessment-for - id: pe-16_obj.b name: assessment-objective props: @@ -32920,6 +36191,12 @@ catalog: value: PE-16b. class: sp800-53a prose: records of the system components are maintained. + links: + - href: '#pe-16_smt.b' + rel: assessment-for + links: + - href: '#pe-16_smt' + rel: assessment-for - id: pe-16_asm-examine name: assessment-method props: @@ -33062,6 +36339,9 @@ catalog: value: PE-17a. class: sp800-53a prose: ' {{ insert: param, pe-17_odp.01 }} are determined and documented;' + links: + - href: '#pe-17_smt.a' + rel: assessment-for - id: pe-17_obj.b name: assessment-objective props: @@ -33069,6 +36349,9 @@ catalog: value: PE-17b. class: sp800-53a prose: ' {{ insert: param, pe-17_odp.02 }} are employed at alternate work sites;' + links: + - href: '#pe-17_smt.b' + rel: assessment-for - id: pe-17_obj.c name: assessment-objective props: @@ -33076,6 +36359,9 @@ catalog: value: PE-17c. class: sp800-53a prose: the effectiveness of controls at alternate work sites is assessed; + links: + - href: '#pe-17_smt.c' + rel: assessment-for - id: pe-17_obj.d name: assessment-objective props: @@ -33083,6 +36369,12 @@ catalog: value: PE-17d. class: sp800-53a prose: a means for employees to communicate with information security and privacy personnel in case of incidents is provided. + links: + - href: '#pe-17_smt.d' + rel: assessment-for + links: + - href: '#pe-17_smt' + rel: assessment-for - id: pe-17_asm-examine name: assessment-method props: @@ -33360,6 +36652,9 @@ catalog: value: PL-01a.[01] class: sp800-53a prose: a planning policy is developed and documented. + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.a-2 name: assessment-objective props: @@ -33367,6 +36662,9 @@ catalog: value: PL-01a.[02] class: sp800-53a prose: 'the planning policy is disseminated to {{ insert: param, pl-01_odp.01 }};' + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.a-3 name: assessment-objective props: @@ -33374,6 +36672,9 @@ catalog: value: PL-01a.[03] class: sp800-53a prose: planning procedures to facilitate the implementation of the planning policy and associated planning controls are developed and documented; + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.a-4 name: assessment-objective props: @@ -33381,6 +36682,9 @@ catalog: value: PL-01a.[04] class: sp800-53a prose: 'the planning procedures are disseminated to {{ insert: param, pl-01_odp.02 }};' + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.a.1 name: assessment-objective props: @@ -33402,6 +36706,9 @@ catalog: value: PL-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses purpose;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-2 name: assessment-objective props: @@ -33409,6 +36716,9 @@ catalog: value: PL-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses scope;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-3 name: assessment-objective props: @@ -33416,6 +36726,9 @@ catalog: value: PL-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses roles;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-4 name: assessment-objective props: @@ -33423,6 +36736,9 @@ catalog: value: PL-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses responsibilities;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-5 name: assessment-objective props: @@ -33430,6 +36746,9 @@ catalog: value: PL-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses management commitment;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-6 name: assessment-objective props: @@ -33437,6 +36756,9 @@ catalog: value: PL-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses coordination among organizational entities;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-7 name: assessment-objective props: @@ -33444,6 +36766,12 @@ catalog: value: PL-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses compliance;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.b name: assessment-objective props: @@ -33451,6 +36779,15 @@ catalog: value: PL-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#pl-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#pl-1_smt.a.1' + rel: assessment-for + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.b name: assessment-objective props: @@ -33458,6 +36795,9 @@ catalog: value: PL-01b. class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the planning policy and procedures;' + links: + - href: '#pl-1_smt.b' + rel: assessment-for - id: pl-1_obj.c name: assessment-objective props: @@ -33479,6 +36819,9 @@ catalog: value: PL-01c.01[01] class: sp800-53a prose: 'the current planning policy is reviewed and updated {{ insert: param, pl-01_odp.05 }};' + links: + - href: '#pl-1_smt.c.1' + rel: assessment-for - id: pl-1_obj.c.1-2 name: assessment-objective props: @@ -33486,6 +36829,12 @@ catalog: value: PL-01c.01[02] class: sp800-53a prose: 'the current planning policy is reviewed and updated following {{ insert: param, pl-01_odp.06 }};' + links: + - href: '#pl-1_smt.c.1' + rel: assessment-for + links: + - href: '#pl-1_smt.c.1' + rel: assessment-for - id: pl-1_obj.c.2 name: assessment-objective props: @@ -33500,6 +36849,9 @@ catalog: value: PL-01c.02[01] class: sp800-53a prose: 'the current planning procedures are reviewed and updated {{ insert: param, pl-01_odp.07 }};' + links: + - href: '#pl-1_smt.c.2' + rel: assessment-for - id: pl-1_obj.c.2-2 name: assessment-objective props: @@ -33507,6 +36859,18 @@ catalog: value: PL-01c.02[02] class: sp800-53a prose: 'the current planning procedures are reviewed and updated following {{ insert: param, pl-01_odp.08 }}.' + links: + - href: '#pl-1_smt.c.2' + rel: assessment-for + links: + - href: '#pl-1_smt.c.2' + rel: assessment-for + links: + - href: '#pl-1_smt.c' + rel: assessment-for + links: + - href: '#pl-1_smt' + rel: assessment-for - id: pl-1_asm-examine name: assessment-method props: @@ -33837,6 +37201,9 @@ catalog: value: PL-02a.01[01] class: sp800-53a prose: a security plan for the system is developed that is consistent with the organization’s enterprise architecture; + links: + - href: '#pl-2_smt.a.1' + rel: assessment-for - id: pl-2_obj.a.1-2 name: assessment-objective props: @@ -33844,6 +37211,12 @@ catalog: value: PL-02a.01[02] class: sp800-53a prose: a privacy plan for the system is developed that is consistent with the organization’s enterprise architecture; + links: + - href: '#pl-2_smt.a.1' + rel: assessment-for + links: + - href: '#pl-2_smt.a.1' + rel: assessment-for - id: pl-2_obj.a.2 name: assessment-objective props: @@ -33858,6 +37231,9 @@ catalog: value: PL-02a.02[01] class: sp800-53a prose: a security plan for the system is developed that explicitly defines the constituent system components; + links: + - href: '#pl-2_smt.a.2' + rel: assessment-for - id: pl-2_obj.a.2-2 name: assessment-objective props: @@ -33865,6 +37241,12 @@ catalog: value: PL-02a.02[02] class: sp800-53a prose: a privacy plan for the system is developed that explicitly defines the constituent system components; + links: + - href: '#pl-2_smt.a.2' + rel: assessment-for + links: + - href: '#pl-2_smt.a.2' + rel: assessment-for - id: pl-2_obj.a.3 name: assessment-objective props: @@ -33879,6 +37261,9 @@ catalog: value: PL-02a.03[01] class: sp800-53a prose: a security plan for the system is developed that describes the operational context of the system in terms of mission and business processes; + links: + - href: '#pl-2_smt.a.3' + rel: assessment-for - id: pl-2_obj.a.3-2 name: assessment-objective props: @@ -33886,6 +37271,12 @@ catalog: value: PL-02a.03[02] class: sp800-53a prose: a privacy plan for the system is developed that describes the operational context of the system in terms of mission and business processes; + links: + - href: '#pl-2_smt.a.3' + rel: assessment-for + links: + - href: '#pl-2_smt.a.3' + rel: assessment-for - id: pl-2_obj.a.4 name: assessment-objective props: @@ -33900,6 +37291,9 @@ catalog: value: PL-02a.04[01] class: sp800-53a prose: a security plan for the system is developed that identifies the individuals that fulfill system roles and responsibilities; + links: + - href: '#pl-2_smt.a.4' + rel: assessment-for - id: pl-2_obj.a.4-2 name: assessment-objective props: @@ -33907,6 +37301,12 @@ catalog: value: PL-02a.04[02] class: sp800-53a prose: a privacy plan for the system is developed that identifies the individuals that fulfill system roles and responsibilities; + links: + - href: '#pl-2_smt.a.4' + rel: assessment-for + links: + - href: '#pl-2_smt.a.4' + rel: assessment-for - id: pl-2_obj.a.5 name: assessment-objective props: @@ -33921,6 +37321,9 @@ catalog: value: PL-02a.05[01] class: sp800-53a prose: a security plan for the system is developed that identifies the information types processed, stored, and transmitted by the system; + links: + - href: '#pl-2_smt.a.5' + rel: assessment-for - id: pl-2_obj.a.5-2 name: assessment-objective props: @@ -33928,6 +37331,12 @@ catalog: value: PL-02a.05[02] class: sp800-53a prose: a privacy plan for the system is developed that identifies the information types processed, stored, and transmitted by the system; + links: + - href: '#pl-2_smt.a.5' + rel: assessment-for + links: + - href: '#pl-2_smt.a.5' + rel: assessment-for - id: pl-2_obj.a.6 name: assessment-objective props: @@ -33942,6 +37351,9 @@ catalog: value: PL-02a.06[01] class: sp800-53a prose: a security plan for the system is developed that provides the security categorization of the system, including supporting rationale; + links: + - href: '#pl-2_smt.a.6' + rel: assessment-for - id: pl-2_obj.a.6-2 name: assessment-objective props: @@ -33949,6 +37361,12 @@ catalog: value: PL-02a.06[02] class: sp800-53a prose: a privacy plan for the system is developed that provides the security categorization of the system, including supporting rationale; + links: + - href: '#pl-2_smt.a.6' + rel: assessment-for + links: + - href: '#pl-2_smt.a.6' + rel: assessment-for - id: pl-2_obj.a.7 name: assessment-objective props: @@ -33963,6 +37381,9 @@ catalog: value: PL-02a.07[01] class: sp800-53a prose: a security plan for the system is developed that describes any specific threats to the system that are of concern to the organization; + links: + - href: '#pl-2_smt.a.7' + rel: assessment-for - id: pl-2_obj.a.7-2 name: assessment-objective props: @@ -33970,6 +37391,12 @@ catalog: value: PL-02a.07[02] class: sp800-53a prose: a privacy plan for the system is developed that describes any specific threats to the system that are of concern to the organization; + links: + - href: '#pl-2_smt.a.7' + rel: assessment-for + links: + - href: '#pl-2_smt.a.7' + rel: assessment-for - id: pl-2_obj.a.8 name: assessment-objective props: @@ -33984,6 +37411,9 @@ catalog: value: PL-02a.08[01] class: sp800-53a prose: a security plan for the system is developed that provides the results of a privacy risk assessment for systems processing personally identifiable information; + links: + - href: '#pl-2_smt.a.8' + rel: assessment-for - id: pl-2_obj.a.8-2 name: assessment-objective props: @@ -33991,6 +37421,12 @@ catalog: value: PL-02a.08[02] class: sp800-53a prose: a privacy plan for the system is developed that provides the results of a privacy risk assessment for systems processing personally identifiable information; + links: + - href: '#pl-2_smt.a.8' + rel: assessment-for + links: + - href: '#pl-2_smt.a.8' + rel: assessment-for - id: pl-2_obj.a.9 name: assessment-objective props: @@ -34005,6 +37441,9 @@ catalog: value: PL-02a.09[01] class: sp800-53a prose: a security plan for the system is developed that describes the operational environment for the system and any dependencies on or connections to other systems or system components; + links: + - href: '#pl-2_smt.a.9' + rel: assessment-for - id: pl-2_obj.a.9-2 name: assessment-objective props: @@ -34012,6 +37451,12 @@ catalog: value: PL-02a.09[02] class: sp800-53a prose: a privacy plan for the system is developed that describes the operational environment for the system and any dependencies on or connections to other systems or system components; + links: + - href: '#pl-2_smt.a.9' + rel: assessment-for + links: + - href: '#pl-2_smt.a.9' + rel: assessment-for - id: pl-2_obj.a.10 name: assessment-objective props: @@ -34026,6 +37471,9 @@ catalog: value: PL-02a.10[01] class: sp800-53a prose: a security plan for the system is developed that provides an overview of the security requirements for the system; + links: + - href: '#pl-2_smt.a.10' + rel: assessment-for - id: pl-2_obj.a.10-2 name: assessment-objective props: @@ -34033,6 +37481,12 @@ catalog: value: PL-02a.10[02] class: sp800-53a prose: a privacy plan for the system is developed that provides an overview of the privacy requirements for the system; + links: + - href: '#pl-2_smt.a.10' + rel: assessment-for + links: + - href: '#pl-2_smt.a.10' + rel: assessment-for - id: pl-2_obj.a.11 name: assessment-objective props: @@ -34047,6 +37501,9 @@ catalog: value: PL-02a.11[01] class: sp800-53a prose: a security plan for the system is developed that identifies any relevant control baselines or overlays, if applicable; + links: + - href: '#pl-2_smt.a.11' + rel: assessment-for - id: pl-2_obj.a.11-2 name: assessment-objective props: @@ -34054,6 +37511,12 @@ catalog: value: PL-02a.11[02] class: sp800-53a prose: a privacy plan for the system is developed that identifies any relevant control baselines or overlays, if applicable; + links: + - href: '#pl-2_smt.a.11' + rel: assessment-for + links: + - href: '#pl-2_smt.a.11' + rel: assessment-for - id: pl-2_obj.a.12 name: assessment-objective props: @@ -34068,6 +37531,9 @@ catalog: value: PL-02a.12[01] class: sp800-53a prose: a security plan for the system is developed that describes the controls in place or planned for meeting the security requirements, including rationale for any tailoring decisions; + links: + - href: '#pl-2_smt.a.12' + rel: assessment-for - id: pl-2_obj.a.12-2 name: assessment-objective props: @@ -34075,6 +37541,12 @@ catalog: value: PL-02a.12[02] class: sp800-53a prose: a privacy plan for the system is developed that describes the controls in place or planned for meeting the privacy requirements, including rationale for any tailoring decisions; + links: + - href: '#pl-2_smt.a.12' + rel: assessment-for + links: + - href: '#pl-2_smt.a.12' + rel: assessment-for - id: pl-2_obj.a.13 name: assessment-objective props: @@ -34089,6 +37561,9 @@ catalog: value: PL-02a.13[01] class: sp800-53a prose: a security plan for the system is developed that includes risk determinations for security architecture and design decisions; + links: + - href: '#pl-2_smt.a.13' + rel: assessment-for - id: pl-2_obj.a.13-2 name: assessment-objective props: @@ -34096,6 +37571,12 @@ catalog: value: PL-02a.13[02] class: sp800-53a prose: a privacy plan for the system is developed that includes risk determinations for privacy architecture and design decisions; + links: + - href: '#pl-2_smt.a.13' + rel: assessment-for + links: + - href: '#pl-2_smt.a.13' + rel: assessment-for - id: pl-2_obj.a.14 name: assessment-objective props: @@ -34110,6 +37591,9 @@ catalog: value: PL-02a.14[01] class: sp800-53a prose: 'a security plan for the system is developed that includes security-related activities affecting the system that require planning and coordination with {{ insert: param, pl-02_odp.01 }};' + links: + - href: '#pl-2_smt.a.14' + rel: assessment-for - id: pl-2_obj.a.14-2 name: assessment-objective props: @@ -34117,6 +37601,12 @@ catalog: value: PL-02a.14[02] class: sp800-53a prose: 'a privacy plan for the system is developed that includes privacy-related activities affecting the system that require planning and coordination with {{ insert: param, pl-02_odp.01 }};' + links: + - href: '#pl-2_smt.a.14' + rel: assessment-for + links: + - href: '#pl-2_smt.a.14' + rel: assessment-for - id: pl-2_obj.a.15 name: assessment-objective props: @@ -34131,6 +37621,9 @@ catalog: value: PL-02a.15[01] class: sp800-53a prose: a security plan for the system is developed that is reviewed and approved by the authorizing official or designated representative prior to plan implementation; + links: + - href: '#pl-2_smt.a.15' + rel: assessment-for - id: pl-2_obj.a.15-2 name: assessment-objective props: @@ -34138,6 +37631,15 @@ catalog: value: PL-02a.15[02] class: sp800-53a prose: a privacy plan for the system is developed that is reviewed and approved by the authorizing official or designated representative prior to plan implementation. + links: + - href: '#pl-2_smt.a.15' + rel: assessment-for + links: + - href: '#pl-2_smt.a.15' + rel: assessment-for + links: + - href: '#pl-2_smt.a' + rel: assessment-for - id: pl-2_obj.b name: assessment-objective props: @@ -34152,6 +37654,9 @@ catalog: value: PL-02b.[01] class: sp800-53a prose: 'copies of the plans are distributed to {{ insert: param, pl-02_odp.02 }};' + links: + - href: '#pl-2_smt.b' + rel: assessment-for - id: pl-2_obj.b-2 name: assessment-objective props: @@ -34159,6 +37664,12 @@ catalog: value: PL-02b.[02] class: sp800-53a prose: 'subsequent changes to the plans are communicated to {{ insert: param, pl-02_odp.02 }};' + links: + - href: '#pl-2_smt.b' + rel: assessment-for + links: + - href: '#pl-2_smt.b' + rel: assessment-for - id: pl-2_obj.c name: assessment-objective props: @@ -34166,6 +37677,9 @@ catalog: value: PL-02c. class: sp800-53a prose: 'plans are reviewed {{ insert: param, pl-02_odp.03 }};' + links: + - href: '#pl-2_smt.c' + rel: assessment-for - id: pl-2_obj.d name: assessment-objective props: @@ -34180,6 +37694,9 @@ catalog: value: PL-02d.[01] class: sp800-53a prose: plans are updated to address changes to the system and environment of operations; + links: + - href: '#pl-2_smt.d' + rel: assessment-for - id: pl-2_obj.d-2 name: assessment-objective props: @@ -34187,6 +37704,9 @@ catalog: value: PL-02d.[02] class: sp800-53a prose: plans are updated to address problems identified during the plan implementation; + links: + - href: '#pl-2_smt.d' + rel: assessment-for - id: pl-2_obj.d-3 name: assessment-objective props: @@ -34194,6 +37714,12 @@ catalog: value: PL-02d.[03] class: sp800-53a prose: plans are updated to address problems identified during control assessments; + links: + - href: '#pl-2_smt.d' + rel: assessment-for + links: + - href: '#pl-2_smt.d' + rel: assessment-for - id: pl-2_obj.e name: assessment-objective props: @@ -34208,6 +37734,9 @@ catalog: value: PL-02e.[01] class: sp800-53a prose: plans are protected from unauthorized disclosure; + links: + - href: '#pl-2_smt.e' + rel: assessment-for - id: pl-2_obj.e-2 name: assessment-objective props: @@ -34215,6 +37744,15 @@ catalog: value: PL-02e.[02] class: sp800-53a prose: plans are protected from unauthorized modification. + links: + - href: '#pl-2_smt.e' + rel: assessment-for + links: + - href: '#pl-2_smt.e' + rel: assessment-for + links: + - href: '#pl-2_smt' + rel: assessment-for - id: pl-2_asm-examine name: assessment-method props: @@ -34427,6 +37965,9 @@ catalog: value: PL-04a.[01] class: sp800-53a prose: rules that describe responsibilities and expected behavior for information and system usage, security, and privacy are established for individuals requiring access to the system; + links: + - href: '#pl-4_smt.a' + rel: assessment-for - id: pl-4_obj.a-2 name: assessment-objective props: @@ -34434,6 +37975,12 @@ catalog: value: PL-04a.[02] class: sp800-53a prose: rules that describe responsibilities and expected behavior for information and system usage, security, and privacy are provided to individuals requiring access to the system; + links: + - href: '#pl-4_smt.a' + rel: assessment-for + links: + - href: '#pl-4_smt.a' + rel: assessment-for - id: pl-4_obj.b name: assessment-objective props: @@ -34441,6 +37988,9 @@ catalog: value: PL-04b. class: sp800-53a prose: before authorizing access to information and the system, a documented acknowledgement from such individuals indicating that they have read, understand, and agree to abide by the rules of behavior is received; + links: + - href: '#pl-4_smt.b' + rel: assessment-for - id: pl-4_obj.c name: assessment-objective props: @@ -34448,6 +37998,9 @@ catalog: value: PL-04c. class: sp800-53a prose: 'rules of behavior are reviewed and updated {{ insert: param, pl-04_odp.01 }};' + links: + - href: '#pl-4_smt.c' + rel: assessment-for - id: pl-4_obj.d name: assessment-objective props: @@ -34455,6 +38008,12 @@ catalog: value: PL-04d. class: sp800-53a prose: 'individuals who have acknowledged a previous version of the rules of behavior are required to read and reacknowledge {{ insert: param, pl-04_odp.02 }}.' + links: + - href: '#pl-4_smt.d' + rel: assessment-for + links: + - href: '#pl-4_smt' + rel: assessment-for - id: pl-4_asm-examine name: assessment-method props: @@ -34577,6 +38136,9 @@ catalog: value: PL-04(01)(a) class: sp800-53a prose: the rules of behavior include restrictions on the use of social media, social networking sites, and external sites/applications; + links: + - href: '#pl-4.1_smt.a' + rel: assessment-for - id: pl-4.1_obj.b name: assessment-objective props: @@ -34584,6 +38146,9 @@ catalog: value: PL-04(01)(b) class: sp800-53a prose: the rules of behavior include restrictions on posting organizational information on public websites; + links: + - href: '#pl-4.1_smt.b' + rel: assessment-for - id: pl-4.1_obj.c name: assessment-objective props: @@ -34591,6 +38156,12 @@ catalog: value: PL-04(01)(c) class: sp800-53a prose: the rules of behavior include restrictions on the use of organization-provided identifiers (e.g., email addresses) and authentication secrets (e.g., passwords) for creating accounts on external sites/applications. + links: + - href: '#pl-4.1_smt.c' + rel: assessment-for + links: + - href: '#pl-4.1_smt' + rel: assessment-for - id: pl-4.1_asm-examine name: assessment-method props: @@ -34785,6 +38356,9 @@ catalog: value: PL-08a.01 class: sp800-53a prose: a security architecture for the system describes the requirements and approach to be taken for protecting the confidentiality, integrity, and availability of organizational information; + links: + - href: '#pl-8_smt.a.1' + rel: assessment-for - id: pl-8_obj.a.2 name: assessment-objective props: @@ -34792,6 +38366,9 @@ catalog: value: PL-08a.02 class: sp800-53a prose: a privacy architecture describes the requirements and approach to be taken for processing personally identifiable information to minimize privacy risk to individuals; + links: + - href: '#pl-8_smt.a.2' + rel: assessment-for - id: pl-8_obj.a.3 name: assessment-objective props: @@ -34806,6 +38383,9 @@ catalog: value: PL-08a.03[01] class: sp800-53a prose: a security architecture for the system describes how the architecture is integrated into and supports the enterprise architecture; + links: + - href: '#pl-8_smt.a.3' + rel: assessment-for - id: pl-8_obj.a.3-2 name: assessment-objective props: @@ -34813,6 +38393,12 @@ catalog: value: PL-08a.03[02] class: sp800-53a prose: a privacy architecture for the system describes how the architecture is integrated into and supports the enterprise architecture; + links: + - href: '#pl-8_smt.a.3' + rel: assessment-for + links: + - href: '#pl-8_smt.a.3' + rel: assessment-for - id: pl-8_obj.a.4 name: assessment-objective props: @@ -34827,6 +38413,9 @@ catalog: value: PL-08a.04[01] class: sp800-53a prose: a security architecture for the system describes any assumptions about and dependencies on external systems and services; + links: + - href: '#pl-8_smt.a.4' + rel: assessment-for - id: pl-8_obj.a.4-2 name: assessment-objective props: @@ -34834,6 +38423,15 @@ catalog: value: PL-08a.04[02] class: sp800-53a prose: a privacy architecture for the system describes any assumptions about and dependencies on external systems and services; + links: + - href: '#pl-8_smt.a.4' + rel: assessment-for + links: + - href: '#pl-8_smt.a.4' + rel: assessment-for + links: + - href: '#pl-8_smt.a' + rel: assessment-for - id: pl-8_obj.b name: assessment-objective props: @@ -34841,6 +38439,9 @@ catalog: value: PL-08b. class: sp800-53a prose: 'changes in the enterprise architecture are reviewed and updated {{ insert: param, pl-08_odp }} to reflect changes in the enterprise architecture;' + links: + - href: '#pl-8_smt.b' + rel: assessment-for - id: pl-8_obj.c name: assessment-objective props: @@ -34855,6 +38456,9 @@ catalog: value: PL-08c.[01] class: sp800-53a prose: planned architecture changes are reflected in the security plan; + links: + - href: '#pl-8_smt.c' + rel: assessment-for - id: pl-8_obj.c-2 name: assessment-objective props: @@ -34862,6 +38466,9 @@ catalog: value: PL-08c.[02] class: sp800-53a prose: planned architecture changes are reflected in the privacy plan; + links: + - href: '#pl-8_smt.c' + rel: assessment-for - id: pl-8_obj.c-3 name: assessment-objective props: @@ -34869,6 +38476,9 @@ catalog: value: PL-08c.[03] class: sp800-53a prose: planned architecture changes are reflected in the Concept of Operations (CONOPS); + links: + - href: '#pl-8_smt.c' + rel: assessment-for - id: pl-8_obj.c-4 name: assessment-objective props: @@ -34876,6 +38486,9 @@ catalog: value: PL-08c.[04] class: sp800-53a prose: planned architecture changes are reflected in criticality analysis; + links: + - href: '#pl-8_smt.c' + rel: assessment-for - id: pl-8_obj.c-5 name: assessment-objective props: @@ -34883,6 +38496,9 @@ catalog: value: PL-08c.[05] class: sp800-53a prose: planned architecture changes are reflected in organizational procedures; + links: + - href: '#pl-8_smt.c' + rel: assessment-for - id: pl-8_obj.c-6 name: assessment-objective props: @@ -34890,6 +38506,15 @@ catalog: value: PL-08c.[06] class: sp800-53a prose: planned architecture changes are reflected in procurements and acquisitions. + links: + - href: '#pl-8_smt.c' + rel: assessment-for + links: + - href: '#pl-8_smt.c' + rel: assessment-for + links: + - href: '#pl-8_smt' + rel: assessment-for - id: pl-8_asm-examine name: assessment-method props: @@ -35012,6 +38637,9 @@ catalog: value: PL-10 class: sp800-53a prose: a control baseline for the system is selected. + links: + - href: '#pl-10_smt' + rel: assessment-for - id: pl-10_asm-examine name: assessment-method props: @@ -35137,6 +38765,9 @@ catalog: value: PL-11 class: sp800-53a prose: the selected control baseline is tailored by applying specified tailoring actions. + links: + - href: '#pl-11_smt' + rel: assessment-for - id: pl-11_asm-examine name: assessment-method props: @@ -35411,6 +39042,9 @@ catalog: value: PS-01a.[01] class: sp800-53a prose: a personnel security policy is developed and documented; + links: + - href: '#ps-1_smt.a' + rel: assessment-for - id: ps-1_obj.a-2 name: assessment-objective props: @@ -35418,6 +39052,9 @@ catalog: value: PS-01a.[02] class: sp800-53a prose: 'the personnel security policy is disseminated to {{ insert: param, ps-01_odp.01 }};' + links: + - href: '#ps-1_smt.a' + rel: assessment-for - id: ps-1_obj.a-3 name: assessment-objective props: @@ -35425,6 +39062,9 @@ catalog: value: PS-01a.[03] class: sp800-53a prose: personnel security procedures to facilitate the implementation of the personnel security policy and associated personnel security controls are developed and documented; + links: + - href: '#ps-1_smt.a' + rel: assessment-for - id: ps-1_obj.a-4 name: assessment-objective props: @@ -35432,6 +39072,9 @@ catalog: value: PS-01a.[04] class: sp800-53a prose: 'the personnel security procedures are disseminated to {{ insert: param, ps-01_odp.02 }};' + links: + - href: '#ps-1_smt.a' + rel: assessment-for - id: ps-1_obj.a.1 name: assessment-objective props: @@ -35453,6 +39096,9 @@ catalog: value: PS-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses purpose;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-2 name: assessment-objective props: @@ -35460,6 +39106,9 @@ catalog: value: PS-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses scope;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-3 name: assessment-objective props: @@ -35467,6 +39116,9 @@ catalog: value: PS-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses roles;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-4 name: assessment-objective props: @@ -35474,6 +39126,9 @@ catalog: value: PS-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses responsibilities;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-5 name: assessment-objective props: @@ -35481,6 +39136,9 @@ catalog: value: PS-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses management commitment;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-6 name: assessment-objective props: @@ -35488,6 +39146,9 @@ catalog: value: PS-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses coordination among organizational entities;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-7 name: assessment-objective props: @@ -35495,6 +39156,12 @@ catalog: value: PS-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses compliance;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.b name: assessment-objective props: @@ -35502,6 +39169,15 @@ catalog: value: PS-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ps-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ps-1_smt.a.1' + rel: assessment-for + links: + - href: '#ps-1_smt.a' + rel: assessment-for - id: ps-1_obj.b name: assessment-objective props: @@ -35509,6 +39185,9 @@ catalog: value: PS-01b. class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the personnel security policy and procedures;' + links: + - href: '#ps-1_smt.b' + rel: assessment-for - id: ps-1_obj.c name: assessment-objective props: @@ -35530,6 +39209,9 @@ catalog: value: PS-01c.01[01] class: sp800-53a prose: 'the current personnel security policy is reviewed and updated {{ insert: param, ps-01_odp.05 }};' + links: + - href: '#ps-1_smt.c.1' + rel: assessment-for - id: ps-1_obj.c.1-2 name: assessment-objective props: @@ -35537,6 +39219,12 @@ catalog: value: PS-01c.01[02] class: sp800-53a prose: 'the current personnel security policy is reviewed and updated following {{ insert: param, ps-01_odp.06 }};' + links: + - href: '#ps-1_smt.c.1' + rel: assessment-for + links: + - href: '#ps-1_smt.c.1' + rel: assessment-for - id: ps-1_obj.c.2 name: assessment-objective props: @@ -35551,6 +39239,9 @@ catalog: value: PS-01c.02[01] class: sp800-53a prose: 'the current personnel security procedures are reviewed and updated {{ insert: param, ps-01_odp.07 }};' + links: + - href: '#ps-1_smt.c.2' + rel: assessment-for - id: ps-1_obj.c.2-2 name: assessment-objective props: @@ -35558,6 +39249,18 @@ catalog: value: PS-01c.02[02] class: sp800-53a prose: 'the current personnel security procedures are reviewed and updated following {{ insert: param, ps-01_odp.08 }}.' + links: + - href: '#ps-1_smt.c.2' + rel: assessment-for + links: + - href: '#ps-1_smt.c.2' + rel: assessment-for + links: + - href: '#ps-1_smt.c' + rel: assessment-for + links: + - href: '#ps-1_smt' + rel: assessment-for - id: ps-1_asm-examine name: assessment-method props: @@ -35687,6 +39390,9 @@ catalog: value: PS-02a. class: sp800-53a prose: a risk designation is assigned to all organizational positions; + links: + - href: '#ps-2_smt.a' + rel: assessment-for - id: ps-2_obj.b name: assessment-objective props: @@ -35694,6 +39400,9 @@ catalog: value: PS-02b. class: sp800-53a prose: screening criteria are established for individuals filling organizational positions; + links: + - href: '#ps-2_smt.b' + rel: assessment-for - id: ps-2_obj.c name: assessment-objective props: @@ -35701,6 +39410,12 @@ catalog: value: PS-02c. class: sp800-53a prose: 'position risk designations are reviewed and updated {{ insert: param, ps-02_odp }}.' + links: + - href: '#ps-2_smt.c' + rel: assessment-for + links: + - href: '#ps-2_smt' + rel: assessment-for - id: ps-2_asm-examine name: assessment-method props: @@ -35866,6 +39581,9 @@ catalog: value: PS-03a. class: sp800-53a prose: individuals are screened prior to authorizing access to the system; + links: + - href: '#ps-3_smt.a' + rel: assessment-for - id: ps-3_obj.b name: assessment-objective props: @@ -35880,6 +39598,9 @@ catalog: value: PS-03b.[01] class: sp800-53a prose: 'individuals are rescreened in accordance with {{ insert: param, ps-03_odp.01 }};' + links: + - href: '#ps-3_smt.b' + rel: assessment-for - id: ps-3_obj.b-2 name: assessment-objective props: @@ -35887,6 +39608,15 @@ catalog: value: PS-03b.[02] class: sp800-53a prose: 'where rescreening is so indicated, individuals are rescreened {{ insert: param, ps-03_odp.02 }}.' + links: + - href: '#ps-3_smt.b' + rel: assessment-for + links: + - href: '#ps-3_smt.b' + rel: assessment-for + links: + - href: '#ps-3_smt' + rel: assessment-for - id: ps-3_asm-examine name: assessment-method props: @@ -36035,6 +39765,9 @@ catalog: value: PS-04a. class: sp800-53a prose: 'upon termination of individual employment, system access is disabled within {{ insert: param, ps-04_odp.01 }};' + links: + - href: '#ps-4_smt.a' + rel: assessment-for - id: ps-4_obj.b name: assessment-objective props: @@ -36042,6 +39775,9 @@ catalog: value: PS-04b. class: sp800-53a prose: upon termination of individual employment, any authenticators and credentials are terminated or revoked; + links: + - href: '#ps-4_smt.b' + rel: assessment-for - id: ps-4_obj.c name: assessment-objective props: @@ -36049,6 +39785,9 @@ catalog: value: PS-04c. class: sp800-53a prose: 'upon termination of individual employment, exit interviews that include a discussion of {{ insert: param, ps-04_odp.02 }} are conducted;' + links: + - href: '#ps-4_smt.c' + rel: assessment-for - id: ps-4_obj.d name: assessment-objective props: @@ -36056,6 +39795,9 @@ catalog: value: PS-04d. class: sp800-53a prose: upon termination of individual employment, all security-related organizational system-related property is retrieved; + links: + - href: '#ps-4_smt.d' + rel: assessment-for - id: ps-4_obj.e name: assessment-objective props: @@ -36063,6 +39805,12 @@ catalog: value: PS-04e. class: sp800-53a prose: upon termination of individual employment, access to organizational information and systems formerly controlled by the terminated individual are retained. + links: + - href: '#ps-4_smt.e' + rel: assessment-for + links: + - href: '#ps-4_smt' + rel: assessment-for - id: ps-4_asm-examine name: assessment-method props: @@ -36239,6 +39987,9 @@ catalog: value: PS-05a. class: sp800-53a prose: the ongoing operational need for current logical and physical access authorizations to systems and facilities are reviewed and confirmed when individuals are reassigned or transferred to other positions within the organization; + links: + - href: '#ps-5_smt.a' + rel: assessment-for - id: ps-5_obj.b name: assessment-objective props: @@ -36246,6 +39997,9 @@ catalog: value: PS-05b. class: sp800-53a prose: ' {{ insert: param, ps-05_odp.01 }} are initiated within {{ insert: param, ps-05_odp.02 }};' + links: + - href: '#ps-5_smt.b' + rel: assessment-for - id: ps-5_obj.c name: assessment-objective props: @@ -36253,6 +40007,9 @@ catalog: value: PS-05c. class: sp800-53a prose: access authorization is modified as needed to correspond with any changes in operational need due to reassignment or transfer; + links: + - href: '#ps-5_smt.c' + rel: assessment-for - id: ps-5_obj.d name: assessment-objective props: @@ -36260,6 +40017,12 @@ catalog: value: PS-05d. class: sp800-53a prose: ' {{ insert: param, ps-05_odp.03 }} are notified within {{ insert: param, ps-05_odp.04 }}.' + links: + - href: '#ps-5_smt.d' + rel: assessment-for + links: + - href: '#ps-5_smt' + rel: assessment-for - id: ps-5_asm-examine name: assessment-method props: @@ -36430,6 +40193,9 @@ catalog: value: PS-06a. class: sp800-53a prose: access agreements are developed and documented for organizational systems; + links: + - href: '#ps-6_smt.a' + rel: assessment-for - id: ps-6_obj.b name: assessment-objective props: @@ -36437,6 +40203,9 @@ catalog: value: PS-06b. class: sp800-53a prose: 'the access agreements are reviewed and updated {{ insert: param, ps-06_odp.01 }};' + links: + - href: '#ps-6_smt.b' + rel: assessment-for - id: ps-6_obj.c name: assessment-objective props: @@ -36451,6 +40220,9 @@ catalog: value: PS-06c.01 class: sp800-53a prose: individuals requiring access to organizational information and systems sign appropriate access agreements prior to being granted access; + links: + - href: '#ps-6_smt.c.1' + rel: assessment-for - id: ps-6_obj.c.2 name: assessment-objective props: @@ -36458,6 +40230,15 @@ catalog: value: PS-06c.02 class: sp800-53a prose: 'individuals requiring access to organizational information and systems re-sign access agreements to maintain access to organizational systems when access agreements have been updated or {{ insert: param, ps-06_odp.02 }}.' + links: + - href: '#ps-6_smt.c.2' + rel: assessment-for + links: + - href: '#ps-6_smt.c' + rel: assessment-for + links: + - href: '#ps-6_smt' + rel: assessment-for - id: ps-6_asm-examine name: assessment-method props: @@ -36639,6 +40420,9 @@ catalog: value: PS-07a. class: sp800-53a prose: personnel security requirements are established, including security roles and responsibilities for external providers; + links: + - href: '#ps-7_smt.a' + rel: assessment-for - id: ps-7_obj.b name: assessment-objective props: @@ -36646,6 +40430,9 @@ catalog: value: PS-07b. class: sp800-53a prose: external providers are required to comply with personnel security policies and procedures established by the organization; + links: + - href: '#ps-7_smt.b' + rel: assessment-for - id: ps-7_obj.c name: assessment-objective props: @@ -36653,6 +40440,9 @@ catalog: value: PS-07c. class: sp800-53a prose: personnel security requirements are documented; + links: + - href: '#ps-7_smt.c' + rel: assessment-for - id: ps-7_obj.d name: assessment-objective props: @@ -36660,6 +40450,9 @@ catalog: value: PS-07d. class: sp800-53a prose: 'external providers are required to notify {{ insert: param, ps-07_odp.01 }} of any personnel transfers or terminations of external personnel who possess organizational credentials and/or badges or who have system privileges within {{ insert: param, ps-07_odp.02 }};' + links: + - href: '#ps-7_smt.d' + rel: assessment-for - id: ps-7_obj.e name: assessment-objective props: @@ -36667,6 +40460,12 @@ catalog: value: PS-07e. class: sp800-53a prose: provider compliance with personnel security requirements is monitored. + links: + - href: '#ps-7_smt.e' + rel: assessment-for + links: + - href: '#ps-7_smt' + rel: assessment-for - id: ps-7_asm-examine name: assessment-method props: @@ -36807,6 +40606,9 @@ catalog: value: PS-08a. class: sp800-53a prose: a formal sanctions process is employed for individuals failing to comply with established information security and privacy policies and procedures; + links: + - href: '#ps-8_smt.a' + rel: assessment-for - id: ps-8_obj.b name: assessment-objective props: @@ -36814,6 +40616,12 @@ catalog: value: PS-08b. class: sp800-53a prose: ' {{ insert: param, ps-08_odp.01 }} is/are notified within {{ insert: param, ps-08_odp.02 }} when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction.' + links: + - href: '#ps-8_smt.b' + rel: assessment-for + links: + - href: '#ps-8_smt' + rel: assessment-for - id: ps-8_asm-examine name: assessment-method props: @@ -36915,6 +40723,9 @@ catalog: value: PS-09[01] class: sp800-53a prose: security roles and responsibilities are incorporated into organizational position descriptions; + links: + - href: '#ps-9_smt' + rel: assessment-for - id: ps-9_obj-2 name: assessment-objective props: @@ -36922,6 +40733,12 @@ catalog: value: PS-09[02] class: sp800-53a prose: privacy roles and responsibilities are incorporated into organizational position descriptions. + links: + - href: '#ps-9_smt' + rel: assessment-for + links: + - href: '#ps-9_smt' + rel: assessment-for - id: ps-9_asm-examine name: assessment-method props: @@ -37190,6 +41007,9 @@ catalog: value: RA-01a.[01] class: sp800-53a prose: a risk assessment policy is developed and documented; + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.a-2 name: assessment-objective props: @@ -37197,6 +41017,9 @@ catalog: value: RA-01a.[02] class: sp800-53a prose: 'the risk assessment policy is disseminated to {{ insert: param, ra-01_odp.01 }};' + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.a-3 name: assessment-objective props: @@ -37204,6 +41027,9 @@ catalog: value: RA-01a.[03] class: sp800-53a prose: risk assessment procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls are developed and documented; + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.a-4 name: assessment-objective props: @@ -37211,6 +41037,9 @@ catalog: value: RA-01a.[04] class: sp800-53a prose: 'the risk assessment procedures are disseminated to {{ insert: param, ra-01_odp.02 }};' + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.a.1 name: assessment-objective props: @@ -37232,6 +41061,9 @@ catalog: value: RA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses purpose;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-2 name: assessment-objective props: @@ -37239,6 +41071,9 @@ catalog: value: RA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses scope;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-3 name: assessment-objective props: @@ -37246,6 +41081,9 @@ catalog: value: RA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses roles;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-4 name: assessment-objective props: @@ -37253,6 +41091,9 @@ catalog: value: RA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses responsibilities;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-5 name: assessment-objective props: @@ -37260,6 +41101,9 @@ catalog: value: RA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses management commitment;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-6 name: assessment-objective props: @@ -37267,6 +41111,9 @@ catalog: value: RA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses coordination among organizational entities;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-7 name: assessment-objective props: @@ -37274,6 +41121,12 @@ catalog: value: RA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses compliance;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.b name: assessment-objective props: @@ -37281,6 +41134,15 @@ catalog: value: RA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ra-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ra-1_smt.a.1' + rel: assessment-for + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.b name: assessment-objective props: @@ -37288,6 +41150,9 @@ catalog: value: RA-01b. class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the risk assessment policy and procedures;' + links: + - href: '#ra-1_smt.b' + rel: assessment-for - id: ra-1_obj.c name: assessment-objective props: @@ -37309,6 +41174,9 @@ catalog: value: RA-01c.01[01] class: sp800-53a prose: 'the current risk assessment policy is reviewed and updated {{ insert: param, ra-01_odp.05 }};' + links: + - href: '#ra-1_smt.c.1' + rel: assessment-for - id: ra-1_obj.c.1-2 name: assessment-objective props: @@ -37316,6 +41184,12 @@ catalog: value: RA-01c.01[02] class: sp800-53a prose: 'the current risk assessment policy is reviewed and updated following {{ insert: param, ra-01_odp.06 }};' + links: + - href: '#ra-1_smt.c.1' + rel: assessment-for + links: + - href: '#ra-1_smt.c.1' + rel: assessment-for - id: ra-1_obj.c.2 name: assessment-objective props: @@ -37330,6 +41204,9 @@ catalog: value: RA-01c.02[01] class: sp800-53a prose: 'the current risk assessment procedures are reviewed and updated {{ insert: param, ra-01_odp.07 }};' + links: + - href: '#ra-1_smt.c.2' + rel: assessment-for - id: ra-1_obj.c.2-2 name: assessment-objective props: @@ -37337,6 +41214,18 @@ catalog: value: RA-01c.02[02] class: sp800-53a prose: 'the current risk assessment procedures are reviewed and updated following {{ insert: param, ra-01_odp.08 }}.' + links: + - href: '#ra-1_smt.c.2' + rel: assessment-for + links: + - href: '#ra-1_smt.c.2' + rel: assessment-for + links: + - href: '#ra-1_smt.c' + rel: assessment-for + links: + - href: '#ra-1_smt' + rel: assessment-for - id: ra-1_asm-examine name: assessment-method props: @@ -37478,6 +41367,9 @@ catalog: value: RA-02a. class: sp800-53a prose: the system and the information it processes, stores, and transmits are categorized; + links: + - href: '#ra-2_smt.a' + rel: assessment-for - id: ra-2_obj.b name: assessment-objective props: @@ -37485,6 +41377,9 @@ catalog: value: RA-02b. class: sp800-53a prose: the security categorization results, including supporting rationale, are documented in the security plan for the system; + links: + - href: '#ra-2_smt.b' + rel: assessment-for - id: ra-2_obj.c name: assessment-objective props: @@ -37492,6 +41387,12 @@ catalog: value: RA-02c. class: sp800-53a prose: the authorizing official or authorizing official designated representative reviews and approves the security categorization decision. + links: + - href: '#ra-2_smt.c' + rel: assessment-for + links: + - href: '#ra-2_smt' + rel: assessment-for - id: ra-2_asm-examine name: assessment-method props: @@ -37769,6 +41670,9 @@ catalog: value: RA-03a.01 class: sp800-53a prose: a risk assessment is conducted to identify threats to and vulnerabilities in the system; + links: + - href: '#ra-3_smt.a.1' + rel: assessment-for - id: ra-3_obj.a.2 name: assessment-objective props: @@ -37776,6 +41680,9 @@ catalog: value: RA-03a.02 class: sp800-53a prose: a risk assessment is conducted to determine the likelihood and magnitude of harm from unauthorized access, use, disclosure, disruption, modification, or destruction of the system; the information it processes, stores, or transmits; and any related information; + links: + - href: '#ra-3_smt.a.2' + rel: assessment-for - id: ra-3_obj.a.3 name: assessment-objective props: @@ -37783,6 +41690,12 @@ catalog: value: RA-03a.03 class: sp800-53a prose: a risk assessment is conducted to determine the likelihood and impact of adverse effects on individuals arising from the processing of personally identifiable information; + links: + - href: '#ra-3_smt.a.3' + rel: assessment-for + links: + - href: '#ra-3_smt.a' + rel: assessment-for - id: ra-3_obj.b name: assessment-objective props: @@ -37790,6 +41703,9 @@ catalog: value: RA-03b. class: sp800-53a prose: risk assessment results and risk management decisions from the organization and mission or business process perspectives are integrated with system-level risk assessments; + links: + - href: '#ra-3_smt.b' + rel: assessment-for - id: ra-3_obj.c name: assessment-objective props: @@ -37797,6 +41713,9 @@ catalog: value: RA-03c. class: sp800-53a prose: 'risk assessment results are documented in {{ insert: param, ra-03_odp.01 }};' + links: + - href: '#ra-3_smt.c' + rel: assessment-for - id: ra-3_obj.d name: assessment-objective props: @@ -37804,6 +41723,9 @@ catalog: value: RA-03d. class: sp800-53a prose: 'risk assessment results are reviewed {{ insert: param, ra-03_odp.03 }};' + links: + - href: '#ra-3_smt.d' + rel: assessment-for - id: ra-3_obj.e name: assessment-objective props: @@ -37811,6 +41733,9 @@ catalog: value: RA-03e. class: sp800-53a prose: 'risk assessment results are disseminated to {{ insert: param, ra-03_odp.04 }};' + links: + - href: '#ra-3_smt.e' + rel: assessment-for - id: ra-3_obj.f name: assessment-objective props: @@ -37818,6 +41743,12 @@ catalog: value: RA-03f. class: sp800-53a prose: 'the risk assessment is updated {{ insert: param, ra-03_odp.05 }} or when there are significant changes to the system, its environment of operation, or other conditions that may impact the security or privacy state of the system.' + links: + - href: '#ra-3_smt.f' + rel: assessment-for + links: + - href: '#ra-3_smt' + rel: assessment-for - id: ra-3_asm-examine name: assessment-method props: @@ -37966,6 +41897,9 @@ catalog: value: RA-03(01)(a) class: sp800-53a prose: 'supply chain risks associated with {{ insert: param, ra-03.01_odp.01 }} are assessed;' + links: + - href: '#ra-3.1_smt.a' + rel: assessment-for - id: ra-3.1_obj.b name: assessment-objective props: @@ -37973,6 +41907,12 @@ catalog: value: RA-03(01)(b) class: sp800-53a prose: 'the supply chain risk assessment is updated {{ insert: param, ra-03.01_odp.02 }} , when there are significant changes to the relevant supply chain, or when changes to the system, environments of operation, or other conditions may necessitate a change in the supply chain.' + links: + - href: '#ra-3.1_smt.b' + rel: assessment-for + links: + - href: '#ra-3.1_smt' + rel: assessment-for - id: ra-3.1_asm-examine name: assessment-method props: @@ -38248,6 +42188,9 @@ catalog: value: RA-05a.[01] class: sp800-53a prose: 'systems and hosted applications are monitored for vulnerabilities {{ insert: param, ra-05_odp.01 }} and when new vulnerabilities potentially affecting the system are identified and reported;' + links: + - href: '#ra-5_smt.a' + rel: assessment-for - id: ra-5_obj.a-2 name: assessment-objective props: @@ -38255,6 +42198,12 @@ catalog: value: RA-05a.[02] class: sp800-53a prose: 'systems and hosted applications are scanned for vulnerabilities {{ insert: param, ra-05_odp.02 }} and when new vulnerabilities potentially affecting the system are identified and reported;' + links: + - href: '#ra-5_smt.a' + rel: assessment-for + links: + - href: '#ra-5_smt.a' + rel: assessment-for - id: ra-5_obj.b name: assessment-objective props: @@ -38270,6 +42219,9 @@ catalog: value: RA-05b.01 class: sp800-53a prose: vulnerability monitoring tools and techniques are employed to automate parts of the vulnerability management process by using standards for enumerating platforms, software flaws, and improper configurations; + links: + - href: '#ra-5_smt.b.1' + rel: assessment-for - id: ra-5_obj.b.2 name: assessment-objective props: @@ -38277,6 +42229,9 @@ catalog: value: RA-05b.02 class: sp800-53a prose: vulnerability monitoring tools and techniques are employed to facilitate interoperability among tools and to automate parts of the vulnerability management process by using standards for formatting checklists and test procedures; + links: + - href: '#ra-5_smt.b.2' + rel: assessment-for - id: ra-5_obj.b.3 name: assessment-objective props: @@ -38284,6 +42239,12 @@ catalog: value: RA-05b.03 class: sp800-53a prose: vulnerability monitoring tools and techniques are employed to facilitate interoperability among tools and to automate parts of the vulnerability management process by using standards for measuring vulnerability impact; + links: + - href: '#ra-5_smt.b.3' + rel: assessment-for + links: + - href: '#ra-5_smt.b' + rel: assessment-for - id: ra-5_obj.c name: assessment-objective props: @@ -38291,6 +42252,9 @@ catalog: value: RA-05c. class: sp800-53a prose: vulnerability scan reports and results from vulnerability monitoring are analyzed; + links: + - href: '#ra-5_smt.c' + rel: assessment-for - id: ra-5_obj.d name: assessment-objective props: @@ -38298,6 +42262,9 @@ catalog: value: RA-05d. class: sp800-53a prose: 'legitimate vulnerabilities are remediated {{ insert: param, ra-05_odp.03 }} in accordance with an organizational assessment of risk;' + links: + - href: '#ra-5_smt.d' + rel: assessment-for - id: ra-5_obj.e name: assessment-objective props: @@ -38305,6 +42272,9 @@ catalog: value: RA-05e. class: sp800-53a prose: 'information obtained from the vulnerability monitoring process and control assessments is shared with {{ insert: param, ra-05_odp.04 }} to help eliminate similar vulnerabilities in other systems;' + links: + - href: '#ra-5_smt.e' + rel: assessment-for - id: ra-5_obj.f name: assessment-objective props: @@ -38312,6 +42282,12 @@ catalog: value: RA-05f. class: sp800-53a prose: vulnerability monitoring tools that include the capability to readily update the vulnerabilities to be scanned are employed. + links: + - href: '#ra-5_smt.f' + rel: assessment-for + links: + - href: '#ra-5_smt' + rel: assessment-for - id: ra-5_asm-examine name: assessment-method props: @@ -38438,6 +42414,9 @@ catalog: value: RA-05(02) class: sp800-53a prose: 'the system vulnerabilities to be scanned are updated {{ insert: param, ra-05.02_odp.01 }}.' + links: + - href: '#ra-5.2_smt' + rel: assessment-for - id: ra-5.2_asm-examine name: assessment-method props: @@ -38552,6 +42531,9 @@ catalog: value: RA-05(05) class: sp800-53a prose: 'privileged access authorization is implemented to {{ insert: param, ra-05.05_odp.01 }} for {{ insert: param, ra-05.05_odp.02 }}.' + links: + - href: '#ra-5.5_smt' + rel: assessment-for - id: ra-5.5_asm-examine name: assessment-method props: @@ -38659,6 +42641,9 @@ catalog: value: RA-05(11) class: sp800-53a prose: a public reporting channel is established for receiving reports of vulnerabilities in organizational systems and system components. + links: + - href: '#ra-5.11_smt' + rel: assessment-for - id: ra-5.11_asm-examine name: assessment-method props: @@ -38789,6 +42774,9 @@ catalog: value: RA-07[01] class: sp800-53a prose: findings from security assessments are responded to in accordance with organizational risk tolerance; + links: + - href: '#ra-7_smt' + rel: assessment-for - id: ra-7_obj-2 name: assessment-objective props: @@ -38796,6 +42784,9 @@ catalog: value: RA-07[02] class: sp800-53a prose: findings from privacy assessments are responded to in accordance with organizational risk tolerance; + links: + - href: '#ra-7_smt' + rel: assessment-for - id: ra-7_obj-3 name: assessment-objective props: @@ -38803,6 +42794,9 @@ catalog: value: RA-07[03] class: sp800-53a prose: findings from monitoring are responded to in accordance with organizational risk tolerance; + links: + - href: '#ra-7_smt' + rel: assessment-for - id: ra-7_obj-4 name: assessment-objective props: @@ -38810,6 +42804,12 @@ catalog: value: RA-07[04] class: sp800-53a prose: findings from audits are responded to in accordance with organizational risk tolerance. + links: + - href: '#ra-7_smt' + rel: assessment-for + links: + - href: '#ra-7_smt' + rel: assessment-for - id: ra-7_asm-examine name: assessment-method props: @@ -38944,6 +42944,9 @@ catalog: value: RA-09 class: sp800-53a prose: 'critical system components and functions are identified by performing a criticality analysis for {{ insert: param, ra-09_odp.01 }} at {{ insert: param, ra-09_odp.02 }}.' + links: + - href: '#ra-9_smt' + rel: assessment-for - id: ra-9_asm-examine name: assessment-method props: @@ -39219,6 +43222,9 @@ catalog: value: SA-01a.[01] class: sp800-53a prose: a system and services acquisition policy is developed and documented; + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.a-2 name: assessment-objective props: @@ -39226,6 +43232,9 @@ catalog: value: SA-01a.[02] class: sp800-53a prose: 'the system and services acquisition policy is disseminated to {{ insert: param, sa-01_odp.01 }};' + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.a-3 name: assessment-objective props: @@ -39233,6 +43242,9 @@ catalog: value: SA-01a.[03] class: sp800-53a prose: system and services acquisition procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls are developed and documented; + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.a-4 name: assessment-objective props: @@ -39240,6 +43252,9 @@ catalog: value: SA-01a.[04] class: sp800-53a prose: 'the system and services acquisition procedures are disseminated to {{ insert: param, sa-01_odp.02 }};' + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.a.1 name: assessment-objective props: @@ -39261,6 +43276,9 @@ catalog: value: SA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses purpose;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-2 name: assessment-objective props: @@ -39268,6 +43286,9 @@ catalog: value: SA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses scope;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-3 name: assessment-objective props: @@ -39275,6 +43296,9 @@ catalog: value: SA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses roles;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-4 name: assessment-objective props: @@ -39282,6 +43306,9 @@ catalog: value: SA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses responsibilities;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-5 name: assessment-objective props: @@ -39289,6 +43316,9 @@ catalog: value: SA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses management commitment;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-6 name: assessment-objective props: @@ -39296,6 +43326,9 @@ catalog: value: SA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses coordination among organizational entities;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-7 name: assessment-objective props: @@ -39303,6 +43336,12 @@ catalog: value: SA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses compliance;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.b name: assessment-objective props: @@ -39310,6 +43349,15 @@ catalog: value: SA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#sa-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#sa-1_smt.a.1' + rel: assessment-for + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.b name: assessment-objective props: @@ -39317,6 +43365,9 @@ catalog: value: SA-01b. class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the system and services acquisition policy and procedures;' + links: + - href: '#sa-1_smt.b' + rel: assessment-for - id: sa-1_obj.c name: assessment-objective props: @@ -39338,6 +43389,9 @@ catalog: value: SA-01c.01[01] class: sp800-53a prose: 'the system and services acquisition policy is reviewed and updated {{ insert: param, sa-01_odp.05 }};' + links: + - href: '#sa-1_smt.c.1' + rel: assessment-for - id: sa-1_obj.c.1-2 name: assessment-objective props: @@ -39345,6 +43399,12 @@ catalog: value: SA-01c.01[02] class: sp800-53a prose: 'the current system and services acquisition policy is reviewed and updated following {{ insert: param, sa-01_odp.06 }};' + links: + - href: '#sa-1_smt.c.1' + rel: assessment-for + links: + - href: '#sa-1_smt.c.1' + rel: assessment-for - id: sa-1_obj.c.2 name: assessment-objective props: @@ -39359,6 +43419,9 @@ catalog: value: SA-01c.02[01] class: sp800-53a prose: 'the current system and services acquisition procedures are reviewed and updated {{ insert: param, sa-01_odp.07 }};' + links: + - href: '#sa-1_smt.c.2' + rel: assessment-for - id: sa-1_obj.c.2-2 name: assessment-objective props: @@ -39366,6 +43429,18 @@ catalog: value: SA-01c.02[02] class: sp800-53a prose: 'the current system and services acquisition procedures are reviewed and updated following {{ insert: param, sa-01_odp.08 }}.' + links: + - href: '#sa-1_smt.c.2' + rel: assessment-for + links: + - href: '#sa-1_smt.c.2' + rel: assessment-for + links: + - href: '#sa-1_smt.c' + rel: assessment-for + links: + - href: '#sa-1_smt' + rel: assessment-for - id: sa-1_asm-examine name: assessment-method props: @@ -39492,6 +43567,9 @@ catalog: value: SA-02a.[01] class: sp800-53a prose: the high-level information security requirements for the system or system service are determined in mission and business process planning; + links: + - href: '#sa-2_smt.a' + rel: assessment-for - id: sa-2_obj.a-2 name: assessment-objective props: @@ -39499,6 +43577,12 @@ catalog: value: SA-02a.[02] class: sp800-53a prose: the high-level privacy requirements for the system or system service are determined in mission and business process planning; + links: + - href: '#sa-2_smt.a' + rel: assessment-for + links: + - href: '#sa-2_smt.a' + rel: assessment-for - id: sa-2_obj.b name: assessment-objective props: @@ -39513,6 +43597,9 @@ catalog: value: SA-02b.[01] class: sp800-53a prose: the resources required to protect the system or system service are determined and documented as part of the organizational capital planning and investment control process; + links: + - href: '#sa-2_smt.b' + rel: assessment-for - id: sa-2_obj.b-2 name: assessment-objective props: @@ -39520,6 +43607,12 @@ catalog: value: SA-02b.[02] class: sp800-53a prose: the resources required to protect the system or system service are allocated as part of the organizational capital planning and investment control process; + links: + - href: '#sa-2_smt.b' + rel: assessment-for + links: + - href: '#sa-2_smt.b' + rel: assessment-for - id: sa-2_obj.c name: assessment-objective props: @@ -39534,6 +43627,9 @@ catalog: value: SA-02c.[01] class: sp800-53a prose: a discrete line item for information security is established in organizational programming and budgeting documentation; + links: + - href: '#sa-2_smt.c' + rel: assessment-for - id: sa-2_obj.c-2 name: assessment-objective props: @@ -39541,6 +43637,15 @@ catalog: value: SA-02c.[02] class: sp800-53a prose: a discrete line item for privacy is established in organizational programming and budgeting documentation. + links: + - href: '#sa-2_smt.c' + rel: assessment-for + links: + - href: '#sa-2_smt.c' + rel: assessment-for + links: + - href: '#sa-2_smt' + rel: assessment-for - id: sa-2_asm-examine name: assessment-method props: @@ -39733,6 +43838,9 @@ catalog: value: SA-03a.[01] class: sp800-53a prose: 'the system is acquired, developed, and managed using {{ insert: param, sa-03_odp }} that incorporates information security considerations;' + links: + - href: '#sa-3_smt.a' + rel: assessment-for - id: sa-3_obj.a-2 name: assessment-objective props: @@ -39740,6 +43848,12 @@ catalog: value: SA-03a.[02] class: sp800-53a prose: 'the system is acquired, developed, and managed using {{ insert: param, sa-03_odp }} that incorporates privacy considerations;' + links: + - href: '#sa-3_smt.a' + rel: assessment-for + links: + - href: '#sa-3_smt.a' + rel: assessment-for - id: sa-3_obj.b name: assessment-objective props: @@ -39754,6 +43868,9 @@ catalog: value: SA-03b.[01] class: sp800-53a prose: information security roles and responsibilities are defined and documented throughout the system development life cycle; + links: + - href: '#sa-3_smt.b' + rel: assessment-for - id: sa-3_obj.b-2 name: assessment-objective props: @@ -39761,6 +43878,12 @@ catalog: value: SA-03b.[02] class: sp800-53a prose: privacy roles and responsibilities are defined and documented throughout the system development life cycle; + links: + - href: '#sa-3_smt.b' + rel: assessment-for + links: + - href: '#sa-3_smt.b' + rel: assessment-for - id: sa-3_obj.c name: assessment-objective props: @@ -39775,6 +43898,9 @@ catalog: value: SA-03c.[01] class: sp800-53a prose: individuals with information security roles and responsibilities are identified; + links: + - href: '#sa-3_smt.c' + rel: assessment-for - id: sa-3_obj.c-2 name: assessment-objective props: @@ -39782,6 +43908,12 @@ catalog: value: SA-03c.[02] class: sp800-53a prose: individuals with privacy roles and responsibilities are identified; + links: + - href: '#sa-3_smt.c' + rel: assessment-for + links: + - href: '#sa-3_smt.c' + rel: assessment-for - id: sa-3_obj.d name: assessment-objective props: @@ -39796,6 +43928,9 @@ catalog: value: SA-03d.[01] class: sp800-53a prose: organizational information security risk management processes are integrated into system development life cycle activities; + links: + - href: '#sa-3_smt.d' + rel: assessment-for - id: sa-3_obj.d-2 name: assessment-objective props: @@ -39803,6 +43938,15 @@ catalog: value: SA-03d.[02] class: sp800-53a prose: organizational privacy risk management processes are integrated into system development life cycle activities. + links: + - href: '#sa-3_smt.d' + rel: assessment-for + links: + - href: '#sa-3_smt.d' + rel: assessment-for + links: + - href: '#sa-3_smt' + rel: assessment-for - id: sa-3_asm-examine name: assessment-method props: @@ -40075,6 +44219,9 @@ catalog: value: SA-04a.[01] class: sp800-53a prose: 'security functional requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.a' + rel: assessment-for - id: sa-4_obj.a-2 name: assessment-objective props: @@ -40082,6 +44229,12 @@ catalog: value: SA-04a.[02] class: sp800-53a prose: 'privacy functional requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.a' + rel: assessment-for + links: + - href: '#sa-4_smt.a' + rel: assessment-for - id: sa-4_obj.b name: assessment-objective props: @@ -40089,6 +44242,9 @@ catalog: value: SA-04b. class: sp800-53a prose: 'strength of mechanism requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.b' + rel: assessment-for - id: sa-4_obj.c name: assessment-objective props: @@ -40103,6 +44259,9 @@ catalog: value: SA-04c.[01] class: sp800-53a prose: 'security assurance requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.c' + rel: assessment-for - id: sa-4_obj.c-2 name: assessment-objective props: @@ -40110,6 +44269,12 @@ catalog: value: SA-04c.[02] class: sp800-53a prose: 'privacy assurance requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.c' + rel: assessment-for + links: + - href: '#sa-4_smt.c' + rel: assessment-for - id: sa-4_obj.d name: assessment-objective props: @@ -40124,6 +44289,9 @@ catalog: value: SA-04d.[01] class: sp800-53a prose: 'controls needed to satisfy the security requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.d' + rel: assessment-for - id: sa-4_obj.d-2 name: assessment-objective props: @@ -40131,6 +44299,12 @@ catalog: value: SA-04d.[02] class: sp800-53a prose: 'controls needed to satisfy the privacy requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.d' + rel: assessment-for + links: + - href: '#sa-4_smt.d' + rel: assessment-for - id: sa-4_obj.e name: assessment-objective props: @@ -40145,6 +44319,9 @@ catalog: value: SA-04e.[01] class: sp800-53a prose: 'security documentation requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.e' + rel: assessment-for - id: sa-4_obj.e-2 name: assessment-objective props: @@ -40152,6 +44329,12 @@ catalog: value: SA-04e.[02] class: sp800-53a prose: 'privacy documentation requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.e' + rel: assessment-for + links: + - href: '#sa-4_smt.e' + rel: assessment-for - id: sa-4_obj.f name: assessment-objective props: @@ -40166,6 +44349,9 @@ catalog: value: SA-04f.[01] class: sp800-53a prose: 'requirements for protecting security documentation, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.f' + rel: assessment-for - id: sa-4_obj.f-2 name: assessment-objective props: @@ -40173,6 +44359,12 @@ catalog: value: SA-04f.[02] class: sp800-53a prose: 'requirements for protecting privacy documentation, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.f' + rel: assessment-for + links: + - href: '#sa-4_smt.f' + rel: assessment-for - id: sa-4_obj.g name: assessment-objective props: @@ -40180,6 +44372,9 @@ catalog: value: SA-04g. class: sp800-53a prose: 'the description of the system development environment and environment in which the system is intended to operate, requirements, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.g' + rel: assessment-for - id: sa-4_obj.h name: assessment-objective props: @@ -40194,6 +44389,9 @@ catalog: value: SA-04h.[01] class: sp800-53a prose: 'the allocation of responsibility or identification of parties responsible for information security requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.h' + rel: assessment-for - id: sa-4_obj.h-2 name: assessment-objective props: @@ -40201,6 +44399,9 @@ catalog: value: SA-04h.[02] class: sp800-53a prose: 'the allocation of responsibility or identification of parties responsible for privacy requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }};' + links: + - href: '#sa-4_smt.h' + rel: assessment-for - id: sa-4_obj.h-3 name: assessment-objective props: @@ -40208,6 +44409,12 @@ catalog: value: SA-04h.[03] class: sp800-53a prose: 'the allocation of responsibility or identification of parties responsible for supply chain risk management requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }};' + links: + - href: '#sa-4_smt.h' + rel: assessment-for + links: + - href: '#sa-4_smt.h' + rel: assessment-for - id: sa-4_obj.i name: assessment-objective props: @@ -40215,6 +44422,12 @@ catalog: value: SA-04i. class: sp800-53a prose: 'acceptance criteria requirements and descriptions are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service.' + links: + - href: '#sa-4_smt.i' + rel: assessment-for + links: + - href: '#sa-4_smt' + rel: assessment-for - id: sa-4_asm-examine name: assessment-method props: @@ -40317,6 +44530,9 @@ catalog: value: SA-04(01) class: sp800-53a prose: the developer of the system, system component, or system service is required to provide a description of the functional properties of the controls to be implemented. + links: + - href: '#sa-4.1_smt' + rel: assessment-for - id: sa-4.1_asm-examine name: assessment-method props: @@ -40450,6 +44666,9 @@ catalog: value: SA-04(02) class: sp800-53a prose: 'the developer of the system, system component, or system service is required to provide design and implementation information for the controls that includes using {{ insert: param, sa-04.02_odp.01 }} at {{ insert: param, sa-04.02_odp.03 }}.' + links: + - href: '#sa-4.2_smt' + rel: assessment-for - id: sa-4.2_asm-examine name: assessment-method props: @@ -40560,6 +44779,9 @@ catalog: value: SA-04(09)[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to identify the functions intended for organizational use; + links: + - href: '#sa-4.9_smt' + rel: assessment-for - id: sa-4.9_obj-2 name: assessment-objective props: @@ -40567,6 +44789,9 @@ catalog: value: SA-04(09)[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to identify the ports intended for organizational use; + links: + - href: '#sa-4.9_smt' + rel: assessment-for - id: sa-4.9_obj-3 name: assessment-objective props: @@ -40574,6 +44799,9 @@ catalog: value: SA-04(09)[03] class: sp800-53a prose: the developer of the system, system component, or system service is required to identify the protocols intended for organizational use; + links: + - href: '#sa-4.9_smt' + rel: assessment-for - id: sa-4.9_obj-4 name: assessment-objective props: @@ -40581,6 +44809,12 @@ catalog: value: SA-04(09)[04] class: sp800-53a prose: the developer of the system, system component, or system service is required to identify the services intended for organizational use. + links: + - href: '#sa-4.9_smt' + rel: assessment-for + links: + - href: '#sa-4.9_smt' + rel: assessment-for - id: sa-4.9_asm-examine name: assessment-method props: @@ -40677,6 +44911,9 @@ catalog: value: SA-04(10) class: sp800-53a prose: only information technology products on the FIPS 201-approved products list for the Personal Identity Verification (PIV) capability implemented within organizational systems are employed. + links: + - href: '#sa-4.10_smt' + rel: assessment-for - id: sa-4.10_asm-examine name: assessment-method props: @@ -40915,6 +45152,9 @@ catalog: value: SA-05a.01[01] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the secure configuration of the system, component, or service is obtained or developed; + links: + - href: '#sa-5_smt.a.1' + rel: assessment-for - id: sa-5_obj.a.1-2 name: assessment-objective props: @@ -40922,6 +45162,9 @@ catalog: value: SA-05a.01[02] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the secure installation of the system, component, or service is obtained or developed; + links: + - href: '#sa-5_smt.a.1' + rel: assessment-for - id: sa-5_obj.a.1-3 name: assessment-objective props: @@ -40929,6 +45172,12 @@ catalog: value: SA-05a.01[03] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the secure operation of the system, component, or service is obtained or developed; + links: + - href: '#sa-5_smt.a.1' + rel: assessment-for + links: + - href: '#sa-5_smt.a.1' + rel: assessment-for - id: sa-5_obj.a.2 name: assessment-objective props: @@ -40943,6 +45192,9 @@ catalog: value: SA-05a.02[01] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the effective use of security functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.a.2' + rel: assessment-for - id: sa-5_obj.a.2-2 name: assessment-objective props: @@ -40950,6 +45202,9 @@ catalog: value: SA-05a.02[02] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the effective maintenance of security functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.a.2' + rel: assessment-for - id: sa-5_obj.a.2-3 name: assessment-objective props: @@ -40957,6 +45212,9 @@ catalog: value: SA-05a.02[03] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the effective use of privacy functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.a.2' + rel: assessment-for - id: sa-5_obj.a.2-4 name: assessment-objective props: @@ -40964,6 +45222,12 @@ catalog: value: SA-05a.02[04] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the effective maintenance of privacy functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.a.2' + rel: assessment-for + links: + - href: '#sa-5_smt.a.2' + rel: assessment-for - id: sa-5_obj.a.3 name: assessment-objective props: @@ -40978,6 +45242,9 @@ catalog: value: SA-05a.03[01] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes known vulnerabilities regarding the configuration of administrative or privileged functions is obtained or developed; + links: + - href: '#sa-5_smt.a.3' + rel: assessment-for - id: sa-5_obj.a.3-2 name: assessment-objective props: @@ -40985,6 +45252,15 @@ catalog: value: SA-05a.03[02] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes known vulnerabilities regarding the use of administrative or privileged functions is obtained or developed; + links: + - href: '#sa-5_smt.a.3' + rel: assessment-for + links: + - href: '#sa-5_smt.a.3' + rel: assessment-for + links: + - href: '#sa-5_smt.a' + rel: assessment-for - id: sa-5_obj.b name: assessment-objective props: @@ -41006,6 +45282,9 @@ catalog: value: SA-05b.01[01] class: sp800-53a prose: user documentation for the system, system component, or system service that describes user-accessible security functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.b.1' + rel: assessment-for - id: sa-5_obj.b.1-2 name: assessment-objective props: @@ -41013,6 +45292,9 @@ catalog: value: SA-05b.01[02] class: sp800-53a prose: user documentation for the system, system component, or system service that describes how to effectively use those (user-accessible security) functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.b.1' + rel: assessment-for - id: sa-5_obj.b.1-3 name: assessment-objective props: @@ -41020,6 +45302,9 @@ catalog: value: SA-05b.01[03] class: sp800-53a prose: user documentation for the system, system component, or system service that describes user-accessible privacy functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.b.1' + rel: assessment-for - id: sa-5_obj.b.1-4 name: assessment-objective props: @@ -41027,6 +45312,12 @@ catalog: value: SA-05b.01[04] class: sp800-53a prose: user documentation for the system, system component, or system service that describes how to effectively use those (user-accessible privacy) functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.b.1' + rel: assessment-for + links: + - href: '#sa-5_smt.b.1' + rel: assessment-for - id: sa-5_obj.b.2 name: assessment-objective props: @@ -41041,6 +45332,9 @@ catalog: value: SA-05b.02[01] class: sp800-53a prose: user documentation for the system, system component, or system service that describes methods for user interaction, which enable individuals to use the system, component, or service in a more secure manner is obtained or developed; + links: + - href: '#sa-5_smt.b.2' + rel: assessment-for - id: sa-5_obj.b.2-2 name: assessment-objective props: @@ -41048,6 +45342,12 @@ catalog: value: SA-05b.02[02] class: sp800-53a prose: user documentation for the system, system component, or system service that describes methods for user interaction, which enable individuals to use the system, component, or service to protect individual privacy is obtained or developed; + links: + - href: '#sa-5_smt.b.2' + rel: assessment-for + links: + - href: '#sa-5_smt.b.2' + rel: assessment-for - id: sa-5_obj.b.3 name: assessment-objective props: @@ -41062,6 +45362,9 @@ catalog: value: SA-05b.03[01] class: sp800-53a prose: user documentation for the system, system component, or system service that describes user responsibilities for maintaining the security of the system, component, or service is obtained or developed; + links: + - href: '#sa-5_smt.b.3' + rel: assessment-for - id: sa-5_obj.b.3-2 name: assessment-objective props: @@ -41069,6 +45372,15 @@ catalog: value: SA-05b.03[02] class: sp800-53a prose: user documentation for the system, system component, or system service that describes user responsibilities for maintaining the privacy of individuals is obtained or developed; + links: + - href: '#sa-5_smt.b.3' + rel: assessment-for + links: + - href: '#sa-5_smt.b.3' + rel: assessment-for + links: + - href: '#sa-5_smt.b' + rel: assessment-for - id: sa-5_obj.c name: assessment-objective props: @@ -41083,6 +45395,9 @@ catalog: value: SA-05c.[01] class: sp800-53a prose: attempts to obtain system, system component, or system service documentation when such documentation is either unavailable or nonexistent is documented; + links: + - href: '#sa-5_smt.c' + rel: assessment-for - id: sa-5_obj.c-2 name: assessment-objective props: @@ -41090,6 +45405,12 @@ catalog: value: SA-05c.[02] class: sp800-53a prose: 'after attempts to obtain system, system component, or system service documentation when such documentation is either unavailable or nonexistent, {{ insert: param, sa-05_odp.01 }} are taken in response;' + links: + - href: '#sa-5_smt.c' + rel: assessment-for + links: + - href: '#sa-5_smt.c' + rel: assessment-for - id: sa-5_obj.d name: assessment-objective props: @@ -41097,6 +45418,12 @@ catalog: value: SA-05d. class: sp800-53a prose: 'documentation is distributed to {{ insert: param, sa-05_odp.02 }}.' + links: + - href: '#sa-5_smt.d' + rel: assessment-for + links: + - href: '#sa-5_smt' + rel: assessment-for - id: sa-5_asm-examine name: assessment-method props: @@ -41293,6 +45620,9 @@ catalog: value: SA-08[01] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.01 }} are applied in the specification of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-2 name: assessment-objective props: @@ -41300,6 +45630,9 @@ catalog: value: SA-08[02] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.01 }} are applied in the design of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-3 name: assessment-objective props: @@ -41307,6 +45640,9 @@ catalog: value: SA-08[03] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.01 }} are applied in the development of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-4 name: assessment-objective props: @@ -41314,6 +45650,9 @@ catalog: value: SA-08[04] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.01 }} are applied in the implementation of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-5 name: assessment-objective props: @@ -41321,6 +45660,9 @@ catalog: value: SA-08[05] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.01 }} are applied in the modification of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-6 name: assessment-objective props: @@ -41328,6 +45670,9 @@ catalog: value: SA-08[06] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.02 }} are applied in the specification of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-7 name: assessment-objective props: @@ -41335,6 +45680,9 @@ catalog: value: SA-08[07] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.02 }} are applied in the design of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-8 name: assessment-objective props: @@ -41342,6 +45690,9 @@ catalog: value: SA-08[08] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.02 }} are applied in the development of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-9 name: assessment-objective props: @@ -41349,6 +45700,9 @@ catalog: value: SA-08[09] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.02 }} are applied in the implementation of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-10 name: assessment-objective props: @@ -41356,6 +45710,12 @@ catalog: value: SA-08[10] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.02 }} are applied in the modification of the system and system components.' + links: + - href: '#sa-8_smt' + rel: assessment-for + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_asm-examine name: assessment-method props: @@ -41542,6 +45902,9 @@ catalog: value: SA-09a.[01] class: sp800-53a prose: providers of external system services comply with organizational security requirements; + links: + - href: '#sa-9_smt.a' + rel: assessment-for - id: sa-9_obj.a-2 name: assessment-objective props: @@ -41549,6 +45912,9 @@ catalog: value: SA-09a.[02] class: sp800-53a prose: providers of external system services comply with organizational privacy requirements; + links: + - href: '#sa-9_smt.a' + rel: assessment-for - id: sa-9_obj.a-3 name: assessment-objective props: @@ -41556,6 +45922,12 @@ catalog: value: SA-09a.[03] class: sp800-53a prose: 'providers of external system services employ {{ insert: param, sa-09_odp.01 }};' + links: + - href: '#sa-9_smt.a' + rel: assessment-for + links: + - href: '#sa-9_smt.a' + rel: assessment-for - id: sa-9_obj.b name: assessment-objective props: @@ -41570,6 +45942,9 @@ catalog: value: SA-09b.[01] class: sp800-53a prose: organizational oversight with regard to external system services are defined and documented; + links: + - href: '#sa-9_smt.b' + rel: assessment-for - id: sa-9_obj.b-2 name: assessment-objective props: @@ -41577,6 +45952,12 @@ catalog: value: SA-09b.[02] class: sp800-53a prose: user roles and responsibilities with regard to external system services are defined and documented; + links: + - href: '#sa-9_smt.b' + rel: assessment-for + links: + - href: '#sa-9_smt.b' + rel: assessment-for - id: sa-9_obj.c name: assessment-objective props: @@ -41584,6 +45965,12 @@ catalog: value: SA-09c. class: sp800-53a prose: ' {{ insert: param, sa-09_odp.02 }} are employed to monitor control compliance by external service providers on an ongoing basis.' + links: + - href: '#sa-9_smt.c' + rel: assessment-for + links: + - href: '#sa-9_smt' + rel: assessment-for - id: sa-9_asm-examine name: assessment-method props: @@ -41707,6 +46094,9 @@ catalog: value: SA-09(02) class: sp800-53a prose: 'providers of {{ insert: param, sa-09.02_odp }} are required to identify the functions, ports, protocols, and other services required for the use of such services.' + links: + - href: '#sa-9.2_smt' + rel: assessment-for - id: sa-9.2_asm-examine name: assessment-method props: @@ -41909,6 +46299,9 @@ catalog: value: SA-10a. class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform configuration management during system, component, or service {{ insert: param, sa-10_odp.01 }};' + links: + - href: '#sa-10_smt.a' + rel: assessment-for - id: sa-10_obj.b name: assessment-objective props: @@ -41923,6 +46316,9 @@ catalog: value: SA-10b.[01] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to document the integrity of changes to {{ insert: param, sa-10_odp.02 }};' + links: + - href: '#sa-10_smt.b' + rel: assessment-for - id: sa-10_obj.b-2 name: assessment-objective props: @@ -41930,6 +46326,9 @@ catalog: value: SA-10b.[02] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to manage the integrity of changes to {{ insert: param, sa-10_odp.02 }};' + links: + - href: '#sa-10_smt.b' + rel: assessment-for - id: sa-10_obj.b-3 name: assessment-objective props: @@ -41937,6 +46336,12 @@ catalog: value: SA-10b.[03] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to control the integrity of changes to {{ insert: param, sa-10_odp.02 }};' + links: + - href: '#sa-10_smt.b' + rel: assessment-for + links: + - href: '#sa-10_smt.b' + rel: assessment-for - id: sa-10_obj.c name: assessment-objective props: @@ -41944,6 +46349,9 @@ catalog: value: SA-10c. class: sp800-53a prose: the developer of the system, system component, or system service is required to implement only organization-approved changes to the system, component, or service; + links: + - href: '#sa-10_smt.c' + rel: assessment-for - id: sa-10_obj.d name: assessment-objective props: @@ -41958,6 +46366,9 @@ catalog: value: SA-10d.[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to document approved changes to the system, component, or service; + links: + - href: '#sa-10_smt.d' + rel: assessment-for - id: sa-10_obj.d-2 name: assessment-objective props: @@ -41965,6 +46376,9 @@ catalog: value: SA-10d.[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to document the potential security impacts of approved changes; + links: + - href: '#sa-10_smt.d' + rel: assessment-for - id: sa-10_obj.d-3 name: assessment-objective props: @@ -41972,6 +46386,12 @@ catalog: value: SA-10d.[03] class: sp800-53a prose: the developer of the system, system component, or system service is required to document the potential privacy impacts of approved changes; + links: + - href: '#sa-10_smt.d' + rel: assessment-for + links: + - href: '#sa-10_smt.d' + rel: assessment-for - id: sa-10_obj.e name: assessment-objective props: @@ -41986,6 +46406,9 @@ catalog: value: SA-10e.[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to track security flaws within the system, component, or service; + links: + - href: '#sa-10_smt.e' + rel: assessment-for - id: sa-10_obj.e-2 name: assessment-objective props: @@ -41993,6 +46416,9 @@ catalog: value: SA-10e.[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to track security flaw resolutions within the system, component, or service; + links: + - href: '#sa-10_smt.e' + rel: assessment-for - id: sa-10_obj.e-3 name: assessment-objective props: @@ -42000,6 +46426,15 @@ catalog: value: SA-10e.[03] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to report findings to {{ insert: param, sa-10_odp.03 }}.' + links: + - href: '#sa-10_smt.e' + rel: assessment-for + links: + - href: '#sa-10_smt.e' + rel: assessment-for + links: + - href: '#sa-10_smt' + rel: assessment-for - id: sa-10_asm-examine name: assessment-method props: @@ -42225,6 +46660,9 @@ catalog: value: SA-11a.[01] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to develop a plan for ongoing security assessments; + links: + - href: '#sa-11_smt.a' + rel: assessment-for - id: sa-11_obj.a-2 name: assessment-objective props: @@ -42232,6 +46670,9 @@ catalog: value: SA-11a.[02] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to implement a plan for ongoing security assessments; + links: + - href: '#sa-11_smt.a' + rel: assessment-for - id: sa-11_obj.a-3 name: assessment-objective props: @@ -42239,6 +46680,9 @@ catalog: value: SA-11a.[03] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to develop a plan for privacy assessments; + links: + - href: '#sa-11_smt.a' + rel: assessment-for - id: sa-11_obj.a-4 name: assessment-objective props: @@ -42246,6 +46690,12 @@ catalog: value: SA-11a.[04] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to implement a plan for ongoing privacy assessments; + links: + - href: '#sa-11_smt.a' + rel: assessment-for + links: + - href: '#sa-11_smt.a' + rel: assessment-for - id: sa-11_obj.b name: assessment-objective props: @@ -42253,6 +46703,9 @@ catalog: value: SA-11b. class: sp800-53a prose: 'the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to perform {{ insert: param, sa-11_odp.01 }} testing/evaluation {{ insert: param, sa-11_odp.02 }} at {{ insert: param, sa-11_odp.03 }};' + links: + - href: '#sa-11_smt.b' + rel: assessment-for - id: sa-11_obj.c name: assessment-objective props: @@ -42267,6 +46720,9 @@ catalog: value: SA-11c.[01] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to produce evidence of the execution of the assessment plan; + links: + - href: '#sa-11_smt.c' + rel: assessment-for - id: sa-11_obj.c-2 name: assessment-objective props: @@ -42274,6 +46730,12 @@ catalog: value: SA-11c.[02] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to produce the results of the testing and evaluation; + links: + - href: '#sa-11_smt.c' + rel: assessment-for + links: + - href: '#sa-11_smt.c' + rel: assessment-for - id: sa-11_obj.d name: assessment-objective props: @@ -42281,6 +46743,9 @@ catalog: value: SA-11d. class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to implement a verifiable flaw remediation process; + links: + - href: '#sa-11_smt.d' + rel: assessment-for - id: sa-11_obj.e name: assessment-objective props: @@ -42288,6 +46753,12 @@ catalog: value: SA-11e. class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to correct flaws identified during testing and evaluation. + links: + - href: '#sa-11_smt.e' + rel: assessment-for + links: + - href: '#sa-11_smt' + rel: assessment-for - id: sa-11_asm-examine name: assessment-method props: @@ -42521,6 +46992,9 @@ catalog: value: SA-15a.01[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to follow a documented development process that explicitly addresses security requirements; + links: + - href: '#sa-15_smt.a.1' + rel: assessment-for - id: sa-15_obj.a.1-2 name: assessment-objective props: @@ -42528,6 +47002,12 @@ catalog: value: SA-15a.01[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to follow a documented development process that explicitly addresses privacy requirements; + links: + - href: '#sa-15_smt.a.1' + rel: assessment-for + links: + - href: '#sa-15_smt.a.1' + rel: assessment-for - id: sa-15_obj.a.2 name: assessment-objective props: @@ -42542,6 +47022,9 @@ catalog: value: SA-15a.02[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to follow a documented development process that identifies the standards used in the development process; + links: + - href: '#sa-15_smt.a.2' + rel: assessment-for - id: sa-15_obj.a.2-2 name: assessment-objective props: @@ -42549,6 +47032,12 @@ catalog: value: SA-15a.02[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to follow a documented development process that identifies the tools used in the development process; + links: + - href: '#sa-15_smt.a.2' + rel: assessment-for + links: + - href: '#sa-15_smt.a.2' + rel: assessment-for - id: sa-15_obj.a.3 name: assessment-objective props: @@ -42563,6 +47052,9 @@ catalog: value: SA-15a.03[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to follow a documented development process that documents the specific tool used in the development process; + links: + - href: '#sa-15_smt.a.3' + rel: assessment-for - id: sa-15_obj.a.3-2 name: assessment-objective props: @@ -42570,6 +47062,12 @@ catalog: value: SA-15a.03[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to follow a documented development process that documents the specific tool configurations used in the development process; + links: + - href: '#sa-15_smt.a.3' + rel: assessment-for + links: + - href: '#sa-15_smt.a.3' + rel: assessment-for - id: sa-15_obj.a.4 name: assessment-objective props: @@ -42577,6 +47075,12 @@ catalog: value: SA-15a.04 class: sp800-53a prose: the developer of the system, system component, or system service is required to follow a documented development process that documents, manages, and ensures the integrity of changes to the process and/or tools used in development; + links: + - href: '#sa-15_smt.a.4' + rel: assessment-for + links: + - href: '#sa-15_smt.a' + rel: assessment-for - id: sa-15_obj.b name: assessment-objective props: @@ -42591,6 +47095,9 @@ catalog: value: SA-15b.[01] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to follow a documented development process in which the development process, standards, tools, tool options, and tool configurations are reviewed {{ insert: param, sa-15_odp.01 }} to determine that the process, standards, tools, tool options, and tool configurations selected and employed satisfy {{ insert: param, sa-15_odp.02 }};' + links: + - href: '#sa-15_smt.b' + rel: assessment-for - id: sa-15_obj.b-2 name: assessment-objective props: @@ -42598,6 +47105,15 @@ catalog: value: SA-15b.[02] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to follow a documented development process in which the development process, standards, tools, tool options, and tool configurations are reviewed {{ insert: param, sa-15_odp.01 }} to determine that the process, standards, tools, tool options, and tool configurations selected and employed satisfy {{ insert: param, sa-15_odp.03 }}.' + links: + - href: '#sa-15_smt.b' + rel: assessment-for + links: + - href: '#sa-15_smt.b' + rel: assessment-for + links: + - href: '#sa-15_smt' + rel: assessment-for - id: sa-15_asm-examine name: assessment-method props: @@ -42764,6 +47280,9 @@ catalog: value: SA-15(03)(a) class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform a criticality analysis at {{ insert: param, sa-15.03_odp.01 }} in the system development life cycle;' + links: + - href: '#sa-15.3_smt.a' + rel: assessment-for - id: sa-15.3_obj.b name: assessment-objective props: @@ -42778,6 +47297,9 @@ catalog: value: SA-15(03)(b)[01] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform a criticality analysis at the following rigor level: {{ insert: param, sa-15.03_odp.02 }};' + links: + - href: '#sa-15.3_smt.b' + rel: assessment-for - id: sa-15.3_obj.b-2 name: assessment-objective props: @@ -42785,6 +47307,15 @@ catalog: value: SA-15(03)(b)[02] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform a criticality analysis at the following rigor level: {{ insert: param, sa-15.03_odp.03 }} .' + links: + - href: '#sa-15.3_smt.b' + rel: assessment-for + links: + - href: '#sa-15.3_smt.b' + rel: assessment-for + links: + - href: '#sa-15.3_smt' + rel: assessment-for - id: sa-15.3_asm-examine name: assessment-method props: @@ -42939,6 +47470,9 @@ catalog: value: SA-22a. class: sp800-53a prose: system components are replaced when support for the components is no longer available from the developer, vendor, or manufacturer; + links: + - href: '#sa-22_smt.a' + rel: assessment-for - id: sa-22_obj.b name: assessment-objective props: @@ -42946,6 +47480,12 @@ catalog: value: SA-22b. class: sp800-53a prose: ' {{ insert: param, sa-22_odp.01 }} provide options for alternative sources for continued support for unsupported components.' + links: + - href: '#sa-22_smt.b' + rel: assessment-for + links: + - href: '#sa-22_smt' + rel: assessment-for - id: sa-22_asm-examine name: assessment-method props: @@ -43215,6 +47755,9 @@ catalog: value: SC-01a.[01] class: sp800-53a prose: a system and communications protection policy is developed and documented; + links: + - href: '#sc-1_smt.a' + rel: assessment-for - id: sc-1_obj.a-2 name: assessment-objective props: @@ -43222,6 +47765,9 @@ catalog: value: SC-01a.[02] class: sp800-53a prose: 'the system and communications protection policy is disseminated to {{ insert: param, sc-01_odp.01 }};' + links: + - href: '#sc-1_smt.a' + rel: assessment-for - id: sc-1_obj.a-3 name: assessment-objective props: @@ -43229,6 +47775,9 @@ catalog: value: SC-01a.[03] class: sp800-53a prose: system and communications protection procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls are developed and documented; + links: + - href: '#sc-1_smt.a' + rel: assessment-for - id: sc-1_obj.a-4 name: assessment-objective props: @@ -43236,6 +47785,9 @@ catalog: value: SC-01a.[04] class: sp800-53a prose: 'the system and communications protection procedures are disseminated to {{ insert: param, sc-01_odp.02 }};' + links: + - href: '#sc-1_smt.a' + rel: assessment-for - id: sc-1_obj.a.1 name: assessment-objective props: @@ -43257,6 +47809,9 @@ catalog: value: SC-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses purpose;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-2 name: assessment-objective props: @@ -43264,6 +47819,9 @@ catalog: value: SC-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses scope;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-3 name: assessment-objective props: @@ -43271,6 +47829,9 @@ catalog: value: SC-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses roles;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-4 name: assessment-objective props: @@ -43278,6 +47839,9 @@ catalog: value: SC-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses responsibilities;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-5 name: assessment-objective props: @@ -43285,6 +47849,9 @@ catalog: value: SC-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses management commitment;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-6 name: assessment-objective props: @@ -43292,6 +47859,9 @@ catalog: value: SC-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses coordination among organizational entities;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-7 name: assessment-objective props: @@ -43299,6 +47869,12 @@ catalog: value: SC-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses compliance;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.b name: assessment-objective props: @@ -43306,6 +47882,15 @@ catalog: value: SC-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#sc-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#sc-1_smt.a.1' + rel: assessment-for + links: + - href: '#sc-1_smt.a' + rel: assessment-for - id: sc-1_obj.b name: assessment-objective props: @@ -43313,6 +47898,9 @@ catalog: value: SC-01b. class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the system and communications protection policy and procedures;' + links: + - href: '#sc-1_smt.b' + rel: assessment-for - id: sc-1_obj.c name: assessment-objective props: @@ -43334,6 +47922,9 @@ catalog: value: SC-01c.01[01] class: sp800-53a prose: 'the current system and communications protection policy is reviewed and updated {{ insert: param, sc-01_odp.05 }};' + links: + - href: '#sc-1_smt.c.1' + rel: assessment-for - id: sc-1_obj.c.1-2 name: assessment-objective props: @@ -43341,6 +47932,12 @@ catalog: value: SC-01c.01[02] class: sp800-53a prose: 'the current system and communications protection policy is reviewed and updated following {{ insert: param, sc-01_odp.06 }};' + links: + - href: '#sc-1_smt.c.1' + rel: assessment-for + links: + - href: '#sc-1_smt.c.1' + rel: assessment-for - id: sc-1_obj.c.2 name: assessment-objective props: @@ -43355,6 +47952,9 @@ catalog: value: SC-01c.02[01] class: sp800-53a prose: 'the current system and communications protection procedures are reviewed and updated {{ insert: param, sc-01_odp.07 }};' + links: + - href: '#sc-1_smt.c.2' + rel: assessment-for - id: sc-1_obj.c.2-2 name: assessment-objective props: @@ -43362,6 +47962,18 @@ catalog: value: SC-01c.02[02] class: sp800-53a prose: 'the current system and communications protection procedures are reviewed and updated following {{ insert: param, sc-01_odp.08 }}.' + links: + - href: '#sc-1_smt.c.2' + rel: assessment-for + links: + - href: '#sc-1_smt.c.2' + rel: assessment-for + links: + - href: '#sc-1_smt.c' + rel: assessment-for + links: + - href: '#sc-1_smt' + rel: assessment-for - id: sc-1_asm-examine name: assessment-method props: @@ -43450,6 +48062,9 @@ catalog: value: SC-02 class: sp800-53a prose: user functionality, including user interface services, is separated from system management functionality. + links: + - href: '#sc-2_smt' + rel: assessment-for - id: sc-2_asm-examine name: assessment-method props: @@ -43546,6 +48161,9 @@ catalog: value: SC-04[01] class: sp800-53a prose: unauthorized information transfer via shared system resources is prevented; + links: + - href: '#sc-4_smt' + rel: assessment-for - id: sc-4_obj-2 name: assessment-objective props: @@ -43553,6 +48171,12 @@ catalog: value: SC-04[02] class: sp800-53a prose: unintended information transfer via shared system resources is prevented. + links: + - href: '#sc-4_smt' + rel: assessment-for + links: + - href: '#sc-4_smt' + rel: assessment-for - id: sc-4_asm-examine name: assessment-method props: @@ -43699,6 +48323,9 @@ catalog: value: SC-05a. class: sp800-53a prose: 'the effects of {{ insert: param, sc-05_odp.01 }} are {{ insert: param, sc-05_odp.02 }};' + links: + - href: '#sc-5_smt.a' + rel: assessment-for - id: sc-5_obj.b name: assessment-objective props: @@ -43706,6 +48333,12 @@ catalog: value: SC-05b. class: sp800-53a prose: ' {{ insert: param, sc-05_odp.03 }} are employed to achieve the denial-of-service protection objective.' + links: + - href: '#sc-5_smt.b' + rel: assessment-for + links: + - href: '#sc-5_smt' + rel: assessment-for - id: sc-5_asm-examine name: assessment-method props: @@ -43901,6 +48534,9 @@ catalog: value: SC-07a.[01] class: sp800-53a prose: communications at external managed interfaces to the system are monitored; + links: + - href: '#sc-7_smt.a' + rel: assessment-for - id: sc-7_obj.a-2 name: assessment-objective props: @@ -43908,6 +48544,9 @@ catalog: value: SC-07a.[02] class: sp800-53a prose: communications at external managed interfaces to the system are controlled; + links: + - href: '#sc-7_smt.a' + rel: assessment-for - id: sc-7_obj.a-3 name: assessment-objective props: @@ -43915,6 +48554,9 @@ catalog: value: SC-07a.[03] class: sp800-53a prose: communications at key internal managed interfaces within the system are monitored; + links: + - href: '#sc-7_smt.a' + rel: assessment-for - id: sc-7_obj.a-4 name: assessment-objective props: @@ -43922,6 +48564,12 @@ catalog: value: SC-07a.[04] class: sp800-53a prose: communications at key internal managed interfaces within the system are controlled; + links: + - href: '#sc-7_smt.a' + rel: assessment-for + links: + - href: '#sc-7_smt.a' + rel: assessment-for - id: sc-7_obj.b name: assessment-objective props: @@ -43929,6 +48577,9 @@ catalog: value: SC-07b. class: sp800-53a prose: 'subnetworks for publicly accessible system components are {{ insert: param, sc-07_odp }} separated from internal organizational networks;' + links: + - href: '#sc-7_smt.b' + rel: assessment-for - id: sc-7_obj.c name: assessment-objective props: @@ -43936,6 +48587,12 @@ catalog: value: SC-07c. class: sp800-53a prose: external networks or systems are only connected to through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security and privacy architecture. + links: + - href: '#sc-7_smt.c' + rel: assessment-for + links: + - href: '#sc-7_smt' + rel: assessment-for - id: sc-7_asm-examine name: assessment-method props: @@ -44030,6 +48687,9 @@ catalog: value: SC-07(03) class: sp800-53a prose: the number of external network connections to the system is limited. + links: + - href: '#sc-7.3_smt' + rel: assessment-for - id: sc-7.3_asm-examine name: assessment-method props: @@ -44200,6 +48860,9 @@ catalog: value: SC-07(04)(a) class: sp800-53a prose: a managed interface is implemented for each external telecommunication service; + links: + - href: '#sc-7.4_smt.a' + rel: assessment-for - id: sc-7.4_obj.b name: assessment-objective props: @@ -44207,6 +48870,9 @@ catalog: value: SC-07(04)(b) class: sp800-53a prose: a traffic flow policy is established for each managed interface; + links: + - href: '#sc-7.4_smt.b' + rel: assessment-for - id: sc-7.4_obj.c name: assessment-objective props: @@ -44221,6 +48887,9 @@ catalog: value: SC-07(04)(c)[01] class: sp800-53a prose: the confidentiality of the information being transmitted across each interface is protected; + links: + - href: '#sc-7.4_smt.c' + rel: assessment-for - id: sc-7.4_obj.c-2 name: assessment-objective props: @@ -44228,6 +48897,12 @@ catalog: value: SC-07(04)(c)[02] class: sp800-53a prose: the integrity of the information being transmitted across each interface is protected; + links: + - href: '#sc-7.4_smt.c' + rel: assessment-for + links: + - href: '#sc-7.4_smt.c' + rel: assessment-for - id: sc-7.4_obj.d name: assessment-objective props: @@ -44235,6 +48910,9 @@ catalog: value: SC-07(04)(d) class: sp800-53a prose: each exception to the traffic flow policy is documented with a supporting mission or business need and duration of that need; + links: + - href: '#sc-7.4_smt.d' + rel: assessment-for - id: sc-7.4_obj.e name: assessment-objective props: @@ -44249,6 +48927,9 @@ catalog: value: SC-07(04)(e)[01] class: sp800-53a prose: 'exceptions to the traffic flow policy are reviewed {{ insert: param, sc-07.04_odp }};' + links: + - href: '#sc-7.4_smt.e' + rel: assessment-for - id: sc-7.4_obj.e-2 name: assessment-objective props: @@ -44256,6 +48937,12 @@ catalog: value: SC-07(04)(e)[02] class: sp800-53a prose: exceptions to the traffic flow policy that are no longer supported by an explicit mission or business need are removed; + links: + - href: '#sc-7.4_smt.e' + rel: assessment-for + links: + - href: '#sc-7.4_smt.e' + rel: assessment-for - id: sc-7.4_obj.f name: assessment-objective props: @@ -44263,6 +48950,9 @@ catalog: value: SC-07(04)(f) class: sp800-53a prose: unauthorized exchanges of control plan traffic with external networks are prevented; + links: + - href: '#sc-7.4_smt.f' + rel: assessment-for - id: sc-7.4_obj.g name: assessment-objective props: @@ -44270,6 +48960,9 @@ catalog: value: SC-07(04)(g) class: sp800-53a prose: information is published to enable remote networks to detect unauthorized control plane traffic from internal networks; + links: + - href: '#sc-7.4_smt.g' + rel: assessment-for - id: sc-7.4_obj.h name: assessment-objective props: @@ -44277,6 +48970,12 @@ catalog: value: SC-07(04)(h) class: sp800-53a prose: unauthorized control plane traffic is filtered from external networks. + links: + - href: '#sc-7.4_smt.h' + rel: assessment-for + links: + - href: '#sc-7.4_smt' + rel: assessment-for - id: sc-7.4_asm-examine name: assessment-method props: @@ -44411,6 +49110,9 @@ catalog: value: SC-07(05)[01] class: sp800-53a prose: 'network communications traffic is denied by default {{ insert: param, sc-07.05_odp.01 }};' + links: + - href: '#sc-7.5_smt' + rel: assessment-for - id: sc-7.5_obj-2 name: assessment-objective props: @@ -44418,6 +49120,12 @@ catalog: value: SC-07(05)[02] class: sp800-53a prose: 'network communications traffic is allowed by exception {{ insert: param, sc-07.05_odp.01 }}.' + links: + - href: '#sc-7.5_smt' + rel: assessment-for + links: + - href: '#sc-7.5_smt' + rel: assessment-for - id: sc-7.5_asm-examine name: assessment-method props: @@ -44516,6 +49224,9 @@ catalog: value: SC-07(07) class: sp800-53a prose: 'split tunneling is prevented for remote devices connecting to organizational systems unless the split tunnel is securely provisioned using {{ insert: param, sc-07.07_odp }}.' + links: + - href: '#sc-7.7_smt' + rel: assessment-for - id: sc-7.7_asm-examine name: assessment-method props: @@ -44633,6 +49344,9 @@ catalog: value: SC-07(08) class: sp800-53a prose: ' {{ insert: param, sc-07.08_odp.01 }} is routed to {{ insert: param, sc-07.08_odp.02 }} through authenticated proxy servers at managed interfaces.' + links: + - href: '#sc-7.8_smt' + rel: assessment-for - id: sc-7.8_asm-examine name: assessment-method props: @@ -44784,6 +49498,9 @@ catalog: value: SC-08 class: sp800-53a prose: 'the {{ insert: param, sc-08_odp }} of transmitted information is/are protected.' + links: + - href: '#sc-8_smt' + rel: assessment-for - id: sc-8_asm-examine name: assessment-method props: @@ -44887,6 +49604,9 @@ catalog: value: SC-08(01) class: sp800-53a prose: 'cryptographic mechanisms are implemented to {{ insert: param, sc-08.01_odp }} during transmission.' + links: + - href: '#sc-8.1_smt' + rel: assessment-for - id: sc-8.1_asm-examine name: assessment-method props: @@ -44990,6 +49710,9 @@ catalog: value: SC-10 class: sp800-53a prose: 'the network connection associated with a communication session is terminated at the end of the session or after {{ insert: param, sc-10_odp }} of inactivity.' + links: + - href: '#sc-10_smt' + rel: assessment-for - id: sc-10_asm-examine name: assessment-method props: @@ -45110,6 +49833,8 @@ catalog: rel: related - href: '#ia-7' rel: related + - href: '#ia-13' + rel: related - href: '#sa-4' rel: related - href: '#sa-8' @@ -45157,6 +49882,9 @@ catalog: value: SC-12[01] class: sp800-53a prose: 'cryptographic keys are established when cryptography is employed within the system in accordance with {{ insert: param, sc-12_odp }};' + links: + - href: '#sc-12_smt' + rel: assessment-for - id: sc-12_obj-2 name: assessment-objective props: @@ -45164,6 +49892,12 @@ catalog: value: SC-12[02] class: sp800-53a prose: 'cryptographic keys are managed when cryptography is employed within the system in accordance with {{ insert: param, sc-12_odp }}.' + links: + - href: '#sc-12_smt' + rel: assessment-for + links: + - href: '#sc-12_smt' + rel: assessment-for - id: sc-12_asm-examine name: assessment-method props: @@ -45287,6 +50021,8 @@ catalog: rel: related - href: '#ia-7' rel: related + - href: '#ia-13' + rel: related - href: '#ma-4' rel: related - href: '#mp-2' @@ -45350,6 +50086,9 @@ catalog: value: SC-13a. class: sp800-53a prose: ' {{ insert: param, sc-13_odp.01 }} are identified;' + links: + - href: '#sc-13_smt.a' + rel: assessment-for - id: sc-13_obj.b name: assessment-objective props: @@ -45357,6 +50096,12 @@ catalog: value: SC-13b. class: sp800-53a prose: ' {{ insert: param, sc-13_odp.02 }} for each specified cryptographic use (defined in SC-13_ODP[01]) are implemented.' + links: + - href: '#sc-13_smt.b' + rel: assessment-for + links: + - href: '#sc-13_smt' + rel: assessment-for - id: sc-13_asm-examine name: assessment-method props: @@ -45480,6 +50225,9 @@ catalog: value: SC-15a. class: sp800-53a prose: 'remote activation of collaborative computing devices and applications is prohibited except {{ insert: param, sc-15_odp }};' + links: + - href: '#sc-15_smt.a' + rel: assessment-for - id: sc-15_obj.b name: assessment-objective props: @@ -45487,6 +50235,12 @@ catalog: value: SC-15b. class: sp800-53a prose: an explicit indication of use is provided to users physically present at the devices. + links: + - href: '#sc-15_smt.b' + rel: assessment-for + links: + - href: '#sc-15_smt' + rel: assessment-for - id: sc-15_asm-examine name: assessment-method props: @@ -45626,6 +50380,9 @@ catalog: value: SC-17a. class: sp800-53a prose: 'public key certificates are issued under {{ insert: param, sc-17_odp }} , or public key certificates are obtained from an approved service provider;' + links: + - href: '#sc-17_smt.a' + rel: assessment-for - id: sc-17_obj.b name: assessment-objective props: @@ -45633,6 +50390,12 @@ catalog: value: SC-17b. class: sp800-53a prose: only approved trust anchors are included in trust stores or certificate stores managed by the organization. + links: + - href: '#sc-17_smt.b' + rel: assessment-for + links: + - href: '#sc-17_smt' + rel: assessment-for - id: sc-17_asm-examine name: assessment-method props: @@ -45754,6 +50517,9 @@ catalog: value: SC-18a.[01] class: sp800-53a prose: acceptable mobile code is defined; + links: + - href: '#sc-18_smt.a' + rel: assessment-for - id: sc-18_obj.a-2 name: assessment-objective props: @@ -45761,6 +50527,9 @@ catalog: value: SC-18a.[02] class: sp800-53a prose: unacceptable mobile code is defined; + links: + - href: '#sc-18_smt.a' + rel: assessment-for - id: sc-18_obj.a-3 name: assessment-objective props: @@ -45768,6 +50537,9 @@ catalog: value: SC-18a.[03] class: sp800-53a prose: acceptable mobile code technologies are defined; + links: + - href: '#sc-18_smt.a' + rel: assessment-for - id: sc-18_obj.a-4 name: assessment-objective props: @@ -45775,6 +50547,12 @@ catalog: value: SC-18a.[04] class: sp800-53a prose: unacceptable mobile code technologies are defined; + links: + - href: '#sc-18_smt.a' + rel: assessment-for + links: + - href: '#sc-18_smt.a' + rel: assessment-for - id: sc-18_obj.b name: assessment-objective props: @@ -45789,6 +50567,9 @@ catalog: value: SC-18b.[01] class: sp800-53a prose: the use of mobile code is authorized within the system; + links: + - href: '#sc-18_smt.b' + rel: assessment-for - id: sc-18_obj.b-2 name: assessment-objective props: @@ -45796,6 +50577,9 @@ catalog: value: SC-18b.[02] class: sp800-53a prose: the use of mobile code is monitored within the system; + links: + - href: '#sc-18_smt.b' + rel: assessment-for - id: sc-18_obj.b-3 name: assessment-objective props: @@ -45803,6 +50587,15 @@ catalog: value: SC-18b.[03] class: sp800-53a prose: the use of mobile code is controlled within the system. + links: + - href: '#sc-18_smt.b' + rel: assessment-for + links: + - href: '#sc-18_smt.b' + rel: assessment-for + links: + - href: '#sc-18_smt' + rel: assessment-for - id: sc-18_asm-examine name: assessment-method props: @@ -45941,6 +50734,9 @@ catalog: value: SC-20a.[01] class: sp800-53a prose: additional data origin authentication is provided along with the authoritative name resolution data that the system returns in response to external name/address resolution queries; + links: + - href: '#sc-20_smt.a' + rel: assessment-for - id: sc-20_obj.a-2 name: assessment-objective props: @@ -45948,6 +50744,12 @@ catalog: value: SC-20a.[02] class: sp800-53a prose: integrity verification artifacts are provided along with the authoritative name resolution data that the system returns in response to external name/address resolution queries; + links: + - href: '#sc-20_smt.a' + rel: assessment-for + links: + - href: '#sc-20_smt.a' + rel: assessment-for - id: sc-20_obj.b name: assessment-objective props: @@ -45962,6 +50764,9 @@ catalog: value: SC-20b.[01] class: sp800-53a prose: the means to indicate the security status of child zones (and if the child supports secure resolution services) is provided when operating as part of a distributed, hierarchical namespace; + links: + - href: '#sc-20_smt.b' + rel: assessment-for - id: sc-20_obj.b-2 name: assessment-objective props: @@ -45969,6 +50774,15 @@ catalog: value: SC-20b.[02] class: sp800-53a prose: the means to enable verification of a chain of trust among parent and child domains when operating as part of a distributed, hierarchical namespace is provided. + links: + - href: '#sc-20_smt.b' + rel: assessment-for + links: + - href: '#sc-20_smt.b' + rel: assessment-for + links: + - href: '#sc-20_smt' + rel: assessment-for - id: sc-20_asm-examine name: assessment-method props: @@ -46063,6 +50877,9 @@ catalog: value: SC-21[01] class: sp800-53a prose: data origin authentication is requested for the name/address resolution responses that the system receives from authoritative sources; + links: + - href: '#sc-21_smt' + rel: assessment-for - id: sc-21_obj-2 name: assessment-objective props: @@ -46070,6 +50887,9 @@ catalog: value: SC-21[02] class: sp800-53a prose: data origin authentication is performed on the name/address resolution responses that the system receives from authoritative sources; + links: + - href: '#sc-21_smt' + rel: assessment-for - id: sc-21_obj-3 name: assessment-objective props: @@ -46077,6 +50897,9 @@ catalog: value: SC-21[03] class: sp800-53a prose: data integrity verification is requested for the name/address resolution responses that the system receives from authoritative sources; + links: + - href: '#sc-21_smt' + rel: assessment-for - id: sc-21_obj-4 name: assessment-objective props: @@ -46084,6 +50907,12 @@ catalog: value: SC-21[04] class: sp800-53a prose: data integrity verification is performed on the name/address resolution responses that the system receives from authoritative sources. + links: + - href: '#sc-21_smt' + rel: assessment-for + links: + - href: '#sc-21_smt' + rel: assessment-for - id: sc-21_asm-examine name: assessment-method props: @@ -46184,6 +51013,9 @@ catalog: value: SC-22[01] class: sp800-53a prose: the systems that collectively provide name/address resolution services for an organization are fault-tolerant; + links: + - href: '#sc-22_smt' + rel: assessment-for - id: sc-22_obj-2 name: assessment-objective props: @@ -46191,6 +51023,9 @@ catalog: value: SC-22[02] class: sp800-53a prose: the systems that collectively provide name/address resolution services for an organization implement internal role separation; + links: + - href: '#sc-22_smt' + rel: assessment-for - id: sc-22_obj-3 name: assessment-objective props: @@ -46198,6 +51033,12 @@ catalog: value: SC-22[03] class: sp800-53a prose: the systems that collectively provide name/address resolution services for an organization implement external role separation. + links: + - href: '#sc-22_smt' + rel: assessment-for + links: + - href: '#sc-22_smt' + rel: assessment-for - id: sc-22_asm-examine name: assessment-method props: @@ -46301,6 +51142,9 @@ catalog: value: SC-23 class: sp800-53a prose: the authenticity of communication sessions is protected. + links: + - href: '#sc-23_smt' + rel: assessment-for - id: sc-23_asm-examine name: assessment-method props: @@ -46461,6 +51305,9 @@ catalog: value: SC-28 class: sp800-53a prose: 'the {{ insert: param, sc-28_odp.01 }} of {{ insert: param, sc-28_odp.02 }} is/are protected.' + links: + - href: '#sc-28_smt' + rel: assessment-for - id: sc-28_asm-examine name: assessment-method props: @@ -46583,6 +51430,9 @@ catalog: value: SC-28(01)[01] class: sp800-53a prose: 'cryptographic mechanisms are implemented to prevent unauthorized disclosure of {{ insert: param, sc-28.01_odp.01 }} at rest on {{ insert: param, sc-28.01_odp.02 }};' + links: + - href: '#sc-28.1_smt' + rel: assessment-for - id: sc-28.1_obj-2 name: assessment-objective props: @@ -46590,6 +51440,12 @@ catalog: value: SC-28(01)[02] class: sp800-53a prose: 'cryptographic mechanisms are implemented to prevent unauthorized modification of {{ insert: param, sc-28.01_odp.01 }} at rest on {{ insert: param, sc-28.01_odp.02 }}.' + links: + - href: '#sc-28.1_smt' + rel: assessment-for + links: + - href: '#sc-28.1_smt' + rel: assessment-for - id: sc-28.1_asm-examine name: assessment-method props: @@ -46696,6 +51552,9 @@ catalog: value: SC-39 class: sp800-53a prose: a separate execution domain is maintained for each executing system process. + links: + - href: '#sc-39_smt' + rel: assessment-for - id: sc-39_asm-examine name: assessment-method props: @@ -46954,6 +51813,9 @@ catalog: value: SI-01a.[01] class: sp800-53a prose: a system and information integrity policy is developed and documented; + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.a-2 name: assessment-objective props: @@ -46961,6 +51823,9 @@ catalog: value: SI-01a.[02] class: sp800-53a prose: 'the system and information integrity policy is disseminated to {{ insert: param, si-01_odp.01 }};' + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.a-3 name: assessment-objective props: @@ -46968,6 +51833,9 @@ catalog: value: SI-01a.[03] class: sp800-53a prose: system and information integrity procedures to facilitate the implementation of the system and information integrity policy and associated system and information integrity controls are developed and documented; + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.a-4 name: assessment-objective props: @@ -46975,6 +51843,9 @@ catalog: value: SI-01a.[04] class: sp800-53a prose: 'the system and information integrity procedures are disseminated to {{ insert: param, si-01_odp.02 }};' + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.a.1 name: assessment-objective props: @@ -46996,6 +51867,9 @@ catalog: value: SI-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses purpose;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-2 name: assessment-objective props: @@ -47003,6 +51877,9 @@ catalog: value: SI-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses scope;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-3 name: assessment-objective props: @@ -47010,6 +51887,9 @@ catalog: value: SI-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses roles;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-4 name: assessment-objective props: @@ -47017,6 +51897,9 @@ catalog: value: SI-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses responsibilities;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-5 name: assessment-objective props: @@ -47024,6 +51907,9 @@ catalog: value: SI-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses management commitment;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-6 name: assessment-objective props: @@ -47031,6 +51917,9 @@ catalog: value: SI-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses coordination among organizational entities;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-7 name: assessment-objective props: @@ -47038,6 +51927,12 @@ catalog: value: SI-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses compliance;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.b name: assessment-objective props: @@ -47045,6 +51940,15 @@ catalog: value: SI-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#si-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#si-1_smt.a.1' + rel: assessment-for + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.b name: assessment-objective props: @@ -47052,6 +51956,9 @@ catalog: value: SI-01b. class: sp800-53a prose: 'the {{ insert: param, si-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the system and information integrity policy and procedures;' + links: + - href: '#si-1_smt.b' + rel: assessment-for - id: si-1_obj.c name: assessment-objective props: @@ -47073,6 +51980,9 @@ catalog: value: SI-01c.01[01] class: sp800-53a prose: 'the current system and information integrity policy is reviewed and updated {{ insert: param, si-01_odp.05 }};' + links: + - href: '#si-1_smt.c.1' + rel: assessment-for - id: si-1_obj.c.1-2 name: assessment-objective props: @@ -47080,6 +51990,12 @@ catalog: value: SI-01c.01[02] class: sp800-53a prose: 'the current system and information integrity policy is reviewed and updated following {{ insert: param, si-01_odp.06 }};' + links: + - href: '#si-1_smt.c.1' + rel: assessment-for + links: + - href: '#si-1_smt.c.1' + rel: assessment-for - id: si-1_obj.c.2 name: assessment-objective props: @@ -47094,6 +52010,9 @@ catalog: value: SI-01c.02[01] class: sp800-53a prose: 'the current system and information integrity procedures are reviewed and updated {{ insert: param, si-01_odp.07 }};' + links: + - href: '#si-1_smt.c.2' + rel: assessment-for - id: si-1_obj.c.2-2 name: assessment-objective props: @@ -47101,6 +52020,18 @@ catalog: value: SI-01c.02[02] class: sp800-53a prose: 'the current system and information integrity procedures are reviewed and updated following {{ insert: param, si-01_odp.08 }}.' + links: + - href: '#si-1_smt.c.2' + rel: assessment-for + links: + - href: '#si-1_smt.c.2' + rel: assessment-for + links: + - href: '#si-1_smt.c' + rel: assessment-for + links: + - href: '#si-1_smt' + rel: assessment-for - id: si-1_asm-examine name: assessment-method props: @@ -47262,6 +52193,9 @@ catalog: value: SI-02a.[01] class: sp800-53a prose: system flaws are identified; + links: + - href: '#si-2_smt.a' + rel: assessment-for - id: si-2_obj.a-2 name: assessment-objective props: @@ -47269,6 +52203,9 @@ catalog: value: SI-02a.[02] class: sp800-53a prose: system flaws are reported; + links: + - href: '#si-2_smt.a' + rel: assessment-for - id: si-2_obj.a-3 name: assessment-objective props: @@ -47276,6 +52213,12 @@ catalog: value: SI-02a.[03] class: sp800-53a prose: system flaws are corrected; + links: + - href: '#si-2_smt.a' + rel: assessment-for + links: + - href: '#si-2_smt.a' + rel: assessment-for - id: si-2_obj.b name: assessment-objective props: @@ -47290,6 +52233,9 @@ catalog: value: SI-02b.[01] class: sp800-53a prose: software updates related to flaw remediation are tested for effectiveness before installation; + links: + - href: '#si-2_smt.b' + rel: assessment-for - id: si-2_obj.b-2 name: assessment-objective props: @@ -47297,6 +52243,9 @@ catalog: value: SI-02b.[02] class: sp800-53a prose: software updates related to flaw remediation are tested for potential side effects before installation; + links: + - href: '#si-2_smt.b' + rel: assessment-for - id: si-2_obj.b-3 name: assessment-objective props: @@ -47304,6 +52253,9 @@ catalog: value: SI-02b.[03] class: sp800-53a prose: firmware updates related to flaw remediation are tested for effectiveness before installation; + links: + - href: '#si-2_smt.b' + rel: assessment-for - id: si-2_obj.b-4 name: assessment-objective props: @@ -47311,6 +52263,12 @@ catalog: value: SI-02b.[04] class: sp800-53a prose: firmware updates related to flaw remediation are tested for potential side effects before installation; + links: + - href: '#si-2_smt.b' + rel: assessment-for + links: + - href: '#si-2_smt.b' + rel: assessment-for - id: si-2_obj.c name: assessment-objective props: @@ -47325,6 +52283,9 @@ catalog: value: SI-02c.[01] class: sp800-53a prose: 'security-relevant software updates are installed within {{ insert: param, si-02_odp }} of the release of the updates;' + links: + - href: '#si-2_smt.c' + rel: assessment-for - id: si-2_obj.c-2 name: assessment-objective props: @@ -47332,6 +52293,12 @@ catalog: value: SI-02c.[02] class: sp800-53a prose: 'security-relevant firmware updates are installed within {{ insert: param, si-02_odp }} of the release of the updates;' + links: + - href: '#si-2_smt.c' + rel: assessment-for + links: + - href: '#si-2_smt.c' + rel: assessment-for - id: si-2_obj.d name: assessment-objective props: @@ -47339,6 +52306,12 @@ catalog: value: SI-02d. class: sp800-53a prose: flaw remediation is incorporated into the organizational configuration management process. + links: + - href: '#si-2_smt.d' + rel: assessment-for + links: + - href: '#si-2_smt' + rel: assessment-for - id: si-2_asm-examine name: assessment-method props: @@ -47469,6 +52442,9 @@ catalog: value: SI-02(02) class: sp800-53a prose: 'system components have applicable security-relevant software and firmware updates installed {{ insert: param, si-02.02_odp.02 }} using {{ insert: param, si-02.02_odp.01 }}.' + links: + - href: '#si-2.2_smt' + rel: assessment-for - id: si-2.2_asm-examine name: assessment-method props: @@ -47729,6 +52705,9 @@ catalog: value: SI-03a.[01] class: sp800-53a prose: ' {{ insert: param, si-03_odp.01 }} malicious code protection mechanisms are implemented at system entry and exit points to detect malicious code;' + links: + - href: '#si-3_smt.a' + rel: assessment-for - id: si-3_obj.a-2 name: assessment-objective props: @@ -47736,6 +52715,12 @@ catalog: value: SI-03a.[02] class: sp800-53a prose: ' {{ insert: param, si-03_odp.01 }} malicious code protection mechanisms are implemented at system entry and exit points to eradicate malicious code;' + links: + - href: '#si-3_smt.a' + rel: assessment-for + links: + - href: '#si-3_smt.a' + rel: assessment-for - id: si-3_obj.b name: assessment-objective props: @@ -47743,6 +52728,9 @@ catalog: value: SI-03b. class: sp800-53a prose: malicious code protection mechanisms are updated automatically as new releases are available in accordance with organizational configuration management policy and procedures; + links: + - href: '#si-3_smt.b' + rel: assessment-for - id: si-3_obj.c name: assessment-objective props: @@ -47764,6 +52752,9 @@ catalog: value: SI-03c.01[01] class: sp800-53a prose: 'malicious code protection mechanisms are configured to perform periodic scans of the system {{ insert: param, si-03_odp.02 }};' + links: + - href: '#si-3_smt.c.1' + rel: assessment-for - id: si-3_obj.c.1-2 name: assessment-objective props: @@ -47771,6 +52762,12 @@ catalog: value: SI-03c.01[02] class: sp800-53a prose: 'malicious code protection mechanisms are configured to perform real-time scans of files from external sources at {{ insert: param, si-03_odp.03 }} as the files are downloaded, opened, or executed in accordance with organizational policy;' + links: + - href: '#si-3_smt.c.1' + rel: assessment-for + links: + - href: '#si-3_smt.c.1' + rel: assessment-for - id: si-3_obj.c.2 name: assessment-objective props: @@ -47785,6 +52782,9 @@ catalog: value: SI-03c.02[01] class: sp800-53a prose: 'malicious code protection mechanisms are configured to {{ insert: param, si-03_odp.04 }} in response to malicious code detection;' + links: + - href: '#si-3_smt.c.2' + rel: assessment-for - id: si-3_obj.c.2-2 name: assessment-objective props: @@ -47792,6 +52792,15 @@ catalog: value: SI-03c.02[02] class: sp800-53a prose: 'malicious code protection mechanisms are configured to send alerts to {{ insert: param, si-03_odp.06 }} in response to malicious code detection;' + links: + - href: '#si-3_smt.c.2' + rel: assessment-for + links: + - href: '#si-3_smt.c.2' + rel: assessment-for + links: + - href: '#si-3_smt.c' + rel: assessment-for - id: si-3_obj.d name: assessment-objective props: @@ -47799,6 +52808,12 @@ catalog: value: SI-03d. class: sp800-53a prose: the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the system are addressed. + links: + - href: '#si-3_smt.d' + rel: assessment-for + links: + - href: '#si-3_smt' + rel: assessment-for - id: si-3_asm-examine name: assessment-method props: @@ -48151,6 +53166,9 @@ catalog: value: SI-04a.01 class: sp800-53a prose: 'the system is monitored to detect attacks and indicators of potential attacks in accordance with {{ insert: param, si-04_odp.01 }};' + links: + - href: '#si-4_smt.a.1' + rel: assessment-for - id: si-4_obj.a.2 name: assessment-objective props: @@ -48165,6 +53183,9 @@ catalog: value: SI-04a.02[01] class: sp800-53a prose: the system is monitored to detect unauthorized local connections; + links: + - href: '#si-4_smt.a.2' + rel: assessment-for - id: si-4_obj.a.2-2 name: assessment-objective props: @@ -48172,6 +53193,9 @@ catalog: value: SI-04a.02[02] class: sp800-53a prose: the system is monitored to detect unauthorized network connections; + links: + - href: '#si-4_smt.a.2' + rel: assessment-for - id: si-4_obj.a.2-3 name: assessment-objective props: @@ -48179,6 +53203,15 @@ catalog: value: SI-04a.02[03] class: sp800-53a prose: the system is monitored to detect unauthorized remote connections; + links: + - href: '#si-4_smt.a.2' + rel: assessment-for + links: + - href: '#si-4_smt.a.2' + rel: assessment-for + links: + - href: '#si-4_smt.a' + rel: assessment-for - id: si-4_obj.b name: assessment-objective props: @@ -48186,6 +53219,9 @@ catalog: value: SI-04b. class: sp800-53a prose: 'unauthorized use of the system is identified through {{ insert: param, si-04_odp.02 }};' + links: + - href: '#si-4_smt.b' + rel: assessment-for - id: si-4_obj.c name: assessment-objective props: @@ -48200,6 +53236,9 @@ catalog: value: SI-04c.01 class: sp800-53a prose: internal monitoring capabilities are invoked or monitoring devices are deployed strategically within the system to collect organization-determined essential information; + links: + - href: '#si-4_smt.c.1' + rel: assessment-for - id: si-4_obj.c.2 name: assessment-objective props: @@ -48207,6 +53246,12 @@ catalog: value: SI-04c.02 class: sp800-53a prose: internal monitoring capabilities are invoked or monitoring devices are deployed at ad hoc locations within the system to track specific types of transactions of interest to the organization; + links: + - href: '#si-4_smt.c.2' + rel: assessment-for + links: + - href: '#si-4_smt.c' + rel: assessment-for - id: si-4_obj.d name: assessment-objective props: @@ -48221,6 +53266,9 @@ catalog: value: SI-04d.[01] class: sp800-53a prose: detected events are analyzed; + links: + - href: '#si-4_smt.d' + rel: assessment-for - id: si-4_obj.d-2 name: assessment-objective props: @@ -48228,6 +53276,12 @@ catalog: value: SI-04d.[02] class: sp800-53a prose: detected anomalies are analyzed; + links: + - href: '#si-4_smt.d' + rel: assessment-for + links: + - href: '#si-4_smt.d' + rel: assessment-for - id: si-4_obj.e name: assessment-objective props: @@ -48235,6 +53289,9 @@ catalog: value: SI-04e. class: sp800-53a prose: the level of system monitoring activity is adjusted when there is a change in risk to organizational operations and assets, individuals, other organizations, or the Nation; + links: + - href: '#si-4_smt.e' + rel: assessment-for - id: si-4_obj.f name: assessment-objective props: @@ -48242,6 +53299,9 @@ catalog: value: SI-04f. class: sp800-53a prose: a legal opinion regarding system monitoring activities is obtained; + links: + - href: '#si-4_smt.f' + rel: assessment-for - id: si-4_obj.g name: assessment-objective props: @@ -48249,6 +53309,12 @@ catalog: value: SI-04g. class: sp800-53a prose: ' {{ insert: param, si-04_odp.03 }} is provided to {{ insert: param, si-04_odp.04 }} {{ insert: param, si-04_odp.05 }}.' + links: + - href: '#si-4_smt.g' + rel: assessment-for + links: + - href: '#si-4_smt' + rel: assessment-for - id: si-4_asm-examine name: assessment-method props: @@ -48355,6 +53421,9 @@ catalog: value: SI-04(02) class: sp800-53a prose: automated tools and mechanisms are employed to support a near real-time analysis of events. + links: + - href: '#si-4.2_smt' + rel: assessment-for - id: si-4.2_asm-examine name: assessment-method props: @@ -48543,6 +53612,9 @@ catalog: value: SI-04(04)(a)[01] class: sp800-53a prose: criteria for unusual or unauthorized activities or conditions for inbound communications traffic are defined; + links: + - href: '#si-4.4_smt.a' + rel: assessment-for - id: si-4.4_obj.a-2 name: assessment-objective props: @@ -48550,6 +53622,12 @@ catalog: value: SI-04(04)(a)[02] class: sp800-53a prose: criteria for unusual or unauthorized activities or conditions for outbound communications traffic are defined; + links: + - href: '#si-4.4_smt.a' + rel: assessment-for + links: + - href: '#si-4.4_smt.a' + rel: assessment-for - id: si-4.4_obj.b name: assessment-objective props: @@ -48564,6 +53642,9 @@ catalog: value: SI-04(04)(b)[01] class: sp800-53a prose: 'inbound communications traffic is monitored {{ insert: param, si-04.04_odp.01 }} for {{ insert: param, si-04.04_odp.02 }};' + links: + - href: '#si-4.4_smt.b' + rel: assessment-for - id: si-4.4_obj.b-2 name: assessment-objective props: @@ -48571,6 +53652,15 @@ catalog: value: SI-04(04)(b)[02] class: sp800-53a prose: 'outbound communications traffic is monitored {{ insert: param, si-04.04_odp.03 }} for {{ insert: param, si-04.04_odp.04 }}.' + links: + - href: '#si-4.4_smt.b' + rel: assessment-for + links: + - href: '#si-4.4_smt.b' + rel: assessment-for + links: + - href: '#si-4.4_smt' + rel: assessment-for - id: si-4.4_asm-examine name: assessment-method props: @@ -48701,6 +53791,9 @@ catalog: value: SI-04(05) class: sp800-53a prose: ' {{ insert: param, si-04.05_odp.01 }} are alerted when system-generated {{ insert: param, si-04.05_odp.02 }} occur.' + links: + - href: '#si-4.5_smt' + rel: assessment-for - id: si-4.5_asm-examine name: assessment-method props: @@ -48904,6 +53997,9 @@ catalog: value: SI-05a. class: sp800-53a prose: 'system security alerts, advisories, and directives are received from {{ insert: param, si-05_odp.01 }} on an ongoing basis;' + links: + - href: '#si-5_smt.a' + rel: assessment-for - id: si-5_obj.b name: assessment-objective props: @@ -48911,6 +54007,9 @@ catalog: value: SI-05b. class: sp800-53a prose: internal security alerts, advisories, and directives are generated as deemed necessary; + links: + - href: '#si-5_smt.b' + rel: assessment-for - id: si-5_obj.c name: assessment-objective props: @@ -48918,6 +54017,9 @@ catalog: value: SI-05c. class: sp800-53a prose: 'security alerts, advisories, and directives are disseminated to {{ insert: param, si-05_odp.02 }};' + links: + - href: '#si-5_smt.c' + rel: assessment-for - id: si-5_obj.d name: assessment-objective props: @@ -48925,6 +54027,12 @@ catalog: value: SI-05d. class: sp800-53a prose: security directives are implemented in accordance with established time frames or if the issuing organization is notified of the degree of noncompliance. + links: + - href: '#si-5_smt.d' + rel: assessment-for + links: + - href: '#si-5_smt' + rel: assessment-for - id: si-5_asm-examine name: assessment-method props: @@ -49180,6 +54288,9 @@ catalog: value: SI-07a.[01] class: sp800-53a prose: 'integrity verification tools are employed to detect unauthorized changes to {{ insert: param, si-07_odp.01 }};' + links: + - href: '#si-7_smt.a' + rel: assessment-for - id: si-7_obj.a-2 name: assessment-objective props: @@ -49187,6 +54298,9 @@ catalog: value: SI-07a.[02] class: sp800-53a prose: 'integrity verification tools are employed to detect unauthorized changes to {{ insert: param, si-07_odp.02 }};' + links: + - href: '#si-7_smt.a' + rel: assessment-for - id: si-7_obj.a-3 name: assessment-objective props: @@ -49194,6 +54308,12 @@ catalog: value: SI-07a.[03] class: sp800-53a prose: 'integrity verification tools are employed to detect unauthorized changes to {{ insert: param, si-07_odp.03 }};' + links: + - href: '#si-7_smt.a' + rel: assessment-for + links: + - href: '#si-7_smt.a' + rel: assessment-for - id: si-7_obj.b name: assessment-objective props: @@ -49208,6 +54328,9 @@ catalog: value: SI-07b.[01] class: sp800-53a prose: ' {{ insert: param, si-07_odp.04 }} are taken when unauthorized changes to the software, are detected;' + links: + - href: '#si-7_smt.b' + rel: assessment-for - id: si-7_obj.b-2 name: assessment-objective props: @@ -49215,6 +54338,9 @@ catalog: value: SI-07b.[02] class: sp800-53a prose: ' {{ insert: param, si-07_odp.05 }} are taken when unauthorized changes to the firmware are detected;' + links: + - href: '#si-7_smt.b' + rel: assessment-for - id: si-7_obj.b-3 name: assessment-objective props: @@ -49222,6 +54348,15 @@ catalog: value: SI-07b.[03] class: sp800-53a prose: ' {{ insert: param, si-07_odp.06 }} are taken when unauthorized changes to the information are detected.' + links: + - href: '#si-7_smt.b' + rel: assessment-for + links: + - href: '#si-7_smt.b' + rel: assessment-for + links: + - href: '#si-7_smt' + rel: assessment-for - id: si-7_asm-examine name: assessment-method props: @@ -49487,6 +54622,9 @@ catalog: value: SI-07(01)[01] class: sp800-53a prose: 'an integrity check of {{ insert: param, si-07.01_odp.01 }} is performed {{ insert: param, si-07.01_odp.02 }};' + links: + - href: '#si-7.1_smt' + rel: assessment-for - id: si-7.1_obj-2 name: assessment-objective props: @@ -49494,6 +54632,9 @@ catalog: value: SI-07(01)[02] class: sp800-53a prose: 'an integrity check of {{ insert: param, si-07.01_odp.05 }} is performed {{ insert: param, si-07.01_odp.06 }};' + links: + - href: '#si-7.1_smt' + rel: assessment-for - id: si-7.1_obj-3 name: assessment-objective props: @@ -49501,6 +54642,12 @@ catalog: value: SI-07(01)[03] class: sp800-53a prose: 'an integrity check of {{ insert: param, si-07.01_odp.09 }} is performed {{ insert: param, si-07.01_odp.10 }}.' + links: + - href: '#si-7.1_smt' + rel: assessment-for + links: + - href: '#si-7.1_smt' + rel: assessment-for - id: si-7.1_asm-examine name: assessment-method props: @@ -49619,6 +54766,9 @@ catalog: value: SI-07(07) class: sp800-53a prose: 'the detection of {{ insert: param, si-07.07_odp }} are incorporated into the organizational incident response capability.' + links: + - href: '#si-7.7_smt' + rel: assessment-for - id: si-7.7_asm-examine name: assessment-method props: @@ -49755,6 +54905,9 @@ catalog: value: SI-08a.[01] class: sp800-53a prose: spam protection mechanisms are employed at system entry points to detect unsolicited messages; + links: + - href: '#si-8_smt.a' + rel: assessment-for - id: si-8_obj.a-2 name: assessment-objective props: @@ -49762,6 +54915,9 @@ catalog: value: SI-08a.[02] class: sp800-53a prose: spam protection mechanisms are employed at system exit points to detect unsolicited messages; + links: + - href: '#si-8_smt.a' + rel: assessment-for - id: si-8_obj.a-3 name: assessment-objective props: @@ -49769,6 +54925,9 @@ catalog: value: SI-08a.[03] class: sp800-53a prose: spam protection mechanisms are employed at system entry points to act on unsolicited messages; + links: + - href: '#si-8_smt.a' + rel: assessment-for - id: si-8_obj.a-4 name: assessment-objective props: @@ -49776,6 +54935,12 @@ catalog: value: SI-08a.[04] class: sp800-53a prose: spam protection mechanisms are employed at system exit points to act on unsolicited messages; + links: + - href: '#si-8_smt.a' + rel: assessment-for + links: + - href: '#si-8_smt.a' + rel: assessment-for - id: si-8_obj.b name: assessment-objective props: @@ -49783,6 +54948,12 @@ catalog: value: SI-08b. class: sp800-53a prose: spam protection mechanisms are updated when new releases are available in accordance with organizational configuration management policies and procedures. + links: + - href: '#si-8_smt.b' + rel: assessment-for + links: + - href: '#si-8_smt' + rel: assessment-for - id: si-8_asm-examine name: assessment-method props: @@ -49893,6 +55064,9 @@ catalog: value: SI-08(02) class: sp800-53a prose: 'spam protection mechanisms are automatically updated {{ insert: param, si-08.02_odp }}.' + links: + - href: '#si-8.2_smt' + rel: assessment-for - id: si-8.2_asm-examine name: assessment-method props: @@ -50008,6 +55182,9 @@ catalog: value: SI-10 class: sp800-53a prose: 'the validity of the {{ insert: param, si-10_odp }} is checked.' + links: + - href: '#si-10_smt' + rel: assessment-for - id: si-10_asm-examine name: assessment-method props: @@ -50143,6 +55320,9 @@ catalog: value: SI-11a. class: sp800-53a prose: error messages that provide the information necessary for corrective actions are generated without revealing information that could be exploited; + links: + - href: '#si-11_smt.a' + rel: assessment-for - id: si-11_obj.b name: assessment-objective props: @@ -50150,6 +55330,12 @@ catalog: value: SI-11b. class: sp800-53a prose: 'error messages are revealed only to {{ insert: param, si-11_odp }}.' + links: + - href: '#si-11_smt.b' + rel: assessment-for + links: + - href: '#si-11_smt' + rel: assessment-for - id: si-11_asm-examine name: assessment-method props: @@ -50317,6 +55503,9 @@ catalog: value: SI-12[01] class: sp800-53a prose: information within the system is managed in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, guidelines, and operational requirements; + links: + - href: '#si-12_smt' + rel: assessment-for - id: si-12_obj-2 name: assessment-objective props: @@ -50324,6 +55513,9 @@ catalog: value: SI-12[02] class: sp800-53a prose: information within the system is retained in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, guidelines, and operational requirements; + links: + - href: '#si-12_smt' + rel: assessment-for - id: si-12_obj-3 name: assessment-objective props: @@ -50331,6 +55523,9 @@ catalog: value: SI-12[03] class: sp800-53a prose: information output from the system is managed in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, guidelines, and operational requirements; + links: + - href: '#si-12_smt' + rel: assessment-for - id: si-12_obj-4 name: assessment-objective props: @@ -50338,6 +55533,12 @@ catalog: value: SI-12[04] class: sp800-53a prose: information output from the system is retained in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, guidelines, and operational requirements. + links: + - href: '#si-12_smt' + rel: assessment-for + links: + - href: '#si-12_smt' + rel: assessment-for - id: si-12_asm-examine name: assessment-method props: @@ -50462,6 +55663,9 @@ catalog: value: SI-16 class: sp800-53a prose: ' {{ insert: param, si-16_odp }} are implemented to protect the system memory from unauthorized code execution.' + links: + - href: '#si-16_smt' + rel: assessment-for - id: si-16_asm-examine name: assessment-method props: @@ -50744,6 +55948,9 @@ catalog: value: SR-01a.[01] class: sp800-53a prose: a supply chain risk management policy is developed and documented; + links: + - href: '#sr-1_smt.a' + rel: assessment-for - id: sr-1_obj.a-2 name: assessment-objective props: @@ -50751,6 +55958,9 @@ catalog: value: SR-01a.[02] class: sp800-53a prose: 'the supply chain risk management policy is disseminated to {{ insert: param, sr-01_odp.01 }};' + links: + - href: '#sr-1_smt.a' + rel: assessment-for - id: sr-1_obj.a-3 name: assessment-objective props: @@ -50758,6 +55968,9 @@ catalog: value: SR-01a.[03] class: sp800-53a prose: supply chain risk management procedures to facilitate the implementation of the supply chain risk management policy and the associated supply chain risk management controls are developed and documented; + links: + - href: '#sr-1_smt.a' + rel: assessment-for - id: sr-1_obj.a-4 name: assessment-objective props: @@ -50765,6 +55978,9 @@ catalog: value: SR-01a.[04] class: sp800-53a prose: 'the supply chain risk management procedures are disseminated to {{ insert: param, sr-01_odp.02 }}.' + links: + - href: '#sr-1_smt.a' + rel: assessment-for - id: sr-1_obj.a.1 name: assessment-objective props: @@ -50786,6 +56002,9 @@ catalog: value: SR-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses purpose;' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-2 name: assessment-objective props: @@ -50793,6 +56012,9 @@ catalog: value: SR-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses scope; ' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-3 name: assessment-objective props: @@ -50800,6 +56022,9 @@ catalog: value: SR-01a.01(a)[03] class: sp800-53a prose: ' {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses roles;' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-4 name: assessment-objective props: @@ -50807,6 +56032,9 @@ catalog: value: SR-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses responsibilities;' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-5 name: assessment-objective props: @@ -50814,6 +56042,9 @@ catalog: value: SR-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses management commitment;' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-6 name: assessment-objective props: @@ -50821,6 +56052,9 @@ catalog: value: SR-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses coordination among organizational entities;' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-7 name: assessment-objective props: @@ -50828,6 +56062,12 @@ catalog: value: SR-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses compliance.' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.b name: assessment-objective props: @@ -50835,6 +56075,15 @@ catalog: value: SR-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#sr-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#sr-1_smt.a.1' + rel: assessment-for + links: + - href: '#sr-1_smt.a' + rel: assessment-for - id: sr-1_obj.b name: assessment-objective props: @@ -50842,6 +56091,9 @@ catalog: value: SR-01b. class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the supply chain risk management policy and procedures;' + links: + - href: '#sr-1_smt.b' + rel: assessment-for - id: sr-1_obj.c name: assessment-objective props: @@ -50863,6 +56115,9 @@ catalog: value: SR-01c.01[01] class: sp800-53a prose: 'the current supply chain risk management policy is reviewed and updated {{ insert: param, sr-01_odp.05 }};' + links: + - href: '#sr-1_smt.c.1' + rel: assessment-for - id: sr-1_obj.c.1-2 name: assessment-objective props: @@ -50870,6 +56125,12 @@ catalog: value: SR-01c.01[02] class: sp800-53a prose: 'the current supply chain risk management policy is reviewed and updated following {{ insert: param, sr-01_odp.06 }};' + links: + - href: '#sr-1_smt.c.1' + rel: assessment-for + links: + - href: '#sr-1_smt.c.1' + rel: assessment-for - id: sr-1_obj.c.2 name: assessment-objective props: @@ -50884,6 +56145,9 @@ catalog: value: SR-01c.02[01] class: sp800-53a prose: 'the current supply chain risk management procedures are reviewed and updated {{ insert: param, sr-01_odp.07 }};' + links: + - href: '#sr-1_smt.c.2' + rel: assessment-for - id: sr-1_obj.c.2-2 name: assessment-objective props: @@ -50891,6 +56155,18 @@ catalog: value: SR-01c.02[02] class: sp800-53a prose: 'the current supply chain risk management procedures are reviewed and updated following {{ insert: param, sr-01_odp.08 }}.' + links: + - href: '#sr-1_smt.c.2' + rel: assessment-for + links: + - href: '#sr-1_smt.c.2' + rel: assessment-for + links: + - href: '#sr-1_smt.c' + rel: assessment-for + links: + - href: '#sr-1_smt' + rel: assessment-for - id: sr-1_asm-examine name: assessment-method props: @@ -51067,6 +56343,9 @@ catalog: value: SR-02a.[01] class: sp800-53a prose: a plan for managing supply chain risks is developed; + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-2 name: assessment-objective props: @@ -51074,6 +56353,9 @@ catalog: value: SR-02a.[02] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the research and development of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-3 name: assessment-objective props: @@ -51081,6 +56363,9 @@ catalog: value: SR-02a.[03] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the design of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-4 name: assessment-objective props: @@ -51088,6 +56373,9 @@ catalog: value: SR-02a.[04] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the manufacturing of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-5 name: assessment-objective props: @@ -51095,6 +56383,9 @@ catalog: value: SR-02a.[05] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the acquisition of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-6 name: assessment-objective props: @@ -51102,6 +56393,9 @@ catalog: value: SR-02a.[06] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the delivery of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-7 name: assessment-objective props: @@ -51109,6 +56403,9 @@ catalog: value: SR-02a.[07] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the integration of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-8 name: assessment-objective props: @@ -51116,6 +56413,9 @@ catalog: value: SR-02a.[08] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the operation and maintenance of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-9 name: assessment-objective props: @@ -51123,6 +56423,12 @@ catalog: value: SR-02a.[09] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the disposal of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.b name: assessment-objective props: @@ -51130,6 +56436,9 @@ catalog: value: SR-02b. class: sp800-53a prose: 'the supply chain risk management plan is reviewed and updated {{ insert: param, sr-02_odp.02 }} or as required to address threat, organizational, or environmental changes;' + links: + - href: '#sr-2_smt.b' + rel: assessment-for - id: sr-2_obj.c name: assessment-objective props: @@ -51144,6 +56453,9 @@ catalog: value: SR-02c.[01] class: sp800-53a prose: the supply chain risk management plan is protected from unauthorized disclosure; + links: + - href: '#sr-2_smt.c' + rel: assessment-for - id: sr-2_obj.c-2 name: assessment-objective props: @@ -51151,6 +56463,15 @@ catalog: value: SR-02c.[02] class: sp800-53a prose: the supply chain risk management plan is protected from unauthorized modification. + links: + - href: '#sr-2_smt.c' + rel: assessment-for + links: + - href: '#sr-2_smt.c' + rel: assessment-for + links: + - href: '#sr-2_smt' + rel: assessment-for - id: sr-2_asm-examine name: assessment-method props: @@ -51297,6 +56618,9 @@ catalog: value: SR-02(01) class: sp800-53a prose: 'a supply chain risk management team consisting of {{ insert: param, sr-02.01_odp.01 }} is established to lead and support {{ insert: param, sr-02.01_odp.02 }}.' + links: + - href: '#sr-2.1_smt' + rel: assessment-for - id: sr-2.1_asm-examine name: assessment-method props: @@ -51530,6 +56854,9 @@ catalog: value: SR-03a.[01] class: sp800-53a prose: 'a process or processes is/are established to identify and address weaknesses or deficiencies in the supply chain elements and processes of {{ insert: param, sr-03_odp.01 }};' + links: + - href: '#sr-3_smt.a' + rel: assessment-for - id: sr-3_obj.a-2 name: assessment-objective props: @@ -51537,6 +56864,12 @@ catalog: value: SR-03a.[02] class: sp800-53a prose: 'the process or processes to identify and address weaknesses or deficiencies in the supply chain elements and processes of {{ insert: param, sr-03_odp.01 }} is/are coordinated with {{ insert: param, sr-03_odp.02 }};' + links: + - href: '#sr-3_smt.a' + rel: assessment-for + links: + - href: '#sr-3_smt.a' + rel: assessment-for - id: sr-3_obj.b name: assessment-objective props: @@ -51544,6 +56877,9 @@ catalog: value: SR-03b. class: sp800-53a prose: ' {{ insert: param, sr-03_odp.03 }} are employed to protect against supply chain risks to the system, system component, or system service and to limit the harm or consequences from supply chain-related events;' + links: + - href: '#sr-3_smt.b' + rel: assessment-for - id: sr-3_obj.c name: assessment-objective props: @@ -51551,6 +56887,12 @@ catalog: value: SR-03c. class: sp800-53a prose: 'the selected and implemented supply chain processes and controls are documented in {{ insert: param, sr-03_odp.04 }}.' + links: + - href: '#sr-3_smt.c' + rel: assessment-for + links: + - href: '#sr-3_smt' + rel: assessment-for - id: sr-3_asm-examine name: assessment-method props: @@ -51720,6 +57062,9 @@ catalog: value: SR-05[01] class: sp800-53a prose: ' {{ insert: param, sr-05_odp }} are employed to protect against supply chain risks;' + links: + - href: '#sr-5_smt' + rel: assessment-for - id: sr-5_obj-2 name: assessment-objective props: @@ -51727,6 +57072,9 @@ catalog: value: SR-05[02] class: sp800-53a prose: ' {{ insert: param, sr-05_odp }} are employed to identify supply chain risks;' + links: + - href: '#sr-5_smt' + rel: assessment-for - id: sr-5_obj-3 name: assessment-objective props: @@ -51734,6 +57082,12 @@ catalog: value: SR-05[03] class: sp800-53a prose: ' {{ insert: param, sr-05_odp }} are employed to mitigate supply chain risks.' + links: + - href: '#sr-5_smt' + rel: assessment-for + links: + - href: '#sr-5_smt' + rel: assessment-for - id: sr-5_asm-examine name: assessment-method props: @@ -51880,6 +57234,9 @@ catalog: value: SR-06 class: sp800-53a prose: 'the supply chain-related risks associated with suppliers or contractors and the systems, system components, or system services they provide are assessed and reviewed {{ insert: param, sr-06_odp }}.' + links: + - href: '#sr-6_smt' + rel: assessment-for - id: sr-6_asm-examine name: assessment-method props: @@ -52019,6 +57376,9 @@ catalog: value: SR-08 class: sp800-53a prose: 'agreements and procedures are established with entities involved in the supply chain for the system, system components, or system service for {{ insert: param, sr-08_odp.01 }}.' + links: + - href: '#sr-8_smt' + rel: assessment-for - id: sr-8_asm-examine name: assessment-method props: @@ -52175,6 +57535,9 @@ catalog: value: SR-10 class: sp800-53a prose: ' {{ insert: param, sr-10_odp.01 }} are inspected {{ insert: param, sr-10_odp.02 }} to detect tampering.' + links: + - href: '#sr-10_smt' + rel: assessment-for - id: sr-10_asm-examine name: assessment-method props: @@ -52346,6 +57709,9 @@ catalog: value: SR-11a.[01] class: sp800-53a prose: an anti-counterfeit policy is developed and implemented; + links: + - href: '#sr-11_smt.a' + rel: assessment-for - id: sr-11_obj.a-2 name: assessment-objective props: @@ -52353,6 +57719,9 @@ catalog: value: SR-11a.[02] class: sp800-53a prose: anti-counterfeit procedures are developed and implemented; + links: + - href: '#sr-11_smt.a' + rel: assessment-for - id: sr-11_obj.a-3 name: assessment-objective props: @@ -52360,6 +57729,9 @@ catalog: value: SR-11a.[03] class: sp800-53a prose: the anti-counterfeit procedures include the means to detect counterfeit components entering the system; + links: + - href: '#sr-11_smt.a' + rel: assessment-for - id: sr-11_obj.a-4 name: assessment-objective props: @@ -52367,6 +57739,12 @@ catalog: value: SR-11a.[04] class: sp800-53a prose: the anti-counterfeit procedures include the means to prevent counterfeit components from entering the system; + links: + - href: '#sr-11_smt.a' + rel: assessment-for + links: + - href: '#sr-11_smt.a' + rel: assessment-for - id: sr-11_obj.b name: assessment-objective props: @@ -52374,6 +57752,12 @@ catalog: value: SR-11b. class: sp800-53a prose: 'counterfeit system components are reported to {{ insert: param, sr-11_odp.01 }}.' + links: + - href: '#sr-11_smt.b' + rel: assessment-for + links: + - href: '#sr-11_smt' + rel: assessment-for - id: sr-11_asm-examine name: assessment-method props: @@ -52499,6 +57883,9 @@ catalog: value: SR-11(01) class: sp800-53a prose: ' {{ insert: param, sr-11.01_odp }} are trained to detect counterfeit system components (including hardware, software, and firmware).' + links: + - href: '#sr-11.1_smt' + rel: assessment-for - id: sr-11.1_asm-examine name: assessment-method props: @@ -52623,6 +58010,9 @@ catalog: value: SR-11(02)[01] class: sp800-53a prose: 'configuration control over {{ insert: param, sr-11.02_odp }} awaiting service or repair is maintained;' + links: + - href: '#sr-11.2_smt' + rel: assessment-for - id: sr-11.2_obj-2 name: assessment-objective props: @@ -52630,6 +58020,12 @@ catalog: value: SR-11(02)[02] class: sp800-53a prose: 'configuration control over serviced or repaired {{ insert: param, sr-11.02_odp }} awaiting return to service is maintained.' + links: + - href: '#sr-11.2_smt' + rel: assessment-for + links: + - href: '#sr-11.2_smt' + rel: assessment-for - id: sr-11.2_asm-examine name: assessment-method props: @@ -52746,6 +58142,9 @@ catalog: value: SR-12 class: sp800-53a prose: ' {{ insert: param, sr-12_odp.01 }} are disposed of using {{ insert: param, sr-12_odp.02 }}.' + links: + - href: '#sr-12_smt' + rel: assessment-for - id: sr-12_asm-examine name: assessment-method props: diff --git a/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_MODERATE-baseline_profile.yaml b/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_MODERATE-baseline_profile.yaml index 5cf517fb..0fcdb4c3 100644 --- a/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_MODERATE-baseline_profile.yaml +++ b/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_MODERATE-baseline_profile.yaml @@ -1,9 +1,9 @@ profile: - uuid: 1019f424-1556-4aa3-9df3-337b97c2c856 + uuid: 49f45a95-20d1-450a-b4a5-c27ecc335a26 metadata: - title: NIST Special Publication 800-53 Revision 5 MODERATE IMPACT BASELINE - last-modified: "2023-10-12T00:00:00.000000-04:00" - version: Final + title: NIST Special Publication 800-53 Revision 5.1.1 MODERATE IMPACT BASELINE + last-modified: "2023-12-04T14:55:00.000000-04:00" + version: 5.1.1+u2 oscal-version: 1.1.1 roles: - id: creator diff --git a/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_PRIVACY-baseline-resolved-profile_catalog.yaml b/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_PRIVACY-baseline-resolved-profile_catalog.yaml index 8f99bf6c..23699fcf 100644 --- a/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_PRIVACY-baseline-resolved-profile_catalog.yaml +++ b/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_PRIVACY-baseline-resolved-profile_catalog.yaml @@ -1,9 +1,9 @@ catalog: - uuid: b59abead-41dd-4ba4-818d-b2ce8ca7b80e + uuid: f8f8bd60-df08-46cc-8083-cf001f43ea6a metadata: - title: NIST Special Publication 800-53 Revision 5 PRIVACY BASELINE - last-modified: "2023-11-02T11:49:42.694597-04:00" - version: Final + title: NIST Special Publication 800-53 Revision 5.1.1 PRIVACY BASELINE + last-modified: "2023-12-05T21:54:56.105295Z" + version: 5.1.1+u2 oscal-version: 1.1.1 props: - name: resolution-tool @@ -257,6 +257,9 @@ catalog: value: AC-01a.[01] class: sp800-53a prose: an access control policy is developed and documented; + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.a-2 name: assessment-objective props: @@ -264,6 +267,9 @@ catalog: value: AC-01a.[02] class: sp800-53a prose: 'the access control policy is disseminated to {{ insert: param, ac-01_odp.01 }};' + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.a-3 name: assessment-objective props: @@ -271,6 +277,9 @@ catalog: value: AC-01a.[03] class: sp800-53a prose: access control procedures to facilitate the implementation of the access control policy and associated controls are developed and documented; + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.a-4 name: assessment-objective props: @@ -278,6 +287,9 @@ catalog: value: AC-01a.[04] class: sp800-53a prose: 'the access control procedures are disseminated to {{ insert: param, ac-01_odp.02 }};' + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.a.1 name: assessment-objective props: @@ -299,6 +311,9 @@ catalog: value: AC-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses purpose;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-2 name: assessment-objective props: @@ -306,6 +321,9 @@ catalog: value: AC-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses scope;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-3 name: assessment-objective props: @@ -313,6 +331,9 @@ catalog: value: AC-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses roles;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-4 name: assessment-objective props: @@ -320,6 +341,9 @@ catalog: value: AC-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses responsibilities;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-5 name: assessment-objective props: @@ -327,6 +351,9 @@ catalog: value: AC-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses management commitment;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-6 name: assessment-objective props: @@ -334,6 +361,9 @@ catalog: value: AC-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses coordination among organizational entities;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-7 name: assessment-objective props: @@ -341,6 +371,12 @@ catalog: value: AC-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses compliance;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.b name: assessment-objective props: @@ -348,6 +384,15 @@ catalog: value: AC-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ac-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ac-1_smt.a.1' + rel: assessment-for + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.b name: assessment-objective props: @@ -355,6 +400,9 @@ catalog: value: AC-01b. class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the access control policy and procedures;' + links: + - href: '#ac-1_smt.b' + rel: assessment-for - id: ac-1_obj.c name: assessment-objective props: @@ -376,6 +424,9 @@ catalog: value: AC-01c.01[01] class: sp800-53a prose: 'the current access control policy is reviewed and updated {{ insert: param, ac-01_odp.05 }};' + links: + - href: '#ac-1_smt.c.1' + rel: assessment-for - id: ac-1_obj.c.1-2 name: assessment-objective props: @@ -383,6 +434,12 @@ catalog: value: AC-01c.01[02] class: sp800-53a prose: 'the current access control policy is reviewed and updated following {{ insert: param, ac-01_odp.06 }};' + links: + - href: '#ac-1_smt.c.1' + rel: assessment-for + links: + - href: '#ac-1_smt.c.1' + rel: assessment-for - id: ac-1_obj.c.2 name: assessment-objective props: @@ -397,6 +454,9 @@ catalog: value: AC-01c.02[01] class: sp800-53a prose: 'the current access control procedures are reviewed and updated {{ insert: param, ac-01_odp.07 }};' + links: + - href: '#ac-1_smt.c.2' + rel: assessment-for - id: ac-1_obj.c.2-2 name: assessment-objective props: @@ -404,6 +464,18 @@ catalog: value: AC-01c.02[02] class: sp800-53a prose: 'the current access control procedures are reviewed and updated following {{ insert: param, ac-01_odp.08 }}.' + links: + - href: '#ac-1_smt.c.2' + rel: assessment-for + links: + - href: '#ac-1_smt.c.2' + rel: assessment-for + links: + - href: '#ac-1_smt.c' + rel: assessment-for + links: + - href: '#ac-1_smt' + rel: assessment-for - id: ac-1_asm-examine name: assessment-method props: @@ -517,6 +589,8 @@ catalog: rel: related - href: '#ia-11' rel: related + - href: '#ia-13' + rel: related - href: '#ma-3' rel: related - href: '#ma-4' @@ -569,6 +643,9 @@ catalog: value: AC-03 class: sp800-53a prose: approved authorizations for logical access to information and system resources are enforced in accordance with applicable access control policies. + links: + - href: '#ac-3_smt' + rel: assessment-for - id: ac-3_asm-examine name: assessment-method props: @@ -692,6 +769,9 @@ catalog: value: AC-03(14) class: sp800-53a prose: ' {{ insert: param, ac-03.14_odp.01 }} are provided to enable individuals to have access to {{ insert: param, ac-03.14_odp.02 }} of their personally identifiable information.' + links: + - href: '#ac-3.14_smt' + rel: assessment-for - id: ac-3.14_asm-examine name: assessment-method props: @@ -975,6 +1055,9 @@ catalog: value: AT-01a.[01] class: sp800-53a prose: 'an awareness and training policy is developed and documented; ' + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.a-2 name: assessment-objective props: @@ -982,6 +1065,9 @@ catalog: value: AT-01a.[02] class: sp800-53a prose: 'the awareness and training policy is disseminated to {{ insert: param, at-01_odp.01 }};' + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.a-3 name: assessment-objective props: @@ -989,6 +1075,9 @@ catalog: value: AT-01a.[03] class: sp800-53a prose: awareness and training procedures to facilitate the implementation of the awareness and training policy and associated access controls are developed and documented; + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.a-4 name: assessment-objective props: @@ -996,6 +1085,9 @@ catalog: value: AT-01a.[04] class: sp800-53a prose: 'the awareness and training procedures are disseminated to {{ insert: param, at-01_odp.02 }}.' + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.a.1 name: assessment-objective props: @@ -1017,6 +1109,9 @@ catalog: value: AT-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses purpose;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-2 name: assessment-objective props: @@ -1024,6 +1119,9 @@ catalog: value: AT-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses scope;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-3 name: assessment-objective props: @@ -1031,6 +1129,9 @@ catalog: value: AT-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses roles;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-4 name: assessment-objective props: @@ -1038,6 +1139,9 @@ catalog: value: AT-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses responsibilities;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-5 name: assessment-objective props: @@ -1045,6 +1149,9 @@ catalog: value: AT-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses management commitment;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-6 name: assessment-objective props: @@ -1052,6 +1159,9 @@ catalog: value: AT-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses coordination among organizational entities;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-7 name: assessment-objective props: @@ -1059,6 +1169,12 @@ catalog: value: AT-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses compliance; and' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.b name: assessment-objective props: @@ -1066,6 +1182,15 @@ catalog: value: AT-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines; and' + links: + - href: '#at-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#at-1_smt.a.1' + rel: assessment-for + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.b name: assessment-objective props: @@ -1073,6 +1198,9 @@ catalog: value: AT-01b. class: sp800-53a prose: 'the {{ insert: param, at-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the awareness and training policy and procedures;' + links: + - href: '#at-1_smt.b' + rel: assessment-for - id: at-1_obj.c name: assessment-objective props: @@ -1094,6 +1222,9 @@ catalog: value: AT-01c.01[01] class: sp800-53a prose: 'the current awareness and training policy is reviewed and updated {{ insert: param, at-01_odp.05 }}; ' + links: + - href: '#at-1_smt.c.1' + rel: assessment-for - id: at-1_obj.c.1-2 name: assessment-objective props: @@ -1101,6 +1232,12 @@ catalog: value: AT-01c.01[02] class: sp800-53a prose: 'the current awareness and training policy is reviewed and updated following {{ insert: param, at-01_odp.06 }};' + links: + - href: '#at-1_smt.c.1' + rel: assessment-for + links: + - href: '#at-1_smt.c.1' + rel: assessment-for - id: at-1_obj.c.2 name: assessment-objective props: @@ -1115,6 +1252,9 @@ catalog: value: AT-01c.02[01] class: sp800-53a prose: 'the current awareness and training procedures are reviewed and updated {{ insert: param, at-01_odp.07 }};' + links: + - href: '#at-1_smt.c.2' + rel: assessment-for - id: at-1_obj.c.2-2 name: assessment-objective props: @@ -1122,6 +1262,18 @@ catalog: value: AT-01c.02[02] class: sp800-53a prose: 'the current awareness and training procedures are reviewed and updated following {{ insert: param, at-01_odp.08 }}.' + links: + - href: '#at-1_smt.c.2' + rel: assessment-for + links: + - href: '#at-1_smt.c.2' + rel: assessment-for + links: + - href: '#at-1_smt.c' + rel: assessment-for + links: + - href: '#at-1_smt' + rel: assessment-for - id: at-1_asm-examine name: assessment-method props: @@ -1374,6 +1526,9 @@ catalog: value: AT-02a.01[01] class: sp800-53a prose: security literacy training is provided to system users (including managers, senior executives, and contractors) as part of initial training for new users; + links: + - href: '#at-2_smt.a.1' + rel: assessment-for - id: at-2_obj.a.1-2 name: assessment-objective props: @@ -1381,6 +1536,9 @@ catalog: value: AT-02a.01[02] class: sp800-53a prose: privacy literacy training is provided to system users (including managers, senior executives, and contractors) as part of initial training for new users; + links: + - href: '#at-2_smt.a.1' + rel: assessment-for - id: at-2_obj.a.1-3 name: assessment-objective props: @@ -1388,6 +1546,9 @@ catalog: value: AT-02a.01[03] class: sp800-53a prose: 'security literacy training is provided to system users (including managers, senior executives, and contractors) {{ insert: param, at-02_odp.01 }} thereafter;' + links: + - href: '#at-2_smt.a.1' + rel: assessment-for - id: at-2_obj.a.1-4 name: assessment-objective props: @@ -1395,6 +1556,12 @@ catalog: value: AT-02a.01[04] class: sp800-53a prose: 'privacy literacy training is provided to system users (including managers, senior executives, and contractors) {{ insert: param, at-02_odp.02 }} thereafter;' + links: + - href: '#at-2_smt.a.1' + rel: assessment-for + links: + - href: '#at-2_smt.a.1' + rel: assessment-for - id: at-2_obj.a.2 name: assessment-objective props: @@ -1409,6 +1576,9 @@ catalog: value: AT-02a.02[01] class: sp800-53a prose: 'security literacy training is provided to system users (including managers, senior executives, and contractors) when required by system changes or following {{ insert: param, at-02_odp.03 }};' + links: + - href: '#at-2_smt.a.2' + rel: assessment-for - id: at-2_obj.a.2-2 name: assessment-objective props: @@ -1416,6 +1586,15 @@ catalog: value: AT-02a.02[02] class: sp800-53a prose: 'privacy literacy training is provided to system users (including managers, senior executives, and contractors) when required by system changes or following {{ insert: param, at-02_odp.04 }};' + links: + - href: '#at-2_smt.a.2' + rel: assessment-for + links: + - href: '#at-2_smt.a.2' + rel: assessment-for + links: + - href: '#at-2_smt.a' + rel: assessment-for - id: at-2_obj.b name: assessment-objective props: @@ -1423,6 +1602,9 @@ catalog: value: AT-02b. class: sp800-53a prose: ' {{ insert: param, at-02_odp.05 }} are employed to increase the security and privacy awareness of system users;' + links: + - href: '#at-2_smt.b' + rel: assessment-for - id: at-2_obj.c name: assessment-objective props: @@ -1437,6 +1619,9 @@ catalog: value: AT-02c.[01] class: sp800-53a prose: 'literacy training and awareness content is updated {{ insert: param, at-02_odp.06 }};' + links: + - href: '#at-2_smt.c' + rel: assessment-for - id: at-2_obj.c-2 name: assessment-objective props: @@ -1444,6 +1629,12 @@ catalog: value: AT-02c.[02] class: sp800-53a prose: 'literacy training and awareness content is updated following {{ insert: param, at-02_odp.07 }};' + links: + - href: '#at-2_smt.c' + rel: assessment-for + links: + - href: '#at-2_smt.c' + rel: assessment-for - id: at-2_obj.d name: assessment-objective props: @@ -1451,6 +1642,12 @@ catalog: value: AT-02d. class: sp800-53a prose: lessons learned from internal or external security incidents or breaches are incorporated into literacy training and awareness techniques. + links: + - href: '#at-2_smt.d' + rel: assessment-for + links: + - href: '#at-2_smt' + rel: assessment-for - id: at-2_asm-examine name: assessment-method props: @@ -1702,6 +1899,9 @@ catalog: value: AT-03a.01[01] class: sp800-53a prose: 'role-based security training is provided to {{ insert: param, at-03_odp.01 }} before authorizing access to the system, information, or performing assigned duties;' + links: + - href: '#at-3_smt.a.1' + rel: assessment-for - id: at-3_obj.a.1-2 name: assessment-objective props: @@ -1709,6 +1909,9 @@ catalog: value: AT-03a.01[02] class: sp800-53a prose: 'role-based privacy training is provided to {{ insert: param, at-03_odp.02 }} before authorizing access to the system, information, or performing assigned duties;' + links: + - href: '#at-3_smt.a.1' + rel: assessment-for - id: at-3_obj.a.1-3 name: assessment-objective props: @@ -1716,6 +1919,9 @@ catalog: value: AT-03a.01[03] class: sp800-53a prose: 'role-based security training is provided to {{ insert: param, at-03_odp.01 }} {{ insert: param, at-03_odp.03 }} thereafter;' + links: + - href: '#at-3_smt.a.1' + rel: assessment-for - id: at-3_obj.a.1-4 name: assessment-objective props: @@ -1723,6 +1929,12 @@ catalog: value: AT-03a.01[04] class: sp800-53a prose: 'role-based privacy training is provided to {{ insert: param, at-03_odp.02 }} {{ insert: param, at-03_odp.03 }} thereafter;' + links: + - href: '#at-3_smt.a.1' + rel: assessment-for + links: + - href: '#at-3_smt.a.1' + rel: assessment-for - id: at-3_obj.a.2 name: assessment-objective props: @@ -1737,6 +1949,9 @@ catalog: value: AT-03a.02[01] class: sp800-53a prose: role-based security training is provided to personnel with assigned security roles and responsibilities when required by system changes; + links: + - href: '#at-3_smt.a.2' + rel: assessment-for - id: at-3_obj.a.2-2 name: assessment-objective props: @@ -1744,6 +1959,15 @@ catalog: value: AT-03a.02[02] class: sp800-53a prose: role-based privacy training is provided to personnel with assigned security roles and responsibilities when required by system changes; + links: + - href: '#at-3_smt.a.2' + rel: assessment-for + links: + - href: '#at-3_smt.a.2' + rel: assessment-for + links: + - href: '#at-3_smt.a' + rel: assessment-for - id: at-3_obj.b name: assessment-objective props: @@ -1758,6 +1982,9 @@ catalog: value: AT-03b.[01] class: sp800-53a prose: 'role-based training content is updated {{ insert: param, at-03_odp.04 }};' + links: + - href: '#at-3_smt.b' + rel: assessment-for - id: at-3_obj.b-2 name: assessment-objective props: @@ -1765,6 +1992,12 @@ catalog: value: AT-03b.[02] class: sp800-53a prose: 'role-based training content is updated following {{ insert: param, at-03_odp.05 }};' + links: + - href: '#at-3_smt.b' + rel: assessment-for + links: + - href: '#at-3_smt.b' + rel: assessment-for - id: at-3_obj.c name: assessment-objective props: @@ -1772,6 +2005,12 @@ catalog: value: AT-03c. class: sp800-53a prose: lessons learned from internal or external security incidents or breaches are incorporated into role-based training. + links: + - href: '#at-3_smt.c' + rel: assessment-for + links: + - href: '#at-3_smt' + rel: assessment-for - id: at-3_asm-examine name: assessment-method props: @@ -1892,6 +2131,9 @@ catalog: value: AT-03(05) class: sp800-53a prose: ' {{ insert: param, at-03.05_odp.01 }} are provided with initial and refresher training {{ insert: param, at-03.05_odp.02 }} in the employment and operation of personally identifiable information processing and transparency controls.' + links: + - href: '#at-3.5_smt' + rel: assessment-for - id: at-3.5_asm-examine name: assessment-method props: @@ -2029,6 +2271,9 @@ catalog: value: AT-04a.[01] class: sp800-53a prose: information security and privacy training activities, including security and privacy awareness training and specific role-based security and privacy training, are documented; + links: + - href: '#at-4_smt.a' + rel: assessment-for - id: at-4_obj.a-2 name: assessment-objective props: @@ -2036,6 +2281,12 @@ catalog: value: AT-04a.[02] class: sp800-53a prose: information security and privacy training activities, including security and privacy awareness training and specific role-based security and privacy training, are monitored; + links: + - href: '#at-4_smt.a' + rel: assessment-for + links: + - href: '#at-4_smt.a' + rel: assessment-for - id: at-4_obj.b name: assessment-objective props: @@ -2043,6 +2294,12 @@ catalog: value: AT-04b. class: sp800-53a prose: 'individual training records are retained for {{ insert: param, at-04_odp }}.' + links: + - href: '#at-4_smt.b' + rel: assessment-for + links: + - href: '#at-4_smt' + rel: assessment-for - id: at-4_asm-examine name: assessment-method props: @@ -2300,6 +2557,9 @@ catalog: value: AU-01a.[01] class: sp800-53a prose: an audit and accountability policy is developed and documented; + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.a-2 name: assessment-objective props: @@ -2307,6 +2567,9 @@ catalog: value: AU-01a.[02] class: sp800-53a prose: 'the audit and accountability policy is disseminated to {{ insert: param, au-01_odp.01 }};' + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.a-3 name: assessment-objective props: @@ -2314,6 +2577,9 @@ catalog: value: AU-01a.[03] class: sp800-53a prose: audit and accountability procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls are developed and documented; + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.a-4 name: assessment-objective props: @@ -2321,6 +2587,9 @@ catalog: value: AU-01a.[04] class: sp800-53a prose: 'the audit and accountability procedures are disseminated to {{ insert: param, au-01_odp.02 }};' + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.a.1 name: assessment-objective props: @@ -2342,6 +2611,9 @@ catalog: value: AU-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses purpose;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-2 name: assessment-objective props: @@ -2349,6 +2621,9 @@ catalog: value: AU-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses scope;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-3 name: assessment-objective props: @@ -2356,6 +2631,9 @@ catalog: value: AU-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses roles;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-4 name: assessment-objective props: @@ -2363,6 +2641,9 @@ catalog: value: AU-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses responsibilities;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-5 name: assessment-objective props: @@ -2370,6 +2651,9 @@ catalog: value: AU-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses management commitment;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-6 name: assessment-objective props: @@ -2377,6 +2661,9 @@ catalog: value: AU-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses coordination among organizational entities;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-7 name: assessment-objective props: @@ -2384,6 +2671,12 @@ catalog: value: AU-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses compliance;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.b name: assessment-objective props: @@ -2391,6 +2684,15 @@ catalog: value: AU-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#au-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#au-1_smt.a.1' + rel: assessment-for + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.b name: assessment-objective props: @@ -2398,6 +2700,9 @@ catalog: value: AU-01b. class: sp800-53a prose: 'the {{ insert: param, au-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the audit and accountability policy and procedures;' + links: + - href: '#au-1_smt.b' + rel: assessment-for - id: au-1_obj.c name: assessment-objective props: @@ -2419,6 +2724,9 @@ catalog: value: AU-01c.01[01] class: sp800-53a prose: 'the current audit and accountability policy is reviewed and updated {{ insert: param, au-01_odp.05 }};' + links: + - href: '#au-1_smt.c.1' + rel: assessment-for - id: au-1_obj.c.1-2 name: assessment-objective props: @@ -2426,6 +2734,12 @@ catalog: value: AU-01c.01[02] class: sp800-53a prose: 'the current audit and accountability policy is reviewed and updated following {{ insert: param, au-01_odp.06 }};' + links: + - href: '#au-1_smt.c.1' + rel: assessment-for + links: + - href: '#au-1_smt.c.1' + rel: assessment-for - id: au-1_obj.c.2 name: assessment-objective props: @@ -2440,6 +2754,9 @@ catalog: value: AU-01c.02[01] class: sp800-53a prose: 'the current audit and accountability procedures are reviewed and updated {{ insert: param, au-01_odp.07 }};' + links: + - href: '#au-1_smt.c.2' + rel: assessment-for - id: au-1_obj.c.2-2 name: assessment-objective props: @@ -2447,6 +2764,18 @@ catalog: value: AU-01c.02[02] class: sp800-53a prose: 'the current audit and accountability procedures are reviewed and updated following {{ insert: param, au-01_odp.08 }}.' + links: + - href: '#au-1_smt.c.2' + rel: assessment-for + links: + - href: '#au-1_smt.c.2' + rel: assessment-for + links: + - href: '#au-1_smt.c' + rel: assessment-for + links: + - href: '#au-1_smt' + rel: assessment-for - id: au-1_asm-examine name: assessment-method props: @@ -2673,6 +3002,9 @@ catalog: value: AU-02a. class: sp800-53a prose: ' {{ insert: param, au-02_odp.01 }} that the system is capable of logging are identified in support of the audit logging function;' + links: + - href: '#au-2_smt.a' + rel: assessment-for - id: au-2_obj.b name: assessment-objective props: @@ -2680,6 +3012,9 @@ catalog: value: AU-02b. class: sp800-53a prose: the event logging function is coordinated with other organizational entities requiring audit-related information to guide and inform the selection criteria for events to be logged; + links: + - href: '#au-2_smt.b' + rel: assessment-for - id: au-2_obj.c name: assessment-objective props: @@ -2694,6 +3029,9 @@ catalog: value: AU-02c.[01] class: sp800-53a prose: ' {{ insert: param, au-02_odp.02 }} are specified for logging within the system;' + links: + - href: '#au-2_smt.c' + rel: assessment-for - id: au-2_obj.c-2 name: assessment-objective props: @@ -2701,6 +3039,12 @@ catalog: value: AU-02c.[02] class: sp800-53a prose: 'the specified event types are logged within the system {{ insert: param, au-02_odp.03 }};' + links: + - href: '#au-2_smt.c' + rel: assessment-for + links: + - href: '#au-2_smt.c' + rel: assessment-for - id: au-2_obj.d name: assessment-objective props: @@ -2708,6 +3052,9 @@ catalog: value: AU-02d. class: sp800-53a prose: a rationale is provided for why the event types selected for logging are deemed to be adequate to support after-the-fact investigations of incidents; + links: + - href: '#au-2_smt.d' + rel: assessment-for - id: au-2_obj.e name: assessment-objective props: @@ -2715,6 +3062,12 @@ catalog: value: AU-02e. class: sp800-53a prose: 'the event types selected for logging are reviewed and updated {{ insert: param, au-02_odp.04 }}.' + links: + - href: '#au-2_smt.e' + rel: assessment-for + links: + - href: '#au-2_smt' + rel: assessment-for - id: au-2_asm-examine name: assessment-method props: @@ -2868,6 +3221,9 @@ catalog: value: AU-03a. class: sp800-53a prose: audit records contain information that establishes what type of event occurred; + links: + - href: '#au-3_smt.a' + rel: assessment-for - id: au-3_obj.b name: assessment-objective props: @@ -2875,6 +3231,9 @@ catalog: value: AU-03b. class: sp800-53a prose: audit records contain information that establishes when the event occurred; + links: + - href: '#au-3_smt.b' + rel: assessment-for - id: au-3_obj.c name: assessment-objective props: @@ -2882,6 +3241,9 @@ catalog: value: AU-03c. class: sp800-53a prose: audit records contain information that establishes where the event occurred; + links: + - href: '#au-3_smt.c' + rel: assessment-for - id: au-3_obj.d name: assessment-objective props: @@ -2889,6 +3251,9 @@ catalog: value: AU-03d. class: sp800-53a prose: audit records contain information that establishes the source of the event; + links: + - href: '#au-3_smt.d' + rel: assessment-for - id: au-3_obj.e name: assessment-objective props: @@ -2896,6 +3261,9 @@ catalog: value: AU-03e. class: sp800-53a prose: audit records contain information that establishes the outcome of the event; + links: + - href: '#au-3_smt.e' + rel: assessment-for - id: au-3_obj.f name: assessment-objective props: @@ -2903,6 +3271,12 @@ catalog: value: AU-03f. class: sp800-53a prose: audit records contain information that establishes the identity of any individuals, subjects, or objects/entities associated with the event. + links: + - href: '#au-3_smt.f' + rel: assessment-for + links: + - href: '#au-3_smt' + rel: assessment-for - id: au-3_asm-examine name: assessment-method props: @@ -3008,6 +3382,9 @@ catalog: value: AU-03(03) class: sp800-53a prose: 'personally identifiable information contained in audit records is limited to {{ insert: param, au-03.03_odp }} identified in the privacy risk assessment.' + links: + - href: '#au-3.3_smt' + rel: assessment-for - id: au-3.3_asm-examine name: assessment-method props: @@ -3137,6 +3514,9 @@ catalog: value: AU-11 class: sp800-53a prose: 'audit records are retained for {{ insert: param, au-11_odp }} to provide support for after-the-fact investigations of incidents and to meet regulatory and organizational information retention requirements.' + links: + - href: '#au-11_smt' + rel: assessment-for - id: au-11_asm-examine name: assessment-method props: @@ -3407,6 +3787,9 @@ catalog: value: CA-01a.[01] class: sp800-53a prose: an assessment, authorization, and monitoring policy is developed and documented; + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.a-2 name: assessment-objective props: @@ -3414,6 +3797,9 @@ catalog: value: CA-01a.[02] class: sp800-53a prose: 'the assessment, authorization, and monitoring policy is disseminated to {{ insert: param, ca-01_odp.01 }};' + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.a-3 name: assessment-objective props: @@ -3421,6 +3807,9 @@ catalog: value: CA-01a.[03] class: sp800-53a prose: assessment, authorization, and monitoring procedures to facilitate the implementation of the assessment, authorization, and monitoring policy and associated assessment, authorization, and monitoring controls are developed and documented; + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.a-4 name: assessment-objective props: @@ -3428,6 +3817,9 @@ catalog: value: CA-01a.[04] class: sp800-53a prose: 'the assessment, authorization, and monitoring procedures are disseminated to {{ insert: param, ca-01_odp.02 }};' + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.a.1 name: assessment-objective props: @@ -3449,6 +3841,9 @@ catalog: value: CA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses purpose;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-2 name: assessment-objective props: @@ -3456,6 +3851,9 @@ catalog: value: CA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses scope;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-3 name: assessment-objective props: @@ -3463,6 +3861,9 @@ catalog: value: CA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses roles;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-4 name: assessment-objective props: @@ -3470,6 +3871,9 @@ catalog: value: CA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses responsibilities;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-5 name: assessment-objective props: @@ -3477,6 +3881,9 @@ catalog: value: CA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses management commitment;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-6 name: assessment-objective props: @@ -3484,6 +3891,9 @@ catalog: value: CA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses coordination among organizational entities;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-7 name: assessment-objective props: @@ -3491,6 +3901,12 @@ catalog: value: CA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses compliance;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.b name: assessment-objective props: @@ -3498,6 +3914,15 @@ catalog: value: CA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ca-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ca-1_smt.a.1' + rel: assessment-for + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.b name: assessment-objective props: @@ -3505,6 +3930,9 @@ catalog: value: CA-01b. class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the assessment, authorization, and monitoring policy and procedures;' + links: + - href: '#ca-1_smt.b' + rel: assessment-for - id: ca-1_obj.c name: assessment-objective props: @@ -3526,6 +3954,9 @@ catalog: value: CA-01c.01[01] class: sp800-53a prose: 'the current assessment, authorization, and monitoring policy is reviewed and updated {{ insert: param, ca-01_odp.05 }}; ' + links: + - href: '#ca-1_smt.c.1' + rel: assessment-for - id: ca-1_obj.c.1-2 name: assessment-objective props: @@ -3533,6 +3964,12 @@ catalog: value: CA-01c.01[02] class: sp800-53a prose: 'the current assessment, authorization, and monitoring policy is reviewed and updated following {{ insert: param, ca-01_odp.06 }};' + links: + - href: '#ca-1_smt.c.1' + rel: assessment-for + links: + - href: '#ca-1_smt.c.1' + rel: assessment-for - id: ca-1_obj.c.2 name: assessment-objective props: @@ -3547,6 +3984,9 @@ catalog: value: CA-01c.02[01] class: sp800-53a prose: 'the current assessment, authorization, and monitoring procedures are reviewed and updated {{ insert: param, ca-01_odp.07 }}; ' + links: + - href: '#ca-1_smt.c.2' + rel: assessment-for - id: ca-1_obj.c.2-2 name: assessment-objective props: @@ -3554,6 +3994,18 @@ catalog: value: CA-01c.02[02] class: sp800-53a prose: 'the current assessment, authorization, and monitoring procedures are reviewed and updated following {{ insert: param, ca-01_odp.08 }}.' + links: + - href: '#ca-1_smt.c.2' + rel: assessment-for + links: + - href: '#ca-1_smt.c.2' + rel: assessment-for + links: + - href: '#ca-1_smt.c' + rel: assessment-for + links: + - href: '#ca-1_smt' + rel: assessment-for - id: ca-1_asm-examine name: assessment-method props: @@ -3761,6 +4213,9 @@ catalog: value: CA-02a. class: sp800-53a prose: an appropriate assessor or assessment team is selected for the type of assessment to be conducted; + links: + - href: '#ca-2_smt.a' + rel: assessment-for - id: ca-2_obj.b name: assessment-objective props: @@ -3775,6 +4230,9 @@ catalog: value: CA-02b.01 class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including controls and control enhancements under assessment; + links: + - href: '#ca-2_smt.b.1' + rel: assessment-for - id: ca-2_obj.b.2 name: assessment-objective props: @@ -3782,6 +4240,9 @@ catalog: value: CA-02b.02 class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including assessment procedures to be used to determine control effectiveness; + links: + - href: '#ca-2_smt.b.2' + rel: assessment-for - id: ca-2_obj.b.3 name: assessment-objective props: @@ -3796,6 +4257,9 @@ catalog: value: CA-02b.03[01] class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including the assessment environment; + links: + - href: '#ca-2_smt.b.3' + rel: assessment-for - id: ca-2_obj.b.3-2 name: assessment-objective props: @@ -3803,6 +4267,9 @@ catalog: value: CA-02b.03[02] class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including the assessment team; + links: + - href: '#ca-2_smt.b.3' + rel: assessment-for - id: ca-2_obj.b.3-3 name: assessment-objective props: @@ -3810,6 +4277,15 @@ catalog: value: CA-02b.03[03] class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including assessment roles and responsibilities; + links: + - href: '#ca-2_smt.b.3' + rel: assessment-for + links: + - href: '#ca-2_smt.b.3' + rel: assessment-for + links: + - href: '#ca-2_smt.b' + rel: assessment-for - id: ca-2_obj.c name: assessment-objective props: @@ -3817,6 +4293,9 @@ catalog: value: CA-02c. class: sp800-53a prose: the control assessment plan is reviewed and approved by the authorizing official or designated representative prior to conducting the assessment; + links: + - href: '#ca-2_smt.c' + rel: assessment-for - id: ca-2_obj.d name: assessment-objective props: @@ -3831,6 +4310,9 @@ catalog: value: CA-02d.[01] class: sp800-53a prose: 'controls are assessed in the system and its environment of operation {{ insert: param, ca-02_odp.01 }} to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;' + links: + - href: '#ca-2_smt.d' + rel: assessment-for - id: ca-2_obj.d-2 name: assessment-objective props: @@ -3838,6 +4320,12 @@ catalog: value: CA-02d.[02] class: sp800-53a prose: 'controls are assessed in the system and its environment of operation {{ insert: param, ca-02_odp.01 }} to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established privacy requirements;' + links: + - href: '#ca-2_smt.d' + rel: assessment-for + links: + - href: '#ca-2_smt.d' + rel: assessment-for - id: ca-2_obj.e name: assessment-objective props: @@ -3845,6 +4333,9 @@ catalog: value: CA-02e. class: sp800-53a prose: a control assessment report is produced that documents the results of the assessment; + links: + - href: '#ca-2_smt.e' + rel: assessment-for - id: ca-2_obj.f name: assessment-objective props: @@ -3852,6 +4343,12 @@ catalog: value: CA-02f. class: sp800-53a prose: 'the results of the control assessment are provided to {{ insert: param, ca-02_odp.02 }}.' + links: + - href: '#ca-2_smt.f' + rel: assessment-for + links: + - href: '#ca-2_smt' + rel: assessment-for - id: ca-2_asm-examine name: assessment-method props: @@ -3986,6 +4483,9 @@ catalog: value: CA-05a. class: sp800-53a prose: a plan of action and milestones for the system is developed to document the planned remediation actions of the organization to correct weaknesses or deficiencies noted during the assessment of the controls and to reduce or eliminate known vulnerabilities in the system; + links: + - href: '#ca-5_smt.a' + rel: assessment-for - id: ca-5_obj.b name: assessment-objective props: @@ -3993,6 +4493,12 @@ catalog: value: CA-05b. class: sp800-53a prose: 'existing plan of action and milestones are updated {{ insert: param, ca-05_odp }} based on the findings from control assessments, independent audits or reviews, and continuous monitoring activities.' + links: + - href: '#ca-5_smt.b' + rel: assessment-for + links: + - href: '#ca-5_smt' + rel: assessment-for - id: ca-5_asm-examine name: assessment-method props: @@ -4167,6 +4673,9 @@ catalog: value: CA-06a. class: sp800-53a prose: a senior official is assigned as the authorizing official for the system; + links: + - href: '#ca-6_smt.a' + rel: assessment-for - id: ca-6_obj.b name: assessment-objective props: @@ -4174,6 +4683,9 @@ catalog: value: CA-06b. class: sp800-53a prose: a senior official is assigned as the authorizing official for common controls available for inheritance by organizational systems; + links: + - href: '#ca-6_smt.b' + rel: assessment-for - id: ca-6_obj.c name: assessment-objective props: @@ -4188,6 +4700,9 @@ catalog: value: CA-06c.01 class: sp800-53a prose: before commencing operations, the authorizing official for the system accepts the use of common controls inherited by the system; + links: + - href: '#ca-6_smt.c.1' + rel: assessment-for - id: ca-6_obj.c.2 name: assessment-objective props: @@ -4195,6 +4710,12 @@ catalog: value: CA-06c.02 class: sp800-53a prose: before commencing operations, the authorizing official for the system authorizes the system to operate; + links: + - href: '#ca-6_smt.c.2' + rel: assessment-for + links: + - href: '#ca-6_smt.c' + rel: assessment-for - id: ca-6_obj.d name: assessment-objective props: @@ -4202,6 +4723,9 @@ catalog: value: CA-06d. class: sp800-53a prose: the authorizing official for common controls authorizes the use of those controls for inheritance by organizational systems; + links: + - href: '#ca-6_smt.d' + rel: assessment-for - id: ca-6_obj.e name: assessment-objective props: @@ -4209,6 +4733,12 @@ catalog: value: CA-06e. class: sp800-53a prose: 'the authorizations are updated {{ insert: param, ca-06_odp }}.' + links: + - href: '#ca-6_smt.e' + rel: assessment-for + links: + - href: '#ca-6_smt' + rel: assessment-for - id: ca-6_asm-examine name: assessment-method props: @@ -4541,6 +5071,9 @@ catalog: value: CA-07[01] class: sp800-53a prose: a system-level continuous monitoring strategy is developed; + links: + - href: '#ca-7_smt' + rel: assessment-for - id: ca-7_obj-2 name: assessment-objective props: @@ -4548,6 +5081,9 @@ catalog: value: CA-07[02] class: sp800-53a prose: system-level continuous monitoring is implemented in accordance with the organization-level continuous monitoring strategy; + links: + - href: '#ca-7_smt' + rel: assessment-for - id: ca-7_obj.a name: assessment-objective props: @@ -4555,6 +5091,9 @@ catalog: value: CA-07a. class: sp800-53a prose: 'system-level continuous monitoring includes establishment of the following system-level metrics to be monitored: {{ insert: param, ca-07_odp.01 }};' + links: + - href: '#ca-7_smt.a' + rel: assessment-for - id: ca-7_obj.b name: assessment-objective props: @@ -4569,6 +5108,9 @@ catalog: value: CA-07b.[01] class: sp800-53a prose: 'system-level continuous monitoring includes established {{ insert: param, ca-07_odp.02 }} for monitoring;' + links: + - href: '#ca-7_smt.b' + rel: assessment-for - id: ca-7_obj.b-2 name: assessment-objective props: @@ -4576,6 +5118,12 @@ catalog: value: CA-07b.[02] class: sp800-53a prose: 'system-level continuous monitoring includes established {{ insert: param, ca-07_odp.03 }} for assessment of control effectiveness;' + links: + - href: '#ca-7_smt.b' + rel: assessment-for + links: + - href: '#ca-7_smt.b' + rel: assessment-for - id: ca-7_obj.c name: assessment-objective props: @@ -4583,6 +5131,9 @@ catalog: value: CA-07c. class: sp800-53a prose: system-level continuous monitoring includes ongoing control assessments in accordance with the continuous monitoring strategy; + links: + - href: '#ca-7_smt.c' + rel: assessment-for - id: ca-7_obj.d name: assessment-objective props: @@ -4590,6 +5141,9 @@ catalog: value: CA-07d. class: sp800-53a prose: system-level continuous monitoring includes ongoing monitoring of system and organization-defined metrics in accordance with the continuous monitoring strategy; + links: + - href: '#ca-7_smt.d' + rel: assessment-for - id: ca-7_obj.e name: assessment-objective props: @@ -4597,6 +5151,9 @@ catalog: value: CA-07e. class: sp800-53a prose: system-level continuous monitoring includes correlation and analysis of information generated by control assessments and monitoring; + links: + - href: '#ca-7_smt.e' + rel: assessment-for - id: ca-7_obj.f name: assessment-objective props: @@ -4604,6 +5161,9 @@ catalog: value: CA-07f. class: sp800-53a prose: system-level continuous monitoring includes response actions to address the results of the analysis of control assessment and monitoring information; + links: + - href: '#ca-7_smt.f' + rel: assessment-for - id: ca-7_obj.g name: assessment-objective props: @@ -4618,6 +5178,9 @@ catalog: value: CA-07g.[01] class: sp800-53a prose: 'system-level continuous monitoring includes reporting the security status of the system to {{ insert: param, ca-07_odp.04 }} {{ insert: param, ca-07_odp.05 }};' + links: + - href: '#ca-7_smt.g' + rel: assessment-for - id: ca-7_obj.g-2 name: assessment-objective props: @@ -4625,6 +5188,15 @@ catalog: value: CA-07g.[02] class: sp800-53a prose: 'system-level continuous monitoring includes reporting the privacy status of the system to {{ insert: param, ca-07_odp.06 }} {{ insert: param, ca-07_odp.07 }}.' + links: + - href: '#ca-7_smt.g' + rel: assessment-for + links: + - href: '#ca-7_smt.g' + rel: assessment-for + links: + - href: '#ca-7_smt' + rel: assessment-for - id: ca-7_asm-examine name: assessment-method props: @@ -4763,6 +5335,9 @@ catalog: value: CA-07(04)(a) class: sp800-53a prose: effectiveness monitoring is included in risk monitoring; + links: + - href: '#ca-7.4_smt.a' + rel: assessment-for - id: ca-7.4_obj.b name: assessment-objective props: @@ -4770,6 +5345,9 @@ catalog: value: CA-07(04)(b) class: sp800-53a prose: compliance monitoring is included in risk monitoring; + links: + - href: '#ca-7.4_smt.b' + rel: assessment-for - id: ca-7.4_obj.c name: assessment-objective props: @@ -4777,6 +5355,12 @@ catalog: value: CA-07(04)(c) class: sp800-53a prose: change monitoring is included in risk monitoring. + links: + - href: '#ca-7.4_smt.c' + rel: assessment-for + links: + - href: '#ca-7.4_smt' + rel: assessment-for - id: ca-7.4_asm-examine name: assessment-method props: @@ -5053,6 +5637,9 @@ catalog: value: CM-01a.[01] class: sp800-53a prose: a configuration management policy is developed and documented; + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.a-2 name: assessment-objective props: @@ -5060,6 +5647,9 @@ catalog: value: CM-01a.[02] class: sp800-53a prose: 'the configuration management policy is disseminated to {{ insert: param, cm-01_odp.01 }};' + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.a-3 name: assessment-objective props: @@ -5067,6 +5657,9 @@ catalog: value: CM-01a.[03] class: sp800-53a prose: configuration management procedures to facilitate the implementation of the configuration management policy and associated configuration management controls are developed and documented; + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.a-4 name: assessment-objective props: @@ -5074,6 +5667,9 @@ catalog: value: CM-01a.[04] class: sp800-53a prose: 'the configuration management procedures are disseminated to {{ insert: param, cm-01_odp.02 }};' + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.a.1 name: assessment-objective props: @@ -5095,6 +5691,9 @@ catalog: value: CM-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses purpose;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-2 name: assessment-objective props: @@ -5102,6 +5701,9 @@ catalog: value: CM-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses scope;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-3 name: assessment-objective props: @@ -5109,6 +5711,9 @@ catalog: value: CM-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses roles;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-4 name: assessment-objective props: @@ -5116,6 +5721,9 @@ catalog: value: CM-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses responsibilities;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-5 name: assessment-objective props: @@ -5123,6 +5731,9 @@ catalog: value: CM-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses management commitment;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-6 name: assessment-objective props: @@ -5130,6 +5741,9 @@ catalog: value: CM-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses coordination among organizational entities;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-7 name: assessment-objective props: @@ -5137,6 +5751,12 @@ catalog: value: CM-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses compliance;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.b name: assessment-objective props: @@ -5144,6 +5764,15 @@ catalog: value: CM-01a.01(b) class: sp800-53a prose: the configuration management policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines; + links: + - href: '#cm-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#cm-1_smt.a.1' + rel: assessment-for + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.b name: assessment-objective props: @@ -5151,6 +5780,9 @@ catalog: value: CM-01b. class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the configuration management policy and procedures;' + links: + - href: '#cm-1_smt.b' + rel: assessment-for - id: cm-1_obj.c name: assessment-objective props: @@ -5172,6 +5804,9 @@ catalog: value: CM-01c.01[01] class: sp800-53a prose: 'the current configuration management policy is reviewed and updated {{ insert: param, cm-01_odp.05 }}; ' + links: + - href: '#cm-1_smt.c.1' + rel: assessment-for - id: cm-1_obj.c.1-2 name: assessment-objective props: @@ -5179,6 +5814,12 @@ catalog: value: CM-01c.01[02] class: sp800-53a prose: 'the current configuration management policy is reviewed and updated following {{ insert: param, cm-01_odp.06 }};' + links: + - href: '#cm-1_smt.c.1' + rel: assessment-for + links: + - href: '#cm-1_smt.c.1' + rel: assessment-for - id: cm-1_obj.c.2 name: assessment-objective props: @@ -5193,6 +5834,9 @@ catalog: value: CM-01c.02[01] class: sp800-53a prose: 'the current configuration management procedures are reviewed and updated {{ insert: param, cm-01_odp.07 }}; ' + links: + - href: '#cm-1_smt.c.2' + rel: assessment-for - id: cm-1_obj.c.2-2 name: assessment-objective props: @@ -5200,6 +5844,18 @@ catalog: value: CM-01c.02[02] class: sp800-53a prose: 'the current configuration management procedures are reviewed and updated following {{ insert: param, cm-01_odp.08 }}.' + links: + - href: '#cm-1_smt.c.2' + rel: assessment-for + links: + - href: '#cm-1_smt.c.2' + rel: assessment-for + links: + - href: '#cm-1_smt.c' + rel: assessment-for + links: + - href: '#cm-1_smt' + rel: assessment-for - id: cm-1_asm-examine name: assessment-method props: @@ -5307,6 +5963,9 @@ catalog: value: CM-04[01] class: sp800-53a prose: changes to the system are analyzed to determine potential security impacts prior to change implementation; + links: + - href: '#cm-4_smt' + rel: assessment-for - id: cm-4_obj-2 name: assessment-objective props: @@ -5314,6 +5973,12 @@ catalog: value: CM-04[02] class: sp800-53a prose: changes to the system are analyzed to determine potential privacy impacts prior to change implementation. + links: + - href: '#cm-4_smt' + rel: assessment-for + links: + - href: '#cm-4_smt' + rel: assessment-for - id: cm-4_asm-examine name: assessment-method props: @@ -5609,6 +6274,9 @@ catalog: value: IR-01a.[01] class: sp800-53a prose: an incident response policy is developed and documented; + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.a-2 name: assessment-objective props: @@ -5616,6 +6284,9 @@ catalog: value: IR-01a.[02] class: sp800-53a prose: 'the incident response policy is disseminated to {{ insert: param, ir-01_odp.01 }};' + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.a-3 name: assessment-objective props: @@ -5623,6 +6294,9 @@ catalog: value: IR-01a.[03] class: sp800-53a prose: incident response procedures to facilitate the implementation of the incident response policy and associated incident response controls are developed and documented; + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.a-4 name: assessment-objective props: @@ -5630,6 +6304,9 @@ catalog: value: IR-01a.[04] class: sp800-53a prose: 'the incident response procedures are disseminated to {{ insert: param, ir-01_odp.02 }};' + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.a.1 name: assessment-objective props: @@ -5651,6 +6328,9 @@ catalog: value: IR-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses purpose;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-2 name: assessment-objective props: @@ -5658,6 +6338,9 @@ catalog: value: IR-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses scope;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-3 name: assessment-objective props: @@ -5665,6 +6348,9 @@ catalog: value: IR-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses roles;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-4 name: assessment-objective props: @@ -5672,6 +6358,9 @@ catalog: value: IR-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses responsibilities;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-5 name: assessment-objective props: @@ -5679,6 +6368,9 @@ catalog: value: IR-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses management commitment;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-6 name: assessment-objective props: @@ -5686,6 +6378,9 @@ catalog: value: IR-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses coordination among organizational entities;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-7 name: assessment-objective props: @@ -5693,6 +6388,12 @@ catalog: value: IR-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses compliance;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.b name: assessment-objective props: @@ -5700,6 +6401,15 @@ catalog: value: IR-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ir-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ir-1_smt.a.1' + rel: assessment-for + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.b name: assessment-objective props: @@ -5707,6 +6417,9 @@ catalog: value: IR-01b. class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the incident response policy and procedures;' + links: + - href: '#ir-1_smt.b' + rel: assessment-for - id: ir-1_obj.c name: assessment-objective props: @@ -5728,6 +6441,9 @@ catalog: value: IR-01c.01[01] class: sp800-53a prose: 'the current incident response policy is reviewed and updated {{ insert: param, ir-01_odp.05 }};' + links: + - href: '#ir-1_smt.c.1' + rel: assessment-for - id: ir-1_obj.c.1-2 name: assessment-objective props: @@ -5735,6 +6451,12 @@ catalog: value: IR-01c.01[02] class: sp800-53a prose: 'the current incident response policy is reviewed and updated following {{ insert: param, ir-01_odp.06 }};' + links: + - href: '#ir-1_smt.c.1' + rel: assessment-for + links: + - href: '#ir-1_smt.c.1' + rel: assessment-for - id: ir-1_obj.c.2 name: assessment-objective props: @@ -5749,6 +6471,9 @@ catalog: value: IR-01c.02[01] class: sp800-53a prose: 'the current incident response procedures are reviewed and updated {{ insert: param, ir-01_odp.07 }};' + links: + - href: '#ir-1_smt.c.2' + rel: assessment-for - id: ir-1_obj.c.2-2 name: assessment-objective props: @@ -5756,6 +6481,18 @@ catalog: value: IR-01c.02[02] class: sp800-53a prose: 'the current incident response procedures are reviewed and updated following {{ insert: param, ir-01_odp.08 }}.' + links: + - href: '#ir-1_smt.c.2' + rel: assessment-for + links: + - href: '#ir-1_smt.c.2' + rel: assessment-for + links: + - href: '#ir-1_smt.c' + rel: assessment-for + links: + - href: '#ir-1_smt' + rel: assessment-for - id: ir-1_asm-examine name: assessment-method props: @@ -5928,6 +6665,9 @@ catalog: value: IR-02a.01 class: sp800-53a prose: 'incident response training is provided to system users consistent with assigned roles and responsibilities within {{ insert: param, ir-02_odp.01 }} of assuming an incident response role or responsibility or acquiring system access;' + links: + - href: '#ir-2_smt.a.1' + rel: assessment-for - id: ir-2_obj.a.2 name: assessment-objective props: @@ -5935,6 +6675,9 @@ catalog: value: IR-02a.02 class: sp800-53a prose: incident response training is provided to system users consistent with assigned roles and responsibilities when required by system changes; + links: + - href: '#ir-2_smt.a.2' + rel: assessment-for - id: ir-2_obj.a.3 name: assessment-objective props: @@ -5942,6 +6685,12 @@ catalog: value: IR-02a.03 class: sp800-53a prose: 'incident response training is provided to system users consistent with assigned roles and responsibilities {{ insert: param, ir-02_odp.02 }} thereafter;' + links: + - href: '#ir-2_smt.a.3' + rel: assessment-for + links: + - href: '#ir-2_smt.a' + rel: assessment-for - id: ir-2_obj.b name: assessment-objective props: @@ -5956,6 +6705,9 @@ catalog: value: IR-02b.[01] class: sp800-53a prose: 'incident response training content is reviewed and updated {{ insert: param, ir-02_odp.03 }};' + links: + - href: '#ir-2_smt.b' + rel: assessment-for - id: ir-2_obj.b-2 name: assessment-objective props: @@ -5963,6 +6715,15 @@ catalog: value: IR-02b.[02] class: sp800-53a prose: 'incident response training content is reviewed and updated following {{ insert: param, ir-02_odp.04 }}.' + links: + - href: '#ir-2_smt.b' + rel: assessment-for + links: + - href: '#ir-2_smt.b' + rel: assessment-for + links: + - href: '#ir-2_smt' + rel: assessment-for - id: ir-2_asm-examine name: assessment-method props: @@ -6051,6 +6812,9 @@ catalog: value: IR-02(03)[01] class: sp800-53a prose: incident response training on how to identify and respond to a breach is provided; + links: + - href: '#ir-2.3_smt' + rel: assessment-for - id: ir-2.3_obj-2 name: assessment-objective props: @@ -6058,6 +6822,12 @@ catalog: value: IR-02(03)[02] class: sp800-53a prose: incident response training on the organization’s process for reporting a breach is provided. + links: + - href: '#ir-2.3_smt' + rel: assessment-for + links: + - href: '#ir-2.3_smt' + rel: assessment-for - id: ir-2.3_asm-examine name: assessment-method props: @@ -6179,6 +6949,9 @@ catalog: value: IR-03 class: sp800-53a prose: 'the effectiveness of the incident response capability for the system is tested {{ insert: param, ir-03_odp.01 }} using {{ insert: param, ir-03_odp.02 }}.' + links: + - href: '#ir-3_smt' + rel: assessment-for - id: ir-3_asm-examine name: assessment-method props: @@ -6358,6 +7131,9 @@ catalog: value: IR-04a.[01] class: sp800-53a prose: an incident handling capability for incidents is implemented that is consistent with the incident response plan; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-2 name: assessment-objective props: @@ -6365,6 +7141,9 @@ catalog: value: IR-04a.[02] class: sp800-53a prose: the incident handling capability for incidents includes preparation; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-3 name: assessment-objective props: @@ -6372,6 +7151,9 @@ catalog: value: IR-04a.[03] class: sp800-53a prose: the incident handling capability for incidents includes detection and analysis; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-4 name: assessment-objective props: @@ -6379,6 +7161,9 @@ catalog: value: IR-04a.[04] class: sp800-53a prose: the incident handling capability for incidents includes containment; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-5 name: assessment-objective props: @@ -6386,6 +7171,9 @@ catalog: value: IR-04a.[05] class: sp800-53a prose: the incident handling capability for incidents includes eradication; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-6 name: assessment-objective props: @@ -6393,6 +7181,12 @@ catalog: value: IR-04a.[06] class: sp800-53a prose: the incident handling capability for incidents includes recovery; + links: + - href: '#ir-4_smt.a' + rel: assessment-for + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.b name: assessment-objective props: @@ -6400,6 +7194,9 @@ catalog: value: IR-04b. class: sp800-53a prose: incident handling activities are coordinated with contingency planning activities; + links: + - href: '#ir-4_smt.b' + rel: assessment-for - id: ir-4_obj.c name: assessment-objective props: @@ -6414,6 +7211,9 @@ catalog: value: IR-04c.[01] class: sp800-53a prose: lessons learned from ongoing incident handling activities are incorporated into incident response procedures, training, and testing; + links: + - href: '#ir-4_smt.c' + rel: assessment-for - id: ir-4_obj.c-2 name: assessment-objective props: @@ -6421,6 +7221,12 @@ catalog: value: IR-04c.[02] class: sp800-53a prose: the changes resulting from the incorporated lessons learned are implemented accordingly; + links: + - href: '#ir-4_smt.c' + rel: assessment-for + links: + - href: '#ir-4_smt.c' + rel: assessment-for - id: ir-4_obj.d name: assessment-objective props: @@ -6435,6 +7241,9 @@ catalog: value: IR-04d.[01] class: sp800-53a prose: the rigor of incident handling activities is comparable and predictable across the organization; + links: + - href: '#ir-4_smt.d' + rel: assessment-for - id: ir-4_obj.d-2 name: assessment-objective props: @@ -6442,6 +7251,9 @@ catalog: value: IR-04d.[02] class: sp800-53a prose: the intensity of incident handling activities is comparable and predictable across the organization; + links: + - href: '#ir-4_smt.d' + rel: assessment-for - id: ir-4_obj.d-3 name: assessment-objective props: @@ -6449,6 +7261,9 @@ catalog: value: IR-04d.[03] class: sp800-53a prose: the scope of incident handling activities is comparable and predictable across the organization; + links: + - href: '#ir-4_smt.d' + rel: assessment-for - id: ir-4_obj.d-4 name: assessment-objective props: @@ -6456,6 +7271,15 @@ catalog: value: IR-04d.[04] class: sp800-53a prose: the results of incident handling activities are comparable and predictable across the organization. + links: + - href: '#ir-4_smt.d' + rel: assessment-for + links: + - href: '#ir-4_smt.d' + rel: assessment-for + links: + - href: '#ir-4_smt' + rel: assessment-for - id: ir-4_asm-examine name: assessment-method props: @@ -6577,6 +7401,9 @@ catalog: value: IR-05[01] class: sp800-53a prose: incidents are tracked; + links: + - href: '#ir-5_smt' + rel: assessment-for - id: ir-5_obj-2 name: assessment-objective props: @@ -6584,6 +7411,12 @@ catalog: value: IR-05[02] class: sp800-53a prose: incidents are documented. + links: + - href: '#ir-5_smt' + rel: assessment-for + links: + - href: '#ir-5_smt' + rel: assessment-for - id: ir-5_asm-examine name: assessment-method props: @@ -6728,6 +7561,9 @@ catalog: value: IR-06a. class: sp800-53a prose: 'personnel is/are required to report suspected incidents to the organizational incident response capability within {{ insert: param, ir-06_odp.01 }};' + links: + - href: '#ir-6_smt.a' + rel: assessment-for - id: ir-6_obj.b name: assessment-objective props: @@ -6735,6 +7571,12 @@ catalog: value: IR-06b. class: sp800-53a prose: 'incident information is reported to {{ insert: param, ir-06_odp.02 }}.' + links: + - href: '#ir-6_smt.b' + rel: assessment-for + links: + - href: '#ir-6_smt' + rel: assessment-for - id: ir-6_asm-examine name: assessment-method props: @@ -6854,6 +7696,9 @@ catalog: value: IR-07[01] class: sp800-53a prose: an incident response support resource, integral to the organizational incident response capability, is provided; + links: + - href: '#ir-7_smt' + rel: assessment-for - id: ir-7_obj-2 name: assessment-objective props: @@ -6861,6 +7706,12 @@ catalog: value: IR-07[02] class: sp800-53a prose: the incident response support resource offers advice and assistance to users of the system for the response and reporting of incidents. + links: + - href: '#ir-7_smt' + rel: assessment-for + links: + - href: '#ir-7_smt' + rel: assessment-for - id: ir-7_asm-examine name: assessment-method props: @@ -7158,6 +8009,9 @@ catalog: value: IR-08a.01 class: sp800-53a prose: an incident response plan is developed that provides the organization with a roadmap for implementing its incident response capability; + links: + - href: '#ir-8_smt.a.1' + rel: assessment-for - id: ir-8_obj.a.2 name: assessment-objective props: @@ -7165,6 +8019,9 @@ catalog: value: IR-08a.02 class: sp800-53a prose: an incident response plan is developed that describes the structure and organization of the incident response capability; + links: + - href: '#ir-8_smt.a.2' + rel: assessment-for - id: ir-8_obj.a.3 name: assessment-objective props: @@ -7172,6 +8029,9 @@ catalog: value: IR-08a.03 class: sp800-53a prose: an incident response plan is developed that provides a high-level approach for how the incident response capability fits into the overall organization; + links: + - href: '#ir-8_smt.a.3' + rel: assessment-for - id: ir-8_obj.a.4 name: assessment-objective props: @@ -7179,6 +8039,9 @@ catalog: value: IR-08a.04 class: sp800-53a prose: an incident response plan is developed that meets the unique requirements of the organization with regard to mission, size, structure, and functions; + links: + - href: '#ir-8_smt.a.4' + rel: assessment-for - id: ir-8_obj.a.5 name: assessment-objective props: @@ -7186,6 +8049,9 @@ catalog: value: IR-08a.05 class: sp800-53a prose: an incident response plan is developed that defines reportable incidents; + links: + - href: '#ir-8_smt.a.5' + rel: assessment-for - id: ir-8_obj.a.6 name: assessment-objective props: @@ -7193,6 +8059,9 @@ catalog: value: IR-08a.06 class: sp800-53a prose: an incident response plan is developed that provides metrics for measuring the incident response capability within the organization; + links: + - href: '#ir-8_smt.a.6' + rel: assessment-for - id: ir-8_obj.a.7 name: assessment-objective props: @@ -7200,6 +8069,9 @@ catalog: value: IR-08a.07 class: sp800-53a prose: an incident response plan is developed that defines the resources and management support needed to effectively maintain and mature an incident response capability; + links: + - href: '#ir-8_smt.a.7' + rel: assessment-for - id: ir-8_obj.a.8 name: assessment-objective props: @@ -7207,6 +8079,9 @@ catalog: value: IR-08a.08 class: sp800-53a prose: an incident response plan is developed that addresses the sharing of incident information; + links: + - href: '#ir-8_smt.a.8' + rel: assessment-for - id: ir-8_obj.a.9 name: assessment-objective props: @@ -7214,6 +8089,9 @@ catalog: value: IR-08a.09 class: sp800-53a prose: 'an incident response plan is developed that is reviewed and approved by {{ insert: param, ir-08_odp.01 }} {{ insert: param, ir-08_odp.02 }};' + links: + - href: '#ir-8_smt.a.9' + rel: assessment-for - id: ir-8_obj.a.10 name: assessment-objective props: @@ -7221,6 +8099,12 @@ catalog: value: IR-08a.10 class: sp800-53a prose: 'an incident response plan is developed that explicitly designates responsibility for incident response to {{ insert: param, ir-08_odp.03 }}.' + links: + - href: '#ir-8_smt.a.10' + rel: assessment-for + links: + - href: '#ir-8_smt.a' + rel: assessment-for - id: ir-8_obj.b name: assessment-objective props: @@ -7235,6 +8119,9 @@ catalog: value: IR-08b.[01] class: sp800-53a prose: 'copies of the incident response plan are distributed to {{ insert: param, ir-08_odp.04 }};' + links: + - href: '#ir-8_smt.b' + rel: assessment-for - id: ir-8_obj.b-2 name: assessment-objective props: @@ -7242,6 +8129,12 @@ catalog: value: IR-08b.[02] class: sp800-53a prose: 'copies of the incident response plan are distributed to {{ insert: param, ir-08_odp.05 }};' + links: + - href: '#ir-8_smt.b' + rel: assessment-for + links: + - href: '#ir-8_smt.b' + rel: assessment-for - id: ir-8_obj.c name: assessment-objective props: @@ -7249,6 +8142,9 @@ catalog: value: IR-08c. class: sp800-53a prose: the incident response plan is updated to address system and organizational changes or problems encountered during plan implementation, execution, or testing; + links: + - href: '#ir-8_smt.c' + rel: assessment-for - id: ir-8_obj.d name: assessment-objective props: @@ -7263,6 +8159,9 @@ catalog: value: IR-08d.[01] class: sp800-53a prose: 'incident response plan changes are communicated to {{ insert: param, ir-08_odp.06 }};' + links: + - href: '#ir-8_smt.d' + rel: assessment-for - id: ir-8_obj.d-2 name: assessment-objective props: @@ -7270,6 +8169,12 @@ catalog: value: IR-08d.[02] class: sp800-53a prose: 'incident response plan changes are communicated to {{ insert: param, ir-08_odp.07 }};' + links: + - href: '#ir-8_smt.d' + rel: assessment-for + links: + - href: '#ir-8_smt.d' + rel: assessment-for - id: ir-8_obj.e name: assessment-objective props: @@ -7284,6 +8189,9 @@ catalog: value: IR-08e.[01] class: sp800-53a prose: the incident response plan is protected from unauthorized disclosure; + links: + - href: '#ir-8_smt.e' + rel: assessment-for - id: ir-8_obj.e-2 name: assessment-objective props: @@ -7291,6 +8199,15 @@ catalog: value: IR-08e.[02] class: sp800-53a prose: the incident response plan is protected from unauthorized modification. + links: + - href: '#ir-8_smt.e' + rel: assessment-for + links: + - href: '#ir-8_smt.e' + rel: assessment-for + links: + - href: '#ir-8_smt' + rel: assessment-for - id: ir-8_asm-examine name: assessment-method props: @@ -7413,6 +8330,9 @@ catalog: value: IR-08(01)(a) class: sp800-53a prose: the incident response plan for breaches involving personally identifiable information includes a process to determine if notice to individuals or other organizations, including oversight organizations, is needed; + links: + - href: '#ir-8.1_smt.a' + rel: assessment-for - id: ir-8.1_obj.b name: assessment-objective props: @@ -7420,6 +8340,9 @@ catalog: value: IR-08(01)(b) class: sp800-53a prose: the incident response plan for breaches involving personally identifiable information includes an assessment process to determine the extent of the harm, embarrassment, inconvenience, or unfairness to affected individuals and any mechanisms to mitigate such harms; + links: + - href: '#ir-8.1_smt.b' + rel: assessment-for - id: ir-8.1_obj.c name: assessment-objective props: @@ -7427,6 +8350,12 @@ catalog: value: IR-08(01)(c) class: sp800-53a prose: the incident response plan for breaches involving personally identifiable information includes the identification of applicable privacy requirements. + links: + - href: '#ir-8.1_smt.c' + rel: assessment-for + links: + - href: '#ir-8.1_smt' + rel: assessment-for - id: ir-8.1_asm-examine name: assessment-method props: @@ -7691,6 +8620,9 @@ catalog: value: MP-01a.[01] class: sp800-53a prose: a media protection policy is developed and documented; + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.a-2 name: assessment-objective props: @@ -7698,6 +8630,9 @@ catalog: value: MP-01a.[02] class: sp800-53a prose: 'the media protection policy is disseminated to {{ insert: param, mp-01_odp.01 }};' + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.a-3 name: assessment-objective props: @@ -7705,6 +8640,9 @@ catalog: value: MP-01a.[03] class: sp800-53a prose: media protection procedures to facilitate the implementation of the media protection policy and associated media protection controls are developed and documented; + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.a-4 name: assessment-objective props: @@ -7712,6 +8650,9 @@ catalog: value: MP-01a.[04] class: sp800-53a prose: 'the media protection procedures are disseminated to {{ insert: param, mp-01_odp.02 }};' + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.a.1 name: assessment-objective props: @@ -7733,6 +8674,9 @@ catalog: value: MP-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses purpose;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-2 name: assessment-objective props: @@ -7740,6 +8684,9 @@ catalog: value: MP-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses scope;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-3 name: assessment-objective props: @@ -7747,6 +8694,9 @@ catalog: value: MP-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses roles;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-4 name: assessment-objective props: @@ -7754,6 +8704,9 @@ catalog: value: MP-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses responsibilities;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-5 name: assessment-objective props: @@ -7761,6 +8714,9 @@ catalog: value: MP-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses management commitment;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-6 name: assessment-objective props: @@ -7768,6 +8724,9 @@ catalog: value: MP-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses coordination among organizational entities;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-7 name: assessment-objective props: @@ -7775,6 +8734,12 @@ catalog: value: MP-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy compliance;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.b name: assessment-objective props: @@ -7782,6 +8747,15 @@ catalog: value: MP-01a.01(b) class: sp800-53a prose: the media protection policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines; + links: + - href: '#mp-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#mp-1_smt.a.1' + rel: assessment-for + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.b name: assessment-objective props: @@ -7789,6 +8763,9 @@ catalog: value: MP-01b. class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the media protection policy and procedures.' + links: + - href: '#mp-1_smt.b' + rel: assessment-for - id: mp-1_obj.c name: assessment-objective props: @@ -7810,6 +8787,9 @@ catalog: value: MP-01c.01[01] class: sp800-53a prose: 'the current media protection policy is reviewed and updated {{ insert: param, mp-01_odp.05 }}; ' + links: + - href: '#mp-1_smt.c.1' + rel: assessment-for - id: mp-1_obj.c.1-2 name: assessment-objective props: @@ -7817,6 +8797,12 @@ catalog: value: MP-01c.01[02] class: sp800-53a prose: 'the current media protection policy is reviewed and updated following {{ insert: param, mp-01_odp.06 }};' + links: + - href: '#mp-1_smt.c.1' + rel: assessment-for + links: + - href: '#mp-1_smt.c.1' + rel: assessment-for - id: mp-1_obj.c.2 name: assessment-objective props: @@ -7831,6 +8817,9 @@ catalog: value: MP-01c.02[01] class: sp800-53a prose: 'the current media protection procedures are reviewed and updated {{ insert: param, mp-01_odp.07 }}; ' + links: + - href: '#mp-1_smt.c.2' + rel: assessment-for - id: mp-1_obj.c.2-2 name: assessment-objective props: @@ -7838,6 +8827,18 @@ catalog: value: MP-01c.02[02] class: sp800-53a prose: 'the current media protection procedures are reviewed and updated following {{ insert: param, mp-01_odp.08 }}.' + links: + - href: '#mp-1_smt.c.2' + rel: assessment-for + links: + - href: '#mp-1_smt.c.2' + rel: assessment-for + links: + - href: '#mp-1_smt.c' + rel: assessment-for + links: + - href: '#mp-1_smt' + rel: assessment-for - id: mp-1_asm-examine name: assessment-method props: @@ -8046,6 +9047,9 @@ catalog: value: MP-06a.[01] class: sp800-53a prose: ' {{ insert: param, mp-06_odp.01 }} is sanitized using {{ insert: param, mp-06_odp.04 }} prior to disposal;' + links: + - href: '#mp-6_smt.a' + rel: assessment-for - id: mp-6_obj.a-2 name: assessment-objective props: @@ -8053,6 +9057,9 @@ catalog: value: MP-06a.[02] class: sp800-53a prose: ' {{ insert: param, mp-06_odp.02 }} is sanitized using {{ insert: param, mp-06_odp.05 }} prior to release from organizational control;' + links: + - href: '#mp-6_smt.a' + rel: assessment-for - id: mp-6_obj.a-3 name: assessment-objective props: @@ -8060,6 +9067,12 @@ catalog: value: MP-06a.[03] class: sp800-53a prose: ' {{ insert: param, mp-06_odp.03 }} is sanitized using {{ insert: param, mp-06_odp.06 }} prior to release for reuse;' + links: + - href: '#mp-6_smt.a' + rel: assessment-for + links: + - href: '#mp-6_smt.a' + rel: assessment-for - id: mp-6_obj.b name: assessment-objective props: @@ -8067,6 +9080,12 @@ catalog: value: MP-06b. class: sp800-53a prose: sanitization mechanisms with strength and integrity commensurate with the security category or classification of the information are employed. + links: + - href: '#mp-6_smt.b' + rel: assessment-for + links: + - href: '#mp-6_smt' + rel: assessment-for - id: mp-6_asm-examine name: assessment-method props: @@ -8234,6 +9253,9 @@ catalog: value: PE-08a. class: sp800-53a prose: 'visitor access records for the facility where the system resides are maintained for {{ insert: param, pe-08_odp.01 }};' + links: + - href: '#pe-8_smt.a' + rel: assessment-for - id: pe-8_obj.b name: assessment-objective props: @@ -8241,6 +9263,9 @@ catalog: value: PE-08b. class: sp800-53a prose: 'visitor access records are reviewed {{ insert: param, pe-08_odp.02 }};' + links: + - href: '#pe-8_smt.b' + rel: assessment-for - id: pe-8_obj.c name: assessment-objective props: @@ -8248,6 +9273,12 @@ catalog: value: PE-08c. class: sp800-53a prose: 'visitor access records anomalies are reported to {{ insert: param, pe-08_odp.03 }}.' + links: + - href: '#pe-8_smt.c' + rel: assessment-for + links: + - href: '#pe-8_smt' + rel: assessment-for - id: pe-8_asm-examine name: assessment-method props: @@ -8354,6 +9385,9 @@ catalog: value: PE-08(03) class: sp800-53a prose: 'personally identifiable information contained in visitor access records is limited to {{ insert: param, pe-08.03_odp }} identified in the privacy risk assessment.' + links: + - href: '#pe-8.3_smt' + rel: assessment-for - id: pe-8.3_asm-examine name: assessment-method props: @@ -8624,6 +9658,9 @@ catalog: value: PL-01a.[01] class: sp800-53a prose: a planning policy is developed and documented. + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.a-2 name: assessment-objective props: @@ -8631,6 +9668,9 @@ catalog: value: PL-01a.[02] class: sp800-53a prose: 'the planning policy is disseminated to {{ insert: param, pl-01_odp.01 }};' + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.a-3 name: assessment-objective props: @@ -8638,6 +9678,9 @@ catalog: value: PL-01a.[03] class: sp800-53a prose: planning procedures to facilitate the implementation of the planning policy and associated planning controls are developed and documented; + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.a-4 name: assessment-objective props: @@ -8645,6 +9688,9 @@ catalog: value: PL-01a.[04] class: sp800-53a prose: 'the planning procedures are disseminated to {{ insert: param, pl-01_odp.02 }};' + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.a.1 name: assessment-objective props: @@ -8666,6 +9712,9 @@ catalog: value: PL-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses purpose;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-2 name: assessment-objective props: @@ -8673,6 +9722,9 @@ catalog: value: PL-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses scope;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-3 name: assessment-objective props: @@ -8680,6 +9732,9 @@ catalog: value: PL-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses roles;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-4 name: assessment-objective props: @@ -8687,6 +9742,9 @@ catalog: value: PL-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses responsibilities;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-5 name: assessment-objective props: @@ -8694,6 +9752,9 @@ catalog: value: PL-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses management commitment;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-6 name: assessment-objective props: @@ -8701,6 +9762,9 @@ catalog: value: PL-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses coordination among organizational entities;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-7 name: assessment-objective props: @@ -8708,6 +9772,12 @@ catalog: value: PL-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses compliance;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.b name: assessment-objective props: @@ -8715,6 +9785,15 @@ catalog: value: PL-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#pl-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#pl-1_smt.a.1' + rel: assessment-for + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.b name: assessment-objective props: @@ -8722,6 +9801,9 @@ catalog: value: PL-01b. class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the planning policy and procedures;' + links: + - href: '#pl-1_smt.b' + rel: assessment-for - id: pl-1_obj.c name: assessment-objective props: @@ -8743,6 +9825,9 @@ catalog: value: PL-01c.01[01] class: sp800-53a prose: 'the current planning policy is reviewed and updated {{ insert: param, pl-01_odp.05 }};' + links: + - href: '#pl-1_smt.c.1' + rel: assessment-for - id: pl-1_obj.c.1-2 name: assessment-objective props: @@ -8750,6 +9835,12 @@ catalog: value: PL-01c.01[02] class: sp800-53a prose: 'the current planning policy is reviewed and updated following {{ insert: param, pl-01_odp.06 }};' + links: + - href: '#pl-1_smt.c.1' + rel: assessment-for + links: + - href: '#pl-1_smt.c.1' + rel: assessment-for - id: pl-1_obj.c.2 name: assessment-objective props: @@ -8764,6 +9855,9 @@ catalog: value: PL-01c.02[01] class: sp800-53a prose: 'the current planning procedures are reviewed and updated {{ insert: param, pl-01_odp.07 }};' + links: + - href: '#pl-1_smt.c.2' + rel: assessment-for - id: pl-1_obj.c.2-2 name: assessment-objective props: @@ -8771,6 +9865,18 @@ catalog: value: PL-01c.02[02] class: sp800-53a prose: 'the current planning procedures are reviewed and updated following {{ insert: param, pl-01_odp.08 }}.' + links: + - href: '#pl-1_smt.c.2' + rel: assessment-for + links: + - href: '#pl-1_smt.c.2' + rel: assessment-for + links: + - href: '#pl-1_smt.c' + rel: assessment-for + links: + - href: '#pl-1_smt' + rel: assessment-for - id: pl-1_asm-examine name: assessment-method props: @@ -9101,6 +10207,9 @@ catalog: value: PL-02a.01[01] class: sp800-53a prose: a security plan for the system is developed that is consistent with the organization’s enterprise architecture; + links: + - href: '#pl-2_smt.a.1' + rel: assessment-for - id: pl-2_obj.a.1-2 name: assessment-objective props: @@ -9108,6 +10217,12 @@ catalog: value: PL-02a.01[02] class: sp800-53a prose: a privacy plan for the system is developed that is consistent with the organization’s enterprise architecture; + links: + - href: '#pl-2_smt.a.1' + rel: assessment-for + links: + - href: '#pl-2_smt.a.1' + rel: assessment-for - id: pl-2_obj.a.2 name: assessment-objective props: @@ -9122,6 +10237,9 @@ catalog: value: PL-02a.02[01] class: sp800-53a prose: a security plan for the system is developed that explicitly defines the constituent system components; + links: + - href: '#pl-2_smt.a.2' + rel: assessment-for - id: pl-2_obj.a.2-2 name: assessment-objective props: @@ -9129,6 +10247,12 @@ catalog: value: PL-02a.02[02] class: sp800-53a prose: a privacy plan for the system is developed that explicitly defines the constituent system components; + links: + - href: '#pl-2_smt.a.2' + rel: assessment-for + links: + - href: '#pl-2_smt.a.2' + rel: assessment-for - id: pl-2_obj.a.3 name: assessment-objective props: @@ -9143,6 +10267,9 @@ catalog: value: PL-02a.03[01] class: sp800-53a prose: a security plan for the system is developed that describes the operational context of the system in terms of mission and business processes; + links: + - href: '#pl-2_smt.a.3' + rel: assessment-for - id: pl-2_obj.a.3-2 name: assessment-objective props: @@ -9150,6 +10277,12 @@ catalog: value: PL-02a.03[02] class: sp800-53a prose: a privacy plan for the system is developed that describes the operational context of the system in terms of mission and business processes; + links: + - href: '#pl-2_smt.a.3' + rel: assessment-for + links: + - href: '#pl-2_smt.a.3' + rel: assessment-for - id: pl-2_obj.a.4 name: assessment-objective props: @@ -9164,6 +10297,9 @@ catalog: value: PL-02a.04[01] class: sp800-53a prose: a security plan for the system is developed that identifies the individuals that fulfill system roles and responsibilities; + links: + - href: '#pl-2_smt.a.4' + rel: assessment-for - id: pl-2_obj.a.4-2 name: assessment-objective props: @@ -9171,6 +10307,12 @@ catalog: value: PL-02a.04[02] class: sp800-53a prose: a privacy plan for the system is developed that identifies the individuals that fulfill system roles and responsibilities; + links: + - href: '#pl-2_smt.a.4' + rel: assessment-for + links: + - href: '#pl-2_smt.a.4' + rel: assessment-for - id: pl-2_obj.a.5 name: assessment-objective props: @@ -9185,6 +10327,9 @@ catalog: value: PL-02a.05[01] class: sp800-53a prose: a security plan for the system is developed that identifies the information types processed, stored, and transmitted by the system; + links: + - href: '#pl-2_smt.a.5' + rel: assessment-for - id: pl-2_obj.a.5-2 name: assessment-objective props: @@ -9192,6 +10337,12 @@ catalog: value: PL-02a.05[02] class: sp800-53a prose: a privacy plan for the system is developed that identifies the information types processed, stored, and transmitted by the system; + links: + - href: '#pl-2_smt.a.5' + rel: assessment-for + links: + - href: '#pl-2_smt.a.5' + rel: assessment-for - id: pl-2_obj.a.6 name: assessment-objective props: @@ -9206,6 +10357,9 @@ catalog: value: PL-02a.06[01] class: sp800-53a prose: a security plan for the system is developed that provides the security categorization of the system, including supporting rationale; + links: + - href: '#pl-2_smt.a.6' + rel: assessment-for - id: pl-2_obj.a.6-2 name: assessment-objective props: @@ -9213,6 +10367,12 @@ catalog: value: PL-02a.06[02] class: sp800-53a prose: a privacy plan for the system is developed that provides the security categorization of the system, including supporting rationale; + links: + - href: '#pl-2_smt.a.6' + rel: assessment-for + links: + - href: '#pl-2_smt.a.6' + rel: assessment-for - id: pl-2_obj.a.7 name: assessment-objective props: @@ -9227,6 +10387,9 @@ catalog: value: PL-02a.07[01] class: sp800-53a prose: a security plan for the system is developed that describes any specific threats to the system that are of concern to the organization; + links: + - href: '#pl-2_smt.a.7' + rel: assessment-for - id: pl-2_obj.a.7-2 name: assessment-objective props: @@ -9234,6 +10397,12 @@ catalog: value: PL-02a.07[02] class: sp800-53a prose: a privacy plan for the system is developed that describes any specific threats to the system that are of concern to the organization; + links: + - href: '#pl-2_smt.a.7' + rel: assessment-for + links: + - href: '#pl-2_smt.a.7' + rel: assessment-for - id: pl-2_obj.a.8 name: assessment-objective props: @@ -9248,6 +10417,9 @@ catalog: value: PL-02a.08[01] class: sp800-53a prose: a security plan for the system is developed that provides the results of a privacy risk assessment for systems processing personally identifiable information; + links: + - href: '#pl-2_smt.a.8' + rel: assessment-for - id: pl-2_obj.a.8-2 name: assessment-objective props: @@ -9255,6 +10427,12 @@ catalog: value: PL-02a.08[02] class: sp800-53a prose: a privacy plan for the system is developed that provides the results of a privacy risk assessment for systems processing personally identifiable information; + links: + - href: '#pl-2_smt.a.8' + rel: assessment-for + links: + - href: '#pl-2_smt.a.8' + rel: assessment-for - id: pl-2_obj.a.9 name: assessment-objective props: @@ -9269,6 +10447,9 @@ catalog: value: PL-02a.09[01] class: sp800-53a prose: a security plan for the system is developed that describes the operational environment for the system and any dependencies on or connections to other systems or system components; + links: + - href: '#pl-2_smt.a.9' + rel: assessment-for - id: pl-2_obj.a.9-2 name: assessment-objective props: @@ -9276,6 +10457,12 @@ catalog: value: PL-02a.09[02] class: sp800-53a prose: a privacy plan for the system is developed that describes the operational environment for the system and any dependencies on or connections to other systems or system components; + links: + - href: '#pl-2_smt.a.9' + rel: assessment-for + links: + - href: '#pl-2_smt.a.9' + rel: assessment-for - id: pl-2_obj.a.10 name: assessment-objective props: @@ -9290,6 +10477,9 @@ catalog: value: PL-02a.10[01] class: sp800-53a prose: a security plan for the system is developed that provides an overview of the security requirements for the system; + links: + - href: '#pl-2_smt.a.10' + rel: assessment-for - id: pl-2_obj.a.10-2 name: assessment-objective props: @@ -9297,6 +10487,12 @@ catalog: value: PL-02a.10[02] class: sp800-53a prose: a privacy plan for the system is developed that provides an overview of the privacy requirements for the system; + links: + - href: '#pl-2_smt.a.10' + rel: assessment-for + links: + - href: '#pl-2_smt.a.10' + rel: assessment-for - id: pl-2_obj.a.11 name: assessment-objective props: @@ -9311,6 +10507,9 @@ catalog: value: PL-02a.11[01] class: sp800-53a prose: a security plan for the system is developed that identifies any relevant control baselines or overlays, if applicable; + links: + - href: '#pl-2_smt.a.11' + rel: assessment-for - id: pl-2_obj.a.11-2 name: assessment-objective props: @@ -9318,6 +10517,12 @@ catalog: value: PL-02a.11[02] class: sp800-53a prose: a privacy plan for the system is developed that identifies any relevant control baselines or overlays, if applicable; + links: + - href: '#pl-2_smt.a.11' + rel: assessment-for + links: + - href: '#pl-2_smt.a.11' + rel: assessment-for - id: pl-2_obj.a.12 name: assessment-objective props: @@ -9332,6 +10537,9 @@ catalog: value: PL-02a.12[01] class: sp800-53a prose: a security plan for the system is developed that describes the controls in place or planned for meeting the security requirements, including rationale for any tailoring decisions; + links: + - href: '#pl-2_smt.a.12' + rel: assessment-for - id: pl-2_obj.a.12-2 name: assessment-objective props: @@ -9339,6 +10547,12 @@ catalog: value: PL-02a.12[02] class: sp800-53a prose: a privacy plan for the system is developed that describes the controls in place or planned for meeting the privacy requirements, including rationale for any tailoring decisions; + links: + - href: '#pl-2_smt.a.12' + rel: assessment-for + links: + - href: '#pl-2_smt.a.12' + rel: assessment-for - id: pl-2_obj.a.13 name: assessment-objective props: @@ -9353,6 +10567,9 @@ catalog: value: PL-02a.13[01] class: sp800-53a prose: a security plan for the system is developed that includes risk determinations for security architecture and design decisions; + links: + - href: '#pl-2_smt.a.13' + rel: assessment-for - id: pl-2_obj.a.13-2 name: assessment-objective props: @@ -9360,6 +10577,12 @@ catalog: value: PL-02a.13[02] class: sp800-53a prose: a privacy plan for the system is developed that includes risk determinations for privacy architecture and design decisions; + links: + - href: '#pl-2_smt.a.13' + rel: assessment-for + links: + - href: '#pl-2_smt.a.13' + rel: assessment-for - id: pl-2_obj.a.14 name: assessment-objective props: @@ -9374,6 +10597,9 @@ catalog: value: PL-02a.14[01] class: sp800-53a prose: 'a security plan for the system is developed that includes security-related activities affecting the system that require planning and coordination with {{ insert: param, pl-02_odp.01 }};' + links: + - href: '#pl-2_smt.a.14' + rel: assessment-for - id: pl-2_obj.a.14-2 name: assessment-objective props: @@ -9381,6 +10607,12 @@ catalog: value: PL-02a.14[02] class: sp800-53a prose: 'a privacy plan for the system is developed that includes privacy-related activities affecting the system that require planning and coordination with {{ insert: param, pl-02_odp.01 }};' + links: + - href: '#pl-2_smt.a.14' + rel: assessment-for + links: + - href: '#pl-2_smt.a.14' + rel: assessment-for - id: pl-2_obj.a.15 name: assessment-objective props: @@ -9395,6 +10627,9 @@ catalog: value: PL-02a.15[01] class: sp800-53a prose: a security plan for the system is developed that is reviewed and approved by the authorizing official or designated representative prior to plan implementation; + links: + - href: '#pl-2_smt.a.15' + rel: assessment-for - id: pl-2_obj.a.15-2 name: assessment-objective props: @@ -9402,6 +10637,15 @@ catalog: value: PL-02a.15[02] class: sp800-53a prose: a privacy plan for the system is developed that is reviewed and approved by the authorizing official or designated representative prior to plan implementation. + links: + - href: '#pl-2_smt.a.15' + rel: assessment-for + links: + - href: '#pl-2_smt.a.15' + rel: assessment-for + links: + - href: '#pl-2_smt.a' + rel: assessment-for - id: pl-2_obj.b name: assessment-objective props: @@ -9416,6 +10660,9 @@ catalog: value: PL-02b.[01] class: sp800-53a prose: 'copies of the plans are distributed to {{ insert: param, pl-02_odp.02 }};' + links: + - href: '#pl-2_smt.b' + rel: assessment-for - id: pl-2_obj.b-2 name: assessment-objective props: @@ -9423,6 +10670,12 @@ catalog: value: PL-02b.[02] class: sp800-53a prose: 'subsequent changes to the plans are communicated to {{ insert: param, pl-02_odp.02 }};' + links: + - href: '#pl-2_smt.b' + rel: assessment-for + links: + - href: '#pl-2_smt.b' + rel: assessment-for - id: pl-2_obj.c name: assessment-objective props: @@ -9430,6 +10683,9 @@ catalog: value: PL-02c. class: sp800-53a prose: 'plans are reviewed {{ insert: param, pl-02_odp.03 }};' + links: + - href: '#pl-2_smt.c' + rel: assessment-for - id: pl-2_obj.d name: assessment-objective props: @@ -9444,6 +10700,9 @@ catalog: value: PL-02d.[01] class: sp800-53a prose: plans are updated to address changes to the system and environment of operations; + links: + - href: '#pl-2_smt.d' + rel: assessment-for - id: pl-2_obj.d-2 name: assessment-objective props: @@ -9451,6 +10710,9 @@ catalog: value: PL-02d.[02] class: sp800-53a prose: plans are updated to address problems identified during the plan implementation; + links: + - href: '#pl-2_smt.d' + rel: assessment-for - id: pl-2_obj.d-3 name: assessment-objective props: @@ -9458,6 +10720,12 @@ catalog: value: PL-02d.[03] class: sp800-53a prose: plans are updated to address problems identified during control assessments; + links: + - href: '#pl-2_smt.d' + rel: assessment-for + links: + - href: '#pl-2_smt.d' + rel: assessment-for - id: pl-2_obj.e name: assessment-objective props: @@ -9472,6 +10740,9 @@ catalog: value: PL-02e.[01] class: sp800-53a prose: plans are protected from unauthorized disclosure; + links: + - href: '#pl-2_smt.e' + rel: assessment-for - id: pl-2_obj.e-2 name: assessment-objective props: @@ -9479,6 +10750,15 @@ catalog: value: PL-02e.[02] class: sp800-53a prose: plans are protected from unauthorized modification. + links: + - href: '#pl-2_smt.e' + rel: assessment-for + links: + - href: '#pl-2_smt.e' + rel: assessment-for + links: + - href: '#pl-2_smt' + rel: assessment-for - id: pl-2_asm-examine name: assessment-method props: @@ -9691,6 +10971,9 @@ catalog: value: PL-04a.[01] class: sp800-53a prose: rules that describe responsibilities and expected behavior for information and system usage, security, and privacy are established for individuals requiring access to the system; + links: + - href: '#pl-4_smt.a' + rel: assessment-for - id: pl-4_obj.a-2 name: assessment-objective props: @@ -9698,6 +10981,12 @@ catalog: value: PL-04a.[02] class: sp800-53a prose: rules that describe responsibilities and expected behavior for information and system usage, security, and privacy are provided to individuals requiring access to the system; + links: + - href: '#pl-4_smt.a' + rel: assessment-for + links: + - href: '#pl-4_smt.a' + rel: assessment-for - id: pl-4_obj.b name: assessment-objective props: @@ -9705,6 +10994,9 @@ catalog: value: PL-04b. class: sp800-53a prose: before authorizing access to information and the system, a documented acknowledgement from such individuals indicating that they have read, understand, and agree to abide by the rules of behavior is received; + links: + - href: '#pl-4_smt.b' + rel: assessment-for - id: pl-4_obj.c name: assessment-objective props: @@ -9712,6 +11004,9 @@ catalog: value: PL-04c. class: sp800-53a prose: 'rules of behavior are reviewed and updated {{ insert: param, pl-04_odp.01 }};' + links: + - href: '#pl-4_smt.c' + rel: assessment-for - id: pl-4_obj.d name: assessment-objective props: @@ -9719,6 +11014,12 @@ catalog: value: PL-04d. class: sp800-53a prose: 'individuals who have acknowledged a previous version of the rules of behavior are required to read and reacknowledge {{ insert: param, pl-04_odp.02 }}.' + links: + - href: '#pl-4_smt.d' + rel: assessment-for + links: + - href: '#pl-4_smt' + rel: assessment-for - id: pl-4_asm-examine name: assessment-method props: @@ -9841,6 +11142,9 @@ catalog: value: PL-04(01)(a) class: sp800-53a prose: the rules of behavior include restrictions on the use of social media, social networking sites, and external sites/applications; + links: + - href: '#pl-4.1_smt.a' + rel: assessment-for - id: pl-4.1_obj.b name: assessment-objective props: @@ -9848,6 +11152,9 @@ catalog: value: PL-04(01)(b) class: sp800-53a prose: the rules of behavior include restrictions on posting organizational information on public websites; + links: + - href: '#pl-4.1_smt.b' + rel: assessment-for - id: pl-4.1_obj.c name: assessment-objective props: @@ -9855,6 +11162,12 @@ catalog: value: PL-04(01)(c) class: sp800-53a prose: the rules of behavior include restrictions on the use of organization-provided identifiers (e.g., email addresses) and authentication secrets (e.g., passwords) for creating accounts on external sites/applications. + links: + - href: '#pl-4.1_smt.c' + rel: assessment-for + links: + - href: '#pl-4.1_smt' + rel: assessment-for - id: pl-4.1_asm-examine name: assessment-method props: @@ -10049,6 +11362,9 @@ catalog: value: PL-08a.01 class: sp800-53a prose: a security architecture for the system describes the requirements and approach to be taken for protecting the confidentiality, integrity, and availability of organizational information; + links: + - href: '#pl-8_smt.a.1' + rel: assessment-for - id: pl-8_obj.a.2 name: assessment-objective props: @@ -10056,6 +11372,9 @@ catalog: value: PL-08a.02 class: sp800-53a prose: a privacy architecture describes the requirements and approach to be taken for processing personally identifiable information to minimize privacy risk to individuals; + links: + - href: '#pl-8_smt.a.2' + rel: assessment-for - id: pl-8_obj.a.3 name: assessment-objective props: @@ -10070,6 +11389,9 @@ catalog: value: PL-08a.03[01] class: sp800-53a prose: a security architecture for the system describes how the architecture is integrated into and supports the enterprise architecture; + links: + - href: '#pl-8_smt.a.3' + rel: assessment-for - id: pl-8_obj.a.3-2 name: assessment-objective props: @@ -10077,6 +11399,12 @@ catalog: value: PL-08a.03[02] class: sp800-53a prose: a privacy architecture for the system describes how the architecture is integrated into and supports the enterprise architecture; + links: + - href: '#pl-8_smt.a.3' + rel: assessment-for + links: + - href: '#pl-8_smt.a.3' + rel: assessment-for - id: pl-8_obj.a.4 name: assessment-objective props: @@ -10091,6 +11419,9 @@ catalog: value: PL-08a.04[01] class: sp800-53a prose: a security architecture for the system describes any assumptions about and dependencies on external systems and services; + links: + - href: '#pl-8_smt.a.4' + rel: assessment-for - id: pl-8_obj.a.4-2 name: assessment-objective props: @@ -10098,6 +11429,15 @@ catalog: value: PL-08a.04[02] class: sp800-53a prose: a privacy architecture for the system describes any assumptions about and dependencies on external systems and services; + links: + - href: '#pl-8_smt.a.4' + rel: assessment-for + links: + - href: '#pl-8_smt.a.4' + rel: assessment-for + links: + - href: '#pl-8_smt.a' + rel: assessment-for - id: pl-8_obj.b name: assessment-objective props: @@ -10105,6 +11445,9 @@ catalog: value: PL-08b. class: sp800-53a prose: 'changes in the enterprise architecture are reviewed and updated {{ insert: param, pl-08_odp }} to reflect changes in the enterprise architecture;' + links: + - href: '#pl-8_smt.b' + rel: assessment-for - id: pl-8_obj.c name: assessment-objective props: @@ -10119,6 +11462,9 @@ catalog: value: PL-08c.[01] class: sp800-53a prose: planned architecture changes are reflected in the security plan; + links: + - href: '#pl-8_smt.c' + rel: assessment-for - id: pl-8_obj.c-2 name: assessment-objective props: @@ -10126,6 +11472,9 @@ catalog: value: PL-08c.[02] class: sp800-53a prose: planned architecture changes are reflected in the privacy plan; + links: + - href: '#pl-8_smt.c' + rel: assessment-for - id: pl-8_obj.c-3 name: assessment-objective props: @@ -10133,6 +11482,9 @@ catalog: value: PL-08c.[03] class: sp800-53a prose: planned architecture changes are reflected in the Concept of Operations (CONOPS); + links: + - href: '#pl-8_smt.c' + rel: assessment-for - id: pl-8_obj.c-4 name: assessment-objective props: @@ -10140,6 +11492,9 @@ catalog: value: PL-08c.[04] class: sp800-53a prose: planned architecture changes are reflected in criticality analysis; + links: + - href: '#pl-8_smt.c' + rel: assessment-for - id: pl-8_obj.c-5 name: assessment-objective props: @@ -10147,6 +11502,9 @@ catalog: value: PL-08c.[05] class: sp800-53a prose: planned architecture changes are reflected in organizational procedures; + links: + - href: '#pl-8_smt.c' + rel: assessment-for - id: pl-8_obj.c-6 name: assessment-objective props: @@ -10154,6 +11512,15 @@ catalog: value: PL-08c.[06] class: sp800-53a prose: planned architecture changes are reflected in procurements and acquisitions. + links: + - href: '#pl-8_smt.c' + rel: assessment-for + links: + - href: '#pl-8_smt.c' + rel: assessment-for + links: + - href: '#pl-8_smt' + rel: assessment-for - id: pl-8_asm-examine name: assessment-method props: @@ -10273,6 +11640,9 @@ catalog: value: PL-09 class: sp800-53a prose: ' {{ insert: param, pl-09_odp }} are centrally managed.' + links: + - href: '#pl-9_smt' + rel: assessment-for - id: pl-9_asm-examine name: assessment-method props: @@ -10405,6 +11775,9 @@ catalog: value: PM-03a.[01] class: sp800-53a prose: the resources needed to implement the information security program are included in capital planning and investment requests, and all exceptions are documented; + links: + - href: '#pm-3_smt.a' + rel: assessment-for - id: pm-3_obj.a-2 name: assessment-objective props: @@ -10412,6 +11785,12 @@ catalog: value: PM-03a.[02] class: sp800-53a prose: the resources needed to implement the privacy program are included in capital planning and investment requests, and all exceptions are documented; + links: + - href: '#pm-3_smt.a' + rel: assessment-for + links: + - href: '#pm-3_smt.a' + rel: assessment-for - id: pm-3_obj.b name: assessment-objective props: @@ -10426,6 +11805,9 @@ catalog: value: PM-03b.[01] class: sp800-53a prose: the documentation required for addressing the information security program in capital planning and investment requests is prepared in accordance with applicable laws, executive orders, directives, policies, regulations, standards; + links: + - href: '#pm-3_smt.b' + rel: assessment-for - id: pm-3_obj.b-2 name: assessment-objective props: @@ -10433,6 +11815,12 @@ catalog: value: PM-03b.[02] class: sp800-53a prose: the documentation required for addressing the privacy program in capital planning and investment requests is prepared in accordance with applicable laws, executive orders, directives, policies, regulations, standards; + links: + - href: '#pm-3_smt.b' + rel: assessment-for + links: + - href: '#pm-3_smt.b' + rel: assessment-for - id: pm-3_obj.c name: assessment-objective props: @@ -10447,6 +11835,9 @@ catalog: value: PM-03c.[01] class: sp800-53a prose: information security resources are made available for expenditure as planned; + links: + - href: '#pm-3_smt.c' + rel: assessment-for - id: pm-3_obj.c-2 name: assessment-objective props: @@ -10454,6 +11845,15 @@ catalog: value: PM-03c.[02] class: sp800-53a prose: privacy resources are made available for expenditure as planned. + links: + - href: '#pm-3_smt.c' + rel: assessment-for + links: + - href: '#pm-3_smt.c' + rel: assessment-for + links: + - href: '#pm-3_smt' + rel: assessment-for - id: pm-3_asm-examine name: assessment-method props: @@ -10614,6 +12014,9 @@ catalog: value: PM-04a.01[01] class: sp800-53a prose: a process to ensure that plans of action and milestones for the information security program and associated organizational systems are developed; + links: + - href: '#pm-4_smt.a.1' + rel: assessment-for - id: pm-4_obj.a.1-2 name: assessment-objective props: @@ -10621,6 +12024,9 @@ catalog: value: PM-04a.01[02] class: sp800-53a prose: a process to ensure that plans of action and milestones for the information security program and associated organizational systems are maintained; + links: + - href: '#pm-4_smt.a.1' + rel: assessment-for - id: pm-4_obj.a.1-3 name: assessment-objective props: @@ -10628,6 +12034,9 @@ catalog: value: PM-04a.01[03] class: sp800-53a prose: a process to ensure that plans of action and milestones for the privacy program and associated organizational systems are developed; + links: + - href: '#pm-4_smt.a.1' + rel: assessment-for - id: pm-4_obj.a.1-4 name: assessment-objective props: @@ -10635,6 +12044,9 @@ catalog: value: PM-04a.01[04] class: sp800-53a prose: a process to ensure that plans of action and milestones for the privacy program and associated organizational systems are maintained; + links: + - href: '#pm-4_smt.a.1' + rel: assessment-for - id: pm-4_obj.a.1-5 name: assessment-objective props: @@ -10642,6 +12054,9 @@ catalog: value: PM-04a.01[05] class: sp800-53a prose: a process to ensure that plans of action and milestones for the supply chain risk management program and associated organizational systems are developed; + links: + - href: '#pm-4_smt.a.1' + rel: assessment-for - id: pm-4_obj.a.1-6 name: assessment-objective props: @@ -10649,6 +12064,12 @@ catalog: value: PM-04a.01[06] class: sp800-53a prose: a process to ensure that plans of action and milestones for the supply chain risk management program and associated organizational systems are maintained; + links: + - href: '#pm-4_smt.a.1' + rel: assessment-for + links: + - href: '#pm-4_smt.a.1' + rel: assessment-for - id: pm-4_obj.a.2 name: assessment-objective props: @@ -10663,6 +12084,9 @@ catalog: value: PM-04a.02[01] class: sp800-53a prose: a process to ensure that plans of action and milestones for the information security program and associated organizational systems document remedial information security risk management actions to adequately respond to risks to organizational operations and assets, individuals, other organizations, and the Nation; + links: + - href: '#pm-4_smt.a.2' + rel: assessment-for - id: pm-4_obj.a.2-2 name: assessment-objective props: @@ -10670,6 +12094,9 @@ catalog: value: PM-04a.02[02] class: sp800-53a prose: a process to ensure that plans of action and milestones for the privacy program and associated organizational systems document remedial privacy risk management actions to adequately respond to risks to organizational operations and assets, individuals, other organizations, and the Nation; + links: + - href: '#pm-4_smt.a.2' + rel: assessment-for - id: pm-4_obj.a.2-3 name: assessment-objective props: @@ -10677,6 +12104,12 @@ catalog: value: PM-04a.02[03] class: sp800-53a prose: a process to ensure that plans of action and milestones for the supply chain risk management program and associated organizational systems document remedial supply chain risk management actions to adequately respond to risks to organizational operations and assets, individuals, other organizations, and the Nation; + links: + - href: '#pm-4_smt.a.2' + rel: assessment-for + links: + - href: '#pm-4_smt.a.2' + rel: assessment-for - id: pm-4_obj.a.3 name: assessment-objective props: @@ -10691,6 +12124,9 @@ catalog: value: PM-04a.03[01] class: sp800-53a prose: a process to ensure that plans of action and milestones for the information security risk management programs and associated organizational systems are reported in accordance with established reporting requirements; + links: + - href: '#pm-4_smt.a.3' + rel: assessment-for - id: pm-4_obj.a.3-2 name: assessment-objective props: @@ -10698,6 +12134,9 @@ catalog: value: PM-04a.03[02] class: sp800-53a prose: a process to ensure that plans of action and milestones for the privacy risk management programs and associated organizational systems are reported in accordance with established reporting requirements; + links: + - href: '#pm-4_smt.a.3' + rel: assessment-for - id: pm-4_obj.a.3-3 name: assessment-objective props: @@ -10705,6 +12144,15 @@ catalog: value: PM-04a.03[03] class: sp800-53a prose: a process to ensure that plans of action and milestones for the supply chain risk management programs and associated organizational systems are reported in accordance with established reporting requirements; + links: + - href: '#pm-4_smt.a.3' + rel: assessment-for + links: + - href: '#pm-4_smt.a.3' + rel: assessment-for + links: + - href: '#pm-4_smt.a' + rel: assessment-for - id: pm-4_obj.b name: assessment-objective props: @@ -10719,6 +12167,9 @@ catalog: value: PM-04b.[01] class: sp800-53a prose: plans of action and milestones are reviewed for consistency with the organizational risk management strategy; + links: + - href: '#pm-4_smt.b' + rel: assessment-for - id: pm-4_obj.b-2 name: assessment-objective props: @@ -10726,6 +12177,15 @@ catalog: value: PM-04b.[02] class: sp800-53a prose: plans of action and milestones are reviewed for consistency with organization-wide priorities for risk response actions. + links: + - href: '#pm-4_smt.b' + rel: assessment-for + links: + - href: '#pm-4_smt.b' + rel: assessment-for + links: + - href: '#pm-4_smt' + rel: assessment-for - id: pm-4_asm-examine name: assessment-method props: @@ -10834,6 +12294,9 @@ catalog: value: PM-05[01] class: sp800-53a prose: an inventory of organizational systems is developed; + links: + - href: '#pm-5_smt' + rel: assessment-for - id: pm-5_obj-2 name: assessment-objective props: @@ -10841,6 +12304,12 @@ catalog: value: PM-05[02] class: sp800-53a prose: 'the inventory of organizational systems is updated {{ insert: param, pm-05_odp }}.' + links: + - href: '#pm-5_smt' + rel: assessment-for + links: + - href: '#pm-5_smt' + rel: assessment-for - id: pm-5_asm-examine name: assessment-method props: @@ -10964,6 +12433,9 @@ catalog: value: PM-05(01)[01] class: sp800-53a prose: an inventory of all systems, applications, and projects that process personally identifiable information is established; + links: + - href: '#pm-5.1_smt' + rel: assessment-for - id: pm-5.1_obj-2 name: assessment-objective props: @@ -10971,6 +12443,9 @@ catalog: value: PM-05(01)[02] class: sp800-53a prose: an inventory of all systems, applications, and projects that process personally identifiable information is maintained; + links: + - href: '#pm-5.1_smt' + rel: assessment-for - id: pm-5.1_obj-3 name: assessment-objective props: @@ -10978,6 +12453,12 @@ catalog: value: PM-05(01)[03] class: sp800-53a prose: 'an inventory of all systems, applications, and projects that process personally identifiable information is updated {{ insert: param, pm-05.01_odp }}.' + links: + - href: '#pm-5.1_smt' + rel: assessment-for + links: + - href: '#pm-5.1_smt' + rel: assessment-for - id: pm-5.1_asm-examine name: assessment-method props: @@ -11092,6 +12573,9 @@ catalog: value: PM-06[01] class: sp800-53a prose: information security measures of performance are developed; + links: + - href: '#pm-6_smt' + rel: assessment-for - id: pm-6_obj-2 name: assessment-objective props: @@ -11099,6 +12583,9 @@ catalog: value: PM-06[02] class: sp800-53a prose: information security measures of performance are monitored; + links: + - href: '#pm-6_smt' + rel: assessment-for - id: pm-6_obj-3 name: assessment-objective props: @@ -11106,6 +12593,9 @@ catalog: value: PM-06[03] class: sp800-53a prose: the results of information security measures of performance are reported; + links: + - href: '#pm-6_smt' + rel: assessment-for - id: pm-6_obj-4 name: assessment-objective props: @@ -11113,6 +12603,9 @@ catalog: value: PM-06[04] class: sp800-53a prose: privacy measures of performance are developed; + links: + - href: '#pm-6_smt' + rel: assessment-for - id: pm-6_obj-5 name: assessment-objective props: @@ -11120,6 +12613,9 @@ catalog: value: PM-06[05] class: sp800-53a prose: privacy measures of performance are monitored; + links: + - href: '#pm-6_smt' + rel: assessment-for - id: pm-6_obj-6 name: assessment-objective props: @@ -11127,6 +12623,12 @@ catalog: value: PM-06[06] class: sp800-53a prose: the results of privacy measures of performance are reported. + links: + - href: '#pm-6_smt' + rel: assessment-for + links: + - href: '#pm-6_smt' + rel: assessment-for - id: pm-6_asm-examine name: assessment-method props: @@ -11246,6 +12748,9 @@ catalog: value: PM-07[01] class: sp800-53a prose: an enterprise architecture is developed with consideration for information security; + links: + - href: '#pm-7_smt' + rel: assessment-for - id: pm-7_obj-2 name: assessment-objective props: @@ -11253,6 +12758,9 @@ catalog: value: PM-07[02] class: sp800-53a prose: an enterprise architecture is maintained with consideration for information security; + links: + - href: '#pm-7_smt' + rel: assessment-for - id: pm-7_obj-3 name: assessment-objective props: @@ -11260,6 +12768,9 @@ catalog: value: PM-07[03] class: sp800-53a prose: an enterprise architecture is developed with consideration for privacy; + links: + - href: '#pm-7_smt' + rel: assessment-for - id: pm-7_obj-4 name: assessment-objective props: @@ -11267,6 +12778,9 @@ catalog: value: PM-07[04] class: sp800-53a prose: an enterprise architecture is maintained with consideration for privacy; + links: + - href: '#pm-7_smt' + rel: assessment-for - id: pm-7_obj-5 name: assessment-objective props: @@ -11274,6 +12788,9 @@ catalog: value: PM-07[05] class: sp800-53a prose: an enterprise architecture is developed with consideration for the resulting risk to organizational operations and assets, individuals, other organizations, and the Nation; + links: + - href: '#pm-7_smt' + rel: assessment-for - id: pm-7_obj-6 name: assessment-objective props: @@ -11281,6 +12798,12 @@ catalog: value: PM-07[06] class: sp800-53a prose: an enterprise architecture is maintained with consideration for the resulting risk to organizational operations and assets, individuals, other organizations, and the Nation. + links: + - href: '#pm-7_smt' + rel: assessment-for + links: + - href: '#pm-7_smt' + rel: assessment-for - id: pm-7_asm-examine name: assessment-method props: @@ -11400,6 +12923,9 @@ catalog: value: PM-08[01] class: sp800-53a prose: information security issues are addressed in the development of a critical infrastructure and key resources protection plan; + links: + - href: '#pm-8_smt' + rel: assessment-for - id: pm-8_obj-2 name: assessment-objective props: @@ -11407,6 +12933,9 @@ catalog: value: PM-08[02] class: sp800-53a prose: information security issues are addressed in the documentation of a critical infrastructure and key resources protection plan; + links: + - href: '#pm-8_smt' + rel: assessment-for - id: pm-8_obj-3 name: assessment-objective props: @@ -11414,6 +12943,9 @@ catalog: value: PM-08[03] class: sp800-53a prose: information security issues are addressed in the update of a critical infrastructure and key resources protection plan; + links: + - href: '#pm-8_smt' + rel: assessment-for - id: pm-8_obj-4 name: assessment-objective props: @@ -11421,6 +12953,9 @@ catalog: value: PM-08[04] class: sp800-53a prose: privacy issues are addressed in the development of a critical infrastructure and key resources protection plan; + links: + - href: '#pm-8_smt' + rel: assessment-for - id: pm-8_obj-5 name: assessment-objective props: @@ -11428,6 +12963,9 @@ catalog: value: PM-08[05] class: sp800-53a prose: privacy issues are addressed in the documentation of a critical infrastructure and key resources protection plan; + links: + - href: '#pm-8_smt' + rel: assessment-for - id: pm-8_obj-6 name: assessment-objective props: @@ -11435,6 +12973,12 @@ catalog: value: PM-08[06] class: sp800-53a prose: privacy issues are addressed in the update of a critical infrastructure and key resources protection plan. + links: + - href: '#pm-8_smt' + rel: assessment-for + links: + - href: '#pm-8_smt' + rel: assessment-for - id: pm-8_asm-examine name: assessment-method props: @@ -11666,6 +13210,9 @@ catalog: value: PM-09a.01 class: sp800-53a prose: a comprehensive strategy is developed to manage security risk to organizational operations and assets, individuals, other organizations, and the Nation associated with the operation and use of organizational systems; + links: + - href: '#pm-9_smt.a.1' + rel: assessment-for - id: pm-9_obj.a.2 name: assessment-objective props: @@ -11673,6 +13220,12 @@ catalog: value: PM-09a.02 class: sp800-53a prose: a comprehensive strategy is developed to manage privacy risk to individuals resulting from the authorized processing of personally identifiable information; + links: + - href: '#pm-9_smt.a.2' + rel: assessment-for + links: + - href: '#pm-9_smt.a' + rel: assessment-for - id: pm-9_obj.b name: assessment-objective props: @@ -11680,6 +13233,9 @@ catalog: value: PM-09b. class: sp800-53a prose: the risk management strategy is implemented consistently across the organization; + links: + - href: '#pm-9_smt.b' + rel: assessment-for - id: pm-9_obj.c name: assessment-objective props: @@ -11687,6 +13243,12 @@ catalog: value: PM-09c. class: sp800-53a prose: 'the risk management strategy is reviewed and updated {{ insert: param, pm-09_odp }} or as required to address organizational changes.' + links: + - href: '#pm-9_smt.c' + rel: assessment-for + links: + - href: '#pm-9_smt' + rel: assessment-for - id: pm-9_asm-examine name: assessment-method props: @@ -11820,6 +13382,9 @@ catalog: value: PM-10a.[01] class: sp800-53a prose: the security state of organizational systems and the environments in which those systems operate are managed through authorization processes; + links: + - href: '#pm-10_smt.a' + rel: assessment-for - id: pm-10_obj.a-2 name: assessment-objective props: @@ -11827,6 +13392,12 @@ catalog: value: PM-10a.[02] class: sp800-53a prose: the privacy state of organizational systems and the environments in which those systems operate are managed through authorization processes; + links: + - href: '#pm-10_smt.a' + rel: assessment-for + links: + - href: '#pm-10_smt.a' + rel: assessment-for - id: pm-10_obj.b name: assessment-objective props: @@ -11834,6 +13405,9 @@ catalog: value: PM-10b. class: sp800-53a prose: individuals are designated to fulfill specific roles and responsibilities within the organizational risk management process; + links: + - href: '#pm-10_smt.b' + rel: assessment-for - id: pm-10_obj.c name: assessment-objective props: @@ -11841,6 +13415,12 @@ catalog: value: PM-10c. class: sp800-53a prose: the authorization processes are integrated into an organization-wide risk management program. + links: + - href: '#pm-10_smt.c' + rel: assessment-for + links: + - href: '#pm-10_smt' + rel: assessment-for - id: pm-10_asm-examine name: assessment-method props: @@ -12004,6 +13584,9 @@ catalog: value: PM-11a.[01] class: sp800-53a prose: organizational mission and business processes are defined with consideration for information security; + links: + - href: '#pm-11_smt.a' + rel: assessment-for - id: pm-11_obj.a-2 name: assessment-objective props: @@ -12011,6 +13594,9 @@ catalog: value: PM-11a.[02] class: sp800-53a prose: organizational mission and business processes are defined with consideration for privacy; + links: + - href: '#pm-11_smt.a' + rel: assessment-for - id: pm-11_obj.a-3 name: assessment-objective props: @@ -12018,6 +13604,12 @@ catalog: value: PM-11a.[03] class: sp800-53a prose: organizational mission and business processes are defined with consideration for the resulting risk to organizational operations, organizational assets, individuals, other organizations, and the Nation; + links: + - href: '#pm-11_smt.a' + rel: assessment-for + links: + - href: '#pm-11_smt.a' + rel: assessment-for - id: pm-11_obj.b name: assessment-objective props: @@ -12032,6 +13624,9 @@ catalog: value: PM-11b.[01] class: sp800-53a prose: information protection needs arising from the defined mission and business processes are determined; + links: + - href: '#pm-11_smt.b' + rel: assessment-for - id: pm-11_obj.b-2 name: assessment-objective props: @@ -12039,6 +13634,12 @@ catalog: value: PM-11b.[02] class: sp800-53a prose: personally identifiable information processing needs arising from the defined mission and business processes are determined; + links: + - href: '#pm-11_smt.b' + rel: assessment-for + links: + - href: '#pm-11_smt.b' + rel: assessment-for - id: pm-11_obj.c name: assessment-objective props: @@ -12046,6 +13647,12 @@ catalog: value: PM-11c. class: sp800-53a prose: 'the mission and business processes are reviewed and revised {{ insert: param, pm-11_odp }}.' + links: + - href: '#pm-11_smt.c' + rel: assessment-for + links: + - href: '#pm-11_smt' + rel: assessment-for - id: pm-11_asm-examine name: assessment-method props: @@ -12148,6 +13755,9 @@ catalog: value: PM-13[01] class: sp800-53a prose: a security workforce development and improvement program is established; + links: + - href: '#pm-13_smt' + rel: assessment-for - id: pm-13_obj-2 name: assessment-objective props: @@ -12155,6 +13765,12 @@ catalog: value: PM-13[02] class: sp800-53a prose: a privacy workforce development and improvement program is established. + links: + - href: '#pm-13_smt' + rel: assessment-for + links: + - href: '#pm-13_smt' + rel: assessment-for - id: pm-13_asm-examine name: assessment-method props: @@ -12314,6 +13930,9 @@ catalog: value: PM-14a.01[01] class: sp800-53a prose: a process is implemented for ensuring that organizational plans for conducting security testing, training, and monitoring activities associated with organizational systems are developed; + links: + - href: '#pm-14_smt.a.1' + rel: assessment-for - id: pm-14_obj.a.1-2 name: assessment-objective props: @@ -12321,6 +13940,9 @@ catalog: value: PM-14a.01[02] class: sp800-53a prose: a process is implemented for ensuring that organizational plans for conducting security testing, training, and monitoring activities associated with organizational systems are maintained; + links: + - href: '#pm-14_smt.a.1' + rel: assessment-for - id: pm-14_obj.a.1-3 name: assessment-objective props: @@ -12328,6 +13950,9 @@ catalog: value: PM-14a.01[03] class: sp800-53a prose: a process is implemented for ensuring that organizational plans for conducting privacy testing, training, and monitoring activities associated with organizational systems are developed; + links: + - href: '#pm-14_smt.a.1' + rel: assessment-for - id: pm-14_obj.a.1-4 name: assessment-objective props: @@ -12335,6 +13960,12 @@ catalog: value: PM-14a.01[04] class: sp800-53a prose: a process is implemented for ensuring that organizational plans for conducting privacy testing, training, and monitoring activities associated with organizational systems are maintained; + links: + - href: '#pm-14_smt.a.1' + rel: assessment-for + links: + - href: '#pm-14_smt.a.1' + rel: assessment-for - id: pm-14_obj.a.2 name: assessment-objective props: @@ -12349,6 +13980,9 @@ catalog: value: PM-14a.02[01] class: sp800-53a prose: a process is implemented for ensuring that organizational plans for conducting security testing, training, and monitoring activities associated with organizational systems continue to be executed; + links: + - href: '#pm-14_smt.a.2' + rel: assessment-for - id: pm-14_obj.a.2-2 name: assessment-objective props: @@ -12356,6 +13990,15 @@ catalog: value: PM-14a.02[02] class: sp800-53a prose: a process is implemented for ensuring that organizational plans for conducting privacy testing, training, and monitoring activities associated with organizational systems continue to be executed; + links: + - href: '#pm-14_smt.a.2' + rel: assessment-for + links: + - href: '#pm-14_smt.a.2' + rel: assessment-for + links: + - href: '#pm-14_smt.a' + rel: assessment-for - id: pm-14_obj.b name: assessment-objective props: @@ -12370,6 +14013,9 @@ catalog: value: PM-14b.[01] class: sp800-53a prose: testing plans are reviewed for consistency with the organizational risk management strategy; + links: + - href: '#pm-14_smt.b' + rel: assessment-for - id: pm-14_obj.b-2 name: assessment-objective props: @@ -12377,6 +14023,9 @@ catalog: value: PM-14b.[02] class: sp800-53a prose: training plans are reviewed for consistency with the organizational risk management strategy; + links: + - href: '#pm-14_smt.b' + rel: assessment-for - id: pm-14_obj.b-3 name: assessment-objective props: @@ -12384,6 +14033,9 @@ catalog: value: PM-14b.[03] class: sp800-53a prose: monitoring plans are reviewed for consistency with the organizational risk management strategy; + links: + - href: '#pm-14_smt.b' + rel: assessment-for - id: pm-14_obj.b-4 name: assessment-objective props: @@ -12391,6 +14043,9 @@ catalog: value: PM-14b.[04] class: sp800-53a prose: testing plans are reviewed for consistency with organization-wide priorities for risk response actions; + links: + - href: '#pm-14_smt.b' + rel: assessment-for - id: pm-14_obj.b-5 name: assessment-objective props: @@ -12398,6 +14053,9 @@ catalog: value: PM-14b.[05] class: sp800-53a prose: training plans are reviewed for consistency with organization-wide priorities for risk response actions; + links: + - href: '#pm-14_smt.b' + rel: assessment-for - id: pm-14_obj.b-6 name: assessment-objective props: @@ -12405,6 +14063,15 @@ catalog: value: PM-14b.[06] class: sp800-53a prose: monitoring plans are reviewed for consistency with organization-wide priorities for risk response actions. + links: + - href: '#pm-14_smt.b' + rel: assessment-for + links: + - href: '#pm-14_smt.b' + rel: assessment-for + links: + - href: '#pm-14_smt' + rel: assessment-for - id: pm-14_asm-examine name: assessment-method props: @@ -12560,6 +14227,9 @@ catalog: value: PM-17a.[01] class: sp800-53a prose: policy is established to ensure that requirements for the protection of controlled unclassified information that is processed, stored, or transmitted on external systems are implemented in accordance with applicable laws, executive orders, directives, policies, regulations, and standards; + links: + - href: '#pm-17_smt.a' + rel: assessment-for - id: pm-17_obj.a-2 name: assessment-objective props: @@ -12567,6 +14237,12 @@ catalog: value: PM-17a.[02] class: sp800-53a prose: procedures are established to ensure that requirements for the protection of controlled unclassified information that is processed, stored, or transmitted on external systems are implemented in accordance with applicable laws, executive orders, directives, policies, regulations, and standards; + links: + - href: '#pm-17_smt.a' + rel: assessment-for + links: + - href: '#pm-17_smt.a' + rel: assessment-for - id: pm-17_obj.b name: assessment-objective props: @@ -12581,6 +14257,9 @@ catalog: value: PM-17b.[01] class: sp800-53a prose: 'policy is reviewed and updated {{ insert: param, pm-17_odp.01 }};' + links: + - href: '#pm-17_smt.b' + rel: assessment-for - id: pm-17_obj.b-2 name: assessment-objective props: @@ -12588,6 +14267,15 @@ catalog: value: PM-17b.[02] class: sp800-53a prose: 'procedures are reviewed and updated {{ insert: param, pm-17_odp.02 }} ' + links: + - href: '#pm-17_smt.b' + rel: assessment-for + links: + - href: '#pm-17_smt.b' + rel: assessment-for + links: + - href: '#pm-17_smt' + rel: assessment-for - id: pm-17_asm-examine name: assessment-method props: @@ -12740,6 +14428,9 @@ catalog: value: PM-18a.[01] class: sp800-53a prose: an organization-wide privacy program plan that provides an overview of the agency’s privacy program is developed; + links: + - href: '#pm-18_smt.a' + rel: assessment-for - id: pm-18_obj.a.1 name: assessment-objective props: @@ -12754,6 +14445,9 @@ catalog: value: PM-18a.01[01] class: sp800-53a prose: the privacy program plan includes a description of the structure of the privacy program; + links: + - href: '#pm-18_smt.a.1' + rel: assessment-for - id: pm-18_obj.a.1-2 name: assessment-objective props: @@ -12761,6 +14455,12 @@ catalog: value: PM-18a.01[02] class: sp800-53a prose: the privacy program plan includes a description of the resources dedicated to the privacy program; + links: + - href: '#pm-18_smt.a.1' + rel: assessment-for + links: + - href: '#pm-18_smt.a.1' + rel: assessment-for - id: pm-18_obj.a.2 name: assessment-objective props: @@ -12775,6 +14475,9 @@ catalog: value: PM-18a.02[01] class: sp800-53a prose: the privacy program plan provides an overview of the requirements for the privacy program; + links: + - href: '#pm-18_smt.a.2' + rel: assessment-for - id: pm-18_obj.a.2-2 name: assessment-objective props: @@ -12782,6 +14485,9 @@ catalog: value: PM-18a.02[02] class: sp800-53a prose: the privacy program plan provides a description of the privacy program management controls in place or planned for meeting the requirements of the privacy program; + links: + - href: '#pm-18_smt.a.2' + rel: assessment-for - id: pm-18_obj.a.2-3 name: assessment-objective props: @@ -12789,6 +14495,12 @@ catalog: value: PM-18a.02[03] class: sp800-53a prose: the privacy program plan provides a description of common controls in place or planned for meeting the requirements of the privacy program; + links: + - href: '#pm-18_smt.a.2' + rel: assessment-for + links: + - href: '#pm-18_smt.a.2' + rel: assessment-for - id: pm-18_obj.a.3 name: assessment-objective props: @@ -12803,6 +14515,9 @@ catalog: value: PM-18a.03[01] class: sp800-53a prose: the privacy program plan includes the role of the senior agency official for privacy; + links: + - href: '#pm-18_smt.a.3' + rel: assessment-for - id: pm-18_obj.a.3-2 name: assessment-objective props: @@ -12810,6 +14525,12 @@ catalog: value: PM-18a.03[02] class: sp800-53a prose: the privacy program plan includes the identification and assignment of the roles of other privacy officials and staff and their responsibilities; + links: + - href: '#pm-18_smt.a.3' + rel: assessment-for + links: + - href: '#pm-18_smt.a.3' + rel: assessment-for - id: pm-18_obj.a.4 name: assessment-objective props: @@ -12824,6 +14545,9 @@ catalog: value: PM-18a.04[01] class: sp800-53a prose: the privacy program plan describes management commitment; + links: + - href: '#pm-18_smt.a.4' + rel: assessment-for - id: pm-18_obj.a.4-2 name: assessment-objective props: @@ -12831,6 +14555,9 @@ catalog: value: PM-18a.04[02] class: sp800-53a prose: the privacy program plan describes compliance; + links: + - href: '#pm-18_smt.a.4' + rel: assessment-for - id: pm-18_obj.a.4-3 name: assessment-objective props: @@ -12838,6 +14565,12 @@ catalog: value: PM-18a.04[03] class: sp800-53a prose: the privacy program plan describes the strategic goals and objectives of the privacy program; + links: + - href: '#pm-18_smt.a.4' + rel: assessment-for + links: + - href: '#pm-18_smt.a.4' + rel: assessment-for - id: pm-18_obj.a.5 name: assessment-objective props: @@ -12845,6 +14578,9 @@ catalog: value: PM-18a.05 class: sp800-53a prose: the privacy program plan reflects coordination among organizational entities responsible for the different aspects of privacy; + links: + - href: '#pm-18_smt.a.5' + rel: assessment-for - id: pm-18_obj.a.6 name: assessment-objective props: @@ -12852,6 +14588,9 @@ catalog: value: PM-18a.06 class: sp800-53a prose: the privacy program plan is approved by a senior official with responsibility and accountability for the privacy risk being incurred by organizational operations (including, mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation; + links: + - href: '#pm-18_smt.a.6' + rel: assessment-for - id: pm-18_obj.a-2 name: assessment-objective props: @@ -12859,6 +14598,12 @@ catalog: value: PM-18a.[02] class: sp800-53a prose: the privacy program plan is disseminated; + links: + - href: '#pm-18_smt.a' + rel: assessment-for + links: + - href: '#pm-18_smt.a' + rel: assessment-for - id: pm-18_obj.b name: assessment-objective props: @@ -12873,6 +14618,9 @@ catalog: value: PM-18b.[01] class: sp800-53a prose: 'the privacy program plan is updated {{ insert: param, pm-18_odp }};' + links: + - href: '#pm-18_smt.b' + rel: assessment-for - id: pm-18_obj.b-2 name: assessment-objective props: @@ -12880,6 +14628,9 @@ catalog: value: PM-18b.[02] class: sp800-53a prose: the privacy program plan is updated to address changes in federal privacy laws and policies; + links: + - href: '#pm-18_smt.b' + rel: assessment-for - id: pm-18_obj.b-3 name: assessment-objective props: @@ -12887,6 +14638,9 @@ catalog: value: PM-18b.[03] class: sp800-53a prose: the privacy program plan is updated to address organizational changes; + links: + - href: '#pm-18_smt.b' + rel: assessment-for - id: pm-18_obj.b-4 name: assessment-objective props: @@ -12894,6 +14648,15 @@ catalog: value: PM-18b.[04] class: sp800-53a prose: the privacy program plan is updated to address problems identified during plan implementation or privacy control assessments. + links: + - href: '#pm-18_smt.b' + rel: assessment-for + links: + - href: '#pm-18_smt.b' + rel: assessment-for + links: + - href: '#pm-18_smt' + rel: assessment-for - id: pm-18_asm-examine name: assessment-method props: @@ -12980,6 +14743,9 @@ catalog: value: PM-19[01] class: sp800-53a prose: a senior agency official for privacy with authority, mission, accountability, and resources is appointed; + links: + - href: '#pm-19_smt' + rel: assessment-for - id: pm-19_obj-2 name: assessment-objective props: @@ -12987,6 +14753,9 @@ catalog: value: PM-19[02] class: sp800-53a prose: the senior agency official for privacy coordinates applicable privacy requirements; + links: + - href: '#pm-19_smt' + rel: assessment-for - id: pm-19_obj-3 name: assessment-objective props: @@ -12994,6 +14763,9 @@ catalog: value: PM-19[03] class: sp800-53a prose: the senior agency official for privacy develops applicable privacy requirements; + links: + - href: '#pm-19_smt' + rel: assessment-for - id: pm-19_obj-4 name: assessment-objective props: @@ -13001,6 +14773,9 @@ catalog: value: PM-19[04] class: sp800-53a prose: the senior agency official for privacy implements applicable privacy requirements; + links: + - href: '#pm-19_smt' + rel: assessment-for - id: pm-19_obj-5 name: assessment-objective props: @@ -13008,6 +14783,12 @@ catalog: value: PM-19[05] class: sp800-53a prose: the senior agency official for privacy manages privacy risks through the organization-wide privacy program. + links: + - href: '#pm-19_smt' + rel: assessment-for + links: + - href: '#pm-19_smt' + rel: assessment-for - id: pm-19_asm-examine name: assessment-method props: @@ -13131,6 +14912,9 @@ catalog: value: PM-20[01] class: sp800-53a prose: a central resource webpage is maintained on the organization’s principal public website; + links: + - href: '#pm-20_smt' + rel: assessment-for - id: pm-20_obj-2 name: assessment-objective props: @@ -13138,6 +14922,9 @@ catalog: value: PM-20[02] class: sp800-53a prose: the webpage serves as a central source of information about the organization’s privacy program; + links: + - href: '#pm-20_smt' + rel: assessment-for - id: pm-20_obj.a name: assessment-objective props: @@ -13152,6 +14939,9 @@ catalog: value: PM-20a.[01] class: sp800-53a prose: the webpage ensures that the public has access to information about organizational privacy activities; + links: + - href: '#pm-20_smt.a' + rel: assessment-for - id: pm-20_obj.a-2 name: assessment-objective props: @@ -13159,6 +14949,12 @@ catalog: value: PM-20a.[02] class: sp800-53a prose: the webpage ensures that the public can communicate with its senior agency official for privacy; + links: + - href: '#pm-20_smt.a' + rel: assessment-for + links: + - href: '#pm-20_smt.a' + rel: assessment-for - id: pm-20_obj.b name: assessment-objective props: @@ -13173,6 +14969,9 @@ catalog: value: PM-20b.[01] class: sp800-53a prose: the webpage ensures that organizational privacy practices are publicly available; + links: + - href: '#pm-20_smt.b' + rel: assessment-for - id: pm-20_obj.b-2 name: assessment-objective props: @@ -13180,6 +14979,12 @@ catalog: value: PM-20b.[02] class: sp800-53a prose: the webpage ensures that organizational privacy reports are publicly available; + links: + - href: '#pm-20_smt.b' + rel: assessment-for + links: + - href: '#pm-20_smt.b' + rel: assessment-for - id: pm-20_obj.c name: assessment-objective props: @@ -13187,6 +14992,12 @@ catalog: value: PM-20c. class: sp800-53a prose: the webpage employs publicly facing email addresses and/or phone numbers to enable the public to provide feedback and/or direct questions to privacy offices regarding privacy practices. + links: + - href: '#pm-20_smt.c' + rel: assessment-for + links: + - href: '#pm-20_smt' + rel: assessment-for - id: pm-20_asm-examine name: assessment-method props: @@ -13304,6 +15115,9 @@ catalog: value: PM-20(01)[01] class: sp800-53a prose: privacy policies are developed and posted on all external-facing websites; + links: + - href: '#pm-20.1_smt' + rel: assessment-for - id: pm-20.1_obj-2 name: assessment-objective props: @@ -13311,6 +15125,9 @@ catalog: value: PM-20(01)[02] class: sp800-53a prose: privacy policies are developed and posted on all mobile applications; + links: + - href: '#pm-20.1_smt' + rel: assessment-for - id: pm-20.1_obj-3 name: assessment-objective props: @@ -13318,6 +15135,9 @@ catalog: value: PM-20(01)[03] class: sp800-53a prose: privacy policies are developed and posted on all other digital services; + links: + - href: '#pm-20.1_smt' + rel: assessment-for - id: pm-20.1_obj.a name: assessment-objective props: @@ -13332,6 +15152,9 @@ catalog: value: PM-20(01)(a)[01] class: sp800-53a prose: the privacy policies are written in plain language; + links: + - href: '#pm-20.1_smt.a' + rel: assessment-for - id: pm-20.1_obj.a-2 name: assessment-objective props: @@ -13339,6 +15162,12 @@ catalog: value: PM-20(01)(a)[02] class: sp800-53a prose: the privacy policies are organized in a way that is easy to understand and navigate; + links: + - href: '#pm-20.1_smt.a' + rel: assessment-for + links: + - href: '#pm-20.1_smt.a' + rel: assessment-for - id: pm-20.1_obj.b name: assessment-objective props: @@ -13353,6 +15182,9 @@ catalog: value: PM-20(01)(b)[01] class: sp800-53a prose: the privacy policies provide the information needed by the public to make an informed decision about whether to interact with the organization; + links: + - href: '#pm-20.1_smt.b' + rel: assessment-for - id: pm-20.1_obj.b-2 name: assessment-objective props: @@ -13360,6 +15192,12 @@ catalog: value: PM-20(01)(b)[02] class: sp800-53a prose: the privacy policies provide the information needed by the public to make an informed decision about how to interact with the organization; + links: + - href: '#pm-20.1_smt.b' + rel: assessment-for + links: + - href: '#pm-20.1_smt.b' + rel: assessment-for - id: pm-20.1_obj.c name: assessment-objective props: @@ -13374,6 +15212,9 @@ catalog: value: PM-20(01)(c)[01] class: sp800-53a prose: the privacy policies are updated whenever the organization makes a substantive change to the practices it describes; + links: + - href: '#pm-20.1_smt.c' + rel: assessment-for - id: pm-20.1_obj.c-2 name: assessment-objective props: @@ -13381,6 +15222,15 @@ catalog: value: PM-20(01)(c)[02] class: sp800-53a prose: the privacy policies include a time/date stamp to inform the public of the date of the most recent changes. + links: + - href: '#pm-20.1_smt.c' + rel: assessment-for + links: + - href: '#pm-20.1_smt.c' + rel: assessment-for + links: + - href: '#pm-20.1_smt' + rel: assessment-for - id: pm-20.1_asm-examine name: assessment-method props: @@ -13523,6 +15373,9 @@ catalog: value: PM-21a.01[01] class: sp800-53a prose: the accounting includes the date of each disclosure; + links: + - href: '#pm-21_smt.a.1' + rel: assessment-for - id: pm-21_obj.a.1-2 name: assessment-objective props: @@ -13530,6 +15383,9 @@ catalog: value: PM-21a.01[02] class: sp800-53a prose: the accounting includes the nature of each disclosure; + links: + - href: '#pm-21_smt.a.1' + rel: assessment-for - id: pm-21_obj.a.1-3 name: assessment-objective props: @@ -13537,6 +15393,12 @@ catalog: value: PM-21a.01[03] class: sp800-53a prose: the accounting includes the purpose of each disclosure; + links: + - href: '#pm-21_smt.a.1' + rel: assessment-for + links: + - href: '#pm-21_smt.a.1' + rel: assessment-for - id: pm-21_obj.a.2 name: assessment-objective props: @@ -13551,6 +15413,9 @@ catalog: value: PM-21a.02[01] class: sp800-53a prose: the accounting includes the name of the individual or organization to whom the disclosure was made; + links: + - href: '#pm-21_smt.a.2' + rel: assessment-for - id: pm-21_obj.a.2-2 name: assessment-objective props: @@ -13558,6 +15423,15 @@ catalog: value: PM-21a.02[02] class: sp800-53a prose: the accounting includes the address or other contact information of the individual or organization to whom the disclosure was made; + links: + - href: '#pm-21_smt.a.2' + rel: assessment-for + links: + - href: '#pm-21_smt.a.2' + rel: assessment-for + links: + - href: '#pm-21_smt.a' + rel: assessment-for - id: pm-21_obj.b name: assessment-objective props: @@ -13565,6 +15439,9 @@ catalog: value: PM-21b. class: sp800-53a prose: the accounting of disclosures is retained for the length of time that the personally identifiable information is maintained or five years after the disclosure is made, whichever is longer; + links: + - href: '#pm-21_smt.b' + rel: assessment-for - id: pm-21_obj.c name: assessment-objective props: @@ -13572,6 +15449,12 @@ catalog: value: PM-21c. class: sp800-53a prose: the accounting of disclosures is made available to the individual to whom the personally identifiable information relates upon request. + links: + - href: '#pm-21_smt.c' + rel: assessment-for + links: + - href: '#pm-21_smt' + rel: assessment-for - id: pm-21_asm-examine name: assessment-method props: @@ -13706,6 +15589,9 @@ catalog: value: PM-22[01] class: sp800-53a prose: organization-wide policies for personally identifiable information quality management are developed and documented; + links: + - href: '#pm-22_smt' + rel: assessment-for - id: pm-22_obj-2 name: assessment-objective props: @@ -13713,6 +15599,9 @@ catalog: value: PM-22[02] class: sp800-53a prose: organization-wide procedures for personally identifiable information quality management are developed and documented; + links: + - href: '#pm-22_smt' + rel: assessment-for - id: pm-22_obj.a name: assessment-objective props: @@ -13727,6 +15616,9 @@ catalog: value: PM-22a.[01] class: sp800-53a prose: the policies address reviewing the accuracy of personally identifiable information across the information life cycle; + links: + - href: '#pm-22_smt.a' + rel: assessment-for - id: pm-22_obj.a-2 name: assessment-objective props: @@ -13734,6 +15626,9 @@ catalog: value: PM-22a.[02] class: sp800-53a prose: the policies address reviewing the relevance of personally identifiable information across the information life cycle; + links: + - href: '#pm-22_smt.a' + rel: assessment-for - id: pm-22_obj.a-3 name: assessment-objective props: @@ -13741,6 +15636,9 @@ catalog: value: PM-22a.[03] class: sp800-53a prose: the policies address reviewing the timeliness of personally identifiable information across the information life cycle; + links: + - href: '#pm-22_smt.a' + rel: assessment-for - id: pm-22_obj.a-4 name: assessment-objective props: @@ -13748,6 +15646,9 @@ catalog: value: PM-22a.[04] class: sp800-53a prose: the policies address reviewing the completeness of personally identifiable information across the information life cycle; + links: + - href: '#pm-22_smt.a' + rel: assessment-for - id: pm-22_obj.a-5 name: assessment-objective props: @@ -13755,6 +15656,9 @@ catalog: value: PM-22a.[05] class: sp800-53a prose: the procedures address reviewing the accuracy of personally identifiable information across the information life cycle; + links: + - href: '#pm-22_smt.a' + rel: assessment-for - id: pm-22_obj.a-6 name: assessment-objective props: @@ -13762,6 +15666,9 @@ catalog: value: PM-22a.[06] class: sp800-53a prose: the procedures address reviewing the relevance of personally identifiable information across the information life cycle; + links: + - href: '#pm-22_smt.a' + rel: assessment-for - id: pm-22_obj.a-7 name: assessment-objective props: @@ -13769,6 +15676,9 @@ catalog: value: PM-22a.[07] class: sp800-53a prose: the procedures address reviewing the timeliness of personally identifiable information across the information life cycle; + links: + - href: '#pm-22_smt.a' + rel: assessment-for - id: pm-22_obj.a-8 name: assessment-objective props: @@ -13776,6 +15686,12 @@ catalog: value: PM-22a.[08] class: sp800-53a prose: the procedures address reviewing the completeness of personally identifiable information across the information life cycle; + links: + - href: '#pm-22_smt.a' + rel: assessment-for + links: + - href: '#pm-22_smt.a' + rel: assessment-for - id: pm-22_obj.b name: assessment-objective props: @@ -13790,6 +15706,9 @@ catalog: value: PM-22b.[01] class: sp800-53a prose: the policies address correcting or deleting inaccurate or outdated personally identifiable information; + links: + - href: '#pm-22_smt.b' + rel: assessment-for - id: pm-22_obj.b-2 name: assessment-objective props: @@ -13797,6 +15716,12 @@ catalog: value: PM-22b.[02] class: sp800-53a prose: the procedures address correcting or deleting inaccurate or outdated personally identifiable information; + links: + - href: '#pm-22_smt.b' + rel: assessment-for + links: + - href: '#pm-22_smt.b' + rel: assessment-for - id: pm-22_obj.c name: assessment-objective props: @@ -13811,6 +15736,9 @@ catalog: value: PM-22c.[01] class: sp800-53a prose: the policies address disseminating notice of corrected or deleted personally identifiable information to individuals or other appropriate entities; + links: + - href: '#pm-22_smt.c' + rel: assessment-for - id: pm-22_obj.c-2 name: assessment-objective props: @@ -13818,6 +15746,12 @@ catalog: value: PM-22c.[02] class: sp800-53a prose: the procedures address disseminating notice of corrected or deleted personally identifiable information to individuals or other appropriate entities; + links: + - href: '#pm-22_smt.c' + rel: assessment-for + links: + - href: '#pm-22_smt.c' + rel: assessment-for - id: pm-22_obj.d name: assessment-objective props: @@ -13832,6 +15766,9 @@ catalog: value: PM-22d.[01] class: sp800-53a prose: the policies address appeals of adverse decisions on correction or deletion requests; + links: + - href: '#pm-22_smt.d' + rel: assessment-for - id: pm-22_obj.d-2 name: assessment-objective props: @@ -13839,6 +15776,15 @@ catalog: value: PM-22d.[02] class: sp800-53a prose: the procedures address appeals of adverse decisions on correction or deletion requests. + links: + - href: '#pm-22_smt.d' + rel: assessment-for + links: + - href: '#pm-22_smt.d' + rel: assessment-for + links: + - href: '#pm-22_smt' + rel: assessment-for - id: pm-22_asm-examine name: assessment-method props: @@ -13957,6 +15903,9 @@ catalog: value: PM-24a. class: sp800-53a prose: the Data Integrity Board reviews proposals to conduct or participate in a matching program; + links: + - href: '#pm-24_smt.a' + rel: assessment-for - id: pm-24_obj.b name: assessment-objective props: @@ -13964,6 +15913,12 @@ catalog: value: PM-24b. class: sp800-53a prose: the Data Integrity Board conducts an annual review of all matching programs in which the agency has participated. + links: + - href: '#pm-24_smt.b' + rel: assessment-for + links: + - href: '#pm-24_smt' + rel: assessment-for - id: pm-24_asm-examine name: assessment-method props: @@ -14128,6 +16083,9 @@ catalog: value: PM-25a.[01] class: sp800-53a prose: policies that address the use of personally identifiable information for internal testing are developed and documented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-2 name: assessment-objective props: @@ -14135,6 +16093,9 @@ catalog: value: PM-25a.[02] class: sp800-53a prose: policies that address the use of personally identifiable information for internal training are developed and documented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-3 name: assessment-objective props: @@ -14142,6 +16103,9 @@ catalog: value: PM-25a.[03] class: sp800-53a prose: policies that address the use of personally identifiable information for internal research are developed and documented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-4 name: assessment-objective props: @@ -14149,6 +16113,9 @@ catalog: value: PM-25a.[04] class: sp800-53a prose: procedures that address the use of personally identifiable information for internal testing are developed and documented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-5 name: assessment-objective props: @@ -14156,6 +16123,9 @@ catalog: value: PM-25a.[05] class: sp800-53a prose: procedures that address the use of personally identifiable information for internal training are developed and documented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-6 name: assessment-objective props: @@ -14163,6 +16133,9 @@ catalog: value: PM-25a.[06] class: sp800-53a prose: procedures that address the use of personally identifiable information for internal research are developed and documented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-7 name: assessment-objective props: @@ -14170,6 +16143,9 @@ catalog: value: PM-25a.[07] class: sp800-53a prose: policies that address the use of personally identifiable information for internal testing, are implemented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-8 name: assessment-objective props: @@ -14177,6 +16153,9 @@ catalog: value: PM-25a.[08] class: sp800-53a prose: policies that address the use of personally identifiable information for training are implemented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-9 name: assessment-objective props: @@ -14184,6 +16163,9 @@ catalog: value: PM-25a.[09] class: sp800-53a prose: policies that address the use of personally identifiable information for research are implemented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-10 name: assessment-objective props: @@ -14191,6 +16173,9 @@ catalog: value: PM-25a.[10] class: sp800-53a prose: procedures that address the use of personally identifiable information for internal testing are implemented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-11 name: assessment-objective props: @@ -14198,6 +16183,9 @@ catalog: value: PM-25a.[11] class: sp800-53a prose: procedures that address the use of personally identifiable information for training are implemented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-12 name: assessment-objective props: @@ -14205,6 +16193,12 @@ catalog: value: PM-25a.[12] class: sp800-53a prose: procedures that address the use of personally identifiable information for research are implemented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.b name: assessment-objective props: @@ -14219,6 +16213,9 @@ catalog: value: PM-25b.[01] class: sp800-53a prose: the amount of personally identifiable information used for internal testing purposes is limited or minimized; + links: + - href: '#pm-25_smt.b' + rel: assessment-for - id: pm-25_obj.b-2 name: assessment-objective props: @@ -14226,6 +16223,9 @@ catalog: value: PM-25b.[02] class: sp800-53a prose: the amount of personally identifiable information used for internal training purposes is limited or minimized; + links: + - href: '#pm-25_smt.b' + rel: assessment-for - id: pm-25_obj.b-3 name: assessment-objective props: @@ -14233,6 +16233,12 @@ catalog: value: PM-25b.[03] class: sp800-53a prose: the amount of personally identifiable information used for internal research purposes is limited or minimized; + links: + - href: '#pm-25_smt.b' + rel: assessment-for + links: + - href: '#pm-25_smt.b' + rel: assessment-for - id: pm-25_obj.c name: assessment-objective props: @@ -14247,6 +16253,9 @@ catalog: value: PM-25c.[01] class: sp800-53a prose: the required use of personally identifiable information for internal testing is authorized; + links: + - href: '#pm-25_smt.c' + rel: assessment-for - id: pm-25_obj.c-2 name: assessment-objective props: @@ -14254,6 +16263,9 @@ catalog: value: PM-25c.[02] class: sp800-53a prose: the required use of personally identifiable information for internal training is authorized; + links: + - href: '#pm-25_smt.c' + rel: assessment-for - id: pm-25_obj.c-3 name: assessment-objective props: @@ -14261,6 +16273,12 @@ catalog: value: PM-25c.[03] class: sp800-53a prose: the required use of personally identifiable information for internal research is authorized; + links: + - href: '#pm-25_smt.c' + rel: assessment-for + links: + - href: '#pm-25_smt.c' + rel: assessment-for - id: pm-25_obj.d name: assessment-objective props: @@ -14275,6 +16293,9 @@ catalog: value: PM-25d.[01] class: sp800-53a prose: 'policies are reviewed {{ insert: param, pm-25_odp.01 }};' + links: + - href: '#pm-25_smt.d' + rel: assessment-for - id: pm-25_obj.d-2 name: assessment-objective props: @@ -14282,6 +16303,9 @@ catalog: value: PM-25d.[02] class: sp800-53a prose: 'policies are updated {{ insert: param, pm-25_odp.02 }};' + links: + - href: '#pm-25_smt.d' + rel: assessment-for - id: pm-25_obj.d-3 name: assessment-objective props: @@ -14289,6 +16313,9 @@ catalog: value: PM-25d.[03] class: sp800-53a prose: 'procedures are reviewed {{ insert: param, pm-25_odp.03 }};' + links: + - href: '#pm-25_smt.d' + rel: assessment-for - id: pm-25_obj.d-4 name: assessment-objective props: @@ -14296,6 +16323,15 @@ catalog: value: PM-25d.[04] class: sp800-53a prose: 'procedures are updated {{ insert: param, pm-25_odp.04 }}.' + links: + - href: '#pm-25_smt.d' + rel: assessment-for + links: + - href: '#pm-25_smt.d' + rel: assessment-for + links: + - href: '#pm-25_smt' + rel: assessment-for - id: pm-25_asm-examine name: assessment-method props: @@ -14476,6 +16512,9 @@ catalog: value: PM-26[01] class: sp800-53a prose: a process for receiving complaints, concerns, or questions from individuals about organizational security and privacy practices is implemented; + links: + - href: '#pm-26_smt' + rel: assessment-for - id: pm-26_obj-2 name: assessment-objective props: @@ -14483,6 +16522,9 @@ catalog: value: PM-26[02] class: sp800-53a prose: a process for responding to complaints, concerns, or questions from individuals about organizational security and privacy practices is implemented; + links: + - href: '#pm-26_smt' + rel: assessment-for - id: pm-26_obj.a name: assessment-objective props: @@ -14497,6 +16539,9 @@ catalog: value: PM-26a.[01] class: sp800-53a prose: the complaint management process includes mechanisms that are easy to use by the public; + links: + - href: '#pm-26_smt.a' + rel: assessment-for - id: pm-26_obj.a-2 name: assessment-objective props: @@ -14504,6 +16549,12 @@ catalog: value: PM-26a.[02] class: sp800-53a prose: the complaint management process includes mechanisms that are readily accessible by the public; + links: + - href: '#pm-26_smt.a' + rel: assessment-for + links: + - href: '#pm-26_smt.a' + rel: assessment-for - id: pm-26_obj.b name: assessment-objective props: @@ -14511,6 +16562,9 @@ catalog: value: PM-26b. class: sp800-53a prose: the complaint management process includes all information necessary for successfully filing complaints; + links: + - href: '#pm-26_smt.b' + rel: assessment-for - id: pm-26_obj.c name: assessment-objective props: @@ -14525,6 +16579,9 @@ catalog: value: PM-26c.[01] class: sp800-53a prose: 'the complaint management process includes tracking mechanisms to ensure that all complaints are reviewed within {{ insert: param, pm-26_odp.01 }};' + links: + - href: '#pm-26_smt.c' + rel: assessment-for - id: pm-26_obj.c-2 name: assessment-objective props: @@ -14532,6 +16589,12 @@ catalog: value: PM-26c.[02] class: sp800-53a prose: 'the complaint management process includes tracking mechanisms to ensure that all complaints are addressed within {{ insert: param, pm-26_odp.02 }};' + links: + - href: '#pm-26_smt.c' + rel: assessment-for + links: + - href: '#pm-26_smt.c' + rel: assessment-for - id: pm-26_obj.d name: assessment-objective props: @@ -14539,6 +16602,9 @@ catalog: value: PM-26d. class: sp800-53a prose: 'the complaint management process includes acknowledging the receipt of complaints, concerns, or questions from individuals within {{ insert: param, pm-26_odp.03 }};' + links: + - href: '#pm-26_smt.d' + rel: assessment-for - id: pm-26_obj.e name: assessment-objective props: @@ -14546,6 +16612,12 @@ catalog: value: PM-26e. class: sp800-53a prose: 'the complaint management process includes responding to complaints, concerns, or questions from individuals within {{ insert: param, pm-26_odp.04 }}.' + links: + - href: '#pm-26_smt.e' + rel: assessment-for + links: + - href: '#pm-26_smt' + rel: assessment-for - id: pm-26_asm-examine name: assessment-method props: @@ -14719,6 +16791,9 @@ catalog: value: PM-27a.01 class: sp800-53a prose: 'the privacy reports are disseminated to {{ insert: param, pm-27_odp.02 }} to demonstrate accountability with statutory, regulatory, and policy privacy mandates;' + links: + - href: '#pm-27_smt.a.1' + rel: assessment-for - id: pm-27_obj.a.2 name: assessment-objective props: @@ -14733,6 +16808,9 @@ catalog: value: PM-27a.02[01] class: sp800-53a prose: 'the privacy reports are disseminated to {{ insert: param, pm-27_odp.03 }};' + links: + - href: '#pm-27_smt.a.2' + rel: assessment-for - id: pm-27_obj.a.2-2 name: assessment-objective props: @@ -14740,6 +16818,15 @@ catalog: value: PM-27a.02[02] class: sp800-53a prose: the privacy reports are disseminated to other personnel responsible for monitoring privacy program compliance; + links: + - href: '#pm-27_smt.a.2' + rel: assessment-for + links: + - href: '#pm-27_smt.a.2' + rel: assessment-for + links: + - href: '#pm-27_smt.a' + rel: assessment-for - id: pm-27_obj.b name: assessment-objective props: @@ -14747,6 +16834,12 @@ catalog: value: PM-27b. class: sp800-53a prose: 'the privacy reports are reviewed and updated {{ insert: param, pm-27_odp.04 }}.' + links: + - href: '#pm-27_smt.b' + rel: assessment-for + links: + - href: '#pm-27_smt' + rel: assessment-for - id: pm-27_asm-examine name: assessment-method props: @@ -14918,6 +17011,9 @@ catalog: value: PM-28a.01[01] class: sp800-53a prose: assumptions affecting risk assessments are identified and documented; + links: + - href: '#pm-28_smt.a.1' + rel: assessment-for - id: pm-28_obj.a.1-2 name: assessment-objective props: @@ -14925,6 +17021,9 @@ catalog: value: PM-28a.01[02] class: sp800-53a prose: assumptions affecting risk responses are identified and documented; + links: + - href: '#pm-28_smt.a.1' + rel: assessment-for - id: pm-28_obj.a.1-3 name: assessment-objective props: @@ -14932,6 +17031,12 @@ catalog: value: PM-28a.01[03] class: sp800-53a prose: assumptions affecting risk monitoring are identified and documented; + links: + - href: '#pm-28_smt.a.1' + rel: assessment-for + links: + - href: '#pm-28_smt.a.1' + rel: assessment-for - id: pm-28_obj.a.2 name: assessment-objective props: @@ -14946,6 +17051,9 @@ catalog: value: PM-28a.02[01] class: sp800-53a prose: constraints affecting risk assessments are identified and documented; + links: + - href: '#pm-28_smt.a.2' + rel: assessment-for - id: pm-28_obj.a.2-2 name: assessment-objective props: @@ -14953,6 +17061,9 @@ catalog: value: PM-28a.02[02] class: sp800-53a prose: constraints affecting risk responses are identified and documented; + links: + - href: '#pm-28_smt.a.2' + rel: assessment-for - id: pm-28_obj.a.2-3 name: assessment-objective props: @@ -14960,6 +17071,12 @@ catalog: value: PM-28a.02[03] class: sp800-53a prose: constraints affecting risk monitoring are identified and documented; + links: + - href: '#pm-28_smt.a.2' + rel: assessment-for + links: + - href: '#pm-28_smt.a.2' + rel: assessment-for - id: pm-28_obj.a.3 name: assessment-objective props: @@ -14974,6 +17091,9 @@ catalog: value: PM-28a.03[01] class: sp800-53a prose: priorities considered by the organization for managing risk are identified and documented; + links: + - href: '#pm-28_smt.a.3' + rel: assessment-for - id: pm-28_obj.a.3-2 name: assessment-objective props: @@ -14981,6 +17101,12 @@ catalog: value: PM-28a.03[02] class: sp800-53a prose: trade-offs considered by the organization for managing risk are identified and documented; + links: + - href: '#pm-28_smt.a.3' + rel: assessment-for + links: + - href: '#pm-28_smt.a.3' + rel: assessment-for - id: pm-28_obj.a.4 name: assessment-objective props: @@ -14988,6 +17114,12 @@ catalog: value: PM-28a.04 class: sp800-53a prose: organizational risk tolerance is identified and documented; + links: + - href: '#pm-28_smt.a.4' + rel: assessment-for + links: + - href: '#pm-28_smt.a' + rel: assessment-for - id: pm-28_obj.b name: assessment-objective props: @@ -14995,6 +17127,9 @@ catalog: value: PM-28b. class: sp800-53a prose: 'the results of risk framing activities are distributed to {{ insert: param, pm-28_odp.01 }};' + links: + - href: '#pm-28_smt.b' + rel: assessment-for - id: pm-28_obj.c name: assessment-objective props: @@ -15002,6 +17137,12 @@ catalog: value: PM-28c. class: sp800-53a prose: 'risk framing considerations are reviewed and updated {{ insert: param, pm-28_odp.02 }}.' + links: + - href: '#pm-28_smt.c' + rel: assessment-for + links: + - href: '#pm-28_smt' + rel: assessment-for - id: pm-28_asm-examine name: assessment-method props: @@ -15105,9 +17246,9 @@ catalog: - name: label value: PM-31_ODP[02] class: sp800-53a - label: frequency + label: monitoring frequencies guidelines: - - prose: the frequency for monitoring is defined; + - prose: the frequencies for monitoring are defined; - id: pm-31_odp.03 props: - name: alt-identifier @@ -15118,9 +17259,9 @@ catalog: - name: label value: PM-31_ODP[03] class: sp800-53a - label: frequency + label: assessment frequencies guidelines: - - prose: the frequency for assessing control effectiveness is defined; + - prose: the frequencies for assessing control effectiveness are defined; - id: pm-31_odp.04 props: - name: label @@ -15289,7 +17430,7 @@ catalog: props: - name: label value: b. - prose: 'Establishing {{ insert: param, pm-31_odp.02 }} for monitoring and {{ insert: param, pm-31_odp.03 }} for assessment of control effectiveness;' + prose: 'Establishing {{ insert: param, pm-31_odp.02 }} and {{ insert: param, pm-31_odp.03 }} for control effectiveness;' - id: pm-31_smt.c name: item props: @@ -15332,6 +17473,9 @@ catalog: value: PM-31a. class: sp800-53a prose: 'continuous monitoring programs are implemented that include establishing {{ insert: param, pm-31_odp.01 }} to be monitored;' + links: + - href: '#pm-31_smt.a' + rel: assessment-for - id: pm-31_obj.b name: assessment-objective props: @@ -15346,6 +17490,9 @@ catalog: value: PM-31b.[01] class: sp800-53a prose: 'continuous monitoring programs are implemented that establish {{ insert: param, pm-31_odp.02 }} for monitoring;' + links: + - href: '#pm-31_smt.b' + rel: assessment-for - id: pm-31_obj.b-2 name: assessment-objective props: @@ -15353,6 +17500,12 @@ catalog: value: PM-31b.[02] class: sp800-53a prose: 'continuous monitoring programs are implemented that establish {{ insert: param, pm-31_odp.03 }} for assessment of control effectiveness;' + links: + - href: '#pm-31_smt.b' + rel: assessment-for + links: + - href: '#pm-31_smt.b' + rel: assessment-for - id: pm-31_obj.c name: assessment-objective props: @@ -15360,6 +17513,9 @@ catalog: value: PM-31c. class: sp800-53a prose: 'continuous monitoring programs are implemented that include monitoring {{ insert: param, pm-31_odp.01 }} on an ongoing basis in accordance with the continuous monitoring strategy;' + links: + - href: '#pm-31_smt.c' + rel: assessment-for - id: pm-31_obj.d name: assessment-objective props: @@ -15374,6 +17530,9 @@ catalog: value: PM-31d.[01] class: sp800-53a prose: continuous monitoring programs are implemented that include correlating information generated by control assessments and monitoring; + links: + - href: '#pm-31_smt.d' + rel: assessment-for - id: pm-31_obj.d-2 name: assessment-objective props: @@ -15381,6 +17540,12 @@ catalog: value: PM-31d.[02] class: sp800-53a prose: continuous monitoring programs are implemented that include analyzing information generated by control assessments and monitoring; + links: + - href: '#pm-31_smt.d' + rel: assessment-for + links: + - href: '#pm-31_smt.d' + rel: assessment-for - id: pm-31_obj.e name: assessment-objective props: @@ -15395,6 +17560,9 @@ catalog: value: PM-31e.[01] class: sp800-53a prose: continuous monitoring programs are implemented that include response actions to address the analysis of control assessment information; + links: + - href: '#pm-31_smt.e' + rel: assessment-for - id: pm-31_obj.e-2 name: assessment-objective props: @@ -15402,6 +17570,12 @@ catalog: value: PM-31e.[02] class: sp800-53a prose: continuous monitoring programs are implemented that include response actions to address the analysis of monitoring information; + links: + - href: '#pm-31_smt.e' + rel: assessment-for + links: + - href: '#pm-31_smt.e' + rel: assessment-for - id: pm-31_obj.f name: assessment-objective props: @@ -15416,6 +17590,9 @@ catalog: value: PM-31f.[01] class: sp800-53a prose: 'continuous monitoring programs are implemented that include reporting the security status of organizational systems to {{ insert: param, pm-31_odp.04 }} {{ insert: param, pm-31_odp.06 }};' + links: + - href: '#pm-31_smt.f' + rel: assessment-for - id: pm-31_obj.f-2 name: assessment-objective props: @@ -15423,6 +17600,15 @@ catalog: value: PM-31f.[02] class: sp800-53a prose: 'continuous monitoring programs are implemented that include reporting the privacy status of organizational systems to {{ insert: param, pm-31_odp.05 }} {{ insert: param, pm-31_odp.07 }}.' + links: + - href: '#pm-31_smt.f' + rel: assessment-for + links: + - href: '#pm-31_smt.f' + rel: assessment-for + links: + - href: '#pm-31_smt' + rel: assessment-for - id: pm-31_asm-examine name: assessment-method props: @@ -15610,6 +17796,9 @@ catalog: value: PS-06a. class: sp800-53a prose: access agreements are developed and documented for organizational systems; + links: + - href: '#ps-6_smt.a' + rel: assessment-for - id: ps-6_obj.b name: assessment-objective props: @@ -15617,6 +17806,9 @@ catalog: value: PS-06b. class: sp800-53a prose: 'the access agreements are reviewed and updated {{ insert: param, ps-06_odp.01 }};' + links: + - href: '#ps-6_smt.b' + rel: assessment-for - id: ps-6_obj.c name: assessment-objective props: @@ -15631,6 +17823,9 @@ catalog: value: PS-06c.01 class: sp800-53a prose: individuals requiring access to organizational information and systems sign appropriate access agreements prior to being granted access; + links: + - href: '#ps-6_smt.c.1' + rel: assessment-for - id: ps-6_obj.c.2 name: assessment-objective props: @@ -15638,6 +17833,15 @@ catalog: value: PS-06c.02 class: sp800-53a prose: 'individuals requiring access to organizational information and systems re-sign access agreements to maintain access to organizational systems when access agreements have been updated or {{ insert: param, ps-06_odp.02 }}.' + links: + - href: '#ps-6_smt.c.2' + rel: assessment-for + links: + - href: '#ps-6_smt.c' + rel: assessment-for + links: + - href: '#ps-6_smt' + rel: assessment-for - id: ps-6_asm-examine name: assessment-method props: @@ -15899,6 +18103,9 @@ catalog: value: PT-01a.[01] class: sp800-53a prose: a personally identifiable information processing and transparency policy is developed and documented; + links: + - href: '#pt-1_smt.a' + rel: assessment-for - id: pt-1_obj.a-2 name: assessment-objective props: @@ -15906,6 +18113,9 @@ catalog: value: PT-01a.[02] class: sp800-53a prose: 'the personally identifiable information processing and transparency policy is disseminated to {{ insert: param, pt-01_odp.01 }};' + links: + - href: '#pt-1_smt.a' + rel: assessment-for - id: pt-1_obj.a-3 name: assessment-objective props: @@ -15913,6 +18123,9 @@ catalog: value: PT-01a.[03] class: sp800-53a prose: personally identifiable information processing and transparency procedures to facilitate the implementation of the personally identifiable information processing and transparency policy and associated personally identifiable information processing and transparency controls are developed and documented; + links: + - href: '#pt-1_smt.a' + rel: assessment-for - id: pt-1_obj.a-4 name: assessment-objective props: @@ -15920,6 +18133,9 @@ catalog: value: PT-01a.[04] class: sp800-53a prose: 'the personally identifiable information processing and transparency procedures are disseminated to {{ insert: param, pt-01_odp.02 }};' + links: + - href: '#pt-1_smt.a' + rel: assessment-for - id: pt-1_obj.a.1 name: assessment-objective props: @@ -15941,6 +18157,9 @@ catalog: value: PT-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, pt-01_odp.03 }} personally identifiable information processing and transparency policy addresses purpose;' + links: + - href: '#pt-1_smt.a.1.a' + rel: assessment-for - id: pt-1_obj.a.1.a-2 name: assessment-objective props: @@ -15948,6 +18167,9 @@ catalog: value: PT-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, pt-01_odp.03 }} personally identifiable information processing and transparency policy addresses scope;' + links: + - href: '#pt-1_smt.a.1.a' + rel: assessment-for - id: pt-1_obj.a.1.a-3 name: assessment-objective props: @@ -15955,6 +18177,9 @@ catalog: value: PT-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, pt-01_odp.03 }} personally identifiable information processing and transparency policy addresses roles;' + links: + - href: '#pt-1_smt.a.1.a' + rel: assessment-for - id: pt-1_obj.a.1.a-4 name: assessment-objective props: @@ -15962,6 +18187,9 @@ catalog: value: PT-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, pt-01_odp.03 }} personally identifiable information processing and transparency policy addresses responsibilities;' + links: + - href: '#pt-1_smt.a.1.a' + rel: assessment-for - id: pt-1_obj.a.1.a-5 name: assessment-objective props: @@ -15969,6 +18197,9 @@ catalog: value: PT-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, pt-01_odp.03 }} personally identifiable information processing and transparency policy addresses management commitment;' + links: + - href: '#pt-1_smt.a.1.a' + rel: assessment-for - id: pt-1_obj.a.1.a-6 name: assessment-objective props: @@ -15976,6 +18207,9 @@ catalog: value: PT-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, pt-01_odp.03 }} personally identifiable information processing and transparency policy addresses coordination among organizational entities;' + links: + - href: '#pt-1_smt.a.1.a' + rel: assessment-for - id: pt-1_obj.a.1.a-7 name: assessment-objective props: @@ -15983,6 +18217,12 @@ catalog: value: PT-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, pt-01_odp.03 }} personally identifiable information processing and transparency policy addresses compliance;' + links: + - href: '#pt-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#pt-1_smt.a.1.a' + rel: assessment-for - id: pt-1_obj.a.1.b name: assessment-objective props: @@ -15990,6 +18230,15 @@ catalog: value: PT-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, pt-01_odp.03 }} personally identifiable information processing and transparency policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#pt-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#pt-1_smt.a.1' + rel: assessment-for + links: + - href: '#pt-1_smt.a' + rel: assessment-for - id: pt-1_obj.b name: assessment-objective props: @@ -15997,6 +18246,9 @@ catalog: value: PT-01b. class: sp800-53a prose: 'the {{ insert: param, pt-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the personally identifiable information processing and transparency policy and procedures;' + links: + - href: '#pt-1_smt.b' + rel: assessment-for - id: pt-1_obj.c name: assessment-objective props: @@ -16018,6 +18270,9 @@ catalog: value: PT-01c.01[01] class: sp800-53a prose: 'the current personally identifiable information processing and transparency policy is reviewed and updated {{ insert: param, pt-01_odp.05 }};' + links: + - href: '#pt-1_smt.c.1' + rel: assessment-for - id: pt-1_obj.c.1-2 name: assessment-objective props: @@ -16025,6 +18280,12 @@ catalog: value: PT-01c.01[02] class: sp800-53a prose: 'the current personally identifiable information processing and transparency policy is reviewed and updated following {{ insert: param, pt-01_odp.06 }};' + links: + - href: '#pt-1_smt.c.1' + rel: assessment-for + links: + - href: '#pt-1_smt.c.1' + rel: assessment-for - id: pt-1_obj.c.2 name: assessment-objective props: @@ -16039,6 +18300,9 @@ catalog: value: PT-01c.02[01] class: sp800-53a prose: 'the current personally identifiable information processing and transparency procedures are reviewed and updated {{ insert: param, pt-01_odp.07 }};' + links: + - href: '#pt-1_smt.c.2' + rel: assessment-for - id: pt-1_obj.c.2-2 name: assessment-objective props: @@ -16046,6 +18310,18 @@ catalog: value: PT-01c.02[02] class: sp800-53a prose: 'the current personally identifiable information processing and transparency procedures are reviewed and updated following {{ insert: param, pt-01_odp.08 }}.' + links: + - href: '#pt-1_smt.c.2' + rel: assessment-for + links: + - href: '#pt-1_smt.c.2' + rel: assessment-for + links: + - href: '#pt-1_smt.c' + rel: assessment-for + links: + - href: '#pt-1_smt' + rel: assessment-for - id: pt-1_asm-examine name: assessment-method props: @@ -16203,6 +18479,9 @@ catalog: value: PT-02a. class: sp800-53a prose: 'the {{ insert: param, pt-02_odp.01 }} that permits the {{ insert: param, pt-02_odp.02 }} of personally identifiable information is determined and documented;' + links: + - href: '#pt-2_smt.a' + rel: assessment-for - id: pt-2_obj.b name: assessment-objective props: @@ -16210,6 +18489,12 @@ catalog: value: PT-02b. class: sp800-53a prose: 'the {{ insert: param, pt-02_odp.03 }} of personally identifiable information is restricted to only that which is authorized.' + links: + - href: '#pt-2_smt.b' + rel: assessment-for + links: + - href: '#pt-2_smt' + rel: assessment-for - id: pt-2_asm-examine name: assessment-method props: @@ -16399,6 +18684,9 @@ catalog: value: PT-03a. class: sp800-53a prose: 'the {{ insert: param, pt-03_odp.01 }} for processing personally identifiable information is/are identified and documented;' + links: + - href: '#pt-3_smt.a' + rel: assessment-for - id: pt-3_obj.b name: assessment-objective props: @@ -16413,6 +18701,9 @@ catalog: value: PT-03b.[01] class: sp800-53a prose: the purpose(s) is/are described in the public privacy notices of the organization; + links: + - href: '#pt-3_smt.b' + rel: assessment-for - id: pt-3_obj.b-2 name: assessment-objective props: @@ -16420,6 +18711,12 @@ catalog: value: PT-03b.[02] class: sp800-53a prose: the purpose(s) is/are described in the policies of the organization; + links: + - href: '#pt-3_smt.b' + rel: assessment-for + links: + - href: '#pt-3_smt.b' + rel: assessment-for - id: pt-3_obj.c name: assessment-objective props: @@ -16427,6 +18724,9 @@ catalog: value: PT-03c. class: sp800-53a prose: 'the {{ insert: param, pt-03_odp.02 }} of personally identifiable information are restricted to only that which is compatible with the identified purpose(s);' + links: + - href: '#pt-3_smt.c' + rel: assessment-for - id: pt-3_obj.d name: assessment-objective props: @@ -16441,6 +18741,9 @@ catalog: value: PT-03d.[01] class: sp800-53a prose: changes in the processing of personally identifiable information are monitored; + links: + - href: '#pt-3_smt.d' + rel: assessment-for - id: pt-3_obj.d-2 name: assessment-objective props: @@ -16448,6 +18751,15 @@ catalog: value: PT-03d.[02] class: sp800-53a prose: ' {{ insert: param, pt-03_odp.03 }} are implemented to ensure that any changes are made in accordance with {{ insert: param, pt-03_odp.04 }}.' + links: + - href: '#pt-3_smt.d' + rel: assessment-for + links: + - href: '#pt-3_smt.d' + rel: assessment-for + links: + - href: '#pt-3_smt' + rel: assessment-for - id: pt-3_asm-examine name: assessment-method props: @@ -16563,6 +18875,9 @@ catalog: value: PT-04 class: sp800-53a prose: 'the {{ insert: param, pt-04_odp }} are implemented for individuals to consent to the processing of their personally identifiable information prior to its collection that facilitate individuals’ informed decision-making.' + links: + - href: '#pt-4_smt' + rel: assessment-for - id: pt-4_asm-examine name: assessment-method props: @@ -16742,6 +19057,9 @@ catalog: value: PT-05a.[01] class: sp800-53a prose: a notice to individuals about the processing of personally identifiable information is provided such that the notice is available to individuals upon first interacting with an organization; + links: + - href: '#pt-5_smt.a' + rel: assessment-for - id: pt-5_obj.a-2 name: assessment-objective props: @@ -16749,6 +19067,12 @@ catalog: value: PT-05a.[02] class: sp800-53a prose: 'a notice to individuals about the processing of personally identifiable information is provided such that the notice is subsequently available to individuals {{ insert: param, pt-05_odp.01 }};' + links: + - href: '#pt-5_smt.a' + rel: assessment-for + links: + - href: '#pt-5_smt.a' + rel: assessment-for - id: pt-5_obj.b name: assessment-objective props: @@ -16756,6 +19080,9 @@ catalog: value: PT-05b. class: sp800-53a prose: a notice to individuals about the processing of personally identifiable information is provided that is clear, easy-to-understand, and expresses information about personally identifiable information processing in plain language; + links: + - href: '#pt-5_smt.b' + rel: assessment-for - id: pt-5_obj.c name: assessment-objective props: @@ -16763,6 +19090,9 @@ catalog: value: PT-05c. class: sp800-53a prose: a notice to individuals about the processing of personally identifiable information that identifies the authority that authorizes the processing of personally identifiable information is provided; + links: + - href: '#pt-5_smt.c' + rel: assessment-for - id: pt-5_obj.d name: assessment-objective props: @@ -16770,6 +19100,9 @@ catalog: value: PT-05d. class: sp800-53a prose: a notice to individuals about the processing of personally identifiable information that identifies the purpose for which personally identifiable information is to be processed is provided; + links: + - href: '#pt-5_smt.d' + rel: assessment-for - id: pt-5_obj.e name: assessment-objective props: @@ -16777,6 +19110,12 @@ catalog: value: PT-05e. class: sp800-53a prose: 'a notice to individuals about the processing of personally identifiable information which includes {{ insert: param, pt-05_odp.02 }} is provided.' + links: + - href: '#pt-5_smt.e' + rel: assessment-for + links: + - href: '#pt-5_smt' + rel: assessment-for - id: pt-5_asm-examine name: assessment-method props: @@ -16864,6 +19203,9 @@ catalog: value: PT-05(02) class: sp800-53a prose: Privacy Act statements are included on forms that collect information that will be maintained in a Privacy Act system of records, or Privacy Act statements are provided on separate forms that can be retained by individuals. + links: + - href: '#pt-5.2_smt' + rel: assessment-for - id: pt-5.2_asm-examine name: assessment-method props: @@ -16990,6 +19332,9 @@ catalog: value: PT-06a.[01] class: sp800-53a prose: system of records notices are drafted in accordance with OMB guidance for systems that process information that will be maintained in a Privacy Act system of records; + links: + - href: '#pt-6_smt.a' + rel: assessment-for - id: pt-6_obj.a-2 name: assessment-objective props: @@ -16997,6 +19342,12 @@ catalog: value: PT-06a.[02] class: sp800-53a prose: new and significantly modified system of records notices are submitted to the OMB and appropriate congressional committees for advance review for systems that process information that will be maintained in a Privacy Act system of records; + links: + - href: '#pt-6_smt.a' + rel: assessment-for + links: + - href: '#pt-6_smt.a' + rel: assessment-for - id: pt-6_obj.b name: assessment-objective props: @@ -17004,6 +19355,9 @@ catalog: value: PT-06b. class: sp800-53a prose: system of records notices are published in the Federal Register for systems that process information that will be maintained in a Privacy Act system of records; + links: + - href: '#pt-6_smt.b' + rel: assessment-for - id: pt-6_obj.c name: assessment-objective props: @@ -17011,6 +19365,12 @@ catalog: value: PT-06c. class: sp800-53a prose: system of records notices are kept accurate, up-to-date, and scoped in accordance with policy for systems that process information that will be maintained in a Privacy Act system of records. + links: + - href: '#pt-6_smt.c' + rel: assessment-for + links: + - href: '#pt-6_smt' + rel: assessment-for - id: pt-6_asm-examine name: assessment-method props: @@ -17104,6 +19464,9 @@ catalog: value: PT-06(01) class: sp800-53a prose: 'all routine uses published in the system of records notice are reviewed {{ insert: param, pt-06.01_odp }} to ensure continued accuracy, and to ensure that routine uses continue to be compatible with the purpose for which the information was collected.' + links: + - href: '#pt-6.1_smt' + rel: assessment-for - id: pt-6.1_asm-examine name: assessment-method props: @@ -17201,6 +19564,9 @@ catalog: value: PT-06(02)[01] class: sp800-53a prose: 'all Privacy Act exemptions claimed for the system of records are reviewed {{ insert: param, pt-06.02_odp }} to ensure that they remain appropriate and necessary in accordance with law;' + links: + - href: '#pt-6.2_smt' + rel: assessment-for - id: pt-6.2_obj-2 name: assessment-objective props: @@ -17208,6 +19574,9 @@ catalog: value: PT-06(02)[02] class: sp800-53a prose: 'all Privacy Act exemptions claimed for the system of records are reviewed {{ insert: param, pt-06.02_odp }} to ensure that they have been promulgated as regulations;' + links: + - href: '#pt-6.2_smt' + rel: assessment-for - id: pt-6.2_obj-3 name: assessment-objective props: @@ -17215,6 +19584,12 @@ catalog: value: PT-06(02)[03] class: sp800-53a prose: 'all Privacy Act exemptions claimed for the system of records are reviewed {{ insert: param, pt-06.02_odp }} to ensure that they are accurately described in the system of records notice.' + links: + - href: '#pt-6.2_smt' + rel: assessment-for + links: + - href: '#pt-6.2_smt' + rel: assessment-for - id: pt-6.2_asm-examine name: assessment-method props: @@ -17321,6 +19696,9 @@ catalog: value: PT-07 class: sp800-53a prose: ' {{ insert: param, pt-07_odp }} are applied for specific categories of personally identifiable information.' + links: + - href: '#pt-7_smt' + rel: assessment-for - id: pt-7_asm-examine name: assessment-method props: @@ -17446,6 +19824,9 @@ catalog: value: PT-07(01)(a)[01] class: sp800-53a prose: when a system processes Social Security numbers, the unnecessary collection, maintenance, and use of Social Security numbers are eliminated; + links: + - href: '#pt-7.1_smt.a' + rel: assessment-for - id: pt-7.1_obj.a-2 name: assessment-objective props: @@ -17453,6 +19834,12 @@ catalog: value: PT-07(01)(a)[02] class: sp800-53a prose: when a system processes Social Security numbers, alternatives to the use of Social Security Numbers as a personal identifier are explored; + links: + - href: '#pt-7.1_smt.a' + rel: assessment-for + links: + - href: '#pt-7.1_smt.a' + rel: assessment-for - id: pt-7.1_obj.b name: assessment-objective props: @@ -17460,6 +19847,9 @@ catalog: value: PT-07(01)(b) class: sp800-53a prose: when a system processes Social Security numbers, individual rights, benefits, or privileges provided by law are not denied because of an individual’s refusal to disclose their Social Security number; + links: + - href: '#pt-7.1_smt.b' + rel: assessment-for - id: pt-7.1_obj.c name: assessment-objective props: @@ -17474,6 +19864,9 @@ catalog: value: PT-07(01)(c)[01] class: sp800-53a prose: when a system processes Social Security numbers, any individual who is asked to disclose their Social Security number is informed whether that disclosure is mandatory or voluntary, by what statutory or other authority such number is solicited, and what uses will be made of it; + links: + - href: '#pt-7.1_smt.c' + rel: assessment-for - id: pt-7.1_obj.c-2 name: assessment-objective props: @@ -17481,6 +19874,9 @@ catalog: value: PT-07(01)(c)[02] class: sp800-53a prose: when a system processes Social Security numbers, any individual who is asked to disclose their Social Security number is informed by what statutory or other authority the number is solicited; + links: + - href: '#pt-7.1_smt.c' + rel: assessment-for - id: pt-7.1_obj.c-3 name: assessment-objective props: @@ -17488,6 +19884,15 @@ catalog: value: PT-07(01)(c)[03] class: sp800-53a prose: when a system processes Social Security numbers, any individual who is asked to disclose their Social Security number is informed what uses will be made of it. + links: + - href: '#pt-7.1_smt.c' + rel: assessment-for + links: + - href: '#pt-7.1_smt.c' + rel: assessment-for + links: + - href: '#pt-7.1_smt' + rel: assessment-for - id: pt-7.1_asm-examine name: assessment-method props: @@ -17574,6 +19979,9 @@ catalog: value: PT-07(02) class: sp800-53a prose: the processing of information describing how any individual exercises rights guaranteed by the First Amendment is prohibited unless expressly authorized by statute or by the individual or unless pertinent to and within the scope of an authorized law enforcement activity. + links: + - href: '#pt-7.2_smt' + rel: assessment-for - id: pt-7.2_asm-examine name: assessment-method props: @@ -17699,6 +20107,9 @@ catalog: value: PT-08a. class: sp800-53a prose: approval to conduct the matching program is obtained from the Data Integrity Board when a system or organization processes information for the purpose of conducting a matching program; + links: + - href: '#pt-8_smt.a' + rel: assessment-for - id: pt-8_obj.b name: assessment-objective props: @@ -17713,6 +20124,9 @@ catalog: value: PT-08b.[01] class: sp800-53a prose: a computer matching agreement is developed when a system or organization processes information for the purpose of conducting a matching program; + links: + - href: '#pt-8_smt.b' + rel: assessment-for - id: pt-8_obj.b-2 name: assessment-objective props: @@ -17720,6 +20134,12 @@ catalog: value: PT-08b.[02] class: sp800-53a prose: a computer matching agreement is entered into when a system or organization processes information for the purpose of conducting a matching program; + links: + - href: '#pt-8_smt.b' + rel: assessment-for + links: + - href: '#pt-8_smt.b' + rel: assessment-for - id: pt-8_obj.c name: assessment-objective props: @@ -17727,6 +20147,9 @@ catalog: value: PT-08c. class: sp800-53a prose: a matching notice is published in the Federal Register when a system or organization processes information for the purpose of conducting a matching program; + links: + - href: '#pt-8_smt.c' + rel: assessment-for - id: pt-8_obj.d name: assessment-objective props: @@ -17734,6 +20157,9 @@ catalog: value: PT-08d. class: sp800-53a prose: the information produced by the matching program is independently verified before taking adverse action against an individual, if required, when a system or organization processes information for the purpose of conducting a matching program; + links: + - href: '#pt-8_smt.d' + rel: assessment-for - id: pt-8_obj.e name: assessment-objective props: @@ -17748,6 +20174,9 @@ catalog: value: PT-08e.[01] class: sp800-53a prose: individuals are provided with notice when a system or organization processes information for the purpose of conducting a matching program; + links: + - href: '#pt-8_smt.e' + rel: assessment-for - id: pt-8_obj.e-2 name: assessment-objective props: @@ -17755,6 +20184,15 @@ catalog: value: PT-08e.[02] class: sp800-53a prose: individuals are provided with an opportunity to contest the findings before adverse action is taken against them when a system or organization processes information for the purpose of conducting a matching program. + links: + - href: '#pt-8_smt.e' + rel: assessment-for + links: + - href: '#pt-8_smt.e' + rel: assessment-for + links: + - href: '#pt-8_smt' + rel: assessment-for - id: pt-8_asm-examine name: assessment-method props: @@ -18030,6 +20468,9 @@ catalog: value: RA-01a.[01] class: sp800-53a prose: a risk assessment policy is developed and documented; + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.a-2 name: assessment-objective props: @@ -18037,6 +20478,9 @@ catalog: value: RA-01a.[02] class: sp800-53a prose: 'the risk assessment policy is disseminated to {{ insert: param, ra-01_odp.01 }};' + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.a-3 name: assessment-objective props: @@ -18044,6 +20488,9 @@ catalog: value: RA-01a.[03] class: sp800-53a prose: risk assessment procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls are developed and documented; + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.a-4 name: assessment-objective props: @@ -18051,6 +20498,9 @@ catalog: value: RA-01a.[04] class: sp800-53a prose: 'the risk assessment procedures are disseminated to {{ insert: param, ra-01_odp.02 }};' + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.a.1 name: assessment-objective props: @@ -18072,6 +20522,9 @@ catalog: value: RA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses purpose;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-2 name: assessment-objective props: @@ -18079,6 +20532,9 @@ catalog: value: RA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses scope;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-3 name: assessment-objective props: @@ -18086,6 +20542,9 @@ catalog: value: RA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses roles;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-4 name: assessment-objective props: @@ -18093,6 +20552,9 @@ catalog: value: RA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses responsibilities;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-5 name: assessment-objective props: @@ -18100,6 +20562,9 @@ catalog: value: RA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses management commitment;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-6 name: assessment-objective props: @@ -18107,6 +20572,9 @@ catalog: value: RA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses coordination among organizational entities;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-7 name: assessment-objective props: @@ -18114,6 +20582,12 @@ catalog: value: RA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses compliance;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.b name: assessment-objective props: @@ -18121,6 +20595,15 @@ catalog: value: RA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ra-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ra-1_smt.a.1' + rel: assessment-for + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.b name: assessment-objective props: @@ -18128,6 +20611,9 @@ catalog: value: RA-01b. class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the risk assessment policy and procedures;' + links: + - href: '#ra-1_smt.b' + rel: assessment-for - id: ra-1_obj.c name: assessment-objective props: @@ -18149,6 +20635,9 @@ catalog: value: RA-01c.01[01] class: sp800-53a prose: 'the current risk assessment policy is reviewed and updated {{ insert: param, ra-01_odp.05 }};' + links: + - href: '#ra-1_smt.c.1' + rel: assessment-for - id: ra-1_obj.c.1-2 name: assessment-objective props: @@ -18156,6 +20645,12 @@ catalog: value: RA-01c.01[02] class: sp800-53a prose: 'the current risk assessment policy is reviewed and updated following {{ insert: param, ra-01_odp.06 }};' + links: + - href: '#ra-1_smt.c.1' + rel: assessment-for + links: + - href: '#ra-1_smt.c.1' + rel: assessment-for - id: ra-1_obj.c.2 name: assessment-objective props: @@ -18170,6 +20665,9 @@ catalog: value: RA-01c.02[01] class: sp800-53a prose: 'the current risk assessment procedures are reviewed and updated {{ insert: param, ra-01_odp.07 }};' + links: + - href: '#ra-1_smt.c.2' + rel: assessment-for - id: ra-1_obj.c.2-2 name: assessment-objective props: @@ -18177,6 +20675,18 @@ catalog: value: RA-01c.02[02] class: sp800-53a prose: 'the current risk assessment procedures are reviewed and updated following {{ insert: param, ra-01_odp.08 }}.' + links: + - href: '#ra-1_smt.c.2' + rel: assessment-for + links: + - href: '#ra-1_smt.c.2' + rel: assessment-for + links: + - href: '#ra-1_smt.c' + rel: assessment-for + links: + - href: '#ra-1_smt' + rel: assessment-for - id: ra-1_asm-examine name: assessment-method props: @@ -18436,6 +20946,9 @@ catalog: value: RA-03a.01 class: sp800-53a prose: a risk assessment is conducted to identify threats to and vulnerabilities in the system; + links: + - href: '#ra-3_smt.a.1' + rel: assessment-for - id: ra-3_obj.a.2 name: assessment-objective props: @@ -18443,6 +20956,9 @@ catalog: value: RA-03a.02 class: sp800-53a prose: a risk assessment is conducted to determine the likelihood and magnitude of harm from unauthorized access, use, disclosure, disruption, modification, or destruction of the system; the information it processes, stores, or transmits; and any related information; + links: + - href: '#ra-3_smt.a.2' + rel: assessment-for - id: ra-3_obj.a.3 name: assessment-objective props: @@ -18450,6 +20966,12 @@ catalog: value: RA-03a.03 class: sp800-53a prose: a risk assessment is conducted to determine the likelihood and impact of adverse effects on individuals arising from the processing of personally identifiable information; + links: + - href: '#ra-3_smt.a.3' + rel: assessment-for + links: + - href: '#ra-3_smt.a' + rel: assessment-for - id: ra-3_obj.b name: assessment-objective props: @@ -18457,6 +20979,9 @@ catalog: value: RA-03b. class: sp800-53a prose: risk assessment results and risk management decisions from the organization and mission or business process perspectives are integrated with system-level risk assessments; + links: + - href: '#ra-3_smt.b' + rel: assessment-for - id: ra-3_obj.c name: assessment-objective props: @@ -18464,6 +20989,9 @@ catalog: value: RA-03c. class: sp800-53a prose: 'risk assessment results are documented in {{ insert: param, ra-03_odp.01 }};' + links: + - href: '#ra-3_smt.c' + rel: assessment-for - id: ra-3_obj.d name: assessment-objective props: @@ -18471,6 +20999,9 @@ catalog: value: RA-03d. class: sp800-53a prose: 'risk assessment results are reviewed {{ insert: param, ra-03_odp.03 }};' + links: + - href: '#ra-3_smt.d' + rel: assessment-for - id: ra-3_obj.e name: assessment-objective props: @@ -18478,6 +21009,9 @@ catalog: value: RA-03e. class: sp800-53a prose: 'risk assessment results are disseminated to {{ insert: param, ra-03_odp.04 }};' + links: + - href: '#ra-3_smt.e' + rel: assessment-for - id: ra-3_obj.f name: assessment-objective props: @@ -18485,6 +21019,12 @@ catalog: value: RA-03f. class: sp800-53a prose: 'the risk assessment is updated {{ insert: param, ra-03_odp.05 }} or when there are significant changes to the system, its environment of operation, or other conditions that may impact the security or privacy state of the system.' + links: + - href: '#ra-3_smt.f' + rel: assessment-for + links: + - href: '#ra-3_smt' + rel: assessment-for - id: ra-3_asm-examine name: assessment-method props: @@ -18613,6 +21153,9 @@ catalog: value: RA-07[01] class: sp800-53a prose: findings from security assessments are responded to in accordance with organizational risk tolerance; + links: + - href: '#ra-7_smt' + rel: assessment-for - id: ra-7_obj-2 name: assessment-objective props: @@ -18620,6 +21163,9 @@ catalog: value: RA-07[02] class: sp800-53a prose: findings from privacy assessments are responded to in accordance with organizational risk tolerance; + links: + - href: '#ra-7_smt' + rel: assessment-for - id: ra-7_obj-3 name: assessment-objective props: @@ -18627,6 +21173,9 @@ catalog: value: RA-07[03] class: sp800-53a prose: findings from monitoring are responded to in accordance with organizational risk tolerance; + links: + - href: '#ra-7_smt' + rel: assessment-for - id: ra-7_obj-4 name: assessment-objective props: @@ -18634,6 +21183,12 @@ catalog: value: RA-07[04] class: sp800-53a prose: findings from audits are responded to in accordance with organizational risk tolerance. + links: + - href: '#ra-7_smt' + rel: assessment-for + links: + - href: '#ra-7_smt' + rel: assessment-for - id: ra-7_asm-examine name: assessment-method props: @@ -18785,6 +21340,9 @@ catalog: value: RA-08a. class: sp800-53a prose: privacy impact assessments are conducted for systems, programs, or other activities before developing or procuring information technology that processes personally identifiable information; + links: + - href: '#ra-8_smt.a' + rel: assessment-for - id: ra-8_obj.b name: assessment-objective props: @@ -18799,6 +21357,9 @@ catalog: value: RA-08b.[01] class: sp800-53a prose: privacy impact assessments are conducted for systems, programs, or other activities before initiating a collection of personally identifiable information that will be processed using information technology; + links: + - href: '#ra-8_smt.b' + rel: assessment-for - id: ra-8_obj.b-2 name: assessment-objective props: @@ -18806,6 +21367,15 @@ catalog: value: RA-08b.[02] class: sp800-53a prose: privacy impact assessments are conducted for systems, programs, or other activities before initiating a collection of personally identifiable information that includes personally identifiable information permitting the physical or virtual (online) contacting of a specific individual, if identical questions have been posed to, or identical reporting requirements imposed on, ten or more individuals, other than agencies, instrumentalities, or employees of the federal government. + links: + - href: '#ra-8_smt.b' + rel: assessment-for + links: + - href: '#ra-8_smt.b' + rel: assessment-for + links: + - href: '#ra-8_smt' + rel: assessment-for - id: ra-8_asm-examine name: assessment-method props: @@ -19083,6 +21653,9 @@ catalog: value: SA-01a.[01] class: sp800-53a prose: a system and services acquisition policy is developed and documented; + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.a-2 name: assessment-objective props: @@ -19090,6 +21663,9 @@ catalog: value: SA-01a.[02] class: sp800-53a prose: 'the system and services acquisition policy is disseminated to {{ insert: param, sa-01_odp.01 }};' + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.a-3 name: assessment-objective props: @@ -19097,6 +21673,9 @@ catalog: value: SA-01a.[03] class: sp800-53a prose: system and services acquisition procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls are developed and documented; + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.a-4 name: assessment-objective props: @@ -19104,6 +21683,9 @@ catalog: value: SA-01a.[04] class: sp800-53a prose: 'the system and services acquisition procedures are disseminated to {{ insert: param, sa-01_odp.02 }};' + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.a.1 name: assessment-objective props: @@ -19125,6 +21707,9 @@ catalog: value: SA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses purpose;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-2 name: assessment-objective props: @@ -19132,6 +21717,9 @@ catalog: value: SA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses scope;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-3 name: assessment-objective props: @@ -19139,6 +21727,9 @@ catalog: value: SA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses roles;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-4 name: assessment-objective props: @@ -19146,6 +21737,9 @@ catalog: value: SA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses responsibilities;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-5 name: assessment-objective props: @@ -19153,6 +21747,9 @@ catalog: value: SA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses management commitment;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-6 name: assessment-objective props: @@ -19160,6 +21757,9 @@ catalog: value: SA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses coordination among organizational entities;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-7 name: assessment-objective props: @@ -19167,6 +21767,12 @@ catalog: value: SA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses compliance;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.b name: assessment-objective props: @@ -19174,6 +21780,15 @@ catalog: value: SA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#sa-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#sa-1_smt.a.1' + rel: assessment-for + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.b name: assessment-objective props: @@ -19181,6 +21796,9 @@ catalog: value: SA-01b. class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the system and services acquisition policy and procedures;' + links: + - href: '#sa-1_smt.b' + rel: assessment-for - id: sa-1_obj.c name: assessment-objective props: @@ -19202,6 +21820,9 @@ catalog: value: SA-01c.01[01] class: sp800-53a prose: 'the system and services acquisition policy is reviewed and updated {{ insert: param, sa-01_odp.05 }};' + links: + - href: '#sa-1_smt.c.1' + rel: assessment-for - id: sa-1_obj.c.1-2 name: assessment-objective props: @@ -19209,6 +21830,12 @@ catalog: value: SA-01c.01[02] class: sp800-53a prose: 'the current system and services acquisition policy is reviewed and updated following {{ insert: param, sa-01_odp.06 }};' + links: + - href: '#sa-1_smt.c.1' + rel: assessment-for + links: + - href: '#sa-1_smt.c.1' + rel: assessment-for - id: sa-1_obj.c.2 name: assessment-objective props: @@ -19223,6 +21850,9 @@ catalog: value: SA-01c.02[01] class: sp800-53a prose: 'the current system and services acquisition procedures are reviewed and updated {{ insert: param, sa-01_odp.07 }};' + links: + - href: '#sa-1_smt.c.2' + rel: assessment-for - id: sa-1_obj.c.2-2 name: assessment-objective props: @@ -19230,6 +21860,18 @@ catalog: value: SA-01c.02[02] class: sp800-53a prose: 'the current system and services acquisition procedures are reviewed and updated following {{ insert: param, sa-01_odp.08 }}.' + links: + - href: '#sa-1_smt.c.2' + rel: assessment-for + links: + - href: '#sa-1_smt.c.2' + rel: assessment-for + links: + - href: '#sa-1_smt.c' + rel: assessment-for + links: + - href: '#sa-1_smt' + rel: assessment-for - id: sa-1_asm-examine name: assessment-method props: @@ -19356,6 +21998,9 @@ catalog: value: SA-02a.[01] class: sp800-53a prose: the high-level information security requirements for the system or system service are determined in mission and business process planning; + links: + - href: '#sa-2_smt.a' + rel: assessment-for - id: sa-2_obj.a-2 name: assessment-objective props: @@ -19363,6 +22008,12 @@ catalog: value: SA-02a.[02] class: sp800-53a prose: the high-level privacy requirements for the system or system service are determined in mission and business process planning; + links: + - href: '#sa-2_smt.a' + rel: assessment-for + links: + - href: '#sa-2_smt.a' + rel: assessment-for - id: sa-2_obj.b name: assessment-objective props: @@ -19377,6 +22028,9 @@ catalog: value: SA-02b.[01] class: sp800-53a prose: the resources required to protect the system or system service are determined and documented as part of the organizational capital planning and investment control process; + links: + - href: '#sa-2_smt.b' + rel: assessment-for - id: sa-2_obj.b-2 name: assessment-objective props: @@ -19384,6 +22038,12 @@ catalog: value: SA-02b.[02] class: sp800-53a prose: the resources required to protect the system or system service are allocated as part of the organizational capital planning and investment control process; + links: + - href: '#sa-2_smt.b' + rel: assessment-for + links: + - href: '#sa-2_smt.b' + rel: assessment-for - id: sa-2_obj.c name: assessment-objective props: @@ -19398,6 +22058,9 @@ catalog: value: SA-02c.[01] class: sp800-53a prose: a discrete line item for information security is established in organizational programming and budgeting documentation; + links: + - href: '#sa-2_smt.c' + rel: assessment-for - id: sa-2_obj.c-2 name: assessment-objective props: @@ -19405,6 +22068,15 @@ catalog: value: SA-02c.[02] class: sp800-53a prose: a discrete line item for privacy is established in organizational programming and budgeting documentation. + links: + - href: '#sa-2_smt.c' + rel: assessment-for + links: + - href: '#sa-2_smt.c' + rel: assessment-for + links: + - href: '#sa-2_smt' + rel: assessment-for - id: sa-2_asm-examine name: assessment-method props: @@ -19597,6 +22269,9 @@ catalog: value: SA-03a.[01] class: sp800-53a prose: 'the system is acquired, developed, and managed using {{ insert: param, sa-03_odp }} that incorporates information security considerations;' + links: + - href: '#sa-3_smt.a' + rel: assessment-for - id: sa-3_obj.a-2 name: assessment-objective props: @@ -19604,6 +22279,12 @@ catalog: value: SA-03a.[02] class: sp800-53a prose: 'the system is acquired, developed, and managed using {{ insert: param, sa-03_odp }} that incorporates privacy considerations;' + links: + - href: '#sa-3_smt.a' + rel: assessment-for + links: + - href: '#sa-3_smt.a' + rel: assessment-for - id: sa-3_obj.b name: assessment-objective props: @@ -19618,6 +22299,9 @@ catalog: value: SA-03b.[01] class: sp800-53a prose: information security roles and responsibilities are defined and documented throughout the system development life cycle; + links: + - href: '#sa-3_smt.b' + rel: assessment-for - id: sa-3_obj.b-2 name: assessment-objective props: @@ -19625,6 +22309,12 @@ catalog: value: SA-03b.[02] class: sp800-53a prose: privacy roles and responsibilities are defined and documented throughout the system development life cycle; + links: + - href: '#sa-3_smt.b' + rel: assessment-for + links: + - href: '#sa-3_smt.b' + rel: assessment-for - id: sa-3_obj.c name: assessment-objective props: @@ -19639,6 +22329,9 @@ catalog: value: SA-03c.[01] class: sp800-53a prose: individuals with information security roles and responsibilities are identified; + links: + - href: '#sa-3_smt.c' + rel: assessment-for - id: sa-3_obj.c-2 name: assessment-objective props: @@ -19646,6 +22339,12 @@ catalog: value: SA-03c.[02] class: sp800-53a prose: individuals with privacy roles and responsibilities are identified; + links: + - href: '#sa-3_smt.c' + rel: assessment-for + links: + - href: '#sa-3_smt.c' + rel: assessment-for - id: sa-3_obj.d name: assessment-objective props: @@ -19660,6 +22359,9 @@ catalog: value: SA-03d.[01] class: sp800-53a prose: organizational information security risk management processes are integrated into system development life cycle activities; + links: + - href: '#sa-3_smt.d' + rel: assessment-for - id: sa-3_obj.d-2 name: assessment-objective props: @@ -19667,6 +22369,15 @@ catalog: value: SA-03d.[02] class: sp800-53a prose: organizational privacy risk management processes are integrated into system development life cycle activities. + links: + - href: '#sa-3_smt.d' + rel: assessment-for + links: + - href: '#sa-3_smt.d' + rel: assessment-for + links: + - href: '#sa-3_smt' + rel: assessment-for - id: sa-3_asm-examine name: assessment-method props: @@ -19939,6 +22650,9 @@ catalog: value: SA-04a.[01] class: sp800-53a prose: 'security functional requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.a' + rel: assessment-for - id: sa-4_obj.a-2 name: assessment-objective props: @@ -19946,6 +22660,12 @@ catalog: value: SA-04a.[02] class: sp800-53a prose: 'privacy functional requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.a' + rel: assessment-for + links: + - href: '#sa-4_smt.a' + rel: assessment-for - id: sa-4_obj.b name: assessment-objective props: @@ -19953,6 +22673,9 @@ catalog: value: SA-04b. class: sp800-53a prose: 'strength of mechanism requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.b' + rel: assessment-for - id: sa-4_obj.c name: assessment-objective props: @@ -19967,6 +22690,9 @@ catalog: value: SA-04c.[01] class: sp800-53a prose: 'security assurance requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.c' + rel: assessment-for - id: sa-4_obj.c-2 name: assessment-objective props: @@ -19974,6 +22700,12 @@ catalog: value: SA-04c.[02] class: sp800-53a prose: 'privacy assurance requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.c' + rel: assessment-for + links: + - href: '#sa-4_smt.c' + rel: assessment-for - id: sa-4_obj.d name: assessment-objective props: @@ -19988,6 +22720,9 @@ catalog: value: SA-04d.[01] class: sp800-53a prose: 'controls needed to satisfy the security requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.d' + rel: assessment-for - id: sa-4_obj.d-2 name: assessment-objective props: @@ -19995,6 +22730,12 @@ catalog: value: SA-04d.[02] class: sp800-53a prose: 'controls needed to satisfy the privacy requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.d' + rel: assessment-for + links: + - href: '#sa-4_smt.d' + rel: assessment-for - id: sa-4_obj.e name: assessment-objective props: @@ -20009,6 +22750,9 @@ catalog: value: SA-04e.[01] class: sp800-53a prose: 'security documentation requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.e' + rel: assessment-for - id: sa-4_obj.e-2 name: assessment-objective props: @@ -20016,6 +22760,12 @@ catalog: value: SA-04e.[02] class: sp800-53a prose: 'privacy documentation requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.e' + rel: assessment-for + links: + - href: '#sa-4_smt.e' + rel: assessment-for - id: sa-4_obj.f name: assessment-objective props: @@ -20030,6 +22780,9 @@ catalog: value: SA-04f.[01] class: sp800-53a prose: 'requirements for protecting security documentation, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.f' + rel: assessment-for - id: sa-4_obj.f-2 name: assessment-objective props: @@ -20037,6 +22790,12 @@ catalog: value: SA-04f.[02] class: sp800-53a prose: 'requirements for protecting privacy documentation, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.f' + rel: assessment-for + links: + - href: '#sa-4_smt.f' + rel: assessment-for - id: sa-4_obj.g name: assessment-objective props: @@ -20044,6 +22803,9 @@ catalog: value: SA-04g. class: sp800-53a prose: 'the description of the system development environment and environment in which the system is intended to operate, requirements, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.g' + rel: assessment-for - id: sa-4_obj.h name: assessment-objective props: @@ -20058,6 +22820,9 @@ catalog: value: SA-04h.[01] class: sp800-53a prose: 'the allocation of responsibility or identification of parties responsible for information security requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.h' + rel: assessment-for - id: sa-4_obj.h-2 name: assessment-objective props: @@ -20065,6 +22830,9 @@ catalog: value: SA-04h.[02] class: sp800-53a prose: 'the allocation of responsibility or identification of parties responsible for privacy requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }};' + links: + - href: '#sa-4_smt.h' + rel: assessment-for - id: sa-4_obj.h-3 name: assessment-objective props: @@ -20072,6 +22840,12 @@ catalog: value: SA-04h.[03] class: sp800-53a prose: 'the allocation of responsibility or identification of parties responsible for supply chain risk management requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }};' + links: + - href: '#sa-4_smt.h' + rel: assessment-for + links: + - href: '#sa-4_smt.h' + rel: assessment-for - id: sa-4_obj.i name: assessment-objective props: @@ -20079,6 +22853,12 @@ catalog: value: SA-04i. class: sp800-53a prose: 'acceptance criteria requirements and descriptions are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service.' + links: + - href: '#sa-4_smt.i' + rel: assessment-for + links: + - href: '#sa-4_smt' + rel: assessment-for - id: sa-4_asm-examine name: assessment-method props: @@ -20272,6 +23052,9 @@ catalog: value: SA-08[01] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.01 }} are applied in the specification of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-2 name: assessment-objective props: @@ -20279,6 +23062,9 @@ catalog: value: SA-08[02] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.01 }} are applied in the design of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-3 name: assessment-objective props: @@ -20286,6 +23072,9 @@ catalog: value: SA-08[03] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.01 }} are applied in the development of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-4 name: assessment-objective props: @@ -20293,6 +23082,9 @@ catalog: value: SA-08[04] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.01 }} are applied in the implementation of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-5 name: assessment-objective props: @@ -20300,6 +23092,9 @@ catalog: value: SA-08[05] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.01 }} are applied in the modification of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-6 name: assessment-objective props: @@ -20307,6 +23102,9 @@ catalog: value: SA-08[06] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.02 }} are applied in the specification of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-7 name: assessment-objective props: @@ -20314,6 +23112,9 @@ catalog: value: SA-08[07] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.02 }} are applied in the design of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-8 name: assessment-objective props: @@ -20321,6 +23122,9 @@ catalog: value: SA-08[08] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.02 }} are applied in the development of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-9 name: assessment-objective props: @@ -20328,6 +23132,9 @@ catalog: value: SA-08[09] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.02 }} are applied in the implementation of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-10 name: assessment-objective props: @@ -20335,6 +23142,12 @@ catalog: value: SA-08[10] class: sp800-53a prose: ' {{ insert: param, sa-08_odp.02 }} are applied in the modification of the system and system components.' + links: + - href: '#sa-8_smt' + rel: assessment-for + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_asm-examine name: assessment-method props: @@ -20459,6 +23272,9 @@ catalog: value: SA-08(33) class: sp800-53a prose: 'the privacy principle of minimization is implemented using {{ insert: param, sa-08.33_odp }}.' + links: + - href: '#sa-8.33_smt' + rel: assessment-for - id: sa-8.33_asm-examine name: assessment-method props: @@ -20655,6 +23471,9 @@ catalog: value: SA-09a.[01] class: sp800-53a prose: providers of external system services comply with organizational security requirements; + links: + - href: '#sa-9_smt.a' + rel: assessment-for - id: sa-9_obj.a-2 name: assessment-objective props: @@ -20662,6 +23481,9 @@ catalog: value: SA-09a.[02] class: sp800-53a prose: providers of external system services comply with organizational privacy requirements; + links: + - href: '#sa-9_smt.a' + rel: assessment-for - id: sa-9_obj.a-3 name: assessment-objective props: @@ -20669,6 +23491,12 @@ catalog: value: SA-09a.[03] class: sp800-53a prose: 'providers of external system services employ {{ insert: param, sa-09_odp.01 }};' + links: + - href: '#sa-9_smt.a' + rel: assessment-for + links: + - href: '#sa-9_smt.a' + rel: assessment-for - id: sa-9_obj.b name: assessment-objective props: @@ -20683,6 +23511,9 @@ catalog: value: SA-09b.[01] class: sp800-53a prose: organizational oversight with regard to external system services are defined and documented; + links: + - href: '#sa-9_smt.b' + rel: assessment-for - id: sa-9_obj.b-2 name: assessment-objective props: @@ -20690,6 +23521,12 @@ catalog: value: SA-09b.[02] class: sp800-53a prose: user roles and responsibilities with regard to external system services are defined and documented; + links: + - href: '#sa-9_smt.b' + rel: assessment-for + links: + - href: '#sa-9_smt.b' + rel: assessment-for - id: sa-9_obj.c name: assessment-objective props: @@ -20697,6 +23534,12 @@ catalog: value: SA-09c. class: sp800-53a prose: ' {{ insert: param, sa-09_odp.02 }} are employed to monitor control compliance by external service providers on an ongoing basis.' + links: + - href: '#sa-9_smt.c' + rel: assessment-for + links: + - href: '#sa-9_smt' + rel: assessment-for - id: sa-9_asm-examine name: assessment-method props: @@ -20924,6 +23767,9 @@ catalog: value: SA-11a.[01] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to develop a plan for ongoing security assessments; + links: + - href: '#sa-11_smt.a' + rel: assessment-for - id: sa-11_obj.a-2 name: assessment-objective props: @@ -20931,6 +23777,9 @@ catalog: value: SA-11a.[02] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to implement a plan for ongoing security assessments; + links: + - href: '#sa-11_smt.a' + rel: assessment-for - id: sa-11_obj.a-3 name: assessment-objective props: @@ -20938,6 +23787,9 @@ catalog: value: SA-11a.[03] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to develop a plan for privacy assessments; + links: + - href: '#sa-11_smt.a' + rel: assessment-for - id: sa-11_obj.a-4 name: assessment-objective props: @@ -20945,6 +23797,12 @@ catalog: value: SA-11a.[04] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to implement a plan for ongoing privacy assessments; + links: + - href: '#sa-11_smt.a' + rel: assessment-for + links: + - href: '#sa-11_smt.a' + rel: assessment-for - id: sa-11_obj.b name: assessment-objective props: @@ -20952,6 +23810,9 @@ catalog: value: SA-11b. class: sp800-53a prose: 'the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to perform {{ insert: param, sa-11_odp.01 }} testing/evaluation {{ insert: param, sa-11_odp.02 }} at {{ insert: param, sa-11_odp.03 }};' + links: + - href: '#sa-11_smt.b' + rel: assessment-for - id: sa-11_obj.c name: assessment-objective props: @@ -20966,6 +23827,9 @@ catalog: value: SA-11c.[01] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to produce evidence of the execution of the assessment plan; + links: + - href: '#sa-11_smt.c' + rel: assessment-for - id: sa-11_obj.c-2 name: assessment-objective props: @@ -20973,6 +23837,12 @@ catalog: value: SA-11c.[02] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to produce the results of the testing and evaluation; + links: + - href: '#sa-11_smt.c' + rel: assessment-for + links: + - href: '#sa-11_smt.c' + rel: assessment-for - id: sa-11_obj.d name: assessment-objective props: @@ -20980,6 +23850,9 @@ catalog: value: SA-11d. class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to implement a verifiable flaw remediation process; + links: + - href: '#sa-11_smt.d' + rel: assessment-for - id: sa-11_obj.e name: assessment-objective props: @@ -20987,6 +23860,12 @@ catalog: value: SA-11e. class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to correct flaws identified during testing and evaluation. + links: + - href: '#sa-11_smt.e' + rel: assessment-for + links: + - href: '#sa-11_smt' + rel: assessment-for - id: sa-11_asm-examine name: assessment-method props: @@ -21207,6 +24086,9 @@ catalog: value: SC-07a.[01] class: sp800-53a prose: communications at external managed interfaces to the system are monitored; + links: + - href: '#sc-7_smt.a' + rel: assessment-for - id: sc-7_obj.a-2 name: assessment-objective props: @@ -21214,6 +24096,9 @@ catalog: value: SC-07a.[02] class: sp800-53a prose: communications at external managed interfaces to the system are controlled; + links: + - href: '#sc-7_smt.a' + rel: assessment-for - id: sc-7_obj.a-3 name: assessment-objective props: @@ -21221,6 +24106,9 @@ catalog: value: SC-07a.[03] class: sp800-53a prose: communications at key internal managed interfaces within the system are monitored; + links: + - href: '#sc-7_smt.a' + rel: assessment-for - id: sc-7_obj.a-4 name: assessment-objective props: @@ -21228,6 +24116,12 @@ catalog: value: SC-07a.[04] class: sp800-53a prose: communications at key internal managed interfaces within the system are controlled; + links: + - href: '#sc-7_smt.a' + rel: assessment-for + links: + - href: '#sc-7_smt.a' + rel: assessment-for - id: sc-7_obj.b name: assessment-objective props: @@ -21235,6 +24129,9 @@ catalog: value: SC-07b. class: sp800-53a prose: 'subnetworks for publicly accessible system components are {{ insert: param, sc-07_odp }} separated from internal organizational networks;' + links: + - href: '#sc-7_smt.b' + rel: assessment-for - id: sc-7_obj.c name: assessment-objective props: @@ -21242,6 +24139,12 @@ catalog: value: SC-07c. class: sp800-53a prose: external networks or systems are only connected to through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security and privacy architecture. + links: + - href: '#sc-7_smt.c' + rel: assessment-for + links: + - href: '#sc-7_smt' + rel: assessment-for - id: sc-7_asm-examine name: assessment-method props: @@ -21386,6 +24289,9 @@ catalog: value: SC-07(24)(a) class: sp800-53a prose: ' {{ insert: param, sc-07.24_odp }} are applied to data elements of personally identifiable information on systems that process personally identifiable information;' + links: + - href: '#sc-7.24_smt.a' + rel: assessment-for - id: sc-7.24_obj.b name: assessment-objective props: @@ -21400,6 +24306,9 @@ catalog: value: SC-07(24)(b)[01] class: sp800-53a prose: permitted processing is monitored at the external interfaces to the systems that process personally identifiable information; + links: + - href: '#sc-7.24_smt.b' + rel: assessment-for - id: sc-7.24_obj.b-2 name: assessment-objective props: @@ -21407,6 +24316,12 @@ catalog: value: SC-07(24)(b)[02] class: sp800-53a prose: permitted processing is monitored at key internal boundaries within the systems that process personally identifiable information; + links: + - href: '#sc-7.24_smt.b' + rel: assessment-for + links: + - href: '#sc-7.24_smt.b' + rel: assessment-for - id: sc-7.24_obj.c name: assessment-objective props: @@ -21414,6 +24329,9 @@ catalog: value: SC-07(24)(c) class: sp800-53a prose: each processing exception is documented for systems that process personally identifiable information; + links: + - href: '#sc-7.24_smt.c' + rel: assessment-for - id: sc-7.24_obj.d name: assessment-objective props: @@ -21428,6 +24346,9 @@ catalog: value: SC-07(24)(d)[01] class: sp800-53a prose: exceptions for systems that process personally identifiable information are reviewed; + links: + - href: '#sc-7.24_smt.d' + rel: assessment-for - id: sc-7.24_obj.d-2 name: assessment-objective props: @@ -21435,6 +24356,15 @@ catalog: value: SC-07(24)(d)[02] class: sp800-53a prose: exceptions for systems that process personally identifiable information that are no longer supported are removed. + links: + - href: '#sc-7.24_smt.d' + rel: assessment-for + links: + - href: '#sc-7.24_smt.d' + rel: assessment-for + links: + - href: '#sc-7.24_smt' + rel: assessment-for - id: sc-7.24_asm-examine name: assessment-method props: @@ -21713,6 +24643,9 @@ catalog: value: SI-01a.[01] class: sp800-53a prose: a system and information integrity policy is developed and documented; + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.a-2 name: assessment-objective props: @@ -21720,6 +24653,9 @@ catalog: value: SI-01a.[02] class: sp800-53a prose: 'the system and information integrity policy is disseminated to {{ insert: param, si-01_odp.01 }};' + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.a-3 name: assessment-objective props: @@ -21727,6 +24663,9 @@ catalog: value: SI-01a.[03] class: sp800-53a prose: system and information integrity procedures to facilitate the implementation of the system and information integrity policy and associated system and information integrity controls are developed and documented; + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.a-4 name: assessment-objective props: @@ -21734,6 +24673,9 @@ catalog: value: SI-01a.[04] class: sp800-53a prose: 'the system and information integrity procedures are disseminated to {{ insert: param, si-01_odp.02 }};' + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.a.1 name: assessment-objective props: @@ -21755,6 +24697,9 @@ catalog: value: SI-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses purpose;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-2 name: assessment-objective props: @@ -21762,6 +24707,9 @@ catalog: value: SI-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses scope;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-3 name: assessment-objective props: @@ -21769,6 +24717,9 @@ catalog: value: SI-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses roles;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-4 name: assessment-objective props: @@ -21776,6 +24727,9 @@ catalog: value: SI-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses responsibilities;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-5 name: assessment-objective props: @@ -21783,6 +24737,9 @@ catalog: value: SI-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses management commitment;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-6 name: assessment-objective props: @@ -21790,6 +24747,9 @@ catalog: value: SI-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses coordination among organizational entities;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-7 name: assessment-objective props: @@ -21797,6 +24757,12 @@ catalog: value: SI-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses compliance;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.b name: assessment-objective props: @@ -21804,6 +24770,15 @@ catalog: value: SI-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#si-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#si-1_smt.a.1' + rel: assessment-for + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.b name: assessment-objective props: @@ -21811,6 +24786,9 @@ catalog: value: SI-01b. class: sp800-53a prose: 'the {{ insert: param, si-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the system and information integrity policy and procedures;' + links: + - href: '#si-1_smt.b' + rel: assessment-for - id: si-1_obj.c name: assessment-objective props: @@ -21832,6 +24810,9 @@ catalog: value: SI-01c.01[01] class: sp800-53a prose: 'the current system and information integrity policy is reviewed and updated {{ insert: param, si-01_odp.05 }};' + links: + - href: '#si-1_smt.c.1' + rel: assessment-for - id: si-1_obj.c.1-2 name: assessment-objective props: @@ -21839,6 +24820,12 @@ catalog: value: SI-01c.01[02] class: sp800-53a prose: 'the current system and information integrity policy is reviewed and updated following {{ insert: param, si-01_odp.06 }};' + links: + - href: '#si-1_smt.c.1' + rel: assessment-for + links: + - href: '#si-1_smt.c.1' + rel: assessment-for - id: si-1_obj.c.2 name: assessment-objective props: @@ -21853,6 +24840,9 @@ catalog: value: SI-01c.02[01] class: sp800-53a prose: 'the current system and information integrity procedures are reviewed and updated {{ insert: param, si-01_odp.07 }};' + links: + - href: '#si-1_smt.c.2' + rel: assessment-for - id: si-1_obj.c.2-2 name: assessment-objective props: @@ -21860,6 +24850,18 @@ catalog: value: SI-01c.02[02] class: sp800-53a prose: 'the current system and information integrity procedures are reviewed and updated following {{ insert: param, si-01_odp.08 }}.' + links: + - href: '#si-1_smt.c.2' + rel: assessment-for + links: + - href: '#si-1_smt.c.2' + rel: assessment-for + links: + - href: '#si-1_smt.c' + rel: assessment-for + links: + - href: '#si-1_smt' + rel: assessment-for - id: si-1_asm-examine name: assessment-method props: @@ -21998,6 +25000,9 @@ catalog: value: SI-12[01] class: sp800-53a prose: information within the system is managed in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, guidelines, and operational requirements; + links: + - href: '#si-12_smt' + rel: assessment-for - id: si-12_obj-2 name: assessment-objective props: @@ -22005,6 +25010,9 @@ catalog: value: SI-12[02] class: sp800-53a prose: information within the system is retained in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, guidelines, and operational requirements; + links: + - href: '#si-12_smt' + rel: assessment-for - id: si-12_obj-3 name: assessment-objective props: @@ -22012,6 +25020,9 @@ catalog: value: SI-12[03] class: sp800-53a prose: information output from the system is managed in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, guidelines, and operational requirements; + links: + - href: '#si-12_smt' + rel: assessment-for - id: si-12_obj-4 name: assessment-objective props: @@ -22019,6 +25030,12 @@ catalog: value: SI-12[04] class: sp800-53a prose: information output from the system is retained in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, guidelines, and operational requirements. + links: + - href: '#si-12_smt' + rel: assessment-for + links: + - href: '#si-12_smt' + rel: assessment-for - id: si-12_asm-examine name: assessment-method props: @@ -22139,6 +25156,9 @@ catalog: value: SI-12(01) class: sp800-53a prose: 'personally identifiable information being processed in the information life cycle is limited to {{ insert: param, si-12.01_odp }}.' + links: + - href: '#si-12.1_smt' + rel: assessment-for - id: si-12.1_asm-examine name: assessment-method props: @@ -22297,6 +25317,9 @@ catalog: value: SI-12(02)[01] class: sp800-53a prose: ' {{ insert: param, si-12.02_odp.01 }} are used to minimize the use of personally identifiable information for research;' + links: + - href: '#si-12.2_smt' + rel: assessment-for - id: si-12.2_obj-2 name: assessment-objective props: @@ -22304,6 +25327,9 @@ catalog: value: SI-12(02)[02] class: sp800-53a prose: ' {{ insert: param, si-12.02_odp.02 }} are used to minimize the use of personally identifiable information for testing;' + links: + - href: '#si-12.2_smt' + rel: assessment-for - id: si-12.2_obj-3 name: assessment-objective props: @@ -22311,6 +25337,12 @@ catalog: value: SI-12(02)[03] class: sp800-53a prose: ' {{ insert: param, si-12.02_odp.03 }} are used to minimize the use of personally identifiable information for training.' + links: + - href: '#si-12.2_smt' + rel: assessment-for + links: + - href: '#si-12.2_smt' + rel: assessment-for - id: si-12.2_asm-examine name: assessment-method props: @@ -22461,6 +25493,9 @@ catalog: value: SI-12(03)[01] class: sp800-53a prose: ' {{ insert: param, si-12.03_odp.01 }} are used to dispose of information following the retention period;' + links: + - href: '#si-12.3_smt' + rel: assessment-for - id: si-12.3_obj-2 name: assessment-objective props: @@ -22468,6 +25503,9 @@ catalog: value: SI-12(03)[02] class: sp800-53a prose: ' {{ insert: param, si-12.03_odp.02 }} are used to destroy information following the retention period;' + links: + - href: '#si-12.3_smt' + rel: assessment-for - id: si-12.3_obj-3 name: assessment-objective props: @@ -22475,6 +25513,12 @@ catalog: value: SI-12(03)[03] class: sp800-53a prose: ' {{ insert: param, si-12.03_odp.03 }} are used to erase information following the retention period.' + links: + - href: '#si-12.3_smt' + rel: assessment-for + links: + - href: '#si-12.3_smt' + rel: assessment-for - id: si-12.3_asm-examine name: assessment-method props: @@ -22672,6 +25716,9 @@ catalog: value: SI-18a.[01] class: sp800-53a prose: 'the accuracy of personally identifiable information across the information life cycle is checked {{ insert: param, si-18_odp.01 }};' + links: + - href: '#si-18_smt.a' + rel: assessment-for - id: si-18_obj.a-2 name: assessment-objective props: @@ -22679,6 +25726,9 @@ catalog: value: SI-18a.[02] class: sp800-53a prose: 'the relevance of personally identifiable information across the information life cycle is checked {{ insert: param, si-18_odp.02 }};' + links: + - href: '#si-18_smt.a' + rel: assessment-for - id: si-18_obj.a-3 name: assessment-objective props: @@ -22686,6 +25736,9 @@ catalog: value: SI-18a.[03] class: sp800-53a prose: 'the timeliness of personally identifiable information across the information life cycle is checked {{ insert: param, si-18_odp.03 }};' + links: + - href: '#si-18_smt.a' + rel: assessment-for - id: si-18_obj.a-4 name: assessment-objective props: @@ -22693,6 +25746,12 @@ catalog: value: SI-18a.[04] class: sp800-53a prose: 'the completeness of personally identifiable information across the information life cycle is checked {{ insert: param, si-18_odp.04 }};' + links: + - href: '#si-18_smt.a' + rel: assessment-for + links: + - href: '#si-18_smt.a' + rel: assessment-for - id: si-18_obj.b name: assessment-objective props: @@ -22700,6 +25759,12 @@ catalog: value: SI-18b. class: sp800-53a prose: inaccurate or outdated personally identifiable information is corrected or deleted. + links: + - href: '#si-18_smt.b' + rel: assessment-for + links: + - href: '#si-18_smt' + rel: assessment-for - id: si-18_asm-examine name: assessment-method props: @@ -22804,6 +25869,9 @@ catalog: value: SI-18(04) class: sp800-53a prose: personally identifiable information is corrected or deleted upon request by individuals or their designated representatives. + links: + - href: '#si-18.4_smt' + rel: assessment-for - id: si-18.4_asm-examine name: assessment-method props: @@ -22960,6 +26028,9 @@ catalog: value: SI-19a. class: sp800-53a prose: ' {{ insert: param, si-19_odp.01 }} are removed from datasets;' + links: + - href: '#si-19_smt.a' + rel: assessment-for - id: si-19_obj.b name: assessment-objective props: @@ -22967,6 +26038,12 @@ catalog: value: SI-19b. class: sp800-53a prose: 'the effectiveness of de-identification is evaluated {{ insert: param, si-19_odp.02 }}.' + links: + - href: '#si-19_smt.b' + rel: assessment-for + links: + - href: '#si-19_smt' + rel: assessment-for - id: si-19_asm-examine name: assessment-method props: diff --git a/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_PRIVACY-baseline_profile.yaml b/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_PRIVACY-baseline_profile.yaml index 4a05fd9d..8cce5b1b 100644 --- a/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_PRIVACY-baseline_profile.yaml +++ b/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_PRIVACY-baseline_profile.yaml @@ -1,9 +1,9 @@ profile: - uuid: 66b95dd9-650d-456f-b143-19ae7bb36944 + uuid: c8485895-a2f7-46f1-843a-380668cd6fe8 metadata: - title: NIST Special Publication 800-53 Revision 5 PRIVACY BASELINE - last-modified: "2023-10-12T00:00:00.000000-04:00" - version: Final + title: NIST Special Publication 800-53 Revision 5.1.1 PRIVACY BASELINE + last-modified: "2023-12-04T14:55:00.000000-04:00" + version: 5.1.1+u2 oscal-version: 1.1.1 roles: - id: creator diff --git a/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_catalog.yaml b/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_catalog.yaml index c9693153..d26dc942 100644 --- a/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_catalog.yaml +++ b/nist.gov/SP800-53/rev5/yaml/NIST_SP-800-53_rev5_catalog.yaml @@ -1,10 +1,27 @@ catalog: - uuid: 0e9e8558-4d93-4a7f-8c87-34d4d4f9e7bd + uuid: 1f2fcda3-408f-422c-aecd-b1717c3f7843 metadata: - title: Electronic Version of NIST SP 800-53 Rev 5 Controls and SP 800-53A Rev 5 Assessment Procedures - last-modified: "2023-10-12T00:00:00.000000-04:00" - version: 5.1.1 + title: Electronic Version of NIST SP 800-53 Rev 5.1.1 Controls and SP 800-53A Rev 5.1.1 Assessment Procedures + last-modified: "2023-12-04T13:16:10.000000-04:00" + version: 5.1.1+u2 oscal-version: 1.1.1 + revisions: + - title: Electronic Version of NIST SP 800-53 Rev 5 Controls and SP 800-53A Rev 5 Assessment Procedures + last-modified: "2023-10-12T00:00:00.000000-04:00" + version: 5.1.1 + oscal-version: 1.1.1 + links: + - href: '#5a5ffcb9-2272-484e-8d47-4483a0585dec' + rel: version-history + remarks: This revison of the SP 800-53 Revision 5 Catalog includes metadata and tagging reflecting richer control semantics, such as organizational vs system-level controls as indicated in SP800-53 Rev 5.1 Appendix C, and minor bug fixes in its content. + - title: Electronic Version of NIST SP 800-53 Rev 5.1.1 Controls and SP 800-53A Rev 5.1.1 Assessment Procedures + last-modified: "2023-11-14T00:00:00.000000-04:00" + version: 5.1.1+u1 + oscal-version: 1.1.1 + links: + - href: '#5a5ffcb9-2272-484e-8d47-4483a0585dec' + rel: version-history + remarks: This revision of the SP 800-53 Revision 5 Catalog is the finalized changes to NIST SP 800-53 Revision 5.1.1 on November, 7, 2023. props: - name: keywords value: Assessment, assessment plan, assurance, availability, computer security, confidentiality, control, control assessment, cybersecurity, FISMA, information security, information system, integrity, personally identifiable information, OSCAL, Open Security Controls Assessment Language, Privacy Act, privacy controls, privacy functions, privacy requirements, Risk Management Framework, security controls, security functions, security requirements, system, system security @@ -259,6 +276,9 @@ catalog: value: AC-01a.[01] class: sp800-53a prose: an access control policy is developed and documented; + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.a-2 name: assessment-objective props: @@ -266,6 +286,9 @@ catalog: value: AC-01a.[02] class: sp800-53a prose: 'the access control policy is disseminated to {{ insert: param, ac-01_odp.01 }};' + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.a-3 name: assessment-objective props: @@ -273,6 +296,9 @@ catalog: value: AC-01a.[03] class: sp800-53a prose: access control procedures to facilitate the implementation of the access control policy and associated controls are developed and documented; + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.a-4 name: assessment-objective props: @@ -280,6 +306,9 @@ catalog: value: AC-01a.[04] class: sp800-53a prose: 'the access control procedures are disseminated to {{ insert: param, ac-01_odp.02 }};' + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.a.1 name: assessment-objective props: @@ -301,6 +330,9 @@ catalog: value: AC-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses purpose;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-2 name: assessment-objective props: @@ -308,6 +340,9 @@ catalog: value: AC-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses scope;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-3 name: assessment-objective props: @@ -315,6 +350,9 @@ catalog: value: AC-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses roles;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-4 name: assessment-objective props: @@ -322,6 +360,9 @@ catalog: value: AC-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses responsibilities;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-5 name: assessment-objective props: @@ -329,6 +370,9 @@ catalog: value: AC-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses management commitment;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-6 name: assessment-objective props: @@ -336,6 +380,9 @@ catalog: value: AC-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses coordination among organizational entities;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.a-7 name: assessment-objective props: @@ -343,6 +390,12 @@ catalog: value: AC-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy addresses compliance;' + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ac-1_smt.a.1.a' + rel: assessment-for - id: ac-1_obj.a.1.b name: assessment-objective props: @@ -350,6 +403,15 @@ catalog: value: AC-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.03 }} access control policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ac-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ac-1_smt.a.1' + rel: assessment-for + links: + - href: '#ac-1_smt.a' + rel: assessment-for - id: ac-1_obj.b name: assessment-objective props: @@ -357,6 +419,9 @@ catalog: value: AC-01b. class: sp800-53a prose: 'the {{ insert: param, ac-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the access control policy and procedures;' + links: + - href: '#ac-1_smt.b' + rel: assessment-for - id: ac-1_obj.c name: assessment-objective props: @@ -378,6 +443,9 @@ catalog: value: AC-01c.01[01] class: sp800-53a prose: 'the current access control policy is reviewed and updated {{ insert: param, ac-01_odp.05 }};' + links: + - href: '#ac-1_smt.c.1' + rel: assessment-for - id: ac-1_obj.c.1-2 name: assessment-objective props: @@ -385,6 +453,12 @@ catalog: value: AC-01c.01[02] class: sp800-53a prose: 'the current access control policy is reviewed and updated following {{ insert: param, ac-01_odp.06 }};' + links: + - href: '#ac-1_smt.c.1' + rel: assessment-for + links: + - href: '#ac-1_smt.c.1' + rel: assessment-for - id: ac-1_obj.c.2 name: assessment-objective props: @@ -399,6 +473,9 @@ catalog: value: AC-01c.02[01] class: sp800-53a prose: 'the current access control procedures are reviewed and updated {{ insert: param, ac-01_odp.07 }};' + links: + - href: '#ac-1_smt.c.2' + rel: assessment-for - id: ac-1_obj.c.2-2 name: assessment-objective props: @@ -406,6 +483,18 @@ catalog: value: AC-01c.02[02] class: sp800-53a prose: 'the current access control procedures are reviewed and updated following {{ insert: param, ac-01_odp.08 }}.' + links: + - href: '#ac-1_smt.c.2' + rel: assessment-for + links: + - href: '#ac-1_smt.c.2' + rel: assessment-for + links: + - href: '#ac-1_smt.c' + rel: assessment-for + links: + - href: '#ac-1_smt' + rel: assessment-for - id: ac-1_asm-examine name: assessment-method props: @@ -780,6 +869,9 @@ catalog: value: AC-02a.[01] class: sp800-53a prose: account types allowed for use within the system are defined and documented; + links: + - href: '#ac-2_smt.a' + rel: assessment-for - id: ac-2_obj.a-2 name: assessment-objective props: @@ -787,6 +879,12 @@ catalog: value: AC-02a.[02] class: sp800-53a prose: account types specifically prohibited for use within the system are defined and documented; + links: + - href: '#ac-2_smt.a' + rel: assessment-for + links: + - href: '#ac-2_smt.a' + rel: assessment-for - id: ac-2_obj.b name: assessment-objective props: @@ -794,6 +892,9 @@ catalog: value: AC-02b. class: sp800-53a prose: account managers are assigned; + links: + - href: '#ac-2_smt.b' + rel: assessment-for - id: ac-2_obj.c name: assessment-objective props: @@ -801,6 +902,9 @@ catalog: value: AC-02c. class: sp800-53a prose: '{{ insert: param, ac-02_odp.01 }} for group and role membership are required;' + links: + - href: '#ac-2_smt.c' + rel: assessment-for - id: ac-2_obj.d name: assessment-objective props: @@ -815,6 +919,9 @@ catalog: value: AC-02d.01 class: sp800-53a prose: authorized users of the system are specified; + links: + - href: '#ac-2_smt.d.1' + rel: assessment-for - id: ac-2_obj.d.2 name: assessment-objective props: @@ -822,6 +929,9 @@ catalog: value: AC-02d.02 class: sp800-53a prose: group and role membership are specified; + links: + - href: '#ac-2_smt.d.2' + rel: assessment-for - id: ac-2_obj.d.3 name: assessment-objective props: @@ -836,6 +946,9 @@ catalog: value: AC-02d.03[01] class: sp800-53a prose: access authorizations (i.e., privileges) are specified for each account; + links: + - href: '#ac-2_smt.d.3' + rel: assessment-for - id: ac-2_obj.d.3-2 name: assessment-objective props: @@ -843,6 +956,15 @@ catalog: value: AC-02d.03[02] class: sp800-53a prose: '{{ insert: param, ac-02_odp.02 }} are specified for each account;' + links: + - href: '#ac-2_smt.d.3' + rel: assessment-for + links: + - href: '#ac-2_smt.d.3' + rel: assessment-for + links: + - href: '#ac-2_smt.d' + rel: assessment-for - id: ac-2_obj.e name: assessment-objective props: @@ -850,6 +972,9 @@ catalog: value: AC-02e. class: sp800-53a prose: 'approvals are required by {{ insert: param, ac-02_odp.03 }} for requests to create accounts;' + links: + - href: '#ac-2_smt.e' + rel: assessment-for - id: ac-2_obj.f name: assessment-objective props: @@ -864,6 +989,9 @@ catalog: value: AC-02f.[01] class: sp800-53a prose: 'accounts are created in accordance with {{ insert: param, ac-02_odp.04 }};' + links: + - href: '#ac-2_smt.f' + rel: assessment-for - id: ac-2_obj.f-2 name: assessment-objective props: @@ -871,6 +999,9 @@ catalog: value: AC-02f.[02] class: sp800-53a prose: 'accounts are enabled in accordance with {{ insert: param, ac-02_odp.04 }};' + links: + - href: '#ac-2_smt.f' + rel: assessment-for - id: ac-2_obj.f-3 name: assessment-objective props: @@ -878,6 +1009,9 @@ catalog: value: AC-02f.[03] class: sp800-53a prose: 'accounts are modified in accordance with {{ insert: param, ac-02_odp.04 }};' + links: + - href: '#ac-2_smt.f' + rel: assessment-for - id: ac-2_obj.f-4 name: assessment-objective props: @@ -885,6 +1019,9 @@ catalog: value: AC-02f.[04] class: sp800-53a prose: 'accounts are disabled in accordance with {{ insert: param, ac-02_odp.04 }};' + links: + - href: '#ac-2_smt.f' + rel: assessment-for - id: ac-2_obj.f-5 name: assessment-objective props: @@ -892,6 +1029,12 @@ catalog: value: AC-02f.[05] class: sp800-53a prose: 'accounts are removed in accordance with {{ insert: param, ac-02_odp.04 }};' + links: + - href: '#ac-2_smt.f' + rel: assessment-for + links: + - href: '#ac-2_smt.f' + rel: assessment-for - id: ac-2_obj.g name: assessment-objective props: @@ -899,6 +1042,9 @@ catalog: value: AC-02g. class: sp800-53a prose: 'the use of accounts is monitored; ' + links: + - href: '#ac-2_smt.g' + rel: assessment-for - id: ac-2_obj.h name: assessment-objective props: @@ -913,6 +1059,9 @@ catalog: value: AC-02h.01 class: sp800-53a prose: 'account managers and {{ insert: param, ac-02_odp.05 }} are notified within {{ insert: param, ac-02_odp.06 }} when accounts are no longer required;' + links: + - href: '#ac-2_smt.h.1' + rel: assessment-for - id: ac-2_obj.h.2 name: assessment-objective props: @@ -920,6 +1069,9 @@ catalog: value: AC-02h.02 class: sp800-53a prose: 'account managers and {{ insert: param, ac-02_odp.05 }} are notified within {{ insert: param, ac-02_odp.07 }} when users are terminated or transferred;' + links: + - href: '#ac-2_smt.h.2' + rel: assessment-for - id: ac-2_obj.h.3 name: assessment-objective props: @@ -927,6 +1079,12 @@ catalog: value: AC-02h.03 class: sp800-53a prose: 'account managers and {{ insert: param, ac-02_odp.05 }} are notified within {{ insert: param, ac-02_odp.08 }} when system usage or the need to know changes for an individual;' + links: + - href: '#ac-2_smt.h.3' + rel: assessment-for + links: + - href: '#ac-2_smt.h' + rel: assessment-for - id: ac-2_obj.i name: assessment-objective props: @@ -941,6 +1099,9 @@ catalog: value: AC-02i.01 class: sp800-53a prose: access to the system is authorized based on a valid access authorization; + links: + - href: '#ac-2_smt.i.1' + rel: assessment-for - id: ac-2_obj.i.2 name: assessment-objective props: @@ -948,6 +1109,9 @@ catalog: value: AC-02i.02 class: sp800-53a prose: access to the system is authorized based on intended system usage; + links: + - href: '#ac-2_smt.i.2' + rel: assessment-for - id: ac-2_obj.i.3 name: assessment-objective props: @@ -955,6 +1119,12 @@ catalog: value: AC-02i.03 class: sp800-53a prose: 'access to the system is authorized based on {{ insert: param, ac-02_odp.09 }};' + links: + - href: '#ac-2_smt.i.3' + rel: assessment-for + links: + - href: '#ac-2_smt.i' + rel: assessment-for - id: ac-2_obj.j name: assessment-objective props: @@ -962,6 +1132,9 @@ catalog: value: AC-02j. class: sp800-53a prose: 'accounts are reviewed for compliance with account management requirements {{ insert: param, ac-02_odp.10 }};' + links: + - href: '#ac-2_smt.j' + rel: assessment-for - id: ac-2_obj.k name: assessment-objective props: @@ -976,6 +1149,9 @@ catalog: value: AC-02k.[01] class: sp800-53a prose: a process is established for changing shared or group account authenticators (if deployed) when individuals are removed from the group; + links: + - href: '#ac-2_smt.k' + rel: assessment-for - id: ac-2_obj.k-2 name: assessment-objective props: @@ -983,6 +1159,12 @@ catalog: value: AC-02k.[02] class: sp800-53a prose: a process is implemented for changing shared or group account authenticators (if deployed) when individuals are removed from the group; + links: + - href: '#ac-2_smt.k' + rel: assessment-for + links: + - href: '#ac-2_smt.k' + rel: assessment-for - id: ac-2_obj.l name: assessment-objective props: @@ -997,6 +1179,9 @@ catalog: value: AC-02l.[01] class: sp800-53a prose: account management processes are aligned with personnel termination processes; + links: + - href: '#ac-2_smt.l' + rel: assessment-for - id: ac-2_obj.l-2 name: assessment-objective props: @@ -1004,6 +1189,15 @@ catalog: value: AC-02l.[02] class: sp800-53a prose: account management processes are aligned with personnel transfer processes. + links: + - href: '#ac-2_smt.l' + rel: assessment-for + links: + - href: '#ac-2_smt.l' + rel: assessment-for + links: + - href: '#ac-2_smt' + rel: assessment-for - id: ac-2_asm-examine name: assessment-method props: @@ -1124,6 +1318,9 @@ catalog: value: AC-02(01) class: sp800-53a prose: 'the management of system accounts is supported using {{ insert: param, ac-02.01_odp }}.' + links: + - href: '#ac-2.1_smt' + rel: assessment-for - id: ac-2.1_asm-examine name: assessment-method props: @@ -1236,6 +1433,9 @@ catalog: value: AC-02(02) class: sp800-53a prose: 'temporary and emergency accounts are automatically {{ insert: param, ac-02.02_odp.01 }} after {{ insert: param, ac-02.02_odp.02 }}.' + links: + - href: '#ac-2.2_smt' + rel: assessment-for - id: ac-2.2_asm-examine name: assessment-method props: @@ -1380,6 +1580,9 @@ catalog: value: AC-02(03)(a) class: sp800-53a prose: 'accounts are disabled within {{ insert: param, ac-02.03_odp.01 }} when the accounts have expired;' + links: + - href: '#ac-2.3_smt.a' + rel: assessment-for - id: ac-2.3_obj.b name: assessment-objective props: @@ -1387,6 +1590,9 @@ catalog: value: AC-02(03)(b) class: sp800-53a prose: 'accounts are disabled within {{ insert: param, ac-02.03_odp.01 }} when the accounts are no longer associated with a user or individual;' + links: + - href: '#ac-2.3_smt.b' + rel: assessment-for - id: ac-2.3_obj.c name: assessment-objective props: @@ -1394,6 +1600,9 @@ catalog: value: AC-02(03)(c) class: sp800-53a prose: 'accounts are disabled within {{ insert: param, ac-02.03_odp.01 }} when the accounts are in violation of organizational policy;' + links: + - href: '#ac-2.3_smt.c' + rel: assessment-for - id: ac-2.3_obj.d name: assessment-objective props: @@ -1401,6 +1610,12 @@ catalog: value: AC-02(03)(d) class: sp800-53a prose: 'accounts are disabled within {{ insert: param, ac-02.03_odp.01 }} when the accounts have been inactive for {{ insert: param, ac-02.03_odp.02 }}.' + links: + - href: '#ac-2.3_smt.d' + rel: assessment-for + links: + - href: '#ac-2.3_smt' + rel: assessment-for - id: ac-2.3_asm-examine name: assessment-method props: @@ -1505,6 +1720,9 @@ catalog: value: AC-02(04)[01] class: sp800-53a prose: account creation is automatically audited; + links: + - href: '#ac-2.4_smt' + rel: assessment-for - id: ac-2.4_obj-2 name: assessment-objective props: @@ -1512,6 +1730,9 @@ catalog: value: AC-02(04)[02] class: sp800-53a prose: account modification is automatically audited; + links: + - href: '#ac-2.4_smt' + rel: assessment-for - id: ac-2.4_obj-3 name: assessment-objective props: @@ -1519,6 +1740,9 @@ catalog: value: AC-02(04)[03] class: sp800-53a prose: account enabling is automatically audited; + links: + - href: '#ac-2.4_smt' + rel: assessment-for - id: ac-2.4_obj-4 name: assessment-objective props: @@ -1526,6 +1750,9 @@ catalog: value: AC-02(04)[04] class: sp800-53a prose: account disabling is automatically audited; + links: + - href: '#ac-2.4_smt' + rel: assessment-for - id: ac-2.4_obj-5 name: assessment-objective props: @@ -1533,6 +1760,12 @@ catalog: value: AC-02(04)[05] class: sp800-53a prose: account removal actions are automatically audited. + links: + - href: '#ac-2.4_smt' + rel: assessment-for + links: + - href: '#ac-2.4_smt' + rel: assessment-for - id: ac-2.4_asm-examine name: assessment-method props: @@ -1636,6 +1869,9 @@ catalog: value: AC-02(05) class: sp800-53a prose: 'users are required to log out when {{ insert: param, ac-02.05_odp }}.' + links: + - href: '#ac-2.5_smt' + rel: assessment-for - id: ac-2.5_asm-examine name: assessment-method props: @@ -1726,6 +1962,9 @@ catalog: value: AC-02(06) class: sp800-53a prose: '{{ insert: param, ac-02.06_odp }} are implemented.' + links: + - href: '#ac-2.6_smt' + rel: assessment-for - id: ac-2.6_asm-examine name: assessment-method props: @@ -1858,6 +2097,9 @@ catalog: value: AC-02(07)(a) class: sp800-53a prose: 'privileged user accounts are established and administered in accordance with {{ insert: param, ac-02.07_odp }};' + links: + - href: '#ac-2.7_smt.a' + rel: assessment-for - id: ac-2.7_obj.b name: assessment-objective props: @@ -1865,6 +2107,9 @@ catalog: value: AC-02(07)(b) class: sp800-53a prose: privileged role or attribute assignments are monitored; + links: + - href: '#ac-2.7_smt.b' + rel: assessment-for - id: ac-2.7_obj.c name: assessment-objective props: @@ -1872,6 +2117,9 @@ catalog: value: AC-02(07)(c) class: sp800-53a prose: changes to roles or attributes are monitored; + links: + - href: '#ac-2.7_smt.c' + rel: assessment-for - id: ac-2.7_obj.d name: assessment-objective props: @@ -1879,6 +2127,12 @@ catalog: value: AC-02(07)(d) class: sp800-53a prose: access is revoked when privileged role or attribute assignments are no longer appropriate. + links: + - href: '#ac-2.7_smt.d' + rel: assessment-for + links: + - href: '#ac-2.7_smt' + rel: assessment-for - id: ac-2.7_asm-examine name: assessment-method props: @@ -1995,6 +2249,9 @@ catalog: value: AC-02(08)[01] class: sp800-53a prose: '{{ insert: param, ac-02.08_odp }} are created dynamically;' + links: + - href: '#ac-2.8_smt' + rel: assessment-for - id: ac-2.8_obj-2 name: assessment-objective props: @@ -2002,6 +2259,9 @@ catalog: value: AC-02(08)[02] class: sp800-53a prose: '{{ insert: param, ac-02.08_odp }} are activated dynamically;' + links: + - href: '#ac-2.8_smt' + rel: assessment-for - id: ac-2.8_obj-3 name: assessment-objective props: @@ -2009,6 +2269,9 @@ catalog: value: AC-02(08)[03] class: sp800-53a prose: '{{ insert: param, ac-02.08_odp }} are managed dynamically;' + links: + - href: '#ac-2.8_smt' + rel: assessment-for - id: ac-2.8_obj-4 name: assessment-objective props: @@ -2016,6 +2279,12 @@ catalog: value: AC-02(08)[04] class: sp800-53a prose: '{{ insert: param, ac-02.08_odp }} are deactivated dynamically.' + links: + - href: '#ac-2.8_smt' + rel: assessment-for + links: + - href: '#ac-2.8_smt' + rel: assessment-for - id: ac-2.8_asm-examine name: assessment-method props: @@ -2119,6 +2388,9 @@ catalog: value: AC-02(09) class: sp800-53a prose: 'the use of shared and group accounts is only permitted if {{ insert: param, ac-02.09_odp }} are met.' + links: + - href: '#ac-2.9_smt' + rel: assessment-for - id: ac-2.9_asm-examine name: assessment-method props: @@ -2243,6 +2515,9 @@ catalog: value: AC-02(11) class: sp800-53a prose: '{{ insert: param, ac-02.11_odp.01 }} for {{ insert: param, ac-02.11_odp.02 }} are enforced.' + links: + - href: '#ac-2.11_smt' + rel: assessment-for - id: ac-2.11_asm-examine name: assessment-method props: @@ -2385,6 +2660,9 @@ catalog: value: AC-02(12)(a) class: sp800-53a prose: 'system accounts are monitored for {{ insert: param, ac-02.12_odp.01 }}; ' + links: + - href: '#ac-2.12_smt.a' + rel: assessment-for - id: ac-2.12_obj.b name: assessment-objective props: @@ -2392,6 +2670,12 @@ catalog: value: AC-02(12)(b) class: sp800-53a prose: 'atypical usage of system accounts is reported to {{ insert: param, ac-02.12_odp.02 }}.' + links: + - href: '#ac-2.12_smt.b' + rel: assessment-for + links: + - href: '#ac-2.12_smt' + rel: assessment-for - id: ac-2.12_asm-examine name: assessment-method props: @@ -2510,6 +2794,9 @@ catalog: value: AC-02(13) class: sp800-53a prose: 'accounts of individuals are disabled within {{ insert: param, ac-02.13_odp.01 }} of discovery of {{ insert: param, ac-02.13_odp.02 }}.' + links: + - href: '#ac-2.13_smt' + rel: assessment-for - id: ac-2.13_asm-examine name: assessment-method props: @@ -2647,6 +2934,8 @@ catalog: rel: related - href: '#ia-11' rel: related + - href: '#ia-13' + rel: related - href: '#ma-3' rel: related - href: '#ma-4' @@ -2699,6 +2988,9 @@ catalog: value: AC-03 class: sp800-53a prose: approved authorizations for logical access to information and system resources are enforced in accordance with applicable access control policies. + links: + - href: '#ac-3_smt' + rel: assessment-for - id: ac-3_asm-examine name: assessment-method props: @@ -2825,6 +3117,9 @@ catalog: value: AC-03(02) class: sp800-53a prose: 'dual authorization is enforced for {{ insert: param, ac-03.02_odp }}.' + links: + - href: '#ac-3.2_smt' + rel: assessment-for - id: ac-3.2_asm-examine name: assessment-method props: @@ -3024,6 +3319,9 @@ catalog: value: AC-03(03)[01] class: sp800-53a prose: '{{ insert: param, ac-03.03_odp.01 }} is enforced over the set of covered subjects specified in the policy;' + links: + - href: '#ac-3.3_smt' + rel: assessment-for - id: ac-3.3_obj-2 name: assessment-objective props: @@ -3031,6 +3329,9 @@ catalog: value: AC-03(03)[02] class: sp800-53a prose: '{{ insert: param, ac-03.03_odp.02 }} is enforced over the set of covered objects specified in the policy;' + links: + - href: '#ac-3.3_smt' + rel: assessment-for - id: ac-3.3_obj.a name: assessment-objective props: @@ -3045,6 +3346,9 @@ catalog: value: AC-03(03)(a)[01] class: sp800-53a prose: '{{ insert: param, ac-03.03_odp.01 }} is uniformly enforced across the covered subjects within the system;' + links: + - href: '#ac-3.3_smt.a' + rel: assessment-for - id: ac-3.3_obj.a-2 name: assessment-objective props: @@ -3052,6 +3356,12 @@ catalog: value: AC-03(03)(a)[02] class: sp800-53a prose: '{{ insert: param, ac-03.03_odp.02 }} is uniformly enforced across the covered objects within the system;' + links: + - href: '#ac-3.3_smt.a' + rel: assessment-for + links: + - href: '#ac-3.3_smt.a' + rel: assessment-for - id: ac-3.3_obj.b name: assessment-objective props: @@ -3066,6 +3376,9 @@ catalog: value: AC-03(03)(b)(01) class: sp800-53a prose: '{{ insert: param, ac-03.03_odp.01 }} and {{ insert: param, ac-03.03_odp.02 }} specifying that a subject that has been granted access to information is constrained from passing the information to unauthorized subjects or objects are enforced;' + links: + - href: '#ac-3.3_smt.b.1' + rel: assessment-for - id: ac-3.3_obj.b.2 name: assessment-objective props: @@ -3073,6 +3386,9 @@ catalog: value: AC-03(03)(b)(02) class: sp800-53a prose: '{{ insert: param, ac-03.03_odp.01 }} and {{ insert: param, ac-03.03_odp.02 }} specifying that a subject that has been granted access to information is constrained from granting its privileges to other subjects are enforced;' + links: + - href: '#ac-3.3_smt.b.2' + rel: assessment-for - id: ac-3.3_obj.b.3 name: assessment-objective props: @@ -3080,6 +3396,9 @@ catalog: value: AC-03(03)(b)(03) class: sp800-53a prose: '{{ insert: param, ac-03.03_odp.01 }} and {{ insert: param, ac-03.03_odp.02 }} specifying that a subject that has been granted access to information is constrained from changing one of more security attributes (specified by the policy) on subjects, objects, the system, or system components are enforced;' + links: + - href: '#ac-3.3_smt.b.3' + rel: assessment-for - id: ac-3.3_obj.b.4 name: assessment-objective props: @@ -3087,6 +3406,9 @@ catalog: value: AC-03(03)(b)(04) class: sp800-53a prose: '{{ insert: param, ac-03.03_odp.01 }} and {{ insert: param, ac-03.03_odp.02 }} specifying that a subject that has been granted access to information is constrained from choosing the security attributes and attribute values (specified by the policy) to be associated with newly created or modified objects are enforced;' + links: + - href: '#ac-3.3_smt.b.4' + rel: assessment-for - id: ac-3.3_obj.b.5 name: assessment-objective props: @@ -3094,6 +3416,12 @@ catalog: value: AC-03(03)(b)(05) class: sp800-53a prose: '{{ insert: param, ac-03.03_odp.01 }} and {{ insert: param, ac-03.03_odp.02 }} specifying that a subject that has been granted access to information is constrained from changing the rules governing access control are enforced;' + links: + - href: '#ac-3.3_smt.b.5' + rel: assessment-for + links: + - href: '#ac-3.3_smt.b' + rel: assessment-for - id: ac-3.3_obj.c name: assessment-objective props: @@ -3101,6 +3429,12 @@ catalog: value: AC-03(03)(c) class: sp800-53a prose: '{{ insert: param, ac-03.03_odp.01 }} and {{ insert: param, ac-03.03_odp.02 }} specifying that {{ insert: param, ac-03.03_odp.03 }} may explicitly be granted {{ insert: param, ac-03.03_odp.04 }} such that they are not limited by any defined subset (or all) of the above constraints are enforced.' + links: + - href: '#ac-3.3_smt.c' + rel: assessment-for + links: + - href: '#ac-3.3_smt' + rel: assessment-for - id: ac-3.3_asm-examine name: assessment-method props: @@ -3256,6 +3590,9 @@ catalog: value: AC-03(04)[01] class: sp800-53a prose: '{{ insert: param, ac-03.04_odp.01 }} is enforced over the set of covered subjects specified in the policy;' + links: + - href: '#ac-3.4_smt' + rel: assessment-for - id: ac-3.4_obj-2 name: assessment-objective props: @@ -3263,6 +3600,9 @@ catalog: value: AC-03(04)[02] class: sp800-53a prose: '{{ insert: param, ac-03.04_odp.02 }} is enforced over the set of covered objects specified in the policy;' + links: + - href: '#ac-3.4_smt' + rel: assessment-for - id: ac-3.4_obj.a name: assessment-objective props: @@ -3270,6 +3610,9 @@ catalog: value: AC-03(04)(a) class: sp800-53a prose: '{{ insert: param, ac-03.04_odp.01 }} and {{ insert: param, ac-03.04_odp.02 }} are enforced where the policy specifies that a subject that has been granted access to information can pass the information to any other subjects or objects;' + links: + - href: '#ac-3.4_smt.a' + rel: assessment-for - id: ac-3.4_obj.b name: assessment-objective props: @@ -3277,6 +3620,9 @@ catalog: value: AC-03(04)(b) class: sp800-53a prose: '{{ insert: param, ac-03.04_odp.01 }} and {{ insert: param, ac-03.04_odp.02 }} are enforced where the policy specifies that a subject that has been granted access to information can grant its privileges to other subjects;' + links: + - href: '#ac-3.4_smt.b' + rel: assessment-for - id: ac-3.4_obj.c name: assessment-objective props: @@ -3284,6 +3630,9 @@ catalog: value: AC-03(04)(c) class: sp800-53a prose: '{{ insert: param, ac-03.04_odp.01 }} and {{ insert: param, ac-03.04_odp.02 }} are enforced where the policy specifies that a subject that has been granted access to information can change security attributes on subjects, objects, the system, or the system’s components;' + links: + - href: '#ac-3.4_smt.c' + rel: assessment-for - id: ac-3.4_obj.d name: assessment-objective props: @@ -3291,6 +3640,9 @@ catalog: value: AC-03(04)(d) class: sp800-53a prose: '{{ insert: param, ac-03.04_odp.01 }} and {{ insert: param, ac-03.04_odp.02 }} are enforced where the policy specifies that a subject that has been granted access to information can choose the security attributes to be associated with newly created or revised objects;' + links: + - href: '#ac-3.4_smt.d' + rel: assessment-for - id: ac-3.4_obj.e name: assessment-objective props: @@ -3298,6 +3650,12 @@ catalog: value: AC-03(04)(e) class: sp800-53a prose: '{{ insert: param, ac-03.04_odp.01 }} and {{ insert: param, ac-03.04_odp.02 }} are enforced where the policy specifies that a subject that has been granted access to information can change the rules governing access control.' + links: + - href: '#ac-3.4_smt.e' + rel: assessment-for + links: + - href: '#ac-3.4_smt' + rel: assessment-for - id: ac-3.4_asm-examine name: assessment-method props: @@ -3404,6 +3762,9 @@ catalog: value: AC-03(05) class: sp800-53a prose: 'access to {{ insert: param, ac-03.05_odp }} is prevented except during secure, non-operable system states.' + links: + - href: '#ac-3.5_smt' + rel: assessment-for - id: ac-3.5_asm-examine name: assessment-method props: @@ -3545,6 +3906,9 @@ catalog: value: AC-03(07)[01] class: sp800-53a prose: a role-based access control policy is enforced over defined subjects; + links: + - href: '#ac-3.7_smt' + rel: assessment-for - id: ac-3.7_obj-2 name: assessment-objective props: @@ -3552,6 +3916,9 @@ catalog: value: AC-03(07)[02] class: sp800-53a prose: a role-based access control policy is enforced over defined objects; + links: + - href: '#ac-3.7_smt' + rel: assessment-for - id: ac-3.7_obj-3 name: assessment-objective props: @@ -3559,6 +3926,12 @@ catalog: value: AC-03(07)[03] class: sp800-53a prose: 'access is controlled based on {{ insert: param, ac-03.07_odp.01 }} and {{ insert: param, ac-03.07_odp.02 }}.' + links: + - href: '#ac-3.7_smt' + rel: assessment-for + links: + - href: '#ac-3.7_smt' + rel: assessment-for - id: ac-3.7_asm-examine name: assessment-method props: @@ -3676,6 +4049,9 @@ catalog: value: AC-03(08)[01] class: sp800-53a prose: 'revocation of access authorizations is enforced, resulting from changes to the security attributes of subjects based on {{ insert: param, ac-03.08_odp }};' + links: + - href: '#ac-3.8_smt' + rel: assessment-for - id: ac-3.8_obj-2 name: assessment-objective props: @@ -3683,6 +4059,12 @@ catalog: value: AC-03(08)[02] class: sp800-53a prose: 'revocation of access authorizations is enforced resulting from changes to the security attributes of objects based on {{ insert: param, ac-03.08_odp }}.' + links: + - href: '#ac-3.8_smt' + rel: assessment-for + links: + - href: '#ac-3.8_smt' + rel: assessment-for - id: ac-3.8_asm-examine name: assessment-method props: @@ -3837,6 +4219,9 @@ catalog: value: AC-03(09)(a) class: sp800-53a prose: 'information is released outside of the system only if the receiving {{ insert: param, ac-03.09_odp.01 }} provides {{ insert: param, ac-03.09_odp.02 }};' + links: + - href: '#ac-3.9_smt.a' + rel: assessment-for - id: ac-3.9_obj.b name: assessment-objective props: @@ -3844,6 +4229,12 @@ catalog: value: AC-03(09)(b) class: sp800-53a prose: 'information is released outside of the system only if {{ insert: param, ac-03.09_odp.03 }} are used to validate the appropriateness of the information designated for release.' + links: + - href: '#ac-3.9_smt.b' + rel: assessment-for + links: + - href: '#ac-3.9_smt' + rel: assessment-for - id: ac-3.9_asm-examine name: assessment-method props: @@ -3980,6 +4371,9 @@ catalog: value: AC-03(10) class: sp800-53a prose: 'an audited override of automated access control mechanisms is employed under {{ insert: param, ac-03.10_odp.01 }} by {{ insert: param, ac-03.10_odp.02 }}.' + links: + - href: '#ac-3.10_smt' + rel: assessment-for - id: ac-3.10_asm-examine name: assessment-method props: @@ -4086,6 +4480,9 @@ catalog: value: AC-03(11) class: sp800-53a prose: 'access to data repositories containing {{ insert: param, ac-03.11_odp }} is restricted.' + links: + - href: '#ac-3.11_smt' + rel: assessment-for - id: ac-3.11_asm-examine name: assessment-method props: @@ -4211,6 +4608,9 @@ catalog: value: AC-03(12)(a) class: sp800-53a prose: 'as part of the installation process, applications are required to assert the access needed to the following system applications and functions: {{ insert: param, ac-03.12_odp }};' + links: + - href: '#ac-3.12_smt.a' + rel: assessment-for - id: ac-3.12_obj.b name: assessment-objective props: @@ -4218,6 +4618,9 @@ catalog: value: AC-03(12)(b) class: sp800-53a prose: 'an enforcement mechanism to prevent unauthorized access is provided; ' + links: + - href: '#ac-3.12_smt.b' + rel: assessment-for - id: ac-3.12_obj.c name: assessment-objective props: @@ -4225,6 +4628,12 @@ catalog: value: AC-03(12)(c) class: sp800-53a prose: access changes after initial installation of the application are approved. + links: + - href: '#ac-3.12_smt.c' + rel: assessment-for + links: + - href: '#ac-3.12_smt' + rel: assessment-for - id: ac-3.12_asm-examine name: assessment-method props: @@ -4331,6 +4740,9 @@ catalog: value: AC-03(13)[01] class: sp800-53a prose: the attribute-based access control policy is enforced over defined subjects; + links: + - href: '#ac-3.13_smt' + rel: assessment-for - id: ac-3.13_obj-2 name: assessment-objective props: @@ -4338,6 +4750,9 @@ catalog: value: AC-03(13)[02] class: sp800-53a prose: the attribute-based access control policy is enforced over defined objects; + links: + - href: '#ac-3.13_smt' + rel: assessment-for - id: ac-3.13_obj-3 name: assessment-objective props: @@ -4345,6 +4760,12 @@ catalog: value: AC-03(13)[03] class: sp800-53a prose: 'access is controlled based on {{ insert: param, ac-03.13_odp }}.' + links: + - href: '#ac-3.13_smt' + rel: assessment-for + links: + - href: '#ac-3.13_smt' + rel: assessment-for - id: ac-3.13_asm-examine name: assessment-method props: @@ -4463,6 +4884,9 @@ catalog: value: AC-03(14) class: sp800-53a prose: '{{ insert: param, ac-03.14_odp.01 }} are provided to enable individuals to have access to {{ insert: param, ac-03.14_odp.02 }} of their personally identifiable information.' + links: + - href: '#ac-3.14_smt' + rel: assessment-for - id: ac-3.14_asm-examine name: assessment-method props: @@ -4646,6 +5070,9 @@ catalog: value: AC-03(15)(a)[01] class: sp800-53a prose: '{{ insert: param, ac-03.15_odp.01 }} is enforced over the set of covered subjects specified in the policy;' + links: + - href: '#ac-3.15_smt.a' + rel: assessment-for - id: ac-3.15_obj.a-2 name: assessment-objective props: @@ -4653,6 +5080,12 @@ catalog: value: AC-03(15)(a)[02] class: sp800-53a prose: '{{ insert: param, ac-03.15_odp.02 }} is enforced over the set of covered objects specified in the policy;' + links: + - href: '#ac-3.15_smt.a' + rel: assessment-for + links: + - href: '#ac-3.15_smt.a' + rel: assessment-for - id: ac-3.15_obj.b name: assessment-objective props: @@ -4667,6 +5100,9 @@ catalog: value: AC-03(15)(b)[01] class: sp800-53a prose: '{{ insert: param, ac-03.15_odp.03 }} is enforced over the set of covered subjects specified in the policy;' + links: + - href: '#ac-3.15_smt.b' + rel: assessment-for - id: ac-3.15_obj.b-2 name: assessment-objective props: @@ -4674,6 +5110,15 @@ catalog: value: AC-03(15)(b)[02] class: sp800-53a prose: '{{ insert: param, ac-03.15_odp.04 }} is enforced over the set of covered objects specified in the policy.' + links: + - href: '#ac-3.15_smt.b' + rel: assessment-for + links: + - href: '#ac-3.15_smt.b' + rel: assessment-for + links: + - href: '#ac-3.15_smt' + rel: assessment-for - id: ac-3.15_asm-examine name: assessment-method props: @@ -4819,6 +5264,9 @@ catalog: value: AC-04 class: sp800-53a prose: 'approved authorizations are enforced for controlling the flow of information within the system and between connected systems based on {{ insert: param, ac-04_odp }}.' + links: + - href: '#ac-4_smt' + rel: assessment-for - id: ac-4_asm-examine name: assessment-method props: @@ -5031,6 +5479,9 @@ catalog: value: AC-04(01)[01] class: sp800-53a prose: '{{ insert: param, ac-04.01_odp.01 }} associated with {{ insert: param, ac-04.01_odp.03 }}, {{ insert: param, ac-04.01_odp.05 }} , and {{ insert: param, ac-04.01_odp.07 }} are used to enforce {{ insert: param, ac-04.01_odp.09 }} as a basis for flow control decisions;' + links: + - href: '#ac-4.1_smt' + rel: assessment-for - id: ac-4.1_obj-2 name: assessment-objective props: @@ -5038,6 +5489,12 @@ catalog: value: AC-04(01)[02] class: sp800-53a prose: '{{ insert: param, ac-04.01_odp.02 }} associated with {{ insert: param, ac-04.01_odp.04 }}, {{ insert: param, ac-04.01_odp.06 }} , and {{ insert: param, ac-04.01_odp.08 }} are used to enforce {{ insert: param, ac-04.01_odp.09 }} as a basis for flow control decisions.' + links: + - href: '#ac-4.1_smt' + rel: assessment-for + links: + - href: '#ac-4.1_smt' + rel: assessment-for - id: ac-4.1_asm-examine name: assessment-method props: @@ -5144,6 +5601,9 @@ catalog: value: AC-04(02) class: sp800-53a prose: 'protected processing domains are used to enforce {{ insert: param, ac-04.02_odp }} as a basis for flow control decisions.' + links: + - href: '#ac-4.2_smt' + rel: assessment-for - id: ac-4.2_asm-examine name: assessment-method props: @@ -5244,6 +5704,9 @@ catalog: value: AC-04(03) class: sp800-53a prose: '{{ insert: param, ac-04.03_odp }} are enforced.' + links: + - href: '#ac-4.3_smt' + rel: assessment-for - id: ac-4.3_asm-examine name: assessment-method props: @@ -5373,6 +5836,9 @@ catalog: value: AC-04(04) class: sp800-53a prose: 'encrypted information is prevented from bypassing {{ insert: param, ac-04.04_odp.01 }} by {{ insert: param, ac-04.04_odp.02 }}.' + links: + - href: '#ac-4.4_smt' + rel: assessment-for - id: ac-4.4_asm-examine name: assessment-method props: @@ -5471,6 +5937,9 @@ catalog: value: AC-04(05) class: sp800-53a prose: '{{ insert: param, ac-04.05_odp }} are enforced on embedding data types within other data types.' + links: + - href: '#ac-4.5_smt' + rel: assessment-for - id: ac-4.5_asm-examine name: assessment-method props: @@ -5573,6 +6042,9 @@ catalog: value: AC-04(06) class: sp800-53a prose: 'information flow control enforcement is based on {{ insert: param, ac-04.06_odp }}.' + links: + - href: '#ac-4.6_smt' + rel: assessment-for - id: ac-4.6_asm-examine name: assessment-method props: @@ -5662,6 +6134,9 @@ catalog: value: AC-04(07) class: sp800-53a prose: one-way information flows are enforced through hardware-based flow control mechanisms. + links: + - href: '#ac-4.7_smt' + rel: assessment-for - id: ac-4.7_asm-examine name: assessment-method props: @@ -5867,6 +6342,9 @@ catalog: value: AC-04(08)(a)[01] class: sp800-53a prose: 'information flow control is enforced using {{ insert: param, ac-04.08_odp.01 }} as a basis for flow control decisions for {{ insert: param, ac-04.08_odp.03 }};' + links: + - href: '#ac-4.8_smt.a' + rel: assessment-for - id: ac-4.8_obj.a-2 name: assessment-objective props: @@ -5874,6 +6352,12 @@ catalog: value: AC-04(08)(a)[02] class: sp800-53a prose: 'information flow control is enforced using {{ insert: param, ac-04.08_odp.02 }} as a basis for flow control decisions for {{ insert: param, ac-04.08_odp.04 }};' + links: + - href: '#ac-4.8_smt.a' + rel: assessment-for + links: + - href: '#ac-4.8_smt.a' + rel: assessment-for - id: ac-4.8_obj.b name: assessment-objective props: @@ -5884,6 +6368,12 @@ catalog: {{ insert: param, ac-04.08_odp.05 }} data after a filter processing failure in accordance with {{ insert: param, ac-04.08_odp.06 }}; {{ insert: param, ac-04.08_odp.05 }} data after a filter processing failure in accordance with {{ insert: param, ac-04.08_odp.07 }}. + links: + - href: '#ac-4.8_smt.b' + rel: assessment-for + links: + - href: '#ac-4.8_smt' + rel: assessment-for - id: ac-4.8_asm-examine name: assessment-method props: @@ -6004,6 +6494,9 @@ catalog: value: AC-04(09) class: sp800-53a prose: 'human reviews are used for {{ insert: param, ac-04.09_odp.01 }} under {{ insert: param, ac-04.09_odp.02 }}.' + links: + - href: '#ac-4.9_smt' + rel: assessment-for - id: ac-4.9_asm-examine name: assessment-method props: @@ -6159,6 +6652,9 @@ catalog: value: AC-04(10)[01] class: sp800-53a prose: 'capability is provided for privileged administrators to enable and disable {{ insert: param, ac-04.10_odp.01 }} under {{ insert: param, ac-04.10_odp.03 }};' + links: + - href: '#ac-4.10_smt' + rel: assessment-for - id: ac-4.10_obj-2 name: assessment-objective props: @@ -6166,6 +6662,12 @@ catalog: value: AC-04(10)[02] class: sp800-53a prose: 'capability is provided for privileged administrators to enable and disable {{ insert: param, ac-04.10_odp.02 }} under {{ insert: param, ac-04.10_odp.04 }}.' + links: + - href: '#ac-4.10_smt' + rel: assessment-for + links: + - href: '#ac-4.10_smt' + rel: assessment-for - id: ac-4.10_asm-examine name: assessment-method props: @@ -6299,6 +6801,9 @@ catalog: value: AC-04(11)[01] class: sp800-53a prose: 'capability is provided for privileged administrators to configure {{ insert: param, ac-04.11_odp.01 }} to support different security or privacy policies;' + links: + - href: '#ac-4.11_smt' + rel: assessment-for - id: ac-4.11_obj-2 name: assessment-objective props: @@ -6306,6 +6811,12 @@ catalog: value: AC-04(11)[02] class: sp800-53a prose: 'capability is provided for privileged administrators to configure {{ insert: param, ac-04.11_odp.02 }} to support different security or privacy policies.' + links: + - href: '#ac-4.11_smt' + rel: assessment-for + links: + - href: '#ac-4.11_smt' + rel: assessment-for - id: ac-4.11_asm-examine name: assessment-method props: @@ -6415,6 +6926,9 @@ catalog: value: AC-04(12) class: sp800-53a prose: 'when transferring information between different security domains, {{ insert: param, ac-04.12_odp }} are used to validate data essential for information flow decisions.' + links: + - href: '#ac-4.12_smt' + rel: assessment-for - id: ac-4.12_asm-examine name: assessment-method props: @@ -6515,6 +7029,9 @@ catalog: value: AC-04(13) class: sp800-53a prose: 'when transferring information between different security domains, information is decomposed into {{ insert: param, ac-04.13_odp }} for submission to policy enforcement mechanisms.' + links: + - href: '#ac-4.13_smt' + rel: assessment-for - id: ac-4.13_asm-examine name: assessment-method props: @@ -6635,6 +7152,9 @@ catalog: value: AC-04(14)[01] class: sp800-53a prose: 'when transferring information between different security domains, implemented {{ insert: param, ac-04.14_odp.01 }} require fully enumerated formats that restrict data structure and content;' + links: + - href: '#ac-4.14_smt' + rel: assessment-for - id: ac-4.14_obj-2 name: assessment-objective props: @@ -6642,6 +7162,12 @@ catalog: value: AC-04(14)[02] class: sp800-53a prose: 'when transferring information between different security domains, implemented {{ insert: param, ac-04.14_odp.02 }} require fully enumerated formats that restrict data structure and content.' + links: + - href: '#ac-4.14_smt' + rel: assessment-for + links: + - href: '#ac-4.14_smt' + rel: assessment-for - id: ac-4.14_asm-examine name: assessment-method props: @@ -6785,6 +7311,9 @@ catalog: value: AC-04(15)[01] class: sp800-53a prose: 'when transferring information between different security domains, information is examined for the presence of {{ insert: param, ac-04.15_odp.01 }};' + links: + - href: '#ac-4.15_smt' + rel: assessment-for - id: ac-4.15_obj-2 name: assessment-objective props: @@ -6792,6 +7321,9 @@ catalog: value: AC-04(15)[02] class: sp800-53a prose: 'when transferring information between different security domains, transfer of {{ insert: param, ac-04.15_odp.01 }} is prohibited in accordance with the {{ insert: param, ac-04.15_odp.02 }};' + links: + - href: '#ac-4.15_smt' + rel: assessment-for - id: ac-4.15_obj-3 name: assessment-objective props: @@ -6799,6 +7331,12 @@ catalog: value: AC-04(15)[03] class: sp800-53a prose: 'when transferring information between different security domains, transfer of {{ insert: param, ac-04.15_odp.01 }} is prohibited in accordance with the {{ insert: param, ac-04.15_odp.03 }}.' + links: + - href: '#ac-4.15_smt' + rel: assessment-for + links: + - href: '#ac-4.15_smt' + rel: assessment-for - id: ac-4.15_asm-examine name: assessment-method props: @@ -6924,6 +7462,9 @@ catalog: value: AC-04(17) class: sp800-53a prose: 'source and destination points are uniquely identified and authenticated by {{ insert: param, ac-04.17_odp }} for information transfer.' + links: + - href: '#ac-4.17_smt' + rel: assessment-for - id: ac-4.17_asm-examine name: assessment-method props: @@ -7066,6 +7607,9 @@ catalog: value: AC-04(19)[01] class: sp800-53a prose: 'when transferring information between different security domains, {{ insert: param, ac-04.19_odp.01 }} are implemented on metadata;' + links: + - href: '#ac-4.19_smt' + rel: assessment-for - id: ac-4.19_obj-2 name: assessment-objective props: @@ -7073,6 +7617,12 @@ catalog: value: AC-04(19)[02] class: sp800-53a prose: 'when transferring information between different security domains, {{ insert: param, ac-04.19_odp.02 }} are implemented on metadata.' + links: + - href: '#ac-4.19_smt' + rel: assessment-for + links: + - href: '#ac-4.19_smt' + rel: assessment-for - id: ac-4.19_asm-examine name: assessment-method props: @@ -7192,6 +7742,9 @@ catalog: value: AC-04(20) class: sp800-53a prose: '{{ insert: param, ac-04.20_odp.01 }} are employed to control the flow of {{ insert: param, ac-04.20_odp.02 }} across security domains.' + links: + - href: '#ac-4.20_smt' + rel: assessment-for - id: ac-4.20_asm-examine name: assessment-method props: @@ -7334,6 +7887,9 @@ catalog: value: AC-04(21)[01] class: sp800-53a prose: 'information flows are separated logically using {{ insert: param, ac-04.21_odp.01 }} to accomplish {{ insert: param, ac-04.21_odp.03 }};' + links: + - href: '#ac-4.21_smt' + rel: assessment-for - id: ac-4.21_obj-2 name: assessment-objective props: @@ -7341,6 +7897,12 @@ catalog: value: AC-04(21)[02] class: sp800-53a prose: 'information flows are separated physically using {{ insert: param, ac-04.21_odp.02 }} to accomplish {{ insert: param, ac-04.21_odp.03 }}.' + links: + - href: '#ac-4.21_smt' + rel: assessment-for + links: + - href: '#ac-4.21_smt' + rel: assessment-for - id: ac-4.21_asm-examine name: assessment-method props: @@ -7434,6 +7996,9 @@ catalog: value: AC-04(22) class: sp800-53a prose: access is provided from a single device to computing platforms, applications, or data that reside in multiple different security domains while preventing information flow between the different security domains. + links: + - href: '#ac-4.22_smt' + rel: assessment-for - id: ac-4.22_asm-examine name: assessment-method props: @@ -7533,6 +8098,9 @@ catalog: value: AC-04(23) class: sp800-53a prose: 'when transferring information between security domains, non-releasable information is modified by implementing {{ insert: param, ac-04.23_odp }}.' + links: + - href: '#ac-4.23_smt' + rel: assessment-for - id: ac-4.23_asm-examine name: assessment-method props: @@ -7625,6 +8193,9 @@ catalog: value: AC-04(24)[01] class: sp800-53a prose: when transferring information between different security domains, incoming data is parsed into an internal, normalized format; + links: + - href: '#ac-4.24_smt' + rel: assessment-for - id: ac-4.24_obj-2 name: assessment-objective props: @@ -7632,6 +8203,12 @@ catalog: value: AC-04(24)[02] class: sp800-53a prose: when transferring information between different security domains, the data is regenerated to be consistent with its intended specification. + links: + - href: '#ac-4.24_smt' + rel: assessment-for + links: + - href: '#ac-4.24_smt' + rel: assessment-for - id: ac-4.24_asm-examine name: assessment-method props: @@ -7742,6 +8319,9 @@ catalog: value: AC-04(25) class: sp800-53a prose: 'when transferring information between different security domains, data is sanitized to minimize {{ insert: param, ac-04.25_odp.01 }} in accordance with {{ insert: param, ac-04.25_odp.02 }}.' + links: + - href: '#ac-4.25_smt' + rel: assessment-for - id: ac-4.25_asm-examine name: assessment-method props: @@ -7843,6 +8423,9 @@ catalog: value: AC-04(26)[01] class: sp800-53a prose: when transferring information between different security domains, content-filtering actions are recorded and audited; + links: + - href: '#ac-4.26_smt' + rel: assessment-for - id: ac-4.26_obj-2 name: assessment-objective props: @@ -7850,6 +8433,12 @@ catalog: value: AC-04(26)[02] class: sp800-53a prose: when transferring information between different security domains, results for the information being filtered are recorded and audited. + links: + - href: '#ac-4.26_smt' + rel: assessment-for + links: + - href: '#ac-4.26_smt' + rel: assessment-for - id: ac-4.26_asm-examine name: assessment-method props: @@ -7940,6 +8529,9 @@ catalog: value: AC-04(27) class: sp800-53a prose: when transferring information between security domains, implemented content filtering solutions provide redundant and independent filtering mechanisms for each data type. + links: + - href: '#ac-4.27_smt' + rel: assessment-for - id: ac-4.27_asm-examine name: assessment-method props: @@ -8025,6 +8617,9 @@ catalog: value: AC-04(28) class: sp800-53a prose: when transferring information between security domains, a linear content filter pipeline is implemented that is enforced with discretionary and mandatory access controls. + links: + - href: '#ac-4.28_smt' + rel: assessment-for - id: ac-4.28_asm-examine name: assessment-method props: @@ -8147,6 +8742,9 @@ catalog: value: AC-04(29)(a) class: sp800-53a prose: when transferring information between security domains, content filter orchestration engines are employed to ensure that content-filtering mechanisms successfully complete execution without errors; + links: + - href: '#ac-4.29_smt.a' + rel: assessment-for - id: ac-4.29_obj.b name: assessment-objective props: @@ -8161,6 +8759,9 @@ catalog: value: AC-04(29)(b)[01] class: sp800-53a prose: when transferring information between security domains, content filter orchestration engines are employed to ensure that content-filtering actions occur in the correct order; + links: + - href: '#ac-4.29_smt.b' + rel: assessment-for - id: ac-4.29_obj.b-2 name: assessment-objective props: @@ -8168,6 +8769,15 @@ catalog: value: AC-04(29)(b)[02] class: sp800-53a prose: 'when transferring information between security domains, content filter orchestration engines are employed to ensure that content-filtering actions comply with {{ insert: param, ac-04.29_odp }}.' + links: + - href: '#ac-4.29_smt.b' + rel: assessment-for + links: + - href: '#ac-4.29_smt.b' + rel: assessment-for + links: + - href: '#ac-4.29_smt' + rel: assessment-for - id: ac-4.29_asm-examine name: assessment-method props: @@ -8256,6 +8866,9 @@ catalog: value: AC-04(30) class: sp800-53a prose: when transferring information between security domains, content-filtering mechanisms using multiple processes are implemented. + links: + - href: '#ac-4.30_smt' + rel: assessment-for - id: ac-4.30_asm-examine name: assessment-method props: @@ -8344,6 +8957,9 @@ catalog: value: AC-04(31) class: sp800-53a prose: when transferring information between different security domains, the transfer of failed content to the receiving domain is prevented. + links: + - href: '#ac-4.31_smt' + rel: assessment-for - id: ac-4.31_asm-examine name: assessment-method props: @@ -8461,6 +9077,9 @@ catalog: value: AC-04(32)(a) class: sp800-53a prose: when transferring information between different security domains, the process that transfers information between filter pipelines does not filter message content; + links: + - href: '#ac-4.32_smt.a' + rel: assessment-for - id: ac-4.32_obj.b name: assessment-objective props: @@ -8468,6 +9087,9 @@ catalog: value: AC-04(32)(b) class: sp800-53a prose: when transferring information between different security domains, the process that transfers information between filter pipelines validates filtering metadata; + links: + - href: '#ac-4.32_smt.b' + rel: assessment-for - id: ac-4.32_obj.c name: assessment-objective props: @@ -8475,6 +9097,9 @@ catalog: value: AC-04(32)(c) class: sp800-53a prose: when transferring information between different security domains, the process that transfers information between filter pipelines ensures that the content with the filtering metadata has successfully completed filtering; + links: + - href: '#ac-4.32_smt.c' + rel: assessment-for - id: ac-4.32_obj.d name: assessment-objective props: @@ -8482,6 +9107,12 @@ catalog: value: AC-04(32)(d) class: sp800-53a prose: when transferring information between different security domains, the process that transfers information between filter pipelines transfers the content to the destination filter pipeline. + links: + - href: '#ac-4.32_smt.d' + rel: assessment-for + links: + - href: '#ac-4.32_smt' + rel: assessment-for - id: ac-4.32_asm-examine name: assessment-method props: @@ -8633,6 +9264,9 @@ catalog: value: AC-05a. class: sp800-53a prose: '{{ insert: param, ac-05_odp }} are identified and documented;' + links: + - href: '#ac-5_smt.a' + rel: assessment-for - id: ac-5_obj.b name: assessment-objective props: @@ -8640,6 +9274,12 @@ catalog: value: AC-05b. class: sp800-53a prose: system access authorizations to support separation of duties are defined. + links: + - href: '#ac-5_smt.b' + rel: assessment-for + links: + - href: '#ac-5_smt' + rel: assessment-for - id: ac-5_asm-examine name: assessment-method props: @@ -8749,6 +9389,9 @@ catalog: value: AC-06 class: sp800-53a prose: the principle of least privilege is employed, allowing only authorized accesses for users (or processes acting on behalf of users) that are necessary to accomplish assigned organizational tasks. + links: + - href: '#ac-6_smt' + rel: assessment-for - id: ac-6_asm-examine name: assessment-method props: @@ -8932,6 +9575,9 @@ catalog: value: AC-06(01)(a)[01] class: sp800-53a prose: 'access is authorized for {{ insert: param, ac-06.01_odp.01 }} to {{ insert: param, ac-06.01_odp.02 }};' + links: + - href: '#ac-6.1_smt.a' + rel: assessment-for - id: ac-6.1_obj.a-2 name: assessment-objective props: @@ -8939,6 +9585,9 @@ catalog: value: AC-06(01)(a)[02] class: sp800-53a prose: 'access is authorized for {{ insert: param, ac-06.01_odp.01 }} to {{ insert: param, ac-06.01_odp.03 }};' + links: + - href: '#ac-6.1_smt.a' + rel: assessment-for - id: ac-6.1_obj.a-3 name: assessment-objective props: @@ -8946,6 +9595,12 @@ catalog: value: AC-06(01)(a)[03] class: sp800-53a prose: 'access is authorized for {{ insert: param, ac-06.01_odp.01 }} to {{ insert: param, ac-06.01_odp.04 }};' + links: + - href: '#ac-6.1_smt.a' + rel: assessment-for + links: + - href: '#ac-6.1_smt.a' + rel: assessment-for - id: ac-6.1_obj.b name: assessment-objective props: @@ -8953,6 +9608,12 @@ catalog: value: AC-06(01)(b) class: sp800-53a prose: 'access is authorized for {{ insert: param, ac-06.01_odp.01 }} to {{ insert: param, ac-06.01_odp.05 }}.' + links: + - href: '#ac-6.1_smt.b' + rel: assessment-for + links: + - href: '#ac-6.1_smt' + rel: assessment-for - id: ac-6.1_asm-examine name: assessment-method props: @@ -9057,6 +9718,9 @@ catalog: value: AC-06(02) class: sp800-53a prose: 'users of system accounts (or roles) with access to {{ insert: param, ac-06.02_odp }} are required to use non-privileged accounts or roles when accessing non-security functions.' + links: + - href: '#ac-6.2_smt' + rel: assessment-for - id: ac-6.2_asm-examine name: assessment-method props: @@ -9176,6 +9840,9 @@ catalog: value: AC-06(03)[01] class: sp800-53a prose: 'network access to {{ insert: param, ac-06.03_odp.01 }} is authorized only for {{ insert: param, ac-06.03_odp.02 }};' + links: + - href: '#ac-6.3_smt' + rel: assessment-for - id: ac-6.3_obj-2 name: assessment-objective props: @@ -9183,6 +9850,12 @@ catalog: value: AC-06(03)[02] class: sp800-53a prose: the rationale for authorizing network access to privileged commands is documented in the security plan for the system. + links: + - href: '#ac-6.3_smt' + rel: assessment-for + links: + - href: '#ac-6.3_smt' + rel: assessment-for - id: ac-6.3_asm-examine name: assessment-method props: @@ -9281,6 +9954,9 @@ catalog: value: AC-06(04) class: sp800-53a prose: separate processing domains are provided to enable finer-grain allocation of user privileges. + links: + - href: '#ac-6.4_smt' + rel: assessment-for - id: ac-6.4_asm-examine name: assessment-method props: @@ -9383,6 +10059,9 @@ catalog: value: AC-06(05) class: sp800-53a prose: 'privileged accounts on the system are restricted to {{ insert: param, ac-06.05_odp }}.' + links: + - href: '#ac-6.5_smt' + rel: assessment-for - id: ac-6.5_asm-examine name: assessment-method props: @@ -9478,6 +10157,9 @@ catalog: value: AC-06(06) class: sp800-53a prose: privileged access to the system by non-organizational users is prohibited. + links: + - href: '#ac-6.6_smt' + rel: assessment-for - id: ac-6.6_asm-examine name: assessment-method props: @@ -9610,6 +10292,9 @@ catalog: value: AC-06(07)(a) class: sp800-53a prose: 'privileges assigned to {{ insert: param, ac-06.07_odp.02 }} are reviewed {{ insert: param, ac-06.07_odp.01 }} to validate the need for such privileges;' + links: + - href: '#ac-6.7_smt.a' + rel: assessment-for - id: ac-6.7_obj.b name: assessment-objective props: @@ -9617,6 +10302,12 @@ catalog: value: AC-06(07)(b) class: sp800-53a prose: privileges are reassigned or removed, if necessary, to correctly reflect organizational mission and business needs. + links: + - href: '#ac-6.7_smt.b' + rel: assessment-for + links: + - href: '#ac-6.7_smt' + rel: assessment-for - id: ac-6.7_asm-examine name: assessment-method props: @@ -9719,6 +10410,9 @@ catalog: value: AC-06(08) class: sp800-53a prose: '{{ insert: param, ac-06.08_odp }} is prevented from executing at higher privilege levels than users executing the software.' + links: + - href: '#ac-6.8_smt' + rel: assessment-for - id: ac-6.8_asm-examine name: assessment-method props: @@ -9814,6 +10508,9 @@ catalog: value: AC-06(09) class: sp800-53a prose: the execution of privileged functions is logged. + links: + - href: '#ac-6.9_smt' + rel: assessment-for - id: ac-6.9_asm-examine name: assessment-method props: @@ -9905,6 +10602,9 @@ catalog: value: AC-06(10) class: sp800-53a prose: non-privileged users are prevented from executing privileged functions. + links: + - href: '#ac-6.10_smt' + rel: assessment-for - id: ac-6.10_asm-examine name: assessment-method props: @@ -10089,6 +10789,9 @@ catalog: value: AC-07a. class: sp800-53a prose: 'a limit of {{ insert: param, ac-07_odp.01 }} consecutive invalid logon attempts by a user during {{ insert: param, ac-07_odp.02 }} is enforced;' + links: + - href: '#ac-7_smt.a' + rel: assessment-for - id: ac-7_obj.b name: assessment-objective props: @@ -10096,6 +10799,12 @@ catalog: value: AC-07b. class: sp800-53a prose: 'automatically {{ insert: param, ac-07_odp.03 }} when the maximum number of unsuccessful attempts is exceeded.' + links: + - href: '#ac-7_smt.b' + rel: assessment-for + links: + - href: '#ac-7_smt' + rel: assessment-for - id: ac-7_asm-examine name: assessment-method props: @@ -10191,9 +10900,9 @@ catalog: - name: label value: AC-07(02)_ODP[02] class: sp800-53a - label: purging or wiping requirements or techniques + label: purging or wiping requirements and techniques guidelines: - - prose: purging or wiping requirements and techniques to be used when mobile devices are purged or wiped of information are defined; + - prose: purging and wiping requirements and techniques to be used when mobile devices are purged or wiped of information are defined; - id: ac-07.02_odp.03 props: - name: alt-identifier @@ -10238,6 +10947,9 @@ catalog: value: AC-07(02) class: sp800-53a prose: 'information is purged or wiped from {{ insert: param, ac-07.02_odp.01 }} based on {{ insert: param, ac-07.02_odp.02 }} after {{ insert: param, ac-07.02_odp.03 }} consecutive, unsuccessful device logon attempts.' + links: + - href: '#ac-7.2_smt' + rel: assessment-for - id: ac-7.2_asm-examine name: assessment-method props: @@ -10338,6 +11050,9 @@ catalog: value: AC-07(03) class: sp800-53a prose: 'unsuccessful biometric logon attempts are limited to {{ insert: param, ac-07.03_odp }}.' + links: + - href: '#ac-7.3_smt' + rel: assessment-for - id: ac-7.3_asm-examine name: assessment-method props: @@ -10476,6 +11191,9 @@ catalog: value: AC-07(04)(a) class: sp800-53a prose: '{{ insert: param, ac-07.04_odp.01 }} that are different from the primary authentication factors are allowed to be used after the number of organization-defined consecutive invalid logon attempts have been exceeded;' + links: + - href: '#ac-7.4_smt.a' + rel: assessment-for - id: ac-7.4_obj.b name: assessment-objective props: @@ -10483,6 +11201,12 @@ catalog: value: AC-07(04)(b) class: sp800-53a prose: 'a limit of {{ insert: param, ac-07.04_odp.02 }} consecutive invalid logon attempts through the use of the alternative factors by the user during a {{ insert: param, ac-07.04_odp.03 }} is enforced.' + links: + - href: '#ac-7.4_smt.b' + rel: assessment-for + links: + - href: '#ac-7.4_smt' + rel: assessment-for - id: ac-7.4_asm-examine name: assessment-method props: @@ -10674,6 +11398,9 @@ catalog: value: AC-08a.01 class: sp800-53a prose: the system use notification states that users are accessing a U.S. Government system; + links: + - href: '#ac-8_smt.a.1' + rel: assessment-for - id: ac-8_obj.a.2 name: assessment-objective props: @@ -10681,6 +11408,9 @@ catalog: value: AC-08a.02 class: sp800-53a prose: the system use notification states that system usage may be monitored, recorded, and subject to audit; + links: + - href: '#ac-8_smt.a.2' + rel: assessment-for - id: ac-8_obj.a.3 name: assessment-objective props: @@ -10688,6 +11418,9 @@ catalog: value: AC-08a.03 class: sp800-53a prose: the system use notification states that unauthorized use of the system is prohibited and subject to criminal and civil penalties; and + links: + - href: '#ac-8_smt.a.3' + rel: assessment-for - id: ac-8_obj.a.4 name: assessment-objective props: @@ -10695,6 +11428,12 @@ catalog: value: AC-08a.04 class: sp800-53a prose: the system use notification states that use of the system indicates consent to monitoring and recording; + links: + - href: '#ac-8_smt.a.4' + rel: assessment-for + links: + - href: '#ac-8_smt.a' + rel: assessment-for - id: ac-8_obj.b name: assessment-objective props: @@ -10702,6 +11441,9 @@ catalog: value: AC-08b. class: sp800-53a prose: the notification message or banner is retained on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the system; + links: + - href: '#ac-8_smt.b' + rel: assessment-for - id: ac-8_obj.c name: assessment-objective props: @@ -10716,6 +11458,9 @@ catalog: value: AC-08c.01 class: sp800-53a prose: 'for publicly accessible systems, system use information {{ insert: param, ac-08_odp.02 }} is displayed before granting further access to the publicly accessible system;' + links: + - href: '#ac-8_smt.c.1' + rel: assessment-for - id: ac-8_obj.c.2 name: assessment-objective props: @@ -10723,6 +11468,9 @@ catalog: value: AC-08c.02 class: sp800-53a prose: for publicly accessible systems, any references to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities are displayed; + links: + - href: '#ac-8_smt.c.2' + rel: assessment-for - id: ac-8_obj.c.3 name: assessment-objective props: @@ -10730,6 +11478,15 @@ catalog: value: AC-08c.03 class: sp800-53a prose: for publicly accessible systems, a description of the authorized uses of the system is included. + links: + - href: '#ac-8_smt.c.3' + rel: assessment-for + links: + - href: '#ac-8_smt.c' + rel: assessment-for + links: + - href: '#ac-8_smt' + rel: assessment-for - id: ac-8_asm-examine name: assessment-method props: @@ -10831,6 +11588,9 @@ catalog: value: AC-09 class: sp800-53a prose: the user is notified, upon successful logon to the system, of the date and time of the last logon. + links: + - href: '#ac-9_smt' + rel: assessment-for - id: ac-9_asm-examine name: assessment-method props: @@ -10917,6 +11677,9 @@ catalog: value: AC-09(01) class: sp800-53a prose: the user is notified, upon successful logon, of the number of unsuccessful logon attempts since the last successful logon. + links: + - href: '#ac-9.1_smt' + rel: assessment-for - id: ac-9.1_asm-examine name: assessment-method props: @@ -11025,6 +11788,9 @@ catalog: value: AC-09(02) class: sp800-53a prose: 'the user is notified, upon successful logon, of the number of {{ insert: param, ac-09.02_odp.01 }} during {{ insert: param, ac-09.02_odp.02 }}.' + links: + - href: '#ac-9.2_smt' + rel: assessment-for - id: ac-9.2_asm-examine name: assessment-method props: @@ -11134,6 +11900,9 @@ catalog: value: AC-09(03) class: sp800-53a prose: 'the user is notified, upon successful logon, of changes to {{ insert: param, ac-09.03_odp.01 }} during {{ insert: param, ac-09.03_odp.02 }}.' + links: + - href: '#ac-9.3_smt' + rel: assessment-for - id: ac-9.3_asm-examine name: assessment-method props: @@ -11230,6 +11999,9 @@ catalog: value: AC-09(04) class: sp800-53a prose: 'the user is notified, upon successful logon, of {{ insert: param, ac-09.04_odp }}.' + links: + - href: '#ac-9.4_smt' + rel: assessment-for - id: ac-9.4_asm-examine name: assessment-method props: @@ -11339,6 +12111,9 @@ catalog: value: AC-10 class: sp800-53a prose: 'the number of concurrent sessions for each {{ insert: param, ac-10_odp.01 }} is limited to {{ insert: param, ac-10_odp.02 }}.' + links: + - href: '#ac-10_smt' + rel: assessment-for - id: ac-10_asm-examine name: assessment-method props: @@ -11472,6 +12247,9 @@ catalog: value: AC-11a. class: sp800-53a prose: 'further access to the system is prevented by {{ insert: param, ac-11_odp.01 }};' + links: + - href: '#ac-11_smt.a' + rel: assessment-for - id: ac-11_obj.b name: assessment-objective props: @@ -11479,6 +12257,12 @@ catalog: value: AC-11b. class: sp800-53a prose: device lock is retained until the user re-establishes access using established identification and authentication procedures. + links: + - href: '#ac-11_smt.b' + rel: assessment-for + links: + - href: '#ac-11_smt' + rel: assessment-for - id: ac-11_asm-examine name: assessment-method props: @@ -11567,6 +12351,9 @@ catalog: value: AC-11(01) class: sp800-53a prose: information previously visible on the display is concealed, via device lock, with a publicly viewable image. + links: + - href: '#ac-11.1_smt' + rel: assessment-for - id: ac-11.1_asm-examine name: assessment-method props: @@ -11670,6 +12457,9 @@ catalog: value: AC-12 class: sp800-53a prose: 'a user session is automatically terminated after {{ insert: param, ac-12_odp }}.' + links: + - href: '#ac-12_smt' + rel: assessment-for - id: ac-12_asm-examine name: assessment-method props: @@ -11772,6 +12562,9 @@ catalog: value: AC-12(01) class: sp800-53a prose: 'a logout capability is provided for user-initiated communications sessions whenever authentication is used to gain access to {{ insert: param, ac-12.01_odp }}.' + links: + - href: '#ac-12.1_smt' + rel: assessment-for - id: ac-12.1_asm-examine name: assessment-method props: @@ -11862,6 +12655,9 @@ catalog: value: AC-12(02) class: sp800-53a prose: an explicit logout message is displayed to users indicating the termination of authenticated communication sessions. + links: + - href: '#ac-12.2_smt' + rel: assessment-for - id: ac-12.2_asm-examine name: assessment-method props: @@ -11966,6 +12762,9 @@ catalog: value: AC-12(03) class: sp800-53a prose: 'an explicit message to users is displayed indicating that the session will end in {{ insert: param, ac-12.03_odp }}.' + links: + - href: '#ac-12.3_smt' + rel: assessment-for - id: ac-12.3_asm-examine name: assessment-method props: @@ -12108,6 +12907,9 @@ catalog: value: AC-14a. class: sp800-53a prose: '{{ insert: param, ac-14_odp }} that can be performed on the system without identification or authentication consistent with organizational mission and business functions are identified;' + links: + - href: '#ac-14_smt.a' + rel: assessment-for - id: ac-14_obj.b name: assessment-objective props: @@ -12122,6 +12924,9 @@ catalog: value: AC-14b.[01] class: sp800-53a prose: user actions not requiring identification or authentication are documented in the security plan for the system; + links: + - href: '#ac-14_smt.b' + rel: assessment-for - id: ac-14_obj.b-2 name: assessment-objective props: @@ -12129,6 +12934,15 @@ catalog: value: AC-14b.[02] class: sp800-53a prose: a rationale for user actions not requiring identification or authentication is provided in the security plan for the system. + links: + - href: '#ac-14_smt.b' + rel: assessment-for + links: + - href: '#ac-14_smt.b' + rel: assessment-for + links: + - href: '#ac-14_smt' + rel: assessment-for - id: ac-14_asm-examine name: assessment-method props: @@ -12478,6 +13292,9 @@ catalog: value: AC-16a.[01] class: sp800-53a prose: 'the means to associate {{ insert: param, ac-16_odp.01 }} with {{ insert: param, ac-16_odp.03 }} for information in storage, in process, and/or in transmission are provided;' + links: + - href: '#ac-16_smt.a' + rel: assessment-for - id: ac-16_obj.a-2 name: assessment-objective props: @@ -12485,6 +13302,12 @@ catalog: value: AC-16a.[02] class: sp800-53a prose: 'the means to associate {{ insert: param, ac-16_odp.02 }} with {{ insert: param, ac-16_odp.04 }} for information in storage, in process, and/or in transmission are provided;' + links: + - href: '#ac-16_smt.a' + rel: assessment-for + links: + - href: '#ac-16_smt.a' + rel: assessment-for - id: ac-16_obj.b name: assessment-objective props: @@ -12499,6 +13322,9 @@ catalog: value: AC-16b.[01] class: sp800-53a prose: attribute associations are made; + links: + - href: '#ac-16_smt.b' + rel: assessment-for - id: ac-16_obj.b-2 name: assessment-objective props: @@ -12506,6 +13332,12 @@ catalog: value: AC-16b.[02] class: sp800-53a prose: attribute associations are retained with the information; + links: + - href: '#ac-16_smt.b' + rel: assessment-for + links: + - href: '#ac-16_smt.b' + rel: assessment-for - id: ac-16_obj.c name: assessment-objective props: @@ -12520,6 +13352,9 @@ catalog: value: AC-16c.[01] class: sp800-53a prose: 'the following permitted security attributes are established from the attributes defined in AC-16_ODP[01] for {{ insert: param, ac-16_odp.05 }}: {{ insert: param, ac-16_odp.07 }};' + links: + - href: '#ac-16_smt.c' + rel: assessment-for - id: ac-16_obj.c-2 name: assessment-objective props: @@ -12527,6 +13362,12 @@ catalog: value: AC-16c.[02] class: sp800-53a prose: 'the following permitted privacy attributes are established from the attributes defined in AC-16_ODP[02] for {{ insert: param, ac-16_odp.06 }}: {{ insert: param, ac-16_odp.08 }};' + links: + - href: '#ac-16_smt.c' + rel: assessment-for + links: + - href: '#ac-16_smt.c' + rel: assessment-for - id: ac-16_obj.d name: assessment-objective props: @@ -12534,6 +13375,9 @@ catalog: value: AC-16d. class: sp800-53a prose: 'the following permitted attribute values or ranges for each of the established attributes are determined: {{ insert: param, ac-16_odp.09 }};' + links: + - href: '#ac-16_smt.d' + rel: assessment-for - id: ac-16_obj.e name: assessment-objective props: @@ -12541,6 +13385,9 @@ catalog: value: AC-16e. class: sp800-53a prose: changes to attributes are audited; + links: + - href: '#ac-16_smt.e' + rel: assessment-for - id: ac-16_obj.f name: assessment-objective props: @@ -12555,6 +13402,9 @@ catalog: value: AC-16f.[01] class: sp800-53a prose: '{{ insert: param, ac-16_odp.07 }} are reviewed for applicability {{ insert: param, ac-16_odp.10 }};' + links: + - href: '#ac-16_smt.f' + rel: assessment-for - id: ac-16_obj.f-2 name: assessment-objective props: @@ -12562,6 +13412,15 @@ catalog: value: AC-16f.[02] class: sp800-53a prose: '{{ insert: param, ac-16_odp.08 }} are reviewed for applicability {{ insert: param, ac-16_odp.11 }}.' + links: + - href: '#ac-16_smt.f' + rel: assessment-for + links: + - href: '#ac-16_smt.f' + rel: assessment-for + links: + - href: '#ac-16_smt' + rel: assessment-for - id: ac-16_asm-examine name: assessment-method props: @@ -12730,6 +13589,9 @@ catalog: value: AC-16(01)[01] class: sp800-53a prose: 'security attributes are dynamically associated with {{ insert: param, ac-16.01_odp.01 }} in accordance with the following security policies as information is created and combined: {{ insert: param, ac-16.01_odp.05 }};' + links: + - href: '#ac-16.1_smt' + rel: assessment-for - id: ac-16.1_obj-2 name: assessment-objective props: @@ -12737,6 +13599,9 @@ catalog: value: AC-16(01)[02] class: sp800-53a prose: 'security attributes are dynamically associated with {{ insert: param, ac-16.01_odp.02 }} in accordance with the following security policies as information is created and combined: {{ insert: param, ac-16.01_odp.05 }};' + links: + - href: '#ac-16.1_smt' + rel: assessment-for - id: ac-16.1_obj-3 name: assessment-objective props: @@ -12744,6 +13609,9 @@ catalog: value: AC-16(01)[03] class: sp800-53a prose: 'privacy attributes are dynamically associated with {{ insert: param, ac-16.01_odp.03 }} in accordance with the following privacy policies as information is created and combined: {{ insert: param, ac-16.01_odp.06 }};' + links: + - href: '#ac-16.1_smt' + rel: assessment-for - id: ac-16.1_obj-4 name: assessment-objective props: @@ -12751,6 +13619,12 @@ catalog: value: AC-16(01)[04] class: sp800-53a prose: 'privacy attributes are dynamically associated with {{ insert: param, ac-16.01_odp.04 }} in accordance with the following privacy policies as information is created and combined: {{ insert: param, ac-16.01_odp.06 }}.' + links: + - href: '#ac-16.1_smt' + rel: assessment-for + links: + - href: '#ac-16.1_smt' + rel: assessment-for - id: ac-16.1_asm-examine name: assessment-method props: @@ -12845,6 +13719,9 @@ catalog: value: AC-16(02)[01] class: sp800-53a prose: authorized individuals (or processes acting on behalf of individuals) are provided with the capability to define or change the value of associated security attributes; + links: + - href: '#ac-16.2_smt' + rel: assessment-for - id: ac-16.2_obj-2 name: assessment-objective props: @@ -12852,6 +13729,12 @@ catalog: value: AC-16(02)[02] class: sp800-53a prose: authorized individuals (or processes acting on behalf of individuals) are provided with the capability to define or change the value of associated privacy attributes. + links: + - href: '#ac-16.2_smt' + rel: assessment-for + links: + - href: '#ac-16.2_smt' + rel: assessment-for - id: ac-16.2_asm-examine name: assessment-method props: @@ -13021,6 +13904,9 @@ catalog: value: AC-16(03)[01] class: sp800-53a prose: 'the association and integrity of {{ insert: param, ac-16.03_odp.01 }} to {{ insert: param, ac-16.03_odp.03 }} is maintained;' + links: + - href: '#ac-16.3_smt' + rel: assessment-for - id: ac-16.3_obj-2 name: assessment-objective props: @@ -13028,6 +13914,9 @@ catalog: value: AC-16(03)[02] class: sp800-53a prose: 'the association and integrity of {{ insert: param, ac-16.03_odp.01 }} to {{ insert: param, ac-16.03_odp.04 }} is maintained.' + links: + - href: '#ac-16.3_smt' + rel: assessment-for - id: ac-16.3_obj-3 name: assessment-objective props: @@ -13035,6 +13924,9 @@ catalog: value: AC-16(03)[03] class: sp800-53a prose: 'the association and integrity of {{ insert: param, ac-16.03_odp.02 }} to {{ insert: param, ac-16.03_odp.05 }} is maintained;' + links: + - href: '#ac-16.3_smt' + rel: assessment-for - id: ac-16.3_obj-4 name: assessment-objective props: @@ -13042,6 +13934,12 @@ catalog: value: AC-16(03)[04] class: sp800-53a prose: 'the association and integrity of {{ insert: param, ac-16.03_odp.02 }} to {{ insert: param, ac-16.03_odp.06 }} is maintained.' + links: + - href: '#ac-16.3_smt' + rel: assessment-for + links: + - href: '#ac-16.3_smt' + rel: assessment-for - id: ac-16.3_asm-examine name: assessment-method props: @@ -13229,6 +14127,9 @@ catalog: value: AC-16(04)[01] class: sp800-53a prose: 'authorized individuals (or processes acting on behalf of individuals) are provided with the capability to associate {{ insert: param, ac-16.04_odp.01 }} with {{ insert: param, ac-16.04_odp.05 }};' + links: + - href: '#ac-16.4_smt' + rel: assessment-for - id: ac-16.4_obj-2 name: assessment-objective props: @@ -13236,6 +14137,9 @@ catalog: value: AC-16(04)[02] class: sp800-53a prose: 'authorized individuals (or processes acting on behalf of individuals) are provided with the capability to associate {{ insert: param, ac-16.04_odp.02 }} with {{ insert: param, ac-16.04_odp.06 }};' + links: + - href: '#ac-16.4_smt' + rel: assessment-for - id: ac-16.4_obj-3 name: assessment-objective props: @@ -13243,6 +14147,9 @@ catalog: value: AC-16(04)[03] class: sp800-53a prose: 'authorized individuals (or processes acting on behalf of individuals) are provided with the capability to associate {{ insert: param, ac-16.04_odp.03 }} with {{ insert: param, ac-16.04_odp.07 }};' + links: + - href: '#ac-16.4_smt' + rel: assessment-for - id: ac-16.4_obj-4 name: assessment-objective props: @@ -13250,6 +14157,12 @@ catalog: value: AC-16(04)[04] class: sp800-53a prose: 'authorized individuals (or processes acting on behalf of individuals) are provided with the capability to associate {{ insert: param, ac-16.04_odp.04 }} with {{ insert: param, ac-16.04_odp.08 }}.' + links: + - href: '#ac-16.4_smt' + rel: assessment-for + links: + - href: '#ac-16.4_smt' + rel: assessment-for - id: ac-16.4_asm-examine name: assessment-method props: @@ -13375,6 +14288,9 @@ catalog: value: AC-16(05)[01] class: sp800-53a prose: 'security attributes are displayed in human-readable form on each object that the system transmits to output devices to identify {{ insert: param, ac-16.05_odp.01 }} using {{ insert: param, ac-16.05_odp.02 }};' + links: + - href: '#ac-16.5_smt' + rel: assessment-for - id: ac-16.5_obj-2 name: assessment-objective props: @@ -13382,6 +14298,12 @@ catalog: value: AC-16(05)[02] class: sp800-53a prose: 'privacy attributes are displayed in human-readable form on each object that the system transmits to output devices to identify {{ insert: param, ac-16.05_odp.01 }} using {{ insert: param, ac-16.05_odp.02 }}.' + links: + - href: '#ac-16.5_smt' + rel: assessment-for + links: + - href: '#ac-16.5_smt' + rel: assessment-for - id: ac-16.5_asm-examine name: assessment-method props: @@ -13598,6 +14520,9 @@ catalog: value: AC-16(06)[01] class: sp800-53a prose: 'personnel are required to associate and maintain the association of {{ insert: param, ac-16.06_odp.01 }} with {{ insert: param, ac-16.06_odp.05 }} in accordance with {{ insert: param, ac-16.06_odp.09 }};' + links: + - href: '#ac-16.6_smt' + rel: assessment-for - id: ac-16.6_obj-2 name: assessment-objective props: @@ -13605,6 +14530,9 @@ catalog: value: AC-16(06)[02] class: sp800-53a prose: 'personnel are required to associate and maintain the association of {{ insert: param, ac-16.06_odp.02 }} with {{ insert: param, ac-16.06_odp.06 }} in accordance with {{ insert: param, ac-16.06_odp.09 }};' + links: + - href: '#ac-16.6_smt' + rel: assessment-for - id: ac-16.6_obj-3 name: assessment-objective props: @@ -13612,6 +14540,9 @@ catalog: value: AC-16(06)[03] class: sp800-53a prose: 'personnel are required to associate and maintain the association of {{ insert: param, ac-16.06_odp.03 }} with {{ insert: param, ac-16.06_odp.07 }} in accordance with {{ insert: param, ac-16.06_odp.10 }};' + links: + - href: '#ac-16.6_smt' + rel: assessment-for - id: ac-16.6_obj-4 name: assessment-objective props: @@ -13619,6 +14550,12 @@ catalog: value: AC-16(06)[04] class: sp800-53a prose: 'personnel are required to associate and maintain the association of {{ insert: param, ac-16.06_odp.04 }} with {{ insert: param, ac-16.06_odp.08 }} in accordance with {{ insert: param, ac-16.06_odp.10 }}.' + links: + - href: '#ac-16.6_smt' + rel: assessment-for + links: + - href: '#ac-16.6_smt' + rel: assessment-for - id: ac-16.6_asm-examine name: assessment-method props: @@ -13707,6 +14644,9 @@ catalog: value: AC-16(07)[01] class: sp800-53a prose: a consistent interpretation of security attributes transmitted between distributed system components is provided; + links: + - href: '#ac-16.7_smt' + rel: assessment-for - id: ac-16.7_obj-2 name: assessment-objective props: @@ -13714,6 +14654,12 @@ catalog: value: AC-16(07)[02] class: sp800-53a prose: a consistent interpretation of privacy attributes transmitted between distributed system components is provided. + links: + - href: '#ac-16.7_smt' + rel: assessment-for + links: + - href: '#ac-16.7_smt' + rel: assessment-for - id: ac-16.7_asm-examine name: assessment-method props: @@ -13842,6 +14788,9 @@ catalog: value: AC-16(08)[01] class: sp800-53a prose: '{{ insert: param, ac-16.08_odp.01 }} are implemented in associating security attributes to information;' + links: + - href: '#ac-16.8_smt' + rel: assessment-for - id: ac-16.8_obj-2 name: assessment-objective props: @@ -13849,6 +14798,12 @@ catalog: value: AC-16(08)[02] class: sp800-53a prose: '{{ insert: param, ac-16.08_odp.02 }} are implemented in associating privacy attributes to information.' + links: + - href: '#ac-16.8_smt' + rel: assessment-for + links: + - href: '#ac-16.8_smt' + rel: assessment-for - id: ac-16.8_asm-examine name: assessment-method props: @@ -13969,6 +14924,9 @@ catalog: value: AC-16(09)[01] class: sp800-53a prose: 'security attributes associated with information are changed only via regrading mechanisms validated using {{ insert: param, ac-16.09_odp.01 }};' + links: + - href: '#ac-16.9_smt' + rel: assessment-for - id: ac-16.9_obj-2 name: assessment-objective props: @@ -13976,6 +14934,12 @@ catalog: value: AC-16(09)[02] class: sp800-53a prose: 'privacy attributes associated with information are changed only via regrading mechanisms validated using {{ insert: param, ac-16.09_odp.02 }}.' + links: + - href: '#ac-16.9_smt' + rel: assessment-for + links: + - href: '#ac-16.9_smt' + rel: assessment-for - id: ac-16.9_asm-examine name: assessment-method props: @@ -14070,6 +15034,9 @@ catalog: value: AC-16(10)[01] class: sp800-53a prose: authorized individuals are provided with the capability to define or change the type and value of security attributes available for association with subjects and objects; + links: + - href: '#ac-16.10_smt' + rel: assessment-for - id: ac-16.10_obj-2 name: assessment-objective props: @@ -14077,6 +15044,12 @@ catalog: value: AC-16(10)[02] class: sp800-53a prose: authorized individuals are provided with the capability to define or change the type and value of privacy attributes available for association with subjects and objects. + links: + - href: '#ac-16.10_smt' + rel: assessment-for + links: + - href: '#ac-16.10_smt' + rel: assessment-for - id: ac-16.10_asm-examine name: assessment-method props: @@ -14238,6 +15211,9 @@ catalog: value: AC-17a.[01] class: sp800-53a prose: usage restrictions are established and documented for each type of remote access allowed; + links: + - href: '#ac-17_smt.a' + rel: assessment-for - id: ac-17_obj.a-2 name: assessment-objective props: @@ -14245,6 +15221,9 @@ catalog: value: AC-17a.[02] class: sp800-53a prose: configuration/connection requirements are established and documented for each type of remote access allowed; + links: + - href: '#ac-17_smt.a' + rel: assessment-for - id: ac-17_obj.a-3 name: assessment-objective props: @@ -14252,6 +15231,12 @@ catalog: value: AC-17a.[03] class: sp800-53a prose: implementation guidance is established and documented for each type of remote access allowed; + links: + - href: '#ac-17_smt.a' + rel: assessment-for + links: + - href: '#ac-17_smt.a' + rel: assessment-for - id: ac-17_obj.b name: assessment-objective props: @@ -14259,6 +15244,12 @@ catalog: value: AC-17b. class: sp800-53a prose: each type of remote access to the system is authorized prior to allowing such connections. + links: + - href: '#ac-17_smt.b' + rel: assessment-for + links: + - href: '#ac-17_smt' + rel: assessment-for - id: ac-17_asm-examine name: assessment-method props: @@ -14365,6 +15356,9 @@ catalog: value: AC-17(01)[01] class: sp800-53a prose: automated mechanisms are employed to monitor remote access methods; + links: + - href: '#ac-17.1_smt' + rel: assessment-for - id: ac-17.1_obj-2 name: assessment-objective props: @@ -14372,6 +15366,12 @@ catalog: value: AC-17(01)[02] class: sp800-53a prose: automated mechanisms are employed to control remote access methods. + links: + - href: '#ac-17.1_smt' + rel: assessment-for + links: + - href: '#ac-17.1_smt' + rel: assessment-for - id: ac-17.1_asm-examine name: assessment-method props: @@ -14465,6 +15465,9 @@ catalog: value: AC-17(02) class: sp800-53a prose: cryptographic mechanisms are implemented to protect the confidentiality and integrity of remote access sessions. + links: + - href: '#ac-17.2_smt' + rel: assessment-for - id: ac-17.2_asm-examine name: assessment-method props: @@ -14554,6 +15557,9 @@ catalog: value: AC-17(03) class: sp800-53a prose: remote accesses are routed through authorized and managed network access control points. + links: + - href: '#ac-17.3_smt' + rel: assessment-for - id: ac-17.3_asm-examine name: assessment-method props: @@ -14697,6 +15703,9 @@ catalog: value: AC-17(04)(a)[01] class: sp800-53a prose: the execution of privileged commands via remote access is authorized only in a format that provides assessable evidence; + links: + - href: '#ac-17.4_smt.a' + rel: assessment-for - id: ac-17.4_obj.a-2 name: assessment-objective props: @@ -14704,6 +15713,9 @@ catalog: value: AC-17(04)(a)[02] class: sp800-53a prose: access to security-relevant information via remote access is authorized only in a format that provides assessable evidence; + links: + - href: '#ac-17.4_smt.a' + rel: assessment-for - id: ac-17.4_obj.a-3 name: assessment-objective props: @@ -14711,6 +15723,9 @@ catalog: value: AC-17(04)(a)[03] class: sp800-53a prose: 'the execution of privileged commands via remote access is authorized only for the following needs: {{ insert: param, ac-17.04_odp.01 }};' + links: + - href: '#ac-17.4_smt.a' + rel: assessment-for - id: ac-17.4_obj.a-4 name: assessment-objective props: @@ -14718,6 +15733,12 @@ catalog: value: AC-17(04)(a)[04] class: sp800-53a prose: 'access to security-relevant information via remote access is authorized only for the following needs: {{ insert: param, ac-17.04_odp.02 }};' + links: + - href: '#ac-17.4_smt.a' + rel: assessment-for + links: + - href: '#ac-17.4_smt.a' + rel: assessment-for - id: ac-17.4_obj.b name: assessment-objective props: @@ -14725,6 +15746,12 @@ catalog: value: AC-17(04)(b) class: sp800-53a prose: the rationale for remote access is documented in the security plan for the system. + links: + - href: '#ac-17.4_smt.b' + rel: assessment-for + links: + - href: '#ac-17.4_smt' + rel: assessment-for - id: ac-17.4_asm-examine name: assessment-method props: @@ -14830,6 +15857,9 @@ catalog: value: AC-17(06) class: sp800-53a prose: information about remote access mechanisms is protected from unauthorized use and disclosure. + links: + - href: '#ac-17.6_smt' + rel: assessment-for - id: ac-17.6_asm-examine name: assessment-method props: @@ -14940,6 +15970,9 @@ catalog: value: AC-17(09) class: sp800-53a prose: 'the capability to disconnect or disable remote access to the system within {{ insert: param, ac-17.09_odp }} is provided.' + links: + - href: '#ac-17.9_smt' + rel: assessment-for - id: ac-17.9_asm-examine name: assessment-method props: @@ -15052,6 +16085,9 @@ catalog: value: AC-17(10) class: sp800-53a prose: '{{ insert: param, ac-17.10_odp.01 }} are implemented to authenticate {{ insert: param, ac-17.10_odp.02 }}.' + links: + - href: '#ac-17.10_smt' + rel: assessment-for - id: ac-17.10_asm-examine name: assessment-method props: @@ -15191,6 +16227,9 @@ catalog: value: AC-18a.[01] class: sp800-53a prose: configuration requirements are established for each type of wireless access; + links: + - href: '#ac-18_smt.a' + rel: assessment-for - id: ac-18_obj.a-2 name: assessment-objective props: @@ -15198,6 +16237,9 @@ catalog: value: AC-18a.[02] class: sp800-53a prose: connection requirements are established for each type of wireless access; + links: + - href: '#ac-18_smt.a' + rel: assessment-for - id: ac-18_obj.a-3 name: assessment-objective props: @@ -15205,6 +16247,12 @@ catalog: value: AC-18a.[03] class: sp800-53a prose: implementation guidance is established for each type of wireless access; + links: + - href: '#ac-18_smt.a' + rel: assessment-for + links: + - href: '#ac-18_smt.a' + rel: assessment-for - id: ac-18_obj.b name: assessment-objective props: @@ -15212,6 +16260,12 @@ catalog: value: AC-18b. class: sp800-53a prose: each type of wireless access to the system is authorized prior to allowing such connections. + links: + - href: '#ac-18_smt.b' + rel: assessment-for + links: + - href: '#ac-18_smt' + rel: assessment-for - id: ac-18_asm-examine name: assessment-method props: @@ -15326,6 +16380,9 @@ catalog: value: AC-18(01)[01] class: sp800-53a prose: 'wireless access to the system is protected using authentication of {{ insert: param, ac-18.01_odp }};' + links: + - href: '#ac-18.1_smt' + rel: assessment-for - id: ac-18.1_obj-2 name: assessment-objective props: @@ -15333,6 +16390,12 @@ catalog: value: AC-18(01)[02] class: sp800-53a prose: wireless access to the system is protected using encryption. + links: + - href: '#ac-18.1_smt' + rel: assessment-for + links: + - href: '#ac-18.1_smt' + rel: assessment-for - id: ac-18.1_asm-examine name: assessment-method props: @@ -15437,6 +16500,9 @@ catalog: value: AC-18(03) class: sp800-53a prose: when not intended for use, wireless networking capabilities embedded within system components are disabled prior to issuance and deployment. + links: + - href: '#ac-18.3_smt' + rel: assessment-for - id: ac-18.3_asm-examine name: assessment-method props: @@ -15531,6 +16597,9 @@ catalog: value: AC-18(04)[01] class: sp800-53a prose: users allowed to independently configure wireless networking capabilities are identified; + links: + - href: '#ac-18.4_smt' + rel: assessment-for - id: ac-18.4_obj-2 name: assessment-objective props: @@ -15538,6 +16607,12 @@ catalog: value: AC-18(04)[02] class: sp800-53a prose: users allowed to independently configure wireless networking capabilities are explicitly authorized. + links: + - href: '#ac-18.4_smt' + rel: assessment-for + links: + - href: '#ac-18.4_smt' + rel: assessment-for - id: ac-18.4_asm-examine name: assessment-method props: @@ -15630,6 +16705,9 @@ catalog: value: AC-18(05)[01] class: sp800-53a prose: radio antennas are selected to reduce the probability that signals from wireless access points can be received outside of organization-controlled boundaries; + links: + - href: '#ac-18.5_smt' + rel: assessment-for - id: ac-18.5_obj-2 name: assessment-objective props: @@ -15637,6 +16715,12 @@ catalog: value: AC-18(05)[02] class: sp800-53a prose: transmission power levels are calibrated to reduce the probability that signals from wireless access points can be received outside of organization-controlled boundaries. + links: + - href: '#ac-18.5_smt' + rel: assessment-for + links: + - href: '#ac-18.5_smt' + rel: assessment-for - id: ac-18.5_asm-examine name: assessment-method props: @@ -15802,6 +16886,9 @@ catalog: value: AC-19a.[01] class: sp800-53a prose: configuration requirements are established for organization-controlled mobile devices, including when such devices are outside of the controlled area; + links: + - href: '#ac-19_smt.a' + rel: assessment-for - id: ac-19_obj.a-2 name: assessment-objective props: @@ -15809,6 +16896,9 @@ catalog: value: AC-19a.[02] class: sp800-53a prose: connection requirements are established for organization-controlled mobile devices, including when such devices are outside of the controlled area; + links: + - href: '#ac-19_smt.a' + rel: assessment-for - id: ac-19_obj.a-3 name: assessment-objective props: @@ -15816,6 +16906,12 @@ catalog: value: AC-19a.[03] class: sp800-53a prose: implementation guidance is established for organization-controlled mobile devices, including when such devices are outside of the controlled area; + links: + - href: '#ac-19_smt.a' + rel: assessment-for + links: + - href: '#ac-19_smt.a' + rel: assessment-for - id: ac-19_obj.b name: assessment-objective props: @@ -15823,6 +16919,12 @@ catalog: value: AC-19b. class: sp800-53a prose: the connection of mobile devices to organizational systems is authorized. + links: + - href: '#ac-19_smt.b' + rel: assessment-for + links: + - href: '#ac-19_smt' + rel: assessment-for - id: ac-19_asm-examine name: assessment-method props: @@ -16039,6 +17141,9 @@ catalog: value: AC-19(04)(a) class: sp800-53a prose: the use of unclassified mobile devices in facilities containing systems processing, storing, or transmitting classified information is prohibited unless specifically permitted by the authorizing official; + links: + - href: '#ac-19.4_smt.a' + rel: assessment-for - id: ac-19.4_obj.b name: assessment-objective props: @@ -16053,6 +17158,9 @@ catalog: value: AC-19(04)(b)(01) class: sp800-53a prose: prohibition of the connection of unclassified mobile devices to classified systems is enforced on individuals permitted by an authorizing official to use unclassified mobile devices in facilities containing systems processing, storing, or transmitting classified information; + links: + - href: '#ac-19.4_smt.b.1' + rel: assessment-for - id: ac-19.4_obj.b.2 name: assessment-objective props: @@ -16060,6 +17168,9 @@ catalog: value: AC-19(04)(b)(02) class: sp800-53a prose: approval by the authorizing official for the connection of unclassified mobile devices to unclassified systems is enforced on individuals permitted to use unclassified mobile devices in facilities containing systems processing, storing, or transmitting classified information; + links: + - href: '#ac-19.4_smt.b.2' + rel: assessment-for - id: ac-19.4_obj.b.3 name: assessment-objective props: @@ -16067,6 +17178,9 @@ catalog: value: AC-19(04)(b)(03) class: sp800-53a prose: prohibition of the use of internal or external modems or wireless interfaces within unclassified mobile devices is enforced on individuals permitted by an authorizing official to use unclassified mobile devices in facilities containing systems processing, storing, or transmitting classified information; + links: + - href: '#ac-19.4_smt.b.3' + rel: assessment-for - id: ac-19.4_obj.b.4 name: assessment-objective props: @@ -16081,6 +17195,9 @@ catalog: value: AC-19(04)(b)(04)[01] class: sp800-53a prose: 'random review and inspection of unclassified mobile devices and the information stored on those devices by {{ insert: param, ac-19.04_odp.01 }} are enforced;' + links: + - href: '#ac-19.4_smt.b.4' + rel: assessment-for - id: ac-19.4_obj.b.4-2 name: assessment-objective props: @@ -16088,6 +17205,15 @@ catalog: value: AC-19(04)(b)(04)[02] class: sp800-53a prose: following of the incident handling policy is enforced if classified information is found during a random review and inspection of unclassified mobile devices; + links: + - href: '#ac-19.4_smt.b.4' + rel: assessment-for + links: + - href: '#ac-19.4_smt.b.4' + rel: assessment-for + links: + - href: '#ac-19.4_smt.b' + rel: assessment-for - id: ac-19.4_obj.c name: assessment-objective props: @@ -16095,6 +17221,12 @@ catalog: value: AC-19(04)(c) class: sp800-53a prose: 'the connection of classified mobile devices to classified systems is restricted in accordance with {{ insert: param, ac-19.04_odp.02 }}.' + links: + - href: '#ac-19.4_smt.c' + rel: assessment-for + links: + - href: '#ac-19.4_smt' + rel: assessment-for - id: ac-19.4_asm-examine name: assessment-method props: @@ -16216,6 +17348,9 @@ catalog: value: AC-19(05) class: sp800-53a prose: '{{ insert: param, ac-19.05_odp.01 }} is employed to protect the confidentiality and integrity of information on {{ insert: param, ac-19.05_odp.02 }}.' + links: + - href: '#ac-19.5_smt' + rel: assessment-for - id: ac-19.5_asm-examine name: assessment-method props: @@ -16415,16 +17550,25 @@ catalog: name: assessment-objective props: - name: label - value: AC-20a.1 + value: AC-20a.01 class: sp800-53a prose: '{{ insert: param, ac-20_odp.01 }} is/are consistent with the trust relationships established with other organizations owning, operating, and/or maintaining external systems, allowing authorized individuals to access the system from external systems (if applicable);' + links: + - href: '#ac-20_smt.a.1' + rel: assessment-for - id: ac-20_obj.a.2 name: assessment-objective props: - name: label - value: AC-20a.2 + value: AC-20a.02 class: sp800-53a prose: '{{ insert: param, ac-20_odp.01 }} is/are consistent with the trust relationships established with other organizations owning, operating, and/or maintaining external systems, allowing authorized individuals to process, store, or transmit organization-controlled information using external systems (if applicable);' + links: + - href: '#ac-20_smt.a.2' + rel: assessment-for + links: + - href: '#ac-20_smt.a' + rel: assessment-for - id: ac-20_obj.b name: assessment-objective props: @@ -16432,6 +17576,12 @@ catalog: value: AC-20b. class: sp800-53a prose: 'the use of {{ insert: param, ac-20_odp.04 }} is prohibited (if applicable).' + links: + - href: '#ac-20_smt.b' + rel: assessment-for + links: + - href: '#ac-20_smt' + rel: assessment-for - id: ac-20_asm-examine name: assessment-method props: @@ -16542,6 +17692,9 @@ catalog: value: AC-20(01)(a) class: sp800-53a prose: authorized individuals are permitted to use an external system to access the system or to process, store, or transmit organization-controlled information only after verification of the implementation of controls on the external system as specified in the organization’s security and privacy policies and security and privacy plans (if applicable); + links: + - href: '#ac-20.1_smt.a' + rel: assessment-for - id: ac-20.1_obj.b name: assessment-objective props: @@ -16549,6 +17702,12 @@ catalog: value: AC-20(01)(b) class: sp800-53a prose: authorized individuals are permitted to use an external system to access the system or to process, store, or transmit organization-controlled information only after retention of approved system connection or processing agreements with the organizational entity hosting the external system (if applicable). + links: + - href: '#ac-20.1_smt.b' + rel: assessment-for + links: + - href: '#ac-20.1_smt' + rel: assessment-for - id: ac-20.1_asm-examine name: assessment-method props: @@ -16645,6 +17804,9 @@ catalog: value: AC-20(02) class: sp800-53a prose: 'the use of organization-controlled portable storage devices by authorized individuals is restricted on external systems using {{ insert: param, ac-20.02_odp }}.' + links: + - href: '#ac-20.2_smt' + rel: assessment-for - id: ac-20.2_asm-examine name: assessment-method props: @@ -16741,6 +17903,9 @@ catalog: value: AC-20(03) class: sp800-53a prose: 'the use of non-organizationally owned systems or system components to process, store, or transmit organizational information is restricted using {{ insert: param, ac-20.03_odp }}.' + links: + - href: '#ac-20.3_smt' + rel: assessment-for - id: ac-20.3_asm-examine name: assessment-method props: @@ -16840,6 +18005,9 @@ catalog: value: AC-20(04) class: sp800-53a prose: 'the use of {{ insert: param, ac-20.04_odp }} is prohibited in external systems.' + links: + - href: '#ac-20.4_smt' + rel: assessment-for - id: ac-20.4_asm-examine name: assessment-method props: @@ -16937,6 +18105,9 @@ catalog: value: AC-20(05) class: sp800-53a prose: the use of organization-controlled portable storage devices by authorized individuals is prohibited on external systems. + links: + - href: '#ac-20.5_smt' + rel: assessment-for - id: ac-20.5_asm-examine name: assessment-method props: @@ -17076,6 +18247,9 @@ catalog: value: AC-21a. class: sp800-53a prose: 'authorized users are enabled to determine whether access authorizations assigned to a sharing partner match the information’s access and use restrictions for {{ insert: param, ac-21_odp.01 }};' + links: + - href: '#ac-21_smt.a' + rel: assessment-for - id: ac-21_obj.b name: assessment-objective props: @@ -17083,6 +18257,12 @@ catalog: value: AC-21b. class: sp800-53a prose: '{{ insert: param, ac-21_odp.02 }} are employed to assist users in making information-sharing and collaboration decisions.' + links: + - href: '#ac-21_smt.b' + rel: assessment-for + links: + - href: '#ac-21_smt' + rel: assessment-for - id: ac-21_asm-examine name: assessment-method props: @@ -17194,6 +18374,9 @@ catalog: value: AC-21(01) class: sp800-53a prose: '{{ insert: param, ac-21.01_odp }} are employed to enforce information-sharing decisions by authorized users based on access authorizations of sharing partners and access restrictions on information to be shared.' + links: + - href: '#ac-21.1_smt' + rel: assessment-for - id: ac-21.1_asm-examine name: assessment-method props: @@ -17297,6 +18480,9 @@ catalog: value: AC-21(02) class: sp800-53a prose: 'information search and retrieval services that enforce {{ insert: param, ac-21.02_odp }} are implemented.' + links: + - href: '#ac-21.2_smt' + rel: assessment-for - id: ac-21.2_asm-examine name: assessment-method props: @@ -17438,6 +18624,9 @@ catalog: value: AC-22a. class: sp800-53a prose: designated individuals are authorized to make information publicly accessible; + links: + - href: '#ac-22_smt.a' + rel: assessment-for - id: ac-22_obj.b name: assessment-objective props: @@ -17445,6 +18634,9 @@ catalog: value: AC-22b. class: sp800-53a prose: authorized individuals are trained to ensure that publicly accessible information does not contain non-public information; + links: + - href: '#ac-22_smt.b' + rel: assessment-for - id: ac-22_obj.c name: assessment-objective props: @@ -17452,6 +18644,9 @@ catalog: value: AC-22c. class: sp800-53a prose: the proposed content of information is reviewed prior to posting onto the publicly accessible system to ensure that non-public information is not included; + links: + - href: '#ac-22_smt.c' + rel: assessment-for - id: ac-22_obj.d name: assessment-objective props: @@ -17466,6 +18661,9 @@ catalog: value: AC-22d.[01] class: sp800-53a prose: 'the content on the publicly accessible system is reviewed for non-public information {{ insert: param, ac-22_odp }};' + links: + - href: '#ac-22_smt.d' + rel: assessment-for - id: ac-22_obj.d-2 name: assessment-objective props: @@ -17473,6 +18671,15 @@ catalog: value: AC-22d.[02] class: sp800-53a prose: non-public information is removed from the publicly accessible system, if discovered. + links: + - href: '#ac-22_smt.d' + rel: assessment-for + links: + - href: '#ac-22_smt.d' + rel: assessment-for + links: + - href: '#ac-22_smt' + rel: assessment-for - id: ac-22_asm-examine name: assessment-method props: @@ -17595,6 +18802,9 @@ catalog: value: AC-23 class: sp800-53a prose: '{{ insert: param, ac-23_odp.01 }} are employed for {{ insert: param, ac-23_odp.02 }} to detect and protect against unauthorized data mining.' + links: + - href: '#ac-23_smt' + rel: assessment-for - id: ac-23_asm-examine name: assessment-method props: @@ -17725,6 +18935,9 @@ catalog: value: AC-24 class: sp800-53a prose: '{{ insert: param, ac-24_odp.01 }} are taken to ensure that {{ insert: param, ac-24_odp.02 }} are applied to each access request prior to access enforcement.' + links: + - href: '#ac-24_smt' + rel: assessment-for - id: ac-24_asm-examine name: assessment-method props: @@ -17842,6 +19055,9 @@ catalog: value: AC-24(01) class: sp800-53a prose: '{{ insert: param, ac-24.01_odp.01 }} is transmitted using {{ insert: param, ac-24.01_odp.02 }} to {{ insert: param, ac-24.01_odp.03 }} that enforce access control decisions.' + links: + - href: '#ac-24.1_smt' + rel: assessment-for - id: ac-24.1_asm-examine name: assessment-method props: @@ -17962,6 +19178,9 @@ catalog: value: AC-24(02)[01] class: sp800-53a prose: 'access control decisions are enforced based on {{ insert: param, ac-24.02_odp.01 }} that do not include the identity of the user or process acting on behalf of the user (if selected);' + links: + - href: '#ac-24.2_smt' + rel: assessment-for - id: ac-24.2_obj-2 name: assessment-objective props: @@ -17969,6 +19188,12 @@ catalog: value: AC-24(02)[02] class: sp800-53a prose: 'access control decisions are enforced based on {{ insert: param, ac-24.02_odp.02 }} that do not include the identity of the user or process acting on behalf of the user (if selected).' + links: + - href: '#ac-24.2_smt' + rel: assessment-for + links: + - href: '#ac-24.2_smt' + rel: assessment-for - id: ac-24.2_asm-examine name: assessment-method props: @@ -18086,6 +19311,9 @@ catalog: value: AC-25 class: sp800-53a prose: 'a reference monitor is implemented for {{ insert: param, ac-25_odp }} that is tamper-proof, always invoked, and small enough to be subject to analysis and testing, the completeness of which can be assured.' + links: + - href: '#ac-25_smt' + rel: assessment-for - id: ac-25_asm-examine name: assessment-method props: @@ -18356,6 +19584,9 @@ catalog: value: AT-01a.[01] class: sp800-53a prose: 'an awareness and training policy is developed and documented; ' + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.a-2 name: assessment-objective props: @@ -18363,6 +19594,9 @@ catalog: value: AT-01a.[02] class: sp800-53a prose: 'the awareness and training policy is disseminated to {{ insert: param, at-01_odp.01 }};' + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.a-3 name: assessment-objective props: @@ -18370,6 +19604,9 @@ catalog: value: AT-01a.[03] class: sp800-53a prose: awareness and training procedures to facilitate the implementation of the awareness and training policy and associated access controls are developed and documented; + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.a-4 name: assessment-objective props: @@ -18377,6 +19614,9 @@ catalog: value: AT-01a.[04] class: sp800-53a prose: 'the awareness and training procedures are disseminated to {{ insert: param, at-01_odp.02 }}.' + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.a.1 name: assessment-objective props: @@ -18398,6 +19638,9 @@ catalog: value: AT-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses purpose;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-2 name: assessment-objective props: @@ -18405,6 +19648,9 @@ catalog: value: AT-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses scope;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-3 name: assessment-objective props: @@ -18412,6 +19658,9 @@ catalog: value: AT-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses roles;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-4 name: assessment-objective props: @@ -18419,6 +19668,9 @@ catalog: value: AT-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses responsibilities;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-5 name: assessment-objective props: @@ -18426,6 +19678,9 @@ catalog: value: AT-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses management commitment;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-6 name: assessment-objective props: @@ -18433,6 +19688,9 @@ catalog: value: AT-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses coordination among organizational entities;' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.a-7 name: assessment-objective props: @@ -18440,6 +19698,12 @@ catalog: value: AT-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy addresses compliance; and' + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#at-1_smt.a.1.a' + rel: assessment-for - id: at-1_obj.a.1.b name: assessment-objective props: @@ -18447,6 +19711,15 @@ catalog: value: AT-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, at-01_odp.03 }} awareness and training policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines; and' + links: + - href: '#at-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#at-1_smt.a.1' + rel: assessment-for + links: + - href: '#at-1_smt.a' + rel: assessment-for - id: at-1_obj.b name: assessment-objective props: @@ -18454,6 +19727,9 @@ catalog: value: AT-01b. class: sp800-53a prose: 'the {{ insert: param, at-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the awareness and training policy and procedures;' + links: + - href: '#at-1_smt.b' + rel: assessment-for - id: at-1_obj.c name: assessment-objective props: @@ -18475,6 +19751,9 @@ catalog: value: AT-01c.01[01] class: sp800-53a prose: 'the current awareness and training policy is reviewed and updated {{ insert: param, at-01_odp.05 }}; ' + links: + - href: '#at-1_smt.c.1' + rel: assessment-for - id: at-1_obj.c.1-2 name: assessment-objective props: @@ -18482,6 +19761,12 @@ catalog: value: AT-01c.01[02] class: sp800-53a prose: 'the current awareness and training policy is reviewed and updated following {{ insert: param, at-01_odp.06 }};' + links: + - href: '#at-1_smt.c.1' + rel: assessment-for + links: + - href: '#at-1_smt.c.1' + rel: assessment-for - id: at-1_obj.c.2 name: assessment-objective props: @@ -18496,6 +19781,9 @@ catalog: value: AT-01c.02[01] class: sp800-53a prose: 'the current awareness and training procedures are reviewed and updated {{ insert: param, at-01_odp.07 }};' + links: + - href: '#at-1_smt.c.2' + rel: assessment-for - id: at-1_obj.c.2-2 name: assessment-objective props: @@ -18503,6 +19791,18 @@ catalog: value: AT-01c.02[02] class: sp800-53a prose: 'the current awareness and training procedures are reviewed and updated following {{ insert: param, at-01_odp.08 }}.' + links: + - href: '#at-1_smt.c.2' + rel: assessment-for + links: + - href: '#at-1_smt.c.2' + rel: assessment-for + links: + - href: '#at-1_smt.c' + rel: assessment-for + links: + - href: '#at-1_smt' + rel: assessment-for - id: at-1_asm-examine name: assessment-method props: @@ -18755,6 +20055,9 @@ catalog: value: AT-02a.01[01] class: sp800-53a prose: security literacy training is provided to system users (including managers, senior executives, and contractors) as part of initial training for new users; + links: + - href: '#at-2_smt.a.1' + rel: assessment-for - id: at-2_obj.a.1-2 name: assessment-objective props: @@ -18762,6 +20065,9 @@ catalog: value: AT-02a.01[02] class: sp800-53a prose: privacy literacy training is provided to system users (including managers, senior executives, and contractors) as part of initial training for new users; + links: + - href: '#at-2_smt.a.1' + rel: assessment-for - id: at-2_obj.a.1-3 name: assessment-objective props: @@ -18769,6 +20075,9 @@ catalog: value: AT-02a.01[03] class: sp800-53a prose: 'security literacy training is provided to system users (including managers, senior executives, and contractors) {{ insert: param, at-02_odp.01 }} thereafter;' + links: + - href: '#at-2_smt.a.1' + rel: assessment-for - id: at-2_obj.a.1-4 name: assessment-objective props: @@ -18776,6 +20085,12 @@ catalog: value: AT-02a.01[04] class: sp800-53a prose: 'privacy literacy training is provided to system users (including managers, senior executives, and contractors) {{ insert: param, at-02_odp.02 }} thereafter;' + links: + - href: '#at-2_smt.a.1' + rel: assessment-for + links: + - href: '#at-2_smt.a.1' + rel: assessment-for - id: at-2_obj.a.2 name: assessment-objective props: @@ -18790,6 +20105,9 @@ catalog: value: AT-02a.02[01] class: sp800-53a prose: 'security literacy training is provided to system users (including managers, senior executives, and contractors) when required by system changes or following {{ insert: param, at-02_odp.03 }};' + links: + - href: '#at-2_smt.a.2' + rel: assessment-for - id: at-2_obj.a.2-2 name: assessment-objective props: @@ -18797,6 +20115,15 @@ catalog: value: AT-02a.02[02] class: sp800-53a prose: 'privacy literacy training is provided to system users (including managers, senior executives, and contractors) when required by system changes or following {{ insert: param, at-02_odp.04 }};' + links: + - href: '#at-2_smt.a.2' + rel: assessment-for + links: + - href: '#at-2_smt.a.2' + rel: assessment-for + links: + - href: '#at-2_smt.a' + rel: assessment-for - id: at-2_obj.b name: assessment-objective props: @@ -18804,6 +20131,9 @@ catalog: value: AT-02b. class: sp800-53a prose: '{{ insert: param, at-02_odp.05 }} are employed to increase the security and privacy awareness of system users;' + links: + - href: '#at-2_smt.b' + rel: assessment-for - id: at-2_obj.c name: assessment-objective props: @@ -18818,6 +20148,9 @@ catalog: value: AT-02c.[01] class: sp800-53a prose: 'literacy training and awareness content is updated {{ insert: param, at-02_odp.06 }};' + links: + - href: '#at-2_smt.c' + rel: assessment-for - id: at-2_obj.c-2 name: assessment-objective props: @@ -18825,6 +20158,12 @@ catalog: value: AT-02c.[02] class: sp800-53a prose: 'literacy training and awareness content is updated following {{ insert: param, at-02_odp.07 }};' + links: + - href: '#at-2_smt.c' + rel: assessment-for + links: + - href: '#at-2_smt.c' + rel: assessment-for - id: at-2_obj.d name: assessment-objective props: @@ -18832,6 +20171,12 @@ catalog: value: AT-02d. class: sp800-53a prose: lessons learned from internal or external security incidents or breaches are incorporated into literacy training and awareness techniques. + links: + - href: '#at-2_smt.d' + rel: assessment-for + links: + - href: '#at-2_smt' + rel: assessment-for - id: at-2_asm-examine name: assessment-method props: @@ -18933,6 +20278,9 @@ catalog: value: AT-02(01) class: sp800-53a prose: practical exercises in literacy training that simulate events and incidents are provided. + links: + - href: '#at-2.1_smt' + rel: assessment-for - id: at-2.1_asm-examine name: assessment-method props: @@ -19030,6 +20378,9 @@ catalog: value: AT-02(02)[01] class: sp800-53a prose: literacy training on recognizing potential indicators of insider threat is provided; + links: + - href: '#at-2.2_smt' + rel: assessment-for - id: at-2.2_obj-2 name: assessment-objective props: @@ -19037,6 +20388,12 @@ catalog: value: AT-02(02)[02] class: sp800-53a prose: literacy training on reporting potential indicators of insider threat is provided. + links: + - href: '#at-2.2_smt' + rel: assessment-for + links: + - href: '#at-2.2_smt' + rel: assessment-for - id: at-2.2_asm-examine name: assessment-method props: @@ -19120,6 +20477,9 @@ catalog: value: AT-02(03)[01] class: sp800-53a prose: literacy training on recognizing potential and actual instances of social engineering is provided; + links: + - href: '#at-2.3_smt' + rel: assessment-for - id: at-2.3_obj-2 name: assessment-objective props: @@ -19127,6 +20487,9 @@ catalog: value: AT-02(03)[02] class: sp800-53a prose: literacy training on reporting potential and actual instances of social engineering is provided; + links: + - href: '#at-2.3_smt' + rel: assessment-for - id: at-2.3_obj-3 name: assessment-objective props: @@ -19134,6 +20497,9 @@ catalog: value: AT-02(03)[03] class: sp800-53a prose: literacy training on recognizing potential and actual instances of social mining is provided; + links: + - href: '#at-2.3_smt' + rel: assessment-for - id: at-2.3_obj-4 name: assessment-objective props: @@ -19141,6 +20507,12 @@ catalog: value: AT-02(03)[04] class: sp800-53a prose: literacy training on reporting potential and actual instances of social mining is provided. + links: + - href: '#at-2.3_smt' + rel: assessment-for + links: + - href: '#at-2.3_smt' + rel: assessment-for - id: at-2.3_asm-examine name: assessment-method props: @@ -19228,6 +20600,9 @@ catalog: value: AT-02(04) class: sp800-53a prose: 'literacy training on recognizing suspicious communications and anomalous behavior in organizational systems using {{ insert: param, at-02.04_odp }} is provided.' + links: + - href: '#at-2.4_smt' + rel: assessment-for - id: at-2.4_asm-examine name: assessment-method props: @@ -19304,6 +20679,9 @@ catalog: value: AT-02(05) class: sp800-53a prose: literacy training on the advanced persistent threat is provided. + links: + - href: '#at-2.5_smt' + rel: assessment-for - id: at-2.5_asm-examine name: assessment-method props: @@ -19401,6 +20779,9 @@ catalog: value: AT-02(06)(a) class: sp800-53a prose: literacy training on the cyber threat environment is provided; + links: + - href: '#at-2.6_smt.a' + rel: assessment-for - id: at-2.6_obj.b name: assessment-objective props: @@ -19408,6 +20789,12 @@ catalog: value: AT-02(06)(b) class: sp800-53a prose: system operations reflects current cyber threat information. + links: + - href: '#at-2.6_smt.b' + rel: assessment-for + links: + - href: '#at-2.6_smt' + rel: assessment-for - id: at-2.6_asm-examine name: assessment-method props: @@ -19643,6 +21030,9 @@ catalog: value: AT-03a.01[01] class: sp800-53a prose: 'role-based security training is provided to {{ insert: param, at-03_odp.01 }} before authorizing access to the system, information, or performing assigned duties;' + links: + - href: '#at-3_smt.a.1' + rel: assessment-for - id: at-3_obj.a.1-2 name: assessment-objective props: @@ -19650,6 +21040,9 @@ catalog: value: AT-03a.01[02] class: sp800-53a prose: 'role-based privacy training is provided to {{ insert: param, at-03_odp.02 }} before authorizing access to the system, information, or performing assigned duties;' + links: + - href: '#at-3_smt.a.1' + rel: assessment-for - id: at-3_obj.a.1-3 name: assessment-objective props: @@ -19657,6 +21050,9 @@ catalog: value: AT-03a.01[03] class: sp800-53a prose: 'role-based security training is provided to {{ insert: param, at-03_odp.01 }} {{ insert: param, at-03_odp.03 }} thereafter;' + links: + - href: '#at-3_smt.a.1' + rel: assessment-for - id: at-3_obj.a.1-4 name: assessment-objective props: @@ -19664,6 +21060,12 @@ catalog: value: AT-03a.01[04] class: sp800-53a prose: 'role-based privacy training is provided to {{ insert: param, at-03_odp.02 }} {{ insert: param, at-03_odp.03 }} thereafter;' + links: + - href: '#at-3_smt.a.1' + rel: assessment-for + links: + - href: '#at-3_smt.a.1' + rel: assessment-for - id: at-3_obj.a.2 name: assessment-objective props: @@ -19678,6 +21080,9 @@ catalog: value: AT-03a.02[01] class: sp800-53a prose: role-based security training is provided to personnel with assigned security roles and responsibilities when required by system changes; + links: + - href: '#at-3_smt.a.2' + rel: assessment-for - id: at-3_obj.a.2-2 name: assessment-objective props: @@ -19685,6 +21090,15 @@ catalog: value: AT-03a.02[02] class: sp800-53a prose: role-based privacy training is provided to personnel with assigned security roles and responsibilities when required by system changes; + links: + - href: '#at-3_smt.a.2' + rel: assessment-for + links: + - href: '#at-3_smt.a.2' + rel: assessment-for + links: + - href: '#at-3_smt.a' + rel: assessment-for - id: at-3_obj.b name: assessment-objective props: @@ -19699,6 +21113,9 @@ catalog: value: AT-03b.[01] class: sp800-53a prose: 'role-based training content is updated {{ insert: param, at-03_odp.04 }};' + links: + - href: '#at-3_smt.b' + rel: assessment-for - id: at-3_obj.b-2 name: assessment-objective props: @@ -19706,6 +21123,12 @@ catalog: value: AT-03b.[02] class: sp800-53a prose: 'role-based training content is updated following {{ insert: param, at-03_odp.05 }};' + links: + - href: '#at-3_smt.b' + rel: assessment-for + links: + - href: '#at-3_smt.b' + rel: assessment-for - id: at-3_obj.c name: assessment-objective props: @@ -19713,6 +21136,12 @@ catalog: value: AT-03c. class: sp800-53a prose: lessons learned from internal or external security incidents or breaches are incorporated into role-based training. + links: + - href: '#at-3_smt.c' + rel: assessment-for + links: + - href: '#at-3_smt' + rel: assessment-for - id: at-3_asm-examine name: assessment-method props: @@ -19835,6 +21264,9 @@ catalog: value: AT-03(01) class: sp800-53a prose: '{{ insert: param, at-03.01_odp.01 }} are provided with initial and refresher training {{ insert: param, at-03.01_odp.02 }} in the employment and operation of environmental controls.' + links: + - href: '#at-3.1_smt' + rel: assessment-for - id: at-3.1_asm-examine name: assessment-method props: @@ -19938,6 +21370,9 @@ catalog: value: AT-03(02) class: sp800-53a prose: '{{ insert: param, at-03.02_odp.01 }} is/are provided with initial and refresher training {{ insert: param, at-03.02_odp.02 }} in the employment and operation of physical security controls.' + links: + - href: '#at-3.2_smt' + rel: assessment-for - id: at-3.2_asm-examine name: assessment-method props: @@ -20021,6 +21456,9 @@ catalog: value: AT-03(03)[01] class: sp800-53a prose: practical exercises in security training that reinforce training objectives are provided; + links: + - href: '#at-3.3_smt' + rel: assessment-for - id: at-3.3_obj-2 name: assessment-objective props: @@ -20028,6 +21466,12 @@ catalog: value: AT-03(03)[02] class: sp800-53a prose: practical exercises in privacy training that reinforce training objectives are provided. + links: + - href: '#at-3.3_smt' + rel: assessment-for + links: + - href: '#at-3.3_smt' + rel: assessment-for - id: at-3.3_asm-examine name: assessment-method props: @@ -20149,6 +21593,9 @@ catalog: value: AT-03(05) class: sp800-53a prose: '{{ insert: param, at-03.05_odp.01 }} are provided with initial and refresher training {{ insert: param, at-03.05_odp.02 }} in the employment and operation of personally identifiable information processing and transparency controls.' + links: + - href: '#at-3.5_smt' + rel: assessment-for - id: at-3.5_asm-examine name: assessment-method props: @@ -20286,6 +21733,9 @@ catalog: value: AT-04a.[01] class: sp800-53a prose: information security and privacy training activities, including security and privacy awareness training and specific role-based security and privacy training, are documented; + links: + - href: '#at-4_smt.a' + rel: assessment-for - id: at-4_obj.a-2 name: assessment-objective props: @@ -20293,6 +21743,12 @@ catalog: value: AT-04a.[02] class: sp800-53a prose: information security and privacy training activities, including security and privacy awareness training and specific role-based security and privacy training, are monitored; + links: + - href: '#at-4_smt.a' + rel: assessment-for + links: + - href: '#at-4_smt.a' + rel: assessment-for - id: at-4_obj.b name: assessment-objective props: @@ -20300,6 +21756,12 @@ catalog: value: AT-04b. class: sp800-53a prose: 'individual training records are retained for {{ insert: param, at-04_odp }}.' + links: + - href: '#at-4_smt.b' + rel: assessment-for + links: + - href: '#at-4_smt' + rel: assessment-for - id: at-4_asm-examine name: assessment-method props: @@ -20415,6 +21877,9 @@ catalog: value: AT-06 class: sp800-53a prose: 'feedback on organizational training results is provided {{ insert: param, at-06_odp.01 }} to {{ insert: param, at-06_odp.02 }}.' + links: + - href: '#at-6_smt' + rel: assessment-for - id: at-6_asm-examine name: assessment-method props: @@ -20670,6 +22135,9 @@ catalog: value: AU-01a.[01] class: sp800-53a prose: an audit and accountability policy is developed and documented; + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.a-2 name: assessment-objective props: @@ -20677,6 +22145,9 @@ catalog: value: AU-01a.[02] class: sp800-53a prose: 'the audit and accountability policy is disseminated to {{ insert: param, au-01_odp.01 }};' + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.a-3 name: assessment-objective props: @@ -20684,6 +22155,9 @@ catalog: value: AU-01a.[03] class: sp800-53a prose: audit and accountability procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls are developed and documented; + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.a-4 name: assessment-objective props: @@ -20691,6 +22165,9 @@ catalog: value: AU-01a.[04] class: sp800-53a prose: 'the audit and accountability procedures are disseminated to {{ insert: param, au-01_odp.02 }};' + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.a.1 name: assessment-objective props: @@ -20712,6 +22189,9 @@ catalog: value: AU-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses purpose;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-2 name: assessment-objective props: @@ -20719,6 +22199,9 @@ catalog: value: AU-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses scope;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-3 name: assessment-objective props: @@ -20726,6 +22209,9 @@ catalog: value: AU-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses roles;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-4 name: assessment-objective props: @@ -20733,6 +22219,9 @@ catalog: value: AU-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses responsibilities;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-5 name: assessment-objective props: @@ -20740,6 +22229,9 @@ catalog: value: AU-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses management commitment;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-6 name: assessment-objective props: @@ -20747,6 +22239,9 @@ catalog: value: AU-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses coordination among organizational entities;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.a-7 name: assessment-objective props: @@ -20754,6 +22249,12 @@ catalog: value: AU-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy addresses compliance;' + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#au-1_smt.a.1.a' + rel: assessment-for - id: au-1_obj.a.1.b name: assessment-objective props: @@ -20761,6 +22262,15 @@ catalog: value: AU-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, au-01_odp.03 }} of the audit and accountability policy is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#au-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#au-1_smt.a.1' + rel: assessment-for + links: + - href: '#au-1_smt.a' + rel: assessment-for - id: au-1_obj.b name: assessment-objective props: @@ -20768,6 +22278,9 @@ catalog: value: AU-01b. class: sp800-53a prose: 'the {{ insert: param, au-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the audit and accountability policy and procedures;' + links: + - href: '#au-1_smt.b' + rel: assessment-for - id: au-1_obj.c name: assessment-objective props: @@ -20789,6 +22302,9 @@ catalog: value: AU-01c.01[01] class: sp800-53a prose: 'the current audit and accountability policy is reviewed and updated {{ insert: param, au-01_odp.05 }};' + links: + - href: '#au-1_smt.c.1' + rel: assessment-for - id: au-1_obj.c.1-2 name: assessment-objective props: @@ -20796,6 +22312,12 @@ catalog: value: AU-01c.01[02] class: sp800-53a prose: 'the current audit and accountability policy is reviewed and updated following {{ insert: param, au-01_odp.06 }};' + links: + - href: '#au-1_smt.c.1' + rel: assessment-for + links: + - href: '#au-1_smt.c.1' + rel: assessment-for - id: au-1_obj.c.2 name: assessment-objective props: @@ -20810,6 +22332,9 @@ catalog: value: AU-01c.02[01] class: sp800-53a prose: 'the current audit and accountability procedures are reviewed and updated {{ insert: param, au-01_odp.07 }};' + links: + - href: '#au-1_smt.c.2' + rel: assessment-for - id: au-1_obj.c.2-2 name: assessment-objective props: @@ -20817,6 +22342,18 @@ catalog: value: AU-01c.02[02] class: sp800-53a prose: 'the current audit and accountability procedures are reviewed and updated following {{ insert: param, au-01_odp.08 }}.' + links: + - href: '#au-1_smt.c.2' + rel: assessment-for + links: + - href: '#au-1_smt.c.2' + rel: assessment-for + links: + - href: '#au-1_smt.c' + rel: assessment-for + links: + - href: '#au-1_smt' + rel: assessment-for - id: au-1_asm-examine name: assessment-method props: @@ -21043,6 +22580,9 @@ catalog: value: AU-02a. class: sp800-53a prose: '{{ insert: param, au-02_odp.01 }} that the system is capable of logging are identified in support of the audit logging function;' + links: + - href: '#au-2_smt.a' + rel: assessment-for - id: au-2_obj.b name: assessment-objective props: @@ -21050,6 +22590,9 @@ catalog: value: AU-02b. class: sp800-53a prose: the event logging function is coordinated with other organizational entities requiring audit-related information to guide and inform the selection criteria for events to be logged; + links: + - href: '#au-2_smt.b' + rel: assessment-for - id: au-2_obj.c name: assessment-objective props: @@ -21064,6 +22607,9 @@ catalog: value: AU-02c.[01] class: sp800-53a prose: '{{ insert: param, au-02_odp.02 }} are specified for logging within the system;' + links: + - href: '#au-2_smt.c' + rel: assessment-for - id: au-2_obj.c-2 name: assessment-objective props: @@ -21071,6 +22617,12 @@ catalog: value: AU-02c.[02] class: sp800-53a prose: 'the specified event types are logged within the system {{ insert: param, au-02_odp.03 }};' + links: + - href: '#au-2_smt.c' + rel: assessment-for + links: + - href: '#au-2_smt.c' + rel: assessment-for - id: au-2_obj.d name: assessment-objective props: @@ -21078,6 +22630,9 @@ catalog: value: AU-02d. class: sp800-53a prose: a rationale is provided for why the event types selected for logging are deemed to be adequate to support after-the-fact investigations of incidents; + links: + - href: '#au-2_smt.d' + rel: assessment-for - id: au-2_obj.e name: assessment-objective props: @@ -21085,6 +22640,12 @@ catalog: value: AU-02e. class: sp800-53a prose: 'the event types selected for logging are reviewed and updated {{ insert: param, au-02_odp.04 }}.' + links: + - href: '#au-2_smt.e' + rel: assessment-for + links: + - href: '#au-2_smt' + rel: assessment-for - id: au-2_asm-examine name: assessment-method props: @@ -21303,6 +22864,9 @@ catalog: value: AU-03a. class: sp800-53a prose: audit records contain information that establishes what type of event occurred; + links: + - href: '#au-3_smt.a' + rel: assessment-for - id: au-3_obj.b name: assessment-objective props: @@ -21310,6 +22874,9 @@ catalog: value: AU-03b. class: sp800-53a prose: audit records contain information that establishes when the event occurred; + links: + - href: '#au-3_smt.b' + rel: assessment-for - id: au-3_obj.c name: assessment-objective props: @@ -21317,6 +22884,9 @@ catalog: value: AU-03c. class: sp800-53a prose: audit records contain information that establishes where the event occurred; + links: + - href: '#au-3_smt.c' + rel: assessment-for - id: au-3_obj.d name: assessment-objective props: @@ -21324,6 +22894,9 @@ catalog: value: AU-03d. class: sp800-53a prose: audit records contain information that establishes the source of the event; + links: + - href: '#au-3_smt.d' + rel: assessment-for - id: au-3_obj.e name: assessment-objective props: @@ -21331,6 +22904,9 @@ catalog: value: AU-03e. class: sp800-53a prose: audit records contain information that establishes the outcome of the event; + links: + - href: '#au-3_smt.e' + rel: assessment-for - id: au-3_obj.f name: assessment-objective props: @@ -21338,6 +22914,12 @@ catalog: value: AU-03f. class: sp800-53a prose: audit records contain information that establishes the identity of any individuals, subjects, or objects/entities associated with the event. + links: + - href: '#au-3_smt.f' + rel: assessment-for + links: + - href: '#au-3_smt' + rel: assessment-for - id: au-3_asm-examine name: assessment-method props: @@ -21441,6 +23023,9 @@ catalog: value: AU-03(01) class: sp800-53a prose: 'generated audit records contain the following {{ insert: param, au-03.01_odp }}.' + links: + - href: '#au-3.1_smt' + rel: assessment-for - id: au-3.1_asm-examine name: assessment-method props: @@ -21561,6 +23146,9 @@ catalog: value: AU-03(03) class: sp800-53a prose: 'personally identifiable information contained in audit records is limited to {{ insert: param, au-03.03_odp }} identified in the privacy risk assessment.' + links: + - href: '#au-3.3_smt' + rel: assessment-for - id: au-3.3_asm-examine name: assessment-method props: @@ -21688,6 +23276,9 @@ catalog: value: AU-04 class: sp800-53a prose: 'audit log storage capacity is allocated to accommodate {{ insert: param, au-04_odp }}.' + links: + - href: '#au-4_smt' + rel: assessment-for - id: au-4_asm-examine name: assessment-method props: @@ -21796,6 +23387,9 @@ catalog: value: AU-04(01) class: sp800-53a prose: 'audit logs are transferred {{ insert: param, au-04.01_odp }} to a different system, system component, or media other than the system or system component conducting the logging.' + links: + - href: '#au-4.1_smt' + rel: assessment-for - id: au-4.1_asm-examine name: assessment-method props: @@ -21953,6 +23547,9 @@ catalog: value: AU-05a. class: sp800-53a prose: '{{ insert: param, au-05_odp.01 }} are alerted in the event of an audit logging process failure within {{ insert: param, au-05_odp.02 }};' + links: + - href: '#au-5_smt.a' + rel: assessment-for - id: au-5_obj.b name: assessment-objective props: @@ -21960,6 +23557,12 @@ catalog: value: AU-05b. class: sp800-53a prose: '{{ insert: param, au-05_odp.03 }} are taken in the event of an audit logging process failure.' + links: + - href: '#au-5_smt.b' + rel: assessment-for + links: + - href: '#au-5_smt' + rel: assessment-for - id: au-5_asm-examine name: assessment-method props: @@ -22083,6 +23686,9 @@ catalog: value: AU-05(01) class: sp800-53a prose: 'a warning is provided to {{ insert: param, au-05.01_odp.01 }} within {{ insert: param, au-05.01_odp.02 }} when allocated audit log storage volume reaches {{ insert: param, au-05.01_odp.03 }} of repository maximum audit log storage capacity.' + links: + - href: '#au-5.1_smt' + rel: assessment-for - id: au-5.1_asm-examine name: assessment-method props: @@ -22201,6 +23807,9 @@ catalog: value: AU-05(02) class: sp800-53a prose: 'an alert is provided within {{ insert: param, au-05.02_odp.01 }} to {{ insert: param, au-05.02_odp.02 }} when {{ insert: param, au-05.02_odp.03 }} occur.' + links: + - href: '#au-5.2_smt' + rel: assessment-for - id: au-5.2_asm-examine name: assessment-method props: @@ -22298,6 +23907,9 @@ catalog: value: AU-05(03)[01] class: sp800-53a prose: configurable network communications traffic volume thresholds reflecting limits on audit log storage capacity are enforced; + links: + - href: '#au-5.3_smt' + rel: assessment-for - id: au-5.3_obj-2 name: assessment-objective props: @@ -22305,6 +23917,12 @@ catalog: value: AU-05(03)[02] class: sp800-53a prose: 'network traffic is {{ insert: param, au-05.03_odp }} if network traffic volume is above configured thresholds.' + links: + - href: '#au-5.3_smt' + rel: assessment-for + links: + - href: '#au-5.3_smt' + rel: assessment-for - id: au-5.3_asm-examine name: assessment-method props: @@ -22408,6 +24026,9 @@ catalog: value: AU-05(04) class: sp800-53a prose: '{{ insert: param, au-05.04_odp.01 }} is/are invoked in the event of {{ insert: param, au-05.04_odp.02 }} , unless an alternate audit logging capability exists.' + links: + - href: '#au-5.4_smt' + rel: assessment-for - id: au-5.4_asm-examine name: assessment-method props: @@ -22510,6 +24131,9 @@ catalog: value: AU-05(05) class: sp800-53a prose: 'an alternate audit logging capability is provided in the event of a failure in primary audit logging capability that implements {{ insert: param, au-05.05_odp }}.' + links: + - href: '#au-5.5_smt' + rel: assessment-for - id: au-5.5_asm-examine name: assessment-method props: @@ -22720,6 +24344,9 @@ catalog: value: AU-06a. class: sp800-53a prose: 'system audit records are reviewed and analyzed {{ insert: param, au-06_odp.01 }} for indications of {{ insert: param, au-06_odp.02 }} and the potential impact of the inappropriate or unusual activity;' + links: + - href: '#au-6_smt.a' + rel: assessment-for - id: au-6_obj.b name: assessment-objective props: @@ -22727,6 +24354,9 @@ catalog: value: AU-06b. class: sp800-53a prose: 'findings are reported to {{ insert: param, au-06_odp.03 }};' + links: + - href: '#au-6_smt.b' + rel: assessment-for - id: au-6_obj.c name: assessment-objective props: @@ -22734,6 +24364,12 @@ catalog: value: AU-06c. class: sp800-53a prose: the level of audit record review, analysis, and reporting within the system is adjusted when there is a change in risk based on law enforcement information, intelligence information, or other credible sources of information. + links: + - href: '#au-6_smt.c' + rel: assessment-for + links: + - href: '#au-6_smt' + rel: assessment-for - id: au-6_asm-examine name: assessment-method props: @@ -22822,6 +24458,9 @@ catalog: value: AU-06(01) class: sp800-53a prose: 'audit record review, analysis, and reporting processes are integrated using {{ insert: param, au-06.01_odp }}.' + links: + - href: '#au-6.1_smt' + rel: assessment-for - id: au-6.1_asm-examine name: assessment-method props: @@ -22932,6 +24571,9 @@ catalog: value: AU-06(03) class: sp800-53a prose: audit records across different repositories are analyzed and correlated to gain organization-wide situational awareness. + links: + - href: '#au-6.3_smt' + rel: assessment-for - id: au-6.3_asm-examine name: assessment-method props: @@ -23031,6 +24673,9 @@ catalog: value: AU-06(04)[01] class: sp800-53a prose: the capability to centrally review and analyze audit records from multiple components within the system is provided; + links: + - href: '#au-6.4_smt' + rel: assessment-for - id: au-6.4_obj-2 name: assessment-objective props: @@ -23038,6 +24683,12 @@ catalog: value: AU-06(04)[02] class: sp800-53a prose: the capability to centrally review and analyze audit records from multiple components within the system is implemented. + links: + - href: '#au-6.4_smt' + rel: assessment-for + links: + - href: '#au-6.4_smt' + rel: assessment-for - id: au-6.4_asm-examine name: assessment-method props: @@ -23157,6 +24808,9 @@ catalog: value: AU-06(05) class: sp800-53a prose: 'analysis of audit records is integrated with analysis of {{ insert: param, au-06.05_odp.01 }} to further enhance the ability to identify inappropriate or unusual activity.' + links: + - href: '#au-6.5_smt' + rel: assessment-for - id: au-6.5_asm-examine name: assessment-method props: @@ -23245,6 +24899,9 @@ catalog: value: AU-06(06) class: sp800-53a prose: information from audit records is correlated with information obtained from monitoring physical access to further enhance the ability to identify suspicious, inappropriate, unusual, or malevolent activity. + links: + - href: '#au-6.6_smt' + rel: assessment-for - id: au-6.6_asm-examine name: assessment-method props: @@ -23351,6 +25008,9 @@ catalog: value: AU-06(07) class: sp800-53a prose: 'the permitted actions for each {{ insert: param, au-06.07_odp }} associated with the review, analysis, and reporting of audit record information are specified.' + links: + - href: '#au-6.7_smt' + rel: assessment-for - id: au-6.7_asm-examine name: assessment-method props: @@ -23441,6 +25101,9 @@ catalog: value: AU-06(08) class: sp800-53a prose: a full text analysis of logged privileged commands in a physically distinct component or subsystem of the system or other system that is dedicated to that analysis is performed. + links: + - href: '#au-6.8_smt' + rel: assessment-for - id: au-6.8_asm-examine name: assessment-method props: @@ -23533,6 +25196,9 @@ catalog: value: AU-06(09) class: sp800-53a prose: information from non-technical sources is correlated with audit record information to enhance organization-wide situational awareness. + links: + - href: '#au-6.9_smt' + rel: assessment-for - id: au-6.9_asm-examine name: assessment-method props: @@ -23690,6 +25356,9 @@ catalog: value: AU-07a.[01] class: sp800-53a prose: an audit record reduction and report generation capability is provided that supports on-demand audit record review, analysis, and reporting requirements and after-the-fact investigations of incidents; + links: + - href: '#au-7_smt.a' + rel: assessment-for - id: au-7_obj.a-2 name: assessment-objective props: @@ -23697,6 +25366,12 @@ catalog: value: AU-07a.[02] class: sp800-53a prose: an audit record reduction and report generation capability is implemented that supports on-demand audit record review, analysis, and reporting requirements and after-the-fact investigations of incidents; + links: + - href: '#au-7_smt.a' + rel: assessment-for + links: + - href: '#au-7_smt.a' + rel: assessment-for - id: au-7_obj.b name: assessment-objective props: @@ -23711,6 +25386,9 @@ catalog: value: AU-07b.[01] class: sp800-53a prose: an audit record reduction and report generation capability is provided that does not alter the original content or time ordering of audit records; + links: + - href: '#au-7_smt.b' + rel: assessment-for - id: au-7_obj.b-2 name: assessment-objective props: @@ -23718,6 +25396,15 @@ catalog: value: AU-07b.[02] class: sp800-53a prose: an audit record reduction and report generation capability is implemented that does not alter the original content or time ordering of audit records. + links: + - href: '#au-7_smt.b' + rel: assessment-for + links: + - href: '#au-7_smt.b' + rel: assessment-for + links: + - href: '#au-7_smt' + rel: assessment-for - id: au-7_asm-examine name: assessment-method props: @@ -23827,6 +25514,9 @@ catalog: value: AU-07(01)[01] class: sp800-53a prose: 'the capability to process, sort, and search audit records for events of interest based on {{ insert: param, au-07.01_odp }} are provided;' + links: + - href: '#au-7.1_smt' + rel: assessment-for - id: au-7.1_obj-2 name: assessment-objective props: @@ -23834,6 +25524,12 @@ catalog: value: AU-07(01)[02] class: sp800-53a prose: 'the capability to process, sort, and search audit records for events of interest based on {{ insert: param, au-07.01_odp }} are implemented.' + links: + - href: '#au-7.1_smt' + rel: assessment-for + links: + - href: '#au-7.1_smt' + rel: assessment-for - id: au-7.1_asm-examine name: assessment-method props: @@ -23977,6 +25673,9 @@ catalog: value: AU-08a. class: sp800-53a prose: internal system clocks are used to generate timestamps for audit records; + links: + - href: '#au-8_smt.a' + rel: assessment-for - id: au-8_obj.b name: assessment-objective props: @@ -23984,6 +25683,12 @@ catalog: value: AU-08b. class: sp800-53a prose: 'timestamps are recorded for audit records that meet {{ insert: param, au-08_odp }} and that use Coordinated Universal Time, have a fixed local time offset from Coordinated Universal Time, or include the local time offset as part of the timestamp.' + links: + - href: '#au-8_smt.b' + rel: assessment-for + links: + - href: '#au-8_smt' + rel: assessment-for - id: au-8_asm-examine name: assessment-method props: @@ -24166,6 +25871,9 @@ catalog: value: AU-09a. class: sp800-53a prose: audit information and audit logging tools are protected from unauthorized access, modification, and deletion; + links: + - href: '#au-9_smt.a' + rel: assessment-for - id: au-9_obj.b name: assessment-objective props: @@ -24173,6 +25881,12 @@ catalog: value: AU-09b. class: sp800-53a prose: '{{ insert: param, au-09_odp }} are alerted upon detection of unauthorized access, modification, or deletion of audit information.' + links: + - href: '#au-9_smt.b' + rel: assessment-for + links: + - href: '#au-9_smt' + rel: assessment-for - id: au-9_asm-examine name: assessment-method props: @@ -24271,6 +25985,9 @@ catalog: value: AU-09(01) class: sp800-53a prose: audit trails are written to hardware-enforced, write-once media. + links: + - href: '#au-9.1_smt' + rel: assessment-for - id: au-9.1_asm-examine name: assessment-method props: @@ -24381,6 +26098,9 @@ catalog: value: AU-09(02) class: sp800-53a prose: 'audit records are stored {{ insert: param, au-09.02_odp }} in a repository that is part of a physically different system or system component than the system or component being audited.' + links: + - href: '#au-9.2_smt' + rel: assessment-for - id: au-9.2_asm-examine name: assessment-method props: @@ -24478,6 +26198,9 @@ catalog: value: AU-09(03) class: sp800-53a prose: cryptographic mechanisms to protect the integrity of audit information and audit tools are implemented. + links: + - href: '#au-9.3_smt' + rel: assessment-for - id: au-9.3_asm-examine name: assessment-method props: @@ -24584,6 +26307,9 @@ catalog: value: AU-09(04) class: sp800-53a prose: 'access to management of audit logging functionality is authorized only to {{ insert: param, au-09.04_odp }}.' + links: + - href: '#au-9.4_smt' + rel: assessment-for - id: au-9.4_asm-examine name: assessment-method props: @@ -24707,6 +26433,9 @@ catalog: value: AU-09(05) class: sp800-53a prose: 'dual authorization is enforced for the {{ insert: param, au-09.05_odp.01 }} of {{ insert: param, au-09.05_odp.02 }}.' + links: + - href: '#au-9.5_smt' + rel: assessment-for - id: au-9.5_asm-examine name: assessment-method props: @@ -24812,6 +26541,9 @@ catalog: value: AU-09(06) class: sp800-53a prose: 'read-only access to audit information is authorized to {{ insert: param, au-09.06_odp }}.' + links: + - href: '#au-9.6_smt' + rel: assessment-for - id: au-9.6_asm-examine name: assessment-method props: @@ -24915,6 +26647,9 @@ catalog: value: AU-09(07) class: sp800-53a prose: audit information is stored on a component running a different operating system than the system or component being audited. + links: + - href: '#au-9.7_smt' + rel: assessment-for - id: au-9.7_asm-examine name: assessment-method props: @@ -25050,6 +26785,9 @@ catalog: value: AU-10 class: sp800-53a prose: 'irrefutable evidence is provided that an individual (or process acting on behalf of an individual) has performed {{ insert: param, au-10_odp }}.' + links: + - href: '#au-10_smt' + rel: assessment-for - id: au-10_asm-examine name: assessment-method props: @@ -25175,6 +26913,9 @@ catalog: value: AU-10(01)(a) class: sp800-53a prose: 'the identity of the information producer is bound with the information to {{ insert: param, au-10.01_odp }};' + links: + - href: '#au-10.1_smt.a' + rel: assessment-for - id: au-10.1_obj.b name: assessment-objective props: @@ -25182,6 +26923,12 @@ catalog: value: AU-10(01)(b) class: sp800-53a prose: the means for authorized individuals to determine the identity of the producer of the information is provided. + links: + - href: '#au-10.1_smt.b' + rel: assessment-for + links: + - href: '#au-10.1_smt' + rel: assessment-for - id: au-10.1_asm-examine name: assessment-method props: @@ -25318,6 +27065,9 @@ catalog: value: AU-10(02)(a) class: sp800-53a prose: 'the binding of the information producer identity to the information is validated at {{ insert: param, au-10.02_odp.01 }};' + links: + - href: '#au-10.2_smt.a' + rel: assessment-for - id: au-10.2_obj.b name: assessment-objective props: @@ -25325,6 +27075,12 @@ catalog: value: AU-10(02)(b) class: sp800-53a prose: '{{ insert: param, au-10.02_odp.02 }} in the event of a validation error are performed.' + links: + - href: '#au-10.2_smt.b' + rel: assessment-for + links: + - href: '#au-10.2_smt' + rel: assessment-for - id: au-10.2_asm-examine name: assessment-method props: @@ -25424,6 +27180,9 @@ catalog: value: AU-10(03) class: sp800-53a prose: reviewer or releaser credentials are maintained within the established chain of custody for information reviewed or released. + links: + - href: '#au-10.3_smt' + rel: assessment-for - id: au-10.3_asm-examine name: assessment-method props: @@ -25560,6 +27319,9 @@ catalog: value: AU-10(04)(a) class: sp800-53a prose: 'the binding of the information reviewer identity to the information at the transfer or release points prior to release or transfer between {{ insert: param, au-10.04_odp.01 }} is validated;' + links: + - href: '#au-10.4_smt.a' + rel: assessment-for - id: au-10.4_obj.b name: assessment-objective props: @@ -25567,6 +27329,12 @@ catalog: value: AU-10(04)(b) class: sp800-53a prose: '{{ insert: param, au-10.04_odp.02 }} are performed in the event of a validation error.' + links: + - href: '#au-10.4_smt.b' + rel: assessment-for + links: + - href: '#au-10.4_smt' + rel: assessment-for - id: au-10.4_asm-examine name: assessment-method props: @@ -25704,6 +27472,9 @@ catalog: value: AU-11 class: sp800-53a prose: 'audit records are retained for {{ insert: param, au-11_odp }} to provide support for after-the-fact investigations of incidents and to meet regulatory and organizational information retention requirements.' + links: + - href: '#au-11_smt' + rel: assessment-for - id: au-11_asm-examine name: assessment-method props: @@ -25798,6 +27569,9 @@ catalog: value: AU-11(01) class: sp800-53a prose: '{{ insert: param, au-11.01_odp }} are employed to ensure that long-term audit records generated by the system can be retrieved.' + links: + - href: '#au-11.1_smt' + rel: assessment-for - id: au-11.1_asm-examine name: assessment-method props: @@ -25971,6 +27745,9 @@ catalog: value: AU-12a. class: sp800-53a prose: 'audit record generation capability for the event types the system is capable of auditing (defined in AU-02_ODP[01]) is provided by {{ insert: param, au-12_odp.01 }};' + links: + - href: '#au-12_smt.a' + rel: assessment-for - id: au-12_obj.b name: assessment-objective props: @@ -25978,6 +27755,9 @@ catalog: value: AU-12b. class: sp800-53a prose: '{{ insert: param, au-12_odp.02 }} is/are allowed to select the event types that are to be logged by specific components of the system;' + links: + - href: '#au-12_smt.b' + rel: assessment-for - id: au-12_obj.c name: assessment-objective props: @@ -25985,6 +27765,12 @@ catalog: value: AU-12c. class: sp800-53a prose: audit records for the event types defined in AU-02_ODP[02] that include the audit record content defined in AU-03 are generated. + links: + - href: '#au-12_smt.c' + rel: assessment-for + links: + - href: '#au-12_smt' + rel: assessment-for - id: au-12_asm-examine name: assessment-method props: @@ -26105,6 +27891,9 @@ catalog: value: AU-12(01) class: sp800-53a prose: 'audit records from {{ insert: param, au-12.01_odp.01 }} are compiled into a system-wide (logical or physical) audit trail that is time-correlated to within {{ insert: param, au-12.01_odp.02 }}.' + links: + - href: '#au-12.1_smt' + rel: assessment-for - id: au-12.1_asm-examine name: assessment-method props: @@ -26196,6 +27985,9 @@ catalog: value: AU-12(02) class: sp800-53a prose: a system-wide (logical or physical) audit trail composed of audit records is produced in a standardized format. + links: + - href: '#au-12.2_smt' + rel: assessment-for - id: au-12.2_asm-examine name: assessment-method props: @@ -26337,6 +28129,9 @@ catalog: value: AU-12(03)[01] class: sp800-53a prose: 'the capability for {{ insert: param, au-12.03_odp.01 }} to change the logging to be performed on {{ insert: param, au-12.03_odp.02 }} based on {{ insert: param, au-12.03_odp.03 }} within {{ insert: param, au-12.03_odp.04 }} is provided;' + links: + - href: '#au-12.3_smt' + rel: assessment-for - id: au-12.3_obj-2 name: assessment-objective props: @@ -26344,6 +28139,12 @@ catalog: value: AU-12(03)[02] class: sp800-53a prose: 'the capability for {{ insert: param, au-12.03_odp.01 }} to change the logging to be performed on {{ insert: param, au-12.03_odp.02 }} based on {{ insert: param, au-12.03_odp.03 }} within {{ insert: param, au-12.03_odp.04 }} is implemented.' + links: + - href: '#au-12.3_smt' + rel: assessment-for + links: + - href: '#au-12.3_smt' + rel: assessment-for - id: au-12.3_asm-examine name: assessment-method props: @@ -26442,6 +28243,9 @@ catalog: value: AU-12(04)[01] class: sp800-53a prose: the capability to audit the parameters of user query events for data sets containing personally identifiable information is provided; + links: + - href: '#au-12.4_smt' + rel: assessment-for - id: au-12.4_obj-2 name: assessment-objective props: @@ -26449,6 +28253,12 @@ catalog: value: AU-12(04)[02] class: sp800-53a prose: the capability to audit the parameters of user query events for data sets containing personally identifiable information is implemented. + links: + - href: '#au-12.4_smt' + rel: assessment-for + links: + - href: '#au-12.4_smt' + rel: assessment-for - id: au-12.4_asm-examine name: assessment-method props: @@ -26628,6 +28438,9 @@ catalog: value: AU-13a. class: sp800-53a prose: '{{ insert: param, au-13_odp.01 }} is/are monitored {{ insert: param, au-13_odp.02 }} for evidence of unauthorized disclosure of organizational information;' + links: + - href: '#au-13_smt.a' + rel: assessment-for - id: au-13_obj.b name: assessment-objective props: @@ -26642,6 +28455,9 @@ catalog: value: AU-13b.01 class: sp800-53a prose: '{{ insert: param, au-13_odp.03 }} are notified if an information disclosure is discovered;' + links: + - href: '#au-13_smt.b.1' + rel: assessment-for - id: au-13_obj.b.2 name: assessment-objective props: @@ -26649,6 +28465,15 @@ catalog: value: AU-13b.02 class: sp800-53a prose: '{{ insert: param, au-13_odp.04 }} are taken if an information disclosure is discovered.' + links: + - href: '#au-13_smt.b.2' + rel: assessment-for + links: + - href: '#au-13_smt.b' + rel: assessment-for + links: + - href: '#au-13_smt' + rel: assessment-for - id: au-13_asm-examine name: assessment-method props: @@ -26754,6 +28579,9 @@ catalog: value: AU-13(01) class: sp800-53a prose: 'open-source information and information sites are monitored using {{ insert: param, au-13.01_odp }}.' + links: + - href: '#au-13.1_smt' + rel: assessment-for - id: au-13.1_asm-examine name: assessment-method props: @@ -26855,6 +28683,9 @@ catalog: value: AU-13(02) class: sp800-53a prose: 'the list of open-source information sites being monitored is reviewed {{ insert: param, au-13.02_odp }}.' + links: + - href: '#au-13.2_smt' + rel: assessment-for - id: au-13.2_asm-examine name: assessment-method props: @@ -26948,6 +28779,9 @@ catalog: value: AU-13(03) class: sp800-53a prose: discovery techniques, processes, and tools are employed to determine if external entities are replicating organizational information in an unauthorized manner. + links: + - href: '#au-13.3_smt' + rel: assessment-for - id: au-13.3_asm-examine name: assessment-method props: @@ -27119,6 +28953,9 @@ catalog: value: AU-14a.[01] class: sp800-53a prose: '{{ insert: param, au-14_odp.01 }} are provided with the capability to {{ insert: param, au-14_odp.02 }} the content of a user session under {{ insert: param, au-14_odp.03 }};' + links: + - href: '#au-14_smt.a' + rel: assessment-for - id: au-14_obj.a-2 name: assessment-objective props: @@ -27126,6 +28963,12 @@ catalog: value: AU-14a.[02] class: sp800-53a prose: 'the capability for {{ insert: param, au-14_odp.01 }} to {{ insert: param, au-14_odp.02 }} the content of a user session under {{ insert: param, au-14_odp.03 }} is implemented;' + links: + - href: '#au-14_smt.a' + rel: assessment-for + links: + - href: '#au-14_smt.a' + rel: assessment-for - id: au-14_obj.b name: assessment-objective props: @@ -27140,6 +28983,9 @@ catalog: value: AU-14b.[01] class: sp800-53a prose: session auditing activities are developed in consultation with legal counsel and in accordance with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; + links: + - href: '#au-14_smt.b' + rel: assessment-for - id: au-14_obj.b-2 name: assessment-objective props: @@ -27147,6 +28993,9 @@ catalog: value: AU-14b.[02] class: sp800-53a prose: session auditing activities are integrated in consultation with legal counsel and in accordance with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; + links: + - href: '#au-14_smt.b' + rel: assessment-for - id: au-14_obj.b-3 name: assessment-objective props: @@ -27154,6 +29003,15 @@ catalog: value: AU-14b.[03] class: sp800-53a prose: session auditing activities are used in consultation with legal counsel and in accordance with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; + links: + - href: '#au-14_smt.b' + rel: assessment-for + links: + - href: '#au-14_smt.b' + rel: assessment-for + links: + - href: '#au-14_smt' + rel: assessment-for - id: au-14_asm-examine name: assessment-method props: @@ -27249,6 +29107,9 @@ catalog: value: AU-14(01) class: sp800-53a prose: session audits are initiated automatically at system start-up. + links: + - href: '#au-14.1_smt' + rel: assessment-for - id: au-14.1_asm-examine name: assessment-method props: @@ -27364,6 +29225,9 @@ catalog: value: AU-14(03)[01] class: sp800-53a prose: the capability for authorized users to remotely view and hear content related to an established user session in real time is provided; + links: + - href: '#au-14.3_smt' + rel: assessment-for - id: au-14.3_obj-2 name: assessment-objective props: @@ -27371,6 +29235,12 @@ catalog: value: AU-14(03)[02] class: sp800-53a prose: the capability for authorized users to remotely view and hear content related to an established user session in real time is implemented. + links: + - href: '#au-14.3_smt' + rel: assessment-for + links: + - href: '#au-14.3_smt' + rel: assessment-for - id: au-14.3_asm-examine name: assessment-method props: @@ -27507,6 +29377,9 @@ catalog: value: AU-16 class: sp800-53a prose: '{{ insert: param, au-16_odp.01 }} for coordinating {{ insert: param, au-16_odp.02 }} among external organizations when audit information is transmitted across organizational boundaries are employed.' + links: + - href: '#au-16_smt' + rel: assessment-for - id: au-16_asm-examine name: assessment-method props: @@ -27601,6 +29474,9 @@ catalog: value: AU-16(01) class: sp800-53a prose: the identity of individuals in cross-organizational audit trails is preserved. + links: + - href: '#au-16.1_smt' + rel: assessment-for - id: au-16.1_asm-examine name: assessment-method props: @@ -27711,6 +29587,9 @@ catalog: value: AU-16(02) class: sp800-53a prose: 'cross-organizational audit information is provided to {{ insert: param, au-16.02_odp.01 }} based on {{ insert: param, au-16.02_odp.02 }}.' + links: + - href: '#au-16.2_smt' + rel: assessment-for - id: au-16.2_asm-examine name: assessment-method props: @@ -27791,6 +29670,9 @@ catalog: value: AU-16(03) class: sp800-53a prose: '{{ insert: param, au-16.03_odp }} are implemented to disassociate individuals from audit information transmitted across organizational boundaries.' + links: + - href: '#au-16.3_smt' + rel: assessment-for - id: au-16.3_asm-examine name: assessment-method props: @@ -28069,6 +29951,9 @@ catalog: value: CA-01a.[01] class: sp800-53a prose: an assessment, authorization, and monitoring policy is developed and documented; + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.a-2 name: assessment-objective props: @@ -28076,6 +29961,9 @@ catalog: value: CA-01a.[02] class: sp800-53a prose: 'the assessment, authorization, and monitoring policy is disseminated to {{ insert: param, ca-01_odp.01 }};' + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.a-3 name: assessment-objective props: @@ -28083,6 +29971,9 @@ catalog: value: CA-01a.[03] class: sp800-53a prose: assessment, authorization, and monitoring procedures to facilitate the implementation of the assessment, authorization, and monitoring policy and associated assessment, authorization, and monitoring controls are developed and documented; + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.a-4 name: assessment-objective props: @@ -28090,6 +29981,9 @@ catalog: value: CA-01a.[04] class: sp800-53a prose: 'the assessment, authorization, and monitoring procedures are disseminated to {{ insert: param, ca-01_odp.02 }};' + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.a.1 name: assessment-objective props: @@ -28111,6 +30005,9 @@ catalog: value: CA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses purpose;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-2 name: assessment-objective props: @@ -28118,6 +30015,9 @@ catalog: value: CA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses scope;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-3 name: assessment-objective props: @@ -28125,6 +30025,9 @@ catalog: value: CA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses roles;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-4 name: assessment-objective props: @@ -28132,6 +30035,9 @@ catalog: value: CA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses responsibilities;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-5 name: assessment-objective props: @@ -28139,6 +30045,9 @@ catalog: value: CA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses management commitment;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-6 name: assessment-objective props: @@ -28146,6 +30055,9 @@ catalog: value: CA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses coordination among organizational entities;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.a-7 name: assessment-objective props: @@ -28153,6 +30065,12 @@ catalog: value: CA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy addresses compliance;' + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ca-1_smt.a.1.a' + rel: assessment-for - id: ca-1_obj.a.1.b name: assessment-objective props: @@ -28160,6 +30078,15 @@ catalog: value: CA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.03 }} assessment, authorization, and monitoring policy is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ca-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ca-1_smt.a.1' + rel: assessment-for + links: + - href: '#ca-1_smt.a' + rel: assessment-for - id: ca-1_obj.b name: assessment-objective props: @@ -28167,6 +30094,9 @@ catalog: value: CA-01b. class: sp800-53a prose: 'the {{ insert: param, ca-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the assessment, authorization, and monitoring policy and procedures;' + links: + - href: '#ca-1_smt.b' + rel: assessment-for - id: ca-1_obj.c name: assessment-objective props: @@ -28188,6 +30118,9 @@ catalog: value: CA-01c.01[01] class: sp800-53a prose: 'the current assessment, authorization, and monitoring policy is reviewed and updated {{ insert: param, ca-01_odp.05 }}; ' + links: + - href: '#ca-1_smt.c.1' + rel: assessment-for - id: ca-1_obj.c.1-2 name: assessment-objective props: @@ -28195,6 +30128,12 @@ catalog: value: CA-01c.01[02] class: sp800-53a prose: 'the current assessment, authorization, and monitoring policy is reviewed and updated following {{ insert: param, ca-01_odp.06 }};' + links: + - href: '#ca-1_smt.c.1' + rel: assessment-for + links: + - href: '#ca-1_smt.c.1' + rel: assessment-for - id: ca-1_obj.c.2 name: assessment-objective props: @@ -28209,6 +30148,9 @@ catalog: value: CA-01c.02[01] class: sp800-53a prose: 'the current assessment, authorization, and monitoring procedures are reviewed and updated {{ insert: param, ca-01_odp.07 }}; ' + links: + - href: '#ca-1_smt.c.2' + rel: assessment-for - id: ca-1_obj.c.2-2 name: assessment-objective props: @@ -28216,6 +30158,18 @@ catalog: value: CA-01c.02[02] class: sp800-53a prose: 'the current assessment, authorization, and monitoring procedures are reviewed and updated following {{ insert: param, ca-01_odp.08 }}.' + links: + - href: '#ca-1_smt.c.2' + rel: assessment-for + links: + - href: '#ca-1_smt.c.2' + rel: assessment-for + links: + - href: '#ca-1_smt.c' + rel: assessment-for + links: + - href: '#ca-1_smt' + rel: assessment-for - id: ca-1_asm-examine name: assessment-method props: @@ -28423,6 +30377,9 @@ catalog: value: CA-02a. class: sp800-53a prose: an appropriate assessor or assessment team is selected for the type of assessment to be conducted; + links: + - href: '#ca-2_smt.a' + rel: assessment-for - id: ca-2_obj.b name: assessment-objective props: @@ -28437,6 +30394,9 @@ catalog: value: CA-02b.01 class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including controls and control enhancements under assessment; + links: + - href: '#ca-2_smt.b.1' + rel: assessment-for - id: ca-2_obj.b.2 name: assessment-objective props: @@ -28444,6 +30404,9 @@ catalog: value: CA-02b.02 class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including assessment procedures to be used to determine control effectiveness; + links: + - href: '#ca-2_smt.b.2' + rel: assessment-for - id: ca-2_obj.b.3 name: assessment-objective props: @@ -28458,6 +30421,9 @@ catalog: value: CA-02b.03[01] class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including the assessment environment; + links: + - href: '#ca-2_smt.b.3' + rel: assessment-for - id: ca-2_obj.b.3-2 name: assessment-objective props: @@ -28465,6 +30431,9 @@ catalog: value: CA-02b.03[02] class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including the assessment team; + links: + - href: '#ca-2_smt.b.3' + rel: assessment-for - id: ca-2_obj.b.3-3 name: assessment-objective props: @@ -28472,6 +30441,15 @@ catalog: value: CA-02b.03[03] class: sp800-53a prose: a control assessment plan is developed that describes the scope of the assessment, including assessment roles and responsibilities; + links: + - href: '#ca-2_smt.b.3' + rel: assessment-for + links: + - href: '#ca-2_smt.b.3' + rel: assessment-for + links: + - href: '#ca-2_smt.b' + rel: assessment-for - id: ca-2_obj.c name: assessment-objective props: @@ -28479,6 +30457,9 @@ catalog: value: CA-02c. class: sp800-53a prose: the control assessment plan is reviewed and approved by the authorizing official or designated representative prior to conducting the assessment; + links: + - href: '#ca-2_smt.c' + rel: assessment-for - id: ca-2_obj.d name: assessment-objective props: @@ -28493,6 +30474,9 @@ catalog: value: CA-02d.[01] class: sp800-53a prose: 'controls are assessed in the system and its environment of operation {{ insert: param, ca-02_odp.01 }} to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;' + links: + - href: '#ca-2_smt.d' + rel: assessment-for - id: ca-2_obj.d-2 name: assessment-objective props: @@ -28500,6 +30484,12 @@ catalog: value: CA-02d.[02] class: sp800-53a prose: 'controls are assessed in the system and its environment of operation {{ insert: param, ca-02_odp.01 }} to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established privacy requirements;' + links: + - href: '#ca-2_smt.d' + rel: assessment-for + links: + - href: '#ca-2_smt.d' + rel: assessment-for - id: ca-2_obj.e name: assessment-objective props: @@ -28507,6 +30497,9 @@ catalog: value: CA-02e. class: sp800-53a prose: a control assessment report is produced that documents the results of the assessment; + links: + - href: '#ca-2_smt.e' + rel: assessment-for - id: ca-2_obj.f name: assessment-objective props: @@ -28514,6 +30507,12 @@ catalog: value: CA-02f. class: sp800-53a prose: 'the results of the control assessment are provided to {{ insert: param, ca-02_odp.02 }}.' + links: + - href: '#ca-2_smt.f' + rel: assessment-for + links: + - href: '#ca-2_smt' + rel: assessment-for - id: ca-2_asm-examine name: assessment-method props: @@ -28608,6 +30607,9 @@ catalog: value: CA-02(01) class: sp800-53a prose: independent assessors or assessment teams are employed to conduct control assessments. + links: + - href: '#ca-2.1_smt' + rel: assessment-for - id: ca-2.1_asm-examine name: assessment-method props: @@ -28744,6 +30746,9 @@ catalog: value: CA-02(02) class: sp800-53a prose: '{{ insert: param, ca-02.02_odp.01 }} {{ insert: param, ca-02.02_odp.02 }} {{ insert: param, ca-02.02_odp.03 }} are included as part of control assessments.' + links: + - href: '#ca-2.2_smt' + rel: assessment-for - id: ca-2.2_asm-examine name: assessment-method props: @@ -28812,9 +30817,9 @@ catalog: - name: label value: CA-02(03)_ODP[01] class: sp800-53a - label: external organizations + label: external organization(s) guidelines: - - prose: external organizations from which the results of control assessments are leveraged are defined; + - prose: external organization(s) from which the results of control assessments are leveraged are defined; - id: ca-02.03_odp.02 props: - name: alt-identifier @@ -28868,6 +30873,9 @@ catalog: value: CA-02(03) class: sp800-53a prose: 'the results of control assessments performed by {{ insert: param, ca-02.03_odp.01 }} on {{ insert: param, ca-02.03_odp.02 }} are leveraged when the assessment meets {{ insert: param, ca-02.03_odp.03 }}.' + links: + - href: '#ca-2.3_smt' + rel: assessment-for - id: ca-2.3_asm-examine name: assessment-method props: @@ -29044,6 +31052,9 @@ catalog: value: CA-03a. class: sp800-53a prose: 'the exchange of information between the system and other systems is approved and managed using {{ insert: param, ca-03_odp.01 }};' + links: + - href: '#ca-3_smt.a' + rel: assessment-for - id: ca-3_obj.b name: assessment-objective props: @@ -29058,6 +31069,9 @@ catalog: value: CA-03b.[01] class: sp800-53a prose: the interface characteristics are documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.b-2 name: assessment-objective props: @@ -29065,6 +31079,9 @@ catalog: value: CA-03b.[02] class: sp800-53a prose: security requirements are documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.b-3 name: assessment-objective props: @@ -29072,6 +31089,9 @@ catalog: value: CA-03b.[03] class: sp800-53a prose: privacy requirements are documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.b-4 name: assessment-objective props: @@ -29079,6 +31099,9 @@ catalog: value: CA-03b.[04] class: sp800-53a prose: controls are documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.b-5 name: assessment-objective props: @@ -29086,6 +31109,9 @@ catalog: value: CA-03b.[05] class: sp800-53a prose: responsibilities for each system are documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.b-6 name: assessment-objective props: @@ -29093,6 +31119,12 @@ catalog: value: CA-03b.[06] class: sp800-53a prose: the impact level of the information communicated is documented as part of each exchange agreement; + links: + - href: '#ca-3_smt.b' + rel: assessment-for + links: + - href: '#ca-3_smt.b' + rel: assessment-for - id: ca-3_obj.c name: assessment-objective props: @@ -29100,6 +31132,12 @@ catalog: value: CA-03c. class: sp800-53a prose: 'agreements are reviewed and updated {{ insert: param, ca-03_odp.03 }}.' + links: + - href: '#ca-3_smt.c' + rel: assessment-for + links: + - href: '#ca-3_smt' + rel: assessment-for - id: ca-3_asm-examine name: assessment-method props: @@ -29282,6 +31320,9 @@ catalog: value: CA-03(06) class: sp800-53a prose: individuals or systems transferring data between interconnecting systems have the requisite authorizations (i.e., write permissions or privileges) prior to accepting such data. + links: + - href: '#ca-3.6_smt' + rel: assessment-for - id: ca-3.6_asm-examine name: assessment-method props: @@ -29410,6 +31451,9 @@ catalog: value: CA-03(07)(a) class: sp800-53a prose: transitive (downstream) information exchanges with other systems through the systems identified in CA-03a are identified; + links: + - href: '#ca-3.7_smt.a' + rel: assessment-for - id: ca-3.7_obj.b name: assessment-objective props: @@ -29417,6 +31461,12 @@ catalog: value: CA-03(07)(b) class: sp800-53a prose: measures are taken to ensure that transitive (downstream) information exchanges cease when the controls on identified transitive (downstream) systems cannot be verified or validated. + links: + - href: '#ca-3.7_smt.b' + rel: assessment-for + links: + - href: '#ca-3.7_smt' + rel: assessment-for - id: ca-3.7_asm-examine name: assessment-method props: @@ -29583,6 +31633,9 @@ catalog: value: CA-05a. class: sp800-53a prose: a plan of action and milestones for the system is developed to document the planned remediation actions of the organization to correct weaknesses or deficiencies noted during the assessment of the controls and to reduce or eliminate known vulnerabilities in the system; + links: + - href: '#ca-5_smt.a' + rel: assessment-for - id: ca-5_obj.b name: assessment-objective props: @@ -29590,6 +31643,12 @@ catalog: value: CA-05b. class: sp800-53a prose: 'existing plan of action and milestones are updated {{ insert: param, ca-05_odp }} based on the findings from control assessments, independent audits or reviews, and continuous monitoring activities.' + links: + - href: '#ca-5_smt.b' + rel: assessment-for + links: + - href: '#ca-5_smt' + rel: assessment-for - id: ca-5_asm-examine name: assessment-method props: @@ -29692,6 +31751,9 @@ catalog: value: CA-05(01) class: sp800-53a prose: '{{ insert: param, ca-05.01_odp }} are used to ensure the accuracy, currency, and availability of the plan of action and milestones for the system.' + links: + - href: '#ca-5.1_smt' + rel: assessment-for - id: ca-5.1_asm-examine name: assessment-method props: @@ -29866,6 +31928,9 @@ catalog: value: CA-06a. class: sp800-53a prose: a senior official is assigned as the authorizing official for the system; + links: + - href: '#ca-6_smt.a' + rel: assessment-for - id: ca-6_obj.b name: assessment-objective props: @@ -29873,6 +31938,9 @@ catalog: value: CA-06b. class: sp800-53a prose: a senior official is assigned as the authorizing official for common controls available for inheritance by organizational systems; + links: + - href: '#ca-6_smt.b' + rel: assessment-for - id: ca-6_obj.c name: assessment-objective props: @@ -29887,6 +31955,9 @@ catalog: value: CA-06c.01 class: sp800-53a prose: before commencing operations, the authorizing official for the system accepts the use of common controls inherited by the system; + links: + - href: '#ca-6_smt.c.1' + rel: assessment-for - id: ca-6_obj.c.2 name: assessment-objective props: @@ -29894,6 +31965,12 @@ catalog: value: CA-06c.02 class: sp800-53a prose: before commencing operations, the authorizing official for the system authorizes the system to operate; + links: + - href: '#ca-6_smt.c.2' + rel: assessment-for + links: + - href: '#ca-6_smt.c' + rel: assessment-for - id: ca-6_obj.d name: assessment-objective props: @@ -29901,6 +31978,9 @@ catalog: value: CA-06d. class: sp800-53a prose: the authorizing official for common controls authorizes the use of those controls for inheritance by organizational systems; + links: + - href: '#ca-6_smt.d' + rel: assessment-for - id: ca-6_obj.e name: assessment-objective props: @@ -29908,6 +31988,12 @@ catalog: value: CA-06e. class: sp800-53a prose: 'the authorizations are updated {{ insert: param, ca-06_odp }}.' + links: + - href: '#ca-6_smt.e' + rel: assessment-for + links: + - href: '#ca-6_smt' + rel: assessment-for - id: ca-6_asm-examine name: assessment-method props: @@ -30000,6 +32086,9 @@ catalog: value: CA-06(01)[01] class: sp800-53a prose: a joint authorization process is employed for the system; + links: + - href: '#ca-6.1_smt' + rel: assessment-for - id: ca-6.1_obj-2 name: assessment-objective props: @@ -30007,6 +32096,12 @@ catalog: value: CA-06(01)[02] class: sp800-53a prose: the joint authorization process employed for the system includes multiple authorizing officials from the same organization conducting the authorization. + links: + - href: '#ca-6.1_smt' + rel: assessment-for + links: + - href: '#ca-6.1_smt' + rel: assessment-for - id: ca-6.1_asm-examine name: assessment-method props: @@ -30104,6 +32199,9 @@ catalog: value: CA-06(02)[01] class: sp800-53a prose: a joint authorization process is employed for the system; + links: + - href: '#ca-6.2_smt' + rel: assessment-for - id: ca-6.2_obj-2 name: assessment-objective props: @@ -30111,6 +32209,12 @@ catalog: value: CA-06(02)[02] class: sp800-53a prose: the joint authorization process employed for the system includes multiple authorizing officials with at least one authorizing official from an organization external to the organization conducting the authorization. + links: + - href: '#ca-6.2_smt' + rel: assessment-for + links: + - href: '#ca-6.2_smt' + rel: assessment-for - id: ca-6.2_asm-examine name: assessment-method props: @@ -30449,6 +32553,9 @@ catalog: value: CA-07[01] class: sp800-53a prose: a system-level continuous monitoring strategy is developed; + links: + - href: '#ca-7_smt' + rel: assessment-for - id: ca-7_obj-2 name: assessment-objective props: @@ -30456,6 +32563,9 @@ catalog: value: CA-07[02] class: sp800-53a prose: system-level continuous monitoring is implemented in accordance with the organization-level continuous monitoring strategy; + links: + - href: '#ca-7_smt' + rel: assessment-for - id: ca-7_obj.a name: assessment-objective props: @@ -30463,6 +32573,9 @@ catalog: value: CA-07a. class: sp800-53a prose: 'system-level continuous monitoring includes establishment of the following system-level metrics to be monitored: {{ insert: param, ca-07_odp.01 }};' + links: + - href: '#ca-7_smt.a' + rel: assessment-for - id: ca-7_obj.b name: assessment-objective props: @@ -30477,6 +32590,9 @@ catalog: value: CA-07b.[01] class: sp800-53a prose: 'system-level continuous monitoring includes established {{ insert: param, ca-07_odp.02 }} for monitoring;' + links: + - href: '#ca-7_smt.b' + rel: assessment-for - id: ca-7_obj.b-2 name: assessment-objective props: @@ -30484,6 +32600,12 @@ catalog: value: CA-07b.[02] class: sp800-53a prose: 'system-level continuous monitoring includes established {{ insert: param, ca-07_odp.03 }} for assessment of control effectiveness;' + links: + - href: '#ca-7_smt.b' + rel: assessment-for + links: + - href: '#ca-7_smt.b' + rel: assessment-for - id: ca-7_obj.c name: assessment-objective props: @@ -30491,6 +32613,9 @@ catalog: value: CA-07c. class: sp800-53a prose: system-level continuous monitoring includes ongoing control assessments in accordance with the continuous monitoring strategy; + links: + - href: '#ca-7_smt.c' + rel: assessment-for - id: ca-7_obj.d name: assessment-objective props: @@ -30498,6 +32623,9 @@ catalog: value: CA-07d. class: sp800-53a prose: system-level continuous monitoring includes ongoing monitoring of system and organization-defined metrics in accordance with the continuous monitoring strategy; + links: + - href: '#ca-7_smt.d' + rel: assessment-for - id: ca-7_obj.e name: assessment-objective props: @@ -30505,6 +32633,9 @@ catalog: value: CA-07e. class: sp800-53a prose: system-level continuous monitoring includes correlation and analysis of information generated by control assessments and monitoring; + links: + - href: '#ca-7_smt.e' + rel: assessment-for - id: ca-7_obj.f name: assessment-objective props: @@ -30512,6 +32643,9 @@ catalog: value: CA-07f. class: sp800-53a prose: system-level continuous monitoring includes response actions to address the results of the analysis of control assessment and monitoring information; + links: + - href: '#ca-7_smt.f' + rel: assessment-for - id: ca-7_obj.g name: assessment-objective props: @@ -30526,6 +32660,9 @@ catalog: value: CA-07g.[01] class: sp800-53a prose: 'system-level continuous monitoring includes reporting the security status of the system to {{ insert: param, ca-07_odp.04 }} {{ insert: param, ca-07_odp.05 }};' + links: + - href: '#ca-7_smt.g' + rel: assessment-for - id: ca-7_obj.g-2 name: assessment-objective props: @@ -30533,6 +32670,15 @@ catalog: value: CA-07g.[02] class: sp800-53a prose: 'system-level continuous monitoring includes reporting the privacy status of the system to {{ insert: param, ca-07_odp.06 }} {{ insert: param, ca-07_odp.07 }}.' + links: + - href: '#ca-7_smt.g' + rel: assessment-for + links: + - href: '#ca-7_smt.g' + rel: assessment-for + links: + - href: '#ca-7_smt' + rel: assessment-for - id: ca-7_asm-examine name: assessment-method props: @@ -30641,6 +32787,9 @@ catalog: value: CA-07(01) class: sp800-53a prose: independent assessors or assessment teams are employed to monitor the controls in the system on an ongoing basis. + links: + - href: '#ca-7.1_smt' + rel: assessment-for - id: ca-7.1_asm-examine name: assessment-method props: @@ -30748,6 +32897,9 @@ catalog: value: CA-07(03)[01] class: sp800-53a prose: trend analysis is employed to determine if control implementations used in the continuous monitoring process need to be modified based on empirical data; + links: + - href: '#ca-7.3_smt' + rel: assessment-for - id: ca-7.3_obj-2 name: assessment-objective props: @@ -30755,6 +32907,9 @@ catalog: value: CA-07(03)[02] class: sp800-53a prose: trend analysis is employed to determine if the frequency of continuous monitoring activities used in the continuous monitoring process needs to be modified based on empirical data; + links: + - href: '#ca-7.3_smt' + rel: assessment-for - id: ca-7.3_obj-3 name: assessment-objective props: @@ -30762,6 +32917,12 @@ catalog: value: CA-07(03)[03] class: sp800-53a prose: trend analysis is employed to determine if the types of activities used in the continuous monitoring process need to be modified based on empirical data. + links: + - href: '#ca-7.3_smt' + rel: assessment-for + links: + - href: '#ca-7.3_smt' + rel: assessment-for - id: ca-7.3_asm-examine name: assessment-method props: @@ -30890,6 +33051,9 @@ catalog: value: CA-07(04)(a) class: sp800-53a prose: effectiveness monitoring is included in risk monitoring; + links: + - href: '#ca-7.4_smt.a' + rel: assessment-for - id: ca-7.4_obj.b name: assessment-objective props: @@ -30897,6 +33061,9 @@ catalog: value: CA-07(04)(b) class: sp800-53a prose: compliance monitoring is included in risk monitoring; + links: + - href: '#ca-7.4_smt.b' + rel: assessment-for - id: ca-7.4_obj.c name: assessment-objective props: @@ -30904,6 +33071,12 @@ catalog: value: CA-07(04)(c) class: sp800-53a prose: change monitoring is included in risk monitoring. + links: + - href: '#ca-7.4_smt.c' + rel: assessment-for + links: + - href: '#ca-7.4_smt' + rel: assessment-for - id: ca-7.4_asm-examine name: assessment-method props: @@ -31033,6 +33206,9 @@ catalog: value: CA-07(05)[01] class: sp800-53a prose: '{{ insert: param, ca-07.05_odp.01 }} are employed to validate that policies are established;' + links: + - href: '#ca-7.5_smt' + rel: assessment-for - id: ca-7.5_obj-2 name: assessment-objective props: @@ -31040,6 +33216,12 @@ catalog: value: CA-07(05)[02] class: sp800-53a prose: '{{ insert: param, ca-07.05_odp.02 }} are employed to validate that implemented controls are operating in a consistent manner.' + links: + - href: '#ca-7.5_smt' + rel: assessment-for + links: + - href: '#ca-7.5_smt' + rel: assessment-for - id: ca-7.5_asm-examine name: assessment-method props: @@ -31148,6 +33330,9 @@ catalog: value: CA-07(06) class: sp800-53a prose: '{{ insert: param, ca-07.06_odp }} are used to ensure the accuracy, currency, and availability of monitoring results for the system.' + links: + - href: '#ca-7.6_smt' + rel: assessment-for - id: ca-7.6_asm-examine name: assessment-method props: @@ -31279,6 +33464,9 @@ catalog: value: CA-08 class: sp800-53a prose: 'penetration testing is conducted {{ insert: param, ca-08_odp.01 }} on {{ insert: param, ca-08_odp.02 }}.' + links: + - href: '#ca-8_smt' + rel: assessment-for - id: ca-8_asm-examine name: assessment-method props: @@ -31374,6 +33562,9 @@ catalog: value: CA-08(01) class: sp800-53a prose: an independent penetration testing agent or team is employed to perform penetration testing on the system or system components. + links: + - href: '#ca-8.1_smt' + rel: assessment-for - id: ca-8.1_asm-examine name: assessment-method props: @@ -31463,6 +33654,9 @@ catalog: value: CA-08(02) class: sp800-53a prose: '{{ insert: param, ca-08.02_odp }} are employed to simulate attempts by adversaries to compromise organizational systems in accordance with applicable rules of engagement.' + links: + - href: '#ca-8.2_smt' + rel: assessment-for - id: ca-8.2_asm-examine name: assessment-method props: @@ -31588,6 +33782,9 @@ catalog: value: CA-08(03) class: sp800-53a prose: 'the penetration testing process includes {{ insert: param, ca-08.03_odp.01 }} {{ insert: param, ca-08.03_odp.02 }} attempts to bypass or circumvent controls associated with physical access points to facility.' + links: + - href: '#ca-8.3_smt' + rel: assessment-for - id: ca-8.3_asm-examine name: assessment-method props: @@ -31769,6 +33966,9 @@ catalog: value: CA-09a. class: sp800-53a prose: 'internal connections of {{ insert: param, ca-09_odp.01 }} to the system are authorized;' + links: + - href: '#ca-9_smt.a' + rel: assessment-for - id: ca-9_obj.b name: assessment-objective props: @@ -31783,6 +33983,9 @@ catalog: value: CA-09b.[01] class: sp800-53a prose: for each internal connection, the interface characteristics are documented; + links: + - href: '#ca-9_smt.b' + rel: assessment-for - id: ca-9_obj.b-2 name: assessment-objective props: @@ -31790,6 +33993,9 @@ catalog: value: CA-09b.[02] class: sp800-53a prose: for each internal connection, the security requirements are documented; + links: + - href: '#ca-9_smt.b' + rel: assessment-for - id: ca-9_obj.b-3 name: assessment-objective props: @@ -31797,6 +34003,9 @@ catalog: value: CA-09b.[03] class: sp800-53a prose: for each internal connection, the privacy requirements are documented; + links: + - href: '#ca-9_smt.b' + rel: assessment-for - id: ca-9_obj.b-4 name: assessment-objective props: @@ -31804,6 +34013,12 @@ catalog: value: CA-09b.[04] class: sp800-53a prose: for each internal connection, the nature of the information communicated is documented; + links: + - href: '#ca-9_smt.b' + rel: assessment-for + links: + - href: '#ca-9_smt.b' + rel: assessment-for - id: ca-9_obj.c name: assessment-objective props: @@ -31811,6 +34026,9 @@ catalog: value: CA-09c. class: sp800-53a prose: 'internal system connections are terminated after {{ insert: param, ca-09_odp.02 }};' + links: + - href: '#ca-9_smt.c' + rel: assessment-for - id: ca-9_obj.d name: assessment-objective props: @@ -31818,6 +34036,12 @@ catalog: value: CA-09d. class: sp800-53a prose: 'the continued need for each internal connection is reviewed {{ insert: param, ca-09_odp.03 }}.' + links: + - href: '#ca-9_smt.d' + rel: assessment-for + links: + - href: '#ca-9_smt' + rel: assessment-for - id: ca-9_asm-examine name: assessment-method props: @@ -31927,6 +34151,9 @@ catalog: value: CA-09(01)[01] class: sp800-53a prose: security compliance checks are performed on constituent system components prior to the establishment of the internal connection; + links: + - href: '#ca-9.1_smt' + rel: assessment-for - id: ca-9.1_obj-2 name: assessment-objective props: @@ -31934,6 +34161,12 @@ catalog: value: CA-09(01)[02] class: sp800-53a prose: privacy compliance checks are performed on constituent system components prior to the establishment of the internal connection. + links: + - href: '#ca-9.1_smt' + rel: assessment-for + links: + - href: '#ca-9.1_smt' + rel: assessment-for - id: ca-9.1_asm-examine name: assessment-method props: @@ -32210,6 +34443,9 @@ catalog: value: CM-01a.[01] class: sp800-53a prose: a configuration management policy is developed and documented; + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.a-2 name: assessment-objective props: @@ -32217,6 +34453,9 @@ catalog: value: CM-01a.[02] class: sp800-53a prose: 'the configuration management policy is disseminated to {{ insert: param, cm-01_odp.01 }};' + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.a-3 name: assessment-objective props: @@ -32224,6 +34463,9 @@ catalog: value: CM-01a.[03] class: sp800-53a prose: configuration management procedures to facilitate the implementation of the configuration management policy and associated configuration management controls are developed and documented; + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.a-4 name: assessment-objective props: @@ -32231,6 +34473,9 @@ catalog: value: CM-01a.[04] class: sp800-53a prose: 'the configuration management procedures are disseminated to {{ insert: param, cm-01_odp.02 }};' + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.a.1 name: assessment-objective props: @@ -32252,6 +34497,9 @@ catalog: value: CM-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses purpose;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-2 name: assessment-objective props: @@ -32259,6 +34507,9 @@ catalog: value: CM-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses scope;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-3 name: assessment-objective props: @@ -32266,6 +34517,9 @@ catalog: value: CM-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses roles;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-4 name: assessment-objective props: @@ -32273,6 +34527,9 @@ catalog: value: CM-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses responsibilities;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-5 name: assessment-objective props: @@ -32280,6 +34537,9 @@ catalog: value: CM-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses management commitment;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-6 name: assessment-objective props: @@ -32287,6 +34547,9 @@ catalog: value: CM-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses coordination among organizational entities;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.a-7 name: assessment-objective props: @@ -32294,6 +34557,12 @@ catalog: value: CM-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.03 }} of the configuration management policy addresses compliance;' + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#cm-1_smt.a.1.a' + rel: assessment-for - id: cm-1_obj.a.1.b name: assessment-objective props: @@ -32301,6 +34570,15 @@ catalog: value: CM-01a.01(b) class: sp800-53a prose: the configuration management policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines; + links: + - href: '#cm-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#cm-1_smt.a.1' + rel: assessment-for + links: + - href: '#cm-1_smt.a' + rel: assessment-for - id: cm-1_obj.b name: assessment-objective props: @@ -32308,6 +34586,9 @@ catalog: value: CM-01b. class: sp800-53a prose: 'the {{ insert: param, cm-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the configuration management policy and procedures;' + links: + - href: '#cm-1_smt.b' + rel: assessment-for - id: cm-1_obj.c name: assessment-objective props: @@ -32329,6 +34610,9 @@ catalog: value: CM-01c.01[01] class: sp800-53a prose: 'the current configuration management policy is reviewed and updated {{ insert: param, cm-01_odp.05 }}; ' + links: + - href: '#cm-1_smt.c.1' + rel: assessment-for - id: cm-1_obj.c.1-2 name: assessment-objective props: @@ -32336,6 +34620,12 @@ catalog: value: CM-01c.01[02] class: sp800-53a prose: 'the current configuration management policy is reviewed and updated following {{ insert: param, cm-01_odp.06 }};' + links: + - href: '#cm-1_smt.c.1' + rel: assessment-for + links: + - href: '#cm-1_smt.c.1' + rel: assessment-for - id: cm-1_obj.c.2 name: assessment-objective props: @@ -32350,6 +34640,9 @@ catalog: value: CM-01c.02[01] class: sp800-53a prose: 'the current configuration management procedures are reviewed and updated {{ insert: param, cm-01_odp.07 }}; ' + links: + - href: '#cm-1_smt.c.2' + rel: assessment-for - id: cm-1_obj.c.2-2 name: assessment-objective props: @@ -32357,6 +34650,18 @@ catalog: value: CM-01c.02[02] class: sp800-53a prose: 'the current configuration management procedures are reviewed and updated following {{ insert: param, cm-01_odp.08 }}.' + links: + - href: '#cm-1_smt.c.2' + rel: assessment-for + links: + - href: '#cm-1_smt.c.2' + rel: assessment-for + links: + - href: '#cm-1_smt.c' + rel: assessment-for + links: + - href: '#cm-1_smt' + rel: assessment-for - id: cm-1_asm-examine name: assessment-method props: @@ -32539,6 +34844,9 @@ catalog: value: CM-02a.[01] class: sp800-53a prose: a current baseline configuration of the system is developed and documented; + links: + - href: '#cm-2_smt.a' + rel: assessment-for - id: cm-2_obj.a-2 name: assessment-objective props: @@ -32546,6 +34854,12 @@ catalog: value: CM-02a.[02] class: sp800-53a prose: a current baseline configuration of the system is maintained under configuration control; + links: + - href: '#cm-2_smt.a' + rel: assessment-for + links: + - href: '#cm-2_smt.a' + rel: assessment-for - id: cm-2_obj.b name: assessment-objective props: @@ -32560,6 +34874,9 @@ catalog: value: CM-02b.01 class: sp800-53a prose: 'the baseline configuration of the system is reviewed and updated {{ insert: param, cm-02_odp.01 }};' + links: + - href: '#cm-2_smt.b.1' + rel: assessment-for - id: cm-2_obj.b.2 name: assessment-objective props: @@ -32567,6 +34884,9 @@ catalog: value: CM-02b.02 class: sp800-53a prose: 'the baseline configuration of the system is reviewed and updated when required due to {{ insert: param, cm-02_odp.02 }};' + links: + - href: '#cm-2_smt.b.2' + rel: assessment-for - id: cm-2_obj.b.3 name: assessment-objective props: @@ -32574,6 +34894,15 @@ catalog: value: CM-02b.03 class: sp800-53a prose: the baseline configuration of the system is reviewed and updated when system components are installed or upgraded. + links: + - href: '#cm-2_smt.b.3' + rel: assessment-for + links: + - href: '#cm-2_smt.b' + rel: assessment-for + links: + - href: '#cm-2_smt' + rel: assessment-for - id: cm-2_asm-examine name: assessment-method props: @@ -32716,6 +35045,9 @@ catalog: value: CM-02(02)[01] class: sp800-53a prose: 'the currency of the baseline configuration of the system is maintained using {{ insert: param, cm-02.02_odp }};' + links: + - href: '#cm-2.2_smt' + rel: assessment-for - id: cm-2.2_obj-2 name: assessment-objective props: @@ -32723,6 +35055,9 @@ catalog: value: CM-02(02)[02] class: sp800-53a prose: 'the completeness of the baseline configuration of the system is maintained using {{ insert: param, cm-02.02_odp }};' + links: + - href: '#cm-2.2_smt' + rel: assessment-for - id: cm-2.2_obj-3 name: assessment-objective props: @@ -32730,6 +35065,9 @@ catalog: value: CM-02(02)[03] class: sp800-53a prose: 'the accuracy of the baseline configuration of the system is maintained using {{ insert: param, cm-02.02_odp }};' + links: + - href: '#cm-2.2_smt' + rel: assessment-for - id: cm-2.2_obj-4 name: assessment-objective props: @@ -32737,6 +35075,12 @@ catalog: value: CM-02(02)[04] class: sp800-53a prose: 'the availability of the baseline configuration of the system is maintained using {{ insert: param, cm-02.02_odp }}.' + links: + - href: '#cm-2.2_smt' + rel: assessment-for + links: + - href: '#cm-2.2_smt' + rel: assessment-for - id: cm-2.2_asm-examine name: assessment-method props: @@ -32845,6 +35189,9 @@ catalog: value: CM-02(03) class: sp800-53a prose: '{{ insert: param, cm-02.03_odp }} of previous baseline configuration version(s) of the system is/are retained to support rollback.' + links: + - href: '#cm-2.3_smt' + rel: assessment-for - id: cm-2.3_asm-examine name: assessment-method props: @@ -32980,6 +35327,9 @@ catalog: value: CM-02(06)[01] class: sp800-53a prose: a baseline configuration for system development environments that is managed separately from the operational baseline configuration is maintained; + links: + - href: '#cm-2.6_smt' + rel: assessment-for - id: cm-2.6_obj-2 name: assessment-objective props: @@ -32987,6 +35337,12 @@ catalog: value: CM-02(06)[02] class: sp800-53a prose: a baseline configuration for test environments that is managed separately from the operational baseline configuration is maintained. + links: + - href: '#cm-2.6_smt' + rel: assessment-for + links: + - href: '#cm-2.6_smt' + rel: assessment-for - id: cm-2.6_asm-examine name: assessment-method props: @@ -33134,6 +35490,9 @@ catalog: value: CM-02(07)(a) class: sp800-53a prose: '{{ insert: param, cm-02.07_odp.01 }} with {{ insert: param, cm-02.07_odp.02 }} are issued to individuals traveling to locations that the organization deems to be of significant risk;' + links: + - href: '#cm-2.7_smt.a' + rel: assessment-for - id: cm-2.7_obj.b name: assessment-objective props: @@ -33141,6 +35500,12 @@ catalog: value: CM-02(07)(b) class: sp800-53a prose: '{{ insert: param, cm-02.07_odp.03 }} are applied to the systems or system components when the individuals return from travel.' + links: + - href: '#cm-2.7_smt.b' + rel: assessment-for + links: + - href: '#cm-2.7_smt' + rel: assessment-for - id: cm-2.7_asm-examine name: assessment-method props: @@ -33391,6 +35756,9 @@ catalog: value: CM-03a. class: sp800-53a prose: the types of changes to the system that are configuration-controlled are determined and documented; + links: + - href: '#cm-3_smt.a' + rel: assessment-for - id: cm-3_obj.b name: assessment-objective props: @@ -33405,6 +35773,9 @@ catalog: value: CM-03b.[01] class: sp800-53a prose: proposed configuration-controlled changes to the system are reviewed; + links: + - href: '#cm-3_smt.b' + rel: assessment-for - id: cm-3_obj.b-2 name: assessment-objective props: @@ -33412,6 +35783,12 @@ catalog: value: CM-03b.[02] class: sp800-53a prose: proposed configuration-controlled changes to the system are approved or disapproved with explicit consideration for security and privacy impact analyses; + links: + - href: '#cm-3_smt.b' + rel: assessment-for + links: + - href: '#cm-3_smt.b' + rel: assessment-for - id: cm-3_obj.c name: assessment-objective props: @@ -33419,6 +35796,9 @@ catalog: value: CM-03c. class: sp800-53a prose: configuration change decisions associated with the system are documented; + links: + - href: '#cm-3_smt.c' + rel: assessment-for - id: cm-3_obj.d name: assessment-objective props: @@ -33426,6 +35806,9 @@ catalog: value: CM-03d. class: sp800-53a prose: approved configuration-controlled changes to the system are implemented; + links: + - href: '#cm-3_smt.d' + rel: assessment-for - id: cm-3_obj.e name: assessment-objective props: @@ -33433,6 +35816,9 @@ catalog: value: CM-03e. class: sp800-53a prose: 'records of configuration-controlled changes to the system are retained for {{ insert: param, cm-03_odp.01 }};' + links: + - href: '#cm-3_smt.e' + rel: assessment-for - id: cm-3_obj.f name: assessment-objective props: @@ -33447,6 +35833,9 @@ catalog: value: CM-03f.[01] class: sp800-53a prose: activities associated with configuration-controlled changes to the system are monitored; + links: + - href: '#cm-3_smt.f' + rel: assessment-for - id: cm-3_obj.f-2 name: assessment-objective props: @@ -33454,6 +35843,12 @@ catalog: value: CM-03f.[02] class: sp800-53a prose: activities associated with configuration-controlled changes to the system are reviewed; + links: + - href: '#cm-3_smt.f' + rel: assessment-for + links: + - href: '#cm-3_smt.f' + rel: assessment-for - id: cm-3_obj.g name: assessment-objective props: @@ -33468,6 +35863,9 @@ catalog: value: CM-03g.[01] class: sp800-53a prose: 'configuration change control activities are coordinated and overseen by {{ insert: param, cm-03_odp.02 }};' + links: + - href: '#cm-3_smt.g' + rel: assessment-for - id: cm-3_obj.g-2 name: assessment-objective props: @@ -33475,6 +35873,15 @@ catalog: value: CM-03g.[02] class: sp800-53a prose: 'the configuration control element convenes {{ insert: param, cm-03_odp.03 }}.' + links: + - href: '#cm-3_smt.g' + rel: assessment-for + links: + - href: '#cm-3_smt.g' + rel: assessment-for + links: + - href: '#cm-3_smt' + rel: assessment-for - id: cm-3_asm-examine name: assessment-method props: @@ -33666,6 +36073,9 @@ catalog: value: CM-03(01)(a) class: sp800-53a prose: '{{ insert: param, cm-03.01_odp.01 }} are used to document proposed changes to the system;' + links: + - href: '#cm-3.1_smt.a' + rel: assessment-for - id: cm-3.1_obj.b name: assessment-objective props: @@ -33673,6 +36083,9 @@ catalog: value: CM-03(01)(b) class: sp800-53a prose: '{{ insert: param, cm-03.01_odp.01 }} are used to notify {{ insert: param, cm-03.01_odp.02 }} of proposed changes to the system and request change approval;' + links: + - href: '#cm-3.1_smt.b' + rel: assessment-for - id: cm-3.1_obj.c name: assessment-objective props: @@ -33680,6 +36093,9 @@ catalog: value: CM-03(01)(c) class: sp800-53a prose: '{{ insert: param, cm-03.01_odp.01 }} are used to highlight proposed changes to the system that have not been approved or disapproved within {{ insert: param, cm-03.01_odp.03 }};' + links: + - href: '#cm-3.1_smt.c' + rel: assessment-for - id: cm-3.1_obj.d name: assessment-objective props: @@ -33687,6 +36103,9 @@ catalog: value: CM-03(01)(d) class: sp800-53a prose: '{{ insert: param, cm-03.01_odp.01 }} are used to prohibit changes to the system until designated approvals are received;' + links: + - href: '#cm-3.1_smt.d' + rel: assessment-for - id: cm-3.1_obj.e name: assessment-objective props: @@ -33694,6 +36113,9 @@ catalog: value: CM-03(01)(e) class: sp800-53a prose: '{{ insert: param, cm-03.01_odp.01 }} are used to document all changes to the system;' + links: + - href: '#cm-3.1_smt.e' + rel: assessment-for - id: cm-3.1_obj.f name: assessment-objective props: @@ -33701,6 +36123,12 @@ catalog: value: CM-03(01)(f) class: sp800-53a prose: '{{ insert: param, cm-03.01_odp.01 }} are used to notify {{ insert: param, cm-03.01_odp.04 }} when approved changes to the system are completed.' + links: + - href: '#cm-3.1_smt.f' + rel: assessment-for + links: + - href: '#cm-3.1_smt' + rel: assessment-for - id: cm-3.1_asm-examine name: assessment-method props: @@ -33815,6 +36243,9 @@ catalog: value: CM-03(02)[01] class: sp800-53a prose: changes to the system are tested before finalizing the implementation of the changes; + links: + - href: '#cm-3.2_smt' + rel: assessment-for - id: cm-3.2_obj-2 name: assessment-objective props: @@ -33822,6 +36253,9 @@ catalog: value: CM-03(02)[02] class: sp800-53a prose: changes to the system are validated before finalizing the implementation of the changes; + links: + - href: '#cm-3.2_smt' + rel: assessment-for - id: cm-3.2_obj-3 name: assessment-objective props: @@ -33829,6 +36263,12 @@ catalog: value: CM-03(02)[03] class: sp800-53a prose: changes to the system are documented before finalizing the implementation of the changes. + links: + - href: '#cm-3.2_smt' + rel: assessment-for + links: + - href: '#cm-3.2_smt' + rel: assessment-for - id: cm-3.2_asm-examine name: assessment-method props: @@ -33949,6 +36389,9 @@ catalog: value: CM-03(03)[01] class: sp800-53a prose: 'changes to the current system baseline are implemented using {{ insert: param, cm-03.03_odp }};' + links: + - href: '#cm-3.3_smt' + rel: assessment-for - id: cm-3.3_obj-2 name: assessment-objective props: @@ -33956,6 +36399,12 @@ catalog: value: CM-03(03)[02] class: sp800-53a prose: 'the updated baseline is deployed across the installed base using {{ insert: param, cm-03.03_odp }}.' + links: + - href: '#cm-3.3_smt' + rel: assessment-for + links: + - href: '#cm-3.3_smt' + rel: assessment-for - id: cm-3.3_asm-examine name: assessment-method props: @@ -34099,6 +36548,9 @@ catalog: value: CM-03(04)[01] class: sp800-53a prose: '{{ insert: param, cm-03.04_odp.01 }} are required to be members of the {{ insert: param, cm-03.04_odp.03 }};' + links: + - href: '#cm-3.4_smt' + rel: assessment-for - id: cm-3.4_obj-2 name: assessment-objective props: @@ -34106,6 +36558,12 @@ catalog: value: CM-03(04)[02] class: sp800-53a prose: '{{ insert: param, cm-03.04_odp.02 }} are required to be members of the {{ insert: param, cm-03.04_odp.03 }}.' + links: + - href: '#cm-3.4_smt' + rel: assessment-for + links: + - href: '#cm-3.4_smt' + rel: assessment-for - id: cm-3.4_asm-examine name: assessment-method props: @@ -34200,6 +36658,9 @@ catalog: value: CM-03(05) class: sp800-53a prose: '{{ insert: param, cm-03.05_odp }} are automatically implemented if baseline configurations are changed in an unauthorized manner.' + links: + - href: '#cm-3.5_smt' + rel: assessment-for - id: cm-3.5_asm-examine name: assessment-method props: @@ -34311,6 +36772,9 @@ catalog: value: CM-03(06) class: sp800-53a prose: 'cryptographic mechanisms used to provide {{ insert: param, cm-03.06_odp }} are under configuration management.' + links: + - href: '#cm-3.6_smt' + rel: assessment-for - id: cm-3.6_asm-examine name: assessment-method props: @@ -34432,6 +36896,9 @@ catalog: value: CM-03(07) class: sp800-53a prose: 'changes to the system are reviewed {{ insert: param, cm-03.07_odp.01 }} or when {{ insert: param, cm-03.07_odp.02 }} to determine whether unauthorized changes have occurred.' + links: + - href: '#cm-3.7_smt' + rel: assessment-for - id: cm-3.7_asm-examine name: assessment-method props: @@ -34539,6 +37006,9 @@ catalog: value: CM-03(08) class: sp800-53a prose: 'changes to the configuration of the system are prevented or restricted under {{ insert: param, cm-03.08_odp }}.' + links: + - href: '#cm-3.8_smt' + rel: assessment-for - id: cm-3.8_asm-examine name: assessment-method props: @@ -34635,6 +37105,9 @@ catalog: value: CM-04[01] class: sp800-53a prose: changes to the system are analyzed to determine potential security impacts prior to change implementation; + links: + - href: '#cm-4_smt' + rel: assessment-for - id: cm-4_obj-2 name: assessment-objective props: @@ -34642,6 +37115,12 @@ catalog: value: CM-04[02] class: sp800-53a prose: changes to the system are analyzed to determine potential privacy impacts prior to change implementation. + links: + - href: '#cm-4_smt' + rel: assessment-for + links: + - href: '#cm-4_smt' + rel: assessment-for - id: cm-4_asm-examine name: assessment-method props: @@ -34765,6 +37244,9 @@ catalog: value: CM-04(01)[01] class: sp800-53a prose: changes to the system are analyzed in a separate test environment before implementation in an operational environment; + links: + - href: '#cm-4.1_smt' + rel: assessment-for - id: cm-4.1_obj-2 name: assessment-objective props: @@ -34772,6 +37254,9 @@ catalog: value: CM-04(01)[02] class: sp800-53a prose: changes to the system are analyzed for security impacts due to flaws; + links: + - href: '#cm-4.1_smt' + rel: assessment-for - id: cm-4.1_obj-3 name: assessment-objective props: @@ -34779,6 +37264,9 @@ catalog: value: CM-04(01)[03] class: sp800-53a prose: changes to the system are analyzed for privacy impacts due to flaws; + links: + - href: '#cm-4.1_smt' + rel: assessment-for - id: cm-4.1_obj-4 name: assessment-objective props: @@ -34786,6 +37274,9 @@ catalog: value: CM-04(01)[04] class: sp800-53a prose: changes to the system are analyzed for security impacts due to weaknesses; + links: + - href: '#cm-4.1_smt' + rel: assessment-for - id: cm-4.1_obj-5 name: assessment-objective props: @@ -34793,6 +37284,9 @@ catalog: value: CM-04(01)[05] class: sp800-53a prose: changes to the system are analyzed for privacy impacts due to weaknesses; + links: + - href: '#cm-4.1_smt' + rel: assessment-for - id: cm-4.1_obj-6 name: assessment-objective props: @@ -34800,6 +37294,9 @@ catalog: value: CM-04(01)[06] class: sp800-53a prose: changes to the system are analyzed for security impacts due to incompatibility; + links: + - href: '#cm-4.1_smt' + rel: assessment-for - id: cm-4.1_obj-7 name: assessment-objective props: @@ -34807,6 +37304,9 @@ catalog: value: CM-04(01)[07] class: sp800-53a prose: changes to the system are analyzed for privacy impacts due to incompatibility; + links: + - href: '#cm-4.1_smt' + rel: assessment-for - id: cm-4.1_obj-8 name: assessment-objective props: @@ -34814,6 +37314,9 @@ catalog: value: CM-04(01)[08] class: sp800-53a prose: changes to the system are analyzed for security impacts due to intentional malice; + links: + - href: '#cm-4.1_smt' + rel: assessment-for - id: cm-4.1_obj-9 name: assessment-objective props: @@ -34821,6 +37324,12 @@ catalog: value: CM-04(01)[09] class: sp800-53a prose: changes to the system are analyzed for privacy impacts due to intentional malice. + links: + - href: '#cm-4.1_smt' + rel: assessment-for + links: + - href: '#cm-4.1_smt' + rel: assessment-for - id: cm-4.1_asm-examine name: assessment-method props: @@ -34947,6 +37456,9 @@ catalog: value: CM-04(02)[01] class: sp800-53a prose: the impacted controls are implemented correctly with regard to meeting the security requirements for the system after system changes; + links: + - href: '#cm-4.2_smt' + rel: assessment-for - id: cm-4.2_obj-2 name: assessment-objective props: @@ -34954,6 +37466,9 @@ catalog: value: CM-04(02)[02] class: sp800-53a prose: the impacted controls are implemented correctly with regard to meeting the privacy requirements for the system after system changes; + links: + - href: '#cm-4.2_smt' + rel: assessment-for - id: cm-4.2_obj-3 name: assessment-objective props: @@ -34961,6 +37476,9 @@ catalog: value: CM-04(02)[03] class: sp800-53a prose: the impacted controls are operating as intended with regard to meeting the security requirements for the system after system changes; + links: + - href: '#cm-4.2_smt' + rel: assessment-for - id: cm-4.2_obj-4 name: assessment-objective props: @@ -34968,6 +37486,9 @@ catalog: value: CM-04(02)[04] class: sp800-53a prose: the impacted controls are operating as intended with regard to meeting the privacy requirements for the system after system changes; + links: + - href: '#cm-4.2_smt' + rel: assessment-for - id: cm-4.2_obj-5 name: assessment-objective props: @@ -34975,6 +37496,9 @@ catalog: value: CM-04(02)[05] class: sp800-53a prose: the impacted controls are producing the desired outcome with regard to meeting the security requirements for the system after system changes; + links: + - href: '#cm-4.2_smt' + rel: assessment-for - id: cm-4.2_obj-6 name: assessment-objective props: @@ -34982,6 +37506,12 @@ catalog: value: CM-04(02)[06] class: sp800-53a prose: the impacted controls are producing the desired outcome with regard to meeting the privacy requirements for the system after system changes. + links: + - href: '#cm-4.2_smt' + rel: assessment-for + links: + - href: '#cm-4.2_smt' + rel: assessment-for - id: cm-4.2_asm-examine name: assessment-method props: @@ -35117,6 +37647,9 @@ catalog: value: CM-05[01] class: sp800-53a prose: physical access restrictions associated with changes to the system are defined and documented; + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_obj-2 name: assessment-objective props: @@ -35124,6 +37657,9 @@ catalog: value: CM-05[02] class: sp800-53a prose: physical access restrictions associated with changes to the system are approved; + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_obj-3 name: assessment-objective props: @@ -35131,6 +37667,9 @@ catalog: value: CM-05[03] class: sp800-53a prose: physical access restrictions associated with changes to the system are enforced; + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_obj-4 name: assessment-objective props: @@ -35138,6 +37677,9 @@ catalog: value: CM-05[04] class: sp800-53a prose: logical access restrictions associated with changes to the system are defined and documented; + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_obj-5 name: assessment-objective props: @@ -35145,6 +37687,9 @@ catalog: value: CM-05[05] class: sp800-53a prose: logical access restrictions associated with changes to the system are approved; + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_obj-6 name: assessment-objective props: @@ -35152,6 +37697,12 @@ catalog: value: CM-05[06] class: sp800-53a prose: logical access restrictions associated with changes to the system are enforced. + links: + - href: '#cm-5_smt' + rel: assessment-for + links: + - href: '#cm-5_smt' + rel: assessment-for - id: cm-5_asm-examine name: assessment-method props: @@ -35299,6 +37850,9 @@ catalog: value: CM-05(01)(a) class: sp800-53a prose: 'access restrictions for change are enforced using {{ insert: param, cm-05.01_odp }};' + links: + - href: '#cm-5.1_smt.a' + rel: assessment-for - id: cm-5.1_obj.b name: assessment-objective props: @@ -35306,6 +37860,12 @@ catalog: value: CM-05(01)(b) class: sp800-53a prose: audit records of enforcement actions are automatically generated. + links: + - href: '#cm-5.1_smt.b' + rel: assessment-for + links: + - href: '#cm-5.1_smt' + rel: assessment-for - id: cm-5.1_asm-examine name: assessment-method props: @@ -35476,6 +38036,9 @@ catalog: value: CM-05(04)[01] class: sp800-53a prose: 'dual authorization for implementing changes to {{ insert: param, cm-05.04_odp.01 }} is enforced;' + links: + - href: '#cm-5.4_smt' + rel: assessment-for - id: cm-5.4_obj-2 name: assessment-objective props: @@ -35483,6 +38046,12 @@ catalog: value: CM-05(04)[02] class: sp800-53a prose: 'dual authorization for implementing changes to {{ insert: param, cm-05.04_odp.02 }} is enforced.' + links: + - href: '#cm-5.4_smt' + rel: assessment-for + links: + - href: '#cm-5.4_smt' + rel: assessment-for - id: cm-5.4_asm-examine name: assessment-method props: @@ -35635,6 +38204,9 @@ catalog: value: CM-05(05)(a)[01] class: sp800-53a prose: privileges to change system components within a production or operational environment are limited; + links: + - href: '#cm-5.5_smt.a' + rel: assessment-for - id: cm-5.5_obj.a-2 name: assessment-objective props: @@ -35642,6 +38214,12 @@ catalog: value: CM-05(05)(a)[02] class: sp800-53a prose: privileges to change system-related information within a production or operational environment are limited; + links: + - href: '#cm-5.5_smt.a' + rel: assessment-for + links: + - href: '#cm-5.5_smt.a' + rel: assessment-for - id: cm-5.5_obj.b name: assessment-objective props: @@ -35656,6 +38234,9 @@ catalog: value: CM-05(05)(b)[01] class: sp800-53a prose: 'privileges are reviewed {{ insert: param, cm-05.05_odp.01 }};' + links: + - href: '#cm-5.5_smt.b' + rel: assessment-for - id: cm-5.5_obj.b-2 name: assessment-objective props: @@ -35663,6 +38244,15 @@ catalog: value: CM-05(05)(b)[02] class: sp800-53a prose: 'privileges are reevaluated {{ insert: param, cm-05.05_odp.02 }}.' + links: + - href: '#cm-5.5_smt.b' + rel: assessment-for + links: + - href: '#cm-5.5_smt.b' + rel: assessment-for + links: + - href: '#cm-5.5_smt' + rel: assessment-for - id: cm-5.5_asm-examine name: assessment-method props: @@ -35766,6 +38356,9 @@ catalog: value: CM-05(06) class: sp800-53a prose: privileges to change software resident within software libraries are limited. + links: + - href: '#cm-5.6_smt' + rel: assessment-for - id: cm-5.6_asm-examine name: assessment-method props: @@ -36012,6 +38605,9 @@ catalog: value: CM-06a. class: sp800-53a prose: 'configuration settings that reflect the most restrictive mode consistent with operational requirements are established and documented for components employed within the system using {{ insert: param, cm-06_odp.01 }};' + links: + - href: '#cm-6_smt.a' + rel: assessment-for - id: cm-6_obj.b name: assessment-objective props: @@ -36019,6 +38615,9 @@ catalog: value: CM-06b. class: sp800-53a prose: the configuration settings documented in CM-06a are implemented; + links: + - href: '#cm-6_smt.b' + rel: assessment-for - id: cm-6_obj.c name: assessment-objective props: @@ -36033,6 +38632,9 @@ catalog: value: CM-06c.[01] class: sp800-53a prose: 'any deviations from established configuration settings for {{ insert: param, cm-06_odp.02 }} are identified and documented based on {{ insert: param, cm-06_odp.03 }};' + links: + - href: '#cm-6_smt.c' + rel: assessment-for - id: cm-6_obj.c-2 name: assessment-objective props: @@ -36040,6 +38642,12 @@ catalog: value: CM-06c.[02] class: sp800-53a prose: 'any deviations from established configuration settings for {{ insert: param, cm-06_odp.02 }} are approved;' + links: + - href: '#cm-6_smt.c' + rel: assessment-for + links: + - href: '#cm-6_smt.c' + rel: assessment-for - id: cm-6_obj.d name: assessment-objective props: @@ -36054,6 +38662,9 @@ catalog: value: CM-06d.[01] class: sp800-53a prose: changes to the configuration settings are monitored in accordance with organizational policies and procedures; + links: + - href: '#cm-6_smt.d' + rel: assessment-for - id: cm-6_obj.d-2 name: assessment-objective props: @@ -36061,6 +38672,15 @@ catalog: value: CM-06d.[02] class: sp800-53a prose: changes to the configuration settings are controlled in accordance with organizational policies and procedures. + links: + - href: '#cm-6_smt.d' + rel: assessment-for + links: + - href: '#cm-6_smt.d' + rel: assessment-for + links: + - href: '#cm-6_smt' + rel: assessment-for - id: cm-6_asm-examine name: assessment-method props: @@ -36224,6 +38844,9 @@ catalog: value: CM-06(01)[01] class: sp800-53a prose: 'configuration settings for {{ insert: param, cm-06.01_odp.01 }} are managed using {{ insert: param, cm-06.01_odp.02 }};' + links: + - href: '#cm-6.1_smt' + rel: assessment-for - id: cm-6.1_obj-2 name: assessment-objective props: @@ -36231,6 +38854,9 @@ catalog: value: CM-06(01)[02] class: sp800-53a prose: 'configuration settings for {{ insert: param, cm-06.01_odp.01 }} are applied using {{ insert: param, cm-06.01_odp.03 }};' + links: + - href: '#cm-6.1_smt' + rel: assessment-for - id: cm-6.1_obj-3 name: assessment-objective props: @@ -36238,6 +38864,12 @@ catalog: value: CM-06(01)[03] class: sp800-53a prose: 'configuration settings for {{ insert: param, cm-06.01_odp.01 }} are verified using {{ insert: param, cm-06.01_odp.04 }}.' + links: + - href: '#cm-6.1_smt' + rel: assessment-for + links: + - href: '#cm-6.1_smt' + rel: assessment-for - id: cm-6.1_asm-examine name: assessment-method props: @@ -36365,6 +38997,9 @@ catalog: value: CM-06(02) class: sp800-53a prose: '{{ insert: param, cm-06.02_odp.01 }} are taken in response to unauthorized changes to {{ insert: param, cm-06.02_odp.02 }}.' + links: + - href: '#cm-6.2_smt' + rel: assessment-for - id: cm-6.2_asm-examine name: assessment-method props: @@ -36633,6 +39268,9 @@ catalog: value: CM-07a. class: sp800-53a prose: 'the system is configured to provide only {{ insert: param, cm-07_odp.01 }};' + links: + - href: '#cm-7_smt.a' + rel: assessment-for - id: cm-7_obj.b name: assessment-objective props: @@ -36647,6 +39285,9 @@ catalog: value: CM-07b.[01] class: sp800-53a prose: 'the use of {{ insert: param, cm-07_odp.02 }} is prohibited or restricted;' + links: + - href: '#cm-7_smt.b' + rel: assessment-for - id: cm-7_obj.b-2 name: assessment-objective props: @@ -36654,6 +39295,9 @@ catalog: value: CM-07b.[02] class: sp800-53a prose: 'the use of {{ insert: param, cm-07_odp.03 }} is prohibited or restricted;' + links: + - href: '#cm-7_smt.b' + rel: assessment-for - id: cm-7_obj.b-3 name: assessment-objective props: @@ -36661,6 +39305,9 @@ catalog: value: CM-07b.[03] class: sp800-53a prose: 'the use of {{ insert: param, cm-07_odp.04 }} is prohibited or restricted;' + links: + - href: '#cm-7_smt.b' + rel: assessment-for - id: cm-7_obj.b-4 name: assessment-objective props: @@ -36668,6 +39315,9 @@ catalog: value: CM-07b.[04] class: sp800-53a prose: 'the use of {{ insert: param, cm-07_odp.05 }} is prohibited or restricted;' + links: + - href: '#cm-7_smt.b' + rel: assessment-for - id: cm-7_obj.b-5 name: assessment-objective props: @@ -36675,6 +39325,15 @@ catalog: value: CM-07b.[05] class: sp800-53a prose: 'the use of {{ insert: param, cm-07_odp.06 }} is prohibited or restricted.' + links: + - href: '#cm-7_smt.b' + rel: assessment-for + links: + - href: '#cm-7_smt.b' + rel: assessment-for + links: + - href: '#cm-7_smt' + rel: assessment-for - id: cm-7_asm-examine name: assessment-method props: @@ -36863,6 +39522,9 @@ catalog: value: CM-07(01)(a) class: sp800-53a prose: 'the system is reviewed {{ insert: param, cm-07.01_odp.01 }} to identify unnecessary and/or non-secure functions, ports, protocols, software, and services:' + links: + - href: '#cm-7.1_smt.a' + rel: assessment-for - id: cm-7.1_obj.b name: assessment-objective props: @@ -36877,6 +39539,9 @@ catalog: value: CM-07(01)(b)[01] class: sp800-53a prose: '{{ insert: param, cm-07.01_odp.02 }} deemed to be unnecessary and/or non-secure are disabled or removed;' + links: + - href: '#cm-7.1_smt.b' + rel: assessment-for - id: cm-7.1_obj.b-2 name: assessment-objective props: @@ -36884,6 +39549,9 @@ catalog: value: CM-07(01)(b)[02] class: sp800-53a prose: '{{ insert: param, cm-07.01_odp.03 }} deemed to be unnecessary and/or non-secure are disabled or removed;' + links: + - href: '#cm-7.1_smt.b' + rel: assessment-for - id: cm-7.1_obj.b-3 name: assessment-objective props: @@ -36891,6 +39559,9 @@ catalog: value: CM-07(01)(b)[03] class: sp800-53a prose: '{{ insert: param, cm-07.01_odp.04 }} deemed to be unnecessary and/or non-secure are disabled or removed;' + links: + - href: '#cm-7.1_smt.b' + rel: assessment-for - id: cm-7.1_obj.b-4 name: assessment-objective props: @@ -36898,6 +39569,9 @@ catalog: value: CM-07(01)(b)[04] class: sp800-53a prose: '{{ insert: param, cm-07.01_odp.05 }} deemed to be unnecessary and/or non-secure is disabled or removed;' + links: + - href: '#cm-7.1_smt.b' + rel: assessment-for - id: cm-7.1_obj.b-5 name: assessment-objective props: @@ -36905,6 +39579,15 @@ catalog: value: CM-07(01)(b)[05] class: sp800-53a prose: '{{ insert: param, cm-07.01_odp.06 }} deemed to be unnecessary and/or non-secure are disabled or removed.' + links: + - href: '#cm-7.1_smt.b' + rel: assessment-for + links: + - href: '#cm-7.1_smt.b' + rel: assessment-for + links: + - href: '#cm-7.1_smt' + rel: assessment-for - id: cm-7.1_asm-examine name: assessment-method props: @@ -37036,6 +39719,9 @@ catalog: value: CM-07(02) class: sp800-53a prose: 'program execution is prevented in accordance with {{ insert: param, cm-07.02_odp.01 }}.' + links: + - href: '#cm-7.2_smt' + rel: assessment-for - id: cm-7.2_asm-examine name: assessment-method props: @@ -37152,6 +39838,9 @@ catalog: value: CM-07(03) class: sp800-53a prose: '{{ insert: param, cm-07.03_odp }} are complied with.' + links: + - href: '#cm-7.3_smt' + rel: assessment-for - id: cm-7.3_asm-examine name: assessment-method props: @@ -37306,6 +39995,9 @@ catalog: value: CM-07(04)(a) class: sp800-53a prose: '{{ insert: param, cm-07.04_odp.01 }} are identified;' + links: + - href: '#cm-7.4_smt.a' + rel: assessment-for - id: cm-7.4_obj.b name: assessment-objective props: @@ -37313,6 +40005,9 @@ catalog: value: CM-07(04)(b) class: sp800-53a prose: an allow-all, deny-by-exception policy is employed to prohibit the execution of unauthorized software programs on the system; + links: + - href: '#cm-7.4_smt.b' + rel: assessment-for - id: cm-7.4_obj.c name: assessment-objective props: @@ -37320,6 +40015,12 @@ catalog: value: CM-07(04)(c) class: sp800-53a prose: 'the list of unauthorized software programs is reviewed and updated {{ insert: param, cm-07.04_odp.02 }}.' + links: + - href: '#cm-7.4_smt.c' + rel: assessment-for + links: + - href: '#cm-7.4_smt' + rel: assessment-for - id: cm-7.4_asm-examine name: assessment-method props: @@ -37492,6 +40193,9 @@ catalog: value: CM-07(05)(a) class: sp800-53a prose: '{{ insert: param, cm-07.05_odp.01 }} are identified;' + links: + - href: '#cm-7.5_smt.a' + rel: assessment-for - id: cm-7.5_obj.b name: assessment-objective props: @@ -37499,6 +40203,9 @@ catalog: value: CM-07(05)(b) class: sp800-53a prose: a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the system is employed; + links: + - href: '#cm-7.5_smt.b' + rel: assessment-for - id: cm-7.5_obj.c name: assessment-objective props: @@ -37506,6 +40213,12 @@ catalog: value: CM-07(05)(c) class: sp800-53a prose: 'the list of authorized software programs is reviewed and updated {{ insert: param, cm-07.05_odp.02 }}.' + links: + - href: '#cm-7.5_smt.c' + rel: assessment-for + links: + - href: '#cm-7.5_smt' + rel: assessment-for - id: cm-7.5_asm-examine name: assessment-method props: @@ -37626,6 +40339,9 @@ catalog: value: CM-07(06) class: sp800-53a prose: '{{ insert: param, cm-07.06_odp }} is required to be executed in a confined physical or virtual machine environment with limited privileges.' + links: + - href: '#cm-7.6_smt' + rel: assessment-for - id: cm-7.6_asm-examine name: assessment-method props: @@ -37766,6 +40482,9 @@ catalog: value: CM-07(07)(a) class: sp800-53a prose: 'the execution of binary or machine-executable code obtained from sources with limited or no warranty is only allowed with the explicit approval of {{ insert: param, cm-07.07_odp }};' + links: + - href: '#cm-7.7_smt.a' + rel: assessment-for - id: cm-7.7_obj.b name: assessment-objective props: @@ -37773,6 +40492,12 @@ catalog: value: CM-07(07)(b) class: sp800-53a prose: 'the execution of binary or machine-executable code without the provision of source code is only allowed with the explicit approval of {{ insert: param, cm-07.07_odp }}.' + links: + - href: '#cm-7.7_smt.b' + rel: assessment-for + links: + - href: '#cm-7.7_smt' + rel: assessment-for - id: cm-7.7_asm-examine name: assessment-method props: @@ -37904,6 +40629,9 @@ catalog: value: CM-07(08)(a) class: sp800-53a prose: the use of binary or machine-executable code is prohibited when it originates from sources with limited or no warranty or without the provision of source code; + links: + - href: '#cm-7.8_smt.a' + rel: assessment-for - id: cm-7.8_obj.b name: assessment-objective props: @@ -37918,6 +40646,9 @@ catalog: value: CM-07(08)(b)[01] class: sp800-53a prose: exceptions to the prohibition of binary or machine-executable code from sources with limited or no warranty or without the provision of source code are allowed only for compelling mission or operational requirements; + links: + - href: '#cm-7.8_smt.b' + rel: assessment-for - id: cm-7.8_obj.b-2 name: assessment-objective props: @@ -37925,6 +40656,15 @@ catalog: value: CM-07(08)(b)[02] class: sp800-53a prose: exceptions to the prohibition of binary or machine-executable code from sources with limited or no warranty or without the provision of source code are allowed only with the approval of the authorizing official. + links: + - href: '#cm-7.8_smt.b' + rel: assessment-for + links: + - href: '#cm-7.8_smt.b' + rel: assessment-for + links: + - href: '#cm-7.8_smt' + rel: assessment-for - id: cm-7.8_asm-examine name: assessment-method props: @@ -38082,6 +40822,9 @@ catalog: value: CM-07(09)(a) class: sp800-53a prose: '{{ insert: param, cm-07.09_odp.01 }} are identified;' + links: + - href: '#cm-7.9_smt.a' + rel: assessment-for - id: cm-7.9_obj.b name: assessment-objective props: @@ -38089,6 +40832,9 @@ catalog: value: CM-07(09)(b) class: sp800-53a prose: the use or connection of unauthorized hardware components is prohibited; + links: + - href: '#cm-7.9_smt.b' + rel: assessment-for - id: cm-7.9_obj.c name: assessment-objective props: @@ -38096,6 +40842,12 @@ catalog: value: CM-07(09)(c) class: sp800-53a prose: 'the list of authorized hardware components is reviewed and updated {{ insert: param, cm-07.09_odp.02 }}.' + links: + - href: '#cm-7.9_smt.c' + rel: assessment-for + links: + - href: '#cm-7.9_smt' + rel: assessment-for - id: cm-7.9_asm-examine name: assessment-method props: @@ -38321,6 +41073,9 @@ catalog: value: CM-08a.01 class: sp800-53a prose: an inventory of system components that accurately reflects the system is developed and documented; + links: + - href: '#cm-8_smt.a.1' + rel: assessment-for - id: cm-8_obj.a.2 name: assessment-objective props: @@ -38328,6 +41083,9 @@ catalog: value: CM-08a.02 class: sp800-53a prose: an inventory of system components that includes all components within the system is developed and documented; + links: + - href: '#cm-8_smt.a.2' + rel: assessment-for - id: cm-8_obj.a.3 name: assessment-objective props: @@ -38335,6 +41093,9 @@ catalog: value: CM-08a.03 class: sp800-53a prose: an inventory of system components that does not include duplicate accounting of components or components assigned to any other system is developed and documented; + links: + - href: '#cm-8_smt.a.3' + rel: assessment-for - id: cm-8_obj.a.4 name: assessment-objective props: @@ -38342,6 +41103,9 @@ catalog: value: CM-08a.04 class: sp800-53a prose: an inventory of system components that is at the level of granularity deemed necessary for tracking and reporting is developed and documented; + links: + - href: '#cm-8_smt.a.4' + rel: assessment-for - id: cm-8_obj.a.5 name: assessment-objective props: @@ -38349,6 +41113,12 @@ catalog: value: CM-08a.05 class: sp800-53a prose: 'an inventory of system components that includes {{ insert: param, cm-08_odp.01 }} is developed and documented;' + links: + - href: '#cm-8_smt.a.5' + rel: assessment-for + links: + - href: '#cm-8_smt.a' + rel: assessment-for - id: cm-8_obj.b name: assessment-objective props: @@ -38356,6 +41126,12 @@ catalog: value: CM-08b. class: sp800-53a prose: 'the system component inventory is reviewed and updated {{ insert: param, cm-08_odp.02 }}.' + links: + - href: '#cm-8_smt.b' + rel: assessment-for + links: + - href: '#cm-8_smt' + rel: assessment-for - id: cm-8_asm-examine name: assessment-method props: @@ -38461,6 +41237,9 @@ catalog: value: CM-08(01)[01] class: sp800-53a prose: the inventory of system components is updated as part of component installations; + links: + - href: '#cm-8.1_smt' + rel: assessment-for - id: cm-8.1_obj-2 name: assessment-objective props: @@ -38468,6 +41247,9 @@ catalog: value: CM-08(01)[02] class: sp800-53a prose: the inventory of system components is updated as part of component removals; + links: + - href: '#cm-8.1_smt' + rel: assessment-for - id: cm-8.1_obj-3 name: assessment-objective props: @@ -38475,6 +41257,12 @@ catalog: value: CM-08(01)[03] class: sp800-53a prose: the inventory of system components is updated as part of system updates. + links: + - href: '#cm-8.1_smt' + rel: assessment-for + links: + - href: '#cm-8.1_smt' + rel: assessment-for - id: cm-8.1_asm-examine name: assessment-method props: @@ -38629,6 +41417,9 @@ catalog: value: CM-08(02)[01] class: sp800-53a prose: '{{ insert: param, cm-08.02_odp.01 }} are used to maintain the currency of the system component inventory;' + links: + - href: '#cm-8.2_smt' + rel: assessment-for - id: cm-8.2_obj-2 name: assessment-objective props: @@ -38636,6 +41427,9 @@ catalog: value: CM-08(02)[02] class: sp800-53a prose: '{{ insert: param, cm-08.02_odp.02 }} are used to maintain the completeness of the system component inventory;' + links: + - href: '#cm-8.2_smt' + rel: assessment-for - id: cm-8.2_obj-3 name: assessment-objective props: @@ -38643,6 +41437,9 @@ catalog: value: CM-08(02)[03] class: sp800-53a prose: '{{ insert: param, cm-08.02_odp.03 }} are used to maintain the accuracy of the system component inventory;' + links: + - href: '#cm-8.2_smt' + rel: assessment-for - id: cm-8.2_obj-4 name: assessment-objective props: @@ -38650,6 +41447,12 @@ catalog: value: CM-08(02)[04] class: sp800-53a prose: '{{ insert: param, cm-08.02_odp.04 }} are used to maintain the availability of the system component inventory.' + links: + - href: '#cm-8.2_smt' + rel: assessment-for + links: + - href: '#cm-8.2_smt' + rel: assessment-for - id: cm-8.2_asm-examine name: assessment-method props: @@ -38865,6 +41668,9 @@ catalog: value: CM-08(03)(a)[01] class: sp800-53a prose: 'the presence of unauthorized hardware within the system is detected using {{ insert: param, cm-08.03_odp.01 }} {{ insert: param, cm-08.03_odp.04 }};' + links: + - href: '#cm-8.3_smt.a' + rel: assessment-for - id: cm-8.3_obj.a-2 name: assessment-objective props: @@ -38872,6 +41678,9 @@ catalog: value: CM-08(03)(a)[02] class: sp800-53a prose: 'the presence of unauthorized software within the system is detected using {{ insert: param, cm-08.03_odp.02 }} {{ insert: param, cm-08.03_odp.04 }};' + links: + - href: '#cm-8.3_smt.a' + rel: assessment-for - id: cm-8.3_obj.a-3 name: assessment-objective props: @@ -38879,6 +41688,12 @@ catalog: value: CM-08(03)(a)[03] class: sp800-53a prose: 'the presence of unauthorized firmware within the system is detected using {{ insert: param, cm-08.03_odp.03 }} {{ insert: param, cm-08.03_odp.04 }};' + links: + - href: '#cm-8.3_smt.a' + rel: assessment-for + links: + - href: '#cm-8.3_smt.a' + rel: assessment-for - id: cm-8.3_obj.b name: assessment-objective props: @@ -38893,6 +41708,9 @@ catalog: value: CM-08(03)(b)[01] class: sp800-53a prose: '{{ insert: param, cm-08.03_odp.05 }} are taken when unauthorized hardware is detected;' + links: + - href: '#cm-8.3_smt.b' + rel: assessment-for - id: cm-8.3_obj.b-2 name: assessment-objective props: @@ -38900,6 +41718,9 @@ catalog: value: CM-08(03)(b)[02] class: sp800-53a prose: '{{ insert: param, cm-08.03_odp.05 }} are taken when unauthorized software is detected;' + links: + - href: '#cm-8.3_smt.b' + rel: assessment-for - id: cm-8.3_obj.b-3 name: assessment-objective props: @@ -38907,6 +41728,15 @@ catalog: value: CM-08(03)(b)[03] class: sp800-53a prose: '{{ insert: param, cm-08.03_odp.05 }} are taken when unauthorized firmware is detected.' + links: + - href: '#cm-8.3_smt.b' + rel: assessment-for + links: + - href: '#cm-8.3_smt.b' + rel: assessment-for + links: + - href: '#cm-8.3_smt' + rel: assessment-for - id: cm-8.3_asm-examine name: assessment-method props: @@ -39034,6 +41864,9 @@ catalog: value: CM-08(04) class: sp800-53a prose: 'individuals responsible and accountable for administering system components are identified by {{ insert: param, cm-08.04_odp }} in the system component inventory.' + links: + - href: '#cm-8.4_smt' + rel: assessment-for - id: cm-8.4_asm-examine name: assessment-method props: @@ -39148,6 +41981,9 @@ catalog: value: CM-08(06)[01] class: sp800-53a prose: assessed component configurations are included in the system component inventory; + links: + - href: '#cm-8.6_smt' + rel: assessment-for - id: cm-8.6_obj-2 name: assessment-objective props: @@ -39155,6 +41991,12 @@ catalog: value: CM-08(06)[02] class: sp800-53a prose: any approved deviations to current deployed configurations are included in the system component inventory. + links: + - href: '#cm-8.6_smt' + rel: assessment-for + links: + - href: '#cm-8.6_smt' + rel: assessment-for - id: cm-8.6_asm-examine name: assessment-method props: @@ -39254,6 +42096,9 @@ catalog: value: CM-08(07) class: sp800-53a prose: a centralized repository for the system component inventory is provided. + links: + - href: '#cm-8.7_smt' + rel: assessment-for - id: cm-8.7_asm-examine name: assessment-method props: @@ -39361,6 +42206,9 @@ catalog: value: CM-08(08) class: sp800-53a prose: '{{ insert: param, cm-08.08_odp }} are used to support the tracking of system components by geographic location.' + links: + - href: '#cm-8.8_smt' + rel: assessment-for - id: cm-8.8_asm-examine name: assessment-method props: @@ -39492,6 +42340,9 @@ catalog: value: CM-08(09)(a) class: sp800-53a prose: system components are assigned to a system; + links: + - href: '#cm-8.9_smt.a' + rel: assessment-for - id: cm-8.9_obj.b name: assessment-objective props: @@ -39499,6 +42350,12 @@ catalog: value: CM-08(09)(b) class: sp800-53a prose: 'an acknowledgement of the component assignment is received from {{ insert: param, cm-08.09_odp }}.' + links: + - href: '#cm-8.9_smt.b' + rel: assessment-for + links: + - href: '#cm-8.9_smt' + rel: assessment-for - id: cm-8.9_asm-examine name: assessment-method props: @@ -39671,6 +42528,9 @@ catalog: value: CM-09[01] class: sp800-53a prose: a configuration management plan for the system is developed and documented; + links: + - href: '#cm-9_smt' + rel: assessment-for - id: cm-9_obj-2 name: assessment-objective props: @@ -39678,6 +42538,9 @@ catalog: value: CM-09[02] class: sp800-53a prose: a configuration management plan for the system is implemented; + links: + - href: '#cm-9_smt' + rel: assessment-for - id: cm-9_obj.a name: assessment-objective props: @@ -39692,6 +42555,9 @@ catalog: value: CM-09a.[01] class: sp800-53a prose: the configuration management plan addresses roles; + links: + - href: '#cm-9_smt.a' + rel: assessment-for - id: cm-9_obj.a-2 name: assessment-objective props: @@ -39699,6 +42565,9 @@ catalog: value: CM-09a.[02] class: sp800-53a prose: the configuration management plan addresses responsibilities; + links: + - href: '#cm-9_smt.a' + rel: assessment-for - id: cm-9_obj.a-3 name: assessment-objective props: @@ -39706,6 +42575,12 @@ catalog: value: CM-09a.[03] class: sp800-53a prose: the configuration management plan addresses configuration management processes and procedures; + links: + - href: '#cm-9_smt.a' + rel: assessment-for + links: + - href: '#cm-9_smt.a' + rel: assessment-for - id: cm-9_obj.b name: assessment-objective props: @@ -39720,6 +42595,9 @@ catalog: value: CM-09b.[01] class: sp800-53a prose: the configuration management plan establishes a process for identifying configuration items throughout the system development life cycle; + links: + - href: '#cm-9_smt.b' + rel: assessment-for - id: cm-9_obj.b-2 name: assessment-objective props: @@ -39727,6 +42605,12 @@ catalog: value: CM-09b.[02] class: sp800-53a prose: the configuration management plan establishes a process for managing the configuration of the configuration items; + links: + - href: '#cm-9_smt.b' + rel: assessment-for + links: + - href: '#cm-9_smt.b' + rel: assessment-for - id: cm-9_obj.c name: assessment-objective props: @@ -39741,6 +42625,9 @@ catalog: value: CM-09c.[01] class: sp800-53a prose: the configuration management plan defines the configuration items for the system; + links: + - href: '#cm-9_smt.c' + rel: assessment-for - id: cm-9_obj.c-2 name: assessment-objective props: @@ -39748,6 +42635,12 @@ catalog: value: CM-09c.[02] class: sp800-53a prose: the configuration management plan places the configuration items under configuration management; + links: + - href: '#cm-9_smt.c' + rel: assessment-for + links: + - href: '#cm-9_smt.c' + rel: assessment-for - id: cm-9_obj.d name: assessment-objective props: @@ -39755,6 +42648,9 @@ catalog: value: CM-09d. class: sp800-53a prose: 'the configuration management plan is reviewed and approved by {{ insert: param, cm-09_odp }};' + links: + - href: '#cm-9_smt.d' + rel: assessment-for - id: cm-9_obj.e name: assessment-objective props: @@ -39769,6 +42665,9 @@ catalog: value: CM-09e.[01] class: sp800-53a prose: the configuration management plan is protected from unauthorized disclosure; + links: + - href: '#cm-9_smt.e' + rel: assessment-for - id: cm-9_obj.e-2 name: assessment-objective props: @@ -39776,6 +42675,15 @@ catalog: value: CM-09e.[02] class: sp800-53a prose: the configuration management plan is protected from unauthorized modification. + links: + - href: '#cm-9_smt.e' + rel: assessment-for + links: + - href: '#cm-9_smt.e' + rel: assessment-for + links: + - href: '#cm-9_smt' + rel: assessment-for - id: cm-9_asm-examine name: assessment-method props: @@ -39877,6 +42785,9 @@ catalog: value: CM-09(01) class: sp800-53a prose: the responsibility for developing the configuration management process is assigned to organizational personnel who are not directly involved in system development. + links: + - href: '#cm-9.1_smt' + rel: assessment-for - id: cm-9.1_asm-examine name: assessment-method props: @@ -39981,6 +42892,9 @@ catalog: value: CM-10a. class: sp800-53a prose: software and associated documentation are used in accordance with contract agreements and copyright laws; + links: + - href: '#cm-10_smt.a' + rel: assessment-for - id: cm-10_obj.b name: assessment-objective props: @@ -39988,6 +42902,9 @@ catalog: value: CM-10b. class: sp800-53a prose: the use of software and associated documentation protected by quantity licenses is tracked to control copying and distribution; + links: + - href: '#cm-10_smt.b' + rel: assessment-for - id: cm-10_obj.c name: assessment-objective props: @@ -39995,6 +42912,12 @@ catalog: value: CM-10c. class: sp800-53a prose: the use of peer-to-peer file sharing technology is controlled and documented to ensure that peer-to-peer file sharing is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work. + links: + - href: '#cm-10_smt.c' + rel: assessment-for + links: + - href: '#cm-10_smt' + rel: assessment-for - id: cm-10_asm-examine name: assessment-method props: @@ -40109,6 +43032,9 @@ catalog: value: CM-10(01) class: sp800-53a prose: '{{ insert: param, cm-10.01_odp }} are established for the use of open-source software.' + links: + - href: '#cm-10.1_smt' + rel: assessment-for - id: cm-10.1_asm-examine name: assessment-method props: @@ -40285,6 +43211,9 @@ catalog: value: CM-11a. class: sp800-53a prose: '{{ insert: param, cm-11_odp.01 }} governing the installation of software by users are established;' + links: + - href: '#cm-11_smt.a' + rel: assessment-for - id: cm-11_obj.b name: assessment-objective props: @@ -40292,6 +43221,9 @@ catalog: value: CM-11b. class: sp800-53a prose: 'software installation policies are enforced through {{ insert: param, cm-11_odp.02 }};' + links: + - href: '#cm-11_smt.b' + rel: assessment-for - id: cm-11_obj.c name: assessment-objective props: @@ -40299,6 +43231,12 @@ catalog: value: CM-11c. class: sp800-53a prose: 'compliance with {{ insert: param, cm-11_odp.01 }} is monitored {{ insert: param, cm-11_odp.03 }}.' + links: + - href: '#cm-11_smt.c' + rel: assessment-for + links: + - href: '#cm-11_smt' + rel: assessment-for - id: cm-11_asm-examine name: assessment-method props: @@ -40424,6 +43362,9 @@ catalog: value: CM-11(02) class: sp800-53a prose: user installation of software is allowed only with explicit privileged status. + links: + - href: '#cm-11.2_smt' + rel: assessment-for - id: cm-11.2_asm-examine name: assessment-method props: @@ -40558,6 +43499,9 @@ catalog: value: CM-11(03)[01] class: sp800-53a prose: 'compliance with software installation policies is enforced using {{ insert: param, cm-11.03_odp.01 }};' + links: + - href: '#cm-11.3_smt' + rel: assessment-for - id: cm-11.3_obj-2 name: assessment-objective props: @@ -40565,6 +43509,12 @@ catalog: value: CM-11(03)[02] class: sp800-53a prose: 'compliance with software installation policies is monitored using {{ insert: param, cm-11.03_odp.02 }}.' + links: + - href: '#cm-11.3_smt' + rel: assessment-for + links: + - href: '#cm-11.3_smt' + rel: assessment-for - id: cm-11.3_asm-examine name: assessment-method props: @@ -40751,6 +43701,9 @@ catalog: value: CM-12a.[01] class: sp800-53a prose: 'the location of {{ insert: param, cm-12_odp }} is identified and documented;' + links: + - href: '#cm-12_smt.a' + rel: assessment-for - id: cm-12_obj.a-2 name: assessment-objective props: @@ -40758,6 +43711,9 @@ catalog: value: CM-12a.[02] class: sp800-53a prose: 'the specific system components on which {{ insert: param, cm-12_odp }} is processed are identified and documented;' + links: + - href: '#cm-12_smt.a' + rel: assessment-for - id: cm-12_obj.a-3 name: assessment-objective props: @@ -40765,6 +43721,12 @@ catalog: value: CM-12a.[03] class: sp800-53a prose: 'the specific system components on which {{ insert: param, cm-12_odp }} is stored are identified and documented;' + links: + - href: '#cm-12_smt.a' + rel: assessment-for + links: + - href: '#cm-12_smt.a' + rel: assessment-for - id: cm-12_obj.b name: assessment-objective props: @@ -40779,6 +43741,9 @@ catalog: value: CM-12b.[01] class: sp800-53a prose: 'the users who have access to the system and system components where {{ insert: param, cm-12_odp }} is processed are identified and documented;' + links: + - href: '#cm-12_smt.b' + rel: assessment-for - id: cm-12_obj.b-2 name: assessment-objective props: @@ -40786,6 +43751,12 @@ catalog: value: CM-12b.[02] class: sp800-53a prose: 'the users who have access to the system and system components where {{ insert: param, cm-12_odp }} is stored are identified and documented;' + links: + - href: '#cm-12_smt.b' + rel: assessment-for + links: + - href: '#cm-12_smt.b' + rel: assessment-for - id: cm-12_obj.c name: assessment-objective props: @@ -40800,6 +43771,9 @@ catalog: value: CM-12c.[01] class: sp800-53a prose: 'changes to the location (i.e., system or system components) where {{ insert: param, cm-12_odp }} is processed are documented;' + links: + - href: '#cm-12_smt.c' + rel: assessment-for - id: cm-12_obj.c-2 name: assessment-objective props: @@ -40807,6 +43781,15 @@ catalog: value: CM-12c.[02] class: sp800-53a prose: 'changes to the location (i.e., system or system components) where {{ insert: param, cm-12_odp }} is stored are documented.' + links: + - href: '#cm-12_smt.c' + rel: assessment-for + links: + - href: '#cm-12_smt.c' + rel: assessment-for + links: + - href: '#cm-12_smt' + rel: assessment-for - id: cm-12_asm-examine name: assessment-method props: @@ -40938,6 +43921,9 @@ catalog: value: CM-12(01) class: sp800-53a prose: 'automated tools are used to identify {{ insert: param, cm-12.01_odp.01 }} on {{ insert: param, cm-12.01_odp.02 }} to ensure that controls are in place to protect organizational information and individual privacy.' + links: + - href: '#cm-12.1_smt' + rel: assessment-for - id: cm-12.1_asm-examine name: assessment-method props: @@ -41054,6 +44040,9 @@ catalog: value: CM-13 class: sp800-53a prose: a map of system data actions is developed and documented. + links: + - href: '#cm-13_smt' + rel: assessment-for - id: cm-13_asm-examine name: assessment-method props: @@ -41203,6 +44192,9 @@ catalog: value: CM-14[01] class: sp800-53a prose: 'the installation of {{ insert: param, cm-14_odp.01 }} is prevented unless it is verified that the software has been digitally signed using a certificate recognized and approved by the organization;' + links: + - href: '#cm-14_smt' + rel: assessment-for - id: cm-14_obj-2 name: assessment-objective props: @@ -41210,6 +44202,12 @@ catalog: value: CM-14[02] class: sp800-53a prose: 'the installation of {{ insert: param, cm-14_odp.02 }} is prevented unless it is verified that the firmware has been digitally signed using a certificate recognized and approved by the organization.' + links: + - href: '#cm-14_smt' + rel: assessment-for + links: + - href: '#cm-14_smt' + rel: assessment-for - id: cm-14_asm-examine name: assessment-method props: @@ -41491,6 +44489,9 @@ catalog: value: CP-01a.[01] class: sp800-53a prose: a contingency planning policy is developed and documented; + links: + - href: '#cp-1_smt.a' + rel: assessment-for - id: cp-1_obj.a-2 name: assessment-objective props: @@ -41498,6 +44499,9 @@ catalog: value: CP-01a.[02] class: sp800-53a prose: 'the contingency planning policy is disseminated to {{ insert: param, cp-01_odp.01 }};' + links: + - href: '#cp-1_smt.a' + rel: assessment-for - id: cp-1_obj.a-3 name: assessment-objective props: @@ -41505,6 +44509,9 @@ catalog: value: CP-01a.[03] class: sp800-53a prose: contingency planning procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls are developed and documented; + links: + - href: '#cp-1_smt.a' + rel: assessment-for - id: cp-1_obj.a-4 name: assessment-objective props: @@ -41512,6 +44519,9 @@ catalog: value: CP-01a.[04] class: sp800-53a prose: 'the contingency planning procedures are disseminated to {{ insert: param, cp-01_odp.02 }};' + links: + - href: '#cp-1_smt.a' + rel: assessment-for - id: cp-1_obj.a.1 name: assessment-objective props: @@ -41533,6 +44543,9 @@ catalog: value: CP-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses purpose;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-2 name: assessment-objective props: @@ -41540,6 +44553,9 @@ catalog: value: CP-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses scope;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-3 name: assessment-objective props: @@ -41547,6 +44563,9 @@ catalog: value: CP-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses roles;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-4 name: assessment-objective props: @@ -41554,6 +44573,9 @@ catalog: value: CP-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses responsibilities;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-5 name: assessment-objective props: @@ -41561,6 +44583,9 @@ catalog: value: CP-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses management commitment;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-6 name: assessment-objective props: @@ -41568,6 +44593,9 @@ catalog: value: CP-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses coordination among organizational entities;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.a-7 name: assessment-objective props: @@ -41575,6 +44603,12 @@ catalog: value: CP-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy addresses compliance;' + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#cp-1_smt.a.1.a' + rel: assessment-for - id: cp-1_obj.a.1.b name: assessment-objective props: @@ -41582,6 +44616,15 @@ catalog: value: CP-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.03 }} contingency planning policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#cp-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#cp-1_smt.a.1' + rel: assessment-for + links: + - href: '#cp-1_smt.a' + rel: assessment-for - id: cp-1_obj.b name: assessment-objective props: @@ -41589,6 +44632,9 @@ catalog: value: CP-01b. class: sp800-53a prose: 'the {{ insert: param, cp-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the contingency planning policy and procedures;' + links: + - href: '#cp-1_smt.b' + rel: assessment-for - id: cp-1_obj.c name: assessment-objective props: @@ -41610,6 +44656,9 @@ catalog: value: CP-01c.01[01] class: sp800-53a prose: 'the current contingency planning policy is reviewed and updated {{ insert: param, cp-01_odp.05 }};' + links: + - href: '#cp-1_smt.c.1' + rel: assessment-for - id: cp-1_obj.c.1-2 name: assessment-objective props: @@ -41617,6 +44666,12 @@ catalog: value: CP-01c.01[02] class: sp800-53a prose: 'the current contingency planning policy is reviewed and updated following {{ insert: param, cp-01_odp.06 }};' + links: + - href: '#cp-1_smt.c.1' + rel: assessment-for + links: + - href: '#cp-1_smt.c.1' + rel: assessment-for - id: cp-1_obj.c.2 name: assessment-objective props: @@ -41631,6 +44686,9 @@ catalog: value: CP-01c.02[01] class: sp800-53a prose: 'the current contingency planning procedures are reviewed and updated {{ insert: param, cp-01_odp.07 }};' + links: + - href: '#cp-1_smt.c.2' + rel: assessment-for - id: cp-1_obj.c.2-2 name: assessment-objective props: @@ -41638,6 +44696,18 @@ catalog: value: CP-01c.02[02] class: sp800-53a prose: 'the current contingency planning procedures are reviewed and updated following {{ insert: param, cp-01_odp.08 }}.' + links: + - href: '#cp-1_smt.c.2' + rel: assessment-for + links: + - href: '#cp-1_smt.c.2' + rel: assessment-for + links: + - href: '#cp-1_smt.c' + rel: assessment-for + links: + - href: '#cp-1_smt' + rel: assessment-for - id: cp-1_asm-examine name: assessment-method props: @@ -41949,6 +45019,9 @@ catalog: value: CP-02a.01 class: sp800-53a prose: a contingency plan for the system is developed that identifies essential mission and business functions and associated contingency requirements; + links: + - href: '#cp-2_smt.a.1' + rel: assessment-for - id: cp-2_obj.a.2 name: assessment-objective props: @@ -41963,6 +45036,9 @@ catalog: value: CP-02a.02[01] class: sp800-53a prose: a contingency plan for the system is developed that provides recovery objectives; + links: + - href: '#cp-2_smt.a.2' + rel: assessment-for - id: cp-2_obj.a.2-2 name: assessment-objective props: @@ -41970,6 +45046,9 @@ catalog: value: CP-02a.02[02] class: sp800-53a prose: a contingency plan for the system is developed that provides restoration priorities; + links: + - href: '#cp-2_smt.a.2' + rel: assessment-for - id: cp-2_obj.a.2-3 name: assessment-objective props: @@ -41977,6 +45056,12 @@ catalog: value: CP-02a.02[03] class: sp800-53a prose: a contingency plan for the system is developed that provides metrics; + links: + - href: '#cp-2_smt.a.2' + rel: assessment-for + links: + - href: '#cp-2_smt.a.2' + rel: assessment-for - id: cp-2_obj.a.3 name: assessment-objective props: @@ -41991,6 +45076,9 @@ catalog: value: CP-02a.03[01] class: sp800-53a prose: a contingency plan for the system is developed that addresses contingency roles; + links: + - href: '#cp-2_smt.a.3' + rel: assessment-for - id: cp-2_obj.a.3-2 name: assessment-objective props: @@ -41998,6 +45086,9 @@ catalog: value: CP-02a.03[02] class: sp800-53a prose: a contingency plan for the system is developed that addresses contingency responsibilities; + links: + - href: '#cp-2_smt.a.3' + rel: assessment-for - id: cp-2_obj.a.3-3 name: assessment-objective props: @@ -42005,6 +45096,12 @@ catalog: value: CP-02a.03[03] class: sp800-53a prose: a contingency plan for the system is developed that addresses assigned individuals with contact information; + links: + - href: '#cp-2_smt.a.3' + rel: assessment-for + links: + - href: '#cp-2_smt.a.3' + rel: assessment-for - id: cp-2_obj.a.4 name: assessment-objective props: @@ -42012,6 +45109,9 @@ catalog: value: CP-02a.04 class: sp800-53a prose: a contingency plan for the system is developed that addresses maintaining essential mission and business functions despite a system disruption, compromise, or failure; + links: + - href: '#cp-2_smt.a.4' + rel: assessment-for - id: cp-2_obj.a.5 name: assessment-objective props: @@ -42019,6 +45119,9 @@ catalog: value: CP-02a.05 class: sp800-53a prose: a contingency plan for the system is developed that addresses eventual, full-system restoration without deterioration of the controls originally planned and implemented; + links: + - href: '#cp-2_smt.a.5' + rel: assessment-for - id: cp-2_obj.a.6 name: assessment-objective props: @@ -42026,6 +45129,9 @@ catalog: value: CP-02a.06 class: sp800-53a prose: a contingency plan for the system is developed that addresses the sharing of contingency information; + links: + - href: '#cp-2_smt.a.6' + rel: assessment-for - id: cp-2_obj.a.7 name: assessment-objective props: @@ -42040,6 +45146,9 @@ catalog: value: CP-02a.07[01] class: sp800-53a prose: 'a contingency plan for the system is developed that is reviewed by {{ insert: param, cp-02_odp.01 }};' + links: + - href: '#cp-2_smt.a.7' + rel: assessment-for - id: cp-2_obj.a.7-2 name: assessment-objective props: @@ -42047,6 +45156,15 @@ catalog: value: CP-02a.07[02] class: sp800-53a prose: 'a contingency plan for the system is developed that is approved by {{ insert: param, cp-02_odp.02 }};' + links: + - href: '#cp-2_smt.a.7' + rel: assessment-for + links: + - href: '#cp-2_smt.a.7' + rel: assessment-for + links: + - href: '#cp-2_smt.a' + rel: assessment-for - id: cp-2_obj.b name: assessment-objective props: @@ -42061,6 +45179,9 @@ catalog: value: CP-02b.[01] class: sp800-53a prose: 'copies of the contingency plan are distributed to {{ insert: param, cp-02_odp.03 }};' + links: + - href: '#cp-2_smt.b' + rel: assessment-for - id: cp-2_obj.b-2 name: assessment-objective props: @@ -42068,6 +45189,12 @@ catalog: value: CP-02b.[02] class: sp800-53a prose: 'copies of the contingency plan are distributed to {{ insert: param, cp-02_odp.04 }};' + links: + - href: '#cp-2_smt.b' + rel: assessment-for + links: + - href: '#cp-2_smt.b' + rel: assessment-for - id: cp-2_obj.c name: assessment-objective props: @@ -42075,6 +45202,9 @@ catalog: value: CP-02c. class: sp800-53a prose: contingency planning activities are coordinated with incident handling activities; + links: + - href: '#cp-2_smt.c' + rel: assessment-for - id: cp-2_obj.d name: assessment-objective props: @@ -42082,6 +45212,9 @@ catalog: value: CP-02d. class: sp800-53a prose: 'the contingency plan for the system is reviewed {{ insert: param, cp-02_odp.05 }};' + links: + - href: '#cp-2_smt.d' + rel: assessment-for - id: cp-2_obj.e name: assessment-objective props: @@ -42096,6 +45229,9 @@ catalog: value: CP-02e.[01] class: sp800-53a prose: the contingency plan is updated to address changes to the organization, system, or environment of operation; + links: + - href: '#cp-2_smt.e' + rel: assessment-for - id: cp-2_obj.e-2 name: assessment-objective props: @@ -42103,6 +45239,12 @@ catalog: value: CP-02e.[02] class: sp800-53a prose: the contingency plan is updated to address problems encountered during contingency plan implementation, execution, or testing; + links: + - href: '#cp-2_smt.e' + rel: assessment-for + links: + - href: '#cp-2_smt.e' + rel: assessment-for - id: cp-2_obj.f name: assessment-objective props: @@ -42117,6 +45259,9 @@ catalog: value: CP-02f.[01] class: sp800-53a prose: 'contingency plan changes are communicated to {{ insert: param, cp-02_odp.06 }};' + links: + - href: '#cp-2_smt.f' + rel: assessment-for - id: cp-2_obj.f-2 name: assessment-objective props: @@ -42124,6 +45269,12 @@ catalog: value: CP-02f.[02] class: sp800-53a prose: 'contingency plan changes are communicated to {{ insert: param, cp-02_odp.07 }};' + links: + - href: '#cp-2_smt.f' + rel: assessment-for + links: + - href: '#cp-2_smt.f' + rel: assessment-for - id: cp-2_obj.g name: assessment-objective props: @@ -42138,6 +45289,9 @@ catalog: value: CP-02g.[01] class: sp800-53a prose: lessons learned from contingency plan testing or actual contingency activities are incorporated into contingency testing; + links: + - href: '#cp-2_smt.g' + rel: assessment-for - id: cp-2_obj.g-2 name: assessment-objective props: @@ -42145,6 +45299,12 @@ catalog: value: CP-02g.[02] class: sp800-53a prose: lessons learned from contingency plan training or actual contingency activities are incorporated into contingency testing and training; + links: + - href: '#cp-2_smt.g' + rel: assessment-for + links: + - href: '#cp-2_smt.g' + rel: assessment-for - id: cp-2_obj.h name: assessment-objective props: @@ -42159,6 +45319,9 @@ catalog: value: CP-02h.[01] class: sp800-53a prose: the contingency plan is protected from unauthorized disclosure; + links: + - href: '#cp-2_smt.h' + rel: assessment-for - id: cp-2_obj.h-2 name: assessment-objective props: @@ -42166,6 +45329,15 @@ catalog: value: CP-02h.[02] class: sp800-53a prose: the contingency plan is protected from unauthorized modification. + links: + - href: '#cp-2_smt.h' + rel: assessment-for + links: + - href: '#cp-2_smt.h' + rel: assessment-for + links: + - href: '#cp-2_smt' + rel: assessment-for - id: cp-2_asm-examine name: assessment-method props: @@ -42255,6 +45427,9 @@ catalog: value: CP-02(01) class: sp800-53a prose: contingency plan development is coordinated with organizational elements responsible for related plans. + links: + - href: '#cp-2.1_smt' + rel: assessment-for - id: cp-2.1_asm-examine name: assessment-method props: @@ -42359,6 +45534,9 @@ catalog: value: CP-02(02)[01] class: sp800-53a prose: capacity planning is conducted so that the necessary capacity exists during contingency operations for information processing; + links: + - href: '#cp-2.2_smt' + rel: assessment-for - id: cp-2.2_obj-2 name: assessment-objective props: @@ -42366,6 +45544,9 @@ catalog: value: CP-02(02)[02] class: sp800-53a prose: capacity planning is conducted so that the necessary capacity exists during contingency operations for telecommunications; + links: + - href: '#cp-2.2_smt' + rel: assessment-for - id: cp-2.2_obj-3 name: assessment-objective props: @@ -42373,6 +45554,12 @@ catalog: value: CP-02(02)[03] class: sp800-53a prose: capacity planning is conducted so that the necessary capacity exists during contingency operations for environmental support. + links: + - href: '#cp-2.2_smt' + rel: assessment-for + links: + - href: '#cp-2.2_smt' + rel: assessment-for - id: cp-2.2_asm-examine name: assessment-method props: @@ -42466,6 +45653,9 @@ catalog: value: CP-02(03) class: sp800-53a prose: 'the resumption of {{ insert: param, cp-02.03_odp.01 }} mission and business functions are planned for within {{ insert: param, cp-02.03_odp.02 }} of contingency plan activation.' + links: + - href: '#cp-2.3_smt' + rel: assessment-for - id: cp-2.3_asm-examine name: assessment-method props: @@ -42590,6 +45780,9 @@ catalog: value: CP-02(05)[01] class: sp800-53a prose: 'the continuance of {{ insert: param, cp-02.05_odp }} mission and business functions with minimal or no loss of operational continuity is planned for;' + links: + - href: '#cp-2.5_smt' + rel: assessment-for - id: cp-2.5_obj-2 name: assessment-objective props: @@ -42597,6 +45790,12 @@ catalog: value: CP-02(05)[02] class: sp800-53a prose: continuity is sustained until full system restoration at primary processing and/or storage sites. + links: + - href: '#cp-2.5_smt' + rel: assessment-for + links: + - href: '#cp-2.5_smt' + rel: assessment-for - id: cp-2.5_asm-examine name: assessment-method props: @@ -42711,6 +45910,9 @@ catalog: value: CP-02(06)[01] class: sp800-53a prose: 'the transfer of {{ insert: param, cp-02.06_odp }} mission and business functions to alternate processing and/or storage sites with minimal or no loss of operational continuity is planned for;' + links: + - href: '#cp-2.6_smt' + rel: assessment-for - id: cp-2.6_obj-2 name: assessment-objective props: @@ -42718,6 +45920,12 @@ catalog: value: CP-02(06)[02] class: sp800-53a prose: operational continuity is sustained until full system restoration at primary processing and/or storage sites. + links: + - href: '#cp-2.6_smt' + rel: assessment-for + links: + - href: '#cp-2.6_smt' + rel: assessment-for - id: cp-2.6_asm-examine name: assessment-method props: @@ -42811,6 +46019,9 @@ catalog: value: CP-02(07) class: sp800-53a prose: the contingency plan is coordinated with the contingency plans of external service providers to ensure that contingency requirements can be satisfied. + links: + - href: '#cp-2.7_smt' + rel: assessment-for - id: cp-2.7_asm-examine name: assessment-method props: @@ -42904,6 +46115,9 @@ catalog: value: CP-02(08) class: sp800-53a prose: 'critical system assets supporting {{ insert: param, cp-02.08_odp }} mission and business functions are identified.' + links: + - href: '#cp-2.8_smt' + rel: assessment-for - id: cp-2.8_asm-examine name: assessment-method props: @@ -43082,6 +46296,9 @@ catalog: value: CP-03a.01 class: sp800-53a prose: 'contingency training is provided to system users consistent with assigned roles and responsibilities within {{ insert: param, cp-03_odp.01 }} of assuming a contingency role or responsibility;' + links: + - href: '#cp-3_smt.a.1' + rel: assessment-for - id: cp-3_obj.a.2 name: assessment-objective props: @@ -43089,6 +46306,9 @@ catalog: value: CP-03a.02 class: sp800-53a prose: contingency training is provided to system users consistent with assigned roles and responsibilities when required by system changes; + links: + - href: '#cp-3_smt.a.2' + rel: assessment-for - id: cp-3_obj.a.3 name: assessment-objective props: @@ -43096,6 +46316,12 @@ catalog: value: CP-03a.03 class: sp800-53a prose: 'contingency training is provided to system users consistent with assigned roles and responsibilities {{ insert: param, cp-03_odp.02 }} thereafter;' + links: + - href: '#cp-3_smt.a.3' + rel: assessment-for + links: + - href: '#cp-3_smt.a' + rel: assessment-for - id: cp-3_obj.b name: assessment-objective props: @@ -43110,6 +46336,9 @@ catalog: value: CP-03b.[01] class: sp800-53a prose: 'the contingency plan training content is reviewed and updated {{ insert: param, cp-03_odp.03 }};' + links: + - href: '#cp-3_smt.b' + rel: assessment-for - id: cp-3_obj.b-2 name: assessment-objective props: @@ -43117,6 +46346,15 @@ catalog: value: CP-03b.[02] class: sp800-53a prose: 'the contingency plan training content is reviewed and updated following {{ insert: param, cp-03_odp.04 }}.' + links: + - href: '#cp-3_smt.b' + rel: assessment-for + links: + - href: '#cp-3_smt.b' + rel: assessment-for + links: + - href: '#cp-3_smt' + rel: assessment-for - id: cp-3_asm-examine name: assessment-method props: @@ -43206,6 +46444,9 @@ catalog: value: CP-03(01) class: sp800-53a prose: simulated events are incorporated into contingency training to facilitate effective response by personnel in crisis situations. + links: + - href: '#cp-3.1_smt' + rel: assessment-for - id: cp-3.1_asm-examine name: assessment-method props: @@ -43295,6 +46536,9 @@ catalog: value: CP-03(02) class: sp800-53a prose: mechanisms used in operations are employed to provide a more thorough and realistic contingency training environment. + links: + - href: '#cp-3.2_smt' + rel: assessment-for - id: cp-3.2_asm-examine name: assessment-method props: @@ -43478,6 +46722,9 @@ catalog: value: CP-04a.[01] class: sp800-53a prose: 'the contingency plan for the system is tested {{ insert: param, cp-04_odp.01 }};' + links: + - href: '#cp-4_smt.a' + rel: assessment-for - id: cp-4_obj.a-2 name: assessment-objective props: @@ -43485,6 +46732,9 @@ catalog: value: CP-04a.[02] class: sp800-53a prose: '{{ insert: param, cp-04_odp.02 }} are used to determine the effectiveness of the plan;' + links: + - href: '#cp-4_smt.a' + rel: assessment-for - id: cp-4_obj.a-3 name: assessment-objective props: @@ -43492,6 +46742,12 @@ catalog: value: CP-04a.[03] class: sp800-53a prose: '{{ insert: param, cp-04_odp.03 }} are used to determine the readiness to execute the plan;' + links: + - href: '#cp-4_smt.a' + rel: assessment-for + links: + - href: '#cp-4_smt.a' + rel: assessment-for - id: cp-4_obj.b name: assessment-objective props: @@ -43499,6 +46755,9 @@ catalog: value: CP-04b. class: sp800-53a prose: the contingency plan test results are reviewed; + links: + - href: '#cp-4_smt.b' + rel: assessment-for - id: cp-4_obj.c name: assessment-objective props: @@ -43506,6 +46765,12 @@ catalog: value: CP-04c. class: sp800-53a prose: corrective actions are initiated, if needed. + links: + - href: '#cp-4_smt.c' + rel: assessment-for + links: + - href: '#cp-4_smt' + rel: assessment-for - id: cp-4_asm-examine name: assessment-method props: @@ -43600,6 +46865,9 @@ catalog: value: CP-04(01) class: sp800-53a prose: contingency plan testing is coordinated with organizational elements responsible for related plans. + links: + - href: '#cp-4.1_smt' + rel: assessment-for - id: cp-4.1_asm-examine name: assessment-method props: @@ -43712,6 +46980,9 @@ catalog: value: CP-04(02)(a) class: sp800-53a prose: the contingency plan is tested at the alternate processing site to familiarize contingency personnel with the facility and available resources; + links: + - href: '#cp-4.2_smt.a' + rel: assessment-for - id: cp-4.2_obj.b name: assessment-objective props: @@ -43719,6 +46990,12 @@ catalog: value: CP-04(02)(b) class: sp800-53a prose: the contingency plan is tested at the alternate processing site to evaluate the capabilities of the alternate processing site to support contingency operations. + links: + - href: '#cp-4.2_smt.b' + rel: assessment-for + links: + - href: '#cp-4.2_smt' + rel: assessment-for - id: cp-4.2_asm-examine name: assessment-method props: @@ -43823,6 +47100,9 @@ catalog: value: CP-04(03) class: sp800-53a prose: 'the contingency plan is tested using {{ insert: param, cp-04.03_odp }}.' + links: + - href: '#cp-4.3_smt' + rel: assessment-for - id: cp-4.3_asm-examine name: assessment-method props: @@ -43925,6 +47205,9 @@ catalog: value: CP-04(04)[01] class: sp800-53a prose: a full recovery of the system to a known state is included as part of contingency plan testing; + links: + - href: '#cp-4.4_smt' + rel: assessment-for - id: cp-4.4_obj-2 name: assessment-objective props: @@ -43932,6 +47215,12 @@ catalog: value: CP-04(04)[02] class: sp800-53a prose: a full reconstitution of the system to a known state is included as part of contingency plan testing. + links: + - href: '#cp-4.4_smt' + rel: assessment-for + links: + - href: '#cp-4.4_smt' + rel: assessment-for - id: cp-4.4_asm-examine name: assessment-method props: @@ -44049,6 +47338,9 @@ catalog: value: CP-04(05) class: sp800-53a prose: '{{ insert: param, cp-04.05_odp.01 }} are employed to disrupt and adversely affect the {{ insert: param, cp-04.05_odp.02 }}.' + links: + - href: '#cp-4.5_smt' + rel: assessment-for - id: cp-4.5_asm-examine name: assessment-method props: @@ -44199,6 +47491,9 @@ catalog: value: CP-06a.[01] class: sp800-53a prose: an alternate storage site is established; + links: + - href: '#cp-6_smt.a' + rel: assessment-for - id: cp-6_obj.a-2 name: assessment-objective props: @@ -44206,6 +47501,12 @@ catalog: value: CP-06a.[02] class: sp800-53a prose: establishment of the alternate storage site includes necessary agreements to permit the storage and retrieval of system backup information; + links: + - href: '#cp-6_smt.a' + rel: assessment-for + links: + - href: '#cp-6_smt.a' + rel: assessment-for - id: cp-6_obj.b name: assessment-objective props: @@ -44213,6 +47514,12 @@ catalog: value: CP-06b. class: sp800-53a prose: the alternate storage site provides controls equivalent to that of the primary site. + links: + - href: '#cp-6_smt.b' + rel: assessment-for + links: + - href: '#cp-6_smt' + rel: assessment-for - id: cp-6_asm-examine name: assessment-method props: @@ -44304,6 +47611,9 @@ catalog: value: CP-06(01) class: sp800-53a prose: an alternate storage site that is sufficiently separated from the primary storage site is identified to reduce susceptibility to the same threats. + links: + - href: '#cp-6.1_smt' + rel: assessment-for - id: cp-6.1_asm-examine name: assessment-method props: @@ -44386,6 +47696,9 @@ catalog: value: CP-06(02)[01] class: sp800-53a prose: the alternate storage site is configured to facilitate recovery operations in accordance with recovery time objectives; + links: + - href: '#cp-6.2_smt' + rel: assessment-for - id: cp-6.2_obj-2 name: assessment-objective props: @@ -44393,6 +47706,12 @@ catalog: value: CP-06(02)[02] class: sp800-53a prose: the alternate storage site is configured to facilitate recovery operations in accordance with recovery point objectives. + links: + - href: '#cp-6.2_smt' + rel: assessment-for + links: + - href: '#cp-6.2_smt' + rel: assessment-for - id: cp-6.2_asm-examine name: assessment-method props: @@ -44492,6 +47811,9 @@ catalog: value: CP-06(03)[01] class: sp800-53a prose: potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster are identified; + links: + - href: '#cp-6.3_smt' + rel: assessment-for - id: cp-6.3_obj-2 name: assessment-objective props: @@ -44499,6 +47821,12 @@ catalog: value: CP-06(03)[02] class: sp800-53a prose: explicit mitigation actions to address identified accessibility problems are outlined. + links: + - href: '#cp-6.3_smt' + rel: assessment-for + links: + - href: '#cp-6.3_smt' + rel: assessment-for - id: cp-6.3_asm-examine name: assessment-method props: @@ -44649,6 +47977,9 @@ catalog: value: CP-07a. class: sp800-53a prose: 'an alternate processing site, including necessary agreements to permit the transfer and resumption of {{ insert: param, cp-07_odp.01 }} for essential mission and business functions, is established within {{ insert: param, cp-07_odp.02 }} when the primary processing capabilities are unavailable;' + links: + - href: '#cp-7_smt.a' + rel: assessment-for - id: cp-7_obj.b name: assessment-objective props: @@ -44663,6 +47994,9 @@ catalog: value: CP-07b.[01] class: sp800-53a prose: 'the equipment and supplies required to transfer operations are made available at the alternate processing site or if contracts are in place to support delivery to the site within {{ insert: param, cp-07_odp.02 }} for transfer;' + links: + - href: '#cp-7_smt.b' + rel: assessment-for - id: cp-7_obj.b-2 name: assessment-objective props: @@ -44670,6 +48004,12 @@ catalog: value: CP-07b.[02] class: sp800-53a prose: 'the equipment and supplies required to resume operations are made available at the alternate processing site or if contracts are in place to support delivery to the site within {{ insert: param, cp-07_odp.02 }} for resumption;' + links: + - href: '#cp-7_smt.b' + rel: assessment-for + links: + - href: '#cp-7_smt.b' + rel: assessment-for - id: cp-7_obj.c name: assessment-objective props: @@ -44677,6 +48017,12 @@ catalog: value: CP-07c. class: sp800-53a prose: controls provided at the alternate processing site are equivalent to those at the primary site. + links: + - href: '#cp-7_smt.c' + rel: assessment-for + links: + - href: '#cp-7_smt' + rel: assessment-for - id: cp-7_asm-examine name: assessment-method props: @@ -44772,6 +48118,9 @@ catalog: value: CP-07(01) class: sp800-53a prose: an alternate processing site that is sufficiently separated from the primary processing site to reduce susceptibility to the same threats is identified. + links: + - href: '#cp-7.1_smt' + rel: assessment-for - id: cp-7.1_asm-examine name: assessment-method props: @@ -44856,6 +48205,9 @@ catalog: value: CP-07(02)[01] class: sp800-53a prose: potential accessibility problems to alternate processing sites in the event of an area-wide disruption or disaster are identified; + links: + - href: '#cp-7.2_smt' + rel: assessment-for - id: cp-7.2_obj-2 name: assessment-objective props: @@ -44863,6 +48215,12 @@ catalog: value: CP-07(02)[02] class: sp800-53a prose: explicit mitigation actions to address identified accessibility problems are outlined. + links: + - href: '#cp-7.2_smt' + rel: assessment-for + links: + - href: '#cp-7.2_smt' + rel: assessment-for - id: cp-7.2_asm-examine name: assessment-method props: @@ -44938,6 +48296,9 @@ catalog: value: CP-07(03) class: sp800-53a prose: alternate processing site agreements that contain priority-of-service provisions in accordance with availability requirements (including recovery time objectives) are developed. + links: + - href: '#cp-7.3_smt' + rel: assessment-for - id: cp-7.3_asm-examine name: assessment-method props: @@ -45019,6 +48380,9 @@ catalog: value: CP-07(04) class: sp800-53a prose: the alternate processing site is prepared so that the site can serve as the operational site supporting essential mission and business functions. + links: + - href: '#cp-7.4_smt' + rel: assessment-for - id: cp-7.4_asm-examine name: assessment-method props: @@ -45129,6 +48493,9 @@ catalog: value: CP-07(06)[01] class: sp800-53a prose: circumstances that preclude returning to the primary processing site are planned for; + links: + - href: '#cp-7.6_smt' + rel: assessment-for - id: cp-7.6_obj-2 name: assessment-objective props: @@ -45136,6 +48503,12 @@ catalog: value: CP-07(06)[02] class: sp800-53a prose: circumstances that preclude returning to the primary processing site are prepared for. + links: + - href: '#cp-7.6_smt' + rel: assessment-for + links: + - href: '#cp-7.6_smt' + rel: assessment-for - id: cp-7.6_asm-examine name: assessment-method props: @@ -45240,6 +48613,9 @@ catalog: value: CP-08 class: sp800-53a prose: 'alternate telecommunications services, including necessary agreements to permit the resumption of {{ insert: param, cp-08_odp.01 }} , are established for essential mission and business functions within {{ insert: param, cp-08_odp.02 }} when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.' + links: + - href: '#cp-8_smt' + rel: assessment-for - id: cp-8_asm-examine name: assessment-method props: @@ -45354,6 +48730,9 @@ catalog: value: CP-08(01)(a)[01] class: sp800-53a prose: primary telecommunications service agreements that contain priority-of-service provisions in accordance with availability requirements (including recovery time objectives) are developed; + links: + - href: '#cp-8.1_smt.a' + rel: assessment-for - id: cp-8.1_obj.a-2 name: assessment-objective props: @@ -45361,6 +48740,12 @@ catalog: value: CP-08(01)(a)[02] class: sp800-53a prose: alternate telecommunications service agreements that contain priority-of-service provisions in accordance with availability requirements (including recovery time objectives) are developed; + links: + - href: '#cp-8.1_smt.a' + rel: assessment-for + links: + - href: '#cp-8.1_smt.a' + rel: assessment-for - id: cp-8.1_obj.b name: assessment-objective props: @@ -45368,6 +48753,12 @@ catalog: value: CP-08(01)(b) class: sp800-53a prose: Telecommunications Service Priority is requested for all telecommunications services used for national security emergency preparedness if the primary and/or alternate telecommunications services are provided by a common carrier. + links: + - href: '#cp-8.1_smt.b' + rel: assessment-for + links: + - href: '#cp-8.1_smt' + rel: assessment-for - id: cp-8.1_asm-examine name: assessment-method props: @@ -45455,6 +48846,9 @@ catalog: value: CP-08(02) class: sp800-53a prose: alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services are obtained. + links: + - href: '#cp-8.2_smt' + rel: assessment-for - id: cp-8.2_asm-examine name: assessment-method props: @@ -45528,6 +48922,9 @@ catalog: value: CP-08(03) class: sp800-53a prose: alternate telecommunications services from providers that are separated from primary service providers are obtained to reduce susceptibility to the same threats. + links: + - href: '#cp-8.3_smt' + rel: assessment-for - id: cp-8.3_asm-examine name: assessment-method props: @@ -45665,6 +49062,9 @@ catalog: value: CP-08(04)(a)[01] class: sp800-53a prose: primary telecommunications service providers are required to have contingency plans; + links: + - href: '#cp-8.4_smt.a' + rel: assessment-for - id: cp-8.4_obj.a-2 name: assessment-objective props: @@ -45672,6 +49072,12 @@ catalog: value: CP-08(04)(a)[02] class: sp800-53a prose: alternate telecommunications service providers are required to have contingency plans; + links: + - href: '#cp-8.4_smt.a' + rel: assessment-for + links: + - href: '#cp-8.4_smt.a' + rel: assessment-for - id: cp-8.4_obj.b name: assessment-objective props: @@ -45679,6 +49085,9 @@ catalog: value: CP-08(04)(b) class: sp800-53a prose: provider contingency plans are reviewed to ensure that the plans meet organizational contingency requirements; + links: + - href: '#cp-8.4_smt.b' + rel: assessment-for - id: cp-8.4_obj.c name: assessment-objective props: @@ -45693,6 +49102,9 @@ catalog: value: CP-08(04)(c)[01] class: sp800-53a prose: 'evidence of contingency testing by providers is obtained {{ insert: param, cp-08.04_odp.01 }}.' + links: + - href: '#cp-8.4_smt.c' + rel: assessment-for - id: cp-8.4_obj.c-2 name: assessment-objective props: @@ -45700,6 +49112,15 @@ catalog: value: CP-08(04)(c)[02] class: sp800-53a prose: 'evidence of contingency training by providers is obtained {{ insert: param, cp-08.04_odp.02 }}.' + links: + - href: '#cp-8.4_smt.c' + rel: assessment-for + links: + - href: '#cp-8.4_smt.c' + rel: assessment-for + links: + - href: '#cp-8.4_smt' + rel: assessment-for - id: cp-8.4_asm-examine name: assessment-method props: @@ -45790,6 +49211,9 @@ catalog: value: CP-08(05) class: sp800-53a prose: 'alternate telecommunications services are tested {{ insert: param, cp-08.05_odp }}.' + links: + - href: '#cp-8.5_smt' + rel: assessment-for - id: cp-8.5_asm-examine name: assessment-method props: @@ -45984,6 +49408,9 @@ catalog: value: CP-09a. class: sp800-53a prose: 'backups of user-level information contained in {{ insert: param, cp-09_odp.01 }} are conducted {{ insert: param, cp-09_odp.02 }};' + links: + - href: '#cp-9_smt.a' + rel: assessment-for - id: cp-9_obj.b name: assessment-objective props: @@ -45991,6 +49418,9 @@ catalog: value: CP-09b. class: sp800-53a prose: 'backups of system-level information contained in the system are conducted {{ insert: param, cp-09_odp.03 }};' + links: + - href: '#cp-9_smt.b' + rel: assessment-for - id: cp-9_obj.c name: assessment-objective props: @@ -45998,6 +49428,9 @@ catalog: value: CP-09c. class: sp800-53a prose: 'backups of system documentation, including security- and privacy-related documentation are conducted {{ insert: param, cp-09_odp.04 }};' + links: + - href: '#cp-9_smt.c' + rel: assessment-for - id: cp-9_obj.d name: assessment-objective props: @@ -46012,6 +49445,9 @@ catalog: value: CP-09d.[01] class: sp800-53a prose: the confidentiality of backup information is protected; + links: + - href: '#cp-9_smt.d' + rel: assessment-for - id: cp-9_obj.d-2 name: assessment-objective props: @@ -46019,6 +49455,9 @@ catalog: value: CP-09d.[02] class: sp800-53a prose: the integrity of backup information is protected; + links: + - href: '#cp-9_smt.d' + rel: assessment-for - id: cp-9_obj.d-3 name: assessment-objective props: @@ -46026,6 +49465,15 @@ catalog: value: CP-09d.[03] class: sp800-53a prose: the availability of backup information is protected. + links: + - href: '#cp-9_smt.d' + rel: assessment-for + links: + - href: '#cp-9_smt.d' + rel: assessment-for + links: + - href: '#cp-9_smt' + rel: assessment-for - id: cp-9_asm-examine name: assessment-method props: @@ -46150,6 +49598,9 @@ catalog: value: CP-09(01)[01] class: sp800-53a prose: 'backup information is tested {{ insert: param, cp-09.01_odp.01 }} to verify media reliability;' + links: + - href: '#cp-9.1_smt' + rel: assessment-for - id: cp-9.1_obj-2 name: assessment-objective props: @@ -46157,6 +49608,12 @@ catalog: value: CP-09(01)[02] class: sp800-53a prose: 'backup information is tested {{ insert: param, cp-09.01_odp.02 }} to verify information integrity.' + links: + - href: '#cp-9.1_smt' + rel: assessment-for + links: + - href: '#cp-9.1_smt' + rel: assessment-for - id: cp-9.1_asm-examine name: assessment-method props: @@ -46247,6 +49704,9 @@ catalog: value: CP-09(02) class: sp800-53a prose: a sample of backup information in the restoration of selected system functions is used as part of contingency plan testing. + links: + - href: '#cp-9.2_smt' + rel: assessment-for - id: cp-9.2_asm-examine name: assessment-method props: @@ -46354,6 +49814,9 @@ catalog: value: CP-09(03) class: sp800-53a prose: 'backup copies of {{ insert: param, cp-09.03_odp }} are stored in a separate facility or in a fire rated container that is not collocated with the operational system.' + links: + - href: '#cp-9.3_smt' + rel: assessment-for - id: cp-9.3_asm-examine name: assessment-method props: @@ -46486,6 +49949,9 @@ catalog: value: CP-09(05)[01] class: sp800-53a prose: 'system backup information is transferred to the alternate storage site for {{ insert: param, cp-09.05_odp.01 }};' + links: + - href: '#cp-9.5_smt' + rel: assessment-for - id: cp-9.5_obj-2 name: assessment-objective props: @@ -46493,6 +49959,12 @@ catalog: value: CP-09(05)[02] class: sp800-53a prose: 'system backup information is transferred to the alternate storage site {{ insert: param, cp-09.05_odp.02 }}.' + links: + - href: '#cp-9.5_smt' + rel: assessment-for + links: + - href: '#cp-9.5_smt' + rel: assessment-for - id: cp-9.5_asm-examine name: assessment-method props: @@ -46592,6 +50064,9 @@ catalog: value: CP-09(06)[01] class: sp800-53a prose: system backup is conducted by maintaining a redundant secondary system that is not collocated with the primary system; + links: + - href: '#cp-9.6_smt' + rel: assessment-for - id: cp-9.6_obj-2 name: assessment-objective props: @@ -46599,6 +50074,12 @@ catalog: value: CP-09(06)[02] class: sp800-53a prose: system backup is conducted by maintaining a redundant secondary system that can be activated without loss of information or disruption to operations. + links: + - href: '#cp-9.6_smt' + rel: assessment-for + links: + - href: '#cp-9.6_smt' + rel: assessment-for - id: cp-9.6_asm-examine name: assessment-method props: @@ -46712,6 +50193,9 @@ catalog: value: CP-09(07) class: sp800-53a prose: 'dual authorization for the deletion or destruction of {{ insert: param, cp-09.07_odp }} is enforced.' + links: + - href: '#cp-9.7_smt' + rel: assessment-for - id: cp-9.7_asm-examine name: assessment-method props: @@ -46819,6 +50303,9 @@ catalog: value: CP-09(08) class: sp800-53a prose: 'cryptographic mechanisms are implemented to prevent unauthorized disclosure and modification of {{ insert: param, cp-09.08_odp }}.' + links: + - href: '#cp-9.8_smt' + rel: assessment-for - id: cp-9.8_asm-examine name: assessment-method props: @@ -46953,6 +50440,9 @@ catalog: value: CP-10[01] class: sp800-53a prose: 'the recovery of the system to a known state is provided within {{ insert: param, cp-10_odp.01 }} after a disruption, compromise, or failure;' + links: + - href: '#cp-10_smt' + rel: assessment-for - id: cp-10_obj-2 name: assessment-objective props: @@ -46960,6 +50450,12 @@ catalog: value: CP-10[02] class: sp800-53a prose: 'a reconstitution of the system to a known state is provided within {{ insert: param, cp-10_odp.02 }} after a disruption, compromise, or failure.' + links: + - href: '#cp-10_smt' + rel: assessment-for + links: + - href: '#cp-10_smt' + rel: assessment-for - id: cp-10_asm-examine name: assessment-method props: @@ -47069,6 +50565,9 @@ catalog: value: CP-10(02) class: sp800-53a prose: transaction recovery is implemented for systems that are transaction-based. + links: + - href: '#cp-10.2_smt' + rel: assessment-for - id: cp-10.2_asm-examine name: assessment-method props: @@ -47192,6 +50691,9 @@ catalog: value: CP-10(04) class: sp800-53a prose: 'the capability to restore system components within {{ insert: param, cp-10.04_odp }} from configuration-controlled and integrity-protected information representing a known, operational state for the components is provided.' + links: + - href: '#cp-10.4_smt' + rel: assessment-for - id: cp-10.4_asm-examine name: assessment-method props: @@ -47309,6 +50811,9 @@ catalog: value: CP-10(06) class: sp800-53a prose: system components used for recovery and reconstitution are protected. + links: + - href: '#cp-10.6_smt' + rel: assessment-for - id: cp-10.6_asm-examine name: assessment-method props: @@ -47418,6 +50923,9 @@ catalog: value: CP-11 class: sp800-53a prose: 'the capability to employ {{ insert: param, cp-11_odp }} are provided in support of maintaining continuity of operations.' + links: + - href: '#cp-11_smt' + rel: assessment-for - id: cp-11_asm-examine name: assessment-method props: @@ -47546,6 +51054,9 @@ catalog: value: CP-12 class: sp800-53a prose: 'a safe mode of operation is entered with {{ insert: param, cp-12_odp.01 }} when {{ insert: param, cp-12_odp.02 }} are detected.' + links: + - href: '#cp-12_smt' + rel: assessment-for - id: cp-12_asm-examine name: assessment-method props: @@ -47673,6 +51184,9 @@ catalog: value: CP-13 class: sp800-53a prose: '{{ insert: param, cp-13_odp.01 }} are employed for satisfying {{ insert: param, cp-13_odp.02 }} when the primary means of implementing the security function is unavailable or compromised.' + links: + - href: '#cp-13_smt' + rel: assessment-for - id: cp-13_asm-examine name: assessment-method props: @@ -47957,6 +51471,9 @@ catalog: value: IA-01a.[01] class: sp800-53a prose: an identification and authentication policy is developed and documented; + links: + - href: '#ia-1_smt.a' + rel: assessment-for - id: ia-1_obj.a-2 name: assessment-objective props: @@ -47964,6 +51481,9 @@ catalog: value: IA-01a.[02] class: sp800-53a prose: 'the identification and authentication policy is disseminated to {{ insert: param, ia-01_odp.01 }};' + links: + - href: '#ia-1_smt.a' + rel: assessment-for - id: ia-1_obj.a-3 name: assessment-objective props: @@ -47971,6 +51491,9 @@ catalog: value: IA-01a.[03] class: sp800-53a prose: identification and authentication procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls are developed and documented; + links: + - href: '#ia-1_smt.a' + rel: assessment-for - id: ia-1_obj.a-4 name: assessment-objective props: @@ -47978,6 +51501,9 @@ catalog: value: IA-01a.[04] class: sp800-53a prose: 'the identification and authentication procedures are disseminated to {{ insert: param, ia-01_odp.02 }};' + links: + - href: '#ia-1_smt.a' + rel: assessment-for - id: ia-1_obj.a.1 name: assessment-objective props: @@ -47999,6 +51525,9 @@ catalog: value: IA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses purpose;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-2 name: assessment-objective props: @@ -48006,6 +51535,9 @@ catalog: value: IA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses scope;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-3 name: assessment-objective props: @@ -48013,6 +51545,9 @@ catalog: value: IA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses roles;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-4 name: assessment-objective props: @@ -48020,6 +51555,9 @@ catalog: value: IA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses responsibilities;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-5 name: assessment-objective props: @@ -48027,6 +51565,9 @@ catalog: value: IA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses management commitment;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-6 name: assessment-objective props: @@ -48034,6 +51575,9 @@ catalog: value: IA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses coordination among organizational entities;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.a-7 name: assessment-objective props: @@ -48041,6 +51585,12 @@ catalog: value: IA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy addresses compliance;' + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ia-1_smt.a.1.a' + rel: assessment-for - id: ia-1_obj.a.1.b name: assessment-objective props: @@ -48048,6 +51598,15 @@ catalog: value: IA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.03 }} identification and authentication policy is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ia-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ia-1_smt.a.1' + rel: assessment-for + links: + - href: '#ia-1_smt.a' + rel: assessment-for - id: ia-1_obj.b name: assessment-objective props: @@ -48055,6 +51614,9 @@ catalog: value: IA-01b. class: sp800-53a prose: 'the {{ insert: param, ia-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the identification and authentication policy and procedures;' + links: + - href: '#ia-1_smt.b' + rel: assessment-for - id: ia-1_obj.c name: assessment-objective props: @@ -48076,6 +51638,9 @@ catalog: value: IA-01c.01[01] class: sp800-53a prose: 'the current identification and authentication policy is reviewed and updated {{ insert: param, ia-01_odp.05 }};' + links: + - href: '#ia-1_smt.c.1' + rel: assessment-for - id: ia-1_obj.c.1-2 name: assessment-objective props: @@ -48083,6 +51648,12 @@ catalog: value: IA-01c.01[02] class: sp800-53a prose: 'the current identification and authentication policy is reviewed and updated following {{ insert: param, ia-01_odp.06 }};' + links: + - href: '#ia-1_smt.c.1' + rel: assessment-for + links: + - href: '#ia-1_smt.c.1' + rel: assessment-for - id: ia-1_obj.c.2 name: assessment-objective props: @@ -48097,6 +51668,9 @@ catalog: value: IA-01c.02[01] class: sp800-53a prose: 'the current identification and authentication procedures are reviewed and updated {{ insert: param, ia-01_odp.07 }};' + links: + - href: '#ia-1_smt.c.2' + rel: assessment-for - id: ia-1_obj.c.2-2 name: assessment-objective props: @@ -48104,6 +51678,18 @@ catalog: value: IA-01c.02[02] class: sp800-53a prose: 'the current identification and authentication procedures are reviewed and updated following {{ insert: param, ia-01_odp.08 }}.' + links: + - href: '#ia-1_smt.c.2' + rel: assessment-for + links: + - href: '#ia-1_smt.c.2' + rel: assessment-for + links: + - href: '#ia-1_smt.c' + rel: assessment-for + links: + - href: '#ia-1_smt' + rel: assessment-for - id: ia-1_asm-examine name: assessment-method props: @@ -48216,6 +51802,8 @@ catalog: rel: related - href: '#ia-8' rel: related + - href: '#ia-13' + rel: related - href: '#ma-4' rel: related - href: '#ma-5' @@ -48254,6 +51842,9 @@ catalog: value: IA-02[01] class: sp800-53a prose: organizational users are uniquely identified and authenticated; + links: + - href: '#ia-2_smt' + rel: assessment-for - id: ia-2_obj-2 name: assessment-objective props: @@ -48261,6 +51852,12 @@ catalog: value: IA-02[02] class: sp800-53a prose: the unique identification of authenticated organizational users is associated with processes acting on behalf of those users. + links: + - href: '#ia-2_smt' + rel: assessment-for + links: + - href: '#ia-2_smt' + rel: assessment-for - id: ia-2_asm-examine name: assessment-method props: @@ -48358,6 +51955,9 @@ catalog: value: IA-02(01) class: sp800-53a prose: multi-factor authentication is implemented for access to privileged accounts. + links: + - href: '#ia-2.1_smt' + rel: assessment-for - id: ia-2.1_asm-examine name: assessment-method props: @@ -48451,6 +52051,9 @@ catalog: value: IA-02(02) class: sp800-53a prose: multi-factor authentication for access to non-privileged accounts is implemented. + links: + - href: '#ia-2.2_smt' + rel: assessment-for - id: ia-2.2_asm-examine name: assessment-method props: @@ -48577,6 +52180,9 @@ catalog: value: IA-02(05) class: sp800-53a prose: users are required to be individually authenticated before granting access to the shared accounts or resources when shared accounts or authenticators are employed. + links: + - href: '#ia-2.5_smt' + rel: assessment-for - id: ia-2.5_asm-examine name: assessment-method props: @@ -48726,6 +52332,9 @@ catalog: value: IA-02(06)(a) class: sp800-53a prose: 'multi-factor authentication is implemented for {{ insert: param, ia-02.06_odp.01 }} access to {{ insert: param, ia-02.06_odp.02 }} such that one of the factors is provided by a device separate from the system gaining access;' + links: + - href: '#ia-2.6_smt.a' + rel: assessment-for - id: ia-2.6_obj.b name: assessment-objective props: @@ -48733,6 +52342,12 @@ catalog: value: IA-02(06)(b) class: sp800-53a prose: 'multi-factor authentication is implemented for {{ insert: param, ia-02.06_odp.01 }} access to {{ insert: param, ia-02.06_odp.02 }} such that the device meets {{ insert: param, ia-02.06_odp.03 }}.' + links: + - href: '#ia-2.6_smt.b' + rel: assessment-for + links: + - href: '#ia-2.6_smt' + rel: assessment-for - id: ia-2.6_asm-examine name: assessment-method props: @@ -48853,6 +52468,9 @@ catalog: value: IA-02(08) class: sp800-53a prose: 'replay-resistant authentication mechanisms for access to {{ insert: param, ia-02.08_odp }} are implemented.' + links: + - href: '#ia-2.8_smt' + rel: assessment-for - id: ia-2.8_asm-examine name: assessment-method props: @@ -48974,6 +52592,9 @@ catalog: value: IA-02(10) class: sp800-53a prose: 'a single sign-on capability is provided for {{ insert: param, ia-02.10_odp }}.' + links: + - href: '#ia-2.10_smt' + rel: assessment-for - id: ia-2.10_asm-examine name: assessment-method props: @@ -49086,6 +52707,9 @@ catalog: value: IA-02(12) class: sp800-53a prose: Personal Identity Verification-compliant credentials are accepted and electronically verified. + links: + - href: '#ia-2.12_smt' + rel: assessment-for - id: ia-2.12_asm-examine name: assessment-method props: @@ -49208,6 +52832,9 @@ catalog: value: IA-02(13) class: sp800-53a prose: '{{ insert: param, ia-02.13_odp.01 }} mechanisms are implemented under {{ insert: param, ia-02.13_odp.02 }}.' + links: + - href: '#ia-2.13_smt' + rel: assessment-for - id: ia-2.13_asm-examine name: assessment-method props: @@ -49327,6 +52954,8 @@ catalog: rel: related - href: '#ia-11' rel: related + - href: '#ia-13' + rel: related - href: '#si-4' rel: related parts: @@ -49343,6 +52972,9 @@ catalog: value: IA-03 class: sp800-53a prose: '{{ insert: param, ia-03_odp.01 }} are uniquely identified and authenticated before establishing a {{ insert: param, ia-03_odp.02 }} connection.' + links: + - href: '#ia-3_smt' + rel: assessment-for - id: ia-3_asm-examine name: assessment-method props: @@ -49463,6 +53095,9 @@ catalog: value: IA-03(01) class: sp800-53a prose: '{{ insert: param, ia-03.01_odp.01 }} are authenticated before establishing {{ insert: param, ia-03.01_odp.02 }} connection using bidirectional authentication that is cryptographically based.' + links: + - href: '#ia-3.1_smt' + rel: assessment-for - id: ia-3.1_asm-examine name: assessment-method props: @@ -49625,6 +53260,9 @@ catalog: value: IA-03(03)(a)[01] class: sp800-53a prose: 'dynamic address allocation lease information assigned to devices where addresses are allocated dynamically are standardized in accordance with {{ insert: param, ia-03.03_odp.01 }};' + links: + - href: '#ia-3.3_smt.a' + rel: assessment-for - id: ia-3.3_obj.a-2 name: assessment-objective props: @@ -49632,6 +53270,12 @@ catalog: value: IA-03(03)(a)[02] class: sp800-53a prose: 'dynamic address allocation lease duration assigned to devices where addresses are allocated dynamically are standardized in accordance with {{ insert: param, ia-03.03_odp.02 }};' + links: + - href: '#ia-3.3_smt.a' + rel: assessment-for + links: + - href: '#ia-3.3_smt.a' + rel: assessment-for - id: ia-3.3_obj.b name: assessment-objective props: @@ -49639,6 +53283,12 @@ catalog: value: IA-03(03)(b) class: sp800-53a prose: lease information is audited when assigned to a device. + links: + - href: '#ia-3.3_smt.b' + rel: assessment-for + links: + - href: '#ia-3.3_smt' + rel: assessment-for - id: ia-3.3_asm-examine name: assessment-method props: @@ -49752,6 +53402,9 @@ catalog: value: IA-03(04) class: sp800-53a prose: 'device identification and authentication are handled based on attestation by {{ insert: param, ia-03.04_odp }}.' + links: + - href: '#ia-3.4_smt' + rel: assessment-for - id: ia-3.4_asm-examine name: assessment-method props: @@ -49943,6 +53596,9 @@ catalog: value: IA-04a. class: sp800-53a prose: 'system identifiers are managed by receiving authorization from {{ insert: param, ia-04_odp.01 }} to assign to an individual, group, role, or device identifier;' + links: + - href: '#ia-4_smt.a' + rel: assessment-for - id: ia-4_obj.b name: assessment-objective props: @@ -49950,6 +53606,9 @@ catalog: value: IA-04b. class: sp800-53a prose: system identifiers are managed by selecting an identifier that identifies an individual, group, role, service, or device; + links: + - href: '#ia-4_smt.b' + rel: assessment-for - id: ia-4_obj.c name: assessment-objective props: @@ -49957,6 +53616,9 @@ catalog: value: IA-04c. class: sp800-53a prose: system identifiers are managed by assigning the identifier to the intended individual, group, role, service, or device; + links: + - href: '#ia-4_smt.c' + rel: assessment-for - id: ia-4_obj.d name: assessment-objective props: @@ -49964,6 +53626,12 @@ catalog: value: IA-04d. class: sp800-53a prose: 'system identifiers are managed by preventing reuse of identifiers for {{ insert: param, ia-04_odp.02 }}.' + links: + - href: '#ia-4_smt.d' + rel: assessment-for + links: + - href: '#ia-4_smt' + rel: assessment-for - id: ia-4_asm-examine name: assessment-method props: @@ -50060,6 +53728,9 @@ catalog: value: IA-04(01) class: sp800-53a prose: the use of system account identifiers that are the same as public identifiers is prohibited for individual accounts. + links: + - href: '#ia-4.1_smt' + rel: assessment-for - id: ia-4.1_asm-examine name: assessment-method props: @@ -50193,6 +53864,9 @@ catalog: value: IA-04(04) class: sp800-53a prose: 'individual identifiers are managed by uniquely identifying each individual as {{ insert: param, ia-04.04_odp }}.' + links: + - href: '#ia-4.4_smt' + rel: assessment-for - id: ia-4.4_asm-examine name: assessment-method props: @@ -50289,6 +53963,9 @@ catalog: value: IA-04(05) class: sp800-53a prose: 'individual identifiers are dynamically managed in accordance with {{ insert: param, ia-04.05_odp }}.' + links: + - href: '#ia-4.5_smt' + rel: assessment-for - id: ia-4.5_asm-examine name: assessment-method props: @@ -50395,6 +54072,9 @@ catalog: value: IA-04(06) class: sp800-53a prose: 'cross-organization management of identifiers is coordinated with {{ insert: param, ia-04.06_odp }}.' + links: + - href: '#ia-4.6_smt' + rel: assessment-for - id: ia-4.6_asm-examine name: assessment-method props: @@ -50492,6 +54172,9 @@ catalog: value: IA-04(08) class: sp800-53a prose: pairwise pseudonymous identifiers are generated. + links: + - href: '#ia-4.8_smt' + rel: assessment-for - id: ia-4.8_asm-examine name: assessment-method props: @@ -50591,6 +54274,9 @@ catalog: value: IA-04(09) class: sp800-53a prose: 'the attributes for each uniquely identified individual, device, or service are maintained in {{ insert: param, ia-04.09_odp }}.' + links: + - href: '#ia-4.9_smt' + rel: assessment-for - id: ia-4.9_asm-examine name: assessment-method props: @@ -50815,6 +54501,9 @@ catalog: value: IA-05a. class: sp800-53a prose: system authenticators are managed through the verification of the identity of the individual, group, role, service, or device receiving the authenticator as part of the initial authenticator distribution; + links: + - href: '#ia-5_smt.a' + rel: assessment-for - id: ia-5_obj.b name: assessment-objective props: @@ -50822,6 +54511,9 @@ catalog: value: IA-05b. class: sp800-53a prose: system authenticators are managed through the establishment of initial authenticator content for any authenticators issued by the organization; + links: + - href: '#ia-5_smt.b' + rel: assessment-for - id: ia-5_obj.c name: assessment-objective props: @@ -50829,6 +54521,9 @@ catalog: value: IA-05c. class: sp800-53a prose: system authenticators are managed to ensure that authenticators have sufficient strength of mechanism for their intended use; + links: + - href: '#ia-5_smt.c' + rel: assessment-for - id: ia-5_obj.d name: assessment-objective props: @@ -50836,6 +54531,9 @@ catalog: value: IA-05d. class: sp800-53a prose: system authenticators are managed through the establishment and implementation of administrative procedures for initial authenticator distribution; lost, compromised, or damaged authenticators; and the revocation of authenticators; + links: + - href: '#ia-5_smt.d' + rel: assessment-for - id: ia-5_obj.e name: assessment-objective props: @@ -50843,6 +54541,9 @@ catalog: value: IA-05e. class: sp800-53a prose: system authenticators are managed through the change of default authenticators prior to first use; + links: + - href: '#ia-5_smt.e' + rel: assessment-for - id: ia-5_obj.f name: assessment-objective props: @@ -50850,6 +54551,9 @@ catalog: value: IA-05f. class: sp800-53a prose: 'system authenticators are managed through the change or refreshment of authenticators {{ insert: param, ia-05_odp.01 }} or when {{ insert: param, ia-05_odp.02 }} occur;' + links: + - href: '#ia-5_smt.f' + rel: assessment-for - id: ia-5_obj.g name: assessment-objective props: @@ -50857,6 +54561,9 @@ catalog: value: IA-05g. class: sp800-53a prose: system authenticators are managed through the protection of authenticator content from unauthorized disclosure and modification; + links: + - href: '#ia-5_smt.g' + rel: assessment-for - id: ia-5_obj.h name: assessment-objective props: @@ -50871,6 +54578,9 @@ catalog: value: IA-05h.[01] class: sp800-53a prose: system authenticators are managed through the requirement for individuals to take specific controls to protect authenticators; + links: + - href: '#ia-5_smt.h' + rel: assessment-for - id: ia-5_obj.h-2 name: assessment-objective props: @@ -50878,6 +54588,12 @@ catalog: value: IA-05h.[02] class: sp800-53a prose: system authenticators are managed through the requirement for devices to implement specific controls to protect authenticators; + links: + - href: '#ia-5_smt.h' + rel: assessment-for + links: + - href: '#ia-5_smt.h' + rel: assessment-for - id: ia-5_obj.i name: assessment-objective props: @@ -50885,6 +54601,12 @@ catalog: value: IA-05i. class: sp800-53a prose: system authenticators are managed through the change of authenticators for group or role accounts when membership to those accounts changes. + links: + - href: '#ia-5_smt.i' + rel: assessment-for + links: + - href: '#ia-5_smt' + rel: assessment-for - id: ia-5_asm-examine name: assessment-method props: @@ -51057,6 +54779,9 @@ catalog: value: IA-05(01)(a) class: sp800-53a prose: 'for password-based authentication, a list of commonly used, expected, or compromised passwords is maintained and updated {{ insert: param, ia-05.01_odp.01 }} and when organizational passwords are suspected to have been compromised directly or indirectly;' + links: + - href: '#ia-5.1_smt.a' + rel: assessment-for - id: ia-5.1_obj.b name: assessment-objective props: @@ -51064,6 +54789,9 @@ catalog: value: IA-05(01)(b) class: sp800-53a prose: for password-based authentication when passwords are created or updated by users, the passwords are verified not to be found on the list of commonly used, expected, or compromised passwords in IA-05(01)(a); + links: + - href: '#ia-5.1_smt.b' + rel: assessment-for - id: ia-5.1_obj.c name: assessment-objective props: @@ -51071,6 +54799,9 @@ catalog: value: IA-05(01)(c) class: sp800-53a prose: for password-based authentication, passwords are only transmitted over cryptographically protected channels; + links: + - href: '#ia-5.1_smt.c' + rel: assessment-for - id: ia-5.1_obj.d name: assessment-objective props: @@ -51078,6 +54809,9 @@ catalog: value: IA-05(01)(d) class: sp800-53a prose: for password-based authentication, passwords are stored using an approved salted key derivation function, preferably using a keyed hash; + links: + - href: '#ia-5.1_smt.d' + rel: assessment-for - id: ia-5.1_obj.e name: assessment-objective props: @@ -51085,6 +54819,9 @@ catalog: value: IA-05(01)(e) class: sp800-53a prose: for password-based authentication, immediate selection of a new password is required upon account recovery; + links: + - href: '#ia-5.1_smt.e' + rel: assessment-for - id: ia-5.1_obj.f name: assessment-objective props: @@ -51092,6 +54829,9 @@ catalog: value: IA-05(01)(f) class: sp800-53a prose: for password-based authentication, user selection of long passwords and passphrases is allowed, including spaces and all printable characters; + links: + - href: '#ia-5.1_smt.f' + rel: assessment-for - id: ia-5.1_obj.g name: assessment-objective props: @@ -51099,6 +54839,9 @@ catalog: value: IA-05(01)(g) class: sp800-53a prose: for password-based authentication, automated tools are employed to assist the user in selecting strong password authenticators; + links: + - href: '#ia-5.1_smt.g' + rel: assessment-for - id: ia-5.1_obj.h name: assessment-objective props: @@ -51106,6 +54849,12 @@ catalog: value: IA-05(01)(h) class: sp800-53a prose: 'for password-based authentication, {{ insert: param, ia-05.01_odp.02 }} are enforced.' + links: + - href: '#ia-5.1_smt.h' + rel: assessment-for + links: + - href: '#ia-5.1_smt' + rel: assessment-for - id: ia-5.1_asm-examine name: assessment-method props: @@ -51251,6 +55000,9 @@ catalog: value: IA-05(02)(a)(01) class: sp800-53a prose: authorized access to the corresponding private key is enforced for public key-based authentication; + links: + - href: '#ia-5.2_smt.a.1' + rel: assessment-for - id: ia-5.2_obj.a.2 name: assessment-objective props: @@ -51258,6 +55010,12 @@ catalog: value: IA-05(02)(a)(02) class: sp800-53a prose: the authenticated identity is mapped to the account of the individual or group for public key-based authentication; + links: + - href: '#ia-5.2_smt.a.2' + rel: assessment-for + links: + - href: '#ia-5.2_smt.a' + rel: assessment-for - id: ia-5.2_obj.b name: assessment-objective props: @@ -51272,6 +55030,9 @@ catalog: value: IA-05(02)(b)(01) class: sp800-53a prose: when public key infrastructure (PKI) is used, certificates are validated by constructing and verifying a certification path to an accepted trust anchor, including checking certificate status information; + links: + - href: '#ia-5.2_smt.b.1' + rel: assessment-for - id: ia-5.2_obj.b.2 name: assessment-objective props: @@ -51279,6 +55040,15 @@ catalog: value: IA-05(02)(b)(02) class: sp800-53a prose: when public key infrastructure (PKI) is used, a local cache of revocation data is implemented to support path discovery and validation. + links: + - href: '#ia-5.2_smt.b.2' + rel: assessment-for + links: + - href: '#ia-5.2_smt.b' + rel: assessment-for + links: + - href: '#ia-5.2_smt' + rel: assessment-for - id: ia-5.2_asm-examine name: assessment-method props: @@ -51400,6 +55170,9 @@ catalog: value: IA-05(05) class: sp800-53a prose: developers and installers of system components are required to provide unique authenticators or change default authenticators prior to delivery and installation. + links: + - href: '#ia-5.5_smt' + rel: assessment-for - id: ia-5.5_asm-examine name: assessment-method props: @@ -51489,6 +55262,9 @@ catalog: value: IA-05(06) class: sp800-53a prose: authenticators are protected commensurate with the security category of the information to which use of the authenticator permits access. + links: + - href: '#ia-5.6_smt' + rel: assessment-for - id: ia-5.6_asm-examine name: assessment-method props: @@ -51579,6 +55355,9 @@ catalog: value: IA-05(07) class: sp800-53a prose: unencrypted static authenticators are not embedded in applications or other forms of static storage. + links: + - href: '#ia-5.7_smt' + rel: assessment-for - id: ia-5.7_asm-examine name: assessment-method props: @@ -51684,6 +55463,9 @@ catalog: value: IA-05(08) class: sp800-53a prose: '{{ insert: param, ia-05.08_odp }} are implemented to manage the risk of compromise due to individuals having accounts on multiple systems.' + links: + - href: '#ia-5.8_smt' + rel: assessment-for - id: ia-5.8_asm-examine name: assessment-method props: @@ -51782,6 +55564,9 @@ catalog: value: IA-05(09) class: sp800-53a prose: '{{ insert: param, ia-05.09_odp }} are used to federate credentials.' + links: + - href: '#ia-5.9_smt' + rel: assessment-for - id: ia-5.9_asm-examine name: assessment-method props: @@ -51880,6 +55665,9 @@ catalog: value: IA-05(10) class: sp800-53a prose: 'identities and authenticators are dynamically bound using {{ insert: param, ia-05.10_odp }}.' + links: + - href: '#ia-5.10_smt' + rel: assessment-for - id: ia-5.10_asm-examine name: assessment-method props: @@ -52001,6 +55789,9 @@ catalog: value: IA-05(12) class: sp800-53a prose: 'mechanisms that satisfy {{ insert: param, ia-05.12_odp }} are employed for biometric-based authentication.' + links: + - href: '#ia-5.12_smt' + rel: assessment-for - id: ia-5.12_asm-examine name: assessment-method props: @@ -52103,6 +55894,9 @@ catalog: value: IA-05(13) class: sp800-53a prose: 'the use of cached authenticators is prohibited after {{ insert: param, ia-05.13_odp }}.' + links: + - href: '#ia-5.13_smt' + rel: assessment-for - id: ia-5.13_asm-examine name: assessment-method props: @@ -52190,6 +55984,9 @@ catalog: value: IA-05(14) class: sp800-53a prose: an organization-wide methodology for managing the content of PKI trust stores is employed across all platforms, including networks, operating systems, browsers, and applications for PKI-based authentication. + links: + - href: '#ia-5.14_smt' + rel: assessment-for - id: ia-5.14_asm-examine name: assessment-method props: @@ -52284,6 +56081,9 @@ catalog: value: IA-05(15) class: sp800-53a prose: only General Services Administration-approved products and services are used for identity, credential, and access management. + links: + - href: '#ia-5.15_smt' + rel: assessment-for - id: ia-5.15_asm-examine name: assessment-method props: @@ -52418,6 +56218,9 @@ catalog: value: IA-05(16) class: sp800-53a prose: 'the issuance of {{ insert: param, ia-05.16_odp.01 }} is required to be conducted {{ insert: param, ia-05.16_odp.02 }} before {{ insert: param, ia-05.16_odp.03 }} with authorization by {{ insert: param, ia-05.16_odp.04 }}.' + links: + - href: '#ia-5.16_smt' + rel: assessment-for - id: ia-5.16_asm-examine name: assessment-method props: @@ -52510,6 +56313,9 @@ catalog: value: IA-05(17) class: sp800-53a prose: presentation attack detection mechanisms are employed for biometric-based authentication. + links: + - href: '#ia-5.17_smt' + rel: assessment-for - id: ia-5.17_asm-examine name: assessment-method props: @@ -52640,6 +56446,9 @@ catalog: value: IA-05(18)(a) class: sp800-53a prose: '{{ insert: param, ia-05.18_odp.01 }} are employed to generate and manage passwords;' + links: + - href: '#ia-5.18_smt.a' + rel: assessment-for - id: ia-5.18_obj.b name: assessment-objective props: @@ -52647,6 +56456,12 @@ catalog: value: IA-05(18)(b) class: sp800-53a prose: 'the passwords are protected using {{ insert: param, ia-05.18_odp.02 }}.' + links: + - href: '#ia-5.18_smt.b' + rel: assessment-for + links: + - href: '#ia-5.18_smt' + rel: assessment-for - id: ia-5.18_asm-examine name: assessment-method props: @@ -52737,6 +56552,9 @@ catalog: value: IA-06 class: sp800-53a prose: the feedback of authentication information is obscured during the authentication process to protect the information from possible exploitation and use by unauthorized individuals. + links: + - href: '#ia-6_smt' + rel: assessment-for - id: ia-6_asm-examine name: assessment-method props: @@ -52832,6 +56650,9 @@ catalog: value: IA-07 class: sp800-53a prose: mechanisms for authentication to a cryptographic module are implemented that meet the requirements of applicable laws, executive orders, directives, policies, regulations, standards, and guidelines for such authentication. + links: + - href: '#ia-7_smt' + rel: assessment-for - id: ia-7_asm-examine name: assessment-method props: @@ -52939,6 +56760,8 @@ catalog: rel: related - href: '#ia-11' rel: related + - href: '#ia-13' + rel: related - href: '#ma-4' rel: related - href: '#ra-3' @@ -52961,6 +56784,9 @@ catalog: value: IA-08 class: sp800-53a prose: non-organizational users or processes acting on behalf of non-organizational users are uniquely identified and authenticated. + links: + - href: '#ia-8_smt' + rel: assessment-for - id: ia-8_asm-examine name: assessment-method props: @@ -53062,6 +56888,9 @@ catalog: value: IA-08(01)[01] class: sp800-53a prose: Personal Identity Verification-compliant credentials from other federal agencies are accepted; + links: + - href: '#ia-8.1_smt' + rel: assessment-for - id: ia-8.1_obj-2 name: assessment-objective props: @@ -53069,6 +56898,12 @@ catalog: value: IA-08(01)[02] class: sp800-53a prose: Personal Identity Verification-compliant credentials from other federal agencies are electronically verified. + links: + - href: '#ia-8.1_smt' + rel: assessment-for + links: + - href: '#ia-8.1_smt' + rel: assessment-for - id: ia-8.1_asm-examine name: assessment-method props: @@ -53186,6 +57021,9 @@ catalog: value: IA-08(02)(a) class: sp800-53a prose: only external authenticators that are NIST-compliant are accepted; + links: + - href: '#ia-8.2_smt.a' + rel: assessment-for - id: ia-8.2_obj.b name: assessment-objective props: @@ -53200,6 +57038,9 @@ catalog: value: IA-08(02)(b)[01] class: sp800-53a prose: a list of accepted external authenticators is documented; + links: + - href: '#ia-8.2_smt.b' + rel: assessment-for - id: ia-8.2_obj.b-2 name: assessment-objective props: @@ -53207,6 +57048,15 @@ catalog: value: IA-08(02)(b)[02] class: sp800-53a prose: a list of accepted external authenticators is maintained. + links: + - href: '#ia-8.2_smt.b' + rel: assessment-for + links: + - href: '#ia-8.2_smt.b' + rel: assessment-for + links: + - href: '#ia-8.2_smt' + rel: assessment-for - id: ia-8.2_asm-examine name: assessment-method props: @@ -53334,6 +57184,9 @@ catalog: value: IA-08(04) class: sp800-53a prose: 'there is conformance with {{ insert: param, ia-08.04_odp }} for identity management.' + links: + - href: '#ia-8.4_smt' + rel: assessment-for - id: ia-8.4_asm-examine name: assessment-method props: @@ -53442,6 +57295,9 @@ catalog: value: IA-08(05)[01] class: sp800-53a prose: 'federated or PKI credentials that meet {{ insert: param, ia-08.05_odp }} are accepted;' + links: + - href: '#ia-8.5_smt' + rel: assessment-for - id: ia-8.5_obj-2 name: assessment-objective props: @@ -53449,6 +57305,12 @@ catalog: value: IA-08(05)[02] class: sp800-53a prose: 'federated or PKI credentials that meet {{ insert: param, ia-08.05_odp }} are verified.' + links: + - href: '#ia-8.5_smt' + rel: assessment-for + links: + - href: '#ia-8.5_smt' + rel: assessment-for - id: ia-8.5_asm-examine name: assessment-method props: @@ -53558,6 +57420,9 @@ catalog: value: IA-08(06) class: sp800-53a prose: '{{ insert: param, ia-08.06_odp }} to disassociate user attributes or identifier assertion relationships among individuals, credential service providers, and relying parties are implemented.' + links: + - href: '#ia-8.6_smt' + rel: assessment-for - id: ia-8.6_asm-examine name: assessment-method props: @@ -53653,6 +57518,8 @@ catalog: rel: related - href: '#ia-5' rel: related + - href: '#ia-13' + rel: related - href: '#sc-8' rel: related parts: @@ -53669,6 +57536,9 @@ catalog: value: IA-09 class: sp800-53a prose: '{{ insert: param, ia-09_odp }} are uniquely identified and authenticated before establishing communications with devices, users, or other services or applications.' + links: + - href: '#ia-9_smt' + rel: assessment-for - id: ia-9_asm-examine name: assessment-method props: @@ -53818,6 +57688,9 @@ catalog: value: IA-10 class: sp800-53a prose: 'individuals accessing the system are required to employ {{ insert: param, ia-10_odp.01 }} under specific {{ insert: param, ia-10_odp.02 }}.' + links: + - href: '#ia-10_smt' + rel: assessment-for - id: ia-10_asm-examine name: assessment-method props: @@ -53936,6 +57809,9 @@ catalog: value: IA-11 class: sp800-53a prose: 'users are required to re-authenticate when {{ insert: param, ia-11_odp }}.' + links: + - href: '#ia-11_smt' + rel: assessment-for - id: ia-11_asm-examine name: assessment-method props: @@ -54035,6 +57911,8 @@ catalog: rel: related - href: '#ia-8' rel: related + - href: '#ia-13' + rel: related parts: - id: ia-12_smt name: statement @@ -54074,6 +57952,9 @@ catalog: value: IA-12a. class: sp800-53a prose: users who require accounts for logical access to systems based on appropriate identity assurance level requirements as specified in applicable standards and guidelines are identity proofed; + links: + - href: '#ia-12_smt.a' + rel: assessment-for - id: ia-12_obj.b name: assessment-objective props: @@ -54081,6 +57962,9 @@ catalog: value: IA-12b. class: sp800-53a prose: user identities are resolved to a unique individual; + links: + - href: '#ia-12_smt.b' + rel: assessment-for - id: ia-12_obj.c name: assessment-objective props: @@ -54095,6 +57979,9 @@ catalog: value: IA-12c.[01] class: sp800-53a prose: identity evidence is collected; + links: + - href: '#ia-12_smt.c' + rel: assessment-for - id: ia-12_obj.c-2 name: assessment-objective props: @@ -54102,6 +57989,9 @@ catalog: value: IA-12c.[02] class: sp800-53a prose: identity evidence is validated; + links: + - href: '#ia-12_smt.c' + rel: assessment-for - id: ia-12_obj.c-3 name: assessment-objective props: @@ -54109,6 +57999,15 @@ catalog: value: IA-12c.[03] class: sp800-53a prose: identity evidence is verified. + links: + - href: '#ia-12_smt.c' + rel: assessment-for + links: + - href: '#ia-12_smt.c' + rel: assessment-for + links: + - href: '#ia-12_smt' + rel: assessment-for - id: ia-12_asm-examine name: assessment-method props: @@ -54197,6 +58096,9 @@ catalog: value: IA-12(01) class: sp800-53a prose: the registration process to receive an account for logical access includes supervisor or sponsor authorization. + links: + - href: '#ia-12.1_smt' + rel: assessment-for - id: ia-12.1_asm-examine name: assessment-method props: @@ -54280,6 +58182,9 @@ catalog: value: IA-12(02) class: sp800-53a prose: evidence of individual identification is presented to the registration authority. + links: + - href: '#ia-12.2_smt' + rel: assessment-for - id: ia-12.2_asm-examine name: assessment-method props: @@ -54377,6 +58282,9 @@ catalog: value: IA-12(03) class: sp800-53a prose: 'the presented identity evidence is validated and verified through {{ insert: param, ia-12.03_odp }}.' + links: + - href: '#ia-12.3_smt' + rel: assessment-for - id: ia-12.3_asm-examine name: assessment-method props: @@ -54460,6 +58368,9 @@ catalog: value: IA-12(04) class: sp800-53a prose: the validation and verification of identity evidence is conducted in person before a designated registration authority. + links: + - href: '#ia-12.4_smt' + rel: assessment-for - id: ia-12.4_asm-examine name: assessment-method props: @@ -54557,6 +58468,9 @@ catalog: value: IA-12(05) class: sp800-53a prose: 'a {{ insert: param, ia-12.05_odp }} is delivered through an out-of-band channel to verify the user’s address (physical or digital) of record.' + links: + - href: '#ia-12.5_smt' + rel: assessment-for - id: ia-12.5_asm-examine name: assessment-method props: @@ -54659,6 +58573,9 @@ catalog: value: IA-12(06) class: sp800-53a prose: 'externally proofed identities are accepted {{ insert: param, ia-12.06_odp }}.' + links: + - href: '#ia-12.6_smt' + rel: assessment-for - id: ia-12.6_asm-examine name: assessment-method props: @@ -54711,6 +58628,696 @@ catalog: parts: - name: assessment-objects prose: Mechanisms supporting and/or implementing identification and authentication capabilities + - id: ia-13 + class: SP800-53 + title: Identity Providers and Authorization Servers + params: + - id: ia-13_prm_1 + props: + - name: aggregates + ns: http://csrc.nist.gov/ns/rmf + value: ia-13_odp.01 + label: organization-defined identification and authentication policy + - id: ia-13_prm_2 + props: + - name: aggregates + ns: http://csrc.nist.gov/ns/rmf + value: ia-13_odp.02 + label: organization-defined mechanisms + - id: ia-13_odp.01 + props: + - name: label + value: IA-13_ODP[01] + class: sp800-53a + label: policy + guidelines: + - prose: identification and authentication policy is defined; + - id: ia-13_odp.02 + props: + - name: label + value: IA-13_ODP[02] + class: sp800-53a + label: mechanisms + guidelines: + - prose: mechanisms supporting authentication and authorization decisions are defined; + props: + - name: label + value: IA-13 + - name: label + value: IA-13 + class: sp800-53a + - name: sort-id + value: ia-13 + - name: implementation-level + ns: http://csrc.nist.gov/ns/rmf + value: organization + - name: implementation-level + ns: http://csrc.nist.gov/ns/rmf + value: system + links: + - href: '#ac-3' + rel: related + - href: '#ia-2' + rel: related + - href: '#ia-3' + rel: related + - href: '#ia-8' + rel: related + - href: '#ia-9' + rel: related + - href: '#ia-12' + rel: related + parts: + - id: ia-13_smt + name: statement + prose: 'Employ identity providers and authorization servers to manage user, device, and non-person entity (NPE) identities, attributes, and access rights supporting authentication and authorization decisions in accordance with {{ insert: param, ia-13_prm_1 }} using {{ insert: param, ia-13_prm_2 }}.' + - id: ia-13_gdn + name: guidance + prose: Identity providers, both internal and external to the organization, manage the user, device, and NPE authenticators and issue statements, often called identity assertions, attesting to identities of other systems or systems components. Authorization servers create and issue access tokens to identified and authenticated users and devices that can be used to gain access to system or information resources. For example, single sign-on (SSO) provides identity provider and authorization server functions. Authenticator management (to include credential management) is covered by IA-05. + - id: ia-13_obj + name: assessment-objective + props: + - name: label + value: IA-13 + class: sp800-53a + parts: + - id: ia-13_obj-1 + name: assessment-objective + props: + - name: label + value: IA-13[01] + class: sp800-53a + prose: 'identity providers are employed to manage user, device, and non-person entity (NPE) identities, attributes and access rights supporting authentication decisions in accordance with {{ insert: param, ia-13_odp.02 }} using {{ insert: param, ia-13_odp.02 }};' + links: + - href: '#ia-13_smt' + rel: assessment-for + - id: ia-13_obj-2 + name: assessment-objective + props: + - name: label + value: IA-13[02] + class: sp800-53a + prose: 'identity providers are employed to manage user, device, and non-person entity (NPE) identities, attributes and access rights supporting authorization decisions in accordance with {{ insert: param, ia-13_odp.02 }} using {{ insert: param, ia-13_odp.02 }};' + links: + - href: '#ia-13_smt' + rel: assessment-for + - id: ia-13_obj-3 + name: assessment-objective + props: + - name: label + value: IA-13[03] + class: sp800-53a + prose: 'authorization servers are employed to manage user, device, and non-person entity (NPE) identities, attributes and access rights supporting authentication decisions in accordance with {{ insert: param, ia-13_odp.02 }} using {{ insert: param, ia-13_odp.02 }};' + links: + - href: '#ia-13_smt' + rel: assessment-for + - id: ia-13_obj-4 + name: assessment-objective + props: + - name: label + value: IA-13[04] + class: sp800-53a + prose: 'authorization servers are employed to manage user, device, and non-person entity (NPE) identities, attributes and access rights supporting authorization decisions in accordance with {{ insert: param, ia-13_odp.02 }} using {{ insert: param, ia-13_odp.02 }};' + links: + - href: '#ia-13_smt' + rel: assessment-for + - id: ia-13_asm-examine + name: assessment-method + props: + - name: method + ns: http://csrc.nist.gov/ns/rmf + value: EXAMINE + - name: label + value: IA-13-Examine + class: sp800-53a + parts: + - name: assessment-objects + prose: |2- + Identification and authentication policy; + + procedures addressing user and device identification and authentication; + + system security plan; + + system design documentation; + + system configuration settings and associated documentation; + + other relevant documents or records + - id: ia-13_asm-interview + name: assessment-method + props: + - name: method + ns: http://csrc.nist.gov/ns/rmf + value: INTERVIEW + - name: label + value: IA-13-Interview + class: sp800-53a + parts: + - name: assessment-objects + prose: |- + Organizational personnel with system operations responsibilities; + + organizational personnel with information security responsibilities; + + system/network administrators; + + organizational personnel with account management responsibilities; + + system developers + - id: ia-13_asm-test + name: assessment-method + props: + - name: method + ns: http://csrc.nist.gov/ns/rmf + value: TEST + - name: label + value: IA-13-Test + class: sp800-53a + parts: + - name: assessment-objects + prose: Mechanisms supporting and/or implementing identification and authentication capabilities and access rights + controls: + - id: ia-13.1 + class: SP800-53-enhancement + title: Protection of Cryptographic Keys + props: + - name: label + value: IA-13(1) + - name: label + value: IA-13(01) + class: sp800-53a + - name: sort-id + value: ia-13.01 + - name: implementation-level + ns: http://csrc.nist.gov/ns/rmf + value: organization + - name: implementation-level + ns: http://csrc.nist.gov/ns/rmf + value: system + links: + - href: '#ia-13' + rel: required + - href: '#ia-13' + rel: related + - href: '#sc-12' + rel: related + - href: '#sc-13' + rel: related + parts: + - id: ia-13.1_smt + name: statement + prose: Cryptographic keys that protect access tokens are generated, managed, and protected from disclosure and misuse. + - id: ia-13.1_gdn + name: guidance + prose: 'Identity assertions and access tokens are typically digitally signed. The private keys used to sign these assertions and tokens are protected commensurate with the impact of the system and information resources that can be accessed. ' + - id: ia-13.1_obj + name: assessment-objective + props: + - name: label + value: IA-13(01) + class: sp800-53a + parts: + - id: ia-13.1_obj-1 + name: assessment-objective + props: + - name: label + value: IA-13(01)[01] + class: sp800-53a + prose: cryptographic keys that protect access tokens are generated; + links: + - href: '#ia-13.1_smt' + rel: assessment-for + - id: ia-13.1_obj-2 + name: assessment-objective + props: + - name: label + value: IA-13(01)[02] + class: sp800-53a + prose: cryptographic keys that protect access tokens are managed; + links: + - href: '#ia-13.1_smt' + rel: assessment-for + - id: ia-13.1_obj-3 + name: assessment-objective + props: + - name: label + value: IA-13(01)[03] + class: sp800-53a + prose: cryptographic keys that protect access tokens are protected from disclosure; and + links: + - href: '#ia-13.1_smt' + rel: assessment-for + - id: ia-13.1_obj-4 + name: assessment-objective + props: + - name: label + value: IA-13(01)[04] + class: sp800-53a + prose: cryptographic keys that protect access tokens are protected from disclosure and misuse + links: + - href: '#ia-13.1_smt' + rel: assessment-for + - id: ia-13.1_asm-examine + name: assessment-method + props: + - name: method + ns: http://csrc.nist.gov/ns/rmf + value: EXAMINE + - name: label + value: IA-13(01)-Examine + class: sp800-53a + parts: + - name: assessment-objects + prose: |- + Identification and authentication policy; + + procedures addressing cryptographic key establishment and management; + + system design documentation; + + cryptographic mechanisms; + + system configuration settings and associated documentation; + + system security plan; + + other relevant documents or records + - id: ia-13.1_asm-interview + name: assessment-method + props: + - name: method + ns: http://csrc.nist.gov/ns/rmf + value: INTERVIEW + - name: label + value: IA-13(01)-Interview + class: sp800-53a + parts: + - name: assessment-objects + prose: |- + System/network administrators; + + organizational personnel with information security responsibilities; + + organizational personnel with responsibilities for cryptographic key establishment and/or management + - id: ia-13.1_asm-test + name: assessment-method + props: + - name: method + ns: http://csrc.nist.gov/ns/rmf + value: TEST + - name: label + value: IA-13(01)-Test + class: sp800-53a + parts: + - name: assessment-objects + prose: |- + Organizational processes for cryptographic key management; + + cryptographic modules generating, storing, and using cryptographic keys + - id: ia-13.2 + class: SP800-53-enhancement + title: Verification of Identity Assertions and Access Tokens + props: + - name: label + value: IA-13(2) + - name: label + value: IA-13(02) + class: sp800-53a + - name: sort-id + value: ia-13.02 + - name: implementation-level + ns: http://csrc.nist.gov/ns/rmf + value: organization + - name: implementation-level + ns: http://csrc.nist.gov/ns/rmf + value: system + links: + - href: '#ia-13' + rel: required + - href: '#ia-13' + rel: related + parts: + - id: ia-13.2_smt + name: statement + prose: The source and integrity of identity assertions and access tokens are verified before granting access to system and information resources. + - id: ia-13.2_gdn + name: guidance + prose: This includes verification of digital signatures protecting identity assertions and access tokens, as well as included metadata. Metadata includes information about the access request such as information unique to user, system or information resource being accessed, or the transaction itself such as time. Protected system and information resources could include connected networks, applications, and APIs. + - id: ia-13.2_obj + name: assessment-objective + props: + - name: label + value: IA-13(02) + class: sp800-53a + parts: + - id: ia-13.2_obj-1 + name: assessment-objective + props: + - name: label + value: IA-13(02)[01] + class: sp800-53a + prose: the source of identity assertions is verified before granting access to system and information resources; + links: + - href: '#ia-13.2_smt' + rel: assessment-for + - id: ia-13.2_obj-2 + name: assessment-objective + props: + - name: label + value: IA-13(02)[02] + class: sp800-53a + prose: the source of access tokens is verified before granting access to system and information resources; + links: + - href: '#ia-13.2_smt' + rel: assessment-for + - id: ia-13.2_obj-3 + name: assessment-objective + props: + - name: label + value: IA-13(02)[03] + class: sp800-53a + prose: the integrity of identity assertions is verified before granting access to system and information resources; + links: + - href: '#ia-13.2_smt' + rel: assessment-for + - id: ia-13.2_obj-4 + name: assessment-objective + props: + - name: label + value: IA-13(02)[04] + class: sp800-53a + prose: the integrity of access tokens is verified before granting access to system and information resources + links: + - href: '#ia-13.2_smt' + rel: assessment-for + - id: ia-13.2_asm-examine + name: assessment-method + props: + - name: method + ns: http://csrc.nist.gov/ns/rmf + value: EXAMINE + - name: label + value: IA-13(02)-Examine + class: sp800-53a + parts: + - name: assessment-objects + prose: |- + Identification and authentication policy; + + system security plan; system design documentation; + + system configuration settings and associated documentation; + + other relevant documents or records + - id: ia-13.2_asm-interview + name: assessment-method + props: + - name: method + ns: http://csrc.nist.gov/ns/rmf + value: INTERVIEW + - name: label + value: IA-13(02)-Interview + class: sp800-53a + parts: + - name: assessment-objects + prose: |- + Organizational personnel with system operations responsibilities; + + organizational personnel with information security responsibilities; + + system/ network administrators; + + organizational personnel with account management responsibilities; + + system developers + - id: ia-13.2_asm-test + name: assessment-method + props: + - name: method + ns: http://csrc.nist.gov/ns/rmf + value: TEST + - name: label + value: IA-13(02)-Test + class: sp800-53a + parts: + - name: assessment-objects + prose: Identity provider mechanisms supporting and/or implementing identification and authentication capabilities and access rights + - id: ia-13.3 + class: SP800-53-enhancement + title: Token Management + props: + - name: label + value: IA-13(3) + - name: label + value: IA-13(03) + class: sp800-53a + - name: sort-id + value: ia-13.03 + - name: implementation-level + ns: http://csrc.nist.gov/ns/rmf + value: organization + - name: implementation-level + ns: http://csrc.nist.gov/ns/rmf + value: system + links: + - href: '#737513fa-6758-403f-831d-5ddab5e23cb3' + rel: reference + - href: '#ff989cdc-649d-4f45-8f61-9309c9680933' + rel: reference + - href: '#e9d6c5f2-b3aa-4a28-8bea-a0135718d453' + rel: reference + - href: '#ia-13' + rel: required + - href: '#ia-13' + rel: related + parts: + - id: ia-13.3_smt + name: statement + prose: 'In accordance with {{ insert: param, ia-13_prm_1 }}, assertions and access tokens are:' + parts: + - id: ac-13.3_smt.a + name: item + props: + - name: label + value: (a) + prose: generated; + - id: ac-13.3_smt.b + name: item + props: + - name: label + value: (b) + prose: issued; + - id: ac-13.3_smt.c + name: item + props: + - name: label + value: (c) + prose: refreshed; + - id: ac-13.3_smt.d + name: item + props: + - name: label + value: (d) + prose: revoked; + - id: ac-13.3_smt.e + name: item + props: + - name: label + value: (e) + prose: time-restricted; and + - id: ac-13.3_smt.f + name: item + props: + - name: label + value: (f) + prose: audience-restricted. + - id: ia-13.3_gdn + name: guidance + prose: An access token is a piece of data that represents the authorization granted to a user or NPE to access specific systems or information resources. Access tokens enable controlled access to services and resources. Properly managing the lifecycle of access tokens, including their issuance, validation, and revocation, is crucial to maintaining confidentiality of data and systems. Restricting token validity to a specific audience, e.g., an application or security domain, and restricting token validity lifetimes are important practices. Access tokens are revoked or invalidated if they are compromised, lost, or are no longer needed to mitigate the risks associated with stolen or misused tokens. + - id: ia-13.3_obj + name: assessment-objective + props: + - name: label + value: IA-13(03) + class: sp800-53a + parts: + - id: ia-13.3_obj.a-1 + name: assessment-objective + props: + - name: label + value: IA-13(03)(a)[01] + class: sp800-53a + prose: 'assertions are generated in accordance with {{ insert: param, ia-13_odp.01 }};' + links: + - href: '#ia-13.3_smt.a' + rel: assessment-for + - id: ia-13.3_obj.a-2 + name: assessment-objective + props: + - name: label + value: IA-13(03)(a)[02] + class: sp800-53a + prose: 'access tokens are generated in accordance with {{ insert: param, ia-13_odp.01 }};' + links: + - href: '#ia-13.3_smt.a' + rel: assessment-for + - id: ia-13.3_obj.b-1 + name: assessment-objective + props: + - name: label + value: IA-13(03)(b)[01] + class: sp800-53a + prose: 'assertions are issued in accordance with {{ insert: param, ia-13_odp.01 }};' + links: + - href: '#ia-13.3_smt.b' + rel: assessment-for + - id: ia-13.3_obj.b-2 + name: assessment-objective + props: + - name: label + value: IA-13(03)(b)[02] + class: sp800-53a + prose: 'access tokens are issued in accordance with {{ insert: param, ia-13_odp.01 }};' + links: + - href: '#ia-13.3_smt.b' + rel: assessment-for + - id: ia-13.3_obj.c-1 + name: assessment-objective + props: + - name: label + value: IA-13(03)(c)[01] + class: sp800-53a + prose: 'assertions are refreshed in accordance with {{ insert: param, ia-13_odp.01 }};' + links: + - href: '#ia-13.3_smt.c' + rel: assessment-for + - id: ia-13.3_obj.c-2 + name: assessment-objective + props: + - name: label + value: IA-13(03)(c)[02] + class: sp800-53a + prose: 'access tokens are refreshed in accordance with {{ insert: param, ia-13_odp.01 }};' + links: + - href: '#ia-13.3_smt.c' + rel: assessment-for + - id: ia-13.3_obj.d-1 + name: assessment-objective + props: + - name: label + value: IA-13(03)(d)[01] + class: sp800-53a + prose: 'assertions are revoked in accordance with {{ insert: param, ia-13_odp.01 }};' + links: + - href: '#ia-13.3_smt.d' + rel: assessment-for + - id: ia-13.3_obj.d-2 + name: assessment-objective + props: + - name: label + value: IA-13(03)(d)[02] + class: sp800-53a + prose: 'access tokens are revoked in accordance with {{ insert: param, ia-13_odp.01 }};' + links: + - href: '#ia-13.3_smt.d' + rel: assessment-for + - id: ia-13.3_obj.e-1 + name: assessment-objective + props: + - name: label + value: IA-13(03)(e)[01] + class: sp800-53a + prose: 'assertions are time-restricted in accordance with {{ insert: param, ia-13_odp.01 }};' + links: + - href: '#ia-13.3_smt.e' + rel: assessment-for + - id: ia-13.3_obj.e-2 + name: assessment-objective + props: + - name: label + value: IA-13(03)(e)[02] + class: sp800-53a + prose: 'access tokens are time-restricted in accordance with {{ insert: param, ia-13_odp.01 }};' + links: + - href: '#ia-13.3_smt.e' + rel: assessment-for + - id: ia-13.3_obj.f-1 + name: assessment-objective + props: + - name: label + value: IA-13(03)(f)[01] + class: sp800-53a + prose: 'assertions are audience-restricted in accordance with {{ insert: param, ia-13_odp.01 }};' + links: + - href: '#ia-13.3_smt.f' + rel: assessment-for + - id: ia-13.3_obj.f-2 + name: assessment-objective + props: + - name: label + value: IA-13(03)(f)[02] + class: sp800-53a + prose: 'access tokens are audience-restricted in accordance with {{ insert: param, ia-13_odp.01 }};' + links: + - href: '#ia-13.3_smt.f' + rel: assessment-for + - id: ia-13.3_asm-examine + name: assessment-method + props: + - name: method + ns: http://csrc.nist.gov/ns/rmf + value: EXAMINE + - name: label + value: IA-13(03)-Examine + class: sp800-53a + parts: + - name: assessment-objects + prose: |- + Identification and authentication policy; + + access control policy; + + procedures for assertion and token management; + + system design documentation; + + system configuration settings and associated documentation; + + other relevant documents or records + - id: ia-13.3_asm-interview + name: assessment-method + props: + - name: method + ns: http://csrc.nist.gov/ns/rmf + value: INTERVIEW + - name: label + value: IA-13(03)-Interview + class: sp800-53a + parts: + - name: assessment-objects + prose: |- + Organizational personnel with system operations responsibilities; + + organizational personnel with information security responsibilities; + + system/ network administrators; + + organizational personnel with account management responsibilities; + + system developers + - id: ia-13.3_asm-test + name: assessment-method + props: + - name: method + ns: http://csrc.nist.gov/ns/rmf + value: TEST + - name: label + value: IA-13(03)-Test + class: sp800-53a + parts: + - name: assessment-objects + prose: Mechanisms and software supporting and/or implementing token generation - id: ir class: family title: Incident Response @@ -54929,6 +59536,9 @@ catalog: value: IR-01a.[01] class: sp800-53a prose: an incident response policy is developed and documented; + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.a-2 name: assessment-objective props: @@ -54936,6 +59546,9 @@ catalog: value: IR-01a.[02] class: sp800-53a prose: 'the incident response policy is disseminated to {{ insert: param, ir-01_odp.01 }};' + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.a-3 name: assessment-objective props: @@ -54943,6 +59556,9 @@ catalog: value: IR-01a.[03] class: sp800-53a prose: incident response procedures to facilitate the implementation of the incident response policy and associated incident response controls are developed and documented; + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.a-4 name: assessment-objective props: @@ -54950,6 +59566,9 @@ catalog: value: IR-01a.[04] class: sp800-53a prose: 'the incident response procedures are disseminated to {{ insert: param, ir-01_odp.02 }};' + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.a.1 name: assessment-objective props: @@ -54971,6 +59590,9 @@ catalog: value: IR-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses purpose;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-2 name: assessment-objective props: @@ -54978,6 +59600,9 @@ catalog: value: IR-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses scope;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-3 name: assessment-objective props: @@ -54985,6 +59610,9 @@ catalog: value: IR-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses roles;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-4 name: assessment-objective props: @@ -54992,6 +59620,9 @@ catalog: value: IR-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses responsibilities;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-5 name: assessment-objective props: @@ -54999,6 +59630,9 @@ catalog: value: IR-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses management commitment;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-6 name: assessment-objective props: @@ -55006,6 +59640,9 @@ catalog: value: IR-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses coordination among organizational entities;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.a-7 name: assessment-objective props: @@ -55013,6 +59650,12 @@ catalog: value: IR-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy addresses compliance;' + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ir-1_smt.a.1.a' + rel: assessment-for - id: ir-1_obj.a.1.b name: assessment-objective props: @@ -55020,6 +59663,15 @@ catalog: value: IR-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.03 }} incident response policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ir-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ir-1_smt.a.1' + rel: assessment-for + links: + - href: '#ir-1_smt.a' + rel: assessment-for - id: ir-1_obj.b name: assessment-objective props: @@ -55027,6 +59679,9 @@ catalog: value: IR-01b. class: sp800-53a prose: 'the {{ insert: param, ir-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the incident response policy and procedures;' + links: + - href: '#ir-1_smt.b' + rel: assessment-for - id: ir-1_obj.c name: assessment-objective props: @@ -55048,6 +59703,9 @@ catalog: value: IR-01c.01[01] class: sp800-53a prose: 'the current incident response policy is reviewed and updated {{ insert: param, ir-01_odp.05 }};' + links: + - href: '#ir-1_smt.c.1' + rel: assessment-for - id: ir-1_obj.c.1-2 name: assessment-objective props: @@ -55055,6 +59713,12 @@ catalog: value: IR-01c.01[02] class: sp800-53a prose: 'the current incident response policy is reviewed and updated following {{ insert: param, ir-01_odp.06 }};' + links: + - href: '#ir-1_smt.c.1' + rel: assessment-for + links: + - href: '#ir-1_smt.c.1' + rel: assessment-for - id: ir-1_obj.c.2 name: assessment-objective props: @@ -55069,6 +59733,9 @@ catalog: value: IR-01c.02[01] class: sp800-53a prose: 'the current incident response procedures are reviewed and updated {{ insert: param, ir-01_odp.07 }};' + links: + - href: '#ir-1_smt.c.2' + rel: assessment-for - id: ir-1_obj.c.2-2 name: assessment-objective props: @@ -55076,6 +59743,18 @@ catalog: value: IR-01c.02[02] class: sp800-53a prose: 'the current incident response procedures are reviewed and updated following {{ insert: param, ir-01_odp.08 }}.' + links: + - href: '#ir-1_smt.c.2' + rel: assessment-for + links: + - href: '#ir-1_smt.c.2' + rel: assessment-for + links: + - href: '#ir-1_smt.c' + rel: assessment-for + links: + - href: '#ir-1_smt' + rel: assessment-for - id: ir-1_asm-examine name: assessment-method props: @@ -55248,6 +59927,9 @@ catalog: value: IR-02a.01 class: sp800-53a prose: 'incident response training is provided to system users consistent with assigned roles and responsibilities within {{ insert: param, ir-02_odp.01 }} of assuming an incident response role or responsibility or acquiring system access;' + links: + - href: '#ir-2_smt.a.1' + rel: assessment-for - id: ir-2_obj.a.2 name: assessment-objective props: @@ -55255,6 +59937,9 @@ catalog: value: IR-02a.02 class: sp800-53a prose: incident response training is provided to system users consistent with assigned roles and responsibilities when required by system changes; + links: + - href: '#ir-2_smt.a.2' + rel: assessment-for - id: ir-2_obj.a.3 name: assessment-objective props: @@ -55262,6 +59947,12 @@ catalog: value: IR-02a.03 class: sp800-53a prose: 'incident response training is provided to system users consistent with assigned roles and responsibilities {{ insert: param, ir-02_odp.02 }} thereafter;' + links: + - href: '#ir-2_smt.a.3' + rel: assessment-for + links: + - href: '#ir-2_smt.a' + rel: assessment-for - id: ir-2_obj.b name: assessment-objective props: @@ -55276,6 +59967,9 @@ catalog: value: IR-02b.[01] class: sp800-53a prose: 'incident response training content is reviewed and updated {{ insert: param, ir-02_odp.03 }};' + links: + - href: '#ir-2_smt.b' + rel: assessment-for - id: ir-2_obj.b-2 name: assessment-objective props: @@ -55283,6 +59977,15 @@ catalog: value: IR-02b.[02] class: sp800-53a prose: 'incident response training content is reviewed and updated following {{ insert: param, ir-02_odp.04 }}.' + links: + - href: '#ir-2_smt.b' + rel: assessment-for + links: + - href: '#ir-2_smt.b' + rel: assessment-for + links: + - href: '#ir-2_smt' + rel: assessment-for - id: ir-2_asm-examine name: assessment-method props: @@ -55364,6 +60067,9 @@ catalog: value: IR-02(01) class: sp800-53a prose: simulated events are incorporated into incident response training to facilitate the required response by personnel in crisis situations. + links: + - href: '#ir-2.1_smt' + rel: assessment-for - id: ir-2.1_asm-examine name: assessment-method props: @@ -55463,6 +60169,9 @@ catalog: value: IR-02(02) class: sp800-53a prose: 'an incident response training environment is provided using {{ insert: param, ir-02.02_odp }}.' + links: + - href: '#ir-2.2_smt' + rel: assessment-for - id: ir-2.2_asm-examine name: assessment-method props: @@ -55560,6 +60269,9 @@ catalog: value: IR-02(03)[01] class: sp800-53a prose: incident response training on how to identify and respond to a breach is provided; + links: + - href: '#ir-2.3_smt' + rel: assessment-for - id: ir-2.3_obj-2 name: assessment-objective props: @@ -55567,6 +60279,12 @@ catalog: value: IR-02(03)[02] class: sp800-53a prose: incident response training on the organization’s process for reporting a breach is provided. + links: + - href: '#ir-2.3_smt' + rel: assessment-for + links: + - href: '#ir-2.3_smt' + rel: assessment-for - id: ir-2.3_asm-examine name: assessment-method props: @@ -55688,6 +60406,9 @@ catalog: value: IR-03 class: sp800-53a prose: 'the effectiveness of the incident response capability for the system is tested {{ insert: param, ir-03_odp.01 }} using {{ insert: param, ir-03_odp.02 }}.' + links: + - href: '#ir-3_smt' + rel: assessment-for - id: ir-3_asm-examine name: assessment-method props: @@ -55784,6 +60505,9 @@ catalog: value: IR-03(01) class: sp800-53a prose: 'the incident response capability is tested using {{ insert: param, ir-03.01_odp }}.' + links: + - href: '#ir-3.1_smt' + rel: assessment-for - id: ir-3.1_asm-examine name: assessment-method props: @@ -55880,6 +60604,9 @@ catalog: value: IR-03(02) class: sp800-53a prose: incident response testing is coordinated with organizational elements responsible for related plans. + links: + - href: '#ir-3.2_smt' + rel: assessment-for - id: ir-3.2_asm-examine name: assessment-method props: @@ -56005,6 +60732,9 @@ catalog: value: IR-03(03)(a)[01] class: sp800-53a prose: qualitative data from testing are used to determine the effectiveness of incident response processes; + links: + - href: '#ir-3.3_smt.a' + rel: assessment-for - id: ir-3.3_obj.a-2 name: assessment-objective props: @@ -56012,6 +60742,12 @@ catalog: value: IR-03(03)(a)[02] class: sp800-53a prose: quantitative data from testing are used to determine the effectiveness of incident response processes; + links: + - href: '#ir-3.3_smt.a' + rel: assessment-for + links: + - href: '#ir-3.3_smt.a' + rel: assessment-for - id: ir-3.3_obj.b name: assessment-objective props: @@ -56026,6 +60762,9 @@ catalog: value: IR-03(03)(b)[01] class: sp800-53a prose: qualitative data from testing are used to continuously improve incident response processes; + links: + - href: '#ir-3.3_smt.b' + rel: assessment-for - id: ir-3.3_obj.b-2 name: assessment-objective props: @@ -56033,6 +60772,12 @@ catalog: value: IR-03(03)(b)[02] class: sp800-53a prose: quantitative data from testing are used to continuously improve incident response processes; + links: + - href: '#ir-3.3_smt.b' + rel: assessment-for + links: + - href: '#ir-3.3_smt.b' + rel: assessment-for - id: ir-3.3_obj.c name: assessment-objective props: @@ -56047,6 +60792,9 @@ catalog: value: IR-03(03)(c)[01] class: sp800-53a prose: qualitative data from testing are used to provide incident response measures and metrics that are accurate; + links: + - href: '#ir-3.3_smt.c' + rel: assessment-for - id: ir-3.3_obj.c-2 name: assessment-objective props: @@ -56054,6 +60802,9 @@ catalog: value: IR-03(03)(c)[02] class: sp800-53a prose: quantitative data from testing are used to provide incident response measures and metrics that are accurate; + links: + - href: '#ir-3.3_smt.c' + rel: assessment-for - id: ir-3.3_obj.c-3 name: assessment-objective props: @@ -56061,6 +60812,9 @@ catalog: value: IR-03(03)(c)[03] class: sp800-53a prose: qualitative data from testing are used to provide incident response measures and metrics that are consistent; + links: + - href: '#ir-3.3_smt.c' + rel: assessment-for - id: ir-3.3_obj.c-4 name: assessment-objective props: @@ -56068,6 +60822,9 @@ catalog: value: IR-03(03)(c)[04] class: sp800-53a prose: quantitative data from testing are used to provide incident response measures and metrics that are consistent; + links: + - href: '#ir-3.3_smt.c' + rel: assessment-for - id: ir-3.3_obj.c-5 name: assessment-objective props: @@ -56075,6 +60832,9 @@ catalog: value: IR-03(03)(c)[05] class: sp800-53a prose: qualitative data from testing are used to provide incident response measures and metrics in a reproducible format; + links: + - href: '#ir-3.3_smt.c' + rel: assessment-for - id: ir-3.3_obj.c-6 name: assessment-objective props: @@ -56082,6 +60842,15 @@ catalog: value: IR-03(03)(c)[06] class: sp800-53a prose: quantitative data from testing are used to provide incident response measures and metrics in a reproducible format. + links: + - href: '#ir-3.3_smt.c' + rel: assessment-for + links: + - href: '#ir-3.3_smt.c' + rel: assessment-for + links: + - href: '#ir-3.3_smt' + rel: assessment-for - id: ir-3.3_asm-examine name: assessment-method props: @@ -56269,6 +61038,9 @@ catalog: value: IR-04a.[01] class: sp800-53a prose: an incident handling capability for incidents is implemented that is consistent with the incident response plan; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-2 name: assessment-objective props: @@ -56276,6 +61048,9 @@ catalog: value: IR-04a.[02] class: sp800-53a prose: the incident handling capability for incidents includes preparation; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-3 name: assessment-objective props: @@ -56283,6 +61058,9 @@ catalog: value: IR-04a.[03] class: sp800-53a prose: the incident handling capability for incidents includes detection and analysis; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-4 name: assessment-objective props: @@ -56290,6 +61068,9 @@ catalog: value: IR-04a.[04] class: sp800-53a prose: the incident handling capability for incidents includes containment; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-5 name: assessment-objective props: @@ -56297,6 +61078,9 @@ catalog: value: IR-04a.[05] class: sp800-53a prose: the incident handling capability for incidents includes eradication; + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.a-6 name: assessment-objective props: @@ -56304,6 +61088,12 @@ catalog: value: IR-04a.[06] class: sp800-53a prose: the incident handling capability for incidents includes recovery; + links: + - href: '#ir-4_smt.a' + rel: assessment-for + links: + - href: '#ir-4_smt.a' + rel: assessment-for - id: ir-4_obj.b name: assessment-objective props: @@ -56311,6 +61101,9 @@ catalog: value: IR-04b. class: sp800-53a prose: incident handling activities are coordinated with contingency planning activities; + links: + - href: '#ir-4_smt.b' + rel: assessment-for - id: ir-4_obj.c name: assessment-objective props: @@ -56325,6 +61118,9 @@ catalog: value: IR-04c.[01] class: sp800-53a prose: lessons learned from ongoing incident handling activities are incorporated into incident response procedures, training, and testing; + links: + - href: '#ir-4_smt.c' + rel: assessment-for - id: ir-4_obj.c-2 name: assessment-objective props: @@ -56332,6 +61128,12 @@ catalog: value: IR-04c.[02] class: sp800-53a prose: the changes resulting from the incorporated lessons learned are implemented accordingly; + links: + - href: '#ir-4_smt.c' + rel: assessment-for + links: + - href: '#ir-4_smt.c' + rel: assessment-for - id: ir-4_obj.d name: assessment-objective props: @@ -56346,6 +61148,9 @@ catalog: value: IR-04d.[01] class: sp800-53a prose: the rigor of incident handling activities is comparable and predictable across the organization; + links: + - href: '#ir-4_smt.d' + rel: assessment-for - id: ir-4_obj.d-2 name: assessment-objective props: @@ -56353,6 +61158,9 @@ catalog: value: IR-04d.[02] class: sp800-53a prose: the intensity of incident handling activities is comparable and predictable across the organization; + links: + - href: '#ir-4_smt.d' + rel: assessment-for - id: ir-4_obj.d-3 name: assessment-objective props: @@ -56360,6 +61168,9 @@ catalog: value: IR-04d.[03] class: sp800-53a prose: the scope of incident handling activities is comparable and predictable across the organization; + links: + - href: '#ir-4_smt.d' + rel: assessment-for - id: ir-4_obj.d-4 name: assessment-objective props: @@ -56367,6 +61178,15 @@ catalog: value: IR-04d.[04] class: sp800-53a prose: the results of incident handling activities are comparable and predictable across the organization. + links: + - href: '#ir-4_smt.d' + rel: assessment-for + links: + - href: '#ir-4_smt.d' + rel: assessment-for + links: + - href: '#ir-4_smt' + rel: assessment-for - id: ir-4_asm-examine name: assessment-method props: @@ -56466,6 +61286,9 @@ catalog: value: IR-04(01) class: sp800-53a prose: 'the incident handling process is supported using {{ insert: param, ir-04.01_odp }}.' + links: + - href: '#ir-4.1_smt' + rel: assessment-for - id: ir-4.1_asm-examine name: assessment-method props: @@ -56580,6 +61403,9 @@ catalog: value: IR-04(02) class: sp800-53a prose: '{{ insert: param, ir-04.02_odp.01 }} for {{ insert: param, ir-04.02_odp.02 }} are included as part of the incident response capability.' + links: + - href: '#ir-4.2_smt' + rel: assessment-for - id: ir-4.2_asm-examine name: assessment-method props: @@ -56700,6 +61526,9 @@ catalog: value: IR-04(03)[01] class: sp800-53a prose: '{{ insert: param, ir-04.03_odp.01 }} are identified;' + links: + - href: '#ir-4.3_smt' + rel: assessment-for - id: ir-4.3_obj-2 name: assessment-objective props: @@ -56707,6 +61536,12 @@ catalog: value: IR-04(03)[02] class: sp800-53a prose: '{{ insert: param, ir-04.03_odp.02 }} are taken in response to those incidents (defined in IR-04(03)_ODP[01]) to ensure the continuation of organizational mission and business functions.' + links: + - href: '#ir-4.3_smt' + rel: assessment-for + links: + - href: '#ir-4.3_smt' + rel: assessment-for - id: ir-4.3_asm-examine name: assessment-method props: @@ -56792,6 +61627,9 @@ catalog: value: IR-04(04) class: sp800-53a prose: incident information and individual incident responses are correlated to achieve an organization-wide perspective on incident awareness and response. + links: + - href: '#ir-4.4_smt' + rel: assessment-for - id: ir-4.4_asm-examine name: assessment-method props: @@ -56914,6 +61752,9 @@ catalog: value: IR-04(05) class: sp800-53a prose: 'a configurable capability is implemented to automatically disable the system if {{ insert: param, ir-04.05_odp }} are detected.' + links: + - href: '#ir-4.5_smt' + rel: assessment-for - id: ir-4.5_asm-examine name: assessment-method props: @@ -57006,6 +61847,9 @@ catalog: value: IR-04(06) class: sp800-53a prose: an incident handling capability is implemented for incidents involving insider threats. + links: + - href: '#ir-4.6_smt' + rel: assessment-for - id: ir-4.6_asm-examine name: assessment-method props: @@ -57111,6 +61955,9 @@ catalog: value: IR-04(07)[01] class: sp800-53a prose: an incident handling capability is coordinated for insider threats; + links: + - href: '#ir-4.7_smt' + rel: assessment-for - id: ir-4.7_obj-2 name: assessment-objective props: @@ -57118,6 +61965,12 @@ catalog: value: IR-04(07)[02] class: sp800-53a prose: 'the coordinated incident handling capability includes {{ insert: param, ir-04.07_odp }}.' + links: + - href: '#ir-4.7_smt' + rel: assessment-for + links: + - href: '#ir-4.7_smt' + rel: assessment-for - id: ir-4.7_asm-examine name: assessment-method props: @@ -57230,6 +62083,9 @@ catalog: value: IR-04(08) class: sp800-53a prose: 'there is coordination with {{ insert: param, ir-04.08_odp.01 }} to correlate and share {{ insert: param, ir-04.08_odp.02 }} to achieve a cross-organization perspective on incident awareness and more effective incident responses.' + links: + - href: '#ir-4.8_smt' + rel: assessment-for - id: ir-4.8_asm-examine name: assessment-method props: @@ -57328,6 +62184,9 @@ catalog: value: IR-04(09) class: sp800-53a prose: '{{ insert: param, ir-04.09_odp }} are employed to respond to incidents.' + links: + - href: '#ir-4.9_smt' + rel: assessment-for - id: ir-4.9_asm-examine name: assessment-method props: @@ -57426,6 +62285,9 @@ catalog: value: IR-04(10) class: sp800-53a prose: incident handling activities involving supply chain events are coordinated with other organizations involved in the supply chain. + links: + - href: '#ir-4.10_smt' + rel: assessment-for - id: ir-4.10_asm-examine name: assessment-method props: @@ -57532,6 +62394,9 @@ catalog: value: IR-04(11)[01] class: sp800-53a prose: an integrated incident response team is established and maintained; + links: + - href: '#ir-4.11_smt' + rel: assessment-for - id: ir-4.11_obj-2 name: assessment-objective props: @@ -57539,6 +62404,12 @@ catalog: value: IR-04(11)[02] class: sp800-53a prose: 'the integrated incident response team can be deployed to any location identified by the organization in {{ insert: param, ir-04.11_odp }}.' + links: + - href: '#ir-4.11_smt' + rel: assessment-for + links: + - href: '#ir-4.11_smt' + rel: assessment-for - id: ir-4.11_asm-examine name: assessment-method props: @@ -57619,6 +62490,9 @@ catalog: value: IR-04(12)[01] class: sp800-53a prose: malicious code remaining in the system is analyzed after the incident; + links: + - href: '#ir-4.12_smt' + rel: assessment-for - id: ir-4.12_obj-2 name: assessment-objective props: @@ -57626,6 +62500,12 @@ catalog: value: IR-04(12)[02] class: sp800-53a prose: other residual artifacts remaining in the system (if any) are analyzed after the incident. + links: + - href: '#ir-4.12_smt' + rel: assessment-for + links: + - href: '#ir-4.12_smt' + rel: assessment-for - id: ir-4.12_asm-examine name: assessment-method props: @@ -57739,6 +62619,9 @@ catalog: value: IR-04(13) class: sp800-53a prose: 'anomalous or suspected adversarial behavior in or related to {{ insert: param, ir-04.13_odp }} are analyzed.' + links: + - href: '#ir-4.13_smt' + rel: assessment-for - id: ir-4.13_asm-examine name: assessment-method props: @@ -57844,6 +62727,9 @@ catalog: value: IR-04(14)[01] class: sp800-53a prose: a security operations center is established; + links: + - href: '#ir-4.14_smt' + rel: assessment-for - id: ir-4.14_obj-2 name: assessment-objective props: @@ -57851,6 +62737,12 @@ catalog: value: IR-04(14)[02] class: sp800-53a prose: a security operations center is maintained. + links: + - href: '#ir-4.14_smt' + rel: assessment-for + links: + - href: '#ir-4.14_smt' + rel: assessment-for - id: ir-4.14_asm-examine name: assessment-method props: @@ -57964,6 +62856,9 @@ catalog: value: IR-04(15)(a) class: sp800-53a prose: public relations associated with an incident are managed; + links: + - href: '#ir-4.15_smt.a' + rel: assessment-for - id: ir-4.15_obj.b name: assessment-objective props: @@ -57971,6 +62866,12 @@ catalog: value: IR-04(15)(b) class: sp800-53a prose: measures are employed to repair the reputation of the organization. + links: + - href: '#ir-4.15_smt.b' + rel: assessment-for + links: + - href: '#ir-4.15_smt' + rel: assessment-for - id: ir-4.15_asm-examine name: assessment-method props: @@ -58076,6 +62977,9 @@ catalog: value: IR-05[01] class: sp800-53a prose: incidents are tracked; + links: + - href: '#ir-5_smt' + rel: assessment-for - id: ir-5_obj-2 name: assessment-objective props: @@ -58083,6 +62987,12 @@ catalog: value: IR-05[02] class: sp800-53a prose: incidents are documented. + links: + - href: '#ir-5_smt' + rel: assessment-for + links: + - href: '#ir-5_smt' + rel: assessment-for - id: ir-5_asm-examine name: assessment-method props: @@ -58217,6 +63127,9 @@ catalog: value: IR-05(01)[01] class: sp800-53a prose: 'incidents are tracked using {{ insert: param, ir-05.01_odp.01 }};' + links: + - href: '#ir-5.1_smt' + rel: assessment-for - id: ir-5.1_obj-2 name: assessment-objective props: @@ -58224,6 +63137,9 @@ catalog: value: IR-05(01)[02] class: sp800-53a prose: 'incident information is collected using {{ insert: param, ir-05.01_odp.02 }};' + links: + - href: '#ir-5.1_smt' + rel: assessment-for - id: ir-5.1_obj-3 name: assessment-objective props: @@ -58231,6 +63147,12 @@ catalog: value: IR-05(01)[03] class: sp800-53a prose: 'incident information is analyzed using {{ insert: param, ir-05.01_odp.03 }}.' + links: + - href: '#ir-5.1_smt' + rel: assessment-for + links: + - href: '#ir-5.1_smt' + rel: assessment-for - id: ir-5.1_asm-examine name: assessment-method props: @@ -58373,6 +63295,9 @@ catalog: value: IR-06a. class: sp800-53a prose: 'personnel is/are required to report suspected incidents to the organizational incident response capability within {{ insert: param, ir-06_odp.01 }};' + links: + - href: '#ir-6_smt.a' + rel: assessment-for - id: ir-6_obj.b name: assessment-objective props: @@ -58380,6 +63305,12 @@ catalog: value: IR-06b. class: sp800-53a prose: 'incident information is reported to {{ insert: param, ir-06_odp.02 }}.' + links: + - href: '#ir-6_smt.b' + rel: assessment-for + links: + - href: '#ir-6_smt' + rel: assessment-for - id: ir-6_asm-examine name: assessment-method props: @@ -58486,6 +63417,9 @@ catalog: value: IR-06(01) class: sp800-53a prose: 'incidents are reported using {{ insert: param, ir-06.01_odp }}.' + links: + - href: '#ir-6.1_smt' + rel: assessment-for - id: ir-6.1_asm-examine name: assessment-method props: @@ -58585,6 +63519,9 @@ catalog: value: IR-06(02) class: sp800-53a prose: 'system vulnerabilities associated with reported incidents are reported to {{ insert: param, ir-06.02_odp }}.' + links: + - href: '#ir-6.2_smt' + rel: assessment-for - id: ir-6.2_asm-examine name: assessment-method props: @@ -58677,6 +63614,9 @@ catalog: value: IR-06(03) class: sp800-53a prose: incident information is provided to the provider of the product or service and other organizations involved in the supply chain or supply chain governance for systems or system components related to the incident. + links: + - href: '#ir-6.3_smt' + rel: assessment-for - id: ir-6.3_asm-examine name: assessment-method props: @@ -58802,6 +63742,9 @@ catalog: value: IR-07[01] class: sp800-53a prose: an incident response support resource, integral to the organizational incident response capability, is provided; + links: + - href: '#ir-7_smt' + rel: assessment-for - id: ir-7_obj-2 name: assessment-objective props: @@ -58809,6 +63752,12 @@ catalog: value: IR-07[02] class: sp800-53a prose: the incident response support resource offers advice and assistance to users of the system for the response and reporting of incidents. + links: + - href: '#ir-7_smt' + rel: assessment-for + links: + - href: '#ir-7_smt' + rel: assessment-for - id: ir-7_asm-examine name: assessment-method props: @@ -58907,6 +63856,9 @@ catalog: value: IR-07(01) class: sp800-53a prose: 'the availability of incident response information and support is increased using {{ insert: param, ir-07.01_odp }}.' + links: + - href: '#ir-7.1_smt' + rel: assessment-for - id: ir-7.1_asm-examine name: assessment-method props: @@ -59016,6 +63968,9 @@ catalog: value: IR-07(02)(a) class: sp800-53a prose: a direct, cooperative relationship is established between its incident response capability and external providers of the system protection capability; + links: + - href: '#ir-7.2_smt.a' + rel: assessment-for - id: ir-7.2_obj.b name: assessment-objective props: @@ -59023,6 +63978,12 @@ catalog: value: IR-07(02)(b) class: sp800-53a prose: organizational incident response team members are identified to the external providers. + links: + - href: '#ir-7.2_smt.b' + rel: assessment-for + links: + - href: '#ir-7.2_smt' + rel: assessment-for - id: ir-7.2_asm-examine name: assessment-method props: @@ -59305,6 +64266,9 @@ catalog: value: IR-08a.01 class: sp800-53a prose: an incident response plan is developed that provides the organization with a roadmap for implementing its incident response capability; + links: + - href: '#ir-8_smt.a.1' + rel: assessment-for - id: ir-8_obj.a.2 name: assessment-objective props: @@ -59312,6 +64276,9 @@ catalog: value: IR-08a.02 class: sp800-53a prose: an incident response plan is developed that describes the structure and organization of the incident response capability; + links: + - href: '#ir-8_smt.a.2' + rel: assessment-for - id: ir-8_obj.a.3 name: assessment-objective props: @@ -59319,6 +64286,9 @@ catalog: value: IR-08a.03 class: sp800-53a prose: an incident response plan is developed that provides a high-level approach for how the incident response capability fits into the overall organization; + links: + - href: '#ir-8_smt.a.3' + rel: assessment-for - id: ir-8_obj.a.4 name: assessment-objective props: @@ -59326,6 +64296,9 @@ catalog: value: IR-08a.04 class: sp800-53a prose: an incident response plan is developed that meets the unique requirements of the organization with regard to mission, size, structure, and functions; + links: + - href: '#ir-8_smt.a.4' + rel: assessment-for - id: ir-8_obj.a.5 name: assessment-objective props: @@ -59333,6 +64306,9 @@ catalog: value: IR-08a.05 class: sp800-53a prose: an incident response plan is developed that defines reportable incidents; + links: + - href: '#ir-8_smt.a.5' + rel: assessment-for - id: ir-8_obj.a.6 name: assessment-objective props: @@ -59340,6 +64316,9 @@ catalog: value: IR-08a.06 class: sp800-53a prose: an incident response plan is developed that provides metrics for measuring the incident response capability within the organization; + links: + - href: '#ir-8_smt.a.6' + rel: assessment-for - id: ir-8_obj.a.7 name: assessment-objective props: @@ -59347,6 +64326,9 @@ catalog: value: IR-08a.07 class: sp800-53a prose: an incident response plan is developed that defines the resources and management support needed to effectively maintain and mature an incident response capability; + links: + - href: '#ir-8_smt.a.7' + rel: assessment-for - id: ir-8_obj.a.8 name: assessment-objective props: @@ -59354,6 +64336,9 @@ catalog: value: IR-08a.08 class: sp800-53a prose: an incident response plan is developed that addresses the sharing of incident information; + links: + - href: '#ir-8_smt.a.8' + rel: assessment-for - id: ir-8_obj.a.9 name: assessment-objective props: @@ -59361,6 +64346,9 @@ catalog: value: IR-08a.09 class: sp800-53a prose: 'an incident response plan is developed that is reviewed and approved by {{ insert: param, ir-08_odp.01 }} {{ insert: param, ir-08_odp.02 }};' + links: + - href: '#ir-8_smt.a.9' + rel: assessment-for - id: ir-8_obj.a.10 name: assessment-objective props: @@ -59368,6 +64356,12 @@ catalog: value: IR-08a.10 class: sp800-53a prose: 'an incident response plan is developed that explicitly designates responsibility for incident response to {{ insert: param, ir-08_odp.03 }}.' + links: + - href: '#ir-8_smt.a.10' + rel: assessment-for + links: + - href: '#ir-8_smt.a' + rel: assessment-for - id: ir-8_obj.b name: assessment-objective props: @@ -59382,6 +64376,9 @@ catalog: value: IR-08b.[01] class: sp800-53a prose: 'copies of the incident response plan are distributed to {{ insert: param, ir-08_odp.04 }};' + links: + - href: '#ir-8_smt.b' + rel: assessment-for - id: ir-8_obj.b-2 name: assessment-objective props: @@ -59389,6 +64386,12 @@ catalog: value: IR-08b.[02] class: sp800-53a prose: 'copies of the incident response plan are distributed to {{ insert: param, ir-08_odp.05 }};' + links: + - href: '#ir-8_smt.b' + rel: assessment-for + links: + - href: '#ir-8_smt.b' + rel: assessment-for - id: ir-8_obj.c name: assessment-objective props: @@ -59396,6 +64399,9 @@ catalog: value: IR-08c. class: sp800-53a prose: the incident response plan is updated to address system and organizational changes or problems encountered during plan implementation, execution, or testing; + links: + - href: '#ir-8_smt.c' + rel: assessment-for - id: ir-8_obj.d name: assessment-objective props: @@ -59410,6 +64416,9 @@ catalog: value: IR-08d.[01] class: sp800-53a prose: 'incident response plan changes are communicated to {{ insert: param, ir-08_odp.06 }};' + links: + - href: '#ir-8_smt.d' + rel: assessment-for - id: ir-8_obj.d-2 name: assessment-objective props: @@ -59417,6 +64426,12 @@ catalog: value: IR-08d.[02] class: sp800-53a prose: 'incident response plan changes are communicated to {{ insert: param, ir-08_odp.07 }};' + links: + - href: '#ir-8_smt.d' + rel: assessment-for + links: + - href: '#ir-8_smt.d' + rel: assessment-for - id: ir-8_obj.e name: assessment-objective props: @@ -59431,6 +64446,9 @@ catalog: value: IR-08e.[01] class: sp800-53a prose: the incident response plan is protected from unauthorized disclosure; + links: + - href: '#ir-8_smt.e' + rel: assessment-for - id: ir-8_obj.e-2 name: assessment-objective props: @@ -59438,6 +64456,15 @@ catalog: value: IR-08e.[02] class: sp800-53a prose: the incident response plan is protected from unauthorized modification. + links: + - href: '#ir-8_smt.e' + rel: assessment-for + links: + - href: '#ir-8_smt.e' + rel: assessment-for + links: + - href: '#ir-8_smt' + rel: assessment-for - id: ir-8_asm-examine name: assessment-method props: @@ -59560,6 +64587,9 @@ catalog: value: IR-08(01)(a) class: sp800-53a prose: the incident response plan for breaches involving personally identifiable information includes a process to determine if notice to individuals or other organizations, including oversight organizations, is needed; + links: + - href: '#ir-8.1_smt.a' + rel: assessment-for - id: ir-8.1_obj.b name: assessment-objective props: @@ -59567,6 +64597,9 @@ catalog: value: IR-08(01)(b) class: sp800-53a prose: the incident response plan for breaches involving personally identifiable information includes an assessment process to determine the extent of the harm, embarrassment, inconvenience, or unfairness to affected individuals and any mechanisms to mitigate such harms; + links: + - href: '#ir-8.1_smt.b' + rel: assessment-for - id: ir-8.1_obj.c name: assessment-objective props: @@ -59574,6 +64607,12 @@ catalog: value: IR-08(01)(c) class: sp800-53a prose: the incident response plan for breaches involving personally identifiable information includes the identification of applicable privacy requirements. + links: + - href: '#ir-8.1_smt.c' + rel: assessment-for + links: + - href: '#ir-8.1_smt' + rel: assessment-for - id: ir-8.1_asm-examine name: assessment-method props: @@ -59752,6 +64791,9 @@ catalog: value: IR-09a. class: sp800-53a prose: '{{ insert: param, ir-09_odp.01 }} is/are assigned the responsibility to respond to information spills;' + links: + - href: '#ir-9_smt.a' + rel: assessment-for - id: ir-9_obj.b name: assessment-objective props: @@ -59759,6 +64801,9 @@ catalog: value: IR-09b. class: sp800-53a prose: the specific information involved in the system contamination is identified in response to information spills; + links: + - href: '#ir-9_smt.b' + rel: assessment-for - id: ir-9_obj.c name: assessment-objective props: @@ -59766,6 +64811,9 @@ catalog: value: IR-09c. class: sp800-53a prose: '{{ insert: param, ir-09_odp.02 }} is/are alerted of the information spill using a method of communication not associated with the spill;' + links: + - href: '#ir-9_smt.c' + rel: assessment-for - id: ir-9_obj.d name: assessment-objective props: @@ -59773,6 +64821,9 @@ catalog: value: IR-09d. class: sp800-53a prose: the contaminated system or system component is isolated in response to information spills; + links: + - href: '#ir-9_smt.d' + rel: assessment-for - id: ir-9_obj.e name: assessment-objective props: @@ -59780,6 +64831,9 @@ catalog: value: IR-09e. class: sp800-53a prose: the information is eradicated from the contaminated system or component in response to information spills; + links: + - href: '#ir-9_smt.e' + rel: assessment-for - id: ir-9_obj.f name: assessment-objective props: @@ -59787,6 +64841,9 @@ catalog: value: IR-09f. class: sp800-53a prose: other systems or system components that may have been subsequently contaminated are identified in response to information spills; + links: + - href: '#ir-9_smt.f' + rel: assessment-for - id: ir-9_obj.g name: assessment-objective props: @@ -59794,6 +64851,12 @@ catalog: value: IR-09g. class: sp800-53a prose: '{{ insert: param, ir-09_odp.03 }} are performed in response to information spills.' + links: + - href: '#ir-9_smt.g' + rel: assessment-for + links: + - href: '#ir-9_smt' + rel: assessment-for - id: ir-9_asm-examine name: assessment-method props: @@ -59918,6 +64981,9 @@ catalog: value: IR-09(02) class: sp800-53a prose: 'information spillage response training is provided {{ insert: param, ir-09.02_odp }}.' + links: + - href: '#ir-9.2_smt' + rel: assessment-for - id: ir-9.2_asm-examine name: assessment-method props: @@ -60002,6 +65068,9 @@ catalog: value: IR-09(03) class: sp800-53a prose: '{{ insert: param, ir-09.03_odp }} are implemented to ensure that organizational personnel impacted by information spills can continue to carry out assigned tasks while contaminated systems are undergoing corrective actions.' + links: + - href: '#ir-9.3_smt' + rel: assessment-for - id: ir-9.3_asm-examine name: assessment-method props: @@ -60094,6 +65163,9 @@ catalog: value: IR-09(04) class: sp800-53a prose: '{{ insert: param, ir-09.04_odp }} are employed for personnel exposed to information not within assigned access authorizations.' + links: + - href: '#ir-9.4_smt' + rel: assessment-for - id: ir-9.4_asm-examine name: assessment-method props: @@ -60377,6 +65449,9 @@ catalog: value: MA-01a.[01] class: sp800-53a prose: a maintenance policy is developed and documented; + links: + - href: '#ma-1_smt.a' + rel: assessment-for - id: ma-1_obj.a-2 name: assessment-objective props: @@ -60384,6 +65459,9 @@ catalog: value: MA-01a.[02] class: sp800-53a prose: 'the maintenance policy is disseminated to {{ insert: param, ma-01_odp.01 }};' + links: + - href: '#ma-1_smt.a' + rel: assessment-for - id: ma-1_obj.a-3 name: assessment-objective props: @@ -60391,6 +65469,9 @@ catalog: value: MA-01a.[03] class: sp800-53a prose: maintenance procedures to facilitate the implementation of the maintenance policy and associated maintenance controls are developed and documented; + links: + - href: '#ma-1_smt.a' + rel: assessment-for - id: ma-1_obj.a-4 name: assessment-objective props: @@ -60398,6 +65479,9 @@ catalog: value: MA-01a.[04] class: sp800-53a prose: 'the maintenance procedures are disseminated to {{ insert: param, ma-01_odp.02 }};' + links: + - href: '#ma-1_smt.a' + rel: assessment-for - id: ma-1_obj.a.1 name: assessment-objective props: @@ -60419,6 +65503,9 @@ catalog: value: MA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses purpose;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-2 name: assessment-objective props: @@ -60426,6 +65513,9 @@ catalog: value: MA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses scope;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-3 name: assessment-objective props: @@ -60433,6 +65523,9 @@ catalog: value: MA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses roles;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-4 name: assessment-objective props: @@ -60440,6 +65533,9 @@ catalog: value: MA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses responsibilities;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-5 name: assessment-objective props: @@ -60447,6 +65543,9 @@ catalog: value: MA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses management commitment;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-6 name: assessment-objective props: @@ -60454,6 +65553,9 @@ catalog: value: MA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses coordination among organizational entities;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.a-7 name: assessment-objective props: @@ -60461,6 +65563,12 @@ catalog: value: MA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy addresses compliance;' + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ma-1_smt.a.1.a' + rel: assessment-for - id: ma-1_obj.a.1.b name: assessment-objective props: @@ -60468,6 +65576,15 @@ catalog: value: MA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.03 }} maintenance policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ma-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ma-1_smt.a.1' + rel: assessment-for + links: + - href: '#ma-1_smt.a' + rel: assessment-for - id: ma-1_obj.b name: assessment-objective props: @@ -60475,6 +65592,9 @@ catalog: value: MA-01b. class: sp800-53a prose: 'the {{ insert: param, ma-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the maintenance policy and procedures;' + links: + - href: '#ma-1_smt.b' + rel: assessment-for - id: ma-1_obj.c name: assessment-objective props: @@ -60496,6 +65616,9 @@ catalog: value: MA-01c.01[01] class: sp800-53a prose: 'the current maintenance policy is reviewed and updated {{ insert: param, ma-01_odp.05 }};' + links: + - href: '#ma-1_smt.c.1' + rel: assessment-for - id: ma-1_obj.c.1-2 name: assessment-objective props: @@ -60503,6 +65626,12 @@ catalog: value: MA-01c.01[02] class: sp800-53a prose: 'the current maintenance policy is reviewed and updated following {{ insert: param, ma-01_odp.06 }};' + links: + - href: '#ma-1_smt.c.1' + rel: assessment-for + links: + - href: '#ma-1_smt.c.1' + rel: assessment-for - id: ma-1_obj.c.2 name: assessment-objective props: @@ -60517,6 +65646,9 @@ catalog: value: MA-01c.02[01] class: sp800-53a prose: 'the current maintenance procedures are reviewed and updated {{ insert: param, ma-01_odp.07 }};' + links: + - href: '#ma-1_smt.c.2' + rel: assessment-for - id: ma-1_obj.c.2-2 name: assessment-objective props: @@ -60524,6 +65656,18 @@ catalog: value: MA-01c.02[02] class: sp800-53a prose: 'the current maintenance procedures are reviewed and updated following {{ insert: param, ma-01_odp.08 }}.' + links: + - href: '#ma-1_smt.c.2' + rel: assessment-for + links: + - href: '#ma-1_smt.c.2' + rel: assessment-for + links: + - href: '#ma-1_smt.c' + rel: assessment-for + links: + - href: '#ma-1_smt' + rel: assessment-for - id: ma-1_asm-examine name: assessment-method props: @@ -60698,6 +65842,9 @@ catalog: value: MA-02a.[01] class: sp800-53a prose: maintenance, repair, and replacement of system components are scheduled in accordance with manufacturer or vendor specifications and/or organizational requirements; + links: + - href: '#ma-2_smt.a' + rel: assessment-for - id: ma-2_obj.a-2 name: assessment-objective props: @@ -60705,6 +65852,9 @@ catalog: value: MA-02a.[02] class: sp800-53a prose: maintenance, repair, and replacement of system components are documented in accordance with manufacturer or vendor specifications and/or organizational requirements; + links: + - href: '#ma-2_smt.a' + rel: assessment-for - id: ma-2_obj.a-3 name: assessment-objective props: @@ -60712,6 +65862,12 @@ catalog: value: MA-02a.[03] class: sp800-53a prose: records of maintenance, repair, and replacement of system components are reviewed in accordance with manufacturer or vendor specifications and/or organizational requirements; + links: + - href: '#ma-2_smt.a' + rel: assessment-for + links: + - href: '#ma-2_smt.a' + rel: assessment-for - id: ma-2_obj.b name: assessment-objective props: @@ -60726,6 +65882,9 @@ catalog: value: MA-02b.[01] class: sp800-53a prose: all maintenance activities, whether performed on site or remotely and whether the system or system components are serviced on site or removed to another location, are approved; + links: + - href: '#ma-2_smt.b' + rel: assessment-for - id: ma-2_obj.b-2 name: assessment-objective props: @@ -60733,6 +65892,12 @@ catalog: value: MA-02b.[02] class: sp800-53a prose: all maintenance activities, whether performed on site or remotely and whether the system or system components are serviced on site or removed to another location, are monitored; + links: + - href: '#ma-2_smt.b' + rel: assessment-for + links: + - href: '#ma-2_smt.b' + rel: assessment-for - id: ma-2_obj.c name: assessment-objective props: @@ -60740,6 +65905,9 @@ catalog: value: MA-02c. class: sp800-53a prose: '{{ insert: param, ma-02_odp.01 }} is/are required to explicitly approve the removal of the system or system components from organizational facilities for off-site maintenance, repair, or replacement;' + links: + - href: '#ma-2_smt.c' + rel: assessment-for - id: ma-2_obj.d name: assessment-objective props: @@ -60747,6 +65915,9 @@ catalog: value: MA-02d. class: sp800-53a prose: 'equipment is sanitized to remove {{ insert: param, ma-02_odp.02 }} from associated media prior to removal from organizational facilities for off-site maintenance, repair, or replacement;' + links: + - href: '#ma-2_smt.d' + rel: assessment-for - id: ma-2_obj.e name: assessment-objective props: @@ -60754,6 +65925,9 @@ catalog: value: MA-02e. class: sp800-53a prose: all potentially impacted controls are checked to verify that the controls are still functioning properly following maintenance, repair, or replacement actions; + links: + - href: '#ma-2_smt.e' + rel: assessment-for - id: ma-2_obj.f name: assessment-objective props: @@ -60761,6 +65935,12 @@ catalog: value: MA-02f. class: sp800-53a prose: '{{ insert: param, ma-02_odp.03 }} is included in organizational maintenance records.' + links: + - href: '#ma-2_smt.f' + rel: assessment-for + links: + - href: '#ma-2_smt' + rel: assessment-for - id: ma-2_asm-examine name: assessment-method props: @@ -60939,6 +66119,9 @@ catalog: value: MA-02(02)(a)[01] class: sp800-53a prose: '{{ insert: param, ma-02.02_odp.01 }} are used to schedule maintenance, repair, and replacement actions for the system;' + links: + - href: '#ma-2.2_smt.a' + rel: assessment-for - id: ma-2.2_obj.a-2 name: assessment-objective props: @@ -60946,6 +66129,9 @@ catalog: value: MA-02(02)(a)[02] class: sp800-53a prose: '{{ insert: param, ma-02.02_odp.02 }} are used to conduct maintenance, repair, and replacement actions for the system;' + links: + - href: '#ma-2.2_smt.a' + rel: assessment-for - id: ma-2.2_obj.a-3 name: assessment-objective props: @@ -60953,6 +66139,12 @@ catalog: value: MA-02(02)(a)[03] class: sp800-53a prose: '{{ insert: param, ma-02.02_odp.03 }} are used to document maintenance, repair, and replacement actions for the system;' + links: + - href: '#ma-2.2_smt.a' + rel: assessment-for + links: + - href: '#ma-2.2_smt.a' + rel: assessment-for - id: ma-2.2_obj.b name: assessment-objective props: @@ -60967,6 +66159,9 @@ catalog: value: MA-02(02)(b)[01] class: sp800-53a prose: up-to date, accurate, and complete records of all maintenance actions requested, scheduled, in process, and completed are produced. + links: + - href: '#ma-2.2_smt.b' + rel: assessment-for - id: ma-2.2_obj.b-2 name: assessment-objective props: @@ -60974,6 +66169,9 @@ catalog: value: MA-02(02)(b)[02] class: sp800-53a prose: up-to date, accurate, and complete records of all repair actions requested, scheduled, in process, and completed are produced. + links: + - href: '#ma-2.2_smt.b' + rel: assessment-for - id: ma-2.2_obj.b-3 name: assessment-objective props: @@ -60981,6 +66179,15 @@ catalog: value: MA-02(02)(b)[03] class: sp800-53a prose: up-to date, accurate, and complete records of all replacement actions requested, scheduled, in process, and completed are produced. + links: + - href: '#ma-2.2_smt.b' + rel: assessment-for + links: + - href: '#ma-2.2_smt.b' + rel: assessment-for + links: + - href: '#ma-2.2_smt' + rel: assessment-for - id: ma-2.2_asm-examine name: assessment-method props: @@ -61110,6 +66317,9 @@ catalog: value: MA-03a.[01] class: sp800-53a prose: the use of system maintenance tools is approved; + links: + - href: '#ma-3_smt.a' + rel: assessment-for - id: ma-3_obj.a-2 name: assessment-objective props: @@ -61117,6 +66327,9 @@ catalog: value: MA-03a.[02] class: sp800-53a prose: the use of system maintenance tools is controlled; + links: + - href: '#ma-3_smt.a' + rel: assessment-for - id: ma-3_obj.a-3 name: assessment-objective props: @@ -61124,6 +66337,12 @@ catalog: value: MA-03a.[03] class: sp800-53a prose: the use of system maintenance tools is monitored; + links: + - href: '#ma-3_smt.a' + rel: assessment-for + links: + - href: '#ma-3_smt.a' + rel: assessment-for - id: ma-3_obj.b name: assessment-objective props: @@ -61131,6 +66350,12 @@ catalog: value: MA-03b. class: sp800-53a prose: 'previously approved system maintenance tools are reviewed {{ insert: param, ma-03_odp }}.' + links: + - href: '#ma-3_smt.b' + rel: assessment-for + links: + - href: '#ma-3_smt' + rel: assessment-for - id: ma-3_asm-examine name: assessment-method props: @@ -61218,6 +66443,9 @@ catalog: value: MA-03(01) class: sp800-53a prose: maintenance tools used by maintenance personnel are inspected for improper or unauthorized modifications. + links: + - href: '#ma-3.1_smt' + rel: assessment-for - id: ma-3.1_asm-examine name: assessment-method props: @@ -61306,6 +66534,9 @@ catalog: value: MA-03(02) class: sp800-53a prose: media containing diagnostic and test programs are checked for malicious code before the media are used in the system. + links: + - href: '#ma-3.2_smt' + rel: assessment-for - id: ma-3.2_asm-examine name: assessment-method props: @@ -61435,6 +66666,9 @@ catalog: value: MA-03(03)(a) class: sp800-53a prose: the removal of maintenance equipment containing organizational information is prevented by verifying that there is no organizational information contained on the equipment; or + links: + - href: '#ma-3.3_smt.a' + rel: assessment-for - id: ma-3.3_obj.b name: assessment-objective props: @@ -61442,6 +66676,9 @@ catalog: value: MA-03(03)(b) class: sp800-53a prose: the removal of maintenance equipment containing organizational information is prevented by sanitizing or destroying the equipment; or + links: + - href: '#ma-3.3_smt.b' + rel: assessment-for - id: ma-3.3_obj.c name: assessment-objective props: @@ -61449,6 +66686,9 @@ catalog: value: MA-03(03)(c) class: sp800-53a prose: the removal of maintenance equipment containing organizational information is prevented by retaining the equipment within the facility; or + links: + - href: '#ma-3.3_smt.c' + rel: assessment-for - id: ma-3.3_obj.d name: assessment-objective props: @@ -61456,6 +66696,12 @@ catalog: value: MA-03(03)(d) class: sp800-53a prose: 'the removal of maintenance equipment containing organizational information is prevented by obtaining an exemption from {{ insert: param, ma-03.03_odp }} explicitly authorizing removal of the equipment from the facility.' + links: + - href: '#ma-3.3_smt.d' + rel: assessment-for + links: + - href: '#ma-3.3_smt' + rel: assessment-for - id: ma-3.3_asm-examine name: assessment-method props: @@ -61559,6 +66805,9 @@ catalog: value: MA-03(04) class: sp800-53a prose: the use of maintenance tools is restricted to authorized personnel only. + links: + - href: '#ma-3.4_smt' + rel: assessment-for - id: ma-3.4_asm-examine name: assessment-method props: @@ -61654,6 +66903,9 @@ catalog: value: MA-03(05) class: sp800-53a prose: the use of maintenance tools that execute with increased privilege is monitored. + links: + - href: '#ma-3.5_smt' + rel: assessment-for - id: ma-3.5_asm-examine name: assessment-method props: @@ -61751,6 +67003,9 @@ catalog: value: MA-03(06) class: sp800-53a prose: maintenance tools are inspected to ensure that the latest software updates and patches are installed. + links: + - href: '#ma-3.6_smt' + rel: assessment-for - id: ma-3.6_asm-examine name: assessment-method props: @@ -61925,6 +67180,9 @@ catalog: value: MA-04a.[01] class: sp800-53a prose: nonlocal maintenance and diagnostic activities are approved; + links: + - href: '#ma-4_smt.a' + rel: assessment-for - id: ma-4_obj.a-2 name: assessment-objective props: @@ -61932,6 +67190,12 @@ catalog: value: MA-04a.[02] class: sp800-53a prose: nonlocal maintenance and diagnostic activities are monitored; + links: + - href: '#ma-4_smt.a' + rel: assessment-for + links: + - href: '#ma-4_smt.a' + rel: assessment-for - id: ma-4_obj.b name: assessment-objective props: @@ -61946,6 +67210,9 @@ catalog: value: MA-04b.[01] class: sp800-53a prose: the use of nonlocal maintenance and diagnostic tools are allowed only as consistent with organizational policy; + links: + - href: '#ma-4_smt.b' + rel: assessment-for - id: ma-4_obj.b-2 name: assessment-objective props: @@ -61953,6 +67220,12 @@ catalog: value: MA-04b.[02] class: sp800-53a prose: the use of nonlocal maintenance and diagnostic tools are documented in the security plan for the system; + links: + - href: '#ma-4_smt.b' + rel: assessment-for + links: + - href: '#ma-4_smt.b' + rel: assessment-for - id: ma-4_obj.c name: assessment-objective props: @@ -61960,6 +67233,9 @@ catalog: value: MA-04c. class: sp800-53a prose: strong authentication is employed in the establishment of nonlocal maintenance and diagnostic sessions; + links: + - href: '#ma-4_smt.c' + rel: assessment-for - id: ma-4_obj.d name: assessment-objective props: @@ -61967,6 +67243,9 @@ catalog: value: MA-04d. class: sp800-53a prose: records for nonlocal maintenance and diagnostic activities are maintained; + links: + - href: '#ma-4_smt.d' + rel: assessment-for - id: ma-4_obj.e name: assessment-objective props: @@ -61981,6 +67260,9 @@ catalog: value: MA-04e.[01] class: sp800-53a prose: session connections are terminated when nonlocal maintenance is completed; + links: + - href: '#ma-4_smt.e' + rel: assessment-for - id: ma-4_obj.e-2 name: assessment-objective props: @@ -61988,6 +67270,15 @@ catalog: value: MA-04e.[02] class: sp800-53a prose: network connections are terminated when nonlocal maintenance is completed. + links: + - href: '#ma-4_smt.e' + rel: assessment-for + links: + - href: '#ma-4_smt.e' + rel: assessment-for + links: + - href: '#ma-4_smt' + rel: assessment-for - id: ma-4_asm-examine name: assessment-method props: @@ -62145,6 +67436,9 @@ catalog: value: MA-04(01)(a)[01] class: sp800-53a prose: '{{ insert: param, ma-04.01_odp.01 }} are logged for nonlocal maintenance sessions;' + links: + - href: '#ma-4.1_smt.a' + rel: assessment-for - id: ma-4.1_obj.a-2 name: assessment-objective props: @@ -62152,6 +67446,12 @@ catalog: value: MA-04(01)(a)[02] class: sp800-53a prose: '{{ insert: param, ma-04.01_odp.02 }} are logged for nonlocal diagnostic sessions;' + links: + - href: '#ma-4.1_smt.a' + rel: assessment-for + links: + - href: '#ma-4.1_smt.a' + rel: assessment-for - id: ma-4.1_obj.b name: assessment-objective props: @@ -62166,6 +67466,9 @@ catalog: value: MA-04(01)(b)[01] class: sp800-53a prose: the audit records of the maintenance sessions are reviewed to detect anomalous behavior; + links: + - href: '#ma-4.1_smt.b' + rel: assessment-for - id: ma-4.1_obj.b-2 name: assessment-objective props: @@ -62173,6 +67476,15 @@ catalog: value: MA-04(01)(b)[02] class: sp800-53a prose: the audit records of the diagnostic sessions are reviewed to detect anomalous behavior. + links: + - href: '#ma-4.1_smt.b' + rel: assessment-for + links: + - href: '#ma-4.1_smt.b' + rel: assessment-for + links: + - href: '#ma-4.1_smt' + rel: assessment-for - id: ma-4.1_asm-examine name: assessment-method props: @@ -62319,6 +67631,9 @@ catalog: value: MA-04(03)(a)[01] class: sp800-53a prose: nonlocal maintenance services are required to be performed from a system that implements a security capability comparable to the capability implemented on the system being serviced; + links: + - href: '#ma-4.3_smt.a' + rel: assessment-for - id: ma-4.3_obj.a-2 name: assessment-objective props: @@ -62326,6 +67641,12 @@ catalog: value: MA-04(03)(a)[02] class: sp800-53a prose: nonlocal diagnostic services are required to be performed from a system that implements a security capability comparable to the capability implemented on the system being serviced; or + links: + - href: '#ma-4.3_smt.a' + rel: assessment-for + links: + - href: '#ma-4.3_smt.a' + rel: assessment-for - id: ma-4.3_obj.b name: assessment-objective props: @@ -62340,6 +67661,9 @@ catalog: value: MA-04(03)(b)[01] class: sp800-53a prose: the component to be serviced is removed from the system prior to nonlocal maintenance or diagnostic services; + links: + - href: '#ma-4.3_smt.b' + rel: assessment-for - id: ma-4.3_obj.b-2 name: assessment-objective props: @@ -62347,6 +67671,9 @@ catalog: value: MA-04(03)(b)[02] class: sp800-53a prose: the component to be serviced is sanitized (for organizational information); + links: + - href: '#ma-4.3_smt.b' + rel: assessment-for - id: ma-4.3_obj.b-3 name: assessment-objective props: @@ -62354,6 +67681,15 @@ catalog: value: MA-04(03)(b)[03] class: sp800-53a prose: the component is inspected and sanitized (for potentially malicious software) after the service is performed and before reconnecting the component to the system. + links: + - href: '#ma-4.3_smt.b' + rel: assessment-for + links: + - href: '#ma-4.3_smt.b' + rel: assessment-for + links: + - href: '#ma-4.3_smt' + rel: assessment-for - id: ma-4.3_asm-examine name: assessment-method props: @@ -62498,6 +67834,9 @@ catalog: value: MA-04(04)(a) class: sp800-53a prose: 'nonlocal maintenance sessions are protected by employing {{ insert: param, ma-04.04_odp }};' + links: + - href: '#ma-4.4_smt.a' + rel: assessment-for - id: ma-4.4_obj.b name: assessment-objective props: @@ -62512,6 +67851,9 @@ catalog: value: MA-04(04)(b)(01) class: sp800-53a prose: nonlocal maintenance sessions are protected by separating maintenance sessions from other network sessions with the system by physically separated communication paths; or + links: + - href: '#ma-4.4_smt.b.1' + rel: assessment-for - id: ma-4.4_obj.b.2 name: assessment-objective props: @@ -62519,6 +67861,15 @@ catalog: value: MA-04(04)(b)(02) class: sp800-53a prose: nonlocal maintenance sessions are protected by logically separated communication paths. + links: + - href: '#ma-4.4_smt.b.2' + rel: assessment-for + links: + - href: '#ma-4.4_smt.b' + rel: assessment-for + links: + - href: '#ma-4.4_smt' + rel: assessment-for - id: ma-4.4_asm-examine name: assessment-method props: @@ -62656,6 +68007,9 @@ catalog: value: MA-04(05)(a) class: sp800-53a prose: 'the approval of each nonlocal maintenance session is required by {{ insert: param, ma-04.05_odp.01 }};' + links: + - href: '#ma-4.5_smt.a' + rel: assessment-for - id: ma-4.5_obj.b name: assessment-objective props: @@ -62663,6 +68017,12 @@ catalog: value: MA-04(05)(b) class: sp800-53a prose: '{{ insert: param, ma-04.05_odp.02 }} is/are notified of the date and time of planned nonlocal maintenance.' + links: + - href: '#ma-4.5_smt.b' + rel: assessment-for + links: + - href: '#ma-4.5_smt' + rel: assessment-for - id: ma-4.5_asm-examine name: assessment-method props: @@ -62780,6 +68140,9 @@ catalog: value: MA-04(06)[01] class: sp800-53a prose: '{{ insert: param, ma-04.06_odp }} are implemented to protect the integrity of nonlocal maintenance and diagnostic communications;' + links: + - href: '#ma-4.6_smt' + rel: assessment-for - id: ma-4.6_obj-2 name: assessment-objective props: @@ -62787,6 +68150,12 @@ catalog: value: MA-04(06)[02] class: sp800-53a prose: '{{ insert: param, ma-04.06_odp }} are implemented to protect the confidentiality of nonlocal maintenance and diagnostic communications.' + links: + - href: '#ma-4.6_smt' + rel: assessment-for + links: + - href: '#ma-4.6_smt' + rel: assessment-for - id: ma-4.6_asm-examine name: assessment-method props: @@ -62889,6 +68258,9 @@ catalog: value: MA-04(07)[01] class: sp800-53a prose: session connection termination is verified after the completion of nonlocal maintenance and diagnostic sessions; + links: + - href: '#ma-4.7_smt' + rel: assessment-for - id: ma-4.7_obj-2 name: assessment-objective props: @@ -62896,6 +68268,12 @@ catalog: value: MA-04(07)[02] class: sp800-53a prose: network connection termination is verified after the completion of nonlocal maintenance and diagnostic sessions. + links: + - href: '#ma-4.7_smt' + rel: assessment-for + links: + - href: '#ma-4.7_smt' + rel: assessment-for - id: ma-4.7_asm-examine name: assessment-method props: @@ -63045,6 +68423,9 @@ catalog: value: MA-05a.[01] class: sp800-53a prose: a process for maintenance personnel authorization is established; + links: + - href: '#ma-5_smt.a' + rel: assessment-for - id: ma-5_obj.a-2 name: assessment-objective props: @@ -63052,6 +68433,12 @@ catalog: value: MA-05a.[02] class: sp800-53a prose: a list of authorized maintenance organizations or personnel is maintained; + links: + - href: '#ma-5_smt.a' + rel: assessment-for + links: + - href: '#ma-5_smt.a' + rel: assessment-for - id: ma-5_obj.b name: assessment-objective props: @@ -63059,6 +68446,9 @@ catalog: value: MA-05b. class: sp800-53a prose: non-escorted personnel performing maintenance on the system possess the required access authorizations; + links: + - href: '#ma-5_smt.b' + rel: assessment-for - id: ma-5_obj.c name: assessment-objective props: @@ -63066,6 +68456,12 @@ catalog: value: MA-05c. class: sp800-53a prose: organizational personnel with required access authorizations and technical competence is/are designated to supervise the maintenance activities of personnel who do not possess the required access authorizations. + links: + - href: '#ma-5_smt.c' + rel: assessment-for + links: + - href: '#ma-5_smt' + rel: assessment-for - id: ma-5_asm-examine name: assessment-method props: @@ -63211,6 +68607,9 @@ catalog: value: MA-05(01)(a)(01) class: sp800-53a prose: procedures for the use of maintenance personnel who lack appropriate security clearances or are not U.S. citizens are implemented and include approved organizational personnel who are fully cleared, have appropriate access authorizations, and are technically qualified escorting and supervising maintenance personnel without the needed access authorization during the performance of maintenance and diagnostic activities; + links: + - href: '#ma-5.1_smt.a.1' + rel: assessment-for - id: ma-5.1_obj.a.2 name: assessment-objective props: @@ -63218,6 +68617,12 @@ catalog: value: MA-05(01)(a)(02) class: sp800-53a prose: procedures for the use of maintenance personnel who lack appropriate security clearances or are not U.S. citizens are implemented and include all volatile information storage components within the system being sanitized and all non-volatile storage media being removed or physically disconnected from the system and secured prior to initiating maintenance or diagnostic activities; + links: + - href: '#ma-5.1_smt.a.2' + rel: assessment-for + links: + - href: '#ma-5.1_smt.a' + rel: assessment-for - id: ma-5.1_obj.b name: assessment-objective props: @@ -63225,6 +68630,12 @@ catalog: value: MA-05(01)(b) class: sp800-53a prose: '{{ insert: param, ma-05.01_odp }} are developed and implemented in the event that a system cannot be sanitized, removed, or disconnected from the system.' + links: + - href: '#ma-5.1_smt.b' + rel: assessment-for + links: + - href: '#ma-5.1_smt' + rel: assessment-for - id: ma-5.1_asm-examine name: assessment-method props: @@ -63334,6 +68745,9 @@ catalog: value: MA-05(02)[01] class: sp800-53a prose: personnel performing maintenance and diagnostic activities on a system processing, storing, or transmitting classified information possess security clearances for at least the highest classification level and for compartments of information on the system; + links: + - href: '#ma-5.2_smt' + rel: assessment-for - id: ma-5.2_obj-2 name: assessment-objective props: @@ -63341,6 +68755,12 @@ catalog: value: MA-05(02)[02] class: sp800-53a prose: personnel performing maintenance and diagnostic activities on a system processing, storing, or transmitting classified information possess formal access approvals for at least the highest classification level and for compartments of information on the system. + links: + - href: '#ma-5.2_smt' + rel: assessment-for + links: + - href: '#ma-5.2_smt' + rel: assessment-for - id: ma-5.2_asm-examine name: assessment-method props: @@ -63434,6 +68854,9 @@ catalog: value: MA-05(03) class: sp800-53a prose: personnel performing maintenance and diagnostic activities on a system processing, storing, or transmitting classified information are U.S. citizens. + links: + - href: '#ma-5.3_smt' + rel: assessment-for - id: ma-5.3_asm-examine name: assessment-method props: @@ -63533,6 +68956,9 @@ catalog: value: MA-05(04)(a) class: sp800-53a prose: foreign nationals with appropriate security clearances are used to conduct maintenance and diagnostic activities on classified systems only when the systems are jointly owned and operated by the United States and foreign allied governments or owned and operated solely by foreign allied governments; + links: + - href: '#ma-5.4_smt.a' + rel: assessment-for - id: ma-5.4_obj.b name: assessment-objective props: @@ -63547,6 +68973,9 @@ catalog: value: MA-05(04)(b)[01] class: sp800-53a prose: approvals regarding the use of foreign nationals to conduct maintenance and diagnostic activities on classified systems are fully documented within Memoranda of Agreements; + links: + - href: '#ma-5.4_smt.b' + rel: assessment-for - id: ma-5.4_obj.b-2 name: assessment-objective props: @@ -63554,6 +68983,9 @@ catalog: value: MA-05(04)(b)[02] class: sp800-53a prose: consents regarding the use of foreign nationals to conduct maintenance and diagnostic activities on classified systems are fully documented within Memoranda of Agreements; + links: + - href: '#ma-5.4_smt.b' + rel: assessment-for - id: ma-5.4_obj.b-3 name: assessment-objective props: @@ -63561,6 +68993,15 @@ catalog: value: MA-05(04)(b)[03] class: sp800-53a prose: detailed operational conditions regarding the use of foreign nationals to conduct maintenance and diagnostic activities on classified systems are fully documented within Memoranda of Agreements. + links: + - href: '#ma-5.4_smt.b' + rel: assessment-for + links: + - href: '#ma-5.4_smt.b' + rel: assessment-for + links: + - href: '#ma-5.4_smt' + rel: assessment-for - id: ma-5.4_asm-examine name: assessment-method props: @@ -63656,6 +69097,9 @@ catalog: value: MA-05(05) class: sp800-53a prose: non-escorted personnel performing maintenance activities not directly associated with the system but in the physical proximity of the system have required access authorizations. + links: + - href: '#ma-5.5_smt' + rel: assessment-for - id: ma-5.5_asm-examine name: assessment-method props: @@ -63774,6 +69218,9 @@ catalog: value: MA-06 class: sp800-53a prose: 'maintenance support and/or spare parts are obtained for {{ insert: param, ma-06_odp.01 }} within {{ insert: param, ma-06_odp.02 }} of failure.' + links: + - href: '#ma-6_smt' + rel: assessment-for - id: ma-6_asm-examine name: assessment-method props: @@ -63883,6 +69330,9 @@ catalog: value: MA-06(01) class: sp800-53a prose: 'preventive maintenance is performed on {{ insert: param, ma-06.01_odp.01 }} at {{ insert: param, ma-06.01_odp.02 }}.' + links: + - href: '#ma-6.1_smt' + rel: assessment-for - id: ma-6.1_asm-examine name: assessment-method props: @@ -63994,6 +69444,9 @@ catalog: value: MA-06(02) class: sp800-53a prose: 'predictive maintenance is performed on {{ insert: param, ma-06.02_odp.01 }} at {{ insert: param, ma-06.02_odp.02 }}.' + links: + - href: '#ma-6.2_smt' + rel: assessment-for - id: ma-6.2_asm-examine name: assessment-method props: @@ -64095,6 +69548,9 @@ catalog: value: MA-06(03) class: sp800-53a prose: 'predictive maintenance data is transferred to a maintenance management system using {{ insert: param, ma-06.03_odp }}.' + links: + - href: '#ma-6.3_smt' + rel: assessment-for - id: ma-6.3_asm-examine name: assessment-method props: @@ -64210,6 +69666,9 @@ catalog: value: MA-07 class: sp800-53a prose: 'field maintenance on {{ insert: param, ma-07_odp.01 }} are restricted or prohibited to {{ insert: param, ma-07_odp.02 }}.' + links: + - href: '#ma-7_smt' + rel: assessment-for - id: ma-7_asm-examine name: assessment-method props: @@ -64485,6 +69944,9 @@ catalog: value: MP-01a.[01] class: sp800-53a prose: a media protection policy is developed and documented; + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.a-2 name: assessment-objective props: @@ -64492,6 +69954,9 @@ catalog: value: MP-01a.[02] class: sp800-53a prose: 'the media protection policy is disseminated to {{ insert: param, mp-01_odp.01 }};' + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.a-3 name: assessment-objective props: @@ -64499,6 +69964,9 @@ catalog: value: MP-01a.[03] class: sp800-53a prose: media protection procedures to facilitate the implementation of the media protection policy and associated media protection controls are developed and documented; + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.a-4 name: assessment-objective props: @@ -64506,6 +69974,9 @@ catalog: value: MP-01a.[04] class: sp800-53a prose: 'the media protection procedures are disseminated to {{ insert: param, mp-01_odp.02 }};' + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.a.1 name: assessment-objective props: @@ -64527,6 +69998,9 @@ catalog: value: MP-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses purpose;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-2 name: assessment-objective props: @@ -64534,6 +70008,9 @@ catalog: value: MP-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses scope;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-3 name: assessment-objective props: @@ -64541,6 +70018,9 @@ catalog: value: MP-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses roles;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-4 name: assessment-objective props: @@ -64548,6 +70028,9 @@ catalog: value: MP-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses responsibilities;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-5 name: assessment-objective props: @@ -64555,6 +70038,9 @@ catalog: value: MP-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses management commitment;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-6 name: assessment-objective props: @@ -64562,6 +70048,9 @@ catalog: value: MP-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy addresses coordination among organizational entities;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.a-7 name: assessment-objective props: @@ -64569,6 +70058,12 @@ catalog: value: MP-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.03 }} media protection policy compliance;' + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#mp-1_smt.a.1.a' + rel: assessment-for - id: mp-1_obj.a.1.b name: assessment-objective props: @@ -64576,6 +70071,15 @@ catalog: value: MP-01a.01(b) class: sp800-53a prose: the media protection policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines; + links: + - href: '#mp-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#mp-1_smt.a.1' + rel: assessment-for + links: + - href: '#mp-1_smt.a' + rel: assessment-for - id: mp-1_obj.b name: assessment-objective props: @@ -64583,6 +70087,9 @@ catalog: value: MP-01b. class: sp800-53a prose: 'the {{ insert: param, mp-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the media protection policy and procedures.' + links: + - href: '#mp-1_smt.b' + rel: assessment-for - id: mp-1_obj.c name: assessment-objective props: @@ -64604,6 +70111,9 @@ catalog: value: MP-01c.01[01] class: sp800-53a prose: 'the current media protection policy is reviewed and updated {{ insert: param, mp-01_odp.05 }}; ' + links: + - href: '#mp-1_smt.c.1' + rel: assessment-for - id: mp-1_obj.c.1-2 name: assessment-objective props: @@ -64611,6 +70121,12 @@ catalog: value: MP-01c.01[02] class: sp800-53a prose: 'the current media protection policy is reviewed and updated following {{ insert: param, mp-01_odp.06 }};' + links: + - href: '#mp-1_smt.c.1' + rel: assessment-for + links: + - href: '#mp-1_smt.c.1' + rel: assessment-for - id: mp-1_obj.c.2 name: assessment-objective props: @@ -64625,6 +70141,9 @@ catalog: value: MP-01c.02[01] class: sp800-53a prose: 'the current media protection procedures are reviewed and updated {{ insert: param, mp-01_odp.07 }}; ' + links: + - href: '#mp-1_smt.c.2' + rel: assessment-for - id: mp-1_obj.c.2-2 name: assessment-objective props: @@ -64632,6 +70151,18 @@ catalog: value: MP-01c.02[02] class: sp800-53a prose: 'the current media protection procedures are reviewed and updated following {{ insert: param, mp-01_odp.08 }}.' + links: + - href: '#mp-1_smt.c.2' + rel: assessment-for + links: + - href: '#mp-1_smt.c.2' + rel: assessment-for + links: + - href: '#mp-1_smt.c' + rel: assessment-for + links: + - href: '#mp-1_smt' + rel: assessment-for - id: mp-1_asm-examine name: assessment-method props: @@ -64789,6 +70320,9 @@ catalog: value: MP-02[01] class: sp800-53a prose: 'access to {{ insert: param, mp-02_odp.01 }} is restricted to {{ insert: param, mp-02_odp.02 }};' + links: + - href: '#mp-2_smt' + rel: assessment-for - id: mp-2_obj-2 name: assessment-objective props: @@ -64796,6 +70330,12 @@ catalog: value: MP-02[02] class: sp800-53a prose: 'access to {{ insert: param, mp-02_odp.03 }} is restricted to {{ insert: param, mp-02_odp.04 }}.' + links: + - href: '#mp-2_smt' + rel: assessment-for + links: + - href: '#mp-2_smt' + rel: assessment-for - id: mp-2_asm-examine name: assessment-method props: @@ -64976,6 +70516,9 @@ catalog: value: MP-03a. class: sp800-53a prose: system media is marked to indicate distribution limitations, handling caveats, and applicable security markings (if any) of the information; + links: + - href: '#mp-3_smt.a' + rel: assessment-for - id: mp-3_obj.b name: assessment-objective props: @@ -64983,6 +70526,12 @@ catalog: value: MP-03b. class: sp800-53a prose: '{{ insert: param, mp-03_odp.01 }} remain within {{ insert: param, mp-03_odp.02 }}.' + links: + - href: '#mp-3_smt.b' + rel: assessment-for + links: + - href: '#mp-3_smt' + rel: assessment-for - id: mp-3_asm-examine name: assessment-method props: @@ -65210,6 +70759,9 @@ catalog: value: MP-04a.[01] class: sp800-53a prose: '{{ insert: param, mp-04_odp.01 }} are physically controlled;' + links: + - href: '#mp-4_smt.a' + rel: assessment-for - id: mp-4_obj.a-2 name: assessment-objective props: @@ -65217,6 +70769,9 @@ catalog: value: MP-04a.[02] class: sp800-53a prose: '{{ insert: param, mp-04_odp.02 }} are physically controlled;' + links: + - href: '#mp-4_smt.a' + rel: assessment-for - id: mp-4_obj.a-3 name: assessment-objective props: @@ -65224,6 +70779,9 @@ catalog: value: MP-04a.[03] class: sp800-53a prose: '{{ insert: param, mp-04_odp.03 }} are securely stored within {{ insert: param, mp-04_odp.05 }};' + links: + - href: '#mp-4_smt.a' + rel: assessment-for - id: mp-4_obj.a-4 name: assessment-objective props: @@ -65231,6 +70789,12 @@ catalog: value: MP-04a.[04] class: sp800-53a prose: '{{ insert: param, mp-04_odp.04 }} are securely stored within {{ insert: param, mp-04_odp.06 }};' + links: + - href: '#mp-4_smt.a' + rel: assessment-for + links: + - href: '#mp-4_smt.a' + rel: assessment-for - id: mp-4_obj.b name: assessment-objective props: @@ -65238,6 +70802,12 @@ catalog: value: MP-04b. class: sp800-53a prose: system media types (defined in MP-04_ODP[01], MP-04_ODP[02], MP-04_ODP[03], MP-04_ODP[04]) are protected until the media are destroyed or sanitized using approved equipment, techniques, and procedures. + links: + - href: '#mp-4_smt.b' + rel: assessment-for + links: + - href: '#mp-4_smt' + rel: assessment-for - id: mp-4_asm-examine name: assessment-method props: @@ -65399,6 +70969,9 @@ catalog: value: MP-04(02)[01] class: sp800-53a prose: 'access to media storage areas is restricted using {{ insert: param, mp-04.02_odp.01 }};' + links: + - href: '#mp-4.2_smt' + rel: assessment-for - id: mp-4.2_obj-2 name: assessment-objective props: @@ -65406,6 +70979,9 @@ catalog: value: MP-04(02)[02] class: sp800-53a prose: 'access attempts to media storage areas are logged using {{ insert: param, mp-04.02_odp.02 }};' + links: + - href: '#mp-4.2_smt' + rel: assessment-for - id: mp-4.2_obj-3 name: assessment-objective props: @@ -65413,6 +70989,12 @@ catalog: value: MP-04(02)[03] class: sp800-53a prose: 'access granted to media storage areas is logged using {{ insert: param, mp-04.02_odp.03 }}.' + links: + - href: '#mp-4.2_smt' + rel: assessment-for + links: + - href: '#mp-4.2_smt' + rel: assessment-for - id: mp-4.2_asm-examine name: assessment-method props: @@ -65613,6 +71195,9 @@ catalog: value: MP-05a.[01] class: sp800-53a prose: '{{ insert: param, mp-05_odp.01 }} are protected during transport outside of controlled areas using {{ insert: param, mp-05_odp.02 }};' + links: + - href: '#mp-5_smt.a' + rel: assessment-for - id: mp-5_obj.a-2 name: assessment-objective props: @@ -65620,6 +71205,12 @@ catalog: value: MP-05a.[02] class: sp800-53a prose: '{{ insert: param, mp-05_odp.01 }} are controlled during transport outside of controlled areas using {{ insert: param, mp-05_odp.03 }};' + links: + - href: '#mp-5_smt.a' + rel: assessment-for + links: + - href: '#mp-5_smt.a' + rel: assessment-for - id: mp-5_obj.b name: assessment-objective props: @@ -65627,6 +71218,9 @@ catalog: value: MP-05b. class: sp800-53a prose: accountability for system media is maintained during transport outside of controlled areas; + links: + - href: '#mp-5_smt.b' + rel: assessment-for - id: mp-5_obj.c name: assessment-objective props: @@ -65634,6 +71228,9 @@ catalog: value: MP-05c. class: sp800-53a prose: activities associated with the transport of system media are documented; + links: + - href: '#mp-5_smt.c' + rel: assessment-for - id: mp-5_obj.d name: assessment-objective props: @@ -65648,6 +71245,9 @@ catalog: value: MP-05d.[01] class: sp800-53a prose: personnel authorized to conduct media transport activities is/are identified; + links: + - href: '#mp-5_smt.d' + rel: assessment-for - id: mp-5_obj.d-2 name: assessment-objective props: @@ -65655,6 +71255,15 @@ catalog: value: MP-05d.[02] class: sp800-53a prose: activities associated with the transport of system media are restricted to identified authorized personnel. + links: + - href: '#mp-5_smt.d' + rel: assessment-for + links: + - href: '#mp-5_smt.d' + rel: assessment-for + links: + - href: '#mp-5_smt' + rel: assessment-for - id: mp-5_asm-examine name: assessment-method props: @@ -65787,6 +71396,9 @@ catalog: value: MP-05(03)[01] class: sp800-53a prose: a custodian to transport system media outside of controlled areas is identified; + links: + - href: '#mp-5.3_smt' + rel: assessment-for - id: mp-5.3_obj-2 name: assessment-objective props: @@ -65794,6 +71406,12 @@ catalog: value: MP-05(03)[02] class: sp800-53a prose: the identified custodian is employed during the transport of system media outside of controlled areas. + links: + - href: '#mp-5.3_smt' + rel: assessment-for + links: + - href: '#mp-5.3_smt' + rel: assessment-for - id: mp-5.3_asm-examine name: assessment-method props: @@ -66034,6 +71652,9 @@ catalog: value: MP-06a.[01] class: sp800-53a prose: '{{ insert: param, mp-06_odp.01 }} is sanitized using {{ insert: param, mp-06_odp.04 }} prior to disposal;' + links: + - href: '#mp-6_smt.a' + rel: assessment-for - id: mp-6_obj.a-2 name: assessment-objective props: @@ -66041,6 +71662,9 @@ catalog: value: MP-06a.[02] class: sp800-53a prose: '{{ insert: param, mp-06_odp.02 }} is sanitized using {{ insert: param, mp-06_odp.05 }} prior to release from organizational control;' + links: + - href: '#mp-6_smt.a' + rel: assessment-for - id: mp-6_obj.a-3 name: assessment-objective props: @@ -66048,6 +71672,12 @@ catalog: value: MP-06a.[03] class: sp800-53a prose: '{{ insert: param, mp-06_odp.03 }} is sanitized using {{ insert: param, mp-06_odp.06 }} prior to release for reuse;' + links: + - href: '#mp-6_smt.a' + rel: assessment-for + links: + - href: '#mp-6_smt.a' + rel: assessment-for - id: mp-6_obj.b name: assessment-objective props: @@ -66055,6 +71685,12 @@ catalog: value: MP-06b. class: sp800-53a prose: sanitization mechanisms with strength and integrity commensurate with the security category or classification of the information are employed. + links: + - href: '#mp-6_smt.b' + rel: assessment-for + links: + - href: '#mp-6_smt' + rel: assessment-for - id: mp-6_asm-examine name: assessment-method props: @@ -66163,6 +71799,9 @@ catalog: value: MP-06(01)[01] class: sp800-53a prose: media sanitization and disposal actions are reviewed; + links: + - href: '#mp-6.1_smt' + rel: assessment-for - id: mp-6.1_obj-2 name: assessment-objective props: @@ -66170,6 +71809,9 @@ catalog: value: MP-06(01)[02] class: sp800-53a prose: media sanitization and disposal actions are approved; + links: + - href: '#mp-6.1_smt' + rel: assessment-for - id: mp-6.1_obj-3 name: assessment-objective props: @@ -66177,6 +71819,9 @@ catalog: value: MP-06(01)[03] class: sp800-53a prose: media sanitization and disposal actions are tracked; + links: + - href: '#mp-6.1_smt' + rel: assessment-for - id: mp-6.1_obj-4 name: assessment-objective props: @@ -66184,6 +71829,9 @@ catalog: value: MP-06(01)[04] class: sp800-53a prose: media sanitization and disposal actions are documented; + links: + - href: '#mp-6.1_smt' + rel: assessment-for - id: mp-6.1_obj-5 name: assessment-objective props: @@ -66191,6 +71839,12 @@ catalog: value: MP-06(01)[05] class: sp800-53a prose: media sanitization and disposal actions are verified. + links: + - href: '#mp-6.1_smt' + rel: assessment-for + links: + - href: '#mp-6.1_smt' + rel: assessment-for - id: mp-6.1_asm-examine name: assessment-method props: @@ -66328,6 +71982,9 @@ catalog: value: MP-06(02)[01] class: sp800-53a prose: 'sanitization equipment is tested {{ insert: param, mp-06.02_odp.01 }} to ensure that the intended sanitization is being achieved;' + links: + - href: '#mp-6.2_smt' + rel: assessment-for - id: mp-6.2_obj-2 name: assessment-objective props: @@ -66335,6 +71992,12 @@ catalog: value: MP-06(02)[02] class: sp800-53a prose: 'sanitization procedures are tested {{ insert: param, mp-06.02_odp.02 }} to ensure that the intended sanitization is being achieved.' + links: + - href: '#mp-6.2_smt' + rel: assessment-for + links: + - href: '#mp-6.2_smt' + rel: assessment-for - id: mp-6.2_asm-examine name: assessment-method props: @@ -66447,6 +72110,9 @@ catalog: value: MP-06(03) class: sp800-53a prose: 'non-destructive sanitization techniques are applied to portable storage devices prior to connecting such devices to the system under {{ insert: param, mp-06.03_odp }}.' + links: + - href: '#mp-6.3_smt' + rel: assessment-for - id: mp-6.3_asm-examine name: assessment-method props: @@ -66598,6 +72264,9 @@ catalog: value: MP-06(07) class: sp800-53a prose: 'dual authorization for sanitization of {{ insert: param, mp-06.07_odp }} is enforced.' + links: + - href: '#mp-6.7_smt' + rel: assessment-for - id: mp-6.7_asm-examine name: assessment-method props: @@ -66724,6 +72393,9 @@ catalog: value: MP-06(08) class: sp800-53a prose: 'the capability to purge or wipe information from {{ insert: param, mp-06.08_odp.01 }} {{ insert: param, mp-06.08_odp.02 }} is provided.' + links: + - href: '#mp-6.8_smt' + rel: assessment-for - id: mp-6.8_asm-examine name: assessment-method props: @@ -66891,6 +72563,9 @@ catalog: value: MP-07a. class: sp800-53a prose: 'the use of {{ insert: param, mp-07_odp.01 }} is {{ insert: param, mp-07_odp.02 }} on {{ insert: param, mp-07_odp.03 }} using {{ insert: param, mp-07_odp.04 }};' + links: + - href: '#mp-7_smt.a' + rel: assessment-for - id: mp-7_obj.b name: assessment-objective props: @@ -66898,6 +72573,12 @@ catalog: value: MP-07b. class: sp800-53a prose: the use of portable storage devices in organizational systems is prohibited when such devices have no identifiable owner. + links: + - href: '#mp-7_smt.b' + rel: assessment-for + links: + - href: '#mp-7_smt' + rel: assessment-for - id: mp-7_asm-examine name: assessment-method props: @@ -67016,6 +72697,9 @@ catalog: value: MP-07(02)[01] class: sp800-53a prose: sanitization-resistant media is identified; + links: + - href: '#mp-7.2_smt' + rel: assessment-for - id: mp-7.2_obj-2 name: assessment-objective props: @@ -67023,6 +72707,12 @@ catalog: value: MP-07(02)[02] class: sp800-53a prose: the use of sanitization-resistant media in organizational systems is prohibited. + links: + - href: '#mp-7.2_smt' + rel: assessment-for + links: + - href: '#mp-7.2_smt' + rel: assessment-for - id: mp-7.2_asm-examine name: assessment-method props: @@ -67172,6 +72862,9 @@ catalog: value: MP-08a.[01] class: sp800-53a prose: 'a {{ insert: param, mp-08_odp.01 }} is established;' + links: + - href: '#mp-8_smt.a' + rel: assessment-for - id: mp-8_obj.a-2 name: assessment-objective props: @@ -67179,6 +72872,12 @@ catalog: value: MP-08a.[02] class: sp800-53a prose: 'the {{ insert: param, mp-08_odp.01 }} includes employing downgrading mechanisms with strength and integrity commensurate with the security category or classification of the information;' + links: + - href: '#mp-8_smt.a' + rel: assessment-for + links: + - href: '#mp-8_smt.a' + rel: assessment-for - id: mp-8_obj.b name: assessment-objective props: @@ -67193,6 +72892,9 @@ catalog: value: MP-08b.[01] class: sp800-53a prose: there is verification that the system media downgrading process is commensurate with the security category and/or classification level of the information to be removed; + links: + - href: '#mp-8_smt.b' + rel: assessment-for - id: mp-8_obj.b-2 name: assessment-objective props: @@ -67200,6 +72902,12 @@ catalog: value: MP-08b.[02] class: sp800-53a prose: there is verification that the system media downgrading process is commensurate with the access authorizations of the potential recipients of the downgraded information; + links: + - href: '#mp-8_smt.b' + rel: assessment-for + links: + - href: '#mp-8_smt.b' + rel: assessment-for - id: mp-8_obj.c name: assessment-objective props: @@ -67207,6 +72915,9 @@ catalog: value: MP-08c. class: sp800-53a prose: '{{ insert: param, mp-08_odp.02 }} is identified;' + links: + - href: '#mp-8_smt.c' + rel: assessment-for - id: mp-8_obj.d name: assessment-objective props: @@ -67214,6 +72925,12 @@ catalog: value: MP-08d. class: sp800-53a prose: 'the identified system media is downgraded using the {{ insert: param, mp-08_odp.01 }}.' + links: + - href: '#mp-8_smt.d' + rel: assessment-for + links: + - href: '#mp-8_smt' + rel: assessment-for - id: mp-8_asm-examine name: assessment-method props: @@ -67305,6 +73022,9 @@ catalog: value: MP-08(01) class: sp800-53a prose: system media downgrading actions are documented. + links: + - href: '#mp-8.1_smt' + rel: assessment-for - id: mp-8.1_asm-examine name: assessment-method props: @@ -67428,6 +73148,9 @@ catalog: value: MP-08(02)[01] class: sp800-53a prose: 'downgrading equipment is tested {{ insert: param, mp-08.02_odp.01 }} to ensure that downgrading actions are being achieved;' + links: + - href: '#mp-8.2_smt' + rel: assessment-for - id: mp-8.2_obj-2 name: assessment-objective props: @@ -67435,6 +73158,12 @@ catalog: value: MP-08(02)[02] class: sp800-53a prose: 'downgrading procedures are tested {{ insert: param, mp-08.02_odp.02 }} to ensure that downgrading actions are being achieved.' + links: + - href: '#mp-8.2_smt' + rel: assessment-for + links: + - href: '#mp-8.2_smt' + rel: assessment-for - id: mp-8.2_asm-examine name: assessment-method props: @@ -67530,6 +73259,9 @@ catalog: value: MP-08(03)[01] class: sp800-53a prose: system media containing controlled unclassified information is identified; + links: + - href: '#mp-8.3_smt' + rel: assessment-for - id: mp-8.3_obj-2 name: assessment-objective props: @@ -67537,6 +73269,12 @@ catalog: value: MP-08(03)[02] class: sp800-53a prose: system media containing controlled unclassified information is downgraded prior to public release. + links: + - href: '#mp-8.3_smt' + rel: assessment-for + links: + - href: '#mp-8.3_smt' + rel: assessment-for - id: mp-8.3_asm-examine name: assessment-method props: @@ -67630,6 +73368,9 @@ catalog: value: MP-08(04)[01] class: sp800-53a prose: system media containing classified information is identified; + links: + - href: '#mp-8.4_smt' + rel: assessment-for - id: mp-8.4_obj-2 name: assessment-objective props: @@ -67637,6 +73378,12 @@ catalog: value: MP-08(04)[02] class: sp800-53a prose: system media containing classified information is downgraded prior to release to individuals without required access authorizations. + links: + - href: '#mp-8.4_smt' + rel: assessment-for + links: + - href: '#mp-8.4_smt' + rel: assessment-for - id: mp-8.4_asm-examine name: assessment-method props: @@ -67906,6 +73653,9 @@ catalog: value: PE-01a.[01] class: sp800-53a prose: a physical and environmental protection policy is developed and documented; + links: + - href: '#pe-1_smt.a' + rel: assessment-for - id: pe-1_obj.a-2 name: assessment-objective props: @@ -67913,6 +73663,9 @@ catalog: value: PE-01a.[02] class: sp800-53a prose: 'the physical and environmental protection policy is disseminated to {{ insert: param, pe-01_odp.01 }};' + links: + - href: '#pe-1_smt.a' + rel: assessment-for - id: pe-1_obj.a-3 name: assessment-objective props: @@ -67920,6 +73673,9 @@ catalog: value: PE-01a.[03] class: sp800-53a prose: physical and environmental protection procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls are developed and documented; + links: + - href: '#pe-1_smt.a' + rel: assessment-for - id: pe-1_obj.a-4 name: assessment-objective props: @@ -67927,6 +73683,9 @@ catalog: value: PE-01a.[04] class: sp800-53a prose: 'the physical and environmental protection procedures are disseminated to {{ insert: param, pe-01_odp.02 }};' + links: + - href: '#pe-1_smt.a' + rel: assessment-for - id: pe-1_obj.a.1 name: assessment-objective props: @@ -67948,6 +73707,9 @@ catalog: value: PE-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses purpose;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-2 name: assessment-objective props: @@ -67955,6 +73717,9 @@ catalog: value: PE-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses scope;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-3 name: assessment-objective props: @@ -67962,6 +73727,9 @@ catalog: value: PE-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses roles;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-4 name: assessment-objective props: @@ -67969,6 +73737,9 @@ catalog: value: PE-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses responsibilities;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-5 name: assessment-objective props: @@ -67976,6 +73747,9 @@ catalog: value: PE-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses management commitment;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-6 name: assessment-objective props: @@ -67983,6 +73757,9 @@ catalog: value: PE-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses coordination among organizational entities;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.a-7 name: assessment-objective props: @@ -67990,6 +73767,12 @@ catalog: value: PE-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy addresses compliance;' + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#pe-1_smt.a.1.a' + rel: assessment-for - id: pe-1_obj.a.1.b name: assessment-objective props: @@ -67997,6 +73780,15 @@ catalog: value: PE-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.03 }} physical and environmental protection policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#pe-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#pe-1_smt.a.1' + rel: assessment-for + links: + - href: '#pe-1_smt.a' + rel: assessment-for - id: pe-1_obj.b name: assessment-objective props: @@ -68004,6 +73796,9 @@ catalog: value: PE-01b. class: sp800-53a prose: 'the {{ insert: param, pe-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the physical and environmental protection policy and procedures;' + links: + - href: '#pe-1_smt.b' + rel: assessment-for - id: pe-1_obj.c name: assessment-objective props: @@ -68025,6 +73820,9 @@ catalog: value: PE-01c.01[01] class: sp800-53a prose: 'the current physical and environmental protection policy is reviewed and updated {{ insert: param, pe-01_odp.05 }};' + links: + - href: '#pe-1_smt.c.1' + rel: assessment-for - id: pe-1_obj.c.1-2 name: assessment-objective props: @@ -68032,6 +73830,12 @@ catalog: value: PE-01c.01[02] class: sp800-53a prose: 'the current physical and environmental protection policy is reviewed and updated following {{ insert: param, pe-01_odp.06 }};' + links: + - href: '#pe-1_smt.c.1' + rel: assessment-for + links: + - href: '#pe-1_smt.c.1' + rel: assessment-for - id: pe-1_obj.c.2 name: assessment-objective props: @@ -68046,6 +73850,9 @@ catalog: value: PE-01c.02[01] class: sp800-53a prose: 'the current physical and environmental protection procedures are reviewed and updated {{ insert: param, pe-01_odp.07 }};' + links: + - href: '#pe-1_smt.c.2' + rel: assessment-for - id: pe-1_obj.c.2-2 name: assessment-objective props: @@ -68053,6 +73860,18 @@ catalog: value: PE-01c.02[02] class: sp800-53a prose: 'the current physical and environmental protection procedures are reviewed and updated following {{ insert: param, pe-01_odp.08 }}.' + links: + - href: '#pe-1_smt.c.2' + rel: assessment-for + links: + - href: '#pe-1_smt.c.2' + rel: assessment-for + links: + - href: '#pe-1_smt.c' + rel: assessment-for + links: + - href: '#pe-1_smt' + rel: assessment-for - id: pe-1_asm-examine name: assessment-method props: @@ -68203,6 +74022,9 @@ catalog: value: PE-02a.[01] class: sp800-53a prose: a list of individuals with authorized access to the facility where the system resides has been developed; + links: + - href: '#pe-2_smt.a' + rel: assessment-for - id: pe-2_obj.a-2 name: assessment-objective props: @@ -68210,6 +74032,9 @@ catalog: value: PE-02a.[02] class: sp800-53a prose: the list of individuals with authorized access to the facility where the system resides has been approved; + links: + - href: '#pe-2_smt.a' + rel: assessment-for - id: pe-2_obj.a-3 name: assessment-objective props: @@ -68217,6 +74042,12 @@ catalog: value: PE-02a.[03] class: sp800-53a prose: the list of individuals with authorized access to the facility where the system resides has been maintained; + links: + - href: '#pe-2_smt.a' + rel: assessment-for + links: + - href: '#pe-2_smt.a' + rel: assessment-for - id: pe-2_obj.b name: assessment-objective props: @@ -68224,6 +74055,9 @@ catalog: value: PE-02b. class: sp800-53a prose: authorization credentials are issued for facility access; + links: + - href: '#pe-2_smt.b' + rel: assessment-for - id: pe-2_obj.c name: assessment-objective props: @@ -68231,6 +74065,9 @@ catalog: value: PE-02c. class: sp800-53a prose: 'the access list detailing authorized facility access by individuals is reviewed {{ insert: param, pe-02_odp }};' + links: + - href: '#pe-2_smt.c' + rel: assessment-for - id: pe-2_obj.d name: assessment-objective props: @@ -68238,6 +74075,12 @@ catalog: value: PE-02d. class: sp800-53a prose: individuals are removed from the facility access list when access is no longer required. + links: + - href: '#pe-2_smt.d' + rel: assessment-for + links: + - href: '#pe-2_smt' + rel: assessment-for - id: pe-2_asm-examine name: assessment-method props: @@ -68335,6 +74178,9 @@ catalog: value: PE-02(01) class: sp800-53a prose: physical access to the facility where the system resides is authorized based on position or role. + links: + - href: '#pe-2.1_smt' + rel: assessment-for - id: pe-2.1_asm-examine name: assessment-method props: @@ -68440,6 +74286,9 @@ catalog: value: PE-02(02) class: sp800-53a prose: 'two forms of identification are required from {{ insert: param, pe-02.02_odp }} for visitor access to the facility where the system resides.' + links: + - href: '#pe-2.2_smt' + rel: assessment-for - id: pe-2.2_asm-examine name: assessment-method props: @@ -68559,6 +74408,9 @@ catalog: value: PE-02(03) class: sp800-53a prose: 'unescorted access to the facility where the system resides is restricted to personnel with {{ insert: param, pe-02.03_odp.01 }}.' + links: + - href: '#pe-2.3_smt' + rel: assessment-for - id: pe-2.3_asm-examine name: assessment-method props: @@ -68891,6 +74743,9 @@ catalog: value: PE-03a.01 class: sp800-53a prose: 'physical access authorizations are enforced at {{ insert: param, pe-03_odp.01 }} by verifying individual access authorizations before granting access to the facility;' + links: + - href: '#pe-3_smt.a.1' + rel: assessment-for - id: pe-3_obj.a.2 name: assessment-objective props: @@ -68898,6 +74753,12 @@ catalog: value: PE-03a.02 class: sp800-53a prose: 'physical access authorizations are enforced at {{ insert: param, pe-03_odp.01 }} by controlling ingress and egress to the facility using {{ insert: param, pe-03_odp.02 }};' + links: + - href: '#pe-3_smt.a.2' + rel: assessment-for + links: + - href: '#pe-3_smt.a' + rel: assessment-for - id: pe-3_obj.b name: assessment-objective props: @@ -68905,6 +74766,9 @@ catalog: value: PE-03b. class: sp800-53a prose: 'physical access audit logs are maintained for {{ insert: param, pe-03_odp.04 }};' + links: + - href: '#pe-3_smt.b' + rel: assessment-for - id: pe-3_obj.c name: assessment-objective props: @@ -68912,6 +74776,9 @@ catalog: value: PE-03c. class: sp800-53a prose: 'access to areas within the facility designated as publicly accessible are maintained by implementing {{ insert: param, pe-03_odp.05 }};' + links: + - href: '#pe-3_smt.c' + rel: assessment-for - id: pe-3_obj.d name: assessment-objective props: @@ -68926,6 +74793,9 @@ catalog: value: PE-03d.[01] class: sp800-53a prose: visitors are escorted; + links: + - href: '#pe-3_smt.d' + rel: assessment-for - id: pe-3_obj.d-2 name: assessment-objective props: @@ -68933,6 +74803,12 @@ catalog: value: PE-03d.[02] class: sp800-53a prose: 'visitor activity is controlled {{ insert: param, pe-03_odp.06 }};' + links: + - href: '#pe-3_smt.d' + rel: assessment-for + links: + - href: '#pe-3_smt.d' + rel: assessment-for - id: pe-3_obj.e name: assessment-objective props: @@ -68947,6 +74823,9 @@ catalog: value: PE-03e.[01] class: sp800-53a prose: keys are secured; + links: + - href: '#pe-3_smt.e' + rel: assessment-for - id: pe-3_obj.e-2 name: assessment-objective props: @@ -68954,6 +74833,9 @@ catalog: value: PE-03e.[02] class: sp800-53a prose: combinations are secured; + links: + - href: '#pe-3_smt.e' + rel: assessment-for - id: pe-3_obj.e-3 name: assessment-objective props: @@ -68961,6 +74843,12 @@ catalog: value: PE-03e.[03] class: sp800-53a prose: other physical access devices are secured; + links: + - href: '#pe-3_smt.e' + rel: assessment-for + links: + - href: '#pe-3_smt.e' + rel: assessment-for - id: pe-3_obj.f name: assessment-objective props: @@ -68968,6 +74856,9 @@ catalog: value: PE-03f. class: sp800-53a prose: '{{ insert: param, pe-03_odp.07 }} are inventoried {{ insert: param, pe-03_odp.08 }};' + links: + - href: '#pe-3_smt.f' + rel: assessment-for - id: pe-3_obj.g name: assessment-objective props: @@ -68982,6 +74873,9 @@ catalog: value: PE-03g.[01] class: sp800-53a prose: 'combinations are changed {{ insert: param, pe-03_odp.09 }} , when combinations are compromised, or when individuals possessing the combinations are transferred or terminated;' + links: + - href: '#pe-3_smt.g' + rel: assessment-for - id: pe-3_obj.g-2 name: assessment-objective props: @@ -68989,6 +74883,15 @@ catalog: value: PE-03g.[02] class: sp800-53a prose: 'keys are changed {{ insert: param, pe-03_odp.10 }} , when keys are lost, or when individuals possessing the keys are transferred or terminated.' + links: + - href: '#pe-3_smt.g' + rel: assessment-for + links: + - href: '#pe-3_smt.g' + rel: assessment-for + links: + - href: '#pe-3_smt' + rel: assessment-for - id: pe-3_asm-examine name: assessment-method props: @@ -69107,6 +75010,9 @@ catalog: value: PE-03(01)[01] class: sp800-53a prose: physical access authorizations to the system are enforced; + links: + - href: '#pe-3.1_smt' + rel: assessment-for - id: pe-3.1_obj.2 name: assessment-objective props: @@ -69114,6 +75020,12 @@ catalog: value: PE-03(01)[02] class: sp800-53a prose: 'physical access controls are enforced for the facility at {{ insert: param, pe-03.01_odp }}.' + links: + - href: '#pe-3.1_smt' + rel: assessment-for + links: + - href: '#pe-3.1_smt' + rel: assessment-for - id: pe-3.1_asm-examine name: assessment-method props: @@ -69221,6 +75133,9 @@ catalog: value: PE-03(02) class: sp800-53a prose: 'security checks are performed {{ insert: param, pe-03.02_odp }} at the physical perimeter of the facility or system for exfiltration of information or removal of system components.' + links: + - href: '#pe-3.2_smt' + rel: assessment-for - id: pe-3.2_asm-examine name: assessment-method props: @@ -69332,6 +75247,9 @@ catalog: value: PE-03(03) class: sp800-53a prose: 'guards are employed to control {{ insert: param, pe-03.03_odp }} to the facility where the system resides 24 hours per day, 7 days per week.' + links: + - href: '#pe-3.3_smt' + rel: assessment-for - id: pe-3.3_asm-examine name: assessment-method props: @@ -69433,6 +75351,9 @@ catalog: value: PE-03(04) class: sp800-53a prose: 'lockable physical casings are used to protect {{ insert: param, pe-03.04_odp }} from unauthorized access.' + links: + - href: '#pe-3.4_smt' + rel: assessment-for - id: pe-3.4_asm-examine name: assessment-method props: @@ -69553,6 +75474,9 @@ catalog: value: PE-03(05) class: sp800-53a prose: '{{ insert: param, pe-03.05_odp.01 }} are employed to {{ insert: param, pe-03.05_odp.02 }} physical tampering or alteration of {{ insert: param, pe-03.05_odp.03 }} within the system.' + links: + - href: '#pe-3.5_smt' + rel: assessment-for - id: pe-3.5_asm-examine name: assessment-method props: @@ -69651,6 +75575,9 @@ catalog: value: PE-03(07) class: sp800-53a prose: physical barriers are used to limit access. + links: + - href: '#pe-3.7_smt' + rel: assessment-for - id: pe-3.7_asm-examine name: assessment-method props: @@ -69732,6 +75659,9 @@ catalog: value: PE-03(08) class: sp800-53a prose: 'access control vestibules are employed at {{ insert: param, pe-03.08_odp }}.' + links: + - href: '#pe-3.8_smt' + rel: assessment-for - id: pe-3.8_asm-examine name: assessment-method props: @@ -69850,6 +75780,9 @@ catalog: value: PE-04 class: sp800-53a prose: 'physical access to {{ insert: param, pe-04_odp.01 }} within organizational facilities is controlled using {{ insert: param, pe-04_odp.02 }}.' + links: + - href: '#pe-4_smt' + rel: assessment-for - id: pe-4_asm-examine name: assessment-method props: @@ -69955,6 +75888,9 @@ catalog: value: PE-05 class: sp800-53a prose: 'physical access to output from {{ insert: param, pe-05_odp }} is controlled to prevent unauthorized individuals from obtaining the output.' + links: + - href: '#pe-5_smt' + rel: assessment-for - id: pe-5_asm-examine name: assessment-method props: @@ -70060,6 +75996,9 @@ catalog: value: PE-05(02) class: sp800-53a prose: individual identity is linked to the receipt of output from output devices. + links: + - href: '#pe-5.2_smt' + rel: assessment-for - id: pe-5.2_asm-examine name: assessment-method props: @@ -70242,6 +76181,9 @@ catalog: value: PE-06a. class: sp800-53a prose: physical access to the facility where the system resides is monitored to detect and respond to physical security incidents; + links: + - href: '#pe-6_smt.a' + rel: assessment-for - id: pe-6_obj.b name: assessment-objective props: @@ -70256,6 +76198,9 @@ catalog: value: PE-06b.[01] class: sp800-53a prose: 'physical access logs are reviewed {{ insert: param, pe-06_odp.01 }};' + links: + - href: '#pe-6_smt.b' + rel: assessment-for - id: pe-6_obj.b-2 name: assessment-objective props: @@ -70263,6 +76208,12 @@ catalog: value: PE-06b.[02] class: sp800-53a prose: 'physical access logs are reviewed upon occurrence of {{ insert: param, pe-06_odp.02 }};' + links: + - href: '#pe-6_smt.b' + rel: assessment-for + links: + - href: '#pe-6_smt.b' + rel: assessment-for - id: pe-6_obj.c name: assessment-objective props: @@ -70277,6 +76228,9 @@ catalog: value: PE-06c.[01] class: sp800-53a prose: results of reviews are coordinated with organizational incident response capabilities; + links: + - href: '#pe-6_smt.c' + rel: assessment-for - id: pe-6_obj.c-2 name: assessment-objective props: @@ -70284,6 +76238,15 @@ catalog: value: PE-06c.[02] class: sp800-53a prose: results of investigations are coordinated with organizational incident response capabilities. + links: + - href: '#pe-6_smt.c' + rel: assessment-for + links: + - href: '#pe-6_smt.c' + rel: assessment-for + links: + - href: '#pe-6_smt' + rel: assessment-for - id: pe-6_asm-examine name: assessment-method props: @@ -70385,6 +76348,9 @@ catalog: value: PE-06(01)[01] class: sp800-53a prose: physical access to the facility where the system resides is monitored using physical intrusion alarms; + links: + - href: '#pe-6.1_smt' + rel: assessment-for - id: pe-6.1_obj-2 name: assessment-objective props: @@ -70392,6 +76358,12 @@ catalog: value: PE-06(01)[02] class: sp800-53a prose: physical access to the facility where the system resides is monitored using physical surveillance equipment. + links: + - href: '#pe-6.1_smt' + rel: assessment-for + links: + - href: '#pe-6.1_smt' + rel: assessment-for - id: pe-6.1_asm-examine name: assessment-method props: @@ -70531,6 +76503,9 @@ catalog: value: PE-06(02)[01] class: sp800-53a prose: '{{ insert: param, pe-06.02_odp.01 }} are recognized;' + links: + - href: '#pe-6.2_smt' + rel: assessment-for - id: pe-6.2_obj-2 name: assessment-objective props: @@ -70538,6 +76513,12 @@ catalog: value: PE-06(02)[02] class: sp800-53a prose: '{{ insert: param, pe-06.02_odp.02 }} are initiated using {{ insert: param, pe-06.02_odp.03 }}.' + links: + - href: '#pe-6.2_smt' + rel: assessment-for + links: + - href: '#pe-6.2_smt' + rel: assessment-for - id: pe-6.2_asm-examine name: assessment-method props: @@ -70689,6 +76670,9 @@ catalog: value: PE-06(03)(a) class: sp800-53a prose: 'video surveillance of {{ insert: param, pe-06.03_odp.01 }} is employed;' + links: + - href: '#pe-6.3_smt.a' + rel: assessment-for - id: pe-6.3_obj.b name: assessment-objective props: @@ -70696,6 +76680,9 @@ catalog: value: PE-06(03)(b) class: sp800-53a prose: 'video recordings are reviewed {{ insert: param, pe-06.03_odp.02 }};' + links: + - href: '#pe-6.3_smt.b' + rel: assessment-for - id: pe-6.3_obj.c name: assessment-objective props: @@ -70703,6 +76690,12 @@ catalog: value: PE-06(03)(c) class: sp800-53a prose: 'video recordings are retained for {{ insert: param, pe-06.03_odp.03 }}.' + links: + - href: '#pe-6.3_smt.c' + rel: assessment-for + links: + - href: '#pe-6.3_smt' + rel: assessment-for - id: pe-6.3_asm-examine name: assessment-method props: @@ -70814,6 +76807,9 @@ catalog: value: PE-06(04) class: sp800-53a prose: 'physical access to the system is monitored in addition to the physical access monitoring of the facility at {{ insert: param, pe-06.04_odp }}.' + links: + - href: '#pe-6.4_smt' + rel: assessment-for - id: pe-6.4_asm-examine name: assessment-method props: @@ -70991,6 +76987,9 @@ catalog: value: PE-08a. class: sp800-53a prose: 'visitor access records for the facility where the system resides are maintained for {{ insert: param, pe-08_odp.01 }};' + links: + - href: '#pe-8_smt.a' + rel: assessment-for - id: pe-8_obj.b name: assessment-objective props: @@ -70998,6 +76997,9 @@ catalog: value: PE-08b. class: sp800-53a prose: 'visitor access records are reviewed {{ insert: param, pe-08_odp.02 }};' + links: + - href: '#pe-8_smt.b' + rel: assessment-for - id: pe-8_obj.c name: assessment-objective props: @@ -71005,6 +77007,12 @@ catalog: value: PE-08c. class: sp800-53a prose: 'visitor access records anomalies are reported to {{ insert: param, pe-08_odp.03 }}.' + links: + - href: '#pe-8_smt.c' + rel: assessment-for + links: + - href: '#pe-8_smt' + rel: assessment-for - id: pe-8_asm-examine name: assessment-method props: @@ -71129,6 +77137,9 @@ catalog: value: PE-08(01)[01] class: sp800-53a prose: 'visitor access records are maintained using {{ insert: param, pe-08.01_odp.01 }};' + links: + - href: '#pe-8.1_smt' + rel: assessment-for - id: pe-8.1_obj-2 name: assessment-objective props: @@ -71136,6 +77147,12 @@ catalog: value: PE-08(01)[02] class: sp800-53a prose: 'visitor access records are reviewed using {{ insert: param, pe-08.01_odp.02 }}.' + links: + - href: '#pe-8.1_smt' + rel: assessment-for + links: + - href: '#pe-8.1_smt' + rel: assessment-for - id: pe-8.1_asm-examine name: assessment-method props: @@ -71253,6 +77270,9 @@ catalog: value: PE-08(03) class: sp800-53a prose: 'personally identifiable information contained in visitor access records is limited to {{ insert: param, pe-08.03_odp }} identified in the privacy risk assessment.' + links: + - href: '#pe-8.3_smt' + rel: assessment-for - id: pe-8.3_asm-examine name: assessment-method props: @@ -71347,6 +77367,9 @@ catalog: value: PE-09[01] class: sp800-53a prose: power equipment for the system is protected from damage and destruction; + links: + - href: '#pe-9_smt' + rel: assessment-for - id: pe-9_obj-2 name: assessment-objective props: @@ -71354,6 +77377,12 @@ catalog: value: PE-09[02] class: sp800-53a prose: power cabling for the system is protected from damage and destruction. + links: + - href: '#pe-9_smt' + rel: assessment-for + links: + - href: '#pe-9_smt' + rel: assessment-for - id: pe-9_asm-examine name: assessment-method props: @@ -71445,6 +77474,9 @@ catalog: value: PE-09(01) class: sp800-53a prose: 'redundant power cabling paths that are physically separated by {{ insert: param, pe-09.01_odp }} are employed.' + links: + - href: '#pe-9.1_smt' + rel: assessment-for - id: pe-9.1_asm-examine name: assessment-method props: @@ -71535,6 +77567,9 @@ catalog: value: PE-09(02) class: sp800-53a prose: 'automatic voltage controls for {{ insert: param, pe-09.02_odp }} are employed.' + links: + - href: '#pe-9.2_smt' + rel: assessment-for - id: pe-9.2_asm-examine name: assessment-method props: @@ -71667,6 +77702,9 @@ catalog: value: PE-10a. class: sp800-53a prose: 'the capability to shut off power to {{ insert: param, pe-10_odp.01 }} in emergency situations is provided;' + links: + - href: '#pe-10_smt.a' + rel: assessment-for - id: pe-10_obj.b name: assessment-objective props: @@ -71674,6 +77712,9 @@ catalog: value: PE-10b. class: sp800-53a prose: 'emergency shutoff switches or devices are placed in {{ insert: param, pe-10_odp.02 }} to facilitate access for authorized personnel;' + links: + - href: '#pe-10_smt.b' + rel: assessment-for - id: pe-10_obj.c name: assessment-objective props: @@ -71681,6 +77722,12 @@ catalog: value: PE-10c. class: sp800-53a prose: the emergency power shutoff capability is protected from unauthorized activation. + links: + - href: '#pe-10_smt.c' + rel: assessment-for + links: + - href: '#pe-10_smt' + rel: assessment-for - id: pe-10_asm-examine name: assessment-method props: @@ -71797,6 +77844,9 @@ catalog: value: PE-11 class: sp800-53a prose: 'an uninterruptible power supply is provided to facilitate {{ insert: param, pe-11_odp }} in the event of a primary power source loss.' + links: + - href: '#pe-11_smt' + rel: assessment-for - id: pe-11_asm-examine name: assessment-method props: @@ -71903,6 +77953,9 @@ catalog: value: PE-11(01)[01] class: sp800-53a prose: 'an alternate power supply provided for the system is activated {{ insert: param, pe-11.01_odp }};' + links: + - href: '#pe-11.1_smt' + rel: assessment-for - id: pe-11.1_obj-2 name: assessment-objective props: @@ -71910,6 +77963,12 @@ catalog: value: PE-11(01)[02] class: sp800-53a prose: the alternate power supply provided for the system can maintain minimally required operational capability in the event of an extended loss of the primary power source. + links: + - href: '#pe-11.1_smt' + rel: assessment-for + links: + - href: '#pe-11.1_smt' + rel: assessment-for - id: pe-11.1_asm-examine name: assessment-method props: @@ -72046,6 +78105,9 @@ catalog: value: PE-11(02)(a) class: sp800-53a prose: the alternate power supply provided for the system is self-contained; + links: + - href: '#pe-11.2_smt.a' + rel: assessment-for - id: pe-11.2_obj.b name: assessment-objective props: @@ -72053,6 +78115,9 @@ catalog: value: PE-11(02)(b) class: sp800-53a prose: the alternate power supply provided for the system is not reliant on external power generation; + links: + - href: '#pe-11.2_smt.b' + rel: assessment-for - id: pe-11.2_obj.c name: assessment-objective props: @@ -72060,6 +78125,12 @@ catalog: value: PE-11(02)(c) class: sp800-53a prose: 'the alternate power supply provided for the system is capable of maintaining {{ insert: param, pe-11.02_odp.02 }} in the event of an extended loss of the primary power source.' + links: + - href: '#pe-11.2_smt.c' + rel: assessment-for + links: + - href: '#pe-11.2_smt' + rel: assessment-for - id: pe-11.2_asm-examine name: assessment-method props: @@ -72155,6 +78226,9 @@ catalog: value: PE-12[01] class: sp800-53a prose: automatic emergency lighting that activates in the event of a power outage or disruption is employed for the system; + links: + - href: '#pe-12_smt' + rel: assessment-for - id: pe-12_obj-2 name: assessment-objective props: @@ -72162,6 +78236,9 @@ catalog: value: PE-12[02] class: sp800-53a prose: automatic emergency lighting that activates in the event of a power outage or disruption is maintained for the system; + links: + - href: '#pe-12_smt' + rel: assessment-for - id: pe-12_obj-3 name: assessment-objective props: @@ -72169,6 +78246,9 @@ catalog: value: PE-12[03] class: sp800-53a prose: automatic emergency lighting for the system covers emergency exits within the facility; + links: + - href: '#pe-12_smt' + rel: assessment-for - id: pe-12_obj-4 name: assessment-objective props: @@ -72176,6 +78256,12 @@ catalog: value: PE-12[04] class: sp800-53a prose: automatic emergency lighting for the system covers evacuation routes within the facility. + links: + - href: '#pe-12_smt' + rel: assessment-for + links: + - href: '#pe-12_smt' + rel: assessment-for - id: pe-12_asm-examine name: assessment-method props: @@ -72260,6 +78346,9 @@ catalog: value: PE-12(01) class: sp800-53a prose: emergency lighting is provided for all areas within the facility supporting essential mission and business functions. + links: + - href: '#pe-12.1_smt' + rel: assessment-for - id: pe-12.1_asm-examine name: assessment-method props: @@ -72352,6 +78441,9 @@ catalog: value: PE-13[01] class: sp800-53a prose: fire detection systems are employed; + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_obj-2 name: assessment-objective props: @@ -72359,6 +78451,9 @@ catalog: value: PE-13[02] class: sp800-53a prose: employed fire detection systems are supported by an independent energy source; + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_obj-3 name: assessment-objective props: @@ -72366,6 +78461,9 @@ catalog: value: PE-13[03] class: sp800-53a prose: employed fire detection systems are maintained; + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_obj-4 name: assessment-objective props: @@ -72373,6 +78471,9 @@ catalog: value: PE-13[04] class: sp800-53a prose: fire suppression systems are employed; + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_obj-5 name: assessment-objective props: @@ -72380,6 +78481,9 @@ catalog: value: PE-13[05] class: sp800-53a prose: employed fire suppression systems are supported by an independent energy source; + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_obj-6 name: assessment-objective props: @@ -72387,6 +78491,12 @@ catalog: value: PE-13[06] class: sp800-53a prose: employed fire suppression systems are maintained. + links: + - href: '#pe-13_smt' + rel: assessment-for + links: + - href: '#pe-13_smt' + rel: assessment-for - id: pe-13_asm-examine name: assessment-method props: @@ -72499,6 +78609,9 @@ catalog: value: PE-13(01)[01] class: sp800-53a prose: fire detection systems that activate automatically are employed in the event of a fire; + links: + - href: '#pe-13.1_smt' + rel: assessment-for - id: pe-13.1_obj-2 name: assessment-objective props: @@ -72506,6 +78619,9 @@ catalog: value: PE-13(01)[02] class: sp800-53a prose: 'fire detection systems that notify {{ insert: param, pe-13.01_odp.01 }} automatically are employed in the event of a fire;' + links: + - href: '#pe-13.1_smt' + rel: assessment-for - id: pe-13.1_obj-3 name: assessment-objective props: @@ -72513,6 +78629,12 @@ catalog: value: PE-13(01)[03] class: sp800-53a prose: 'fire detection systems that notify {{ insert: param, pe-13.01_odp.02 }} automatically are employed in the event of a fire.' + links: + - href: '#pe-13.1_smt' + rel: assessment-for + links: + - href: '#pe-13.1_smt' + rel: assessment-for - id: pe-13.1_asm-examine name: assessment-method props: @@ -72654,6 +78776,9 @@ catalog: value: PE-13(02)(a)[01] class: sp800-53a prose: fire suppression systems that activate automatically are employed; + links: + - href: '#pe-13.2_smt.a' + rel: assessment-for - id: pe-13.2_obj.a-2 name: assessment-objective props: @@ -72661,6 +78786,9 @@ catalog: value: PE-13(02)(a)[02] class: sp800-53a prose: 'fire suppression systems that notify {{ insert: param, pe-13.02_odp.01 }} automatically are employed;' + links: + - href: '#pe-13.2_smt.a' + rel: assessment-for - id: pe-13.2_obj.a-3 name: assessment-objective props: @@ -72668,6 +78796,12 @@ catalog: value: PE-13(02)(a)[03] class: sp800-53a prose: 'fire suppression systems that notify {{ insert: param, pe-13.02_odp.02 }} automatically are employed;' + links: + - href: '#pe-13.2_smt.a' + rel: assessment-for + links: + - href: '#pe-13.2_smt.a' + rel: assessment-for - id: pe-13.2_obj.b name: assessment-objective props: @@ -72675,6 +78809,12 @@ catalog: value: PE-13(02)(b) class: sp800-53a prose: an automatic fire suppression capability is employed when the facility is not staffed on a continuous basis. + links: + - href: '#pe-13.2_smt.b' + rel: assessment-for + links: + - href: '#pe-13.2_smt' + rel: assessment-for - id: pe-13.2_asm-examine name: assessment-method props: @@ -72811,6 +78951,9 @@ catalog: value: PE-13(04)[01] class: sp800-53a prose: 'the facility undergoes fire protection inspections {{ insert: param, pe-13.04_odp.01 }} by authorized and qualified inspectors;' + links: + - href: '#pe-13.4_smt' + rel: assessment-for - id: pe-13.4_obj-2 name: assessment-objective props: @@ -72818,6 +78961,12 @@ catalog: value: PE-13(04)[02] class: sp800-53a prose: 'the identified deficiencies from fire protection inspections are resolved within {{ insert: param, pe-13.04_odp.02 }}.' + links: + - href: '#pe-13.4_smt' + rel: assessment-for + links: + - href: '#pe-13.4_smt' + rel: assessment-for - id: pe-13.4_asm-examine name: assessment-method props: @@ -72960,6 +79109,9 @@ catalog: value: PE-14a. class: sp800-53a prose: '{{ insert: param, pe-14_odp.01 }} levels are maintained at {{ insert: param, pe-14_odp.03 }} within the facility where the system resides;' + links: + - href: '#pe-14_smt.a' + rel: assessment-for - id: pe-14_obj.b name: assessment-objective props: @@ -72967,6 +79119,12 @@ catalog: value: PE-14b. class: sp800-53a prose: 'environmental control levels are monitored {{ insert: param, pe-14_odp.04 }}.' + links: + - href: '#pe-14_smt.b' + rel: assessment-for + links: + - href: '#pe-14_smt' + rel: assessment-for - id: pe-14_asm-examine name: assessment-method props: @@ -73064,6 +79222,9 @@ catalog: value: PE-14(01) class: sp800-53a prose: '{{ insert: param, pe-14.01_odp }} are employed in the facility to prevent fluctuations that are potentially harmful to the system.' + links: + - href: '#pe-14.1_smt' + rel: assessment-for - id: pe-14.1_asm-examine name: assessment-method props: @@ -73167,6 +79328,9 @@ catalog: value: PE-14(02)[01] class: sp800-53a prose: environmental control monitoring is employed; + links: + - href: '#pe-14.2_smt' + rel: assessment-for - id: pe-14.2_obj-2 name: assessment-objective props: @@ -73174,6 +79338,12 @@ catalog: value: PE-14(02)[02] class: sp800-53a prose: 'the environmental control monitoring capability provides an alarm or notification to {{ insert: param, pe-14.02_odp }} when changes are potentially harmful to personnel or equipment.' + links: + - href: '#pe-14.2_smt' + rel: assessment-for + links: + - href: '#pe-14.2_smt' + rel: assessment-for - id: pe-14.2_asm-examine name: assessment-method props: @@ -73266,6 +79436,9 @@ catalog: value: PE-15[01] class: sp800-53a prose: the system is protected from damage resulting from water leakage by providing master shutoff or isolation valves; + links: + - href: '#pe-15_smt' + rel: assessment-for - id: pe-15_obj-2 name: assessment-objective props: @@ -73273,6 +79446,9 @@ catalog: value: PE-15[02] class: sp800-53a prose: the master shutoff or isolation valves are accessible; + links: + - href: '#pe-15_smt' + rel: assessment-for - id: pe-15_obj-3 name: assessment-objective props: @@ -73280,6 +79456,9 @@ catalog: value: PE-15[03] class: sp800-53a prose: the master shutoff or isolation valves are working properly; + links: + - href: '#pe-15_smt' + rel: assessment-for - id: pe-15_obj-4 name: assessment-objective props: @@ -73287,6 +79466,12 @@ catalog: value: PE-15[04] class: sp800-53a prose: the master shutoff or isolation valves are known to key personnel. + links: + - href: '#pe-15_smt' + rel: assessment-for + links: + - href: '#pe-15_smt' + rel: assessment-for - id: pe-15_asm-examine name: assessment-method props: @@ -73404,6 +79589,9 @@ catalog: value: PE-15(01)[01] class: sp800-53a prose: the presence of water near the system can be detected automatically; + links: + - href: '#pe-15.1_smt' + rel: assessment-for - id: pe-15.1_obj-2 name: assessment-objective props: @@ -73411,6 +79599,12 @@ catalog: value: PE-15(01)[02] class: sp800-53a prose: '{{ insert: param, pe-15.01_odp.01 }} is/are alerted using {{ insert: param, pe-15.01_odp.02 }}.' + links: + - href: '#pe-15.1_smt' + rel: assessment-for + links: + - href: '#pe-15.1_smt' + rel: assessment-for - id: pe-15.1_asm-examine name: assessment-method props: @@ -73566,6 +79760,9 @@ catalog: value: PE-16a.[01] class: sp800-53a prose: '{{ insert: param, pe-16_odp.01 }} are authorized when entering the facility;' + links: + - href: '#pe-16_smt.a' + rel: assessment-for - id: pe-16_obj.a-2 name: assessment-objective props: @@ -73573,6 +79770,9 @@ catalog: value: PE-16a.[02] class: sp800-53a prose: '{{ insert: param, pe-16_odp.01 }} are controlled when entering the facility;' + links: + - href: '#pe-16_smt.a' + rel: assessment-for - id: pe-16_obj.a-3 name: assessment-objective props: @@ -73580,6 +79780,9 @@ catalog: value: PE-16a.[03] class: sp800-53a prose: '{{ insert: param, pe-16_odp.02 }} are authorized when exiting the facility;' + links: + - href: '#pe-16_smt.a' + rel: assessment-for - id: pe-16_obj.a-4 name: assessment-objective props: @@ -73587,6 +79790,12 @@ catalog: value: PE-16a.[04] class: sp800-53a prose: '{{ insert: param, pe-16_odp.02 }} are controlled when exiting the facility;' + links: + - href: '#pe-16_smt.a' + rel: assessment-for + links: + - href: '#pe-16_smt.a' + rel: assessment-for - id: pe-16_obj.b name: assessment-objective props: @@ -73594,6 +79803,12 @@ catalog: value: PE-16b. class: sp800-53a prose: records of the system components are maintained. + links: + - href: '#pe-16_smt.b' + rel: assessment-for + links: + - href: '#pe-16_smt' + rel: assessment-for - id: pe-16_asm-examine name: assessment-method props: @@ -73736,6 +79951,9 @@ catalog: value: PE-17a. class: sp800-53a prose: '{{ insert: param, pe-17_odp.01 }} are determined and documented;' + links: + - href: '#pe-17_smt.a' + rel: assessment-for - id: pe-17_obj.b name: assessment-objective props: @@ -73743,6 +79961,9 @@ catalog: value: PE-17b. class: sp800-53a prose: '{{ insert: param, pe-17_odp.02 }} are employed at alternate work sites;' + links: + - href: '#pe-17_smt.b' + rel: assessment-for - id: pe-17_obj.c name: assessment-objective props: @@ -73750,6 +79971,9 @@ catalog: value: PE-17c. class: sp800-53a prose: the effectiveness of controls at alternate work sites is assessed; + links: + - href: '#pe-17_smt.c' + rel: assessment-for - id: pe-17_obj.d name: assessment-objective props: @@ -73757,6 +79981,12 @@ catalog: value: PE-17d. class: sp800-53a prose: a means for employees to communicate with information security and privacy personnel in case of incidents is provided. + links: + - href: '#pe-17_smt.d' + rel: assessment-for + links: + - href: '#pe-17_smt' + rel: assessment-for - id: pe-17_asm-examine name: assessment-method props: @@ -73870,6 +80100,9 @@ catalog: value: PE-18 class: sp800-53a prose: 'system components are positioned within the facility to minimize potential damage from {{ insert: param, pe-18_odp }} and to minimize the opportunity for unauthorized access.' + links: + - href: '#pe-18_smt' + rel: assessment-for - id: pe-18_asm-examine name: assessment-method props: @@ -73976,6 +80209,9 @@ catalog: value: PE-19 class: sp800-53a prose: the system is protected from information leakage due to electromagnetic signal emanations. + links: + - href: '#pe-19_smt' + rel: assessment-for - id: pe-19_asm-examine name: assessment-method props: @@ -74067,6 +80303,9 @@ catalog: value: PE-19(01)[01] class: sp800-53a prose: system components are protected in accordance with national emissions security policies and procedures based on the security category or classification of the information; + links: + - href: '#pe-19.1_smt' + rel: assessment-for - id: pe-19.1_obj-2 name: assessment-objective props: @@ -74074,6 +80313,9 @@ catalog: value: PE-19(01)[02] class: sp800-53a prose: associated data communications are protected in accordance with national emissions security policies and procedures based on the security category or classification of the information; + links: + - href: '#pe-19.1_smt' + rel: assessment-for - id: pe-19.1_obj-3 name: assessment-objective props: @@ -74081,6 +80323,12 @@ catalog: value: PE-19(01)[03] class: sp800-53a prose: networks are protected in accordance with national emissions security policies and procedures based on the security category or classification of the information. + links: + - href: '#pe-19.1_smt' + rel: assessment-for + links: + - href: '#pe-19.1_smt' + rel: assessment-for - id: pe-19.1_asm-examine name: assessment-method props: @@ -74195,6 +80443,9 @@ catalog: value: PE-20 class: sp800-53a prose: '{{ insert: param, pe-20_odp.01 }} are employed to track and monitor the location and movement of {{ insert: param, pe-20_odp.02 }} within {{ insert: param, pe-20_odp.03 }}.' + links: + - href: '#pe-20_smt' + rel: assessment-for - id: pe-20_asm-examine name: assessment-method props: @@ -74313,6 +80564,9 @@ catalog: value: PE-21 class: sp800-53a prose: '{{ insert: param, pe-21_odp.01 }} are employed against electromagnetic pulse damage for {{ insert: param, pe-21_odp.02 }}.' + links: + - href: '#pe-21_smt' + rel: assessment-for - id: pe-21_asm-examine name: assessment-method props: @@ -74415,6 +80669,9 @@ catalog: value: PE-22 class: sp800-53a prose: '{{ insert: param, pe-22_odp }} are marked indicating the impact level or classification level of the information permitted to be processed, stored, or transmitted by the hardware component.' + links: + - href: '#pe-22_smt' + rel: assessment-for - id: pe-22_asm-examine name: assessment-method props: @@ -74534,6 +80791,9 @@ catalog: value: PE-23a. class: sp800-53a prose: the location or site of the facility where the system resides is planned considering physical and environmental hazards; + links: + - href: '#pe-23_smt.a' + rel: assessment-for - id: pe-23_obj.b name: assessment-objective props: @@ -74541,6 +80801,12 @@ catalog: value: PE-23b. class: sp800-53a prose: for existing facilities, physical and environmental hazards are considered in the organizational risk management strategy. + links: + - href: '#pe-23_smt.b' + rel: assessment-for + links: + - href: '#pe-23_smt' + rel: assessment-for - id: pe-23_asm-examine name: assessment-method props: @@ -74809,6 +81075,9 @@ catalog: value: PL-01a.[01] class: sp800-53a prose: a planning policy is developed and documented. + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.a-2 name: assessment-objective props: @@ -74816,6 +81085,9 @@ catalog: value: PL-01a.[02] class: sp800-53a prose: 'the planning policy is disseminated to {{ insert: param, pl-01_odp.01 }};' + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.a-3 name: assessment-objective props: @@ -74823,6 +81095,9 @@ catalog: value: PL-01a.[03] class: sp800-53a prose: planning procedures to facilitate the implementation of the planning policy and associated planning controls are developed and documented; + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.a-4 name: assessment-objective props: @@ -74830,6 +81105,9 @@ catalog: value: PL-01a.[04] class: sp800-53a prose: 'the planning procedures are disseminated to {{ insert: param, pl-01_odp.02 }};' + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.a.1 name: assessment-objective props: @@ -74851,6 +81129,9 @@ catalog: value: PL-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses purpose;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-2 name: assessment-objective props: @@ -74858,6 +81139,9 @@ catalog: value: PL-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses scope;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-3 name: assessment-objective props: @@ -74865,6 +81149,9 @@ catalog: value: PL-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses roles;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-4 name: assessment-objective props: @@ -74872,6 +81159,9 @@ catalog: value: PL-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses responsibilities;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-5 name: assessment-objective props: @@ -74879,6 +81169,9 @@ catalog: value: PL-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses management commitment;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-6 name: assessment-objective props: @@ -74886,6 +81179,9 @@ catalog: value: PL-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses coordination among organizational entities;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.a-7 name: assessment-objective props: @@ -74893,6 +81189,12 @@ catalog: value: PL-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy addresses compliance;' + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#pl-1_smt.a.1.a' + rel: assessment-for - id: pl-1_obj.a.1.b name: assessment-objective props: @@ -74900,6 +81202,15 @@ catalog: value: PL-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.03 }} planning policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#pl-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#pl-1_smt.a.1' + rel: assessment-for + links: + - href: '#pl-1_smt.a' + rel: assessment-for - id: pl-1_obj.b name: assessment-objective props: @@ -74907,6 +81218,9 @@ catalog: value: PL-01b. class: sp800-53a prose: 'the {{ insert: param, pl-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the planning policy and procedures;' + links: + - href: '#pl-1_smt.b' + rel: assessment-for - id: pl-1_obj.c name: assessment-objective props: @@ -74928,6 +81242,9 @@ catalog: value: PL-01c.01[01] class: sp800-53a prose: 'the current planning policy is reviewed and updated {{ insert: param, pl-01_odp.05 }};' + links: + - href: '#pl-1_smt.c.1' + rel: assessment-for - id: pl-1_obj.c.1-2 name: assessment-objective props: @@ -74935,6 +81252,12 @@ catalog: value: PL-01c.01[02] class: sp800-53a prose: 'the current planning policy is reviewed and updated following {{ insert: param, pl-01_odp.06 }};' + links: + - href: '#pl-1_smt.c.1' + rel: assessment-for + links: + - href: '#pl-1_smt.c.1' + rel: assessment-for - id: pl-1_obj.c.2 name: assessment-objective props: @@ -74949,6 +81272,9 @@ catalog: value: PL-01c.02[01] class: sp800-53a prose: 'the current planning procedures are reviewed and updated {{ insert: param, pl-01_odp.07 }};' + links: + - href: '#pl-1_smt.c.2' + rel: assessment-for - id: pl-1_obj.c.2-2 name: assessment-objective props: @@ -74956,6 +81282,18 @@ catalog: value: PL-01c.02[02] class: sp800-53a prose: 'the current planning procedures are reviewed and updated following {{ insert: param, pl-01_odp.08 }}.' + links: + - href: '#pl-1_smt.c.2' + rel: assessment-for + links: + - href: '#pl-1_smt.c.2' + rel: assessment-for + links: + - href: '#pl-1_smt.c' + rel: assessment-for + links: + - href: '#pl-1_smt' + rel: assessment-for - id: pl-1_asm-examine name: assessment-method props: @@ -75286,6 +81624,9 @@ catalog: value: PL-02a.01[01] class: sp800-53a prose: a security plan for the system is developed that is consistent with the organization’s enterprise architecture; + links: + - href: '#pl-2_smt.a.1' + rel: assessment-for - id: pl-2_obj.a.1-2 name: assessment-objective props: @@ -75293,6 +81634,12 @@ catalog: value: PL-02a.01[02] class: sp800-53a prose: a privacy plan for the system is developed that is consistent with the organization’s enterprise architecture; + links: + - href: '#pl-2_smt.a.1' + rel: assessment-for + links: + - href: '#pl-2_smt.a.1' + rel: assessment-for - id: pl-2_obj.a.2 name: assessment-objective props: @@ -75307,6 +81654,9 @@ catalog: value: PL-02a.02[01] class: sp800-53a prose: a security plan for the system is developed that explicitly defines the constituent system components; + links: + - href: '#pl-2_smt.a.2' + rel: assessment-for - id: pl-2_obj.a.2-2 name: assessment-objective props: @@ -75314,6 +81664,12 @@ catalog: value: PL-02a.02[02] class: sp800-53a prose: a privacy plan for the system is developed that explicitly defines the constituent system components; + links: + - href: '#pl-2_smt.a.2' + rel: assessment-for + links: + - href: '#pl-2_smt.a.2' + rel: assessment-for - id: pl-2_obj.a.3 name: assessment-objective props: @@ -75328,6 +81684,9 @@ catalog: value: PL-02a.03[01] class: sp800-53a prose: a security plan for the system is developed that describes the operational context of the system in terms of mission and business processes; + links: + - href: '#pl-2_smt.a.3' + rel: assessment-for - id: pl-2_obj.a.3-2 name: assessment-objective props: @@ -75335,6 +81694,12 @@ catalog: value: PL-02a.03[02] class: sp800-53a prose: a privacy plan for the system is developed that describes the operational context of the system in terms of mission and business processes; + links: + - href: '#pl-2_smt.a.3' + rel: assessment-for + links: + - href: '#pl-2_smt.a.3' + rel: assessment-for - id: pl-2_obj.a.4 name: assessment-objective props: @@ -75349,6 +81714,9 @@ catalog: value: PL-02a.04[01] class: sp800-53a prose: a security plan for the system is developed that identifies the individuals that fulfill system roles and responsibilities; + links: + - href: '#pl-2_smt.a.4' + rel: assessment-for - id: pl-2_obj.a.4-2 name: assessment-objective props: @@ -75356,6 +81724,12 @@ catalog: value: PL-02a.04[02] class: sp800-53a prose: a privacy plan for the system is developed that identifies the individuals that fulfill system roles and responsibilities; + links: + - href: '#pl-2_smt.a.4' + rel: assessment-for + links: + - href: '#pl-2_smt.a.4' + rel: assessment-for - id: pl-2_obj.a.5 name: assessment-objective props: @@ -75370,6 +81744,9 @@ catalog: value: PL-02a.05[01] class: sp800-53a prose: a security plan for the system is developed that identifies the information types processed, stored, and transmitted by the system; + links: + - href: '#pl-2_smt.a.5' + rel: assessment-for - id: pl-2_obj.a.5-2 name: assessment-objective props: @@ -75377,6 +81754,12 @@ catalog: value: PL-02a.05[02] class: sp800-53a prose: a privacy plan for the system is developed that identifies the information types processed, stored, and transmitted by the system; + links: + - href: '#pl-2_smt.a.5' + rel: assessment-for + links: + - href: '#pl-2_smt.a.5' + rel: assessment-for - id: pl-2_obj.a.6 name: assessment-objective props: @@ -75391,6 +81774,9 @@ catalog: value: PL-02a.06[01] class: sp800-53a prose: a security plan for the system is developed that provides the security categorization of the system, including supporting rationale; + links: + - href: '#pl-2_smt.a.6' + rel: assessment-for - id: pl-2_obj.a.6-2 name: assessment-objective props: @@ -75398,6 +81784,12 @@ catalog: value: PL-02a.06[02] class: sp800-53a prose: a privacy plan for the system is developed that provides the security categorization of the system, including supporting rationale; + links: + - href: '#pl-2_smt.a.6' + rel: assessment-for + links: + - href: '#pl-2_smt.a.6' + rel: assessment-for - id: pl-2_obj.a.7 name: assessment-objective props: @@ -75412,6 +81804,9 @@ catalog: value: PL-02a.07[01] class: sp800-53a prose: a security plan for the system is developed that describes any specific threats to the system that are of concern to the organization; + links: + - href: '#pl-2_smt.a.7' + rel: assessment-for - id: pl-2_obj.a.7-2 name: assessment-objective props: @@ -75419,6 +81814,12 @@ catalog: value: PL-02a.07[02] class: sp800-53a prose: a privacy plan for the system is developed that describes any specific threats to the system that are of concern to the organization; + links: + - href: '#pl-2_smt.a.7' + rel: assessment-for + links: + - href: '#pl-2_smt.a.7' + rel: assessment-for - id: pl-2_obj.a.8 name: assessment-objective props: @@ -75433,6 +81834,9 @@ catalog: value: PL-02a.08[01] class: sp800-53a prose: a security plan for the system is developed that provides the results of a privacy risk assessment for systems processing personally identifiable information; + links: + - href: '#pl-2_smt.a.8' + rel: assessment-for - id: pl-2_obj.a.8-2 name: assessment-objective props: @@ -75440,6 +81844,12 @@ catalog: value: PL-02a.08[02] class: sp800-53a prose: a privacy plan for the system is developed that provides the results of a privacy risk assessment for systems processing personally identifiable information; + links: + - href: '#pl-2_smt.a.8' + rel: assessment-for + links: + - href: '#pl-2_smt.a.8' + rel: assessment-for - id: pl-2_obj.a.9 name: assessment-objective props: @@ -75454,6 +81864,9 @@ catalog: value: PL-02a.09[01] class: sp800-53a prose: a security plan for the system is developed that describes the operational environment for the system and any dependencies on or connections to other systems or system components; + links: + - href: '#pl-2_smt.a.9' + rel: assessment-for - id: pl-2_obj.a.9-2 name: assessment-objective props: @@ -75461,6 +81874,12 @@ catalog: value: PL-02a.09[02] class: sp800-53a prose: a privacy plan for the system is developed that describes the operational environment for the system and any dependencies on or connections to other systems or system components; + links: + - href: '#pl-2_smt.a.9' + rel: assessment-for + links: + - href: '#pl-2_smt.a.9' + rel: assessment-for - id: pl-2_obj.a.10 name: assessment-objective props: @@ -75475,6 +81894,9 @@ catalog: value: PL-02a.10[01] class: sp800-53a prose: a security plan for the system is developed that provides an overview of the security requirements for the system; + links: + - href: '#pl-2_smt.a.10' + rel: assessment-for - id: pl-2_obj.a.10-2 name: assessment-objective props: @@ -75482,6 +81904,12 @@ catalog: value: PL-02a.10[02] class: sp800-53a prose: a privacy plan for the system is developed that provides an overview of the privacy requirements for the system; + links: + - href: '#pl-2_smt.a.10' + rel: assessment-for + links: + - href: '#pl-2_smt.a.10' + rel: assessment-for - id: pl-2_obj.a.11 name: assessment-objective props: @@ -75496,6 +81924,9 @@ catalog: value: PL-02a.11[01] class: sp800-53a prose: a security plan for the system is developed that identifies any relevant control baselines or overlays, if applicable; + links: + - href: '#pl-2_smt.a.11' + rel: assessment-for - id: pl-2_obj.a.11-2 name: assessment-objective props: @@ -75503,6 +81934,12 @@ catalog: value: PL-02a.11[02] class: sp800-53a prose: a privacy plan for the system is developed that identifies any relevant control baselines or overlays, if applicable; + links: + - href: '#pl-2_smt.a.11' + rel: assessment-for + links: + - href: '#pl-2_smt.a.11' + rel: assessment-for - id: pl-2_obj.a.12 name: assessment-objective props: @@ -75517,6 +81954,9 @@ catalog: value: PL-02a.12[01] class: sp800-53a prose: a security plan for the system is developed that describes the controls in place or planned for meeting the security requirements, including rationale for any tailoring decisions; + links: + - href: '#pl-2_smt.a.12' + rel: assessment-for - id: pl-2_obj.a.12-2 name: assessment-objective props: @@ -75524,6 +81964,12 @@ catalog: value: PL-02a.12[02] class: sp800-53a prose: a privacy plan for the system is developed that describes the controls in place or planned for meeting the privacy requirements, including rationale for any tailoring decisions; + links: + - href: '#pl-2_smt.a.12' + rel: assessment-for + links: + - href: '#pl-2_smt.a.12' + rel: assessment-for - id: pl-2_obj.a.13 name: assessment-objective props: @@ -75538,6 +81984,9 @@ catalog: value: PL-02a.13[01] class: sp800-53a prose: a security plan for the system is developed that includes risk determinations for security architecture and design decisions; + links: + - href: '#pl-2_smt.a.13' + rel: assessment-for - id: pl-2_obj.a.13-2 name: assessment-objective props: @@ -75545,6 +81994,12 @@ catalog: value: PL-02a.13[02] class: sp800-53a prose: a privacy plan for the system is developed that includes risk determinations for privacy architecture and design decisions; + links: + - href: '#pl-2_smt.a.13' + rel: assessment-for + links: + - href: '#pl-2_smt.a.13' + rel: assessment-for - id: pl-2_obj.a.14 name: assessment-objective props: @@ -75559,6 +82014,9 @@ catalog: value: PL-02a.14[01] class: sp800-53a prose: 'a security plan for the system is developed that includes security-related activities affecting the system that require planning and coordination with {{ insert: param, pl-02_odp.01 }};' + links: + - href: '#pl-2_smt.a.14' + rel: assessment-for - id: pl-2_obj.a.14-2 name: assessment-objective props: @@ -75566,6 +82024,12 @@ catalog: value: PL-02a.14[02] class: sp800-53a prose: 'a privacy plan for the system is developed that includes privacy-related activities affecting the system that require planning and coordination with {{ insert: param, pl-02_odp.01 }};' + links: + - href: '#pl-2_smt.a.14' + rel: assessment-for + links: + - href: '#pl-2_smt.a.14' + rel: assessment-for - id: pl-2_obj.a.15 name: assessment-objective props: @@ -75580,6 +82044,9 @@ catalog: value: PL-02a.15[01] class: sp800-53a prose: a security plan for the system is developed that is reviewed and approved by the authorizing official or designated representative prior to plan implementation; + links: + - href: '#pl-2_smt.a.15' + rel: assessment-for - id: pl-2_obj.a.15-2 name: assessment-objective props: @@ -75587,6 +82054,15 @@ catalog: value: PL-02a.15[02] class: sp800-53a prose: a privacy plan for the system is developed that is reviewed and approved by the authorizing official or designated representative prior to plan implementation. + links: + - href: '#pl-2_smt.a.15' + rel: assessment-for + links: + - href: '#pl-2_smt.a.15' + rel: assessment-for + links: + - href: '#pl-2_smt.a' + rel: assessment-for - id: pl-2_obj.b name: assessment-objective props: @@ -75601,6 +82077,9 @@ catalog: value: PL-02b.[01] class: sp800-53a prose: 'copies of the plans are distributed to {{ insert: param, pl-02_odp.02 }};' + links: + - href: '#pl-2_smt.b' + rel: assessment-for - id: pl-2_obj.b-2 name: assessment-objective props: @@ -75608,6 +82087,12 @@ catalog: value: PL-02b.[02] class: sp800-53a prose: 'subsequent changes to the plans are communicated to {{ insert: param, pl-02_odp.02 }};' + links: + - href: '#pl-2_smt.b' + rel: assessment-for + links: + - href: '#pl-2_smt.b' + rel: assessment-for - id: pl-2_obj.c name: assessment-objective props: @@ -75615,6 +82100,9 @@ catalog: value: PL-02c. class: sp800-53a prose: 'plans are reviewed {{ insert: param, pl-02_odp.03 }};' + links: + - href: '#pl-2_smt.c' + rel: assessment-for - id: pl-2_obj.d name: assessment-objective props: @@ -75629,6 +82117,9 @@ catalog: value: PL-02d.[01] class: sp800-53a prose: plans are updated to address changes to the system and environment of operations; + links: + - href: '#pl-2_smt.d' + rel: assessment-for - id: pl-2_obj.d-2 name: assessment-objective props: @@ -75636,6 +82127,9 @@ catalog: value: PL-02d.[02] class: sp800-53a prose: plans are updated to address problems identified during the plan implementation; + links: + - href: '#pl-2_smt.d' + rel: assessment-for - id: pl-2_obj.d-3 name: assessment-objective props: @@ -75643,6 +82137,12 @@ catalog: value: PL-02d.[03] class: sp800-53a prose: plans are updated to address problems identified during control assessments; + links: + - href: '#pl-2_smt.d' + rel: assessment-for + links: + - href: '#pl-2_smt.d' + rel: assessment-for - id: pl-2_obj.e name: assessment-objective props: @@ -75657,6 +82157,9 @@ catalog: value: PL-02e.[01] class: sp800-53a prose: plans are protected from unauthorized disclosure; + links: + - href: '#pl-2_smt.e' + rel: assessment-for - id: pl-2_obj.e-2 name: assessment-objective props: @@ -75664,6 +82167,15 @@ catalog: value: PL-02e.[02] class: sp800-53a prose: plans are protected from unauthorized modification. + links: + - href: '#pl-2_smt.e' + rel: assessment-for + links: + - href: '#pl-2_smt.e' + rel: assessment-for + links: + - href: '#pl-2_smt' + rel: assessment-for - id: pl-2_asm-examine name: assessment-method props: @@ -75941,6 +82453,9 @@ catalog: value: PL-04a.[01] class: sp800-53a prose: rules that describe responsibilities and expected behavior for information and system usage, security, and privacy are established for individuals requiring access to the system; + links: + - href: '#pl-4_smt.a' + rel: assessment-for - id: pl-4_obj.a-2 name: assessment-objective props: @@ -75948,6 +82463,12 @@ catalog: value: PL-04a.[02] class: sp800-53a prose: rules that describe responsibilities and expected behavior for information and system usage, security, and privacy are provided to individuals requiring access to the system; + links: + - href: '#pl-4_smt.a' + rel: assessment-for + links: + - href: '#pl-4_smt.a' + rel: assessment-for - id: pl-4_obj.b name: assessment-objective props: @@ -75955,6 +82476,9 @@ catalog: value: PL-04b. class: sp800-53a prose: before authorizing access to information and the system, a documented acknowledgement from such individuals indicating that they have read, understand, and agree to abide by the rules of behavior is received; + links: + - href: '#pl-4_smt.b' + rel: assessment-for - id: pl-4_obj.c name: assessment-objective props: @@ -75962,6 +82486,9 @@ catalog: value: PL-04c. class: sp800-53a prose: 'rules of behavior are reviewed and updated {{ insert: param, pl-04_odp.01 }};' + links: + - href: '#pl-4_smt.c' + rel: assessment-for - id: pl-4_obj.d name: assessment-objective props: @@ -75969,6 +82496,12 @@ catalog: value: PL-04d. class: sp800-53a prose: 'individuals who have acknowledged a previous version of the rules of behavior are required to read and reacknowledge {{ insert: param, pl-04_odp.02 }}.' + links: + - href: '#pl-4_smt.d' + rel: assessment-for + links: + - href: '#pl-4_smt' + rel: assessment-for - id: pl-4_asm-examine name: assessment-method props: @@ -76091,6 +82624,9 @@ catalog: value: PL-04(01)(a) class: sp800-53a prose: the rules of behavior include restrictions on the use of social media, social networking sites, and external sites/applications; + links: + - href: '#pl-4.1_smt.a' + rel: assessment-for - id: pl-4.1_obj.b name: assessment-objective props: @@ -76098,6 +82634,9 @@ catalog: value: PL-04(01)(b) class: sp800-53a prose: the rules of behavior include restrictions on posting organizational information on public websites; + links: + - href: '#pl-4.1_smt.b' + rel: assessment-for - id: pl-4.1_obj.c name: assessment-objective props: @@ -76105,6 +82644,12 @@ catalog: value: PL-04(01)(c) class: sp800-53a prose: the rules of behavior include restrictions on the use of organization-provided identifiers (e.g., email addresses) and authentication secrets (e.g., passwords) for creating accounts on external sites/applications. + links: + - href: '#pl-4.1_smt.c' + rel: assessment-for + links: + - href: '#pl-4.1_smt' + rel: assessment-for - id: pl-4.1_asm-examine name: assessment-method props: @@ -76259,6 +82804,9 @@ catalog: value: PL-07a. class: sp800-53a prose: a CONOPS for the system describing how the organization intends to operate the system from the perspective of information security and privacy is developed; + links: + - href: '#pl-7_smt.a' + rel: assessment-for - id: pl-7_obj.b name: assessment-objective props: @@ -76266,6 +82814,12 @@ catalog: value: PL-07b. class: sp800-53a prose: 'the CONOPS is reviewed and updated {{ insert: param, pl-07_odp }}.' + links: + - href: '#pl-7_smt.b' + rel: assessment-for + links: + - href: '#pl-7_smt' + rel: assessment-for - id: pl-7_asm-examine name: assessment-method props: @@ -76462,6 +83016,9 @@ catalog: value: PL-08a.01 class: sp800-53a prose: a security architecture for the system describes the requirements and approach to be taken for protecting the confidentiality, integrity, and availability of organizational information; + links: + - href: '#pl-8_smt.a.1' + rel: assessment-for - id: pl-8_obj.a.2 name: assessment-objective props: @@ -76469,6 +83026,9 @@ catalog: value: PL-08a.02 class: sp800-53a prose: a privacy architecture describes the requirements and approach to be taken for processing personally identifiable information to minimize privacy risk to individuals; + links: + - href: '#pl-8_smt.a.2' + rel: assessment-for - id: pl-8_obj.a.3 name: assessment-objective props: @@ -76483,6 +83043,9 @@ catalog: value: PL-08a.03[01] class: sp800-53a prose: a security architecture for the system describes how the architecture is integrated into and supports the enterprise architecture; + links: + - href: '#pl-8_smt.a.3' + rel: assessment-for - id: pl-8_obj.a.3-2 name: assessment-objective props: @@ -76490,6 +83053,12 @@ catalog: value: PL-08a.03[02] class: sp800-53a prose: a privacy architecture for the system describes how the architecture is integrated into and supports the enterprise architecture; + links: + - href: '#pl-8_smt.a.3' + rel: assessment-for + links: + - href: '#pl-8_smt.a.3' + rel: assessment-for - id: pl-8_obj.a.4 name: assessment-objective props: @@ -76504,6 +83073,9 @@ catalog: value: PL-08a.04[01] class: sp800-53a prose: a security architecture for the system describes any assumptions about and dependencies on external systems and services; + links: + - href: '#pl-8_smt.a.4' + rel: assessment-for - id: pl-8_obj.a.4-2 name: assessment-objective props: @@ -76511,6 +83083,15 @@ catalog: value: PL-08a.04[02] class: sp800-53a prose: a privacy architecture for the system describes any assumptions about and dependencies on external systems and services; + links: + - href: '#pl-8_smt.a.4' + rel: assessment-for + links: + - href: '#pl-8_smt.a.4' + rel: assessment-for + links: + - href: '#pl-8_smt.a' + rel: assessment-for - id: pl-8_obj.b name: assessment-objective props: @@ -76518,6 +83099,9 @@ catalog: value: PL-08b. class: sp800-53a prose: 'changes in the enterprise architecture are reviewed and updated {{ insert: param, pl-08_odp }} to reflect changes in the enterprise architecture;' + links: + - href: '#pl-8_smt.b' + rel: assessment-for - id: pl-8_obj.c name: assessment-objective props: @@ -76532,6 +83116,9 @@ catalog: value: PL-08c.[01] class: sp800-53a prose: planned architecture changes are reflected in the security plan; + links: + - href: '#pl-8_smt.c' + rel: assessment-for - id: pl-8_obj.c-2 name: assessment-objective props: @@ -76539,6 +83126,9 @@ catalog: value: PL-08c.[02] class: sp800-53a prose: planned architecture changes are reflected in the privacy plan; + links: + - href: '#pl-8_smt.c' + rel: assessment-for - id: pl-8_obj.c-3 name: assessment-objective props: @@ -76546,6 +83136,9 @@ catalog: value: PL-08c.[03] class: sp800-53a prose: planned architecture changes are reflected in the Concept of Operations (CONOPS); + links: + - href: '#pl-8_smt.c' + rel: assessment-for - id: pl-8_obj.c-4 name: assessment-objective props: @@ -76553,6 +83146,9 @@ catalog: value: PL-08c.[04] class: sp800-53a prose: planned architecture changes are reflected in criticality analysis; + links: + - href: '#pl-8_smt.c' + rel: assessment-for - id: pl-8_obj.c-5 name: assessment-objective props: @@ -76560,6 +83156,9 @@ catalog: value: PL-08c.[05] class: sp800-53a prose: planned architecture changes are reflected in organizational procedures; + links: + - href: '#pl-8_smt.c' + rel: assessment-for - id: pl-8_obj.c-6 name: assessment-objective props: @@ -76567,6 +83166,15 @@ catalog: value: PL-08c.[06] class: sp800-53a prose: planned architecture changes are reflected in procurements and acquisitions. + links: + - href: '#pl-8_smt.c' + rel: assessment-for + links: + - href: '#pl-8_smt.c' + rel: assessment-for + links: + - href: '#pl-8_smt' + rel: assessment-for - id: pl-8_asm-examine name: assessment-method props: @@ -76721,6 +83329,9 @@ catalog: value: PL-08(01)(a)[01] class: sp800-53a prose: 'the security architecture for the system is designed using a defense-in-depth approach that allocates {{ insert: param, pl-08.01_odp.01 }} to {{ insert: param, pl-08.01_odp.02 }};' + links: + - href: '#pl-8.1_smt.a' + rel: assessment-for - id: pl-8.1_obj.a-2 name: assessment-objective props: @@ -76728,6 +83339,12 @@ catalog: value: PL-08(01)(a)[02] class: sp800-53a prose: 'the privacy architecture for the system is designed using a defense-in-depth approach that allocates {{ insert: param, pl-08.01_odp.01 }} to {{ insert: param, pl-08.01_odp.02 }};' + links: + - href: '#pl-8.1_smt.a' + rel: assessment-for + links: + - href: '#pl-8.1_smt.a' + rel: assessment-for - id: pl-8.1_obj.b name: assessment-objective props: @@ -76742,6 +83359,9 @@ catalog: value: PL-08(01)(b)[01] class: sp800-53a prose: the security architecture for the system is designed using a defense-in-depth approach that ensures the allocated controls operate in a coordinated and mutually reinforcing manner; + links: + - href: '#pl-8.1_smt.b' + rel: assessment-for - id: pl-8.1_obj.b-2 name: assessment-objective props: @@ -76749,6 +83369,15 @@ catalog: value: PL-08(01)(b)[02] class: sp800-53a prose: the privacy architecture for the system is designed using a defense-in-depth approach that ensures the allocated controls operate in a coordinated and mutually reinforcing manner. + links: + - href: '#pl-8.1_smt.b' + rel: assessment-for + links: + - href: '#pl-8.1_smt.b' + rel: assessment-for + links: + - href: '#pl-8.1_smt' + rel: assessment-for - id: pl-8.1_asm-examine name: assessment-method props: @@ -76867,6 +83496,9 @@ catalog: value: PL-08(02) class: sp800-53a prose: '{{ insert: param, pl-08.02_odp.01 }} that are allocated to {{ insert: param, pl-08.02_odp.02 }} are required to be obtained from different suppliers.' + links: + - href: '#pl-8.2_smt' + rel: assessment-for - id: pl-8.2_asm-examine name: assessment-method props: @@ -76983,6 +83615,9 @@ catalog: value: PL-09 class: sp800-53a prose: '{{ insert: param, pl-09_odp }} are centrally managed.' + links: + - href: '#pl-9_smt' + rel: assessment-for - id: pl-9_asm-examine name: assessment-method props: @@ -77095,6 +83730,9 @@ catalog: value: PL-10 class: sp800-53a prose: a control baseline for the system is selected. + links: + - href: '#pl-10_smt' + rel: assessment-for - id: pl-10_asm-examine name: assessment-method props: @@ -77220,6 +83858,9 @@ catalog: value: PL-11 class: sp800-53a prose: the selected control baseline is tailored by applying specified tailoring actions. + links: + - href: '#pl-11_smt' + rel: assessment-for - id: pl-11_asm-examine name: assessment-method props: @@ -77432,6 +84073,9 @@ catalog: value: PM-01a.[01] class: sp800-53a prose: an organization-wide information security program plan is developed; + links: + - href: '#pm-1_smt.a' + rel: assessment-for - id: pm-1_obj.a-2 name: assessment-objective props: @@ -77439,6 +84083,9 @@ catalog: value: PM-01a.[02] class: sp800-53a prose: the information security program plan is disseminated; + links: + - href: '#pm-1_smt.a' + rel: assessment-for - id: pm-1_obj.a.1 name: assessment-objective props: @@ -77453,6 +84100,9 @@ catalog: value: PM-01a.01[01] class: sp800-53a prose: the information security program plan provides an overview of the requirements for the security program; + links: + - href: '#pm-1_smt.a.1' + rel: assessment-for - id: pm-1_obj.a.1-2 name: assessment-objective props: @@ -77460,6 +84110,9 @@ catalog: value: PM-01a.01[02] class: sp800-53a prose: the information security program plan provides a description of the security program management controls in place or planned for meeting those requirements; + links: + - href: '#pm-1_smt.a.1' + rel: assessment-for - id: pm-1_obj.a.1-3 name: assessment-objective props: @@ -77467,6 +84120,12 @@ catalog: value: PM-01a.01[03] class: sp800-53a prose: the information security program plan provides a description of the common controls in place or planned for meeting those requirements; + links: + - href: '#pm-1_smt.a.1' + rel: assessment-for + links: + - href: '#pm-1_smt.a.1' + rel: assessment-for - id: pm-1_obj.a.2 name: assessment-objective props: @@ -77481,6 +84140,9 @@ catalog: value: PM-01a.02[01] class: sp800-53a prose: the information security program plan includes the identification and assignment of roles; + links: + - href: '#pm-1_smt.a.2' + rel: assessment-for - id: pm-1_obj.a.2-2 name: assessment-objective props: @@ -77488,6 +84150,9 @@ catalog: value: PM-01a.02[02] class: sp800-53a prose: the information security program plan includes the identification and assignment of responsibilities; + links: + - href: '#pm-1_smt.a.2' + rel: assessment-for - id: pm-1_obj.a.2-3 name: assessment-objective props: @@ -77495,6 +84160,9 @@ catalog: value: PM-01a.02[03] class: sp800-53a prose: the information security program plan addresses management commitment; + links: + - href: '#pm-1_smt.a.2' + rel: assessment-for - id: pm-1_obj.a.2-4 name: assessment-objective props: @@ -77502,6 +84170,9 @@ catalog: value: PM-01a.02[04] class: sp800-53a prose: the information security program plan addresses coordination among organizational entities; + links: + - href: '#pm-1_smt.a.2' + rel: assessment-for - id: pm-1_obj.a.2-5 name: assessment-objective props: @@ -77509,6 +84180,12 @@ catalog: value: PM-01a.02[05] class: sp800-53a prose: the information security program plan addresses compliance; + links: + - href: '#pm-1_smt.a.2' + rel: assessment-for + links: + - href: '#pm-1_smt.a.2' + rel: assessment-for - id: pm-1_obj.a.3 name: assessment-objective props: @@ -77516,6 +84193,9 @@ catalog: value: PM-01a.03 class: sp800-53a prose: the information security program plan reflects the coordination among the organizational entities responsible for information security; + links: + - href: '#pm-1_smt.a.3' + rel: assessment-for - id: pm-1_obj.a.4 name: assessment-objective props: @@ -77523,6 +84203,12 @@ catalog: value: PM-01a.04 class: sp800-53a prose: the information security program plan is approved by a senior official with responsibility and accountability for the risk being incurred to organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation; + links: + - href: '#pm-1_smt.a.4' + rel: assessment-for + links: + - href: '#pm-1_smt.a' + rel: assessment-for - id: pm-1_obj.b name: assessment-objective props: @@ -77537,6 +84223,9 @@ catalog: value: PM-01b.[01] class: sp800-53a prose: 'the information security program plan is reviewed and updated {{ insert: param, pm-01_odp.01 }};' + links: + - href: '#pm-1_smt.b' + rel: assessment-for - id: pm-1_obj.b-2 name: assessment-objective props: @@ -77544,6 +84233,12 @@ catalog: value: PM-01b.[02] class: sp800-53a prose: 'the information security program plan is reviewed and updated following {{ insert: param, pm-01_odp.02 }};' + links: + - href: '#pm-1_smt.b' + rel: assessment-for + links: + - href: '#pm-1_smt.b' + rel: assessment-for - id: pm-1_obj.c name: assessment-objective props: @@ -77558,6 +84253,9 @@ catalog: value: PM-01c.[01] class: sp800-53a prose: the information security program plan is protected from unauthorized disclosure; + links: + - href: '#pm-1_smt.c' + rel: assessment-for - id: pm-1_obj.c-2 name: assessment-objective props: @@ -77565,6 +84263,15 @@ catalog: value: PM-01c.[02] class: sp800-53a prose: the information security program plan is protected from unauthorized modification. + links: + - href: '#pm-1_smt.c' + rel: assessment-for + links: + - href: '#pm-1_smt.c' + rel: assessment-for + links: + - href: '#pm-1_smt' + rel: assessment-for - id: pm-1_asm-examine name: assessment-method props: @@ -77664,6 +84371,9 @@ catalog: value: PM-02[01] class: sp800-53a prose: a senior agency information security officer is appointed; + links: + - href: '#pm-2_smt' + rel: assessment-for - id: pm-2_obj-2 name: assessment-objective props: @@ -77671,6 +84381,9 @@ catalog: value: PM-02[02] class: sp800-53a prose: the senior agency information security officer is provided with the mission and resources to coordinate an organization-wide information security program; + links: + - href: '#pm-2_smt' + rel: assessment-for - id: pm-2_obj-3 name: assessment-objective props: @@ -77678,6 +84391,9 @@ catalog: value: PM-02[03] class: sp800-53a prose: the senior agency information security officer is provided with the mission and resources to develop an organization-wide information security program; + links: + - href: '#pm-2_smt' + rel: assessment-for - id: pm-2_obj-4 name: assessment-objective props: @@ -77685,6 +84401,9 @@ catalog: value: PM-02[04] class: sp800-53a prose: the senior agency information security officer is provided with the mission and resources to implement an organization-wide information security program; + links: + - href: '#pm-2_smt' + rel: assessment-for - id: pm-2_obj-5 name: assessment-objective props: @@ -77692,6 +84411,12 @@ catalog: value: PM-02[05] class: sp800-53a prose: the senior agency information security officer is provided with the mission and resources to maintain an organization-wide information security program. + links: + - href: '#pm-2_smt' + rel: assessment-for + links: + - href: '#pm-2_smt' + rel: assessment-for - id: pm-2_asm-examine name: assessment-method props: @@ -77797,6 +84522,9 @@ catalog: value: PM-03a.[01] class: sp800-53a prose: the resources needed to implement the information security program are included in capital planning and investment requests, and all exceptions are documented; + links: + - href: '#pm-3_smt.a' + rel: assessment-for - id: pm-3_obj.a-2 name: assessment-objective props: @@ -77804,6 +84532,12 @@ catalog: value: PM-03a.[02] class: sp800-53a prose: the resources needed to implement the privacy program are included in capital planning and investment requests, and all exceptions are documented; + links: + - href: '#pm-3_smt.a' + rel: assessment-for + links: + - href: '#pm-3_smt.a' + rel: assessment-for - id: pm-3_obj.b name: assessment-objective props: @@ -77818,6 +84552,9 @@ catalog: value: PM-03b.[01] class: sp800-53a prose: the documentation required for addressing the information security program in capital planning and investment requests is prepared in accordance with applicable laws, executive orders, directives, policies, regulations, standards; + links: + - href: '#pm-3_smt.b' + rel: assessment-for - id: pm-3_obj.b-2 name: assessment-objective props: @@ -77825,6 +84562,12 @@ catalog: value: PM-03b.[02] class: sp800-53a prose: the documentation required for addressing the privacy program in capital planning and investment requests is prepared in accordance with applicable laws, executive orders, directives, policies, regulations, standards; + links: + - href: '#pm-3_smt.b' + rel: assessment-for + links: + - href: '#pm-3_smt.b' + rel: assessment-for - id: pm-3_obj.c name: assessment-objective props: @@ -77839,6 +84582,9 @@ catalog: value: PM-03c.[01] class: sp800-53a prose: information security resources are made available for expenditure as planned; + links: + - href: '#pm-3_smt.c' + rel: assessment-for - id: pm-3_obj.c-2 name: assessment-objective props: @@ -77846,6 +84592,15 @@ catalog: value: PM-03c.[02] class: sp800-53a prose: privacy resources are made available for expenditure as planned. + links: + - href: '#pm-3_smt.c' + rel: assessment-for + links: + - href: '#pm-3_smt.c' + rel: assessment-for + links: + - href: '#pm-3_smt' + rel: assessment-for - id: pm-3_asm-examine name: assessment-method props: @@ -78006,6 +84761,9 @@ catalog: value: PM-04a.01[01] class: sp800-53a prose: a process to ensure that plans of action and milestones for the information security program and associated organizational systems are developed; + links: + - href: '#pm-4_smt.a.1' + rel: assessment-for - id: pm-4_obj.a.1-2 name: assessment-objective props: @@ -78013,6 +84771,9 @@ catalog: value: PM-04a.01[02] class: sp800-53a prose: a process to ensure that plans of action and milestones for the information security program and associated organizational systems are maintained; + links: + - href: '#pm-4_smt.a.1' + rel: assessment-for - id: pm-4_obj.a.1-3 name: assessment-objective props: @@ -78020,6 +84781,9 @@ catalog: value: PM-04a.01[03] class: sp800-53a prose: a process to ensure that plans of action and milestones for the privacy program and associated organizational systems are developed; + links: + - href: '#pm-4_smt.a.1' + rel: assessment-for - id: pm-4_obj.a.1-4 name: assessment-objective props: @@ -78027,6 +84791,9 @@ catalog: value: PM-04a.01[04] class: sp800-53a prose: a process to ensure that plans of action and milestones for the privacy program and associated organizational systems are maintained; + links: + - href: '#pm-4_smt.a.1' + rel: assessment-for - id: pm-4_obj.a.1-5 name: assessment-objective props: @@ -78034,6 +84801,9 @@ catalog: value: PM-04a.01[05] class: sp800-53a prose: a process to ensure that plans of action and milestones for the supply chain risk management program and associated organizational systems are developed; + links: + - href: '#pm-4_smt.a.1' + rel: assessment-for - id: pm-4_obj.a.1-6 name: assessment-objective props: @@ -78041,6 +84811,12 @@ catalog: value: PM-04a.01[06] class: sp800-53a prose: a process to ensure that plans of action and milestones for the supply chain risk management program and associated organizational systems are maintained; + links: + - href: '#pm-4_smt.a.1' + rel: assessment-for + links: + - href: '#pm-4_smt.a.1' + rel: assessment-for - id: pm-4_obj.a.2 name: assessment-objective props: @@ -78055,6 +84831,9 @@ catalog: value: PM-04a.02[01] class: sp800-53a prose: a process to ensure that plans of action and milestones for the information security program and associated organizational systems document remedial information security risk management actions to adequately respond to risks to organizational operations and assets, individuals, other organizations, and the Nation; + links: + - href: '#pm-4_smt.a.2' + rel: assessment-for - id: pm-4_obj.a.2-2 name: assessment-objective props: @@ -78062,6 +84841,9 @@ catalog: value: PM-04a.02[02] class: sp800-53a prose: a process to ensure that plans of action and milestones for the privacy program and associated organizational systems document remedial privacy risk management actions to adequately respond to risks to organizational operations and assets, individuals, other organizations, and the Nation; + links: + - href: '#pm-4_smt.a.2' + rel: assessment-for - id: pm-4_obj.a.2-3 name: assessment-objective props: @@ -78069,6 +84851,12 @@ catalog: value: PM-04a.02[03] class: sp800-53a prose: a process to ensure that plans of action and milestones for the supply chain risk management program and associated organizational systems document remedial supply chain risk management actions to adequately respond to risks to organizational operations and assets, individuals, other organizations, and the Nation; + links: + - href: '#pm-4_smt.a.2' + rel: assessment-for + links: + - href: '#pm-4_smt.a.2' + rel: assessment-for - id: pm-4_obj.a.3 name: assessment-objective props: @@ -78083,6 +84871,9 @@ catalog: value: PM-04a.03[01] class: sp800-53a prose: a process to ensure that plans of action and milestones for the information security risk management programs and associated organizational systems are reported in accordance with established reporting requirements; + links: + - href: '#pm-4_smt.a.3' + rel: assessment-for - id: pm-4_obj.a.3-2 name: assessment-objective props: @@ -78090,6 +84881,9 @@ catalog: value: PM-04a.03[02] class: sp800-53a prose: a process to ensure that plans of action and milestones for the privacy risk management programs and associated organizational systems are reported in accordance with established reporting requirements; + links: + - href: '#pm-4_smt.a.3' + rel: assessment-for - id: pm-4_obj.a.3-3 name: assessment-objective props: @@ -78097,6 +84891,15 @@ catalog: value: PM-04a.03[03] class: sp800-53a prose: a process to ensure that plans of action and milestones for the supply chain risk management programs and associated organizational systems are reported in accordance with established reporting requirements; + links: + - href: '#pm-4_smt.a.3' + rel: assessment-for + links: + - href: '#pm-4_smt.a.3' + rel: assessment-for + links: + - href: '#pm-4_smt.a' + rel: assessment-for - id: pm-4_obj.b name: assessment-objective props: @@ -78111,6 +84914,9 @@ catalog: value: PM-04b.[01] class: sp800-53a prose: plans of action and milestones are reviewed for consistency with the organizational risk management strategy; + links: + - href: '#pm-4_smt.b' + rel: assessment-for - id: pm-4_obj.b-2 name: assessment-objective props: @@ -78118,6 +84924,15 @@ catalog: value: PM-04b.[02] class: sp800-53a prose: plans of action and milestones are reviewed for consistency with organization-wide priorities for risk response actions. + links: + - href: '#pm-4_smt.b' + rel: assessment-for + links: + - href: '#pm-4_smt.b' + rel: assessment-for + links: + - href: '#pm-4_smt' + rel: assessment-for - id: pm-4_asm-examine name: assessment-method props: @@ -78226,6 +85041,9 @@ catalog: value: PM-05[01] class: sp800-53a prose: an inventory of organizational systems is developed; + links: + - href: '#pm-5_smt' + rel: assessment-for - id: pm-5_obj-2 name: assessment-objective props: @@ -78233,6 +85051,12 @@ catalog: value: PM-05[02] class: sp800-53a prose: 'the inventory of organizational systems is updated {{ insert: param, pm-05_odp }}.' + links: + - href: '#pm-5_smt' + rel: assessment-for + links: + - href: '#pm-5_smt' + rel: assessment-for - id: pm-5_asm-examine name: assessment-method props: @@ -78356,6 +85180,9 @@ catalog: value: PM-05(01)[01] class: sp800-53a prose: an inventory of all systems, applications, and projects that process personally identifiable information is established; + links: + - href: '#pm-5.1_smt' + rel: assessment-for - id: pm-5.1_obj-2 name: assessment-objective props: @@ -78363,6 +85190,9 @@ catalog: value: PM-05(01)[02] class: sp800-53a prose: an inventory of all systems, applications, and projects that process personally identifiable information is maintained; + links: + - href: '#pm-5.1_smt' + rel: assessment-for - id: pm-5.1_obj-3 name: assessment-objective props: @@ -78370,6 +85200,12 @@ catalog: value: PM-05(01)[03] class: sp800-53a prose: 'an inventory of all systems, applications, and projects that process personally identifiable information is updated {{ insert: param, pm-05.01_odp }}.' + links: + - href: '#pm-5.1_smt' + rel: assessment-for + links: + - href: '#pm-5.1_smt' + rel: assessment-for - id: pm-5.1_asm-examine name: assessment-method props: @@ -78484,6 +85320,9 @@ catalog: value: PM-06[01] class: sp800-53a prose: information security measures of performance are developed; + links: + - href: '#pm-6_smt' + rel: assessment-for - id: pm-6_obj-2 name: assessment-objective props: @@ -78491,6 +85330,9 @@ catalog: value: PM-06[02] class: sp800-53a prose: information security measures of performance are monitored; + links: + - href: '#pm-6_smt' + rel: assessment-for - id: pm-6_obj-3 name: assessment-objective props: @@ -78498,6 +85340,9 @@ catalog: value: PM-06[03] class: sp800-53a prose: the results of information security measures of performance are reported; + links: + - href: '#pm-6_smt' + rel: assessment-for - id: pm-6_obj-4 name: assessment-objective props: @@ -78505,6 +85350,9 @@ catalog: value: PM-06[04] class: sp800-53a prose: privacy measures of performance are developed; + links: + - href: '#pm-6_smt' + rel: assessment-for - id: pm-6_obj-5 name: assessment-objective props: @@ -78512,6 +85360,9 @@ catalog: value: PM-06[05] class: sp800-53a prose: privacy measures of performance are monitored; + links: + - href: '#pm-6_smt' + rel: assessment-for - id: pm-6_obj-6 name: assessment-objective props: @@ -78519,6 +85370,12 @@ catalog: value: PM-06[06] class: sp800-53a prose: the results of privacy measures of performance are reported. + links: + - href: '#pm-6_smt' + rel: assessment-for + links: + - href: '#pm-6_smt' + rel: assessment-for - id: pm-6_asm-examine name: assessment-method props: @@ -78638,6 +85495,9 @@ catalog: value: PM-07[01] class: sp800-53a prose: an enterprise architecture is developed with consideration for information security; + links: + - href: '#pm-7_smt' + rel: assessment-for - id: pm-7_obj-2 name: assessment-objective props: @@ -78645,6 +85505,9 @@ catalog: value: PM-07[02] class: sp800-53a prose: an enterprise architecture is maintained with consideration for information security; + links: + - href: '#pm-7_smt' + rel: assessment-for - id: pm-7_obj-3 name: assessment-objective props: @@ -78652,6 +85515,9 @@ catalog: value: PM-07[03] class: sp800-53a prose: an enterprise architecture is developed with consideration for privacy; + links: + - href: '#pm-7_smt' + rel: assessment-for - id: pm-7_obj-4 name: assessment-objective props: @@ -78659,6 +85525,9 @@ catalog: value: PM-07[04] class: sp800-53a prose: an enterprise architecture is maintained with consideration for privacy; + links: + - href: '#pm-7_smt' + rel: assessment-for - id: pm-7_obj-5 name: assessment-objective props: @@ -78666,6 +85535,9 @@ catalog: value: PM-07[05] class: sp800-53a prose: an enterprise architecture is developed with consideration for the resulting risk to organizational operations and assets, individuals, other organizations, and the Nation; + links: + - href: '#pm-7_smt' + rel: assessment-for - id: pm-7_obj-6 name: assessment-objective props: @@ -78673,6 +85545,12 @@ catalog: value: PM-07[06] class: sp800-53a prose: an enterprise architecture is maintained with consideration for the resulting risk to organizational operations and assets, individuals, other organizations, and the Nation. + links: + - href: '#pm-7_smt' + rel: assessment-for + links: + - href: '#pm-7_smt' + rel: assessment-for - id: pm-7_asm-examine name: assessment-method props: @@ -78775,6 +85653,9 @@ catalog: value: PM-07(01) class: sp800-53a prose: '{{ insert: param, pm-07.01_odp }} are offloaded to other systems, system components, or an external provider.' + links: + - href: '#pm-7.1_smt' + rel: assessment-for - id: pm-7.1_asm-examine name: assessment-method props: @@ -78898,6 +85779,9 @@ catalog: value: PM-08[01] class: sp800-53a prose: information security issues are addressed in the development of a critical infrastructure and key resources protection plan; + links: + - href: '#pm-8_smt' + rel: assessment-for - id: pm-8_obj-2 name: assessment-objective props: @@ -78905,6 +85789,9 @@ catalog: value: PM-08[02] class: sp800-53a prose: information security issues are addressed in the documentation of a critical infrastructure and key resources protection plan; + links: + - href: '#pm-8_smt' + rel: assessment-for - id: pm-8_obj-3 name: assessment-objective props: @@ -78912,6 +85799,9 @@ catalog: value: PM-08[03] class: sp800-53a prose: information security issues are addressed in the update of a critical infrastructure and key resources protection plan; + links: + - href: '#pm-8_smt' + rel: assessment-for - id: pm-8_obj-4 name: assessment-objective props: @@ -78919,6 +85809,9 @@ catalog: value: PM-08[04] class: sp800-53a prose: privacy issues are addressed in the development of a critical infrastructure and key resources protection plan; + links: + - href: '#pm-8_smt' + rel: assessment-for - id: pm-8_obj-5 name: assessment-objective props: @@ -78926,6 +85819,9 @@ catalog: value: PM-08[05] class: sp800-53a prose: privacy issues are addressed in the documentation of a critical infrastructure and key resources protection plan; + links: + - href: '#pm-8_smt' + rel: assessment-for - id: pm-8_obj-6 name: assessment-objective props: @@ -78933,6 +85829,12 @@ catalog: value: PM-08[06] class: sp800-53a prose: privacy issues are addressed in the update of a critical infrastructure and key resources protection plan. + links: + - href: '#pm-8_smt' + rel: assessment-for + links: + - href: '#pm-8_smt' + rel: assessment-for - id: pm-8_asm-examine name: assessment-method props: @@ -79164,6 +86066,9 @@ catalog: value: PM-09a.01 class: sp800-53a prose: a comprehensive strategy is developed to manage security risk to organizational operations and assets, individuals, other organizations, and the Nation associated with the operation and use of organizational systems; + links: + - href: '#pm-9_smt.a.1' + rel: assessment-for - id: pm-9_obj.a.2 name: assessment-objective props: @@ -79171,6 +86076,12 @@ catalog: value: PM-09a.02 class: sp800-53a prose: a comprehensive strategy is developed to manage privacy risk to individuals resulting from the authorized processing of personally identifiable information; + links: + - href: '#pm-9_smt.a.2' + rel: assessment-for + links: + - href: '#pm-9_smt.a' + rel: assessment-for - id: pm-9_obj.b name: assessment-objective props: @@ -79178,6 +86089,9 @@ catalog: value: PM-09b. class: sp800-53a prose: the risk management strategy is implemented consistently across the organization; + links: + - href: '#pm-9_smt.b' + rel: assessment-for - id: pm-9_obj.c name: assessment-objective props: @@ -79185,6 +86099,12 @@ catalog: value: PM-09c. class: sp800-53a prose: 'the risk management strategy is reviewed and updated {{ insert: param, pm-09_odp }} or as required to address organizational changes.' + links: + - href: '#pm-9_smt.c' + rel: assessment-for + links: + - href: '#pm-9_smt' + rel: assessment-for - id: pm-9_asm-examine name: assessment-method props: @@ -79318,6 +86238,9 @@ catalog: value: PM-10a.[01] class: sp800-53a prose: the security state of organizational systems and the environments in which those systems operate are managed through authorization processes; + links: + - href: '#pm-10_smt.a' + rel: assessment-for - id: pm-10_obj.a-2 name: assessment-objective props: @@ -79325,6 +86248,12 @@ catalog: value: PM-10a.[02] class: sp800-53a prose: the privacy state of organizational systems and the environments in which those systems operate are managed through authorization processes; + links: + - href: '#pm-10_smt.a' + rel: assessment-for + links: + - href: '#pm-10_smt.a' + rel: assessment-for - id: pm-10_obj.b name: assessment-objective props: @@ -79332,6 +86261,9 @@ catalog: value: PM-10b. class: sp800-53a prose: individuals are designated to fulfill specific roles and responsibilities within the organizational risk management process; + links: + - href: '#pm-10_smt.b' + rel: assessment-for - id: pm-10_obj.c name: assessment-objective props: @@ -79339,6 +86271,12 @@ catalog: value: PM-10c. class: sp800-53a prose: the authorization processes are integrated into an organization-wide risk management program. + links: + - href: '#pm-10_smt.c' + rel: assessment-for + links: + - href: '#pm-10_smt' + rel: assessment-for - id: pm-10_asm-examine name: assessment-method props: @@ -79502,6 +86440,9 @@ catalog: value: PM-11a.[01] class: sp800-53a prose: organizational mission and business processes are defined with consideration for information security; + links: + - href: '#pm-11_smt.a' + rel: assessment-for - id: pm-11_obj.a-2 name: assessment-objective props: @@ -79509,6 +86450,9 @@ catalog: value: PM-11a.[02] class: sp800-53a prose: organizational mission and business processes are defined with consideration for privacy; + links: + - href: '#pm-11_smt.a' + rel: assessment-for - id: pm-11_obj.a-3 name: assessment-objective props: @@ -79516,6 +86460,12 @@ catalog: value: PM-11a.[03] class: sp800-53a prose: organizational mission and business processes are defined with consideration for the resulting risk to organizational operations, organizational assets, individuals, other organizations, and the Nation; + links: + - href: '#pm-11_smt.a' + rel: assessment-for + links: + - href: '#pm-11_smt.a' + rel: assessment-for - id: pm-11_obj.b name: assessment-objective props: @@ -79530,6 +86480,9 @@ catalog: value: PM-11b.[01] class: sp800-53a prose: information protection needs arising from the defined mission and business processes are determined; + links: + - href: '#pm-11_smt.b' + rel: assessment-for - id: pm-11_obj.b-2 name: assessment-objective props: @@ -79537,6 +86490,12 @@ catalog: value: PM-11b.[02] class: sp800-53a prose: personally identifiable information processing needs arising from the defined mission and business processes are determined; + links: + - href: '#pm-11_smt.b' + rel: assessment-for + links: + - href: '#pm-11_smt.b' + rel: assessment-for - id: pm-11_obj.c name: assessment-objective props: @@ -79544,6 +86503,12 @@ catalog: value: PM-11c. class: sp800-53a prose: 'the mission and business processes are reviewed and revised {{ insert: param, pm-11_odp }}.' + links: + - href: '#pm-11_smt.c' + rel: assessment-for + links: + - href: '#pm-11_smt' + rel: assessment-for - id: pm-11_asm-examine name: assessment-method props: @@ -79687,6 +86652,9 @@ catalog: value: PM-12 class: sp800-53a prose: an insider threat program that includes a cross-discipline insider threat incident handling team is implemented. + links: + - href: '#pm-12_smt' + rel: assessment-for - id: pm-12_asm-interview name: assessment-method props: @@ -79767,6 +86735,9 @@ catalog: value: PM-13[01] class: sp800-53a prose: a security workforce development and improvement program is established; + links: + - href: '#pm-13_smt' + rel: assessment-for - id: pm-13_obj-2 name: assessment-objective props: @@ -79774,6 +86745,12 @@ catalog: value: PM-13[02] class: sp800-53a prose: a privacy workforce development and improvement program is established. + links: + - href: '#pm-13_smt' + rel: assessment-for + links: + - href: '#pm-13_smt' + rel: assessment-for - id: pm-13_asm-examine name: assessment-method props: @@ -79933,6 +86910,9 @@ catalog: value: PM-14a.01[01] class: sp800-53a prose: a process is implemented for ensuring that organizational plans for conducting security testing, training, and monitoring activities associated with organizational systems are developed; + links: + - href: '#pm-14_smt.a.1' + rel: assessment-for - id: pm-14_obj.a.1-2 name: assessment-objective props: @@ -79940,6 +86920,9 @@ catalog: value: PM-14a.01[02] class: sp800-53a prose: a process is implemented for ensuring that organizational plans for conducting security testing, training, and monitoring activities associated with organizational systems are maintained; + links: + - href: '#pm-14_smt.a.1' + rel: assessment-for - id: pm-14_obj.a.1-3 name: assessment-objective props: @@ -79947,6 +86930,9 @@ catalog: value: PM-14a.01[03] class: sp800-53a prose: a process is implemented for ensuring that organizational plans for conducting privacy testing, training, and monitoring activities associated with organizational systems are developed; + links: + - href: '#pm-14_smt.a.1' + rel: assessment-for - id: pm-14_obj.a.1-4 name: assessment-objective props: @@ -79954,6 +86940,12 @@ catalog: value: PM-14a.01[04] class: sp800-53a prose: a process is implemented for ensuring that organizational plans for conducting privacy testing, training, and monitoring activities associated with organizational systems are maintained; + links: + - href: '#pm-14_smt.a.1' + rel: assessment-for + links: + - href: '#pm-14_smt.a.1' + rel: assessment-for - id: pm-14_obj.a.2 name: assessment-objective props: @@ -79968,6 +86960,9 @@ catalog: value: PM-14a.02[01] class: sp800-53a prose: a process is implemented for ensuring that organizational plans for conducting security testing, training, and monitoring activities associated with organizational systems continue to be executed; + links: + - href: '#pm-14_smt.a.2' + rel: assessment-for - id: pm-14_obj.a.2-2 name: assessment-objective props: @@ -79975,6 +86970,15 @@ catalog: value: PM-14a.02[02] class: sp800-53a prose: a process is implemented for ensuring that organizational plans for conducting privacy testing, training, and monitoring activities associated with organizational systems continue to be executed; + links: + - href: '#pm-14_smt.a.2' + rel: assessment-for + links: + - href: '#pm-14_smt.a.2' + rel: assessment-for + links: + - href: '#pm-14_smt.a' + rel: assessment-for - id: pm-14_obj.b name: assessment-objective props: @@ -79989,6 +86993,9 @@ catalog: value: PM-14b.[01] class: sp800-53a prose: testing plans are reviewed for consistency with the organizational risk management strategy; + links: + - href: '#pm-14_smt.b' + rel: assessment-for - id: pm-14_obj.b-2 name: assessment-objective props: @@ -79996,6 +87003,9 @@ catalog: value: PM-14b.[02] class: sp800-53a prose: training plans are reviewed for consistency with the organizational risk management strategy; + links: + - href: '#pm-14_smt.b' + rel: assessment-for - id: pm-14_obj.b-3 name: assessment-objective props: @@ -80003,6 +87013,9 @@ catalog: value: PM-14b.[03] class: sp800-53a prose: monitoring plans are reviewed for consistency with the organizational risk management strategy; + links: + - href: '#pm-14_smt.b' + rel: assessment-for - id: pm-14_obj.b-4 name: assessment-objective props: @@ -80010,6 +87023,9 @@ catalog: value: PM-14b.[04] class: sp800-53a prose: testing plans are reviewed for consistency with organization-wide priorities for risk response actions; + links: + - href: '#pm-14_smt.b' + rel: assessment-for - id: pm-14_obj.b-5 name: assessment-objective props: @@ -80017,6 +87033,9 @@ catalog: value: PM-14b.[05] class: sp800-53a prose: training plans are reviewed for consistency with organization-wide priorities for risk response actions; + links: + - href: '#pm-14_smt.b' + rel: assessment-for - id: pm-14_obj.b-6 name: assessment-objective props: @@ -80024,6 +87043,15 @@ catalog: value: PM-14b.[06] class: sp800-53a prose: monitoring plans are reviewed for consistency with organization-wide priorities for risk response actions. + links: + - href: '#pm-14_smt.b' + rel: assessment-for + links: + - href: '#pm-14_smt.b' + rel: assessment-for + links: + - href: '#pm-14_smt' + rel: assessment-for - id: pm-14_asm-examine name: assessment-method props: @@ -80151,6 +87179,9 @@ catalog: value: PM-15a.[01] class: sp800-53a prose: contact is established and institutionalized with selected groups and associations within the security community to facilitate ongoing security education and training for organizational personnel; + links: + - href: '#pm-15_smt.a' + rel: assessment-for - id: pm-15_obj.a-2 name: assessment-objective props: @@ -80158,6 +87189,12 @@ catalog: value: PM-15a.[02] class: sp800-53a prose: contact is established and institutionalized with selected groups and associations within the privacy community to facilitate ongoing privacy education and training for organizational personnel; + links: + - href: '#pm-15_smt.a' + rel: assessment-for + links: + - href: '#pm-15_smt.a' + rel: assessment-for - id: pm-15_obj.b name: assessment-objective props: @@ -80172,6 +87209,9 @@ catalog: value: PM-15b.[01] class: sp800-53a prose: contact is established and institutionalized with selected groups and associations within the security community to maintain currency with recommended security practices, techniques, and technologies; + links: + - href: '#pm-15_smt.b' + rel: assessment-for - id: pm-15_obj.b-2 name: assessment-objective props: @@ -80179,6 +87219,12 @@ catalog: value: PM-15b.[02] class: sp800-53a prose: contact is established and institutionalized with selected groups and associations within the privacy community to maintain currency with recommended privacy practices, techniques, and technologies; + links: + - href: '#pm-15_smt.b' + rel: assessment-for + links: + - href: '#pm-15_smt.b' + rel: assessment-for - id: pm-15_obj.c name: assessment-objective props: @@ -80193,6 +87239,9 @@ catalog: value: PM-15c.[01] class: sp800-53a prose: contact is established and institutionalized with selected groups and associations within the security community to share current security information, including threats, vulnerabilities, and incidents; + links: + - href: '#pm-15_smt.c' + rel: assessment-for - id: pm-15_obj.c-2 name: assessment-objective props: @@ -80200,6 +87249,15 @@ catalog: value: PM-15c.[02] class: sp800-53a prose: contact is established and institutionalized with selected groups and associations within the privacy community to share current privacy information, including threats, vulnerabilities, and incidents. + links: + - href: '#pm-15_smt.c' + rel: assessment-for + links: + - href: '#pm-15_smt.c' + rel: assessment-for + links: + - href: '#pm-15_smt' + rel: assessment-for - id: pm-15_asm-examine name: assessment-method props: @@ -80293,6 +87351,9 @@ catalog: value: PM-16 class: sp800-53a prose: a threat awareness program that includes a cross-organization information-sharing capability for threat intelligence is implemented. + links: + - href: '#pm-16_smt' + rel: assessment-for - id: pm-16_asm-examine name: assessment-method props: @@ -80393,6 +87454,9 @@ catalog: value: PM-16(01) class: sp800-53a prose: automated mechanisms are employed to maximize the effectiveness of sharing threat intelligence information. + links: + - href: '#pm-16.1_smt' + rel: assessment-for - id: pm-16.1_asm-examine name: assessment-method props: @@ -80554,6 +87618,9 @@ catalog: value: PM-17a.[01] class: sp800-53a prose: policy is established to ensure that requirements for the protection of controlled unclassified information that is processed, stored, or transmitted on external systems are implemented in accordance with applicable laws, executive orders, directives, policies, regulations, and standards; + links: + - href: '#pm-17_smt.a' + rel: assessment-for - id: pm-17_obj.a-2 name: assessment-objective props: @@ -80561,6 +87628,12 @@ catalog: value: PM-17a.[02] class: sp800-53a prose: procedures are established to ensure that requirements for the protection of controlled unclassified information that is processed, stored, or transmitted on external systems are implemented in accordance with applicable laws, executive orders, directives, policies, regulations, and standards; + links: + - href: '#pm-17_smt.a' + rel: assessment-for + links: + - href: '#pm-17_smt.a' + rel: assessment-for - id: pm-17_obj.b name: assessment-objective props: @@ -80575,6 +87648,9 @@ catalog: value: PM-17b.[01] class: sp800-53a prose: 'policy is reviewed and updated {{ insert: param, pm-17_odp.01 }};' + links: + - href: '#pm-17_smt.b' + rel: assessment-for - id: pm-17_obj.b-2 name: assessment-objective props: @@ -80582,6 +87658,15 @@ catalog: value: PM-17b.[02] class: sp800-53a prose: 'procedures are reviewed and updated {{ insert: param, pm-17_odp.02 }} ' + links: + - href: '#pm-17_smt.b' + rel: assessment-for + links: + - href: '#pm-17_smt.b' + rel: assessment-for + links: + - href: '#pm-17_smt' + rel: assessment-for - id: pm-17_asm-examine name: assessment-method props: @@ -80734,6 +87819,9 @@ catalog: value: PM-18a.[01] class: sp800-53a prose: an organization-wide privacy program plan that provides an overview of the agency’s privacy program is developed; + links: + - href: '#pm-18_smt.a' + rel: assessment-for - id: pm-18_obj.a.1 name: assessment-objective props: @@ -80748,6 +87836,9 @@ catalog: value: PM-18a.01[01] class: sp800-53a prose: the privacy program plan includes a description of the structure of the privacy program; + links: + - href: '#pm-18_smt.a.1' + rel: assessment-for - id: pm-18_obj.a.1-2 name: assessment-objective props: @@ -80755,6 +87846,12 @@ catalog: value: PM-18a.01[02] class: sp800-53a prose: the privacy program plan includes a description of the resources dedicated to the privacy program; + links: + - href: '#pm-18_smt.a.1' + rel: assessment-for + links: + - href: '#pm-18_smt.a.1' + rel: assessment-for - id: pm-18_obj.a.2 name: assessment-objective props: @@ -80769,6 +87866,9 @@ catalog: value: PM-18a.02[01] class: sp800-53a prose: the privacy program plan provides an overview of the requirements for the privacy program; + links: + - href: '#pm-18_smt.a.2' + rel: assessment-for - id: pm-18_obj.a.2-2 name: assessment-objective props: @@ -80776,6 +87876,9 @@ catalog: value: PM-18a.02[02] class: sp800-53a prose: the privacy program plan provides a description of the privacy program management controls in place or planned for meeting the requirements of the privacy program; + links: + - href: '#pm-18_smt.a.2' + rel: assessment-for - id: pm-18_obj.a.2-3 name: assessment-objective props: @@ -80783,6 +87886,12 @@ catalog: value: PM-18a.02[03] class: sp800-53a prose: the privacy program plan provides a description of common controls in place or planned for meeting the requirements of the privacy program; + links: + - href: '#pm-18_smt.a.2' + rel: assessment-for + links: + - href: '#pm-18_smt.a.2' + rel: assessment-for - id: pm-18_obj.a.3 name: assessment-objective props: @@ -80797,6 +87906,9 @@ catalog: value: PM-18a.03[01] class: sp800-53a prose: the privacy program plan includes the role of the senior agency official for privacy; + links: + - href: '#pm-18_smt.a.3' + rel: assessment-for - id: pm-18_obj.a.3-2 name: assessment-objective props: @@ -80804,6 +87916,12 @@ catalog: value: PM-18a.03[02] class: sp800-53a prose: the privacy program plan includes the identification and assignment of the roles of other privacy officials and staff and their responsibilities; + links: + - href: '#pm-18_smt.a.3' + rel: assessment-for + links: + - href: '#pm-18_smt.a.3' + rel: assessment-for - id: pm-18_obj.a.4 name: assessment-objective props: @@ -80818,6 +87936,9 @@ catalog: value: PM-18a.04[01] class: sp800-53a prose: the privacy program plan describes management commitment; + links: + - href: '#pm-18_smt.a.4' + rel: assessment-for - id: pm-18_obj.a.4-2 name: assessment-objective props: @@ -80825,6 +87946,9 @@ catalog: value: PM-18a.04[02] class: sp800-53a prose: the privacy program plan describes compliance; + links: + - href: '#pm-18_smt.a.4' + rel: assessment-for - id: pm-18_obj.a.4-3 name: assessment-objective props: @@ -80832,6 +87956,12 @@ catalog: value: PM-18a.04[03] class: sp800-53a prose: the privacy program plan describes the strategic goals and objectives of the privacy program; + links: + - href: '#pm-18_smt.a.4' + rel: assessment-for + links: + - href: '#pm-18_smt.a.4' + rel: assessment-for - id: pm-18_obj.a.5 name: assessment-objective props: @@ -80839,6 +87969,9 @@ catalog: value: PM-18a.05 class: sp800-53a prose: the privacy program plan reflects coordination among organizational entities responsible for the different aspects of privacy; + links: + - href: '#pm-18_smt.a.5' + rel: assessment-for - id: pm-18_obj.a.6 name: assessment-objective props: @@ -80846,6 +87979,9 @@ catalog: value: PM-18a.06 class: sp800-53a prose: the privacy program plan is approved by a senior official with responsibility and accountability for the privacy risk being incurred by organizational operations (including, mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation; + links: + - href: '#pm-18_smt.a.6' + rel: assessment-for - id: pm-18_obj.a-2 name: assessment-objective props: @@ -80853,6 +87989,12 @@ catalog: value: PM-18a.[02] class: sp800-53a prose: the privacy program plan is disseminated; + links: + - href: '#pm-18_smt.a' + rel: assessment-for + links: + - href: '#pm-18_smt.a' + rel: assessment-for - id: pm-18_obj.b name: assessment-objective props: @@ -80867,6 +88009,9 @@ catalog: value: PM-18b.[01] class: sp800-53a prose: 'the privacy program plan is updated {{ insert: param, pm-18_odp }};' + links: + - href: '#pm-18_smt.b' + rel: assessment-for - id: pm-18_obj.b-2 name: assessment-objective props: @@ -80874,6 +88019,9 @@ catalog: value: PM-18b.[02] class: sp800-53a prose: the privacy program plan is updated to address changes in federal privacy laws and policies; + links: + - href: '#pm-18_smt.b' + rel: assessment-for - id: pm-18_obj.b-3 name: assessment-objective props: @@ -80881,6 +88029,9 @@ catalog: value: PM-18b.[03] class: sp800-53a prose: the privacy program plan is updated to address organizational changes; + links: + - href: '#pm-18_smt.b' + rel: assessment-for - id: pm-18_obj.b-4 name: assessment-objective props: @@ -80888,6 +88039,15 @@ catalog: value: PM-18b.[04] class: sp800-53a prose: the privacy program plan is updated to address problems identified during plan implementation or privacy control assessments. + links: + - href: '#pm-18_smt.b' + rel: assessment-for + links: + - href: '#pm-18_smt.b' + rel: assessment-for + links: + - href: '#pm-18_smt' + rel: assessment-for - id: pm-18_asm-examine name: assessment-method props: @@ -80974,6 +88134,9 @@ catalog: value: PM-19[01] class: sp800-53a prose: a senior agency official for privacy with authority, mission, accountability, and resources is appointed; + links: + - href: '#pm-19_smt' + rel: assessment-for - id: pm-19_obj-2 name: assessment-objective props: @@ -80981,6 +88144,9 @@ catalog: value: PM-19[02] class: sp800-53a prose: the senior agency official for privacy coordinates applicable privacy requirements; + links: + - href: '#pm-19_smt' + rel: assessment-for - id: pm-19_obj-3 name: assessment-objective props: @@ -80988,6 +88154,9 @@ catalog: value: PM-19[03] class: sp800-53a prose: the senior agency official for privacy develops applicable privacy requirements; + links: + - href: '#pm-19_smt' + rel: assessment-for - id: pm-19_obj-4 name: assessment-objective props: @@ -80995,6 +88164,9 @@ catalog: value: PM-19[04] class: sp800-53a prose: the senior agency official for privacy implements applicable privacy requirements; + links: + - href: '#pm-19_smt' + rel: assessment-for - id: pm-19_obj-5 name: assessment-objective props: @@ -81002,6 +88174,12 @@ catalog: value: PM-19[05] class: sp800-53a prose: the senior agency official for privacy manages privacy risks through the organization-wide privacy program. + links: + - href: '#pm-19_smt' + rel: assessment-for + links: + - href: '#pm-19_smt' + rel: assessment-for - id: pm-19_asm-examine name: assessment-method props: @@ -81125,6 +88303,9 @@ catalog: value: PM-20[01] class: sp800-53a prose: a central resource webpage is maintained on the organization’s principal public website; + links: + - href: '#pm-20_smt' + rel: assessment-for - id: pm-20_obj-2 name: assessment-objective props: @@ -81132,6 +88313,9 @@ catalog: value: PM-20[02] class: sp800-53a prose: the webpage serves as a central source of information about the organization’s privacy program; + links: + - href: '#pm-20_smt' + rel: assessment-for - id: pm-20_obj.a name: assessment-objective props: @@ -81146,6 +88330,9 @@ catalog: value: PM-20a.[01] class: sp800-53a prose: the webpage ensures that the public has access to information about organizational privacy activities; + links: + - href: '#pm-20_smt.a' + rel: assessment-for - id: pm-20_obj.a-2 name: assessment-objective props: @@ -81153,6 +88340,12 @@ catalog: value: PM-20a.[02] class: sp800-53a prose: the webpage ensures that the public can communicate with its senior agency official for privacy; + links: + - href: '#pm-20_smt.a' + rel: assessment-for + links: + - href: '#pm-20_smt.a' + rel: assessment-for - id: pm-20_obj.b name: assessment-objective props: @@ -81167,6 +88360,9 @@ catalog: value: PM-20b.[01] class: sp800-53a prose: the webpage ensures that organizational privacy practices are publicly available; + links: + - href: '#pm-20_smt.b' + rel: assessment-for - id: pm-20_obj.b-2 name: assessment-objective props: @@ -81174,6 +88370,12 @@ catalog: value: PM-20b.[02] class: sp800-53a prose: the webpage ensures that organizational privacy reports are publicly available; + links: + - href: '#pm-20_smt.b' + rel: assessment-for + links: + - href: '#pm-20_smt.b' + rel: assessment-for - id: pm-20_obj.c name: assessment-objective props: @@ -81181,6 +88383,12 @@ catalog: value: PM-20c. class: sp800-53a prose: the webpage employs publicly facing email addresses and/or phone numbers to enable the public to provide feedback and/or direct questions to privacy offices regarding privacy practices. + links: + - href: '#pm-20_smt.c' + rel: assessment-for + links: + - href: '#pm-20_smt' + rel: assessment-for - id: pm-20_asm-examine name: assessment-method props: @@ -81298,6 +88506,9 @@ catalog: value: PM-20(01)[01] class: sp800-53a prose: privacy policies are developed and posted on all external-facing websites; + links: + - href: '#pm-20.1_smt' + rel: assessment-for - id: pm-20.1_obj-2 name: assessment-objective props: @@ -81305,6 +88516,9 @@ catalog: value: PM-20(01)[02] class: sp800-53a prose: privacy policies are developed and posted on all mobile applications; + links: + - href: '#pm-20.1_smt' + rel: assessment-for - id: pm-20.1_obj-3 name: assessment-objective props: @@ -81312,6 +88526,9 @@ catalog: value: PM-20(01)[03] class: sp800-53a prose: privacy policies are developed and posted on all other digital services; + links: + - href: '#pm-20.1_smt' + rel: assessment-for - id: pm-20.1_obj.a name: assessment-objective props: @@ -81326,6 +88543,9 @@ catalog: value: PM-20(01)(a)[01] class: sp800-53a prose: the privacy policies are written in plain language; + links: + - href: '#pm-20.1_smt.a' + rel: assessment-for - id: pm-20.1_obj.a-2 name: assessment-objective props: @@ -81333,6 +88553,12 @@ catalog: value: PM-20(01)(a)[02] class: sp800-53a prose: the privacy policies are organized in a way that is easy to understand and navigate; + links: + - href: '#pm-20.1_smt.a' + rel: assessment-for + links: + - href: '#pm-20.1_smt.a' + rel: assessment-for - id: pm-20.1_obj.b name: assessment-objective props: @@ -81347,6 +88573,9 @@ catalog: value: PM-20(01)(b)[01] class: sp800-53a prose: the privacy policies provide the information needed by the public to make an informed decision about whether to interact with the organization; + links: + - href: '#pm-20.1_smt.b' + rel: assessment-for - id: pm-20.1_obj.b-2 name: assessment-objective props: @@ -81354,6 +88583,12 @@ catalog: value: PM-20(01)(b)[02] class: sp800-53a prose: the privacy policies provide the information needed by the public to make an informed decision about how to interact with the organization; + links: + - href: '#pm-20.1_smt.b' + rel: assessment-for + links: + - href: '#pm-20.1_smt.b' + rel: assessment-for - id: pm-20.1_obj.c name: assessment-objective props: @@ -81368,6 +88603,9 @@ catalog: value: PM-20(01)(c)[01] class: sp800-53a prose: the privacy policies are updated whenever the organization makes a substantive change to the practices it describes; + links: + - href: '#pm-20.1_smt.c' + rel: assessment-for - id: pm-20.1_obj.c-2 name: assessment-objective props: @@ -81375,6 +88613,15 @@ catalog: value: PM-20(01)(c)[02] class: sp800-53a prose: the privacy policies include a time/date stamp to inform the public of the date of the most recent changes. + links: + - href: '#pm-20.1_smt.c' + rel: assessment-for + links: + - href: '#pm-20.1_smt.c' + rel: assessment-for + links: + - href: '#pm-20.1_smt' + rel: assessment-for - id: pm-20.1_asm-examine name: assessment-method props: @@ -81517,6 +88764,9 @@ catalog: value: PM-21a.01[01] class: sp800-53a prose: the accounting includes the date of each disclosure; + links: + - href: '#pm-21_smt.a.1' + rel: assessment-for - id: pm-21_obj.a.1-2 name: assessment-objective props: @@ -81524,6 +88774,9 @@ catalog: value: PM-21a.01[02] class: sp800-53a prose: the accounting includes the nature of each disclosure; + links: + - href: '#pm-21_smt.a.1' + rel: assessment-for - id: pm-21_obj.a.1-3 name: assessment-objective props: @@ -81531,6 +88784,12 @@ catalog: value: PM-21a.01[03] class: sp800-53a prose: the accounting includes the purpose of each disclosure; + links: + - href: '#pm-21_smt.a.1' + rel: assessment-for + links: + - href: '#pm-21_smt.a.1' + rel: assessment-for - id: pm-21_obj.a.2 name: assessment-objective props: @@ -81545,6 +88804,9 @@ catalog: value: PM-21a.02[01] class: sp800-53a prose: the accounting includes the name of the individual or organization to whom the disclosure was made; + links: + - href: '#pm-21_smt.a.2' + rel: assessment-for - id: pm-21_obj.a.2-2 name: assessment-objective props: @@ -81552,6 +88814,15 @@ catalog: value: PM-21a.02[02] class: sp800-53a prose: the accounting includes the address or other contact information of the individual or organization to whom the disclosure was made; + links: + - href: '#pm-21_smt.a.2' + rel: assessment-for + links: + - href: '#pm-21_smt.a.2' + rel: assessment-for + links: + - href: '#pm-21_smt.a' + rel: assessment-for - id: pm-21_obj.b name: assessment-objective props: @@ -81559,6 +88830,9 @@ catalog: value: PM-21b. class: sp800-53a prose: the accounting of disclosures is retained for the length of time that the personally identifiable information is maintained or five years after the disclosure is made, whichever is longer; + links: + - href: '#pm-21_smt.b' + rel: assessment-for - id: pm-21_obj.c name: assessment-objective props: @@ -81566,6 +88840,12 @@ catalog: value: PM-21c. class: sp800-53a prose: the accounting of disclosures is made available to the individual to whom the personally identifiable information relates upon request. + links: + - href: '#pm-21_smt.c' + rel: assessment-for + links: + - href: '#pm-21_smt' + rel: assessment-for - id: pm-21_asm-examine name: assessment-method props: @@ -81700,6 +88980,9 @@ catalog: value: PM-22[01] class: sp800-53a prose: organization-wide policies for personally identifiable information quality management are developed and documented; + links: + - href: '#pm-22_smt' + rel: assessment-for - id: pm-22_obj-2 name: assessment-objective props: @@ -81707,6 +88990,9 @@ catalog: value: PM-22[02] class: sp800-53a prose: organization-wide procedures for personally identifiable information quality management are developed and documented; + links: + - href: '#pm-22_smt' + rel: assessment-for - id: pm-22_obj.a name: assessment-objective props: @@ -81721,6 +89007,9 @@ catalog: value: PM-22a.[01] class: sp800-53a prose: the policies address reviewing the accuracy of personally identifiable information across the information life cycle; + links: + - href: '#pm-22_smt.a' + rel: assessment-for - id: pm-22_obj.a-2 name: assessment-objective props: @@ -81728,6 +89017,9 @@ catalog: value: PM-22a.[02] class: sp800-53a prose: the policies address reviewing the relevance of personally identifiable information across the information life cycle; + links: + - href: '#pm-22_smt.a' + rel: assessment-for - id: pm-22_obj.a-3 name: assessment-objective props: @@ -81735,6 +89027,9 @@ catalog: value: PM-22a.[03] class: sp800-53a prose: the policies address reviewing the timeliness of personally identifiable information across the information life cycle; + links: + - href: '#pm-22_smt.a' + rel: assessment-for - id: pm-22_obj.a-4 name: assessment-objective props: @@ -81742,6 +89037,9 @@ catalog: value: PM-22a.[04] class: sp800-53a prose: the policies address reviewing the completeness of personally identifiable information across the information life cycle; + links: + - href: '#pm-22_smt.a' + rel: assessment-for - id: pm-22_obj.a-5 name: assessment-objective props: @@ -81749,6 +89047,9 @@ catalog: value: PM-22a.[05] class: sp800-53a prose: the procedures address reviewing the accuracy of personally identifiable information across the information life cycle; + links: + - href: '#pm-22_smt.a' + rel: assessment-for - id: pm-22_obj.a-6 name: assessment-objective props: @@ -81756,6 +89057,9 @@ catalog: value: PM-22a.[06] class: sp800-53a prose: the procedures address reviewing the relevance of personally identifiable information across the information life cycle; + links: + - href: '#pm-22_smt.a' + rel: assessment-for - id: pm-22_obj.a-7 name: assessment-objective props: @@ -81763,6 +89067,9 @@ catalog: value: PM-22a.[07] class: sp800-53a prose: the procedures address reviewing the timeliness of personally identifiable information across the information life cycle; + links: + - href: '#pm-22_smt.a' + rel: assessment-for - id: pm-22_obj.a-8 name: assessment-objective props: @@ -81770,6 +89077,12 @@ catalog: value: PM-22a.[08] class: sp800-53a prose: the procedures address reviewing the completeness of personally identifiable information across the information life cycle; + links: + - href: '#pm-22_smt.a' + rel: assessment-for + links: + - href: '#pm-22_smt.a' + rel: assessment-for - id: pm-22_obj.b name: assessment-objective props: @@ -81784,6 +89097,9 @@ catalog: value: PM-22b.[01] class: sp800-53a prose: the policies address correcting or deleting inaccurate or outdated personally identifiable information; + links: + - href: '#pm-22_smt.b' + rel: assessment-for - id: pm-22_obj.b-2 name: assessment-objective props: @@ -81791,6 +89107,12 @@ catalog: value: PM-22b.[02] class: sp800-53a prose: the procedures address correcting or deleting inaccurate or outdated personally identifiable information; + links: + - href: '#pm-22_smt.b' + rel: assessment-for + links: + - href: '#pm-22_smt.b' + rel: assessment-for - id: pm-22_obj.c name: assessment-objective props: @@ -81805,6 +89127,9 @@ catalog: value: PM-22c.[01] class: sp800-53a prose: the policies address disseminating notice of corrected or deleted personally identifiable information to individuals or other appropriate entities; + links: + - href: '#pm-22_smt.c' + rel: assessment-for - id: pm-22_obj.c-2 name: assessment-objective props: @@ -81812,6 +89137,12 @@ catalog: value: PM-22c.[02] class: sp800-53a prose: the procedures address disseminating notice of corrected or deleted personally identifiable information to individuals or other appropriate entities; + links: + - href: '#pm-22_smt.c' + rel: assessment-for + links: + - href: '#pm-22_smt.c' + rel: assessment-for - id: pm-22_obj.d name: assessment-objective props: @@ -81826,6 +89157,9 @@ catalog: value: PM-22d.[01] class: sp800-53a prose: the policies address appeals of adverse decisions on correction or deletion requests; + links: + - href: '#pm-22_smt.d' + rel: assessment-for - id: pm-22_obj.d-2 name: assessment-objective props: @@ -81833,6 +89167,15 @@ catalog: value: PM-22d.[02] class: sp800-53a prose: the procedures address appeals of adverse decisions on correction or deletion requests. + links: + - href: '#pm-22_smt.d' + rel: assessment-for + links: + - href: '#pm-22_smt.d' + rel: assessment-for + links: + - href: '#pm-22_smt' + rel: assessment-for - id: pm-22_asm-examine name: assessment-method props: @@ -81959,6 +89302,9 @@ catalog: value: PM-23 class: sp800-53a prose: 'a Data Governance Body consisting of {{ insert: param, pm-23_odp.01 }} with {{ insert: param, pm-23_odp.02 }} is established.' + links: + - href: '#pm-23_smt' + rel: assessment-for - id: pm-23_asm-examine name: assessment-method props: @@ -82061,6 +89407,9 @@ catalog: value: PM-24a. class: sp800-53a prose: the Data Integrity Board reviews proposals to conduct or participate in a matching program; + links: + - href: '#pm-24_smt.a' + rel: assessment-for - id: pm-24_obj.b name: assessment-objective props: @@ -82068,6 +89417,12 @@ catalog: value: PM-24b. class: sp800-53a prose: the Data Integrity Board conducts an annual review of all matching programs in which the agency has participated. + links: + - href: '#pm-24_smt.b' + rel: assessment-for + links: + - href: '#pm-24_smt' + rel: assessment-for - id: pm-24_asm-examine name: assessment-method props: @@ -82232,6 +89587,9 @@ catalog: value: PM-25a.[01] class: sp800-53a prose: policies that address the use of personally identifiable information for internal testing are developed and documented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-2 name: assessment-objective props: @@ -82239,6 +89597,9 @@ catalog: value: PM-25a.[02] class: sp800-53a prose: policies that address the use of personally identifiable information for internal training are developed and documented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-3 name: assessment-objective props: @@ -82246,6 +89607,9 @@ catalog: value: PM-25a.[03] class: sp800-53a prose: policies that address the use of personally identifiable information for internal research are developed and documented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-4 name: assessment-objective props: @@ -82253,6 +89617,9 @@ catalog: value: PM-25a.[04] class: sp800-53a prose: procedures that address the use of personally identifiable information for internal testing are developed and documented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-5 name: assessment-objective props: @@ -82260,6 +89627,9 @@ catalog: value: PM-25a.[05] class: sp800-53a prose: procedures that address the use of personally identifiable information for internal training are developed and documented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-6 name: assessment-objective props: @@ -82267,6 +89637,9 @@ catalog: value: PM-25a.[06] class: sp800-53a prose: procedures that address the use of personally identifiable information for internal research are developed and documented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-7 name: assessment-objective props: @@ -82274,6 +89647,9 @@ catalog: value: PM-25a.[07] class: sp800-53a prose: policies that address the use of personally identifiable information for internal testing, are implemented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-8 name: assessment-objective props: @@ -82281,6 +89657,9 @@ catalog: value: PM-25a.[08] class: sp800-53a prose: policies that address the use of personally identifiable information for training are implemented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-9 name: assessment-objective props: @@ -82288,6 +89667,9 @@ catalog: value: PM-25a.[09] class: sp800-53a prose: policies that address the use of personally identifiable information for research are implemented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-10 name: assessment-objective props: @@ -82295,6 +89677,9 @@ catalog: value: PM-25a.[10] class: sp800-53a prose: procedures that address the use of personally identifiable information for internal testing are implemented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-11 name: assessment-objective props: @@ -82302,6 +89687,9 @@ catalog: value: PM-25a.[11] class: sp800-53a prose: procedures that address the use of personally identifiable information for training are implemented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.a-12 name: assessment-objective props: @@ -82309,6 +89697,12 @@ catalog: value: PM-25a.[12] class: sp800-53a prose: procedures that address the use of personally identifiable information for research are implemented; + links: + - href: '#pm-25_smt.a' + rel: assessment-for + links: + - href: '#pm-25_smt.a' + rel: assessment-for - id: pm-25_obj.b name: assessment-objective props: @@ -82323,6 +89717,9 @@ catalog: value: PM-25b.[01] class: sp800-53a prose: the amount of personally identifiable information used for internal testing purposes is limited or minimized; + links: + - href: '#pm-25_smt.b' + rel: assessment-for - id: pm-25_obj.b-2 name: assessment-objective props: @@ -82330,6 +89727,9 @@ catalog: value: PM-25b.[02] class: sp800-53a prose: the amount of personally identifiable information used for internal training purposes is limited or minimized; + links: + - href: '#pm-25_smt.b' + rel: assessment-for - id: pm-25_obj.b-3 name: assessment-objective props: @@ -82337,6 +89737,12 @@ catalog: value: PM-25b.[03] class: sp800-53a prose: the amount of personally identifiable information used for internal research purposes is limited or minimized; + links: + - href: '#pm-25_smt.b' + rel: assessment-for + links: + - href: '#pm-25_smt.b' + rel: assessment-for - id: pm-25_obj.c name: assessment-objective props: @@ -82351,6 +89757,9 @@ catalog: value: PM-25c.[01] class: sp800-53a prose: the required use of personally identifiable information for internal testing is authorized; + links: + - href: '#pm-25_smt.c' + rel: assessment-for - id: pm-25_obj.c-2 name: assessment-objective props: @@ -82358,6 +89767,9 @@ catalog: value: PM-25c.[02] class: sp800-53a prose: the required use of personally identifiable information for internal training is authorized; + links: + - href: '#pm-25_smt.c' + rel: assessment-for - id: pm-25_obj.c-3 name: assessment-objective props: @@ -82365,6 +89777,12 @@ catalog: value: PM-25c.[03] class: sp800-53a prose: the required use of personally identifiable information for internal research is authorized; + links: + - href: '#pm-25_smt.c' + rel: assessment-for + links: + - href: '#pm-25_smt.c' + rel: assessment-for - id: pm-25_obj.d name: assessment-objective props: @@ -82379,6 +89797,9 @@ catalog: value: PM-25d.[01] class: sp800-53a prose: 'policies are reviewed {{ insert: param, pm-25_odp.01 }};' + links: + - href: '#pm-25_smt.d' + rel: assessment-for - id: pm-25_obj.d-2 name: assessment-objective props: @@ -82386,6 +89807,9 @@ catalog: value: PM-25d.[02] class: sp800-53a prose: 'policies are updated {{ insert: param, pm-25_odp.02 }};' + links: + - href: '#pm-25_smt.d' + rel: assessment-for - id: pm-25_obj.d-3 name: assessment-objective props: @@ -82393,6 +89817,9 @@ catalog: value: PM-25d.[03] class: sp800-53a prose: 'procedures are reviewed {{ insert: param, pm-25_odp.03 }};' + links: + - href: '#pm-25_smt.d' + rel: assessment-for - id: pm-25_obj.d-4 name: assessment-objective props: @@ -82400,6 +89827,15 @@ catalog: value: PM-25d.[04] class: sp800-53a prose: 'procedures are updated {{ insert: param, pm-25_odp.04 }}.' + links: + - href: '#pm-25_smt.d' + rel: assessment-for + links: + - href: '#pm-25_smt.d' + rel: assessment-for + links: + - href: '#pm-25_smt' + rel: assessment-for - id: pm-25_asm-examine name: assessment-method props: @@ -82580,6 +90016,9 @@ catalog: value: PM-26[01] class: sp800-53a prose: a process for receiving complaints, concerns, or questions from individuals about organizational security and privacy practices is implemented; + links: + - href: '#pm-26_smt' + rel: assessment-for - id: pm-26_obj-2 name: assessment-objective props: @@ -82587,6 +90026,9 @@ catalog: value: PM-26[02] class: sp800-53a prose: a process for responding to complaints, concerns, or questions from individuals about organizational security and privacy practices is implemented; + links: + - href: '#pm-26_smt' + rel: assessment-for - id: pm-26_obj.a name: assessment-objective props: @@ -82601,6 +90043,9 @@ catalog: value: PM-26a.[01] class: sp800-53a prose: the complaint management process includes mechanisms that are easy to use by the public; + links: + - href: '#pm-26_smt.a' + rel: assessment-for - id: pm-26_obj.a-2 name: assessment-objective props: @@ -82608,6 +90053,12 @@ catalog: value: PM-26a.[02] class: sp800-53a prose: the complaint management process includes mechanisms that are readily accessible by the public; + links: + - href: '#pm-26_smt.a' + rel: assessment-for + links: + - href: '#pm-26_smt.a' + rel: assessment-for - id: pm-26_obj.b name: assessment-objective props: @@ -82615,6 +90066,9 @@ catalog: value: PM-26b. class: sp800-53a prose: the complaint management process includes all information necessary for successfully filing complaints; + links: + - href: '#pm-26_smt.b' + rel: assessment-for - id: pm-26_obj.c name: assessment-objective props: @@ -82629,6 +90083,9 @@ catalog: value: PM-26c.[01] class: sp800-53a prose: 'the complaint management process includes tracking mechanisms to ensure that all complaints are reviewed within {{ insert: param, pm-26_odp.01 }};' + links: + - href: '#pm-26_smt.c' + rel: assessment-for - id: pm-26_obj.c-2 name: assessment-objective props: @@ -82636,6 +90093,12 @@ catalog: value: PM-26c.[02] class: sp800-53a prose: 'the complaint management process includes tracking mechanisms to ensure that all complaints are addressed within {{ insert: param, pm-26_odp.02 }};' + links: + - href: '#pm-26_smt.c' + rel: assessment-for + links: + - href: '#pm-26_smt.c' + rel: assessment-for - id: pm-26_obj.d name: assessment-objective props: @@ -82643,6 +90106,9 @@ catalog: value: PM-26d. class: sp800-53a prose: 'the complaint management process includes acknowledging the receipt of complaints, concerns, or questions from individuals within {{ insert: param, pm-26_odp.03 }};' + links: + - href: '#pm-26_smt.d' + rel: assessment-for - id: pm-26_obj.e name: assessment-objective props: @@ -82650,6 +90116,12 @@ catalog: value: PM-26e. class: sp800-53a prose: 'the complaint management process includes responding to complaints, concerns, or questions from individuals within {{ insert: param, pm-26_odp.04 }}.' + links: + - href: '#pm-26_smt.e' + rel: assessment-for + links: + - href: '#pm-26_smt' + rel: assessment-for - id: pm-26_asm-examine name: assessment-method props: @@ -82823,6 +90295,9 @@ catalog: value: PM-27a.01 class: sp800-53a prose: 'the privacy reports are disseminated to {{ insert: param, pm-27_odp.02 }} to demonstrate accountability with statutory, regulatory, and policy privacy mandates;' + links: + - href: '#pm-27_smt.a.1' + rel: assessment-for - id: pm-27_obj.a.2 name: assessment-objective props: @@ -82837,6 +90312,9 @@ catalog: value: PM-27a.02[01] class: sp800-53a prose: 'the privacy reports are disseminated to {{ insert: param, pm-27_odp.03 }};' + links: + - href: '#pm-27_smt.a.2' + rel: assessment-for - id: pm-27_obj.a.2-2 name: assessment-objective props: @@ -82844,6 +90322,15 @@ catalog: value: PM-27a.02[02] class: sp800-53a prose: the privacy reports are disseminated to other personnel responsible for monitoring privacy program compliance; + links: + - href: '#pm-27_smt.a.2' + rel: assessment-for + links: + - href: '#pm-27_smt.a.2' + rel: assessment-for + links: + - href: '#pm-27_smt.a' + rel: assessment-for - id: pm-27_obj.b name: assessment-objective props: @@ -82851,6 +90338,12 @@ catalog: value: PM-27b. class: sp800-53a prose: 'the privacy reports are reviewed and updated {{ insert: param, pm-27_odp.04 }}.' + links: + - href: '#pm-27_smt.b' + rel: assessment-for + links: + - href: '#pm-27_smt' + rel: assessment-for - id: pm-27_asm-examine name: assessment-method props: @@ -83022,6 +90515,9 @@ catalog: value: PM-28a.01[01] class: sp800-53a prose: assumptions affecting risk assessments are identified and documented; + links: + - href: '#pm-28_smt.a.1' + rel: assessment-for - id: pm-28_obj.a.1-2 name: assessment-objective props: @@ -83029,6 +90525,9 @@ catalog: value: PM-28a.01[02] class: sp800-53a prose: assumptions affecting risk responses are identified and documented; + links: + - href: '#pm-28_smt.a.1' + rel: assessment-for - id: pm-28_obj.a.1-3 name: assessment-objective props: @@ -83036,6 +90535,12 @@ catalog: value: PM-28a.01[03] class: sp800-53a prose: assumptions affecting risk monitoring are identified and documented; + links: + - href: '#pm-28_smt.a.1' + rel: assessment-for + links: + - href: '#pm-28_smt.a.1' + rel: assessment-for - id: pm-28_obj.a.2 name: assessment-objective props: @@ -83050,6 +90555,9 @@ catalog: value: PM-28a.02[01] class: sp800-53a prose: constraints affecting risk assessments are identified and documented; + links: + - href: '#pm-28_smt.a.2' + rel: assessment-for - id: pm-28_obj.a.2-2 name: assessment-objective props: @@ -83057,6 +90565,9 @@ catalog: value: PM-28a.02[02] class: sp800-53a prose: constraints affecting risk responses are identified and documented; + links: + - href: '#pm-28_smt.a.2' + rel: assessment-for - id: pm-28_obj.a.2-3 name: assessment-objective props: @@ -83064,6 +90575,12 @@ catalog: value: PM-28a.02[03] class: sp800-53a prose: constraints affecting risk monitoring are identified and documented; + links: + - href: '#pm-28_smt.a.2' + rel: assessment-for + links: + - href: '#pm-28_smt.a.2' + rel: assessment-for - id: pm-28_obj.a.3 name: assessment-objective props: @@ -83078,6 +90595,9 @@ catalog: value: PM-28a.03[01] class: sp800-53a prose: priorities considered by the organization for managing risk are identified and documented; + links: + - href: '#pm-28_smt.a.3' + rel: assessment-for - id: pm-28_obj.a.3-2 name: assessment-objective props: @@ -83085,6 +90605,12 @@ catalog: value: PM-28a.03[02] class: sp800-53a prose: trade-offs considered by the organization for managing risk are identified and documented; + links: + - href: '#pm-28_smt.a.3' + rel: assessment-for + links: + - href: '#pm-28_smt.a.3' + rel: assessment-for - id: pm-28_obj.a.4 name: assessment-objective props: @@ -83092,6 +90618,12 @@ catalog: value: PM-28a.04 class: sp800-53a prose: organizational risk tolerance is identified and documented; + links: + - href: '#pm-28_smt.a.4' + rel: assessment-for + links: + - href: '#pm-28_smt.a' + rel: assessment-for - id: pm-28_obj.b name: assessment-objective props: @@ -83099,6 +90631,9 @@ catalog: value: PM-28b. class: sp800-53a prose: 'the results of risk framing activities are distributed to {{ insert: param, pm-28_odp.01 }};' + links: + - href: '#pm-28_smt.b' + rel: assessment-for - id: pm-28_obj.c name: assessment-objective props: @@ -83106,6 +90641,12 @@ catalog: value: PM-28c. class: sp800-53a prose: 'risk framing considerations are reviewed and updated {{ insert: param, pm-28_odp.02 }}.' + links: + - href: '#pm-28_smt.c' + rel: assessment-for + links: + - href: '#pm-28_smt' + rel: assessment-for - id: pm-28_asm-examine name: assessment-method props: @@ -83230,6 +90771,9 @@ catalog: value: PM-29a.[01] class: sp800-53a prose: a Senior Accountable Official for Risk Management is appointed; + links: + - href: '#pm-29_smt.a' + rel: assessment-for - id: pm-29_obj.a-2 name: assessment-objective props: @@ -83237,6 +90781,12 @@ catalog: value: PM-29a.[02] class: sp800-53a prose: a Senior Accountable Official for Risk Management aligns information security and privacy management processes with strategic, operational, and budgetary planning processes; + links: + - href: '#pm-29_smt.a' + rel: assessment-for + links: + - href: '#pm-29_smt.a' + rel: assessment-for - id: pm-29_obj.b name: assessment-objective props: @@ -83251,6 +90801,9 @@ catalog: value: PM-29b.[01] class: sp800-53a prose: a Risk Executive (function) is established; + links: + - href: '#pm-29_smt.b' + rel: assessment-for - id: pm-29_obj.b-2 name: assessment-objective props: @@ -83258,6 +90811,9 @@ catalog: value: PM-29b.[02] class: sp800-53a prose: a Risk Executive (function) views and analyzes risk from an organization-wide perspective; + links: + - href: '#pm-29_smt.b' + rel: assessment-for - id: pm-29_obj.b-3 name: assessment-objective props: @@ -83265,6 +90821,15 @@ catalog: value: PM-29b.[03] class: sp800-53a prose: a Risk Executive (function) ensures that the management of risk is consistent across the organization. + links: + - href: '#pm-29_smt.b' + rel: assessment-for + links: + - href: '#pm-29_smt.b' + rel: assessment-for + links: + - href: '#pm-29_smt' + rel: assessment-for - id: pm-29_asm-examine name: assessment-method props: @@ -83432,6 +90997,9 @@ catalog: value: PM-30a.[01] class: sp800-53a prose: an organization-wide strategy for managing supply chain risks is developed; + links: + - href: '#pm-30_smt.a' + rel: assessment-for - id: pm-30_obj.a-2 name: assessment-objective props: @@ -83439,6 +91007,9 @@ catalog: value: PM-30a.[02] class: sp800-53a prose: the supply chain risk management strategy addresses risks associated with the development of systems; + links: + - href: '#pm-30_smt.a' + rel: assessment-for - id: pm-30_obj.a-3 name: assessment-objective props: @@ -83446,6 +91017,9 @@ catalog: value: PM-30a.[03] class: sp800-53a prose: the supply chain risk management strategy addresses risks associated with the development of system components; + links: + - href: '#pm-30_smt.a' + rel: assessment-for - id: pm-30_obj.a-4 name: assessment-objective props: @@ -83453,6 +91027,9 @@ catalog: value: PM-30a.[04] class: sp800-53a prose: the supply chain risk management strategy addresses risks associated with the development of system services; + links: + - href: '#pm-30_smt.a' + rel: assessment-for - id: pm-30_obj.a-5 name: assessment-objective props: @@ -83460,6 +91037,9 @@ catalog: value: PM-30a.[05] class: sp800-53a prose: the supply chain risk management strategy addresses risks associated with the acquisition of systems; + links: + - href: '#pm-30_smt.a' + rel: assessment-for - id: pm-30_obj.a-6 name: assessment-objective props: @@ -83467,6 +91047,9 @@ catalog: value: PM-30a.[06] class: sp800-53a prose: the supply chain risk management strategy addresses risks associated with the acquisition of system components; + links: + - href: '#pm-30_smt.a' + rel: assessment-for - id: pm-30_obj.a-7 name: assessment-objective props: @@ -83474,6 +91057,9 @@ catalog: value: PM-30a.[07] class: sp800-53a prose: the supply chain risk management strategy addresses risks associated with the acquisition of system services; + links: + - href: '#pm-30_smt.a' + rel: assessment-for - id: pm-30_obj.a-8 name: assessment-objective props: @@ -83481,6 +91067,9 @@ catalog: value: PM-30a.[08] class: sp800-53a prose: the supply chain risk management strategy addresses risks associated with the maintenance of systems; + links: + - href: '#pm-30_smt.a' + rel: assessment-for - id: pm-30_obj.a-9 name: assessment-objective props: @@ -83488,6 +91077,9 @@ catalog: value: PM-30a.[09] class: sp800-53a prose: the supply chain risk management strategy addresses risks associated with the maintenance of system components; + links: + - href: '#pm-30_smt.a' + rel: assessment-for - id: pm-30_obj.a-10 name: assessment-objective props: @@ -83495,6 +91087,9 @@ catalog: value: PM-30a.[10] class: sp800-53a prose: the supply chain risk management strategy addresses risks associated with the maintenance of system services; + links: + - href: '#pm-30_smt.a' + rel: assessment-for - id: pm-30_obj.a-11 name: assessment-objective props: @@ -83502,6 +91097,9 @@ catalog: value: PM-30a.[11] class: sp800-53a prose: the supply chain risk management strategy addresses risks associated with the disposal of systems; + links: + - href: '#pm-30_smt.a' + rel: assessment-for - id: pm-30_obj.a-12 name: assessment-objective props: @@ -83509,6 +91107,9 @@ catalog: value: PM-30a.[12] class: sp800-53a prose: the supply chain risk management strategy addresses risks associated with the disposal of system components; + links: + - href: '#pm-30_smt.a' + rel: assessment-for - id: pm-30_obj.a-13 name: assessment-objective props: @@ -83516,6 +91117,12 @@ catalog: value: PM-30a.[13] class: sp800-53a prose: the supply chain risk management strategy addresses risks associated with the disposal of system services; + links: + - href: '#pm-30_smt.a' + rel: assessment-for + links: + - href: '#pm-30_smt.a' + rel: assessment-for - id: pm-30_obj.b name: assessment-objective props: @@ -83523,6 +91130,9 @@ catalog: value: PM-30b. class: sp800-53a prose: the supply chain risk management strategy is implemented consistently across the organization; + links: + - href: '#pm-30_smt.b' + rel: assessment-for - id: pm-30_obj.c name: assessment-objective props: @@ -83530,6 +91140,12 @@ catalog: value: PM-30c. class: sp800-53a prose: 'the supply chain risk management strategy is reviewed and updated {{ insert: param, pm-30_odp }} or as required to address organizational changes.' + links: + - href: '#pm-30_smt.c' + rel: assessment-for + links: + - href: '#pm-30_smt' + rel: assessment-for - id: pm-30_asm-examine name: assessment-method props: @@ -83614,6 +91230,9 @@ catalog: value: PM-30(01)[01] class: sp800-53a prose: suppliers of critical or mission-essential technologies, products, and services are identified; + links: + - href: '#pm-30.1_smt' + rel: assessment-for - id: pm-30.1_obj-2 name: assessment-objective props: @@ -83621,6 +91240,9 @@ catalog: value: PM-30(01)[02] class: sp800-53a prose: suppliers of critical or mission-essential technologies, products, and services are prioritized; + links: + - href: '#pm-30.1_smt' + rel: assessment-for - id: pm-30.1_obj-3 name: assessment-objective props: @@ -83628,6 +91250,12 @@ catalog: value: PM-30(01)[03] class: sp800-53a prose: suppliers of critical or mission-essential technologies, products, and services are assessed. + links: + - href: '#pm-30.1_smt' + rel: assessment-for + links: + - href: '#pm-30.1_smt' + rel: assessment-for - id: pm-30.1_asm-examine name: assessment-method props: @@ -83731,9 +91359,9 @@ catalog: - name: label value: PM-31_ODP[02] class: sp800-53a - label: frequency + label: monitoring frequencies guidelines: - - prose: the frequency for monitoring is defined; + - prose: the frequencies for monitoring are defined; - id: pm-31_odp.03 props: - name: alt-identifier @@ -83744,9 +91372,9 @@ catalog: - name: label value: PM-31_ODP[03] class: sp800-53a - label: frequency + label: assessment frequencies guidelines: - - prose: the frequency for assessing control effectiveness is defined; + - prose: the frequencies for assessing control effectiveness are defined; - id: pm-31_odp.04 props: - name: label @@ -83915,7 +91543,7 @@ catalog: props: - name: label value: b. - prose: 'Establishing {{ insert: param, pm-31_odp.02 }} for monitoring and {{ insert: param, pm-31_odp.03 }} for assessment of control effectiveness;' + prose: 'Establishing {{ insert: param, pm-31_odp.02 }} and {{ insert: param, pm-31_odp.03 }} for control effectiveness;' - id: pm-31_smt.c name: item props: @@ -83958,6 +91586,9 @@ catalog: value: PM-31a. class: sp800-53a prose: 'continuous monitoring programs are implemented that include establishing {{ insert: param, pm-31_odp.01 }} to be monitored;' + links: + - href: '#pm-31_smt.a' + rel: assessment-for - id: pm-31_obj.b name: assessment-objective props: @@ -83972,6 +91603,9 @@ catalog: value: PM-31b.[01] class: sp800-53a prose: 'continuous monitoring programs are implemented that establish {{ insert: param, pm-31_odp.02 }} for monitoring;' + links: + - href: '#pm-31_smt.b' + rel: assessment-for - id: pm-31_obj.b-2 name: assessment-objective props: @@ -83979,6 +91613,12 @@ catalog: value: PM-31b.[02] class: sp800-53a prose: 'continuous monitoring programs are implemented that establish {{ insert: param, pm-31_odp.03 }} for assessment of control effectiveness;' + links: + - href: '#pm-31_smt.b' + rel: assessment-for + links: + - href: '#pm-31_smt.b' + rel: assessment-for - id: pm-31_obj.c name: assessment-objective props: @@ -83986,6 +91626,9 @@ catalog: value: PM-31c. class: sp800-53a prose: 'continuous monitoring programs are implemented that include monitoring {{ insert: param, pm-31_odp.01 }} on an ongoing basis in accordance with the continuous monitoring strategy;' + links: + - href: '#pm-31_smt.c' + rel: assessment-for - id: pm-31_obj.d name: assessment-objective props: @@ -84000,6 +91643,9 @@ catalog: value: PM-31d.[01] class: sp800-53a prose: continuous monitoring programs are implemented that include correlating information generated by control assessments and monitoring; + links: + - href: '#pm-31_smt.d' + rel: assessment-for - id: pm-31_obj.d-2 name: assessment-objective props: @@ -84007,6 +91653,12 @@ catalog: value: PM-31d.[02] class: sp800-53a prose: continuous monitoring programs are implemented that include analyzing information generated by control assessments and monitoring; + links: + - href: '#pm-31_smt.d' + rel: assessment-for + links: + - href: '#pm-31_smt.d' + rel: assessment-for - id: pm-31_obj.e name: assessment-objective props: @@ -84021,6 +91673,9 @@ catalog: value: PM-31e.[01] class: sp800-53a prose: continuous monitoring programs are implemented that include response actions to address the analysis of control assessment information; + links: + - href: '#pm-31_smt.e' + rel: assessment-for - id: pm-31_obj.e-2 name: assessment-objective props: @@ -84028,6 +91683,12 @@ catalog: value: PM-31e.[02] class: sp800-53a prose: continuous monitoring programs are implemented that include response actions to address the analysis of monitoring information; + links: + - href: '#pm-31_smt.e' + rel: assessment-for + links: + - href: '#pm-31_smt.e' + rel: assessment-for - id: pm-31_obj.f name: assessment-objective props: @@ -84042,6 +91703,9 @@ catalog: value: PM-31f.[01] class: sp800-53a prose: 'continuous monitoring programs are implemented that include reporting the security status of organizational systems to {{ insert: param, pm-31_odp.04 }} {{ insert: param, pm-31_odp.06 }};' + links: + - href: '#pm-31_smt.f' + rel: assessment-for - id: pm-31_obj.f-2 name: assessment-objective props: @@ -84049,6 +91713,15 @@ catalog: value: PM-31f.[02] class: sp800-53a prose: 'continuous monitoring programs are implemented that include reporting the privacy status of organizational systems to {{ insert: param, pm-31_odp.05 }} {{ insert: param, pm-31_odp.07 }}.' + links: + - href: '#pm-31_smt.f' + rel: assessment-for + links: + - href: '#pm-31_smt.f' + rel: assessment-for + links: + - href: '#pm-31_smt' + rel: assessment-for - id: pm-31_asm-examine name: assessment-method props: @@ -84179,6 +91852,9 @@ catalog: value: PM-32 class: sp800-53a prose: '{{ insert: param, pm-32_odp }} supporting mission-essential services or functions are analyzed to ensure that the information resources are being used in a manner that is consistent with their intended purpose.' + links: + - href: '#pm-32_smt' + rel: assessment-for - id: pm-32_asm-examine name: assessment-method props: @@ -84424,6 +92100,9 @@ catalog: value: PS-01a.[01] class: sp800-53a prose: a personnel security policy is developed and documented; + links: + - href: '#ps-1_smt.a' + rel: assessment-for - id: ps-1_obj.a-2 name: assessment-objective props: @@ -84431,6 +92110,9 @@ catalog: value: PS-01a.[02] class: sp800-53a prose: 'the personnel security policy is disseminated to {{ insert: param, ps-01_odp.01 }};' + links: + - href: '#ps-1_smt.a' + rel: assessment-for - id: ps-1_obj.a-3 name: assessment-objective props: @@ -84438,6 +92120,9 @@ catalog: value: PS-01a.[03] class: sp800-53a prose: personnel security procedures to facilitate the implementation of the personnel security policy and associated personnel security controls are developed and documented; + links: + - href: '#ps-1_smt.a' + rel: assessment-for - id: ps-1_obj.a-4 name: assessment-objective props: @@ -84445,6 +92130,9 @@ catalog: value: PS-01a.[04] class: sp800-53a prose: 'the personnel security procedures are disseminated to {{ insert: param, ps-01_odp.02 }};' + links: + - href: '#ps-1_smt.a' + rel: assessment-for - id: ps-1_obj.a.1 name: assessment-objective props: @@ -84466,6 +92154,9 @@ catalog: value: PS-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses purpose;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-2 name: assessment-objective props: @@ -84473,6 +92164,9 @@ catalog: value: PS-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses scope;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-3 name: assessment-objective props: @@ -84480,6 +92174,9 @@ catalog: value: PS-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses roles;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-4 name: assessment-objective props: @@ -84487,6 +92184,9 @@ catalog: value: PS-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses responsibilities;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-5 name: assessment-objective props: @@ -84494,6 +92194,9 @@ catalog: value: PS-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses management commitment;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-6 name: assessment-objective props: @@ -84501,6 +92204,9 @@ catalog: value: PS-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses coordination among organizational entities;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.a-7 name: assessment-objective props: @@ -84508,6 +92214,12 @@ catalog: value: PS-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy addresses compliance;' + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ps-1_smt.a.1.a' + rel: assessment-for - id: ps-1_obj.a.1.b name: assessment-objective props: @@ -84515,6 +92227,15 @@ catalog: value: PS-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.03 }} personnel security policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ps-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ps-1_smt.a.1' + rel: assessment-for + links: + - href: '#ps-1_smt.a' + rel: assessment-for - id: ps-1_obj.b name: assessment-objective props: @@ -84522,6 +92243,9 @@ catalog: value: PS-01b. class: sp800-53a prose: 'the {{ insert: param, ps-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the personnel security policy and procedures;' + links: + - href: '#ps-1_smt.b' + rel: assessment-for - id: ps-1_obj.c name: assessment-objective props: @@ -84543,6 +92267,9 @@ catalog: value: PS-01c.01[01] class: sp800-53a prose: 'the current personnel security policy is reviewed and updated {{ insert: param, ps-01_odp.05 }};' + links: + - href: '#ps-1_smt.c.1' + rel: assessment-for - id: ps-1_obj.c.1-2 name: assessment-objective props: @@ -84550,6 +92277,12 @@ catalog: value: PS-01c.01[02] class: sp800-53a prose: 'the current personnel security policy is reviewed and updated following {{ insert: param, ps-01_odp.06 }};' + links: + - href: '#ps-1_smt.c.1' + rel: assessment-for + links: + - href: '#ps-1_smt.c.1' + rel: assessment-for - id: ps-1_obj.c.2 name: assessment-objective props: @@ -84564,6 +92297,9 @@ catalog: value: PS-01c.02[01] class: sp800-53a prose: 'the current personnel security procedures are reviewed and updated {{ insert: param, ps-01_odp.07 }};' + links: + - href: '#ps-1_smt.c.2' + rel: assessment-for - id: ps-1_obj.c.2-2 name: assessment-objective props: @@ -84571,6 +92307,18 @@ catalog: value: PS-01c.02[02] class: sp800-53a prose: 'the current personnel security procedures are reviewed and updated following {{ insert: param, ps-01_odp.08 }}.' + links: + - href: '#ps-1_smt.c.2' + rel: assessment-for + links: + - href: '#ps-1_smt.c.2' + rel: assessment-for + links: + - href: '#ps-1_smt.c' + rel: assessment-for + links: + - href: '#ps-1_smt' + rel: assessment-for - id: ps-1_asm-examine name: assessment-method props: @@ -84700,6 +92448,9 @@ catalog: value: PS-02a. class: sp800-53a prose: a risk designation is assigned to all organizational positions; + links: + - href: '#ps-2_smt.a' + rel: assessment-for - id: ps-2_obj.b name: assessment-objective props: @@ -84707,6 +92458,9 @@ catalog: value: PS-02b. class: sp800-53a prose: screening criteria are established for individuals filling organizational positions; + links: + - href: '#ps-2_smt.b' + rel: assessment-for - id: ps-2_obj.c name: assessment-objective props: @@ -84714,6 +92468,12 @@ catalog: value: PS-02c. class: sp800-53a prose: 'position risk designations are reviewed and updated {{ insert: param, ps-02_odp }}.' + links: + - href: '#ps-2_smt.c' + rel: assessment-for + links: + - href: '#ps-2_smt' + rel: assessment-for - id: ps-2_asm-examine name: assessment-method props: @@ -84879,6 +92639,9 @@ catalog: value: PS-03a. class: sp800-53a prose: individuals are screened prior to authorizing access to the system; + links: + - href: '#ps-3_smt.a' + rel: assessment-for - id: ps-3_obj.b name: assessment-objective props: @@ -84893,6 +92656,9 @@ catalog: value: PS-03b.[01] class: sp800-53a prose: 'individuals are rescreened in accordance with {{ insert: param, ps-03_odp.01 }};' + links: + - href: '#ps-3_smt.b' + rel: assessment-for - id: ps-3_obj.b-2 name: assessment-objective props: @@ -84900,6 +92666,15 @@ catalog: value: PS-03b.[02] class: sp800-53a prose: 'where rescreening is so indicated, individuals are rescreened {{ insert: param, ps-03_odp.02 }}.' + links: + - href: '#ps-3_smt.b' + rel: assessment-for + links: + - href: '#ps-3_smt.b' + rel: assessment-for + links: + - href: '#ps-3_smt' + rel: assessment-for - id: ps-3_asm-examine name: assessment-method props: @@ -84991,6 +92766,9 @@ catalog: value: PS-03(01)[01] class: sp800-53a prose: individuals accessing a system processing, storing, or transmitting classified information are cleared; + links: + - href: '#ps-3.1_smt' + rel: assessment-for - id: ps-3.1_obj-2 name: assessment-objective props: @@ -84998,6 +92776,12 @@ catalog: value: PS-03(01)[02] class: sp800-53a prose: individuals accessing a system processing, storing, or transmitting classified information are indoctrinated to the highest classification level of the information to which they have access on the system. + links: + - href: '#ps-3.1_smt' + rel: assessment-for + links: + - href: '#ps-3.1_smt' + rel: assessment-for - id: ps-3.1_asm-examine name: assessment-method props: @@ -85081,6 +92865,9 @@ catalog: value: PS-03(02) class: sp800-53a prose: individuals accessing a system processing, storing, or transmitting types of classified information that require formal indoctrination are formally indoctrinated for all of the relevant types of information to which they have access on the system. + links: + - href: '#ps-3.2_smt' + rel: assessment-for - id: ps-3.2_asm-examine name: assessment-method props: @@ -85193,6 +92980,9 @@ catalog: value: PS-03(03)(a) class: sp800-53a prose: individuals accessing a system processing, storing, or transmitting information requiring special protection have valid access authorizations that are demonstrated by assigned official government duties; + links: + - href: '#ps-3.3_smt.a' + rel: assessment-for - id: ps-3.3_obj.b name: assessment-objective props: @@ -85200,6 +92990,12 @@ catalog: value: PS-03(03)(b) class: sp800-53a prose: 'individuals accessing a system processing, storing, or transmitting information requiring special protection satisfy {{ insert: param, ps-03.03_odp }}.' + links: + - href: '#ps-3.3_smt.b' + rel: assessment-for + links: + - href: '#ps-3.3_smt' + rel: assessment-for - id: ps-3.3_asm-examine name: assessment-method props: @@ -85307,6 +93103,9 @@ catalog: value: PS-03(04) class: sp800-53a prose: 'individuals accessing a system processing, storing, or transmitting {{ insert: param, ps-03.04_odp.01 }} meet {{ insert: param, ps-03.04_odp.02 }}.' + links: + - href: '#ps-3.4_smt' + rel: assessment-for - id: ps-3.4_asm-examine name: assessment-method props: @@ -85462,6 +93261,9 @@ catalog: value: PS-04a. class: sp800-53a prose: 'upon termination of individual employment, system access is disabled within {{ insert: param, ps-04_odp.01 }};' + links: + - href: '#ps-4_smt.a' + rel: assessment-for - id: ps-4_obj.b name: assessment-objective props: @@ -85469,6 +93271,9 @@ catalog: value: PS-04b. class: sp800-53a prose: upon termination of individual employment, any authenticators and credentials are terminated or revoked; + links: + - href: '#ps-4_smt.b' + rel: assessment-for - id: ps-4_obj.c name: assessment-objective props: @@ -85476,6 +93281,9 @@ catalog: value: PS-04c. class: sp800-53a prose: 'upon termination of individual employment, exit interviews that include a discussion of {{ insert: param, ps-04_odp.02 }} are conducted;' + links: + - href: '#ps-4_smt.c' + rel: assessment-for - id: ps-4_obj.d name: assessment-objective props: @@ -85483,6 +93291,9 @@ catalog: value: PS-04d. class: sp800-53a prose: upon termination of individual employment, all security-related organizational system-related property is retrieved; + links: + - href: '#ps-4_smt.d' + rel: assessment-for - id: ps-4_obj.e name: assessment-objective props: @@ -85490,6 +93301,12 @@ catalog: value: PS-04e. class: sp800-53a prose: upon termination of individual employment, access to organizational information and systems formerly controlled by the terminated individual are retained. + links: + - href: '#ps-4_smt.e' + rel: assessment-for + links: + - href: '#ps-4_smt' + rel: assessment-for - id: ps-4_asm-examine name: assessment-method props: @@ -85604,6 +93421,9 @@ catalog: value: PS-04(01)(a) class: sp800-53a prose: terminated individuals are notified of applicable, legally binding post-employment requirements for the protection of organizational information; + links: + - href: '#ps-4.1_smt.a' + rel: assessment-for - id: ps-4.1_obj.b name: assessment-objective props: @@ -85611,6 +93431,12 @@ catalog: value: PS-04(01)(b) class: sp800-53a prose: terminated individuals are required to sign an acknowledgement of post-employment requirements as part of the organizational termination process. + links: + - href: '#ps-4.1_smt.b' + rel: assessment-for + links: + - href: '#ps-4.1_smt' + rel: assessment-for - id: ps-4.1_asm-examine name: assessment-method props: @@ -85725,6 +93551,9 @@ catalog: value: PS-04(02) class: sp800-53a prose: '{{ insert: param, ps-04.02_odp.01 }} are used to {{ insert: param, ps-04.02_odp.02 }}.' + links: + - href: '#ps-4.2_smt' + rel: assessment-for - id: ps-4.2_asm-examine name: assessment-method props: @@ -85895,6 +93724,9 @@ catalog: value: PS-05a. class: sp800-53a prose: the ongoing operational need for current logical and physical access authorizations to systems and facilities are reviewed and confirmed when individuals are reassigned or transferred to other positions within the organization; + links: + - href: '#ps-5_smt.a' + rel: assessment-for - id: ps-5_obj.b name: assessment-objective props: @@ -85902,6 +93734,9 @@ catalog: value: PS-05b. class: sp800-53a prose: '{{ insert: param, ps-05_odp.01 }} are initiated within {{ insert: param, ps-05_odp.02 }};' + links: + - href: '#ps-5_smt.b' + rel: assessment-for - id: ps-5_obj.c name: assessment-objective props: @@ -85909,6 +93744,9 @@ catalog: value: PS-05c. class: sp800-53a prose: access authorization is modified as needed to correspond with any changes in operational need due to reassignment or transfer; + links: + - href: '#ps-5_smt.c' + rel: assessment-for - id: ps-5_obj.d name: assessment-objective props: @@ -85916,6 +93754,12 @@ catalog: value: PS-05d. class: sp800-53a prose: '{{ insert: param, ps-05_odp.03 }} are notified within {{ insert: param, ps-05_odp.04 }}.' + links: + - href: '#ps-5_smt.d' + rel: assessment-for + links: + - href: '#ps-5_smt' + rel: assessment-for - id: ps-5_asm-examine name: assessment-method props: @@ -86086,6 +93930,9 @@ catalog: value: PS-06a. class: sp800-53a prose: access agreements are developed and documented for organizational systems; + links: + - href: '#ps-6_smt.a' + rel: assessment-for - id: ps-6_obj.b name: assessment-objective props: @@ -86093,6 +93940,9 @@ catalog: value: PS-06b. class: sp800-53a prose: 'the access agreements are reviewed and updated {{ insert: param, ps-06_odp.01 }};' + links: + - href: '#ps-6_smt.b' + rel: assessment-for - id: ps-6_obj.c name: assessment-objective props: @@ -86107,6 +93957,9 @@ catalog: value: PS-06c.01 class: sp800-53a prose: individuals requiring access to organizational information and systems sign appropriate access agreements prior to being granted access; + links: + - href: '#ps-6_smt.c.1' + rel: assessment-for - id: ps-6_obj.c.2 name: assessment-objective props: @@ -86114,6 +93967,15 @@ catalog: value: PS-06c.02 class: sp800-53a prose: 'individuals requiring access to organizational information and systems re-sign access agreements to maintain access to organizational systems when access agreements have been updated or {{ insert: param, ps-06_odp.02 }}.' + links: + - href: '#ps-6_smt.c.2' + rel: assessment-for + links: + - href: '#ps-6_smt.c' + rel: assessment-for + links: + - href: '#ps-6_smt' + rel: assessment-for - id: ps-6_asm-examine name: assessment-method props: @@ -86254,6 +94116,9 @@ catalog: value: PS-06(02)(a) class: sp800-53a prose: access to classified information requiring special protection is granted only to individuals who have a valid access authorization that is demonstrated by assigned official government duties; + links: + - href: '#ps-6.2_smt.a' + rel: assessment-for - id: ps-6.2_obj.b name: assessment-objective props: @@ -86261,6 +94126,9 @@ catalog: value: PS-06(02)(b) class: sp800-53a prose: access to classified information requiring special protection is granted only to individuals who satisfy associated personnel security criteria; + links: + - href: '#ps-6.2_smt.b' + rel: assessment-for - id: ps-6.2_obj.c name: assessment-objective props: @@ -86268,6 +94136,12 @@ catalog: value: PS-06(02)(c) class: sp800-53a prose: access to classified information requiring special protection is granted only to individuals who have read, understood, and signed a non-disclosure agreement. + links: + - href: '#ps-6.2_smt.c' + rel: assessment-for + links: + - href: '#ps-6.2_smt' + rel: assessment-for - id: ps-6.2_asm-examine name: assessment-method props: @@ -86379,6 +94253,9 @@ catalog: value: PS-06(03)(a) class: sp800-53a prose: individuals are notified of applicable, legally binding post-employment requirements for the protection of organizational information; + links: + - href: '#ps-6.3_smt.a' + rel: assessment-for - id: ps-6.3_obj.b name: assessment-objective props: @@ -86386,6 +94263,12 @@ catalog: value: PS-06(03)(b) class: sp800-53a prose: individuals are required to sign an acknowledgement of applicable, legally binding post-employment requirements as part of being granted initial access to covered information. + links: + - href: '#ps-6.3_smt.b' + rel: assessment-for + links: + - href: '#ps-6.3_smt' + rel: assessment-for - id: ps-6.3_asm-examine name: assessment-method props: @@ -86561,6 +94444,9 @@ catalog: value: PS-07a. class: sp800-53a prose: personnel security requirements are established, including security roles and responsibilities for external providers; + links: + - href: '#ps-7_smt.a' + rel: assessment-for - id: ps-7_obj.b name: assessment-objective props: @@ -86568,6 +94454,9 @@ catalog: value: PS-07b. class: sp800-53a prose: external providers are required to comply with personnel security policies and procedures established by the organization; + links: + - href: '#ps-7_smt.b' + rel: assessment-for - id: ps-7_obj.c name: assessment-objective props: @@ -86575,6 +94464,9 @@ catalog: value: PS-07c. class: sp800-53a prose: personnel security requirements are documented; + links: + - href: '#ps-7_smt.c' + rel: assessment-for - id: ps-7_obj.d name: assessment-objective props: @@ -86582,6 +94474,9 @@ catalog: value: PS-07d. class: sp800-53a prose: 'external providers are required to notify {{ insert: param, ps-07_odp.01 }} of any personnel transfers or terminations of external personnel who possess organizational credentials and/or badges or who have system privileges within {{ insert: param, ps-07_odp.02 }};' + links: + - href: '#ps-7_smt.d' + rel: assessment-for - id: ps-7_obj.e name: assessment-objective props: @@ -86589,6 +94484,12 @@ catalog: value: PS-07e. class: sp800-53a prose: provider compliance with personnel security requirements is monitored. + links: + - href: '#ps-7_smt.e' + rel: assessment-for + links: + - href: '#ps-7_smt' + rel: assessment-for - id: ps-7_asm-examine name: assessment-method props: @@ -86729,6 +94630,9 @@ catalog: value: PS-08a. class: sp800-53a prose: a formal sanctions process is employed for individuals failing to comply with established information security and privacy policies and procedures; + links: + - href: '#ps-8_smt.a' + rel: assessment-for - id: ps-8_obj.b name: assessment-objective props: @@ -86736,6 +94640,12 @@ catalog: value: PS-08b. class: sp800-53a prose: '{{ insert: param, ps-08_odp.01 }} is/are notified within {{ insert: param, ps-08_odp.02 }} when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction.' + links: + - href: '#ps-8_smt.b' + rel: assessment-for + links: + - href: '#ps-8_smt' + rel: assessment-for - id: ps-8_asm-examine name: assessment-method props: @@ -86837,6 +94747,9 @@ catalog: value: PS-09[01] class: sp800-53a prose: security roles and responsibilities are incorporated into organizational position descriptions; + links: + - href: '#ps-9_smt' + rel: assessment-for - id: ps-9_obj-2 name: assessment-objective props: @@ -86844,6 +94757,12 @@ catalog: value: PS-09[02] class: sp800-53a prose: privacy roles and responsibilities are incorporated into organizational position descriptions. + links: + - href: '#ps-9_smt' + rel: assessment-for + links: + - href: '#ps-9_smt' + rel: assessment-for - id: ps-9_asm-examine name: assessment-method props: @@ -87098,6 +95017,9 @@ catalog: value: PT-01a.[01] class: sp800-53a prose: a personally identifiable information processing and transparency policy is developed and documented; + links: + - href: '#pt-1_smt.a' + rel: assessment-for - id: pt-1_obj.a-2 name: assessment-objective props: @@ -87105,6 +95027,9 @@ catalog: value: PT-01a.[02] class: sp800-53a prose: 'the personally identifiable information processing and transparency policy is disseminated to {{ insert: param, pt-01_odp.01 }};' + links: + - href: '#pt-1_smt.a' + rel: assessment-for - id: pt-1_obj.a-3 name: assessment-objective props: @@ -87112,6 +95037,9 @@ catalog: value: PT-01a.[03] class: sp800-53a prose: personally identifiable information processing and transparency procedures to facilitate the implementation of the personally identifiable information processing and transparency policy and associated personally identifiable information processing and transparency controls are developed and documented; + links: + - href: '#pt-1_smt.a' + rel: assessment-for - id: pt-1_obj.a-4 name: assessment-objective props: @@ -87119,6 +95047,9 @@ catalog: value: PT-01a.[04] class: sp800-53a prose: 'the personally identifiable information processing and transparency procedures are disseminated to {{ insert: param, pt-01_odp.02 }};' + links: + - href: '#pt-1_smt.a' + rel: assessment-for - id: pt-1_obj.a.1 name: assessment-objective props: @@ -87140,6 +95071,9 @@ catalog: value: PT-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, pt-01_odp.03 }} personally identifiable information processing and transparency policy addresses purpose;' + links: + - href: '#pt-1_smt.a.1.a' + rel: assessment-for - id: pt-1_obj.a.1.a-2 name: assessment-objective props: @@ -87147,6 +95081,9 @@ catalog: value: PT-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, pt-01_odp.03 }} personally identifiable information processing and transparency policy addresses scope;' + links: + - href: '#pt-1_smt.a.1.a' + rel: assessment-for - id: pt-1_obj.a.1.a-3 name: assessment-objective props: @@ -87154,6 +95091,9 @@ catalog: value: PT-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, pt-01_odp.03 }} personally identifiable information processing and transparency policy addresses roles;' + links: + - href: '#pt-1_smt.a.1.a' + rel: assessment-for - id: pt-1_obj.a.1.a-4 name: assessment-objective props: @@ -87161,6 +95101,9 @@ catalog: value: PT-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, pt-01_odp.03 }} personally identifiable information processing and transparency policy addresses responsibilities;' + links: + - href: '#pt-1_smt.a.1.a' + rel: assessment-for - id: pt-1_obj.a.1.a-5 name: assessment-objective props: @@ -87168,6 +95111,9 @@ catalog: value: PT-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, pt-01_odp.03 }} personally identifiable information processing and transparency policy addresses management commitment;' + links: + - href: '#pt-1_smt.a.1.a' + rel: assessment-for - id: pt-1_obj.a.1.a-6 name: assessment-objective props: @@ -87175,6 +95121,9 @@ catalog: value: PT-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, pt-01_odp.03 }} personally identifiable information processing and transparency policy addresses coordination among organizational entities;' + links: + - href: '#pt-1_smt.a.1.a' + rel: assessment-for - id: pt-1_obj.a.1.a-7 name: assessment-objective props: @@ -87182,6 +95131,12 @@ catalog: value: PT-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, pt-01_odp.03 }} personally identifiable information processing and transparency policy addresses compliance;' + links: + - href: '#pt-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#pt-1_smt.a.1.a' + rel: assessment-for - id: pt-1_obj.a.1.b name: assessment-objective props: @@ -87189,6 +95144,15 @@ catalog: value: PT-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, pt-01_odp.03 }} personally identifiable information processing and transparency policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#pt-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#pt-1_smt.a.1' + rel: assessment-for + links: + - href: '#pt-1_smt.a' + rel: assessment-for - id: pt-1_obj.b name: assessment-objective props: @@ -87196,6 +95160,9 @@ catalog: value: PT-01b. class: sp800-53a prose: 'the {{ insert: param, pt-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the personally identifiable information processing and transparency policy and procedures;' + links: + - href: '#pt-1_smt.b' + rel: assessment-for - id: pt-1_obj.c name: assessment-objective props: @@ -87217,6 +95184,9 @@ catalog: value: PT-01c.01[01] class: sp800-53a prose: 'the current personally identifiable information processing and transparency policy is reviewed and updated {{ insert: param, pt-01_odp.05 }};' + links: + - href: '#pt-1_smt.c.1' + rel: assessment-for - id: pt-1_obj.c.1-2 name: assessment-objective props: @@ -87224,6 +95194,12 @@ catalog: value: PT-01c.01[02] class: sp800-53a prose: 'the current personally identifiable information processing and transparency policy is reviewed and updated following {{ insert: param, pt-01_odp.06 }};' + links: + - href: '#pt-1_smt.c.1' + rel: assessment-for + links: + - href: '#pt-1_smt.c.1' + rel: assessment-for - id: pt-1_obj.c.2 name: assessment-objective props: @@ -87238,6 +95214,9 @@ catalog: value: PT-01c.02[01] class: sp800-53a prose: 'the current personally identifiable information processing and transparency procedures are reviewed and updated {{ insert: param, pt-01_odp.07 }};' + links: + - href: '#pt-1_smt.c.2' + rel: assessment-for - id: pt-1_obj.c.2-2 name: assessment-objective props: @@ -87245,6 +95224,18 @@ catalog: value: PT-01c.02[02] class: sp800-53a prose: 'the current personally identifiable information processing and transparency procedures are reviewed and updated following {{ insert: param, pt-01_odp.08 }}.' + links: + - href: '#pt-1_smt.c.2' + rel: assessment-for + links: + - href: '#pt-1_smt.c.2' + rel: assessment-for + links: + - href: '#pt-1_smt.c' + rel: assessment-for + links: + - href: '#pt-1_smt' + rel: assessment-for - id: pt-1_asm-examine name: assessment-method props: @@ -87402,6 +95393,9 @@ catalog: value: PT-02a. class: sp800-53a prose: 'the {{ insert: param, pt-02_odp.01 }} that permits the {{ insert: param, pt-02_odp.02 }} of personally identifiable information is determined and documented;' + links: + - href: '#pt-2_smt.a' + rel: assessment-for - id: pt-2_obj.b name: assessment-objective props: @@ -87409,6 +95403,12 @@ catalog: value: PT-02b. class: sp800-53a prose: 'the {{ insert: param, pt-02_odp.03 }} of personally identifiable information is restricted to only that which is authorized.' + links: + - href: '#pt-2_smt.b' + rel: assessment-for + links: + - href: '#pt-2_smt' + rel: assessment-for - id: pt-2_asm-examine name: assessment-method props: @@ -87534,6 +95534,9 @@ catalog: value: PT-02(01) class: sp800-53a prose: 'data tags containing {{ insert: param, pt-02.01_odp.01 }} are attached to {{ insert: param, pt-02.01_odp.02 }}.' + links: + - href: '#pt-2.1_smt' + rel: assessment-for - id: pt-2.1_asm-examine name: assessment-method props: @@ -87656,6 +95659,9 @@ catalog: value: PT-02(02) class: sp800-53a prose: 'enforcement of the authorized processing of personally identifiable information is managed using {{ insert: param, pt-02.02_odp }}.' + links: + - href: '#pt-2.2_smt' + rel: assessment-for - id: pt-2.2_asm-examine name: assessment-method props: @@ -87845,6 +95851,9 @@ catalog: value: PT-03a. class: sp800-53a prose: 'the {{ insert: param, pt-03_odp.01 }} for processing personally identifiable information is/are identified and documented;' + links: + - href: '#pt-3_smt.a' + rel: assessment-for - id: pt-3_obj.b name: assessment-objective props: @@ -87859,6 +95868,9 @@ catalog: value: PT-03b.[01] class: sp800-53a prose: the purpose(s) is/are described in the public privacy notices of the organization; + links: + - href: '#pt-3_smt.b' + rel: assessment-for - id: pt-3_obj.b-2 name: assessment-objective props: @@ -87866,6 +95878,12 @@ catalog: value: PT-03b.[02] class: sp800-53a prose: the purpose(s) is/are described in the policies of the organization; + links: + - href: '#pt-3_smt.b' + rel: assessment-for + links: + - href: '#pt-3_smt.b' + rel: assessment-for - id: pt-3_obj.c name: assessment-objective props: @@ -87873,6 +95891,9 @@ catalog: value: PT-03c. class: sp800-53a prose: 'the {{ insert: param, pt-03_odp.02 }} of personally identifiable information are restricted to only that which is compatible with the identified purpose(s);' + links: + - href: '#pt-3_smt.c' + rel: assessment-for - id: pt-3_obj.d name: assessment-objective props: @@ -87887,6 +95908,9 @@ catalog: value: PT-03d.[01] class: sp800-53a prose: changes in the processing of personally identifiable information are monitored; + links: + - href: '#pt-3_smt.d' + rel: assessment-for - id: pt-3_obj.d-2 name: assessment-objective props: @@ -87894,6 +95918,15 @@ catalog: value: PT-03d.[02] class: sp800-53a prose: '{{ insert: param, pt-03_odp.03 }} are implemented to ensure that any changes are made in accordance with {{ insert: param, pt-03_odp.04 }}.' + links: + - href: '#pt-3_smt.d' + rel: assessment-for + links: + - href: '#pt-3_smt.d' + rel: assessment-for + links: + - href: '#pt-3_smt' + rel: assessment-for - id: pt-3_asm-examine name: assessment-method props: @@ -88031,6 +96064,9 @@ catalog: value: PT-03(01) class: sp800-53a prose: 'data tags containing {{ insert: param, pt-03.01_odp.01 }} are attached to {{ insert: param, pt-03.01_odp.02 }}.' + links: + - href: '#pt-3.1_smt' + rel: assessment-for - id: pt-3.1_asm-examine name: assessment-method props: @@ -88149,6 +96185,9 @@ catalog: value: PT-03(02) class: sp800-53a prose: 'the processing purposes of personally identifiable information are tracked using {{ insert: param, pt-03.02_odp }}.' + links: + - href: '#pt-3.2_smt' + rel: assessment-for - id: pt-3.2_asm-examine name: assessment-method props: @@ -88250,6 +96289,9 @@ catalog: value: PT-04 class: sp800-53a prose: 'the {{ insert: param, pt-04_odp }} are implemented for individuals to consent to the processing of their personally identifiable information prior to its collection that facilitate individuals’ informed decision-making.' + links: + - href: '#pt-4_smt' + rel: assessment-for - id: pt-4_asm-examine name: assessment-method props: @@ -88352,6 +96394,9 @@ catalog: value: PT-04(01) class: sp800-53a prose: '{{ insert: param, pt-04.01_odp }} are provided to allow individuals to tailor processing permissions to selected elements of personally identifiable information.' + links: + - href: '#pt-4.1_smt' + rel: assessment-for - id: pt-4.1_asm-examine name: assessment-method props: @@ -88473,6 +96518,9 @@ catalog: value: PT-04(02) class: sp800-53a prose: '{{ insert: param, pt-04.02_odp.01 }} are presented to individuals {{ insert: param, pt-04.02_odp.02 }} and in conjunction with {{ insert: param, pt-04.02_odp.03 }}.' + links: + - href: '#pt-4.2_smt' + rel: assessment-for - id: pt-4.2_asm-examine name: assessment-method props: @@ -88570,6 +96618,9 @@ catalog: value: PT-04(03) class: sp800-53a prose: 'the {{ insert: param, pt-04.03_odp }} are implemented for individuals to revoke consent to the processing of their personally identifiable information.' + links: + - href: '#pt-4.3_smt' + rel: assessment-for - id: pt-4.3_asm-examine name: assessment-method props: @@ -88745,6 +96796,9 @@ catalog: value: PT-05a.[01] class: sp800-53a prose: a notice to individuals about the processing of personally identifiable information is provided such that the notice is available to individuals upon first interacting with an organization; + links: + - href: '#pt-5_smt.a' + rel: assessment-for - id: pt-5_obj.a-2 name: assessment-objective props: @@ -88752,6 +96806,12 @@ catalog: value: PT-05a.[02] class: sp800-53a prose: 'a notice to individuals about the processing of personally identifiable information is provided such that the notice is subsequently available to individuals {{ insert: param, pt-05_odp.01 }};' + links: + - href: '#pt-5_smt.a' + rel: assessment-for + links: + - href: '#pt-5_smt.a' + rel: assessment-for - id: pt-5_obj.b name: assessment-objective props: @@ -88759,6 +96819,9 @@ catalog: value: PT-05b. class: sp800-53a prose: a notice to individuals about the processing of personally identifiable information is provided that is clear, easy-to-understand, and expresses information about personally identifiable information processing in plain language; + links: + - href: '#pt-5_smt.b' + rel: assessment-for - id: pt-5_obj.c name: assessment-objective props: @@ -88766,6 +96829,9 @@ catalog: value: PT-05c. class: sp800-53a prose: a notice to individuals about the processing of personally identifiable information that identifies the authority that authorizes the processing of personally identifiable information is provided; + links: + - href: '#pt-5_smt.c' + rel: assessment-for - id: pt-5_obj.d name: assessment-objective props: @@ -88773,6 +96839,9 @@ catalog: value: PT-05d. class: sp800-53a prose: a notice to individuals about the processing of personally identifiable information that identifies the purpose for which personally identifiable information is to be processed is provided; + links: + - href: '#pt-5_smt.d' + rel: assessment-for - id: pt-5_obj.e name: assessment-objective props: @@ -88780,6 +96849,12 @@ catalog: value: PT-05e. class: sp800-53a prose: 'a notice to individuals about the processing of personally identifiable information which includes {{ insert: param, pt-05_odp.02 }} is provided.' + links: + - href: '#pt-5_smt.e' + rel: assessment-for + links: + - href: '#pt-5_smt' + rel: assessment-for - id: pt-5_asm-examine name: assessment-method props: @@ -88875,6 +96950,9 @@ catalog: value: PT-05(01) class: sp800-53a prose: 'a notice of personally identifiable information processing is presented to individuals at a time and location where the individual provides personally identifiable information, in conjunction with a data action, or {{ insert: param, pt-05.01_odp }}.' + links: + - href: '#pt-5.1_smt' + rel: assessment-for - id: pt-5.1_asm-examine name: assessment-method props: @@ -88959,6 +97037,9 @@ catalog: value: PT-05(02) class: sp800-53a prose: Privacy Act statements are included on forms that collect information that will be maintained in a Privacy Act system of records, or Privacy Act statements are provided on separate forms that can be retained by individuals. + links: + - href: '#pt-5.2_smt' + rel: assessment-for - id: pt-5.2_asm-examine name: assessment-method props: @@ -89085,6 +97166,9 @@ catalog: value: PT-06a.[01] class: sp800-53a prose: system of records notices are drafted in accordance with OMB guidance for systems that process information that will be maintained in a Privacy Act system of records; + links: + - href: '#pt-6_smt.a' + rel: assessment-for - id: pt-6_obj.a-2 name: assessment-objective props: @@ -89092,6 +97176,12 @@ catalog: value: PT-06a.[02] class: sp800-53a prose: new and significantly modified system of records notices are submitted to the OMB and appropriate congressional committees for advance review for systems that process information that will be maintained in a Privacy Act system of records; + links: + - href: '#pt-6_smt.a' + rel: assessment-for + links: + - href: '#pt-6_smt.a' + rel: assessment-for - id: pt-6_obj.b name: assessment-objective props: @@ -89099,6 +97189,9 @@ catalog: value: PT-06b. class: sp800-53a prose: system of records notices are published in the Federal Register for systems that process information that will be maintained in a Privacy Act system of records; + links: + - href: '#pt-6_smt.b' + rel: assessment-for - id: pt-6_obj.c name: assessment-objective props: @@ -89106,6 +97199,12 @@ catalog: value: PT-06c. class: sp800-53a prose: system of records notices are kept accurate, up-to-date, and scoped in accordance with policy for systems that process information that will be maintained in a Privacy Act system of records. + links: + - href: '#pt-6_smt.c' + rel: assessment-for + links: + - href: '#pt-6_smt' + rel: assessment-for - id: pt-6_asm-examine name: assessment-method props: @@ -89199,6 +97298,9 @@ catalog: value: PT-06(01) class: sp800-53a prose: 'all routine uses published in the system of records notice are reviewed {{ insert: param, pt-06.01_odp }} to ensure continued accuracy, and to ensure that routine uses continue to be compatible with the purpose for which the information was collected.' + links: + - href: '#pt-6.1_smt' + rel: assessment-for - id: pt-6.1_asm-examine name: assessment-method props: @@ -89296,6 +97398,9 @@ catalog: value: PT-06(02)[01] class: sp800-53a prose: 'all Privacy Act exemptions claimed for the system of records are reviewed {{ insert: param, pt-06.02_odp }} to ensure that they remain appropriate and necessary in accordance with law;' + links: + - href: '#pt-6.2_smt' + rel: assessment-for - id: pt-6.2_obj-2 name: assessment-objective props: @@ -89303,6 +97408,9 @@ catalog: value: PT-06(02)[02] class: sp800-53a prose: 'all Privacy Act exemptions claimed for the system of records are reviewed {{ insert: param, pt-06.02_odp }} to ensure that they have been promulgated as regulations;' + links: + - href: '#pt-6.2_smt' + rel: assessment-for - id: pt-6.2_obj-3 name: assessment-objective props: @@ -89310,6 +97418,12 @@ catalog: value: PT-06(02)[03] class: sp800-53a prose: 'all Privacy Act exemptions claimed for the system of records are reviewed {{ insert: param, pt-06.02_odp }} to ensure that they are accurately described in the system of records notice.' + links: + - href: '#pt-6.2_smt' + rel: assessment-for + links: + - href: '#pt-6.2_smt' + rel: assessment-for - id: pt-6.2_asm-examine name: assessment-method props: @@ -89416,6 +97530,9 @@ catalog: value: PT-07 class: sp800-53a prose: '{{ insert: param, pt-07_odp }} are applied for specific categories of personally identifiable information.' + links: + - href: '#pt-7_smt' + rel: assessment-for - id: pt-7_asm-examine name: assessment-method props: @@ -89541,6 +97658,9 @@ catalog: value: PT-07(01)(a)[01] class: sp800-53a prose: when a system processes Social Security numbers, the unnecessary collection, maintenance, and use of Social Security numbers are eliminated; + links: + - href: '#pt-7.1_smt.a' + rel: assessment-for - id: pt-7.1_obj.a-2 name: assessment-objective props: @@ -89548,6 +97668,12 @@ catalog: value: PT-07(01)(a)[02] class: sp800-53a prose: when a system processes Social Security numbers, alternatives to the use of Social Security Numbers as a personal identifier are explored; + links: + - href: '#pt-7.1_smt.a' + rel: assessment-for + links: + - href: '#pt-7.1_smt.a' + rel: assessment-for - id: pt-7.1_obj.b name: assessment-objective props: @@ -89555,6 +97681,9 @@ catalog: value: PT-07(01)(b) class: sp800-53a prose: when a system processes Social Security numbers, individual rights, benefits, or privileges provided by law are not denied because of an individual’s refusal to disclose their Social Security number; + links: + - href: '#pt-7.1_smt.b' + rel: assessment-for - id: pt-7.1_obj.c name: assessment-objective props: @@ -89569,6 +97698,9 @@ catalog: value: PT-07(01)(c)[01] class: sp800-53a prose: when a system processes Social Security numbers, any individual who is asked to disclose their Social Security number is informed whether that disclosure is mandatory or voluntary, by what statutory or other authority such number is solicited, and what uses will be made of it; + links: + - href: '#pt-7.1_smt.c' + rel: assessment-for - id: pt-7.1_obj.c-2 name: assessment-objective props: @@ -89576,6 +97708,9 @@ catalog: value: PT-07(01)(c)[02] class: sp800-53a prose: when a system processes Social Security numbers, any individual who is asked to disclose their Social Security number is informed by what statutory or other authority the number is solicited; + links: + - href: '#pt-7.1_smt.c' + rel: assessment-for - id: pt-7.1_obj.c-3 name: assessment-objective props: @@ -89583,6 +97718,15 @@ catalog: value: PT-07(01)(c)[03] class: sp800-53a prose: when a system processes Social Security numbers, any individual who is asked to disclose their Social Security number is informed what uses will be made of it. + links: + - href: '#pt-7.1_smt.c' + rel: assessment-for + links: + - href: '#pt-7.1_smt.c' + rel: assessment-for + links: + - href: '#pt-7.1_smt' + rel: assessment-for - id: pt-7.1_asm-examine name: assessment-method props: @@ -89669,6 +97813,9 @@ catalog: value: PT-07(02) class: sp800-53a prose: the processing of information describing how any individual exercises rights guaranteed by the First Amendment is prohibited unless expressly authorized by statute or by the individual or unless pertinent to and within the scope of an authorized law enforcement activity. + links: + - href: '#pt-7.2_smt' + rel: assessment-for - id: pt-7.2_asm-examine name: assessment-method props: @@ -89794,6 +97941,9 @@ catalog: value: PT-08a. class: sp800-53a prose: approval to conduct the matching program is obtained from the Data Integrity Board when a system or organization processes information for the purpose of conducting a matching program; + links: + - href: '#pt-8_smt.a' + rel: assessment-for - id: pt-8_obj.b name: assessment-objective props: @@ -89808,6 +97958,9 @@ catalog: value: PT-08b.[01] class: sp800-53a prose: a computer matching agreement is developed when a system or organization processes information for the purpose of conducting a matching program; + links: + - href: '#pt-8_smt.b' + rel: assessment-for - id: pt-8_obj.b-2 name: assessment-objective props: @@ -89815,6 +97968,12 @@ catalog: value: PT-08b.[02] class: sp800-53a prose: a computer matching agreement is entered into when a system or organization processes information for the purpose of conducting a matching program; + links: + - href: '#pt-8_smt.b' + rel: assessment-for + links: + - href: '#pt-8_smt.b' + rel: assessment-for - id: pt-8_obj.c name: assessment-objective props: @@ -89822,6 +97981,9 @@ catalog: value: PT-08c. class: sp800-53a prose: a matching notice is published in the Federal Register when a system or organization processes information for the purpose of conducting a matching program; + links: + - href: '#pt-8_smt.c' + rel: assessment-for - id: pt-8_obj.d name: assessment-objective props: @@ -89829,6 +97991,9 @@ catalog: value: PT-08d. class: sp800-53a prose: the information produced by the matching program is independently verified before taking adverse action against an individual, if required, when a system or organization processes information for the purpose of conducting a matching program; + links: + - href: '#pt-8_smt.d' + rel: assessment-for - id: pt-8_obj.e name: assessment-objective props: @@ -89843,6 +98008,9 @@ catalog: value: PT-08e.[01] class: sp800-53a prose: individuals are provided with notice when a system or organization processes information for the purpose of conducting a matching program; + links: + - href: '#pt-8_smt.e' + rel: assessment-for - id: pt-8_obj.e-2 name: assessment-objective props: @@ -89850,6 +98018,15 @@ catalog: value: PT-08e.[02] class: sp800-53a prose: individuals are provided with an opportunity to contest the findings before adverse action is taken against them when a system or organization processes information for the purpose of conducting a matching program. + links: + - href: '#pt-8_smt.e' + rel: assessment-for + links: + - href: '#pt-8_smt.e' + rel: assessment-for + links: + - href: '#pt-8_smt' + rel: assessment-for - id: pt-8_asm-examine name: assessment-method props: @@ -90125,6 +98302,9 @@ catalog: value: RA-01a.[01] class: sp800-53a prose: a risk assessment policy is developed and documented; + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.a-2 name: assessment-objective props: @@ -90132,6 +98312,9 @@ catalog: value: RA-01a.[02] class: sp800-53a prose: 'the risk assessment policy is disseminated to {{ insert: param, ra-01_odp.01 }};' + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.a-3 name: assessment-objective props: @@ -90139,6 +98322,9 @@ catalog: value: RA-01a.[03] class: sp800-53a prose: risk assessment procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls are developed and documented; + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.a-4 name: assessment-objective props: @@ -90146,6 +98332,9 @@ catalog: value: RA-01a.[04] class: sp800-53a prose: 'the risk assessment procedures are disseminated to {{ insert: param, ra-01_odp.02 }};' + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.a.1 name: assessment-objective props: @@ -90167,6 +98356,9 @@ catalog: value: RA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses purpose;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-2 name: assessment-objective props: @@ -90174,6 +98366,9 @@ catalog: value: RA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses scope;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-3 name: assessment-objective props: @@ -90181,6 +98376,9 @@ catalog: value: RA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses roles;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-4 name: assessment-objective props: @@ -90188,6 +98386,9 @@ catalog: value: RA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses responsibilities;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-5 name: assessment-objective props: @@ -90195,6 +98396,9 @@ catalog: value: RA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses management commitment;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-6 name: assessment-objective props: @@ -90202,6 +98406,9 @@ catalog: value: RA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses coordination among organizational entities;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.a-7 name: assessment-objective props: @@ -90209,6 +98416,12 @@ catalog: value: RA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy addresses compliance;' + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#ra-1_smt.a.1.a' + rel: assessment-for - id: ra-1_obj.a.1.b name: assessment-objective props: @@ -90216,6 +98429,15 @@ catalog: value: RA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.03 }} risk assessment policy is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#ra-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#ra-1_smt.a.1' + rel: assessment-for + links: + - href: '#ra-1_smt.a' + rel: assessment-for - id: ra-1_obj.b name: assessment-objective props: @@ -90223,6 +98445,9 @@ catalog: value: RA-01b. class: sp800-53a prose: 'the {{ insert: param, ra-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the risk assessment policy and procedures;' + links: + - href: '#ra-1_smt.b' + rel: assessment-for - id: ra-1_obj.c name: assessment-objective props: @@ -90244,6 +98469,9 @@ catalog: value: RA-01c.01[01] class: sp800-53a prose: 'the current risk assessment policy is reviewed and updated {{ insert: param, ra-01_odp.05 }};' + links: + - href: '#ra-1_smt.c.1' + rel: assessment-for - id: ra-1_obj.c.1-2 name: assessment-objective props: @@ -90251,6 +98479,12 @@ catalog: value: RA-01c.01[02] class: sp800-53a prose: 'the current risk assessment policy is reviewed and updated following {{ insert: param, ra-01_odp.06 }};' + links: + - href: '#ra-1_smt.c.1' + rel: assessment-for + links: + - href: '#ra-1_smt.c.1' + rel: assessment-for - id: ra-1_obj.c.2 name: assessment-objective props: @@ -90265,6 +98499,9 @@ catalog: value: RA-01c.02[01] class: sp800-53a prose: 'the current risk assessment procedures are reviewed and updated {{ insert: param, ra-01_odp.07 }};' + links: + - href: '#ra-1_smt.c.2' + rel: assessment-for - id: ra-1_obj.c.2-2 name: assessment-objective props: @@ -90272,6 +98509,18 @@ catalog: value: RA-01c.02[02] class: sp800-53a prose: 'the current risk assessment procedures are reviewed and updated following {{ insert: param, ra-01_odp.08 }}.' + links: + - href: '#ra-1_smt.c.2' + rel: assessment-for + links: + - href: '#ra-1_smt.c.2' + rel: assessment-for + links: + - href: '#ra-1_smt.c' + rel: assessment-for + links: + - href: '#ra-1_smt' + rel: assessment-for - id: ra-1_asm-examine name: assessment-method props: @@ -90413,6 +98662,9 @@ catalog: value: RA-02a. class: sp800-53a prose: the system and the information it processes, stores, and transmits are categorized; + links: + - href: '#ra-2_smt.a' + rel: assessment-for - id: ra-2_obj.b name: assessment-objective props: @@ -90420,6 +98672,9 @@ catalog: value: RA-02b. class: sp800-53a prose: the security categorization results, including supporting rationale, are documented in the security plan for the system; + links: + - href: '#ra-2_smt.b' + rel: assessment-for - id: ra-2_obj.c name: assessment-objective props: @@ -90427,6 +98682,12 @@ catalog: value: RA-02c. class: sp800-53a prose: the authorizing official or authorizing official designated representative reviews and approves the security categorization decision. + links: + - href: '#ra-2_smt.c' + rel: assessment-for + links: + - href: '#ra-2_smt' + rel: assessment-for - id: ra-2_asm-examine name: assessment-method props: @@ -90511,6 +98772,9 @@ catalog: value: RA-02(01) class: sp800-53a prose: an impact-level prioritization of organizational systems is conducted to obtain additional granularity on system impact levels. + links: + - href: '#ra-2.1_smt' + rel: assessment-for - id: ra-2.1_asm-examine name: assessment-method props: @@ -90788,6 +99052,9 @@ catalog: value: RA-03a.01 class: sp800-53a prose: a risk assessment is conducted to identify threats to and vulnerabilities in the system; + links: + - href: '#ra-3_smt.a.1' + rel: assessment-for - id: ra-3_obj.a.2 name: assessment-objective props: @@ -90795,6 +99062,9 @@ catalog: value: RA-03a.02 class: sp800-53a prose: a risk assessment is conducted to determine the likelihood and magnitude of harm from unauthorized access, use, disclosure, disruption, modification, or destruction of the system; the information it processes, stores, or transmits; and any related information; + links: + - href: '#ra-3_smt.a.2' + rel: assessment-for - id: ra-3_obj.a.3 name: assessment-objective props: @@ -90802,6 +99072,12 @@ catalog: value: RA-03a.03 class: sp800-53a prose: a risk assessment is conducted to determine the likelihood and impact of adverse effects on individuals arising from the processing of personally identifiable information; + links: + - href: '#ra-3_smt.a.3' + rel: assessment-for + links: + - href: '#ra-3_smt.a' + rel: assessment-for - id: ra-3_obj.b name: assessment-objective props: @@ -90809,6 +99085,9 @@ catalog: value: RA-03b. class: sp800-53a prose: risk assessment results and risk management decisions from the organization and mission or business process perspectives are integrated with system-level risk assessments; + links: + - href: '#ra-3_smt.b' + rel: assessment-for - id: ra-3_obj.c name: assessment-objective props: @@ -90816,6 +99095,9 @@ catalog: value: RA-03c. class: sp800-53a prose: 'risk assessment results are documented in {{ insert: param, ra-03_odp.01 }};' + links: + - href: '#ra-3_smt.c' + rel: assessment-for - id: ra-3_obj.d name: assessment-objective props: @@ -90823,6 +99105,9 @@ catalog: value: RA-03d. class: sp800-53a prose: 'risk assessment results are reviewed {{ insert: param, ra-03_odp.03 }};' + links: + - href: '#ra-3_smt.d' + rel: assessment-for - id: ra-3_obj.e name: assessment-objective props: @@ -90830,6 +99115,9 @@ catalog: value: RA-03e. class: sp800-53a prose: 'risk assessment results are disseminated to {{ insert: param, ra-03_odp.04 }};' + links: + - href: '#ra-3_smt.e' + rel: assessment-for - id: ra-3_obj.f name: assessment-objective props: @@ -90837,6 +99125,12 @@ catalog: value: RA-03f. class: sp800-53a prose: 'the risk assessment is updated {{ insert: param, ra-03_odp.05 }} or when there are significant changes to the system, its environment of operation, or other conditions that may impact the security or privacy state of the system.' + links: + - href: '#ra-3_smt.f' + rel: assessment-for + links: + - href: '#ra-3_smt' + rel: assessment-for - id: ra-3_asm-examine name: assessment-method props: @@ -90985,6 +99279,9 @@ catalog: value: RA-03(01)(a) class: sp800-53a prose: 'supply chain risks associated with {{ insert: param, ra-03.01_odp.01 }} are assessed;' + links: + - href: '#ra-3.1_smt.a' + rel: assessment-for - id: ra-3.1_obj.b name: assessment-objective props: @@ -90992,6 +99289,12 @@ catalog: value: RA-03(01)(b) class: sp800-53a prose: 'the supply chain risk assessment is updated {{ insert: param, ra-03.01_odp.02 }} , when there are significant changes to the relevant supply chain, or when changes to the system, environments of operation, or other conditions may necessitate a change in the supply chain.' + links: + - href: '#ra-3.1_smt.b' + rel: assessment-for + links: + - href: '#ra-3.1_smt' + rel: assessment-for - id: ra-3.1_asm-examine name: assessment-method props: @@ -91095,6 +99398,9 @@ catalog: value: RA-03(02) class: sp800-53a prose: all-source intelligence is used to assist in the analysis of risk. + links: + - href: '#ra-3.2_smt' + rel: assessment-for - id: ra-3.2_asm-examine name: assessment-method props: @@ -91203,6 +99509,9 @@ catalog: value: RA-03(03) class: sp800-53a prose: 'the current cyber threat environment is determined on an ongoing basis using {{ insert: param, ra-03.03_odp }}.' + links: + - href: '#ra-3.3_smt' + rel: assessment-for - id: ra-3.3_asm-examine name: assessment-method props: @@ -91341,6 +99650,9 @@ catalog: value: RA-03(04)[01] class: sp800-53a prose: '{{ insert: param, ra-03.04_odp.01 }} are employed to predict and identify risks to {{ insert: param, ra-03.04_odp.02 }};' + links: + - href: '#ra-3.4_smt' + rel: assessment-for - id: ra-3.4_obj-2 name: assessment-objective props: @@ -91348,6 +99660,12 @@ catalog: value: RA-03(04)[02] class: sp800-53a prose: '{{ insert: param, ra-03.04_odp.03 }} are employed to predict and identify risks to {{ insert: param, ra-03.04_odp.02 }}.' + links: + - href: '#ra-3.4_smt' + rel: assessment-for + links: + - href: '#ra-3.4_smt' + rel: assessment-for - id: ra-3.4_asm-examine name: assessment-method props: @@ -91631,6 +99949,9 @@ catalog: value: RA-05a.[01] class: sp800-53a prose: 'systems and hosted applications are monitored for vulnerabilities {{ insert: param, ra-05_odp.01 }} and when new vulnerabilities potentially affecting the system are identified and reported;' + links: + - href: '#ra-5_smt.a' + rel: assessment-for - id: ra-5_obj.a-2 name: assessment-objective props: @@ -91638,6 +99959,12 @@ catalog: value: RA-05a.[02] class: sp800-53a prose: 'systems and hosted applications are scanned for vulnerabilities {{ insert: param, ra-05_odp.02 }} and when new vulnerabilities potentially affecting the system are identified and reported;' + links: + - href: '#ra-5_smt.a' + rel: assessment-for + links: + - href: '#ra-5_smt.a' + rel: assessment-for - id: ra-5_obj.b name: assessment-objective props: @@ -91653,6 +99980,9 @@ catalog: value: RA-05b.01 class: sp800-53a prose: vulnerability monitoring tools and techniques are employed to automate parts of the vulnerability management process by using standards for enumerating platforms, software flaws, and improper configurations; + links: + - href: '#ra-5_smt.b.1' + rel: assessment-for - id: ra-5_obj.b.2 name: assessment-objective props: @@ -91660,6 +99990,9 @@ catalog: value: RA-05b.02 class: sp800-53a prose: vulnerability monitoring tools and techniques are employed to facilitate interoperability among tools and to automate parts of the vulnerability management process by using standards for formatting checklists and test procedures; + links: + - href: '#ra-5_smt.b.2' + rel: assessment-for - id: ra-5_obj.b.3 name: assessment-objective props: @@ -91667,6 +100000,12 @@ catalog: value: RA-05b.03 class: sp800-53a prose: vulnerability monitoring tools and techniques are employed to facilitate interoperability among tools and to automate parts of the vulnerability management process by using standards for measuring vulnerability impact; + links: + - href: '#ra-5_smt.b.3' + rel: assessment-for + links: + - href: '#ra-5_smt.b' + rel: assessment-for - id: ra-5_obj.c name: assessment-objective props: @@ -91674,6 +100013,9 @@ catalog: value: RA-05c. class: sp800-53a prose: vulnerability scan reports and results from vulnerability monitoring are analyzed; + links: + - href: '#ra-5_smt.c' + rel: assessment-for - id: ra-5_obj.d name: assessment-objective props: @@ -91681,6 +100023,9 @@ catalog: value: RA-05d. class: sp800-53a prose: 'legitimate vulnerabilities are remediated {{ insert: param, ra-05_odp.03 }} in accordance with an organizational assessment of risk;' + links: + - href: '#ra-5_smt.d' + rel: assessment-for - id: ra-5_obj.e name: assessment-objective props: @@ -91688,6 +100033,9 @@ catalog: value: RA-05e. class: sp800-53a prose: 'information obtained from the vulnerability monitoring process and control assessments is shared with {{ insert: param, ra-05_odp.04 }} to help eliminate similar vulnerabilities in other systems;' + links: + - href: '#ra-5_smt.e' + rel: assessment-for - id: ra-5_obj.f name: assessment-objective props: @@ -91695,6 +100043,12 @@ catalog: value: RA-05f. class: sp800-53a prose: vulnerability monitoring tools that include the capability to readily update the vulnerabilities to be scanned are employed. + links: + - href: '#ra-5_smt.f' + rel: assessment-for + links: + - href: '#ra-5_smt' + rel: assessment-for - id: ra-5_asm-examine name: assessment-method props: @@ -91837,6 +100191,9 @@ catalog: value: RA-05(02) class: sp800-53a prose: 'the system vulnerabilities to be scanned are updated {{ insert: param, ra-05.02_odp.01 }}.' + links: + - href: '#ra-5.2_smt' + rel: assessment-for - id: ra-5.2_asm-examine name: assessment-method props: @@ -91930,6 +100287,9 @@ catalog: value: RA-05(03) class: sp800-53a prose: the breadth and depth of vulnerability scanning coverage are defined. + links: + - href: '#ra-5.3_smt' + rel: assessment-for - id: ra-5.3_asm-examine name: assessment-method props: @@ -92043,6 +100403,9 @@ catalog: value: RA-05(04)[01] class: sp800-53a prose: information about the system is discoverable; + links: + - href: '#ra-5.4_smt' + rel: assessment-for - id: ra-5.4_obj-2 name: assessment-objective props: @@ -92050,6 +100413,12 @@ catalog: value: RA-05(04)[02] class: sp800-53a prose: '{{ insert: param, ra-05.04_odp }} are taken when information about the system is confirmed as discoverable.' + links: + - href: '#ra-5.4_smt' + rel: assessment-for + links: + - href: '#ra-5.4_smt' + rel: assessment-for - id: ra-5.4_asm-examine name: assessment-method props: @@ -92180,6 +100549,9 @@ catalog: value: RA-05(05) class: sp800-53a prose: 'privileged access authorization is implemented to {{ insert: param, ra-05.05_odp.01 }} for {{ insert: param, ra-05.05_odp.02 }}.' + links: + - href: '#ra-5.5_smt' + rel: assessment-for - id: ra-5.5_asm-examine name: assessment-method props: @@ -92298,6 +100670,9 @@ catalog: value: RA-05(06) class: sp800-53a prose: 'the results of multiple vulnerability scans are compared using {{ insert: param, ra-05.06_odp }}.' + links: + - href: '#ra-5.6_smt' + rel: assessment-for - id: ra-5.6_asm-examine name: assessment-method props: @@ -92432,6 +100807,9 @@ catalog: value: RA-05(08) class: sp800-53a prose: 'historic audit logs are reviewed to determine if a vulnerability identified in a {{ insert: param, ra-05.08_odp.01 }} has been previously exploited within {{ insert: param, ra-05.08_odp.02 }}.' + links: + - href: '#ra-5.8_smt' + rel: assessment-for - id: ra-5.8_asm-examine name: assessment-method props: @@ -92549,6 +100927,9 @@ catalog: value: RA-05(10) class: sp800-53a prose: the output from vulnerability scanning tools is correlated to determine the presence of multi-vulnerability and multi-hop attack vectors. + links: + - href: '#ra-5.10_smt' + rel: assessment-for - id: ra-5.10_asm-examine name: assessment-method props: @@ -92648,6 +101029,9 @@ catalog: value: RA-05(11) class: sp800-53a prose: a public reporting channel is established for receiving reports of vulnerabilities in organizational systems and system components. + links: + - href: '#ra-5.11_smt' + rel: assessment-for - id: ra-5.11_asm-examine name: assessment-method props: @@ -92787,6 +101171,9 @@ catalog: value: RA-06 class: sp800-53a prose: 'a technical surveillance countermeasures survey is employed at {{ insert: param, ra-06_odp.01 }} {{ insert: param, ra-06_odp.02 }}.' + links: + - href: '#ra-6_smt' + rel: assessment-for - id: ra-6_asm-examine name: assessment-method props: @@ -92905,6 +101292,9 @@ catalog: value: RA-07[01] class: sp800-53a prose: findings from security assessments are responded to in accordance with organizational risk tolerance; + links: + - href: '#ra-7_smt' + rel: assessment-for - id: ra-7_obj-2 name: assessment-objective props: @@ -92912,6 +101302,9 @@ catalog: value: RA-07[02] class: sp800-53a prose: findings from privacy assessments are responded to in accordance with organizational risk tolerance; + links: + - href: '#ra-7_smt' + rel: assessment-for - id: ra-7_obj-3 name: assessment-objective props: @@ -92919,6 +101312,9 @@ catalog: value: RA-07[03] class: sp800-53a prose: findings from monitoring are responded to in accordance with organizational risk tolerance; + links: + - href: '#ra-7_smt' + rel: assessment-for - id: ra-7_obj-4 name: assessment-objective props: @@ -92926,6 +101322,12 @@ catalog: value: RA-07[04] class: sp800-53a prose: findings from audits are responded to in accordance with organizational risk tolerance. + links: + - href: '#ra-7_smt' + rel: assessment-for + links: + - href: '#ra-7_smt' + rel: assessment-for - id: ra-7_asm-examine name: assessment-method props: @@ -93077,6 +101479,9 @@ catalog: value: RA-08a. class: sp800-53a prose: privacy impact assessments are conducted for systems, programs, or other activities before developing or procuring information technology that processes personally identifiable information; + links: + - href: '#ra-8_smt.a' + rel: assessment-for - id: ra-8_obj.b name: assessment-objective props: @@ -93091,6 +101496,9 @@ catalog: value: RA-08b.[01] class: sp800-53a prose: privacy impact assessments are conducted for systems, programs, or other activities before initiating a collection of personally identifiable information that will be processed using information technology; + links: + - href: '#ra-8_smt.b' + rel: assessment-for - id: ra-8_obj.b-2 name: assessment-objective props: @@ -93098,6 +101506,15 @@ catalog: value: RA-08b.[02] class: sp800-53a prose: privacy impact assessments are conducted for systems, programs, or other activities before initiating a collection of personally identifiable information that includes personally identifiable information permitting the physical or virtual (online) contacting of a specific individual, if identical questions have been posed to, or identical reporting requirements imposed on, ten or more individuals, other than agencies, instrumentalities, or employees of the federal government. + links: + - href: '#ra-8_smt.b' + rel: assessment-for + links: + - href: '#ra-8_smt.b' + rel: assessment-for + links: + - href: '#ra-8_smt' + rel: assessment-for - id: ra-8_asm-examine name: assessment-method props: @@ -93238,6 +101655,9 @@ catalog: value: RA-09 class: sp800-53a prose: 'critical system components and functions are identified by performing a criticality analysis for {{ insert: param, ra-09_odp.01 }} at {{ insert: param, ra-09_odp.02 }}.' + links: + - href: '#ra-9_smt' + rel: assessment-for - id: ra-9_asm-examine name: assessment-method props: @@ -93398,6 +101818,9 @@ catalog: value: RA-10a.01 class: sp800-53a prose: a cyber threat capability is established and maintained to search for indicators of compromise in organizational systems; + links: + - href: '#ra-10_smt.a.1' + rel: assessment-for - id: ra-10_obj.a.2 name: assessment-objective props: @@ -93405,6 +101828,12 @@ catalog: value: RA-10a.02 class: sp800-53a prose: a cyber threat capability is established and maintained to detect, track, and disrupt threats that evade existing controls; + links: + - href: '#ra-10_smt.a.2' + rel: assessment-for + links: + - href: '#ra-10_smt.a' + rel: assessment-for - id: ra-10_obj.b name: assessment-objective props: @@ -93412,6 +101841,12 @@ catalog: value: RA-10b. class: sp800-53a prose: 'the threat hunting capability is employed {{ insert: param, ra-10_odp }}.' + links: + - href: '#ra-10_smt.b' + rel: assessment-for + links: + - href: '#ra-10_smt' + rel: assessment-for - id: ra-10_asm-examine name: assessment-method props: @@ -93683,6 +102118,9 @@ catalog: value: SA-01a.[01] class: sp800-53a prose: a system and services acquisition policy is developed and documented; + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.a-2 name: assessment-objective props: @@ -93690,6 +102128,9 @@ catalog: value: SA-01a.[02] class: sp800-53a prose: 'the system and services acquisition policy is disseminated to {{ insert: param, sa-01_odp.01 }};' + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.a-3 name: assessment-objective props: @@ -93697,6 +102138,9 @@ catalog: value: SA-01a.[03] class: sp800-53a prose: system and services acquisition procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls are developed and documented; + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.a-4 name: assessment-objective props: @@ -93704,6 +102148,9 @@ catalog: value: SA-01a.[04] class: sp800-53a prose: 'the system and services acquisition procedures are disseminated to {{ insert: param, sa-01_odp.02 }};' + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.a.1 name: assessment-objective props: @@ -93725,6 +102172,9 @@ catalog: value: SA-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses purpose;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-2 name: assessment-objective props: @@ -93732,6 +102182,9 @@ catalog: value: SA-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses scope;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-3 name: assessment-objective props: @@ -93739,6 +102192,9 @@ catalog: value: SA-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses roles;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-4 name: assessment-objective props: @@ -93746,6 +102202,9 @@ catalog: value: SA-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses responsibilities;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-5 name: assessment-objective props: @@ -93753,6 +102212,9 @@ catalog: value: SA-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses management commitment;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-6 name: assessment-objective props: @@ -93760,6 +102222,9 @@ catalog: value: SA-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses coordination among organizational entities;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.a-7 name: assessment-objective props: @@ -93767,6 +102232,12 @@ catalog: value: SA-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy addresses compliance;' + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#sa-1_smt.a.1.a' + rel: assessment-for - id: sa-1_obj.a.1.b name: assessment-objective props: @@ -93774,6 +102245,15 @@ catalog: value: SA-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.03 }} system and services acquisition policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#sa-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#sa-1_smt.a.1' + rel: assessment-for + links: + - href: '#sa-1_smt.a' + rel: assessment-for - id: sa-1_obj.b name: assessment-objective props: @@ -93781,6 +102261,9 @@ catalog: value: SA-01b. class: sp800-53a prose: 'the {{ insert: param, sa-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the system and services acquisition policy and procedures;' + links: + - href: '#sa-1_smt.b' + rel: assessment-for - id: sa-1_obj.c name: assessment-objective props: @@ -93802,6 +102285,9 @@ catalog: value: SA-01c.01[01] class: sp800-53a prose: 'the system and services acquisition policy is reviewed and updated {{ insert: param, sa-01_odp.05 }};' + links: + - href: '#sa-1_smt.c.1' + rel: assessment-for - id: sa-1_obj.c.1-2 name: assessment-objective props: @@ -93809,6 +102295,12 @@ catalog: value: SA-01c.01[02] class: sp800-53a prose: 'the current system and services acquisition policy is reviewed and updated following {{ insert: param, sa-01_odp.06 }};' + links: + - href: '#sa-1_smt.c.1' + rel: assessment-for + links: + - href: '#sa-1_smt.c.1' + rel: assessment-for - id: sa-1_obj.c.2 name: assessment-objective props: @@ -93823,6 +102315,9 @@ catalog: value: SA-01c.02[01] class: sp800-53a prose: 'the current system and services acquisition procedures are reviewed and updated {{ insert: param, sa-01_odp.07 }};' + links: + - href: '#sa-1_smt.c.2' + rel: assessment-for - id: sa-1_obj.c.2-2 name: assessment-objective props: @@ -93830,6 +102325,18 @@ catalog: value: SA-01c.02[02] class: sp800-53a prose: 'the current system and services acquisition procedures are reviewed and updated following {{ insert: param, sa-01_odp.08 }}.' + links: + - href: '#sa-1_smt.c.2' + rel: assessment-for + links: + - href: '#sa-1_smt.c.2' + rel: assessment-for + links: + - href: '#sa-1_smt.c' + rel: assessment-for + links: + - href: '#sa-1_smt' + rel: assessment-for - id: sa-1_asm-examine name: assessment-method props: @@ -93956,6 +102463,9 @@ catalog: value: SA-02a.[01] class: sp800-53a prose: the high-level information security requirements for the system or system service are determined in mission and business process planning; + links: + - href: '#sa-2_smt.a' + rel: assessment-for - id: sa-2_obj.a-2 name: assessment-objective props: @@ -93963,6 +102473,12 @@ catalog: value: SA-02a.[02] class: sp800-53a prose: the high-level privacy requirements for the system or system service are determined in mission and business process planning; + links: + - href: '#sa-2_smt.a' + rel: assessment-for + links: + - href: '#sa-2_smt.a' + rel: assessment-for - id: sa-2_obj.b name: assessment-objective props: @@ -93977,6 +102493,9 @@ catalog: value: SA-02b.[01] class: sp800-53a prose: the resources required to protect the system or system service are determined and documented as part of the organizational capital planning and investment control process; + links: + - href: '#sa-2_smt.b' + rel: assessment-for - id: sa-2_obj.b-2 name: assessment-objective props: @@ -93984,6 +102503,12 @@ catalog: value: SA-02b.[02] class: sp800-53a prose: the resources required to protect the system or system service are allocated as part of the organizational capital planning and investment control process; + links: + - href: '#sa-2_smt.b' + rel: assessment-for + links: + - href: '#sa-2_smt.b' + rel: assessment-for - id: sa-2_obj.c name: assessment-objective props: @@ -93998,6 +102523,9 @@ catalog: value: SA-02c.[01] class: sp800-53a prose: a discrete line item for information security is established in organizational programming and budgeting documentation; + links: + - href: '#sa-2_smt.c' + rel: assessment-for - id: sa-2_obj.c-2 name: assessment-objective props: @@ -94005,6 +102533,15 @@ catalog: value: SA-02c.[02] class: sp800-53a prose: a discrete line item for privacy is established in organizational programming and budgeting documentation. + links: + - href: '#sa-2_smt.c' + rel: assessment-for + links: + - href: '#sa-2_smt.c' + rel: assessment-for + links: + - href: '#sa-2_smt' + rel: assessment-for - id: sa-2_asm-examine name: assessment-method props: @@ -94197,6 +102734,9 @@ catalog: value: SA-03a.[01] class: sp800-53a prose: 'the system is acquired, developed, and managed using {{ insert: param, sa-03_odp }} that incorporates information security considerations;' + links: + - href: '#sa-3_smt.a' + rel: assessment-for - id: sa-3_obj.a-2 name: assessment-objective props: @@ -94204,6 +102744,12 @@ catalog: value: SA-03a.[02] class: sp800-53a prose: 'the system is acquired, developed, and managed using {{ insert: param, sa-03_odp }} that incorporates privacy considerations;' + links: + - href: '#sa-3_smt.a' + rel: assessment-for + links: + - href: '#sa-3_smt.a' + rel: assessment-for - id: sa-3_obj.b name: assessment-objective props: @@ -94218,6 +102764,9 @@ catalog: value: SA-03b.[01] class: sp800-53a prose: information security roles and responsibilities are defined and documented throughout the system development life cycle; + links: + - href: '#sa-3_smt.b' + rel: assessment-for - id: sa-3_obj.b-2 name: assessment-objective props: @@ -94225,6 +102774,12 @@ catalog: value: SA-03b.[02] class: sp800-53a prose: privacy roles and responsibilities are defined and documented throughout the system development life cycle; + links: + - href: '#sa-3_smt.b' + rel: assessment-for + links: + - href: '#sa-3_smt.b' + rel: assessment-for - id: sa-3_obj.c name: assessment-objective props: @@ -94239,6 +102794,9 @@ catalog: value: SA-03c.[01] class: sp800-53a prose: individuals with information security roles and responsibilities are identified; + links: + - href: '#sa-3_smt.c' + rel: assessment-for - id: sa-3_obj.c-2 name: assessment-objective props: @@ -94246,6 +102804,12 @@ catalog: value: SA-03c.[02] class: sp800-53a prose: individuals with privacy roles and responsibilities are identified; + links: + - href: '#sa-3_smt.c' + rel: assessment-for + links: + - href: '#sa-3_smt.c' + rel: assessment-for - id: sa-3_obj.d name: assessment-objective props: @@ -94260,6 +102824,9 @@ catalog: value: SA-03d.[01] class: sp800-53a prose: organizational information security risk management processes are integrated into system development life cycle activities; + links: + - href: '#sa-3_smt.d' + rel: assessment-for - id: sa-3_obj.d-2 name: assessment-objective props: @@ -94267,6 +102834,15 @@ catalog: value: SA-03d.[02] class: sp800-53a prose: organizational privacy risk management processes are integrated into system development life cycle activities. + links: + - href: '#sa-3_smt.d' + rel: assessment-for + links: + - href: '#sa-3_smt.d' + rel: assessment-for + links: + - href: '#sa-3_smt' + rel: assessment-for - id: sa-3_asm-examine name: assessment-method props: @@ -94385,6 +102961,9 @@ catalog: value: SA-03(01) class: sp800-53a prose: system pre-production environments are protected commensurate with risk throughout the system development life cycle for the system, system component, or system service. + links: + - href: '#sa-3.1_smt' + rel: assessment-for - id: sa-3.1_asm-examine name: assessment-method props: @@ -94512,6 +103091,9 @@ catalog: value: SA-03(02)a.[01] class: sp800-53a prose: the use of live data in pre-production environments is approved for the system, system component, or system service; + links: + - href: '#sa-3.2_smt.a' + rel: assessment-for - id: sa-3.2_obj.a-2 name: assessment-objective props: @@ -94519,6 +103101,9 @@ catalog: value: SA-03(02)a.[02] class: sp800-53a prose: the use of live data in pre-production environments is documented for the system, system component, or system service; + links: + - href: '#sa-3.2_smt.a' + rel: assessment-for - id: sa-3.2_obj.a-3 name: assessment-objective props: @@ -94526,6 +103111,12 @@ catalog: value: SA-03(02)a.[03] class: sp800-53a prose: the use of live data in pre-production environments is controlled for the system, system component, or system service; + links: + - href: '#sa-3.2_smt.a' + rel: assessment-for + links: + - href: '#sa-3.2_smt.a' + rel: assessment-for - id: sa-3.2_obj.b name: assessment-objective props: @@ -94533,6 +103124,12 @@ catalog: value: SA-03(02)b. class: sp800-53a prose: pre-production environments for the system, system component, or system service are protected at the same impact or classification level as any live data in use within the pre-production environments. + links: + - href: '#sa-3.2_smt.b' + rel: assessment-for + links: + - href: '#sa-3.2_smt' + rel: assessment-for - id: sa-3.2_asm-examine name: assessment-method props: @@ -94645,6 +103242,9 @@ catalog: value: SA-03(03)[01] class: sp800-53a prose: a technology refresh schedule is planned for the system throughout the system development life cycle; + links: + - href: '#sa-3.3_smt' + rel: assessment-for - id: sa-3.3_obj-2 name: assessment-objective props: @@ -94652,6 +103252,12 @@ catalog: value: SA-03(03)[02] class: sp800-53a prose: a technology refresh schedule is implemented for the system throughout the system development life cycle. + links: + - href: '#sa-3.3_smt' + rel: assessment-for + links: + - href: '#sa-3.3_smt' + rel: assessment-for - id: sa-3.3_asm-examine name: assessment-method props: @@ -94918,6 +103524,9 @@ catalog: value: SA-04a.[01] class: sp800-53a prose: 'security functional requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.a' + rel: assessment-for - id: sa-4_obj.a-2 name: assessment-objective props: @@ -94925,6 +103534,12 @@ catalog: value: SA-04a.[02] class: sp800-53a prose: 'privacy functional requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.a' + rel: assessment-for + links: + - href: '#sa-4_smt.a' + rel: assessment-for - id: sa-4_obj.b name: assessment-objective props: @@ -94932,6 +103547,9 @@ catalog: value: SA-04b. class: sp800-53a prose: 'strength of mechanism requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.b' + rel: assessment-for - id: sa-4_obj.c name: assessment-objective props: @@ -94946,6 +103564,9 @@ catalog: value: SA-04c.[01] class: sp800-53a prose: 'security assurance requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.c' + rel: assessment-for - id: sa-4_obj.c-2 name: assessment-objective props: @@ -94953,6 +103574,12 @@ catalog: value: SA-04c.[02] class: sp800-53a prose: 'privacy assurance requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.c' + rel: assessment-for + links: + - href: '#sa-4_smt.c' + rel: assessment-for - id: sa-4_obj.d name: assessment-objective props: @@ -94967,6 +103594,9 @@ catalog: value: SA-04d.[01] class: sp800-53a prose: 'controls needed to satisfy the security requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.d' + rel: assessment-for - id: sa-4_obj.d-2 name: assessment-objective props: @@ -94974,6 +103604,12 @@ catalog: value: SA-04d.[02] class: sp800-53a prose: 'controls needed to satisfy the privacy requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.d' + rel: assessment-for + links: + - href: '#sa-4_smt.d' + rel: assessment-for - id: sa-4_obj.e name: assessment-objective props: @@ -94988,6 +103624,9 @@ catalog: value: SA-04e.[01] class: sp800-53a prose: 'security documentation requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.e' + rel: assessment-for - id: sa-4_obj.e-2 name: assessment-objective props: @@ -94995,6 +103634,12 @@ catalog: value: SA-04e.[02] class: sp800-53a prose: 'privacy documentation requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.e' + rel: assessment-for + links: + - href: '#sa-4_smt.e' + rel: assessment-for - id: sa-4_obj.f name: assessment-objective props: @@ -95009,6 +103654,9 @@ catalog: value: SA-04f.[01] class: sp800-53a prose: 'requirements for protecting security documentation, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.f' + rel: assessment-for - id: sa-4_obj.f-2 name: assessment-objective props: @@ -95016,6 +103664,12 @@ catalog: value: SA-04f.[02] class: sp800-53a prose: 'requirements for protecting privacy documentation, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.f' + rel: assessment-for + links: + - href: '#sa-4_smt.f' + rel: assessment-for - id: sa-4_obj.g name: assessment-objective props: @@ -95023,6 +103677,9 @@ catalog: value: SA-04g. class: sp800-53a prose: 'the description of the system development environment and environment in which the system is intended to operate, requirements, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.g' + rel: assessment-for - id: sa-4_obj.h name: assessment-objective props: @@ -95037,6 +103694,9 @@ catalog: value: SA-04h.[01] class: sp800-53a prose: 'the allocation of responsibility or identification of parties responsible for information security requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service;' + links: + - href: '#sa-4_smt.h' + rel: assessment-for - id: sa-4_obj.h-2 name: assessment-objective props: @@ -95044,6 +103704,9 @@ catalog: value: SA-04h.[02] class: sp800-53a prose: 'the allocation of responsibility or identification of parties responsible for privacy requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }};' + links: + - href: '#sa-4_smt.h' + rel: assessment-for - id: sa-4_obj.h-3 name: assessment-objective props: @@ -95051,6 +103714,12 @@ catalog: value: SA-04h.[03] class: sp800-53a prose: 'the allocation of responsibility or identification of parties responsible for supply chain risk management requirements, descriptions, and criteria are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }};' + links: + - href: '#sa-4_smt.h' + rel: assessment-for + links: + - href: '#sa-4_smt.h' + rel: assessment-for - id: sa-4_obj.i name: assessment-objective props: @@ -95058,6 +103727,12 @@ catalog: value: SA-04i. class: sp800-53a prose: 'acceptance criteria requirements and descriptions are included explicitly or by reference using {{ insert: param, sa-04_odp.01 }} in the acquisition contract for the system, system component, or system service.' + links: + - href: '#sa-4_smt.i' + rel: assessment-for + links: + - href: '#sa-4_smt' + rel: assessment-for - id: sa-4_asm-examine name: assessment-method props: @@ -95160,6 +103835,9 @@ catalog: value: SA-04(01) class: sp800-53a prose: the developer of the system, system component, or system service is required to provide a description of the functional properties of the controls to be implemented. + links: + - href: '#sa-4.1_smt' + rel: assessment-for - id: sa-4.1_asm-examine name: assessment-method props: @@ -95293,6 +103971,9 @@ catalog: value: SA-04(02) class: sp800-53a prose: 'the developer of the system, system component, or system service is required to provide design and implementation information for the controls that includes using {{ insert: param, sa-04.02_odp.01 }} at {{ insert: param, sa-04.02_odp.03 }}.' + links: + - href: '#sa-4.2_smt' + rel: assessment-for - id: sa-4.2_asm-examine name: assessment-method props: @@ -95500,6 +104181,9 @@ catalog: value: SA-04(03)(a) class: sp800-53a prose: 'the developer of the system, system component, or system service is required to demonstrate the use of a system development life cycle process that includes {{ insert: param, sa-04.03_odp.01 }};' + links: + - href: '#sa-4.3_smt.a' + rel: assessment-for - id: sa-4.3_obj.b name: assessment-objective props: @@ -95507,6 +104191,9 @@ catalog: value: SA-04(03)(b) class: sp800-53a prose: 'the developer of the system, system component, or system service is required to demonstrate the use of a system development life cycle process that includes {{ insert: param, sa-04.03_odp.02 }};' + links: + - href: '#sa-4.3_smt.b' + rel: assessment-for - id: sa-4.3_obj.c name: assessment-objective props: @@ -95514,6 +104201,12 @@ catalog: value: SA-04(03)(c) class: sp800-53a prose: 'the developer of the system, system component, or system service is required to demonstrate the use of a system development life cycle process that includes {{ insert: param, sa-04.03_odp.05 }}.' + links: + - href: '#sa-4.3_smt.c' + rel: assessment-for + links: + - href: '#sa-4.3_smt' + rel: assessment-for - id: sa-4.3_asm-examine name: assessment-method props: @@ -95663,6 +104356,9 @@ catalog: value: SA-04(05)(a) class: sp800-53a prose: 'the developer of the system, system component, or system service is required to deliver the system, component, or service with {{ insert: param, sa-04.05_odp }} implemented;' + links: + - href: '#sa-4.5_smt.a' + rel: assessment-for - id: sa-4.5_obj.b name: assessment-objective props: @@ -95670,6 +104366,12 @@ catalog: value: SA-04(05)(b) class: sp800-53a prose: the configurations are used as the default for any subsequent system, component, or service reinstallation or upgrade. + links: + - href: '#sa-4.5_smt.b' + rel: assessment-for + links: + - href: '#sa-4.5_smt' + rel: assessment-for - id: sa-4.5_asm-examine name: assessment-method props: @@ -95789,6 +104491,9 @@ catalog: value: SA-04(06)(a) class: sp800-53a prose: only government off-the-shelf or commercial off-the-shelf information assurance and information assurance-enabled information technology products that compose an NSA-approved solution to protect classified information when the networks used to transmit the information are at a lower classification level than the information being transmitted are employed; + links: + - href: '#sa-4.6_smt.a' + rel: assessment-for - id: sa-4.6_obj.b name: assessment-objective props: @@ -95796,6 +104501,12 @@ catalog: value: SA-04(06)(b) class: sp800-53a prose: these products have been evaluated and/or validated by NSA or in accordance with NSA-approved procedures. + links: + - href: '#sa-4.6_smt.b' + rel: assessment-for + links: + - href: '#sa-4.6_smt' + rel: assessment-for - id: sa-4.6_asm-examine name: assessment-method props: @@ -95921,6 +104632,9 @@ catalog: value: SA-04(07)(a) class: sp800-53a prose: the use of commercially provided information assurance and information assurance-enabled information technology products is limited to those products that have been successfully evaluated against a National Information Assurance partnership (NIAP)-approved Protection Profile for a specific technology type, if such a profile exists; + links: + - href: '#sa-4.7_smt.a' + rel: assessment-for - id: sa-4.7_obj.b name: assessment-objective props: @@ -95928,6 +104642,12 @@ catalog: value: SA-04(07)(b) class: sp800-53a prose: if no NIAP-approved Protection Profile exists for a specific technology type but a commercially provided information technology product relies on cryptographic functionality to enforce its security policy, that cryptographic module is required to be FIPS-validated or NSA-approved. + links: + - href: '#sa-4.7_smt.b' + rel: assessment-for + links: + - href: '#sa-4.7_smt' + rel: assessment-for - id: sa-4.7_asm-examine name: assessment-method props: @@ -96028,6 +104748,9 @@ catalog: value: SA-04(08) class: sp800-53a prose: the developer of the system, system component, or system service is required to produce a plan for the continuous monitoring of control effectiveness that is consistent with the continuous monitoring program of the organization. + links: + - href: '#sa-4.8_smt' + rel: assessment-for - id: sa-4.8_asm-examine name: assessment-method props: @@ -96140,6 +104863,9 @@ catalog: value: SA-04(09)[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to identify the functions intended for organizational use; + links: + - href: '#sa-4.9_smt' + rel: assessment-for - id: sa-4.9_obj-2 name: assessment-objective props: @@ -96147,6 +104873,9 @@ catalog: value: SA-04(09)[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to identify the ports intended for organizational use; + links: + - href: '#sa-4.9_smt' + rel: assessment-for - id: sa-4.9_obj-3 name: assessment-objective props: @@ -96154,6 +104883,9 @@ catalog: value: SA-04(09)[03] class: sp800-53a prose: the developer of the system, system component, or system service is required to identify the protocols intended for organizational use; + links: + - href: '#sa-4.9_smt' + rel: assessment-for - id: sa-4.9_obj-4 name: assessment-objective props: @@ -96161,6 +104893,12 @@ catalog: value: SA-04(09)[04] class: sp800-53a prose: the developer of the system, system component, or system service is required to identify the services intended for organizational use. + links: + - href: '#sa-4.9_smt' + rel: assessment-for + links: + - href: '#sa-4.9_smt' + rel: assessment-for - id: sa-4.9_asm-examine name: assessment-method props: @@ -96257,6 +104995,9 @@ catalog: value: SA-04(10) class: sp800-53a prose: only information technology products on the FIPS 201-approved products list for the Personal Identity Verification (PIV) capability implemented within organizational systems are employed. + links: + - href: '#sa-4.10_smt' + rel: assessment-for - id: sa-4.10_asm-examine name: assessment-method props: @@ -96366,6 +105107,9 @@ catalog: value: SA-04(11) class: sp800-53a prose: '{{ insert: param, sa-04.11_odp }} are defined in the acquisition contract for the operation of a system of records on behalf of an organization to accomplish an organizational mission or function.' + links: + - href: '#sa-4.11_smt' + rel: assessment-for - id: sa-4.11_asm-examine name: assessment-method props: @@ -96499,6 +105243,9 @@ catalog: value: SA-04(12)(a) class: sp800-53a prose: organizational data ownership requirements are included in the acquisition contract; + links: + - href: '#sa-4.12_smt.a' + rel: assessment-for - id: sa-4.12_obj.b name: assessment-objective props: @@ -96506,6 +105253,12 @@ catalog: value: SA-04(12)(b) class: sp800-53a prose: 'all data to be removed from the contractor’s system and returned to the organization is required within {{ insert: param, sa-04.12_odp }}.' + links: + - href: '#sa-4.12_smt.b' + rel: assessment-for + links: + - href: '#sa-4.12_smt' + rel: assessment-for - id: sa-4.12_asm-examine name: assessment-method props: @@ -96759,6 +105512,9 @@ catalog: value: SA-05a.01[01] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the secure configuration of the system, component, or service is obtained or developed; + links: + - href: '#sa-5_smt.a.1' + rel: assessment-for - id: sa-5_obj.a.1-2 name: assessment-objective props: @@ -96766,6 +105522,9 @@ catalog: value: SA-05a.01[02] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the secure installation of the system, component, or service is obtained or developed; + links: + - href: '#sa-5_smt.a.1' + rel: assessment-for - id: sa-5_obj.a.1-3 name: assessment-objective props: @@ -96773,6 +105532,12 @@ catalog: value: SA-05a.01[03] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the secure operation of the system, component, or service is obtained or developed; + links: + - href: '#sa-5_smt.a.1' + rel: assessment-for + links: + - href: '#sa-5_smt.a.1' + rel: assessment-for - id: sa-5_obj.a.2 name: assessment-objective props: @@ -96787,6 +105552,9 @@ catalog: value: SA-05a.02[01] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the effective use of security functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.a.2' + rel: assessment-for - id: sa-5_obj.a.2-2 name: assessment-objective props: @@ -96794,6 +105562,9 @@ catalog: value: SA-05a.02[02] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the effective maintenance of security functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.a.2' + rel: assessment-for - id: sa-5_obj.a.2-3 name: assessment-objective props: @@ -96801,6 +105572,9 @@ catalog: value: SA-05a.02[03] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the effective use of privacy functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.a.2' + rel: assessment-for - id: sa-5_obj.a.2-4 name: assessment-objective props: @@ -96808,6 +105582,12 @@ catalog: value: SA-05a.02[04] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes the effective maintenance of privacy functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.a.2' + rel: assessment-for + links: + - href: '#sa-5_smt.a.2' + rel: assessment-for - id: sa-5_obj.a.3 name: assessment-objective props: @@ -96822,6 +105602,9 @@ catalog: value: SA-05a.03[01] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes known vulnerabilities regarding the configuration of administrative or privileged functions is obtained or developed; + links: + - href: '#sa-5_smt.a.3' + rel: assessment-for - id: sa-5_obj.a.3-2 name: assessment-objective props: @@ -96829,6 +105612,15 @@ catalog: value: SA-05a.03[02] class: sp800-53a prose: administrator documentation for the system, system component, or system service that describes known vulnerabilities regarding the use of administrative or privileged functions is obtained or developed; + links: + - href: '#sa-5_smt.a.3' + rel: assessment-for + links: + - href: '#sa-5_smt.a.3' + rel: assessment-for + links: + - href: '#sa-5_smt.a' + rel: assessment-for - id: sa-5_obj.b name: assessment-objective props: @@ -96850,6 +105642,9 @@ catalog: value: SA-05b.01[01] class: sp800-53a prose: user documentation for the system, system component, or system service that describes user-accessible security functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.b.1' + rel: assessment-for - id: sa-5_obj.b.1-2 name: assessment-objective props: @@ -96857,6 +105652,9 @@ catalog: value: SA-05b.01[02] class: sp800-53a prose: user documentation for the system, system component, or system service that describes how to effectively use those (user-accessible security) functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.b.1' + rel: assessment-for - id: sa-5_obj.b.1-3 name: assessment-objective props: @@ -96864,6 +105662,9 @@ catalog: value: SA-05b.01[03] class: sp800-53a prose: user documentation for the system, system component, or system service that describes user-accessible privacy functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.b.1' + rel: assessment-for - id: sa-5_obj.b.1-4 name: assessment-objective props: @@ -96871,6 +105672,12 @@ catalog: value: SA-05b.01[04] class: sp800-53a prose: user documentation for the system, system component, or system service that describes how to effectively use those (user-accessible privacy) functions and mechanisms is obtained or developed; + links: + - href: '#sa-5_smt.b.1' + rel: assessment-for + links: + - href: '#sa-5_smt.b.1' + rel: assessment-for - id: sa-5_obj.b.2 name: assessment-objective props: @@ -96885,6 +105692,9 @@ catalog: value: SA-05b.02[01] class: sp800-53a prose: user documentation for the system, system component, or system service that describes methods for user interaction, which enable individuals to use the system, component, or service in a more secure manner is obtained or developed; + links: + - href: '#sa-5_smt.b.2' + rel: assessment-for - id: sa-5_obj.b.2-2 name: assessment-objective props: @@ -96892,6 +105702,12 @@ catalog: value: SA-05b.02[02] class: sp800-53a prose: user documentation for the system, system component, or system service that describes methods for user interaction, which enable individuals to use the system, component, or service to protect individual privacy is obtained or developed; + links: + - href: '#sa-5_smt.b.2' + rel: assessment-for + links: + - href: '#sa-5_smt.b.2' + rel: assessment-for - id: sa-5_obj.b.3 name: assessment-objective props: @@ -96906,6 +105722,9 @@ catalog: value: SA-05b.03[01] class: sp800-53a prose: user documentation for the system, system component, or system service that describes user responsibilities for maintaining the security of the system, component, or service is obtained or developed; + links: + - href: '#sa-5_smt.b.3' + rel: assessment-for - id: sa-5_obj.b.3-2 name: assessment-objective props: @@ -96913,6 +105732,15 @@ catalog: value: SA-05b.03[02] class: sp800-53a prose: user documentation for the system, system component, or system service that describes user responsibilities for maintaining the privacy of individuals is obtained or developed; + links: + - href: '#sa-5_smt.b.3' + rel: assessment-for + links: + - href: '#sa-5_smt.b.3' + rel: assessment-for + links: + - href: '#sa-5_smt.b' + rel: assessment-for - id: sa-5_obj.c name: assessment-objective props: @@ -96927,6 +105755,9 @@ catalog: value: SA-05c.[01] class: sp800-53a prose: attempts to obtain system, system component, or system service documentation when such documentation is either unavailable or nonexistent is documented; + links: + - href: '#sa-5_smt.c' + rel: assessment-for - id: sa-5_obj.c-2 name: assessment-objective props: @@ -96934,6 +105765,12 @@ catalog: value: SA-05c.[02] class: sp800-53a prose: 'after attempts to obtain system, system component, or system service documentation when such documentation is either unavailable or nonexistent, {{ insert: param, sa-05_odp.01 }} are taken in response;' + links: + - href: '#sa-5_smt.c' + rel: assessment-for + links: + - href: '#sa-5_smt.c' + rel: assessment-for - id: sa-5_obj.d name: assessment-objective props: @@ -96941,6 +105778,12 @@ catalog: value: SA-05d. class: sp800-53a prose: 'documentation is distributed to {{ insert: param, sa-05_odp.02 }}.' + links: + - href: '#sa-5_smt.d' + rel: assessment-for + links: + - href: '#sa-5_smt' + rel: assessment-for - id: sa-5_asm-examine name: assessment-method props: @@ -97254,6 +106097,9 @@ catalog: value: SA-08[01] class: sp800-53a prose: '{{ insert: param, sa-08_odp.01 }} are applied in the specification of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-2 name: assessment-objective props: @@ -97261,6 +106107,9 @@ catalog: value: SA-08[02] class: sp800-53a prose: '{{ insert: param, sa-08_odp.01 }} are applied in the design of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-3 name: assessment-objective props: @@ -97268,6 +106117,9 @@ catalog: value: SA-08[03] class: sp800-53a prose: '{{ insert: param, sa-08_odp.01 }} are applied in the development of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-4 name: assessment-objective props: @@ -97275,6 +106127,9 @@ catalog: value: SA-08[04] class: sp800-53a prose: '{{ insert: param, sa-08_odp.01 }} are applied in the implementation of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-5 name: assessment-objective props: @@ -97282,6 +106137,9 @@ catalog: value: SA-08[05] class: sp800-53a prose: '{{ insert: param, sa-08_odp.01 }} are applied in the modification of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-6 name: assessment-objective props: @@ -97289,6 +106147,9 @@ catalog: value: SA-08[06] class: sp800-53a prose: '{{ insert: param, sa-08_odp.02 }} are applied in the specification of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-7 name: assessment-objective props: @@ -97296,6 +106157,9 @@ catalog: value: SA-08[07] class: sp800-53a prose: '{{ insert: param, sa-08_odp.02 }} are applied in the design of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-8 name: assessment-objective props: @@ -97303,6 +106167,9 @@ catalog: value: SA-08[08] class: sp800-53a prose: '{{ insert: param, sa-08_odp.02 }} are applied in the development of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-9 name: assessment-objective props: @@ -97310,6 +106177,9 @@ catalog: value: SA-08[09] class: sp800-53a prose: '{{ insert: param, sa-08_odp.02 }} are applied in the implementation of the system and system components;' + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_obj-10 name: assessment-objective props: @@ -97317,6 +106187,12 @@ catalog: value: SA-08[10] class: sp800-53a prose: '{{ insert: param, sa-08_odp.02 }} are applied in the modification of the system and system components.' + links: + - href: '#sa-8_smt' + rel: assessment-for + links: + - href: '#sa-8_smt' + rel: assessment-for - id: sa-8_asm-examine name: assessment-method props: @@ -97422,6 +106298,9 @@ catalog: value: SA-08(01) class: sp800-53a prose: the security design principle of clear abstractions is implemented. + links: + - href: '#sa-8.1_smt' + rel: assessment-for - id: sa-8.1_asm-examine name: assessment-method props: @@ -97529,6 +106408,9 @@ catalog: value: SA-08(02) class: sp800-53a prose: '{{ insert: param, sa-08.02_odp }} implement the security design principle of least common mechanism.' + links: + - href: '#sa-8.2_smt' + rel: assessment-for - id: sa-8.2_asm-examine name: assessment-method props: @@ -97662,6 +106544,9 @@ catalog: value: SA-08(03)[01] class: sp800-53a prose: '{{ insert: param, sa-08.03_odp.01 }} implement the security design principle of modularity;' + links: + - href: '#sa-8.3_smt' + rel: assessment-for - id: sa-8.3_obj-2 name: assessment-objective props: @@ -97669,6 +106554,12 @@ catalog: value: SA-08(03)[02] class: sp800-53a prose: '{{ insert: param, sa-08.03_odp.02 }} implement the security design principle of layering.' + links: + - href: '#sa-8.3_smt' + rel: assessment-for + links: + - href: '#sa-8.3_smt' + rel: assessment-for - id: sa-8.3_asm-examine name: assessment-method props: @@ -97778,6 +106669,9 @@ catalog: value: SA-08(04) class: sp800-53a prose: '{{ insert: param, sa-08.04_odp }} implement the security design principle of partially ordered dependencies.' + links: + - href: '#sa-8.4_smt' + rel: assessment-for - id: sa-8.4_asm-examine name: assessment-method props: @@ -97887,6 +106781,9 @@ catalog: value: SA-08(05) class: sp800-53a prose: '{{ insert: param, sa-08.05_odp }} implement the security design principle of efficiently mediated access.' + links: + - href: '#sa-8.5_smt' + rel: assessment-for - id: sa-8.5_asm-examine name: assessment-method props: @@ -97998,6 +106895,9 @@ catalog: value: SA-08(06) class: sp800-53a prose: '{{ insert: param, sa-08.06_odp }} implement the security design principle of minimized sharing.' + links: + - href: '#sa-8.6_smt' + rel: assessment-for - id: sa-8.6_asm-examine name: assessment-method props: @@ -98105,6 +107005,9 @@ catalog: value: SA-08(07) class: sp800-53a prose: '{{ insert: param, sa-08.07_odp }} implement the security design principle of reduced complexity.' + links: + - href: '#sa-8.7_smt' + rel: assessment-for - id: sa-8.7_asm-examine name: assessment-method props: @@ -98214,6 +107117,9 @@ catalog: value: SA-08(08) class: sp800-53a prose: '{{ insert: param, sa-08.08_odp }} implement the security design principle of secure evolvability.' + links: + - href: '#sa-8.8_smt' + rel: assessment-for - id: sa-8.8_asm-examine name: assessment-method props: @@ -98324,6 +107230,9 @@ catalog: value: SA-08(09) class: sp800-53a prose: '{{ insert: param, sa-08.09_odp }} implement the security design principle of trusted components.' + links: + - href: '#sa-8.9_smt' + rel: assessment-for - id: sa-8.9_asm-examine name: assessment-method props: @@ -98437,6 +107346,9 @@ catalog: value: SA-08(10) class: sp800-53a prose: '{{ insert: param, sa-08.10_odp }} implement the security design principle of hierarchical trust.' + links: + - href: '#sa-8.10_smt' + rel: assessment-for - id: sa-8.10_asm-examine name: assessment-method props: @@ -98544,6 +107456,9 @@ catalog: value: SA-08(11) class: sp800-53a prose: '{{ insert: param, sa-08.11_odp }} implement the security design principle of inverse modification threshold.' + links: + - href: '#sa-8.11_smt' + rel: assessment-for - id: sa-8.11_asm-examine name: assessment-method props: @@ -98651,6 +107566,9 @@ catalog: value: SA-08(12) class: sp800-53a prose: '{{ insert: param, sa-08.12_odp }} implement the security design principle of hierarchical protection.' + links: + - href: '#sa-8.12_smt' + rel: assessment-for - id: sa-8.12_asm-examine name: assessment-method props: @@ -98758,6 +107676,9 @@ catalog: value: SA-08(13) class: sp800-53a prose: '{{ insert: param, sa-08.13_odp }} implement the security design principle of minimized security elements.' + links: + - href: '#sa-8.13_smt' + rel: assessment-for - id: sa-8.13_asm-examine name: assessment-method props: @@ -98872,6 +107793,9 @@ catalog: value: SA-08(14) class: sp800-53a prose: '{{ insert: param, sa-08.14_odp }} implement the security design principle of least privilege.' + links: + - href: '#sa-8.14_smt' + rel: assessment-for - id: sa-8.14_asm-examine name: assessment-method props: @@ -98981,6 +107905,9 @@ catalog: value: SA-08(15) class: sp800-53a prose: '{{ insert: param, sa-08.15_odp }} implement the security design principle of predicate permission.' + links: + - href: '#sa-8.15_smt' + rel: assessment-for - id: sa-8.15_asm-examine name: assessment-method props: @@ -99088,6 +108015,9 @@ catalog: value: SA-08(16) class: sp800-53a prose: '{{ insert: param, sa-08.16_odp }} implement the security design principle of self-reliant trustworthiness.' + links: + - href: '#sa-8.16_smt' + rel: assessment-for - id: sa-8.16_asm-examine name: assessment-method props: @@ -99195,6 +108125,9 @@ catalog: value: SA-08(17) class: sp800-53a prose: '{{ insert: param, sa-08.17_odp }} implement the security design principle of secure distributed composition.' + links: + - href: '#sa-8.17_smt' + rel: assessment-for - id: sa-8.17_asm-examine name: assessment-method props: @@ -99308,6 +108241,9 @@ catalog: value: SA-08(18) class: sp800-53a prose: '{{ insert: param, sa-08.18_odp }} implement the security design principle of trusted communications channels.' + links: + - href: '#sa-8.18_smt' + rel: assessment-for - id: sa-8.18_asm-examine name: assessment-method props: @@ -99420,6 +108356,9 @@ catalog: value: SA-08(19) class: sp800-53a prose: '{{ insert: param, sa-08.19_odp }} implement the security design principle of continuous protection.' + links: + - href: '#sa-8.19_smt' + rel: assessment-for - id: sa-8.19_asm-examine name: assessment-method props: @@ -99548,6 +108487,9 @@ catalog: value: SA-08(20) class: sp800-53a prose: '{{ insert: param, sa-08.20_odp }} implement the security design principle of secure metadata management.' + links: + - href: '#sa-8.20_smt' + rel: assessment-for - id: sa-8.20_asm-examine name: assessment-method props: @@ -99657,6 +108599,9 @@ catalog: value: SA-08(21) class: sp800-53a prose: '{{ insert: param, sa-08.21_odp }} implement the security design principle of self-analysis.' + links: + - href: '#sa-8.21_smt' + rel: assessment-for - id: sa-8.21_asm-examine name: assessment-method props: @@ -99804,6 +108749,9 @@ catalog: value: SA-08(22)[01] class: sp800-53a prose: '{{ insert: param, sa-08.22_odp.01 }} implement the security design principle of accountability;' + links: + - href: '#sa-8.22_smt' + rel: assessment-for - id: sa-8.22_obj-2 name: assessment-objective props: @@ -99811,6 +108759,12 @@ catalog: value: SA-08(22)[02] class: sp800-53a prose: '{{ insert: param, sa-08.22_odp.02 }} implement the security design principle of traceability.' + links: + - href: '#sa-8.22_smt' + rel: assessment-for + links: + - href: '#sa-8.22_smt' + rel: assessment-for - id: sa-8.22_asm-examine name: assessment-method props: @@ -99953,6 +108907,9 @@ catalog: value: SA-08(23) class: sp800-53a prose: '{{ insert: param, sa-08.23_odp }} implement the security design principle of secure defaults.' + links: + - href: '#sa-8.23_smt' + rel: assessment-for - id: sa-8.23_asm-examine name: assessment-method props: @@ -100119,6 +109076,9 @@ catalog: value: SA-08(24)[01] class: sp800-53a prose: '{{ insert: param, sa-08.24_odp.01 }} implement the security design principle of secure failure;' + links: + - href: '#sa-8.24_smt' + rel: assessment-for - id: sa-8.24_obj-2 name: assessment-objective props: @@ -100126,6 +109086,12 @@ catalog: value: SA-08(24)[02] class: sp800-53a prose: '{{ insert: param, sa-08.24_odp.02 }} implement the security design principle of secure recovery.' + links: + - href: '#sa-8.24_smt' + rel: assessment-for + links: + - href: '#sa-8.24_smt' + rel: assessment-for - id: sa-8.24_asm-examine name: assessment-method props: @@ -100267,6 +109233,9 @@ catalog: value: SA-08(25) class: sp800-53a prose: '{{ insert: param, sa-08.25_odp }} implement the security design principle of economic security.' + links: + - href: '#sa-8.25_smt' + rel: assessment-for - id: sa-8.25_asm-examine name: assessment-method props: @@ -100387,6 +109356,9 @@ catalog: value: SA-08(26) class: sp800-53a prose: '{{ insert: param, sa-08.26_odp }} implement the security design principle of performance security.' + links: + - href: '#sa-8.26_smt' + rel: assessment-for - id: sa-8.26_asm-examine name: assessment-method props: @@ -100496,6 +109468,9 @@ catalog: value: SA-08(27) class: sp800-53a prose: '{{ insert: param, sa-08.27_odp }} implement the security design principle of human factored security.' + links: + - href: '#sa-8.27_smt' + rel: assessment-for - id: sa-8.27_asm-examine name: assessment-method props: @@ -100609,6 +109584,9 @@ catalog: value: SA-08(28) class: sp800-53a prose: '{{ insert: param, sa-08.28_odp }} implement the security design principle of acceptable security.' + links: + - href: '#sa-8.28_smt' + rel: assessment-for - id: sa-8.28_asm-examine name: assessment-method props: @@ -100744,6 +109722,9 @@ catalog: value: SA-08(29) class: sp800-53a prose: '{{ insert: param, sa-08.29_odp }} implement the security design principle of repeatable and documented procedures.' + links: + - href: '#sa-8.29_smt' + rel: assessment-for - id: sa-8.29_asm-examine name: assessment-method props: @@ -100858,6 +109839,9 @@ catalog: value: SA-08(30) class: sp800-53a prose: '{{ insert: param, sa-08.30_odp }} implement the security design principle of procedural rigor.' + links: + - href: '#sa-8.30_smt' + rel: assessment-for - id: sa-8.30_asm-examine name: assessment-method props: @@ -100971,6 +109955,9 @@ catalog: value: SA-08(31) class: sp800-53a prose: '{{ insert: param, sa-08.31_odp }} implement the security design principle of secure system modification.' + links: + - href: '#sa-8.31_smt' + rel: assessment-for - id: sa-8.31_asm-examine name: assessment-method props: @@ -101096,6 +110083,9 @@ catalog: value: SA-08(32) class: sp800-53a prose: '{{ insert: param, sa-08.32_odp }} implement the security design principle of sufficient documentation.' + links: + - href: '#sa-8.32_smt' + rel: assessment-for - id: sa-8.32_asm-examine name: assessment-method props: @@ -101223,6 +110213,9 @@ catalog: value: SA-08(33) class: sp800-53a prose: 'the privacy principle of minimization is implemented using {{ insert: param, sa-08.33_odp }}.' + links: + - href: '#sa-8.33_smt' + rel: assessment-for - id: sa-8.33_asm-examine name: assessment-method props: @@ -101419,6 +110412,9 @@ catalog: value: SA-09a.[01] class: sp800-53a prose: providers of external system services comply with organizational security requirements; + links: + - href: '#sa-9_smt.a' + rel: assessment-for - id: sa-9_obj.a-2 name: assessment-objective props: @@ -101426,6 +110422,9 @@ catalog: value: SA-09a.[02] class: sp800-53a prose: providers of external system services comply with organizational privacy requirements; + links: + - href: '#sa-9_smt.a' + rel: assessment-for - id: sa-9_obj.a-3 name: assessment-objective props: @@ -101433,6 +110432,12 @@ catalog: value: SA-09a.[03] class: sp800-53a prose: 'providers of external system services employ {{ insert: param, sa-09_odp.01 }};' + links: + - href: '#sa-9_smt.a' + rel: assessment-for + links: + - href: '#sa-9_smt.a' + rel: assessment-for - id: sa-9_obj.b name: assessment-objective props: @@ -101447,6 +110452,9 @@ catalog: value: SA-09b.[01] class: sp800-53a prose: organizational oversight with regard to external system services are defined and documented; + links: + - href: '#sa-9_smt.b' + rel: assessment-for - id: sa-9_obj.b-2 name: assessment-objective props: @@ -101454,6 +110462,12 @@ catalog: value: SA-09b.[02] class: sp800-53a prose: user roles and responsibilities with regard to external system services are defined and documented; + links: + - href: '#sa-9_smt.b' + rel: assessment-for + links: + - href: '#sa-9_smt.b' + rel: assessment-for - id: sa-9_obj.c name: assessment-objective props: @@ -101461,6 +110475,12 @@ catalog: value: SA-09c. class: sp800-53a prose: '{{ insert: param, sa-09_odp.02 }} are employed to monitor control compliance by external service providers on an ongoing basis.' + links: + - href: '#sa-9_smt.c' + rel: assessment-for + links: + - href: '#sa-9_smt' + rel: assessment-for - id: sa-9_asm-examine name: assessment-method props: @@ -101605,6 +110625,9 @@ catalog: value: SA-09(01)(a) class: sp800-53a prose: an organizational assessment of risk is conducted prior to the acquisition or outsourcing of information security services; + links: + - href: '#sa-9.1_smt.a' + rel: assessment-for - id: sa-9.1_obj.b name: assessment-objective props: @@ -101612,6 +110635,12 @@ catalog: value: SA-09(01)(b) class: sp800-53a prose: '{{ insert: param, sa-09.01_odp }} approve the acquisition or outsourcing of dedicated information security services.' + links: + - href: '#sa-9.1_smt.b' + rel: assessment-for + links: + - href: '#sa-9.1_smt' + rel: assessment-for - id: sa-9.1_asm-examine name: assessment-method props: @@ -101732,6 +110761,9 @@ catalog: value: SA-09(02) class: sp800-53a prose: 'providers of {{ insert: param, sa-09.02_odp }} are required to identify the functions, ports, protocols, and other services required for the use of such services.' + links: + - href: '#sa-9.2_smt' + rel: assessment-for - id: sa-9.2_asm-examine name: assessment-method props: @@ -101853,6 +110885,9 @@ catalog: value: SA-09(03)[01] class: sp800-53a prose: 'trust relationships with external service provides based on {{ insert: param, sa-09.03_odp.01 }} are established and documented;' + links: + - href: '#sa-9.3_smt' + rel: assessment-for - id: sa-9.3_obj-2 name: assessment-objective props: @@ -101860,6 +110895,9 @@ catalog: value: SA-09(03)[02] class: sp800-53a prose: 'trust relationships with external service provides based on {{ insert: param, sa-09.03_odp.01 }} are maintained;' + links: + - href: '#sa-9.3_smt' + rel: assessment-for - id: sa-9.3_obj-3 name: assessment-objective props: @@ -101867,6 +110905,9 @@ catalog: value: SA-09(03)[03] class: sp800-53a prose: 'trust relationships with external service provides based on {{ insert: param, sa-09.03_odp.02 }} are established and documented;' + links: + - href: '#sa-9.3_smt' + rel: assessment-for - id: sa-9.3_obj-4 name: assessment-objective props: @@ -101874,6 +110915,12 @@ catalog: value: SA-09(03)[04] class: sp800-53a prose: 'trust relationships with external service provides based on {{ insert: param, sa-09.03_odp.02 }} are maintained.' + links: + - href: '#sa-9.3_smt' + rel: assessment-for + links: + - href: '#sa-9.3_smt' + rel: assessment-for - id: sa-9.3_asm-examine name: assessment-method props: @@ -101987,6 +111034,9 @@ catalog: value: SA-09(04) class: sp800-53a prose: '{{ insert: param, sa-09.04_odp.02 }} are taken to verify that the interests of {{ insert: param, sa-09.04_odp.01 }} are consistent with and reflect organizational interests.' + links: + - href: '#sa-9.4_smt' + rel: assessment-for - id: sa-9.4_asm-examine name: assessment-method props: @@ -102131,6 +111181,9 @@ catalog: value: SA-09(05) class: sp800-53a prose: 'based on {{ insert: param, sa-09.05_odp.03 }}, {{ insert: param, sa-09.05_odp.01 }} is/are restricted to {{ insert: param, sa-09.05_odp.02 }}.' + links: + - href: '#sa-9.5_smt' + rel: assessment-for - id: sa-9.5_asm-examine name: assessment-method props: @@ -102242,6 +111295,9 @@ catalog: value: SA-09(06) class: sp800-53a prose: exclusive control of cryptographic keys is maintained for encrypted material stored or transmitted through an external system. + links: + - href: '#sa-9.6_smt' + rel: assessment-for - id: sa-9.6_asm-examine name: assessment-method props: @@ -102347,6 +111403,9 @@ catalog: value: SA-09(07) class: sp800-53a prose: the capability is provided to check the integrity of information while it resides in the external system. + links: + - href: '#sa-9.7_smt' + rel: assessment-for - id: sa-9.7_asm-examine name: assessment-method props: @@ -102456,6 +111515,9 @@ catalog: value: SA-09(08) class: sp800-53a prose: the geographic location of information processing and data storage is restricted to facilities located within the legal jurisdictional boundary of the United States. + links: + - href: '#sa-9.8_smt' + rel: assessment-for - id: sa-9.8_asm-examine name: assessment-method props: @@ -102674,6 +111736,9 @@ catalog: value: SA-10a. class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform configuration management during system, component, or service {{ insert: param, sa-10_odp.01 }};' + links: + - href: '#sa-10_smt.a' + rel: assessment-for - id: sa-10_obj.b name: assessment-objective props: @@ -102688,6 +111753,9 @@ catalog: value: SA-10b.[01] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to document the integrity of changes to {{ insert: param, sa-10_odp.02 }};' + links: + - href: '#sa-10_smt.b' + rel: assessment-for - id: sa-10_obj.b-2 name: assessment-objective props: @@ -102695,6 +111763,9 @@ catalog: value: SA-10b.[02] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to manage the integrity of changes to {{ insert: param, sa-10_odp.02 }};' + links: + - href: '#sa-10_smt.b' + rel: assessment-for - id: sa-10_obj.b-3 name: assessment-objective props: @@ -102702,6 +111773,12 @@ catalog: value: SA-10b.[03] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to control the integrity of changes to {{ insert: param, sa-10_odp.02 }};' + links: + - href: '#sa-10_smt.b' + rel: assessment-for + links: + - href: '#sa-10_smt.b' + rel: assessment-for - id: sa-10_obj.c name: assessment-objective props: @@ -102709,6 +111786,9 @@ catalog: value: SA-10c. class: sp800-53a prose: the developer of the system, system component, or system service is required to implement only organization-approved changes to the system, component, or service; + links: + - href: '#sa-10_smt.c' + rel: assessment-for - id: sa-10_obj.d name: assessment-objective props: @@ -102723,6 +111803,9 @@ catalog: value: SA-10d.[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to document approved changes to the system, component, or service; + links: + - href: '#sa-10_smt.d' + rel: assessment-for - id: sa-10_obj.d-2 name: assessment-objective props: @@ -102730,6 +111813,9 @@ catalog: value: SA-10d.[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to document the potential security impacts of approved changes; + links: + - href: '#sa-10_smt.d' + rel: assessment-for - id: sa-10_obj.d-3 name: assessment-objective props: @@ -102737,6 +111823,12 @@ catalog: value: SA-10d.[03] class: sp800-53a prose: the developer of the system, system component, or system service is required to document the potential privacy impacts of approved changes; + links: + - href: '#sa-10_smt.d' + rel: assessment-for + links: + - href: '#sa-10_smt.d' + rel: assessment-for - id: sa-10_obj.e name: assessment-objective props: @@ -102751,6 +111843,9 @@ catalog: value: SA-10e.[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to track security flaws within the system, component, or service; + links: + - href: '#sa-10_smt.e' + rel: assessment-for - id: sa-10_obj.e-2 name: assessment-objective props: @@ -102758,6 +111853,9 @@ catalog: value: SA-10e.[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to track security flaw resolutions within the system, component, or service; + links: + - href: '#sa-10_smt.e' + rel: assessment-for - id: sa-10_obj.e-3 name: assessment-objective props: @@ -102765,6 +111863,15 @@ catalog: value: SA-10e.[03] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to report findings to {{ insert: param, sa-10_odp.03 }}.' + links: + - href: '#sa-10_smt.e' + rel: assessment-for + links: + - href: '#sa-10_smt.e' + rel: assessment-for + links: + - href: '#sa-10_smt' + rel: assessment-for - id: sa-10_asm-examine name: assessment-method props: @@ -102875,6 +111982,9 @@ catalog: value: SA-10(01) class: sp800-53a prose: the developer of the system, system component, or system service is required to enable integrity verification of software and firmware components. + links: + - href: '#sa-10.1_smt' + rel: assessment-for - id: sa-10.1_asm-examine name: assessment-method props: @@ -102984,6 +112094,9 @@ catalog: value: SA-10(02) class: sp800-53a prose: an alternate configuration management process has been provided using organizational personnel in the absence of a dedicated developer configuration management team. + links: + - href: '#sa-10.2_smt' + rel: assessment-for - id: sa-10.2_asm-examine name: assessment-method props: @@ -103097,6 +112210,9 @@ catalog: value: SA-10(03) class: sp800-53a prose: the developer of the system, system component, or system service is required to enable integrity verification of hardware components. + links: + - href: '#sa-10.3_smt' + rel: assessment-for - id: sa-10.3_asm-examine name: assessment-method props: @@ -103207,6 +112323,9 @@ catalog: value: SA-10(04)[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to employ tools for comparing newly generated versions of security-relevant hardware descriptions with previous versions; + links: + - href: '#sa-10.4_smt' + rel: assessment-for - id: sa-10.4_obj-2 name: assessment-objective props: @@ -103214,6 +112333,9 @@ catalog: value: SA-10(04)[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to employ tools for comparing newly generated versions of source code with previous versions; + links: + - href: '#sa-10.4_smt' + rel: assessment-for - id: sa-10.4_obj-3 name: assessment-objective props: @@ -103221,6 +112343,12 @@ catalog: value: SA-10(04)[03] class: sp800-53a prose: the developer of the system, system component, or system service is required to employ tools for comparing newly generated versions of object code with previous versions. + links: + - href: '#sa-10.4_smt' + rel: assessment-for + links: + - href: '#sa-10.4_smt' + rel: assessment-for - id: sa-10.4_asm-examine name: assessment-method props: @@ -103305,6 +112433,9 @@ catalog: value: SA-10(05) class: sp800-53a prose: the developer of the system, system component, or system service is required to maintain the integrity of the mapping between the master build data describing the current version of security-relevant hardware, software, and firmware and the on-site master copy of the data for the current version. + links: + - href: '#sa-10.5_smt' + rel: assessment-for - id: sa-10.5_asm-examine name: assessment-method props: @@ -103410,6 +112541,9 @@ catalog: value: SA-10(06) class: sp800-53a prose: the developer of the system, system component, or system service is required to execute procedures for ensuring that security-relevant hardware, software, and firmware updates distributed to the organization are exactly as specified by the master copies. + links: + - href: '#sa-10.6_smt' + rel: assessment-for - id: sa-10.6_asm-examine name: assessment-method props: @@ -103569,6 +112703,9 @@ catalog: value: SA-10(07)[01] class: sp800-53a prose: '{{ insert: param, sa-10.07_odp.01 }} are required to be included in the {{ insert: param, sa-10.07_odp.03 }};' + links: + - href: '#sa-10.7_smt' + rel: assessment-for - id: sa-10.7_obj-2 name: assessment-objective props: @@ -103576,6 +112713,12 @@ catalog: value: SA-10(07)[02] class: sp800-53a prose: '{{ insert: param, sa-10.07_odp.02 }} are required to be included in the {{ insert: param, sa-10.07_odp.04 }}.' + links: + - href: '#sa-10.7_smt' + rel: assessment-for + links: + - href: '#sa-10.7_smt' + rel: assessment-for - id: sa-10.7_asm-examine name: assessment-method props: @@ -103786,6 +112929,9 @@ catalog: value: SA-11a.[01] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to develop a plan for ongoing security assessments; + links: + - href: '#sa-11_smt.a' + rel: assessment-for - id: sa-11_obj.a-2 name: assessment-objective props: @@ -103793,6 +112939,9 @@ catalog: value: SA-11a.[02] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to implement a plan for ongoing security assessments; + links: + - href: '#sa-11_smt.a' + rel: assessment-for - id: sa-11_obj.a-3 name: assessment-objective props: @@ -103800,6 +112949,9 @@ catalog: value: SA-11a.[03] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to develop a plan for privacy assessments; + links: + - href: '#sa-11_smt.a' + rel: assessment-for - id: sa-11_obj.a-4 name: assessment-objective props: @@ -103807,6 +112959,12 @@ catalog: value: SA-11a.[04] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to implement a plan for ongoing privacy assessments; + links: + - href: '#sa-11_smt.a' + rel: assessment-for + links: + - href: '#sa-11_smt.a' + rel: assessment-for - id: sa-11_obj.b name: assessment-objective props: @@ -103814,6 +112972,9 @@ catalog: value: SA-11b. class: sp800-53a prose: 'the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to perform {{ insert: param, sa-11_odp.01 }} testing/evaluation {{ insert: param, sa-11_odp.02 }} at {{ insert: param, sa-11_odp.03 }};' + links: + - href: '#sa-11_smt.b' + rel: assessment-for - id: sa-11_obj.c name: assessment-objective props: @@ -103828,6 +112989,9 @@ catalog: value: SA-11c.[01] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to produce evidence of the execution of the assessment plan; + links: + - href: '#sa-11_smt.c' + rel: assessment-for - id: sa-11_obj.c-2 name: assessment-objective props: @@ -103835,6 +112999,12 @@ catalog: value: SA-11c.[02] class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to produce the results of the testing and evaluation; + links: + - href: '#sa-11_smt.c' + rel: assessment-for + links: + - href: '#sa-11_smt.c' + rel: assessment-for - id: sa-11_obj.d name: assessment-objective props: @@ -103842,6 +113012,9 @@ catalog: value: SA-11d. class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to implement a verifiable flaw remediation process; + links: + - href: '#sa-11_smt.d' + rel: assessment-for - id: sa-11_obj.e name: assessment-objective props: @@ -103849,6 +113022,12 @@ catalog: value: SA-11e. class: sp800-53a prose: the developer of the system, system component, or system service is required at all post-design stages of the system development life cycle to correct flaws identified during testing and evaluation. + links: + - href: '#sa-11_smt.e' + rel: assessment-for + links: + - href: '#sa-11_smt' + rel: assessment-for - id: sa-11_asm-examine name: assessment-method props: @@ -103972,6 +113151,9 @@ catalog: value: SA-11(01)[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to employ static code analysis tools to identify common flaws; + links: + - href: '#sa-11.1_smt' + rel: assessment-for - id: sa-11.1_obj-2 name: assessment-objective props: @@ -103979,6 +113161,12 @@ catalog: value: SA-11(01)[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to employ static code analysis tools to document the results of the analysis. + links: + - href: '#sa-11.1_smt' + rel: assessment-for + links: + - href: '#sa-11.1_smt' + rel: assessment-for - id: sa-11.1_asm-examine name: assessment-method props: @@ -104217,6 +113405,9 @@ catalog: value: SA-11(02)(a)[01] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform threat modeling during development of the system, component, or service that uses {{ insert: param, sa-11.02_odp.01 }};' + links: + - href: '#sa-11.2_smt.a' + rel: assessment-for - id: sa-11.2_obj.a-2 name: assessment-objective props: @@ -104224,6 +113415,9 @@ catalog: value: SA-11(02)(a)[02] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform vulnerability analyses during development of the system, component, or service that uses {{ insert: param, sa-11.02_odp.01 }};' + links: + - href: '#sa-11.2_smt.a' + rel: assessment-for - id: sa-11.2_obj.a-3 name: assessment-objective props: @@ -104231,6 +113425,9 @@ catalog: value: SA-11(02)(a)[03] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform threat modeling during the subsequent testing and evaluation of the system, component, or service that uses {{ insert: param, sa-11.02_odp.01 }};' + links: + - href: '#sa-11.2_smt.a' + rel: assessment-for - id: sa-11.2_obj.a-4 name: assessment-objective props: @@ -104238,6 +113435,12 @@ catalog: value: SA-11(02)(a)[04] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform vulnerability analyses during the subsequent testing and evaluation of the system, component, or service that uses {{ insert: param, sa-11.02_odp.01 }};' + links: + - href: '#sa-11.2_smt.a' + rel: assessment-for + links: + - href: '#sa-11.2_smt.a' + rel: assessment-for - id: sa-11.2_obj.b name: assessment-objective props: @@ -104252,6 +113455,9 @@ catalog: value: SA-11(02)(b)[01] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform threat modeling during development of the system, component, or service that employs {{ insert: param, sa-11.02_odp.02 }};' + links: + - href: '#sa-11.2_smt.b' + rel: assessment-for - id: sa-11.2_obj.b-2 name: assessment-objective props: @@ -104259,6 +113465,9 @@ catalog: value: SA-11(02)(b)[02] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform threat modeling during the subsequent testing and evaluation of the system, component, or service that employs {{ insert: param, sa-11.02_odp.02 }};' + links: + - href: '#sa-11.2_smt.b' + rel: assessment-for - id: sa-11.2_obj.b-3 name: assessment-objective props: @@ -104266,6 +113475,9 @@ catalog: value: SA-11(02)(b)[03] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform vulnerability analyses during development of the system, component, or service that employs {{ insert: param, sa-11.02_odp.02 }};' + links: + - href: '#sa-11.2_smt.b' + rel: assessment-for - id: sa-11.2_obj.b-4 name: assessment-objective props: @@ -104273,6 +113485,12 @@ catalog: value: SA-11(02)(b)[04] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform vulnerability analyses during the subsequent testing and evaluation of the system, component, or service that employs {{ insert: param, sa-11.02_odp.02 }};' + links: + - href: '#sa-11.2_smt.b' + rel: assessment-for + links: + - href: '#sa-11.2_smt.b' + rel: assessment-for - id: sa-11.2_obj.c name: assessment-objective props: @@ -104287,6 +113505,9 @@ catalog: value: SA-11(02)(c)[01] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform threat modeling at {{ insert: param, sa-11.02_odp.03 }} during development of the system, component, or service;' + links: + - href: '#sa-11.2_smt.c' + rel: assessment-for - id: sa-11.2_obj.c-2 name: assessment-objective props: @@ -104294,6 +113515,12 @@ catalog: value: SA-11(02)(c)[02] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform vulnerability analyses during the subsequent testing and evaluation of the system, component, or service that conducts modeling and analyses at {{ insert: param, sa-11.02_odp.04 }};' + links: + - href: '#sa-11.2_smt.c' + rel: assessment-for + links: + - href: '#sa-11.2_smt.c' + rel: assessment-for - id: sa-11.2_obj.d name: assessment-objective props: @@ -104308,6 +113535,9 @@ catalog: value: SA-11(02)(d)[01] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform threat modeling during development of the system, component, or service that produces evidence that meets {{ insert: param, sa-11.02_odp.05 }};' + links: + - href: '#sa-11.2_smt.d' + rel: assessment-for - id: sa-11.2_obj.d-2 name: assessment-objective props: @@ -104315,6 +113545,9 @@ catalog: value: SA-11(02)(d)[02] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform threat modeling during the subsequent testing and evaluation of the system, component, or service that produces evidence that meets {{ insert: param, sa-11.02_odp.05 }};' + links: + - href: '#sa-11.2_smt.d' + rel: assessment-for - id: sa-11.2_obj.d-3 name: assessment-objective props: @@ -104322,6 +113555,9 @@ catalog: value: SA-11(02)(d)[03] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform vulnerability analyses during development of the system, component, or service that produces evidence that meets {{ insert: param, sa-11.02_odp.06 }};' + links: + - href: '#sa-11.2_smt.d' + rel: assessment-for - id: sa-11.2_obj.d-4 name: assessment-objective props: @@ -104329,6 +113565,15 @@ catalog: value: SA-11(02)(d)[04] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform vulnerability analyses during the subsequent testing and evaluation of the system, component, or service that produces evidence that meets {{ insert: param, sa-11.02_odp.06 }}.' + links: + - href: '#sa-11.2_smt.d' + rel: assessment-for + links: + - href: '#sa-11.2_smt.d' + rel: assessment-for + links: + - href: '#sa-11.2_smt' + rel: assessment-for - id: sa-11.2_asm-examine name: assessment-method props: @@ -104479,6 +113724,9 @@ catalog: value: SA-11(03)(a)[01] class: sp800-53a prose: 'an independent agent is required to satisfy {{ insert: param, sa-11.03_odp }} to verify the correct implementation of the developer security assessment plan and the evidence produced during testing and evaluation;' + links: + - href: '#sa-11.3_smt.a' + rel: assessment-for - id: sa-11.3_obj.a-2 name: assessment-objective props: @@ -104486,6 +113734,12 @@ catalog: value: SA-11(03)(a)[02] class: sp800-53a prose: 'an independent agent is required to satisfy {{ insert: param, sa-11.03_odp }} to verify the correct implementation of the developer privacy assessment plan and the evidence produced during testing and evaluation;' + links: + - href: '#sa-11.3_smt.a' + rel: assessment-for + links: + - href: '#sa-11.3_smt.a' + rel: assessment-for - id: sa-11.3_obj.b name: assessment-objective props: @@ -104493,6 +113747,12 @@ catalog: value: SA-11(03)(b) class: sp800-53a prose: the independent agent is provided with sufficient information to complete the verification process or granted the authority to obtain such information. + links: + - href: '#sa-11.3_smt.b' + rel: assessment-for + links: + - href: '#sa-11.3_smt' + rel: assessment-for - id: sa-11.3_asm-examine name: assessment-method props: @@ -104623,6 +113883,9 @@ catalog: value: SA-11(04) class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform a manual code review of {{ insert: param, sa-11.04_odp.01 }} using {{ insert: param, sa-11.04_odp.02 }}.' + links: + - href: '#sa-11.4_smt' + rel: assessment-for - id: sa-11.4_asm-examine name: assessment-method props: @@ -104807,6 +114070,9 @@ catalog: value: SA-11(05)(a)[01] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform penetration testing at the following level of rigor: {{ insert: param, sa-11.05_odp.01 }};' + links: + - href: '#sa-11.5_smt.a' + rel: assessment-for - id: sa-11.5_obj.a-2 name: assessment-objective props: @@ -104814,6 +114080,12 @@ catalog: value: SA-11(05)(a)[02] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform penetration testing at the following level of rigor: {{ insert: param, sa-11.05_odp.02 }};' + links: + - href: '#sa-11.5_smt.a' + rel: assessment-for + links: + - href: '#sa-11.5_smt.a' + rel: assessment-for - id: sa-11.5_obj.b name: assessment-objective props: @@ -104821,6 +114093,12 @@ catalog: value: SA-11(05)(b) class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform penetration testing under {{ insert: param, sa-11.05_odp.03 }}.' + links: + - href: '#sa-11.5_smt.b' + rel: assessment-for + links: + - href: '#sa-11.5_smt' + rel: assessment-for - id: sa-11.5_asm-examine name: assessment-method props: @@ -104930,6 +114208,9 @@ catalog: value: SA-11(06) class: sp800-53a prose: the developer of the system, system component, or system service is required to perform attack surface reviews. + links: + - href: '#sa-11.6_smt' + rel: assessment-for - id: sa-11.6_asm-examine name: assessment-method props: @@ -105068,6 +114349,9 @@ catalog: value: SA-11(07)[01] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to verify that the scope of testing and evaluation provides complete coverage of the required controls at {{ insert: param, sa-11.07_odp.01 }};' + links: + - href: '#sa-11.7_smt' + rel: assessment-for - id: sa-11.7_obj-2 name: assessment-objective props: @@ -105075,6 +114359,12 @@ catalog: value: SA-11(07)[02] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to verify that the scope of testing and evaluation provides complete coverage of the required controls at {{ insert: param, sa-11.07_odp.02 }}.' + links: + - href: '#sa-11.7_smt' + rel: assessment-for + links: + - href: '#sa-11.7_smt' + rel: assessment-for - id: sa-11.7_asm-examine name: assessment-method props: @@ -105183,6 +114473,9 @@ catalog: value: SA-11(08)[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to employ dynamic code analysis tools to identify common flaws; + links: + - href: '#sa-11.8_smt' + rel: assessment-for - id: sa-11.8_obj-2 name: assessment-objective props: @@ -105190,6 +114483,12 @@ catalog: value: SA-11(08)[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to document the results of the analysis. + links: + - href: '#sa-11.8_smt' + rel: assessment-for + links: + - href: '#sa-11.8_smt' + rel: assessment-for - id: sa-11.8_asm-examine name: assessment-method props: @@ -105302,6 +114601,9 @@ catalog: value: SA-11(09)[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to employ interactive application security testing tools to identify flaws; + links: + - href: '#sa-11.9_smt' + rel: assessment-for - id: sa-11.9_obj-2 name: assessment-objective props: @@ -105309,6 +114611,12 @@ catalog: value: SA-11(09)[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to document the results of flaw identification. + links: + - href: '#sa-11.9_smt' + rel: assessment-for + links: + - href: '#sa-11.9_smt' + rel: assessment-for - id: sa-11.9_asm-examine name: assessment-method props: @@ -105842,6 +115150,9 @@ catalog: value: SA-15a.01[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to follow a documented development process that explicitly addresses security requirements; + links: + - href: '#sa-15_smt.a.1' + rel: assessment-for - id: sa-15_obj.a.1-2 name: assessment-objective props: @@ -105849,6 +115160,12 @@ catalog: value: SA-15a.01[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to follow a documented development process that explicitly addresses privacy requirements; + links: + - href: '#sa-15_smt.a.1' + rel: assessment-for + links: + - href: '#sa-15_smt.a.1' + rel: assessment-for - id: sa-15_obj.a.2 name: assessment-objective props: @@ -105863,6 +115180,9 @@ catalog: value: SA-15a.02[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to follow a documented development process that identifies the standards used in the development process; + links: + - href: '#sa-15_smt.a.2' + rel: assessment-for - id: sa-15_obj.a.2-2 name: assessment-objective props: @@ -105870,6 +115190,12 @@ catalog: value: SA-15a.02[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to follow a documented development process that identifies the tools used in the development process; + links: + - href: '#sa-15_smt.a.2' + rel: assessment-for + links: + - href: '#sa-15_smt.a.2' + rel: assessment-for - id: sa-15_obj.a.3 name: assessment-objective props: @@ -105884,6 +115210,9 @@ catalog: value: SA-15a.03[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to follow a documented development process that documents the specific tool used in the development process; + links: + - href: '#sa-15_smt.a.3' + rel: assessment-for - id: sa-15_obj.a.3-2 name: assessment-objective props: @@ -105891,6 +115220,12 @@ catalog: value: SA-15a.03[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to follow a documented development process that documents the specific tool configurations used in the development process; + links: + - href: '#sa-15_smt.a.3' + rel: assessment-for + links: + - href: '#sa-15_smt.a.3' + rel: assessment-for - id: sa-15_obj.a.4 name: assessment-objective props: @@ -105898,6 +115233,12 @@ catalog: value: SA-15a.04 class: sp800-53a prose: the developer of the system, system component, or system service is required to follow a documented development process that documents, manages, and ensures the integrity of changes to the process and/or tools used in development; + links: + - href: '#sa-15_smt.a.4' + rel: assessment-for + links: + - href: '#sa-15_smt.a' + rel: assessment-for - id: sa-15_obj.b name: assessment-objective props: @@ -105912,6 +115253,9 @@ catalog: value: SA-15b.[01] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to follow a documented development process in which the development process, standards, tools, tool options, and tool configurations are reviewed {{ insert: param, sa-15_odp.01 }} to determine that the process, standards, tools, tool options, and tool configurations selected and employed satisfy {{ insert: param, sa-15_odp.02 }};' + links: + - href: '#sa-15_smt.b' + rel: assessment-for - id: sa-15_obj.b-2 name: assessment-objective props: @@ -105919,6 +115263,15 @@ catalog: value: SA-15b.[02] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to follow a documented development process in which the development process, standards, tools, tool options, and tool configurations are reviewed {{ insert: param, sa-15_odp.01 }} to determine that the process, standards, tools, tool options, and tool configurations selected and employed satisfy {{ insert: param, sa-15_odp.03 }}.' + links: + - href: '#sa-15_smt.b' + rel: assessment-for + links: + - href: '#sa-15_smt.b' + rel: assessment-for + links: + - href: '#sa-15_smt' + rel: assessment-for - id: sa-15_asm-examine name: assessment-method props: @@ -106081,6 +115434,9 @@ catalog: value: SA-15(01)(a) class: sp800-53a prose: the developer of the system, system component, or system service is required to define quality metrics at the beginning of the development process; + links: + - href: '#sa-15.1_smt.a' + rel: assessment-for - id: sa-15.1_obj.b name: assessment-objective props: @@ -106088,6 +115444,12 @@ catalog: value: SA-15(01)(b) class: sp800-53a prose: 'the developer of the system, system component, or system service is required to provide evidence of meeting the quality metrics {{ insert: param, sa-15.01_odp.01 }}.' + links: + - href: '#sa-15.1_smt.b' + rel: assessment-for + links: + - href: '#sa-15.1_smt' + rel: assessment-for - id: sa-15.1_asm-examine name: assessment-method props: @@ -106181,6 +115543,9 @@ catalog: value: SA-15(02)[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to select and employ security tracking tools for use during the development process; + links: + - href: '#sa-15.2_smt' + rel: assessment-for - id: sa-15.2_obj-2 name: assessment-objective props: @@ -106188,6 +115553,12 @@ catalog: value: SA-15(02)[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to select and employ privacy tracking tools for use during the development process. + links: + - href: '#sa-15.2_smt' + rel: assessment-for + links: + - href: '#sa-15.2_smt' + rel: assessment-for - id: sa-15.2_asm-examine name: assessment-method props: @@ -106343,6 +115714,9 @@ catalog: value: SA-15(03)(a) class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform a criticality analysis at {{ insert: param, sa-15.03_odp.01 }} in the system development life cycle;' + links: + - href: '#sa-15.3_smt.a' + rel: assessment-for - id: sa-15.3_obj.b name: assessment-objective props: @@ -106357,6 +115731,9 @@ catalog: value: SA-15(03)(b)[01] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform a criticality analysis at the following rigor level: {{ insert: param, sa-15.03_odp.02 }};' + links: + - href: '#sa-15.3_smt.b' + rel: assessment-for - id: sa-15.3_obj.b-2 name: assessment-objective props: @@ -106364,6 +115741,15 @@ catalog: value: SA-15(03)(b)[02] class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform a criticality analysis at the following rigor level: {{ insert: param, sa-15.03_odp.03 }} .' + links: + - href: '#sa-15.3_smt.b' + rel: assessment-for + links: + - href: '#sa-15.3_smt.b' + rel: assessment-for + links: + - href: '#sa-15.3_smt' + rel: assessment-for - id: sa-15.3_asm-examine name: assessment-method props: @@ -106506,6 +115892,9 @@ catalog: value: SA-15(05) class: sp800-53a prose: 'the developer of the system, system component, or system service is required to reduce attack surfaces to {{ insert: param, sa-15.05_odp }}.' + links: + - href: '#sa-15.5_smt' + rel: assessment-for - id: sa-15.5_asm-examine name: assessment-method props: @@ -106608,6 +115997,9 @@ catalog: value: SA-15(06) class: sp800-53a prose: the developer of the system, system component, or system service is required to implement an explicit process to continuously improve the development process. + links: + - href: '#sa-15.6_smt' + rel: assessment-for - id: sa-15.6_asm-examine name: assessment-method props: @@ -106769,6 +116161,9 @@ catalog: value: SA-15(07)(a) class: sp800-53a prose: 'the developer of the system, system component, or system service is required to perform automated vulnerability analysis {{ insert: param, sa-15.07_odp.01 }} using {{ insert: param, sa-15.07_odp.02 }};' + links: + - href: '#sa-15.7_smt.a' + rel: assessment-for - id: sa-15.7_obj.b name: assessment-objective props: @@ -106776,6 +116171,9 @@ catalog: value: SA-15(07)(b) class: sp800-53a prose: 'the developer of the system, system component, or system service is required to determine the exploitation potential for discovered vulnerabilities {{ insert: param, sa-15.07_odp.01 }};' + links: + - href: '#sa-15.7_smt.b' + rel: assessment-for - id: sa-15.7_obj.c name: assessment-objective props: @@ -106783,6 +116181,9 @@ catalog: value: SA-15(07)(c) class: sp800-53a prose: 'the developer of the system, system component, or system service is required to determine potential risk mitigations {{ insert: param, sa-15.07_odp.01 }} for delivered vulnerabilities;' + links: + - href: '#sa-15.7_smt.c' + rel: assessment-for - id: sa-15.7_obj.d name: assessment-objective props: @@ -106790,6 +116191,12 @@ catalog: value: SA-15(07)(d) class: sp800-53a prose: 'the developer of the system, system component, or system service is required to deliver the outputs of the tools and results of the analysis {{ insert: param, sa-15.07_odp.01 }} to {{ insert: param, sa-15.07_odp.03 }}.' + links: + - href: '#sa-15.7_smt.d' + rel: assessment-for + links: + - href: '#sa-15.7_smt' + rel: assessment-for - id: sa-15.7_asm-examine name: assessment-method props: @@ -106902,6 +116309,9 @@ catalog: value: SA-15(08)[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to use threat modeling from similar systems, components, or services to inform the current development process; + links: + - href: '#sa-15.8_smt' + rel: assessment-for - id: sa-15.8_obj-2 name: assessment-objective props: @@ -106909,6 +116319,12 @@ catalog: value: SA-15(08)[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to use vulnerability analyses from similar systems, components, or services to inform the current development process. + links: + - href: '#sa-15.8_smt' + rel: assessment-for + links: + - href: '#sa-15.8_smt' + rel: assessment-for - id: sa-15.8_asm-examine name: assessment-method props: @@ -107018,6 +116434,9 @@ catalog: value: SA-15(10)[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to provide an incident response plan; + links: + - href: '#sa-15.10_smt' + rel: assessment-for - id: sa-15.10_obj-2 name: assessment-objective props: @@ -107025,6 +116444,9 @@ catalog: value: SA-15(10)[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to implement an incident response plan; + links: + - href: '#sa-15.10_smt' + rel: assessment-for - id: sa-15.10_obj-3 name: assessment-objective props: @@ -107032,6 +116454,12 @@ catalog: value: SA-15(10)[03] class: sp800-53a prose: the developer of the system, system component, or system service is required to test an incident response plan. + links: + - href: '#sa-15.10_smt' + rel: assessment-for + links: + - href: '#sa-15.10_smt' + rel: assessment-for - id: sa-15.10_asm-examine name: assessment-method props: @@ -107126,6 +116554,9 @@ catalog: value: SA-15(11) class: sp800-53a prose: the developer of the system or system component is required to archive the system or component to be released or delivered together with the corresponding evidence supporting the final security and privacy review. + links: + - href: '#sa-15.11_smt' + rel: assessment-for - id: sa-15.11_asm-examine name: assessment-method props: @@ -107216,6 +116647,9 @@ catalog: value: SA-15(12) class: sp800-53a prose: the developer of the system or system component is required to minimize the use of personally identifiable information in development and test environments. + links: + - href: '#sa-15.12_smt' + rel: assessment-for - id: sa-15.12_asm-examine name: assessment-method props: @@ -107338,6 +116772,9 @@ catalog: value: SA-16 class: sp800-53a prose: 'the developer of the system, system component, or system service is required to provide {{ insert: param, sa-16_odp }} on the correct use and operation of the implemented security and privacy functions, controls, and/or mechanisms.' + links: + - href: '#sa-16_smt' + rel: assessment-for - id: sa-16_asm-examine name: assessment-method props: @@ -107483,6 +116920,9 @@ catalog: value: SA-17(a)[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to produce a design specification and security architecture that are consistent with the organization’s security architecture, which is an integral part the organization’s enterprise architecture; + links: + - href: '#sa-17_smt.a' + rel: assessment-for - id: sa-17_obj.a-2 name: assessment-objective props: @@ -107490,6 +116930,12 @@ catalog: value: SA-17(a)[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to produce a design specification and privacy architecture that are consistent with the organization’s privacy architecture, which is an integral part the organization’s enterprise architecture; + links: + - href: '#sa-17_smt.a' + rel: assessment-for + links: + - href: '#sa-17_smt.a' + rel: assessment-for - id: sa-17_obj.b name: assessment-objective props: @@ -107504,6 +116950,9 @@ catalog: value: SA-17(b)[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to produce a design specification and security architecture that accurately and completely describe the required security functionality and the allocation of controls among physical and logical components; + links: + - href: '#sa-17_smt.b' + rel: assessment-for - id: sa-17_obj.b-2 name: assessment-objective props: @@ -107511,6 +116960,12 @@ catalog: value: SA-17(b)[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to produce a design specification and privacy architecture that accurately and completely describe the required privacy functionality and the allocation of controls among physical and logical components; + links: + - href: '#sa-17_smt.b' + rel: assessment-for + links: + - href: '#sa-17_smt.b' + rel: assessment-for - id: sa-17_obj.c name: assessment-objective props: @@ -107525,6 +116980,9 @@ catalog: value: SA-17(c)[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to produce a design specification and security architecture that express how individual security functions, mechanisms, and services work together to provide required security capabilities and a unified approach to protection; + links: + - href: '#sa-17_smt.c' + rel: assessment-for - id: sa-17_obj.c-2 name: assessment-objective props: @@ -107532,6 +116990,15 @@ catalog: value: SA-17(c)[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to produce a design specification and privacy architecture that express how individual privacy functions, mechanisms, and services work together to provide required privacy capabilities and a unified approach to protection. + links: + - href: '#sa-17_smt.c' + rel: assessment-for + links: + - href: '#sa-17_smt.c' + rel: assessment-for + links: + - href: '#sa-17_smt' + rel: assessment-for - id: sa-17_asm-examine name: assessment-method props: @@ -107682,6 +117149,9 @@ catalog: value: SA-17(01)(a)[01] class: sp800-53a prose: 'as an integral part of the development process, the developer of the system, system component, or system service is required to produce a formal policy model describing the {{ insert: param, sa-17.01_odp.01 }} to be enforced;' + links: + - href: '#sa-17.1_smt.a' + rel: assessment-for - id: sa-17.1_obj.a-2 name: assessment-objective props: @@ -107689,6 +117159,12 @@ catalog: value: SA-17(01)(a)[02] class: sp800-53a prose: 'as an integral part of the development process, the developer of the system, system component, or system service is required to produce a formal policy model describing the {{ insert: param, sa-17.01_odp.02 }} to be enforced;' + links: + - href: '#sa-17.1_smt.a' + rel: assessment-for + links: + - href: '#sa-17.1_smt.a' + rel: assessment-for - id: sa-17.1_obj.b name: assessment-objective props: @@ -107703,6 +117179,9 @@ catalog: value: SA-17(01)(b)[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to prove that the formal policy model is internally consistent and sufficient to enforce the defined elements of the organizational security policy when implemented; + links: + - href: '#sa-17.1_smt.b' + rel: assessment-for - id: sa-17.1_obj.b-2 name: assessment-objective props: @@ -107710,6 +117189,15 @@ catalog: value: SA-17(01)(b)[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to prove that the formal policy model is internally consistent and sufficient to enforce the defined elements of the organizational privacy policy when implemented. + links: + - href: '#sa-17.1_smt.b' + rel: assessment-for + links: + - href: '#sa-17.1_smt.b' + rel: assessment-for + links: + - href: '#sa-17.1_smt' + rel: assessment-for - id: sa-17.1_asm-examine name: assessment-method props: @@ -107831,6 +117319,9 @@ catalog: value: SA-17(02)(a)[01] class: sp800-53a prose: the developer of the system, system component, or system service is required to define security-relevant hardware; + links: + - href: '#sa-17.2_smt.a' + rel: assessment-for - id: sa-17.2_obj.a-2 name: assessment-objective props: @@ -107838,6 +117329,9 @@ catalog: value: SA-17(02)(a)[02] class: sp800-53a prose: the developer of the system, system component, or system service is required to define security-relevant software; + links: + - href: '#sa-17.2_smt.a' + rel: assessment-for - id: sa-17.2_obj.a-3 name: assessment-objective props: @@ -107845,6 +117339,12 @@ catalog: value: SA-17(02)(a)[03] class: sp800-53a prose: the developer of the system, system component, or system service is required to define security-relevant firmware; + links: + - href: '#sa-17.2_smt.a' + rel: assessment-for + links: + - href: '#sa-17.2_smt.a' + rel: assessment-for - id: sa-17.2_obj.b name: assessment-objective props: @@ -107852,6 +117352,12 @@ catalog: value: SA-17(02)(b) class: sp800-53a prose: the developer of the system, system component, or system service is required to provide a rationale that the definition for security-relevant hardware, software, and firmware is complete. + links: + - href: '#sa-17.2_smt.b' + rel: assessment-for + links: + - href: '#sa-17.2_smt' + rel: assessment-for - id: sa-17.2_asm-examine name: assessment-method props: @@ -107993,6 +117499,9 @@ catalog: value: SA-17(03)(a)[01] class: sp800-53a prose: as an integral part of the development process, the developer of the system, system component, or system service is required to produce a formal top-level specification that specifies the interfaces to security-relevant hardware, software, and firmware in terms of exceptions; + links: + - href: '#sa-17.3_smt.a' + rel: assessment-for - id: sa-17.3_obj.a-2 name: assessment-objective props: @@ -108000,6 +117509,9 @@ catalog: value: SA-17(03)(a)[02] class: sp800-53a prose: as an integral part of the development process, the developer of the system, system component, or system service is required to produce a formal top-level specification that specifies the interfaces to security-relevant hardware, software, and firmware in terms of error messages; + links: + - href: '#sa-17.3_smt.a' + rel: assessment-for - id: sa-17.3_obj.a-3 name: assessment-objective props: @@ -108007,6 +117519,12 @@ catalog: value: SA-17(03)(a)[03] class: sp800-53a prose: as an integral part of the development process, the developer of the system, system component, or system service is required to produce a formal top-level specification that specifies the interfaces to security-relevant hardware, software, and firmware in terms of effects; + links: + - href: '#sa-17.3_smt.a' + rel: assessment-for + links: + - href: '#sa-17.3_smt.a' + rel: assessment-for - id: sa-17.3_obj.b name: assessment-objective props: @@ -108014,6 +117532,9 @@ catalog: value: SA-17(03)(b) class: sp800-53a prose: the developer of the system, system component, or system service is required to show proof that the formal top-level specification is consistent with the formal policy model to the extent feasible with additional informal demonstration as necessary; + links: + - href: '#sa-17.3_smt.b' + rel: assessment-for - id: sa-17.3_obj.c name: assessment-objective props: @@ -108021,6 +117542,9 @@ catalog: value: SA-17(03)(c) class: sp800-53a prose: the developer of the system, system component, or system service is required to show via informal demonstration that the formal top-level specification completely covers the interfaces to security-relevant hardware, software, and firmware; + links: + - href: '#sa-17.3_smt.c' + rel: assessment-for - id: sa-17.3_obj.d name: assessment-objective props: @@ -108028,6 +117552,9 @@ catalog: value: SA-17(03)(d) class: sp800-53a prose: the developer of the system, system component, or system service is required to show that the formal top-level specification is an accurate description of the implemented security-relevant hardware, software, and firmware; + links: + - href: '#sa-17.3_smt.d' + rel: assessment-for - id: sa-17.3_obj.e name: assessment-objective props: @@ -108035,6 +117562,12 @@ catalog: value: SA-17(03)(e) class: sp800-53a prose: the developer of the system, system component, or system service is required to describe the security-relevant hardware, software, and firmware mechanisms that are not addressed in the formal top-level specification but are strictly internal to the security-relevant hardware, software, and firmware. + links: + - href: '#sa-17.3_smt.e' + rel: assessment-for + links: + - href: '#sa-17.3_smt' + rel: assessment-for - id: sa-17.3_asm-examine name: assessment-method props: @@ -108195,6 +117728,9 @@ catalog: value: SA-17(04)(a)[01] class: sp800-53a prose: as an integral part of the development process, the developer of the system, system component, or system service is required to produce an informal, descriptive top-level specification that specifies the interfaces to security-relevant hardware, software, and firmware in terms of exceptions; + links: + - href: '#sa-17.4_smt.a' + rel: assessment-for - id: sa-17.4_obj.a-2 name: assessment-objective props: @@ -108202,6 +117738,9 @@ catalog: value: SA-17(04)(a)[02] class: sp800-53a prose: as an integral part of the development process, the developer of the system, system component, or system service is required to produce an informal, descriptive top-level specification that specifies the interfaces to security-relevant hardware, software, and firmware in terms of error messages; + links: + - href: '#sa-17.4_smt.a' + rel: assessment-for - id: sa-17.4_obj.a-3 name: assessment-objective props: @@ -108209,6 +117748,12 @@ catalog: value: SA-17(04)(a)[03] class: sp800-53a prose: as an integral part of the development process, the developer of the system, system component, or system service is required to produce an informal, descriptive top-level specification that specifies the interfaces to security-relevant hardware, software, and firmware in terms of effects; + links: + - href: '#sa-17.4_smt.a' + rel: assessment-for + links: + - href: '#sa-17.4_smt.a' + rel: assessment-for - id: sa-17.4_obj.b name: assessment-objective props: @@ -108216,6 +117761,9 @@ catalog: value: SA-17(04)(b) class: sp800-53a prose: 'the developer of the system, system component, or system service is required to show via {{ insert: param, sa-17.04_odp }} that the descriptive top-level specification is consistent with the formal policy model;' + links: + - href: '#sa-17.4_smt.b' + rel: assessment-for - id: sa-17.4_obj.c name: assessment-objective props: @@ -108223,6 +117771,9 @@ catalog: value: SA-17(04)(c) class: sp800-53a prose: the developer of the system, system component, or system service is required to show via informal demonstration that the descriptive top-level specification completely covers the interfaces to security-relevant hardware, software, and firmware; + links: + - href: '#sa-17.4_smt.c' + rel: assessment-for - id: sa-17.4_obj.d name: assessment-objective props: @@ -108230,6 +117781,9 @@ catalog: value: SA-17(04)(d) class: sp800-53a prose: the developer of the system, system component, or system service is required to show that the descriptive top-level specification is an accurate description of the interfaces to security-relevant hardware, software, and firmware; + links: + - href: '#sa-17.4_smt.d' + rel: assessment-for - id: sa-17.4_obj.e name: assessment-objective props: @@ -108237,6 +117791,12 @@ catalog: value: SA-17(04)(e) class: sp800-53a prose: the developer of the system, system component, or system service is required to describe the security-relevant hardware, software, and firmware mechanisms that are not addressed in the descriptive top-level specification but are strictly internal to the security-relevant hardware, software, and firmware. + links: + - href: '#sa-17.4_smt.e' + rel: assessment-for + links: + - href: '#sa-17.4_smt' + rel: assessment-for - id: sa-17.4_asm-examine name: assessment-method props: @@ -108357,6 +117917,9 @@ catalog: value: SA-17(05)(a) class: sp800-53a prose: the developer of the system, system component, or system service is required to design and structure the security-relevant hardware, software, and firmware to use a complete, conceptually simple protection mechanism with precisely defined semantics; + links: + - href: '#sa-17.5_smt.a' + rel: assessment-for - id: sa-17.5_obj.b name: assessment-objective props: @@ -108364,6 +117927,12 @@ catalog: value: SA-17(05)(b) class: sp800-53a prose: the developer of the system, system component, or system service is required to internally structure the security-relevant hardware, software, and firmware with specific regard for this mechanism. + links: + - href: '#sa-17.5_smt.b' + rel: assessment-for + links: + - href: '#sa-17.5_smt' + rel: assessment-for - id: sa-17.5_asm-examine name: assessment-method props: @@ -108458,6 +118027,9 @@ catalog: value: SA-17(06) class: sp800-53a prose: the developer of the system, system component, or system service is required to structure security-relevant hardware, software, and firmware to facilitate testing. + links: + - href: '#sa-17.6_smt' + rel: assessment-for - id: sa-17.6_asm-examine name: assessment-method props: @@ -108561,6 +118133,9 @@ catalog: value: SA-17(07) class: sp800-53a prose: the developer of the system, system component, or system service is required to structure security-relevant hardware, software, and firmware to facilitate controlling access with least privilege. + links: + - href: '#sa-17.7_smt' + rel: assessment-for - id: sa-17.7_asm-examine name: assessment-method props: @@ -108678,6 +118253,9 @@ catalog: value: SA-17(08) class: sp800-53a prose: '{{ insert: param, sa-17.08_odp.01 }} are designed with coordinated behavior to implement {{ insert: param, sa-17.08_odp.02 }}.' + links: + - href: '#sa-17.8_smt' + rel: assessment-for - id: sa-17.8_asm-examine name: assessment-method props: @@ -108786,6 +118364,9 @@ catalog: value: SA-17(09) class: sp800-53a prose: 'different designs are used for {{ insert: param, sa-17.09_odp }} to satisfy a common set of requirements or to provide equivalent functionality.' + links: + - href: '#sa-17.9_smt' + rel: assessment-for - id: sa-17.9_asm-examine name: assessment-method props: @@ -109023,6 +118604,9 @@ catalog: value: SA-20 class: sp800-53a prose: '{{ insert: param, sa-20_odp }} are reimplemented or custom-developed.' + links: + - href: '#sa-20_smt' + rel: assessment-for - id: sa-20_asm-examine name: assessment-method props: @@ -109184,6 +118768,9 @@ catalog: value: SA-21a. class: sp800-53a prose: 'the developer of {{ insert: param, sa-21_odp.01 }} is required to have appropriate access authorizations as determined by assigned {{ insert: param, sa-21_odp.02 }};' + links: + - href: '#sa-21_smt.a' + rel: assessment-for - id: sa-21_obj.b name: assessment-objective props: @@ -109191,6 +118778,12 @@ catalog: value: SA-21b. class: sp800-53a prose: 'the developer of {{ insert: param, sa-21_odp.01 }} is required to satisfy {{ insert: param, sa-21_odp.03 }}.' + links: + - href: '#sa-21_smt.b' + rel: assessment-for + links: + - href: '#sa-21_smt' + rel: assessment-for - id: sa-21_asm-examine name: assessment-method props: @@ -109358,6 +118951,9 @@ catalog: value: SA-22a. class: sp800-53a prose: system components are replaced when support for the components is no longer available from the developer, vendor, or manufacturer; + links: + - href: '#sa-22_smt.a' + rel: assessment-for - id: sa-22_obj.b name: assessment-objective props: @@ -109365,6 +118961,12 @@ catalog: value: SA-22b. class: sp800-53a prose: '{{ insert: param, sa-22_odp.01 }} provide options for alternative sources for continued support for unsupported components.' + links: + - href: '#sa-22_smt.b' + rel: assessment-for + links: + - href: '#sa-22_smt' + rel: assessment-for - id: sa-22_asm-examine name: assessment-method props: @@ -109505,6 +119107,9 @@ catalog: value: SA-23 class: sp800-53a prose: '{{ insert: param, sa-23_odp.01 }} is employed on {{ insert: param, sa-23_odp.02 }} supporting essential services or functions to increase the trustworthiness in those systems or components.' + links: + - href: '#sa-23_smt' + rel: assessment-for - id: sa-23_asm-examine name: assessment-method props: @@ -109772,6 +119377,9 @@ catalog: value: SC-01a.[01] class: sp800-53a prose: a system and communications protection policy is developed and documented; + links: + - href: '#sc-1_smt.a' + rel: assessment-for - id: sc-1_obj.a-2 name: assessment-objective props: @@ -109779,6 +119387,9 @@ catalog: value: SC-01a.[02] class: sp800-53a prose: 'the system and communications protection policy is disseminated to {{ insert: param, sc-01_odp.01 }};' + links: + - href: '#sc-1_smt.a' + rel: assessment-for - id: sc-1_obj.a-3 name: assessment-objective props: @@ -109786,6 +119397,9 @@ catalog: value: SC-01a.[03] class: sp800-53a prose: system and communications protection procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls are developed and documented; + links: + - href: '#sc-1_smt.a' + rel: assessment-for - id: sc-1_obj.a-4 name: assessment-objective props: @@ -109793,6 +119407,9 @@ catalog: value: SC-01a.[04] class: sp800-53a prose: 'the system and communications protection procedures are disseminated to {{ insert: param, sc-01_odp.02 }};' + links: + - href: '#sc-1_smt.a' + rel: assessment-for - id: sc-1_obj.a.1 name: assessment-objective props: @@ -109814,6 +119431,9 @@ catalog: value: SC-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses purpose;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-2 name: assessment-objective props: @@ -109821,6 +119441,9 @@ catalog: value: SC-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses scope;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-3 name: assessment-objective props: @@ -109828,6 +119451,9 @@ catalog: value: SC-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses roles;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-4 name: assessment-objective props: @@ -109835,6 +119461,9 @@ catalog: value: SC-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses responsibilities;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-5 name: assessment-objective props: @@ -109842,6 +119471,9 @@ catalog: value: SC-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses management commitment;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-6 name: assessment-objective props: @@ -109849,6 +119481,9 @@ catalog: value: SC-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses coordination among organizational entities;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.a-7 name: assessment-objective props: @@ -109856,6 +119491,12 @@ catalog: value: SC-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy addresses compliance;' + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#sc-1_smt.a.1.a' + rel: assessment-for - id: sc-1_obj.a.1.b name: assessment-objective props: @@ -109863,6 +119504,15 @@ catalog: value: SC-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.03 }} system and communications protection policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#sc-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#sc-1_smt.a.1' + rel: assessment-for + links: + - href: '#sc-1_smt.a' + rel: assessment-for - id: sc-1_obj.b name: assessment-objective props: @@ -109870,6 +119520,9 @@ catalog: value: SC-01b. class: sp800-53a prose: 'the {{ insert: param, sc-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the system and communications protection policy and procedures;' + links: + - href: '#sc-1_smt.b' + rel: assessment-for - id: sc-1_obj.c name: assessment-objective props: @@ -109891,6 +119544,9 @@ catalog: value: SC-01c.01[01] class: sp800-53a prose: 'the current system and communications protection policy is reviewed and updated {{ insert: param, sc-01_odp.05 }};' + links: + - href: '#sc-1_smt.c.1' + rel: assessment-for - id: sc-1_obj.c.1-2 name: assessment-objective props: @@ -109898,6 +119554,12 @@ catalog: value: SC-01c.01[02] class: sp800-53a prose: 'the current system and communications protection policy is reviewed and updated following {{ insert: param, sc-01_odp.06 }};' + links: + - href: '#sc-1_smt.c.1' + rel: assessment-for + links: + - href: '#sc-1_smt.c.1' + rel: assessment-for - id: sc-1_obj.c.2 name: assessment-objective props: @@ -109912,6 +119574,9 @@ catalog: value: SC-01c.02[01] class: sp800-53a prose: 'the current system and communications protection procedures are reviewed and updated {{ insert: param, sc-01_odp.07 }};' + links: + - href: '#sc-1_smt.c.2' + rel: assessment-for - id: sc-1_obj.c.2-2 name: assessment-objective props: @@ -109919,6 +119584,18 @@ catalog: value: SC-01c.02[02] class: sp800-53a prose: 'the current system and communications protection procedures are reviewed and updated following {{ insert: param, sc-01_odp.08 }}.' + links: + - href: '#sc-1_smt.c.2' + rel: assessment-for + links: + - href: '#sc-1_smt.c.2' + rel: assessment-for + links: + - href: '#sc-1_smt.c' + rel: assessment-for + links: + - href: '#sc-1_smt' + rel: assessment-for - id: sc-1_asm-examine name: assessment-method props: @@ -110007,6 +119684,9 @@ catalog: value: SC-02 class: sp800-53a prose: user functionality, including user interface services, is separated from system management functionality. + links: + - href: '#sc-2_smt' + rel: assessment-for - id: sc-2_asm-examine name: assessment-method props: @@ -110098,6 +119778,9 @@ catalog: value: SC-02(01) class: sp800-53a prose: the presentation of system management functionality is prevented at interfaces to non-privileged users. + links: + - href: '#sc-2.1_smt' + rel: assessment-for - id: sc-2.1_asm-examine name: assessment-method props: @@ -110188,6 +119871,9 @@ catalog: value: SC-02(02) class: sp800-53a prose: state information is stored separately from applications and software. + links: + - href: '#sc-2.2_smt' + rel: assessment-for - id: sc-2.2_asm-examine name: assessment-method props: @@ -110306,6 +119992,9 @@ catalog: value: SC-03 class: sp800-53a prose: security functions are isolated from non-security functions. + links: + - href: '#sc-3_smt' + rel: assessment-for - id: sc-3_asm-examine name: assessment-method props: @@ -110397,6 +120086,9 @@ catalog: value: SC-03(01) class: sp800-53a prose: hardware separation mechanisms are employed to implement security function isolation. + links: + - href: '#sc-3.1_smt' + rel: assessment-for - id: sc-3.1_asm-examine name: assessment-method props: @@ -110494,6 +120186,9 @@ catalog: value: SC-03(02)[01] class: sp800-53a prose: security functions enforcing access control are isolated from non-security functions; + links: + - href: '#sc-3.2_smt' + rel: assessment-for - id: sc-3.2_obj-2 name: assessment-objective props: @@ -110501,6 +120196,9 @@ catalog: value: SC-03(02)[02] class: sp800-53a prose: security functions enforcing access control are isolated from other security functions; + links: + - href: '#sc-3.2_smt' + rel: assessment-for - id: sc-3.2_obj-3 name: assessment-objective props: @@ -110508,6 +120206,9 @@ catalog: value: SC-03(02)[03] class: sp800-53a prose: security functions enforcing information flow control are isolated from non-security functions; + links: + - href: '#sc-3.2_smt' + rel: assessment-for - id: sc-3.2_obj-4 name: assessment-objective props: @@ -110515,6 +120216,12 @@ catalog: value: SC-03(02)[04] class: sp800-53a prose: security functions enforcing information flow control are isolated from other security functions. + links: + - href: '#sc-3.2_smt' + rel: assessment-for + links: + - href: '#sc-3.2_smt' + rel: assessment-for - id: sc-3.2_asm-examine name: assessment-method props: @@ -110606,6 +120313,9 @@ catalog: value: SC-03(03) class: sp800-53a prose: the number of non-security functions included within the isolation boundary containing security functions is minimized. + links: + - href: '#sc-3.3_smt' + rel: assessment-for - id: sc-3.3_asm-examine name: assessment-method props: @@ -110702,6 +120412,9 @@ catalog: value: SC-03(04)[01] class: sp800-53a prose: security functions are implemented as largely independent modules that maximize internal cohesiveness within modules; + links: + - href: '#sc-3.4_smt' + rel: assessment-for - id: sc-3.4_obj-2 name: assessment-objective props: @@ -110709,6 +120422,12 @@ catalog: value: SC-03(04)[02] class: sp800-53a prose: security functions are implemented as largely independent modules that minimize coupling between modules. + links: + - href: '#sc-3.4_smt' + rel: assessment-for + links: + - href: '#sc-3.4_smt' + rel: assessment-for - id: sc-3.4_asm-examine name: assessment-method props: @@ -110801,6 +120520,9 @@ catalog: value: SC-03(05) class: sp800-53a prose: security functions are implemented as a layered structure, minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers. + links: + - href: '#sc-3.5_smt' + rel: assessment-for - id: sc-3.5_asm-examine name: assessment-method props: @@ -110898,6 +120620,9 @@ catalog: value: SC-04[01] class: sp800-53a prose: unauthorized information transfer via shared system resources is prevented; + links: + - href: '#sc-4_smt' + rel: assessment-for - id: sc-4_obj-2 name: assessment-objective props: @@ -110905,6 +120630,12 @@ catalog: value: SC-04[02] class: sp800-53a prose: unintended information transfer via shared system resources is prevented. + links: + - href: '#sc-4_smt' + rel: assessment-for + links: + - href: '#sc-4_smt' + rel: assessment-for - id: sc-4_asm-examine name: assessment-method props: @@ -111018,6 +120749,9 @@ catalog: value: SC-04(02) class: sp800-53a prose: 'unauthorized information transfer via shared resources is prevented in accordance with {{ insert: param, sc-04.02_odp }} when system processing explicitly switches between different information classification levels or security categories.' + links: + - href: '#sc-4.2_smt' + rel: assessment-for - id: sc-4.2_asm-examine name: assessment-method props: @@ -111164,6 +120898,9 @@ catalog: value: SC-05a. class: sp800-53a prose: 'the effects of {{ insert: param, sc-05_odp.01 }} are {{ insert: param, sc-05_odp.02 }};' + links: + - href: '#sc-5_smt.a' + rel: assessment-for - id: sc-5_obj.b name: assessment-objective props: @@ -111171,6 +120908,12 @@ catalog: value: SC-05b. class: sp800-53a prose: '{{ insert: param, sc-05_odp.03 }} are employed to achieve the denial-of-service protection objective.' + links: + - href: '#sc-5_smt.b' + rel: assessment-for + links: + - href: '#sc-5_smt' + rel: assessment-for - id: sc-5_asm-examine name: assessment-method props: @@ -111274,6 +121017,9 @@ catalog: value: SC-05(01) class: sp800-53a prose: 'the ability of individuals to launch {{ insert: param, sc-05.01_odp }} against other systems is restricted.' + links: + - href: '#sc-5.1_smt' + rel: assessment-for - id: sc-5.1_asm-examine name: assessment-method props: @@ -111363,6 +121109,9 @@ catalog: value: SC-05(02) class: sp800-53a prose: capacity, bandwidth, or other redundancies to limit the effects of information flooding denial-of-service attacks are managed. + links: + - href: '#sc-5.2_smt' + rel: assessment-for - id: sc-5.2_asm-examine name: assessment-method props: @@ -111494,6 +121243,9 @@ catalog: value: SC-05(03)(a) class: sp800-53a prose: '{{ insert: param, sc-05.03_odp.01 }} are employed to detect indicators of denial-of-service attacks against or launched from the system;' + links: + - href: '#sc-5.3_smt.a' + rel: assessment-for - id: sc-5.3_obj.b name: assessment-objective props: @@ -111501,6 +121253,12 @@ catalog: value: SC-05(03)(b) class: sp800-53a prose: '{{ insert: param, sc-05.03_odp.02 }} are monitored to determine if sufficient resources exist to prevent effective denial-of-service attacks.' + links: + - href: '#sc-5.3_smt.b' + rel: assessment-for + links: + - href: '#sc-5.3_smt' + rel: assessment-for - id: sc-5.3_asm-examine name: assessment-method props: @@ -111629,6 +121387,9 @@ catalog: value: SC-06 class: sp800-53a prose: 'the availability of resources is protected by allocating {{ insert: param, sc-06_odp.01 }} by {{ insert: param, sc-06_odp.02 }}.' + links: + - href: '#sc-6_smt' + rel: assessment-for - id: sc-6_asm-examine name: assessment-method props: @@ -111821,6 +121582,9 @@ catalog: value: SC-07a.[01] class: sp800-53a prose: communications at external managed interfaces to the system are monitored; + links: + - href: '#sc-7_smt.a' + rel: assessment-for - id: sc-7_obj.a-2 name: assessment-objective props: @@ -111828,6 +121592,9 @@ catalog: value: SC-07a.[02] class: sp800-53a prose: communications at external managed interfaces to the system are controlled; + links: + - href: '#sc-7_smt.a' + rel: assessment-for - id: sc-7_obj.a-3 name: assessment-objective props: @@ -111835,6 +121602,9 @@ catalog: value: SC-07a.[03] class: sp800-53a prose: communications at key internal managed interfaces within the system are monitored; + links: + - href: '#sc-7_smt.a' + rel: assessment-for - id: sc-7_obj.a-4 name: assessment-objective props: @@ -111842,6 +121612,12 @@ catalog: value: SC-07a.[04] class: sp800-53a prose: communications at key internal managed interfaces within the system are controlled; + links: + - href: '#sc-7_smt.a' + rel: assessment-for + links: + - href: '#sc-7_smt.a' + rel: assessment-for - id: sc-7_obj.b name: assessment-objective props: @@ -111849,6 +121625,9 @@ catalog: value: SC-07b. class: sp800-53a prose: 'subnetworks for publicly accessible system components are {{ insert: param, sc-07_odp }} separated from internal organizational networks;' + links: + - href: '#sc-7_smt.b' + rel: assessment-for - id: sc-7_obj.c name: assessment-objective props: @@ -111856,6 +121635,12 @@ catalog: value: SC-07c. class: sp800-53a prose: external networks or systems are only connected to through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security and privacy architecture. + links: + - href: '#sc-7_smt.c' + rel: assessment-for + links: + - href: '#sc-7_smt' + rel: assessment-for - id: sc-7_asm-examine name: assessment-method props: @@ -111982,6 +121767,9 @@ catalog: value: SC-07(03) class: sp800-53a prose: the number of external network connections to the system is limited. + links: + - href: '#sc-7.3_smt' + rel: assessment-for - id: sc-7.3_asm-examine name: assessment-method props: @@ -112152,6 +121940,9 @@ catalog: value: SC-07(04)(a) class: sp800-53a prose: a managed interface is implemented for each external telecommunication service; + links: + - href: '#sc-7.4_smt.a' + rel: assessment-for - id: sc-7.4_obj.b name: assessment-objective props: @@ -112159,6 +121950,9 @@ catalog: value: SC-07(04)(b) class: sp800-53a prose: a traffic flow policy is established for each managed interface; + links: + - href: '#sc-7.4_smt.b' + rel: assessment-for - id: sc-7.4_obj.c name: assessment-objective props: @@ -112173,6 +121967,9 @@ catalog: value: SC-07(04)(c)[01] class: sp800-53a prose: the confidentiality of the information being transmitted across each interface is protected; + links: + - href: '#sc-7.4_smt.c' + rel: assessment-for - id: sc-7.4_obj.c-2 name: assessment-objective props: @@ -112180,6 +121977,12 @@ catalog: value: SC-07(04)(c)[02] class: sp800-53a prose: the integrity of the information being transmitted across each interface is protected; + links: + - href: '#sc-7.4_smt.c' + rel: assessment-for + links: + - href: '#sc-7.4_smt.c' + rel: assessment-for - id: sc-7.4_obj.d name: assessment-objective props: @@ -112187,6 +121990,9 @@ catalog: value: SC-07(04)(d) class: sp800-53a prose: each exception to the traffic flow policy is documented with a supporting mission or business need and duration of that need; + links: + - href: '#sc-7.4_smt.d' + rel: assessment-for - id: sc-7.4_obj.e name: assessment-objective props: @@ -112201,6 +122007,9 @@ catalog: value: SC-07(04)(e)[01] class: sp800-53a prose: 'exceptions to the traffic flow policy are reviewed {{ insert: param, sc-07.04_odp }};' + links: + - href: '#sc-7.4_smt.e' + rel: assessment-for - id: sc-7.4_obj.e-2 name: assessment-objective props: @@ -112208,6 +122017,12 @@ catalog: value: SC-07(04)(e)[02] class: sp800-53a prose: exceptions to the traffic flow policy that are no longer supported by an explicit mission or business need are removed; + links: + - href: '#sc-7.4_smt.e' + rel: assessment-for + links: + - href: '#sc-7.4_smt.e' + rel: assessment-for - id: sc-7.4_obj.f name: assessment-objective props: @@ -112215,6 +122030,9 @@ catalog: value: SC-07(04)(f) class: sp800-53a prose: unauthorized exchanges of control plan traffic with external networks are prevented; + links: + - href: '#sc-7.4_smt.f' + rel: assessment-for - id: sc-7.4_obj.g name: assessment-objective props: @@ -112222,6 +122040,9 @@ catalog: value: SC-07(04)(g) class: sp800-53a prose: information is published to enable remote networks to detect unauthorized control plane traffic from internal networks; + links: + - href: '#sc-7.4_smt.g' + rel: assessment-for - id: sc-7.4_obj.h name: assessment-objective props: @@ -112229,6 +122050,12 @@ catalog: value: SC-07(04)(h) class: sp800-53a prose: unauthorized control plane traffic is filtered from external networks. + links: + - href: '#sc-7.4_smt.h' + rel: assessment-for + links: + - href: '#sc-7.4_smt' + rel: assessment-for - id: sc-7.4_asm-examine name: assessment-method props: @@ -112363,6 +122190,9 @@ catalog: value: SC-07(05)[01] class: sp800-53a prose: 'network communications traffic is denied by default {{ insert: param, sc-07.05_odp.01 }};' + links: + - href: '#sc-7.5_smt' + rel: assessment-for - id: sc-7.5_obj-2 name: assessment-objective props: @@ -112370,6 +122200,12 @@ catalog: value: SC-07(05)[02] class: sp800-53a prose: 'network communications traffic is allowed by exception {{ insert: param, sc-07.05_odp.01 }}.' + links: + - href: '#sc-7.5_smt' + rel: assessment-for + links: + - href: '#sc-7.5_smt' + rel: assessment-for - id: sc-7.5_asm-examine name: assessment-method props: @@ -112484,6 +122320,9 @@ catalog: value: SC-07(07) class: sp800-53a prose: 'split tunneling is prevented for remote devices connecting to organizational systems unless the split tunnel is securely provisioned using {{ insert: param, sc-07.07_odp }}.' + links: + - href: '#sc-7.7_smt' + rel: assessment-for - id: sc-7.7_asm-examine name: assessment-method props: @@ -112601,6 +122440,9 @@ catalog: value: SC-07(08) class: sp800-53a prose: '{{ insert: param, sc-07.08_odp.01 }} is routed to {{ insert: param, sc-07.08_odp.02 }} through authenticated proxy servers at managed interfaces.' + links: + - href: '#sc-7.8_smt' + rel: assessment-for - id: sc-7.8_asm-examine name: assessment-method props: @@ -112732,6 +122574,9 @@ catalog: value: SC-07(09)(a)[01] class: sp800-53a prose: outgoing communications traffic posing a threat to external systems is detected; + links: + - href: '#sc-7.9_smt.a' + rel: assessment-for - id: sc-7.9_obj.a-2 name: assessment-objective props: @@ -112739,6 +122584,12 @@ catalog: value: SC-07(09)(a)[02] class: sp800-53a prose: outgoing communications traffic posing a threat to external systems is denied; + links: + - href: '#sc-7.9_smt.a' + rel: assessment-for + links: + - href: '#sc-7.9_smt.a' + rel: assessment-for - id: sc-7.9_obj.b name: assessment-objective props: @@ -112746,6 +122597,12 @@ catalog: value: SC-07(09)(b) class: sp800-53a prose: the identity of internal users associated with denied communications is audited. + links: + - href: '#sc-7.9_smt.b' + rel: assessment-for + links: + - href: '#sc-7.9_smt' + rel: assessment-for - id: sc-7.9_asm-examine name: assessment-method props: @@ -112878,6 +122735,9 @@ catalog: value: SC-07(10)(a) class: sp800-53a prose: the exfiltration of information is prevented; + links: + - href: '#sc-7.10_smt.a' + rel: assessment-for - id: sc-7.10_obj.b name: assessment-objective props: @@ -112885,6 +122745,12 @@ catalog: value: SC-07(10)(b) class: sp800-53a prose: 'exfiltration tests are conducted {{ insert: param, sc-07.10_odp }}.' + links: + - href: '#sc-7.10_smt.b' + rel: assessment-for + links: + - href: '#sc-7.10_smt' + rel: assessment-for - id: sc-7.10_asm-examine name: assessment-method props: @@ -112993,6 +122859,9 @@ catalog: value: SC-07(11) class: sp800-53a prose: 'only incoming communications from {{ insert: param, sc-07.11_odp.01 }} are allowed to be routed to {{ insert: param, sc-07.11_odp.02 }}.' + links: + - href: '#sc-7.11_smt' + rel: assessment-for - id: sc-7.11_asm-examine name: assessment-method props: @@ -113101,6 +122970,9 @@ catalog: value: SC-07(12) class: sp800-53a prose: '{{ insert: param, sc-07.12_odp.01 }} are implemented at {{ insert: param, sc-07.12_odp.02 }}.' + links: + - href: '#sc-7.12_smt' + rel: assessment-for - id: sc-7.12_asm-examine name: assessment-method props: @@ -113205,6 +123077,9 @@ catalog: value: SC-07(13) class: sp800-53a prose: '{{ insert: param, sc-07.13_odp }} are isolated from other internal system components by implementing physically separate subnetworks with managed interfaces to other components of the system.' + links: + - href: '#sc-7.13_smt' + rel: assessment-for - id: sc-7.13_asm-examine name: assessment-method props: @@ -113311,6 +123186,9 @@ catalog: value: SC-07(14) class: sp800-53a prose: '{{ insert: param, sc-07.14_odp }} are protected against unauthorized physical connections.' + links: + - href: '#sc-7.14_smt' + rel: assessment-for - id: sc-7.14_asm-examine name: assessment-method props: @@ -113413,6 +123291,9 @@ catalog: value: SC-07(15)[01] class: sp800-53a prose: networked, privileged accesses are routed through a dedicated, managed interface for purposes of access control; + links: + - href: '#sc-7.15_smt' + rel: assessment-for - id: sc-7.15_obj-2 name: assessment-objective props: @@ -113420,6 +123301,12 @@ catalog: value: SC-07(15)[02] class: sp800-53a prose: networked, privileged accesses are routed through a dedicated, managed interface for purposes of auditing. + links: + - href: '#sc-7.15_smt' + rel: assessment-for + links: + - href: '#sc-7.15_smt' + rel: assessment-for - id: sc-7.15_asm-examine name: assessment-method props: @@ -113511,6 +123398,9 @@ catalog: value: SC-07(16) class: sp800-53a prose: the discovery of specific system components that represent a managed interface is prevented. + links: + - href: '#sc-7.16_smt' + rel: assessment-for - id: sc-7.16_asm-examine name: assessment-method props: @@ -113604,6 +123494,9 @@ catalog: value: SC-07(17) class: sp800-53a prose: adherence to protocol formats is enforced. + links: + - href: '#sc-7.17_smt' + rel: assessment-for - id: sc-7.17_asm-examine name: assessment-method props: @@ -113702,6 +123595,9 @@ catalog: value: SC-07(18) class: sp800-53a prose: systems are prevented from entering unsecure states in the event of an operational failure of a boundary protection device. + links: + - href: '#sc-7.18_smt' + rel: assessment-for - id: sc-7.18_asm-examine name: assessment-method props: @@ -113809,6 +123705,9 @@ catalog: value: SC-07(19)[01] class: sp800-53a prose: 'inbound communications traffic is blocked between {{ insert: param, sc-07.19_odp }} that are independently configured by end users and external service providers;' + links: + - href: '#sc-7.19_smt' + rel: assessment-for - id: sc-7.19_obj-2 name: assessment-objective props: @@ -113816,6 +123715,12 @@ catalog: value: SC-07(19)[02] class: sp800-53a prose: 'outbound communications traffic is blocked between {{ insert: param, sc-07.19_odp }} that are independently configured by end users and external service providers.' + links: + - href: '#sc-7.19_smt' + rel: assessment-for + links: + - href: '#sc-7.19_smt' + rel: assessment-for - id: sc-7.19_asm-examine name: assessment-method props: @@ -113918,6 +123823,9 @@ catalog: value: SC-07(20) class: sp800-53a prose: 'the capability to dynamically isolate {{ insert: param, sc-07.20_odp }} from other system components is provided.' + links: + - href: '#sc-7.20_smt' + rel: assessment-for - id: sc-7.20_asm-examine name: assessment-method props: @@ -114040,6 +123948,9 @@ catalog: value: SC-07(21) class: sp800-53a prose: 'boundary protection mechanisms are employed to isolate {{ insert: param, sc-07.21_odp.01 }} supporting {{ insert: param, sc-07.21_odp.02 }}.' + links: + - href: '#sc-7.21_smt' + rel: assessment-for - id: sc-7.21_asm-examine name: assessment-method props: @@ -114134,6 +124045,9 @@ catalog: value: SC-07(22) class: sp800-53a prose: separate network addresses are implemented to connect to systems in different security domains. + links: + - href: '#sc-7.22_smt' + rel: assessment-for - id: sc-7.22_asm-examine name: assessment-method props: @@ -114225,6 +124139,9 @@ catalog: value: SC-07(23) class: sp800-53a prose: feedback to senders is disabled on protocol format validation failure. + links: + - href: '#sc-7.23_smt' + rel: assessment-for - id: sc-7.23_asm-examine name: assessment-method props: @@ -114366,6 +124283,9 @@ catalog: value: SC-07(24)(a) class: sp800-53a prose: '{{ insert: param, sc-07.24_odp }} are applied to data elements of personally identifiable information on systems that process personally identifiable information;' + links: + - href: '#sc-7.24_smt.a' + rel: assessment-for - id: sc-7.24_obj.b name: assessment-objective props: @@ -114380,6 +124300,9 @@ catalog: value: SC-07(24)(b)[01] class: sp800-53a prose: permitted processing is monitored at the external interfaces to the systems that process personally identifiable information; + links: + - href: '#sc-7.24_smt.b' + rel: assessment-for - id: sc-7.24_obj.b-2 name: assessment-objective props: @@ -114387,6 +124310,12 @@ catalog: value: SC-07(24)(b)[02] class: sp800-53a prose: permitted processing is monitored at key internal boundaries within the systems that process personally identifiable information; + links: + - href: '#sc-7.24_smt.b' + rel: assessment-for + links: + - href: '#sc-7.24_smt.b' + rel: assessment-for - id: sc-7.24_obj.c name: assessment-objective props: @@ -114394,6 +124323,9 @@ catalog: value: SC-07(24)(c) class: sp800-53a prose: each processing exception is documented for systems that process personally identifiable information; + links: + - href: '#sc-7.24_smt.c' + rel: assessment-for - id: sc-7.24_obj.d name: assessment-objective props: @@ -114408,6 +124340,9 @@ catalog: value: SC-07(24)(d)[01] class: sp800-53a prose: exceptions for systems that process personally identifiable information are reviewed; + links: + - href: '#sc-7.24_smt.d' + rel: assessment-for - id: sc-7.24_obj.d-2 name: assessment-objective props: @@ -114415,6 +124350,15 @@ catalog: value: SC-07(24)(d)[02] class: sp800-53a prose: exceptions for systems that process personally identifiable information that are no longer supported are removed. + links: + - href: '#sc-7.24_smt.d' + rel: assessment-for + links: + - href: '#sc-7.24_smt.d' + rel: assessment-for + links: + - href: '#sc-7.24_smt' + rel: assessment-for - id: sc-7.24_asm-examine name: assessment-method props: @@ -114535,6 +124479,9 @@ catalog: value: SC-07(25) class: sp800-53a prose: 'the direct connection of {{ insert: param, sc-07.25_odp.01 }} to an external network without the use of {{ insert: param, sc-07.25_odp.02 }} is prohibited.' + links: + - href: '#sc-7.25_smt' + rel: assessment-for - id: sc-7.25_asm-examine name: assessment-method props: @@ -114637,6 +124584,9 @@ catalog: value: SC-07(26) class: sp800-53a prose: 'the direct connection of classified national security system to an external network without the use of a {{ insert: param, sc-07.26_odp }} is prohibited.' + links: + - href: '#sc-7.26_smt' + rel: assessment-for - id: sc-7.26_asm-examine name: assessment-method props: @@ -114752,6 +124702,9 @@ catalog: value: SC-07(27) class: sp800-53a prose: 'the direct connection of {{ insert: param, sc-07.27_odp.01 }} to an external network without the use of a {{ insert: param, sc-07.27_odp.02 }} is prohibited.' + links: + - href: '#sc-7.27_smt' + rel: assessment-for - id: sc-7.27_asm-examine name: assessment-method props: @@ -114854,6 +124807,9 @@ catalog: value: SC-07(28) class: sp800-53a prose: 'the direct connection of the {{ insert: param, sc-07.28_odp }} to a public network is prohibited.' + links: + - href: '#sc-7.28_smt' + rel: assessment-for - id: sc-7.28_asm-examine name: assessment-method props: @@ -114967,6 +124923,9 @@ catalog: value: SC-07(29) class: sp800-53a prose: 'subnetworks are separated {{ insert: param, sc-07.29_odp.01 }} to isolate {{ insert: param, sc-07.29_odp.02 }}.' + links: + - href: '#sc-7.29_smt' + rel: assessment-for - id: sc-7.29_asm-examine name: assessment-method props: @@ -115120,6 +125079,9 @@ catalog: value: SC-08 class: sp800-53a prose: 'the {{ insert: param, sc-08_odp }} of transmitted information is/are protected.' + links: + - href: '#sc-8_smt' + rel: assessment-for - id: sc-8_asm-examine name: assessment-method props: @@ -115223,6 +125185,9 @@ catalog: value: SC-08(01) class: sp800-53a prose: 'cryptographic mechanisms are implemented to {{ insert: param, sc-08.01_odp }} during transmission.' + links: + - href: '#sc-8.1_smt' + rel: assessment-for - id: sc-8.1_asm-examine name: assessment-method props: @@ -115333,6 +125298,9 @@ catalog: value: SC-08(02)[01] class: sp800-53a prose: 'information {{ insert: param, sc-08.02_odp }} is/are maintained during preparation for transmission;' + links: + - href: '#sc-8.2_smt' + rel: assessment-for - id: sc-8.2_obj-2 name: assessment-objective props: @@ -115340,6 +125308,12 @@ catalog: value: SC-08(02)[02] class: sp800-53a prose: 'information {{ insert: param, sc-08.02_odp }} is/are maintained during reception.' + links: + - href: '#sc-8.2_smt' + rel: assessment-for + links: + - href: '#sc-8.2_smt' + rel: assessment-for - id: sc-8.2_asm-examine name: assessment-method props: @@ -115440,6 +125414,9 @@ catalog: value: SC-08(03) class: sp800-53a prose: 'cryptographic mechanisms are implemented to protect message externals unless otherwise protected by {{ insert: param, sc-08.03_odp }}.' + links: + - href: '#sc-8.3_smt' + rel: assessment-for - id: sc-8.3_asm-examine name: assessment-method props: @@ -115545,6 +125522,9 @@ catalog: value: SC-08(04) class: sp800-53a prose: 'cryptographic mechanisms are implemented to conceal or randomize communication patterns unless otherwise protected by {{ insert: param, sc-08.04_odp }}.' + links: + - href: '#sc-8.4_smt' + rel: assessment-for - id: sc-8.4_asm-examine name: assessment-method props: @@ -115658,6 +125638,9 @@ catalog: value: SC-08(05) class: sp800-53a prose: 'the {{ insert: param, sc-08.05_odp.01 }} is implemented to {{ insert: param, sc-08.05_odp.02 }} during transmission.' + links: + - href: '#sc-8.5_smt' + rel: assessment-for - id: sc-8.5_asm-examine name: assessment-method props: @@ -115775,6 +125758,9 @@ catalog: value: SC-10 class: sp800-53a prose: 'the network connection associated with a communication session is terminated at the end of the session or after {{ insert: param, sc-10_odp }} of inactivity.' + links: + - href: '#sc-10_smt' + rel: assessment-for - id: sc-10_asm-examine name: assessment-method props: @@ -115914,6 +125900,9 @@ catalog: value: SC-11a. class: sp800-53a prose: 'a {{ insert: param, sc-11_odp.01 }} isolated trusted communication path is provided for communications between the user and the trusted components of the system;' + links: + - href: '#sc-11_smt.a' + rel: assessment-for - id: sc-11_obj.b name: assessment-objective props: @@ -115921,6 +125910,12 @@ catalog: value: SC-11b. class: sp800-53a prose: 'users are permitted to invoke the trusted communication path for communications between the user and the {{ insert: param, sc-11_odp.02 }} of the system, including authentication and re-authentication, at a minimum.' + links: + - href: '#sc-11_smt.b' + rel: assessment-for + links: + - href: '#sc-11_smt' + rel: assessment-for - id: sc-11_asm-examine name: assessment-method props: @@ -116044,6 +126039,9 @@ catalog: value: SC-11(01)(a) class: sp800-53a prose: a trusted communication path that is irrefutably distinguishable from other communication paths is provided; + links: + - href: '#sc-11.1_smt.a' + rel: assessment-for - id: sc-11.1_obj.b name: assessment-objective props: @@ -116051,6 +126049,12 @@ catalog: value: SC-11(01)(b) class: sp800-53a prose: 'the trusted communication path for communications between the {{ insert: param, sc-11.01_odp }} of the system and the user is initiated.' + links: + - href: '#sc-11.1_smt.b' + rel: assessment-for + links: + - href: '#sc-11.1_smt' + rel: assessment-for - id: sc-11.1_asm-examine name: assessment-method props: @@ -116173,6 +126177,8 @@ catalog: rel: related - href: '#ia-7' rel: related + - href: '#ia-13' + rel: related - href: '#sa-4' rel: related - href: '#sa-8' @@ -116220,6 +126226,9 @@ catalog: value: SC-12[01] class: sp800-53a prose: 'cryptographic keys are established when cryptography is employed within the system in accordance with {{ insert: param, sc-12_odp }};' + links: + - href: '#sc-12_smt' + rel: assessment-for - id: sc-12_obj-2 name: assessment-objective props: @@ -116227,6 +126236,12 @@ catalog: value: SC-12[02] class: sp800-53a prose: 'cryptographic keys are managed when cryptography is employed within the system in accordance with {{ insert: param, sc-12_odp }}.' + links: + - href: '#sc-12_smt' + rel: assessment-for + links: + - href: '#sc-12_smt' + rel: assessment-for - id: sc-12_asm-examine name: assessment-method props: @@ -116318,6 +126333,9 @@ catalog: value: SC-12(01) class: sp800-53a prose: information availability is maintained in the event of the loss of cryptographic keys by users. + links: + - href: '#sc-12.1_smt' + rel: assessment-for - id: sc-12.1_asm-examine name: assessment-method props: @@ -116425,6 +126443,9 @@ catalog: value: SC-12(02)[01] class: sp800-53a prose: 'symmetric cryptographic keys are produced using {{ insert: param, sc-12.02_odp }} key management technology and processes;' + links: + - href: '#sc-12.2_smt' + rel: assessment-for - id: sc-12.2_obj-2 name: assessment-objective props: @@ -116432,6 +126453,9 @@ catalog: value: SC-12(02)[02] class: sp800-53a prose: 'symmetric cryptographic keys are controlled using {{ insert: param, sc-12.02_odp }} key management technology and processes;' + links: + - href: '#sc-12.2_smt' + rel: assessment-for - id: sc-12.2_obj-3 name: assessment-objective props: @@ -116439,6 +126463,12 @@ catalog: value: SC-12(02)[03] class: sp800-53a prose: 'symmetric cryptographic keys are distributed using {{ insert: param, sc-12.02_odp }} key management technology and processes.' + links: + - href: '#sc-12.2_smt' + rel: assessment-for + links: + - href: '#sc-12.2_smt' + rel: assessment-for - id: sc-12.2_asm-examine name: assessment-method props: @@ -116555,6 +126585,9 @@ catalog: value: SC-12(03)[01] class: sp800-53a prose: 'asymmetric cryptographic keys are produced using {{ insert: param, sc-12.03_odp }};' + links: + - href: '#sc-12.3_smt' + rel: assessment-for - id: sc-12.3_obj-2 name: assessment-objective props: @@ -116562,6 +126595,9 @@ catalog: value: SC-12(03)[02] class: sp800-53a prose: 'asymmetric cryptographic keys are controlled using {{ insert: param, sc-12.03_odp }};' + links: + - href: '#sc-12.3_smt' + rel: assessment-for - id: sc-12.3_obj-3 name: assessment-objective props: @@ -116569,6 +126605,12 @@ catalog: value: SC-12(03)[03] class: sp800-53a prose: 'asymmetric cryptographic keys are distributed using {{ insert: param, sc-12.03_odp }}.' + links: + - href: '#sc-12.3_smt' + rel: assessment-for + links: + - href: '#sc-12.3_smt' + rel: assessment-for - id: sc-12.3_asm-examine name: assessment-method props: @@ -116697,6 +126739,9 @@ catalog: value: SC-12(06) class: sp800-53a prose: physical control of cryptographic keys is maintained when stored information is encrypted by external service providers. + links: + - href: '#sc-12.6_smt' + rel: assessment-for - id: sc-12.6_asm-examine name: assessment-method props: @@ -116818,6 +126863,8 @@ catalog: rel: related - href: '#ia-7' rel: related + - href: '#ia-13' + rel: related - href: '#ma-4' rel: related - href: '#mp-2' @@ -116881,6 +126928,9 @@ catalog: value: SC-13a. class: sp800-53a prose: '{{ insert: param, sc-13_odp.01 }} are identified;' + links: + - href: '#sc-13_smt.a' + rel: assessment-for - id: sc-13_obj.b name: assessment-objective props: @@ -116888,6 +126938,12 @@ catalog: value: SC-13b. class: sp800-53a prose: '{{ insert: param, sc-13_odp.02 }} for each specified cryptographic use (defined in SC-13_ODP[01]) are implemented.' + links: + - href: '#sc-13_smt.b' + rel: assessment-for + links: + - href: '#sc-13_smt' + rel: assessment-for - id: sc-13_asm-examine name: assessment-method props: @@ -117108,6 +127164,9 @@ catalog: value: SC-15a. class: sp800-53a prose: 'remote activation of collaborative computing devices and applications is prohibited except {{ insert: param, sc-15_odp }};' + links: + - href: '#sc-15_smt.a' + rel: assessment-for - id: sc-15_obj.b name: assessment-objective props: @@ -117115,6 +127174,12 @@ catalog: value: SC-15b. class: sp800-53a prose: an explicit indication of use is provided to users physically present at the devices. + links: + - href: '#sc-15_smt.b' + rel: assessment-for + links: + - href: '#sc-15_smt' + rel: assessment-for - id: sc-15_asm-examine name: assessment-method props: @@ -117221,6 +127286,9 @@ catalog: value: SC-15(01) class: sp800-53a prose: 'the {{ insert: param, sc-15.01_odp }} disconnect of collaborative computing devices is/are provided in a manner that supports ease of use.' + links: + - href: '#sc-15.1_smt' + rel: assessment-for - id: sc-15.1_asm-examine name: assessment-method props: @@ -117347,6 +127415,9 @@ catalog: value: SC-15(03) class: sp800-53a prose: 'collaborative computing devices and applications are disabled or removed from {{ insert: param, sc-15.03_odp.01 }} in {{ insert: param, sc-15.03_odp.02 }}.' + links: + - href: '#sc-15.3_smt' + rel: assessment-for - id: sc-15.3_asm-examine name: assessment-method props: @@ -117449,6 +127520,9 @@ catalog: value: SC-15(04) class: sp800-53a prose: 'an explicit indication of current participants in {{ insert: param, sc-15.04_odp }} is provided.' + links: + - href: '#sc-15.4_smt' + rel: assessment-for - id: sc-15.4_asm-examine name: assessment-method props: @@ -117577,6 +127651,9 @@ catalog: value: SC-16[01] class: sp800-53a prose: '{{ insert: param, sc-16_odp.01 }} are associated with information exchanged between systems;' + links: + - href: '#sc-16_smt' + rel: assessment-for - id: sc-16_obj-2 name: assessment-objective props: @@ -117584,6 +127661,9 @@ catalog: value: SC-16[02] class: sp800-53a prose: '{{ insert: param, sc-16_odp.01 }} are associated with information exchanged between system components;' + links: + - href: '#sc-16_smt' + rel: assessment-for - id: sc-16_obj-3 name: assessment-objective props: @@ -117591,6 +127671,9 @@ catalog: value: SC-16[03] class: sp800-53a prose: '{{ insert: param, sc-16_odp.02 }} are associated with information exchanged between systems;' + links: + - href: '#sc-16_smt' + rel: assessment-for - id: sc-16_obj-4 name: assessment-objective props: @@ -117598,6 +127681,12 @@ catalog: value: SC-16[04] class: sp800-53a prose: '{{ insert: param, sc-16_odp.02 }} are associated with information exchanged between system components.' + links: + - href: '#sc-16_smt' + rel: assessment-for + links: + - href: '#sc-16_smt' + rel: assessment-for - id: sc-16_asm-examine name: assessment-method props: @@ -117699,6 +127788,9 @@ catalog: value: SC-16(01)[01] class: sp800-53a prose: the integrity of transmitted security attributes is verified; + links: + - href: '#sc-16.1_smt' + rel: assessment-for - id: sc-16.1_obj-2 name: assessment-objective props: @@ -117706,6 +127798,12 @@ catalog: value: SC-16(01)[02] class: sp800-53a prose: the integrity of transmitted privacy attributes is verified. + links: + - href: '#sc-16.1_smt' + rel: assessment-for + links: + - href: '#sc-16.1_smt' + rel: assessment-for - id: sc-16.1_asm-examine name: assessment-method props: @@ -117799,6 +127897,9 @@ catalog: value: SC-16(02) class: sp800-53a prose: anti-spoofing mechanisms are implemented to prevent adversaries from falsifying the security attributes indicating the successful application of the security process. + links: + - href: '#sc-16.2_smt' + rel: assessment-for - id: sc-16.2_asm-examine name: assessment-method props: @@ -117901,6 +128002,9 @@ catalog: value: SC-16(03) class: sp800-53a prose: '{{ insert: param, sc-16.03_odp }} are implemented to bind security and privacy attributes to transmitted information.' + links: + - href: '#sc-16.3_smt' + rel: assessment-for - id: sc-16.3_asm-examine name: assessment-method props: @@ -118033,6 +128137,9 @@ catalog: value: SC-17a. class: sp800-53a prose: 'public key certificates are issued under {{ insert: param, sc-17_odp }} , or public key certificates are obtained from an approved service provider;' + links: + - href: '#sc-17_smt.a' + rel: assessment-for - id: sc-17_obj.b name: assessment-objective props: @@ -118040,6 +128147,12 @@ catalog: value: SC-17b. class: sp800-53a prose: only approved trust anchors are included in trust stores or certificate stores managed by the organization. + links: + - href: '#sc-17_smt.b' + rel: assessment-for + links: + - href: '#sc-17_smt' + rel: assessment-for - id: sc-17_asm-examine name: assessment-method props: @@ -118161,6 +128274,9 @@ catalog: value: SC-18a.[01] class: sp800-53a prose: acceptable mobile code is defined; + links: + - href: '#sc-18_smt.a' + rel: assessment-for - id: sc-18_obj.a-2 name: assessment-objective props: @@ -118168,6 +128284,9 @@ catalog: value: SC-18a.[02] class: sp800-53a prose: unacceptable mobile code is defined; + links: + - href: '#sc-18_smt.a' + rel: assessment-for - id: sc-18_obj.a-3 name: assessment-objective props: @@ -118175,6 +128294,9 @@ catalog: value: SC-18a.[03] class: sp800-53a prose: acceptable mobile code technologies are defined; + links: + - href: '#sc-18_smt.a' + rel: assessment-for - id: sc-18_obj.a-4 name: assessment-objective props: @@ -118182,6 +128304,12 @@ catalog: value: SC-18a.[04] class: sp800-53a prose: unacceptable mobile code technologies are defined; + links: + - href: '#sc-18_smt.a' + rel: assessment-for + links: + - href: '#sc-18_smt.a' + rel: assessment-for - id: sc-18_obj.b name: assessment-objective props: @@ -118196,6 +128324,9 @@ catalog: value: SC-18b.[01] class: sp800-53a prose: the use of mobile code is authorized within the system; + links: + - href: '#sc-18_smt.b' + rel: assessment-for - id: sc-18_obj.b-2 name: assessment-objective props: @@ -118203,6 +128334,9 @@ catalog: value: SC-18b.[02] class: sp800-53a prose: the use of mobile code is monitored within the system; + links: + - href: '#sc-18_smt.b' + rel: assessment-for - id: sc-18_obj.b-3 name: assessment-objective props: @@ -118210,6 +128344,15 @@ catalog: value: SC-18b.[03] class: sp800-53a prose: the use of mobile code is controlled within the system. + links: + - href: '#sc-18_smt.b' + rel: assessment-for + links: + - href: '#sc-18_smt.b' + rel: assessment-for + links: + - href: '#sc-18_smt' + rel: assessment-for - id: sc-18_asm-examine name: assessment-method props: @@ -118335,6 +128478,9 @@ catalog: value: SC-18(01)[01] class: sp800-53a prose: '{{ insert: param, sc-18.01_odp.01 }} is identified;' + links: + - href: '#sc-18.1_smt' + rel: assessment-for - id: sc-18.1_obj-2 name: assessment-objective props: @@ -118342,6 +128488,12 @@ catalog: value: SC-18(01)[02] class: sp800-53a prose: '{{ insert: param, sc-18.01_odp.02 }} are taken if unacceptable mobile code is identified.' + links: + - href: '#sc-18.1_smt' + rel: assessment-for + links: + - href: '#sc-18.1_smt' + rel: assessment-for - id: sc-18.1_asm-examine name: assessment-method props: @@ -118457,6 +128609,9 @@ catalog: value: SC-18(02)[01] class: sp800-53a prose: 'the acquisition of mobile code to be deployed in the system meets {{ insert: param, sc-18.02_odp }};' + links: + - href: '#sc-18.2_smt' + rel: assessment-for - id: sc-18.2_obj-2 name: assessment-objective props: @@ -118464,6 +128619,9 @@ catalog: value: SC-18(02)[02] class: sp800-53a prose: 'the development of mobile code to be deployed in the system meets {{ insert: param, sc-18.02_odp }};' + links: + - href: '#sc-18.2_smt' + rel: assessment-for - id: sc-18.2_obj-3 name: assessment-objective props: @@ -118471,6 +128629,12 @@ catalog: value: SC-18(02)[03] class: sp800-53a prose: 'the use of mobile code to be deployed in the system meets {{ insert: param, sc-18.02_odp }}.' + links: + - href: '#sc-18.2_smt' + rel: assessment-for + links: + - href: '#sc-18.2_smt' + rel: assessment-for - id: sc-18.2_asm-examine name: assessment-method props: @@ -118582,6 +128746,9 @@ catalog: value: SC-18(03)[01] class: sp800-53a prose: 'the download of {{ insert: param, sc-18.03_odp }} is prevented;' + links: + - href: '#sc-18.3_smt' + rel: assessment-for - id: sc-18.3_obj-2 name: assessment-objective props: @@ -118589,6 +128756,12 @@ catalog: value: SC-18(03)[02] class: sp800-53a prose: 'the execution of {{ insert: param, sc-18.03_odp }} is prevented.' + links: + - href: '#sc-18.3_smt' + rel: assessment-for + links: + - href: '#sc-18.3_smt' + rel: assessment-for - id: sc-18.3_asm-examine name: assessment-method props: @@ -118708,6 +128881,9 @@ catalog: value: SC-18(04)[01] class: sp800-53a prose: 'the automatic execution of mobile code in {{ insert: param, sc-18.04_odp.01 }} is prevented;' + links: + - href: '#sc-18.4_smt' + rel: assessment-for - id: sc-18.4_obj-2 name: assessment-objective props: @@ -118715,6 +128891,12 @@ catalog: value: SC-18(04)[02] class: sp800-53a prose: '{{ insert: param, sc-18.04_odp.02 }} are enforced prior to executing mobile code.' + links: + - href: '#sc-18.4_smt' + rel: assessment-for + links: + - href: '#sc-18.4_smt' + rel: assessment-for - id: sc-18.4_asm-examine name: assessment-method props: @@ -118815,6 +128997,9 @@ catalog: value: SC-18(05) class: sp800-53a prose: execution of permitted mobile code is allowed only in confined virtual machine environments. + links: + - href: '#sc-18.5_smt' + rel: assessment-for - id: sc-18.5_asm-examine name: assessment-method props: @@ -118967,6 +129152,9 @@ catalog: value: SC-20a.[01] class: sp800-53a prose: additional data origin authentication is provided along with the authoritative name resolution data that the system returns in response to external name/address resolution queries; + links: + - href: '#sc-20_smt.a' + rel: assessment-for - id: sc-20_obj.a-2 name: assessment-objective props: @@ -118974,6 +129162,12 @@ catalog: value: SC-20a.[02] class: sp800-53a prose: integrity verification artifacts are provided along with the authoritative name resolution data that the system returns in response to external name/address resolution queries; + links: + - href: '#sc-20_smt.a' + rel: assessment-for + links: + - href: '#sc-20_smt.a' + rel: assessment-for - id: sc-20_obj.b name: assessment-objective props: @@ -118988,6 +129182,9 @@ catalog: value: SC-20b.[01] class: sp800-53a prose: the means to indicate the security status of child zones (and if the child supports secure resolution services) is provided when operating as part of a distributed, hierarchical namespace; + links: + - href: '#sc-20_smt.b' + rel: assessment-for - id: sc-20_obj.b-2 name: assessment-objective props: @@ -118995,6 +129192,15 @@ catalog: value: SC-20b.[02] class: sp800-53a prose: the means to enable verification of a chain of trust among parent and child domains when operating as part of a distributed, hierarchical namespace is provided. + links: + - href: '#sc-20_smt.b' + rel: assessment-for + links: + - href: '#sc-20_smt.b' + rel: assessment-for + links: + - href: '#sc-20_smt' + rel: assessment-for - id: sc-20_asm-examine name: assessment-method props: @@ -119102,6 +129308,9 @@ catalog: value: SC-20(02)[01] class: sp800-53a prose: data origin artifacts are provided for internal name/address resolution queries; + links: + - href: '#sc-20.2_smt' + rel: assessment-for - id: sc-20.2_obj-2 name: assessment-objective props: @@ -119109,6 +129318,12 @@ catalog: value: SC-20(02)[02] class: sp800-53a prose: integrity protection artifacts are provided for internal name/address resolution queries. + links: + - href: '#sc-20.2_smt' + rel: assessment-for + links: + - href: '#sc-20.2_smt' + rel: assessment-for - id: sc-20.2_asm-examine name: assessment-method props: @@ -119205,6 +129420,9 @@ catalog: value: SC-21[01] class: sp800-53a prose: data origin authentication is requested for the name/address resolution responses that the system receives from authoritative sources; + links: + - href: '#sc-21_smt' + rel: assessment-for - id: sc-21_obj-2 name: assessment-objective props: @@ -119212,6 +129430,9 @@ catalog: value: SC-21[02] class: sp800-53a prose: data origin authentication is performed on the name/address resolution responses that the system receives from authoritative sources; + links: + - href: '#sc-21_smt' + rel: assessment-for - id: sc-21_obj-3 name: assessment-objective props: @@ -119219,6 +129440,9 @@ catalog: value: SC-21[03] class: sp800-53a prose: data integrity verification is requested for the name/address resolution responses that the system receives from authoritative sources; + links: + - href: '#sc-21_smt' + rel: assessment-for - id: sc-21_obj-4 name: assessment-objective props: @@ -119226,6 +129450,12 @@ catalog: value: SC-21[04] class: sp800-53a prose: data integrity verification is performed on the name/address resolution responses that the system receives from authoritative sources. + links: + - href: '#sc-21_smt' + rel: assessment-for + links: + - href: '#sc-21_smt' + rel: assessment-for - id: sc-21_asm-examine name: assessment-method props: @@ -119343,6 +129573,9 @@ catalog: value: SC-22[01] class: sp800-53a prose: the systems that collectively provide name/address resolution services for an organization are fault-tolerant; + links: + - href: '#sc-22_smt' + rel: assessment-for - id: sc-22_obj-2 name: assessment-objective props: @@ -119350,6 +129583,9 @@ catalog: value: SC-22[02] class: sp800-53a prose: the systems that collectively provide name/address resolution services for an organization implement internal role separation; + links: + - href: '#sc-22_smt' + rel: assessment-for - id: sc-22_obj-3 name: assessment-objective props: @@ -119357,6 +129593,12 @@ catalog: value: SC-22[03] class: sp800-53a prose: the systems that collectively provide name/address resolution services for an organization implement external role separation. + links: + - href: '#sc-22_smt' + rel: assessment-for + links: + - href: '#sc-22_smt' + rel: assessment-for - id: sc-22_asm-examine name: assessment-method props: @@ -119460,6 +129702,9 @@ catalog: value: SC-23 class: sp800-53a prose: the authenticity of communication sessions is protected. + links: + - href: '#sc-23_smt' + rel: assessment-for - id: sc-23_asm-examine name: assessment-method props: @@ -119544,6 +129789,9 @@ catalog: value: SC-23(01) class: sp800-53a prose: session identifiers are invalidated upon user logout or other session termination. + links: + - href: '#sc-23.1_smt' + rel: assessment-for - id: sc-23.1_asm-examine name: assessment-method props: @@ -119667,6 +129915,9 @@ catalog: value: SC-23(03)[01] class: sp800-53a prose: 'a unique session identifier is generated for each session with {{ insert: param, sc-23.03_odp }};' + links: + - href: '#sc-23.3_smt' + rel: assessment-for - id: sc-23.3_obj-2 name: assessment-objective props: @@ -119674,6 +129925,12 @@ catalog: value: SC-23(03)[02] class: sp800-53a prose: only system-generated session identifiers are recognized. + links: + - href: '#sc-23.3_smt' + rel: assessment-for + links: + - href: '#sc-23.3_smt' + rel: assessment-for - id: sc-23.3_asm-examine name: assessment-method props: @@ -119794,6 +130051,9 @@ catalog: value: SC-23(05) class: sp800-53a prose: 'only the use of {{ insert: param, sc-23.05_odp }} for verification of the establishment of protected sessions is allowed.' + links: + - href: '#sc-23.5_smt' + rel: assessment-for - id: sc-23.5_asm-examine name: assessment-method props: @@ -119930,6 +130190,9 @@ catalog: value: SC-24 class: sp800-53a prose: '{{ insert: param, sc-24_odp.01 }} fail to a {{ insert: param, sc-24_odp.02 }} while preserving {{ insert: param, sc-24_odp.03 }} in failure.' + links: + - href: '#sc-24_smt' + rel: assessment-for - id: sc-24_asm-examine name: assessment-method props: @@ -120042,6 +130305,9 @@ catalog: value: SC-25[01] class: sp800-53a prose: 'minimal functionality for {{ insert: param, sc-25_odp }} is employed;' + links: + - href: '#sc-25_smt' + rel: assessment-for - id: sc-25_obj-2 name: assessment-objective props: @@ -120049,6 +130315,12 @@ catalog: value: SC-25[02] class: sp800-53a prose: 'minimal information storage on {{ insert: param, sc-25_odp }} is allocated.' + links: + - href: '#sc-25_smt' + rel: assessment-for + links: + - href: '#sc-25_smt' + rel: assessment-for - id: sc-25_asm-examine name: assessment-method props: @@ -120151,6 +130423,9 @@ catalog: value: SC-26[01] class: sp800-53a prose: components within organizational systems specifically designed to be the target of malicious attacks are included to detect such attacks; + links: + - href: '#sc-26_smt' + rel: assessment-for - id: sc-26_obj-2 name: assessment-objective props: @@ -120158,6 +130433,9 @@ catalog: value: SC-26[02] class: sp800-53a prose: components within organizational systems specifically designed to be the target of malicious attacks are included to deflect such attacks; + links: + - href: '#sc-26_smt' + rel: assessment-for - id: sc-26_obj-3 name: assessment-objective props: @@ -120165,6 +130443,12 @@ catalog: value: SC-26[03] class: sp800-53a prose: components within organizational systems specifically designed to be the target of malicious attacks are included to analyze such attacks. + links: + - href: '#sc-26_smt' + rel: assessment-for + links: + - href: '#sc-26_smt' + rel: assessment-for - id: sc-26_asm-examine name: assessment-method props: @@ -120278,6 +130562,9 @@ catalog: value: SC-27 class: sp800-53a prose: '{{ insert: param, sc-27_odp }} are included within organizational systems.' + links: + - href: '#sc-27_smt' + rel: assessment-for - id: sc-27_asm-examine name: assessment-method props: @@ -120442,6 +130729,9 @@ catalog: value: SC-28 class: sp800-53a prose: 'the {{ insert: param, sc-28_odp.01 }} of {{ insert: param, sc-28_odp.02 }} is/are protected.' + links: + - href: '#sc-28_smt' + rel: assessment-for - id: sc-28_asm-examine name: assessment-method props: @@ -120564,6 +130854,9 @@ catalog: value: SC-28(01)[01] class: sp800-53a prose: 'cryptographic mechanisms are implemented to prevent unauthorized disclosure of {{ insert: param, sc-28.01_odp.01 }} at rest on {{ insert: param, sc-28.01_odp.02 }};' + links: + - href: '#sc-28.1_smt' + rel: assessment-for - id: sc-28.1_obj-2 name: assessment-objective props: @@ -120571,6 +130864,12 @@ catalog: value: SC-28(01)[02] class: sp800-53a prose: 'cryptographic mechanisms are implemented to prevent unauthorized modification of {{ insert: param, sc-28.01_odp.01 }} at rest on {{ insert: param, sc-28.01_odp.02 }}.' + links: + - href: '#sc-28.1_smt' + rel: assessment-for + links: + - href: '#sc-28.1_smt' + rel: assessment-for - id: sc-28.1_asm-examine name: assessment-method props: @@ -120676,6 +130975,9 @@ catalog: value: SC-28(02)[01] class: sp800-53a prose: '{{ insert: param, sc-28.02_odp }} is removed from online storage;' + links: + - href: '#sc-28.2_smt' + rel: assessment-for - id: sc-28.2_obj-2 name: assessment-objective props: @@ -120683,6 +130985,12 @@ catalog: value: SC-28(02)[02] class: sp800-53a prose: '{{ insert: param, sc-28.02_odp }} is stored offline in a secure location.' + links: + - href: '#sc-28.2_smt' + rel: assessment-for + links: + - href: '#sc-28.2_smt' + rel: assessment-for - id: sc-28.2_asm-examine name: assessment-method props: @@ -120802,6 +131110,9 @@ catalog: value: SC-28(03) class: sp800-53a prose: 'protected storage for cryptographic keys is provided using {{ insert: param, sc-28.03_odp.01 }}.' + links: + - href: '#sc-28.3_smt' + rel: assessment-for - id: sc-28.3_asm-examine name: assessment-method props: @@ -120909,6 +131220,9 @@ catalog: value: SC-29 class: sp800-53a prose: 'a diverse set of information technologies is employed for {{ insert: param, sc-29_odp }} in the implementation of the system.' + links: + - href: '#sc-29_smt' + rel: assessment-for - id: sc-29_asm-examine name: assessment-method props: @@ -121011,6 +131325,9 @@ catalog: value: SC-29(01) class: sp800-53a prose: 'virtualization techniques are employed to support the deployment of a diverse range of operating systems and applications that are changed {{ insert: param, sc-29.01_odp }}.' + links: + - href: '#sc-29.1_smt' + rel: assessment-for - id: sc-29.1_asm-examine name: assessment-method props: @@ -121151,6 +131468,9 @@ catalog: value: SC-30 class: sp800-53a prose: '{{ insert: param, sc-30_odp.01 }} are employed for {{ insert: param, sc-30_odp.02 }} for {{ insert: param, sc-30_odp.03 }} to confuse and mislead adversaries.' + links: + - href: '#sc-30_smt' + rel: assessment-for - id: sc-30_asm-examine name: assessment-method props: @@ -121271,6 +131591,9 @@ catalog: value: SC-30(02) class: sp800-53a prose: '{{ insert: param, sc-30.02_odp }} are employed to introduce randomness into organizational operations and assets.' + links: + - href: '#sc-30.2_smt' + rel: assessment-for - id: sc-30.2_asm-examine name: assessment-method props: @@ -121395,6 +131718,9 @@ catalog: value: SC-30(03) class: sp800-53a prose: 'the location of {{ insert: param, sc-30.03_odp.01 }} is changed {{ insert: param, sc-30.03_odp.02 }}.' + links: + - href: '#sc-30.3_smt' + rel: assessment-for - id: sc-30.3_asm-examine name: assessment-method props: @@ -121498,6 +131824,9 @@ catalog: value: SC-30(04) class: sp800-53a prose: 'realistic but misleading information about the security state or posture of {{ insert: param, sc-30.04_odp }} is employed.' + links: + - href: '#sc-30.4_smt' + rel: assessment-for - id: sc-30.4_asm-examine name: assessment-method props: @@ -121609,6 +131938,9 @@ catalog: value: SC-30(05) class: sp800-53a prose: '{{ insert: param, sc-30.05_odp.01 }} are employed to hide or conceal {{ insert: param, sc-30.05_odp.02 }}.' + links: + - href: '#sc-30.5_smt' + rel: assessment-for - id: sc-30.5_asm-examine name: assessment-method props: @@ -121739,6 +132071,9 @@ catalog: value: SC-31a. class: sp800-53a prose: 'a covert channel analysis is performed to identify those aspects of communications within the system that are potential avenues for covert {{ insert: param, sc-31_odp }} channels;' + links: + - href: '#sc-31_smt.a' + rel: assessment-for - id: sc-31_obj.b name: assessment-objective props: @@ -121746,6 +132081,12 @@ catalog: value: SC-31b. class: sp800-53a prose: the maximum bandwidth of those channels is estimated. + links: + - href: '#sc-31_smt.b' + rel: assessment-for + links: + - href: '#sc-31_smt' + rel: assessment-for - id: sc-31_asm-examine name: assessment-method props: @@ -121844,6 +132185,9 @@ catalog: value: SC-31(01) class: sp800-53a prose: a subset of the identified covert channels is tested to determine the channels that are exploitable. + links: + - href: '#sc-31.1_smt' + rel: assessment-for - id: sc-31.1_asm-examine name: assessment-method props: @@ -121962,6 +132306,9 @@ catalog: value: SC-31(02) class: sp800-53a prose: 'the maximum bandwidth for identified covert {{ insert: param, sc-31.02_odp.01 }} channels is reduced to {{ insert: param, sc-31.02_odp.02 }}.' + links: + - href: '#sc-31.2_smt' + rel: assessment-for - id: sc-31.2_asm-examine name: assessment-method props: @@ -122074,6 +132421,9 @@ catalog: value: SC-31(03) class: sp800-53a prose: 'the bandwidth of {{ insert: param, sc-31.03_odp }} is measured in the operational environment of the system.' + links: + - href: '#sc-31.3_smt' + rel: assessment-for - id: sc-31.3_asm-examine name: assessment-method props: @@ -122225,6 +132575,9 @@ catalog: value: SC-32 class: sp800-53a prose: 'the system is partitioned into {{ insert: param, sc-32_odp.01 }} residing in separate {{ insert: param, sc-32_odp.02 }} domains or environments based on {{ insert: param, sc-32_odp.03 }}.' + links: + - href: '#sc-32_smt' + rel: assessment-for - id: sc-32_asm-examine name: assessment-method props: @@ -122325,6 +132678,9 @@ catalog: value: SC-32(01) class: sp800-53a prose: privileged functions are partitioned into separate physical domains. + links: + - href: '#sc-32.1_smt' + rel: assessment-for - id: sc-32.1_asm-examine name: assessment-method props: @@ -122482,6 +132838,9 @@ catalog: value: SC-34a. class: sp800-53a prose: 'the operating environment for {{ insert: param, sc-34_odp.01 }} is loaded and executed from hardware-enforced, read-only media;' + links: + - href: '#sc-34_smt.a' + rel: assessment-for - id: sc-34_obj.b name: assessment-objective props: @@ -122489,6 +132848,12 @@ catalog: value: SC-34b. class: sp800-53a prose: '{{ insert: param, sc-34_odp.02 }} for {{ insert: param, sc-34_odp.01 }} are loaded and executed from hardware-enforced, read-only media.' + links: + - href: '#sc-34_smt.b' + rel: assessment-for + links: + - href: '#sc-34_smt' + rel: assessment-for - id: sc-34_asm-examine name: assessment-method props: @@ -122610,6 +132975,9 @@ catalog: value: SC-34(01) class: sp800-53a prose: '{{ insert: param, sc-34.01_odp }} are employed with no writeable storage that is persistent across component restart or power on/off.' + links: + - href: '#sc-34.1_smt' + rel: assessment-for - id: sc-34.1_asm-examine name: assessment-method props: @@ -122730,6 +133098,9 @@ catalog: value: SC-34(02)[01] class: sp800-53a prose: the integrity of information is protected prior to storage on read-only media; + links: + - href: '#sc-34.2_smt' + rel: assessment-for - id: sc-34.2_obj-2 name: assessment-objective props: @@ -122737,6 +133108,12 @@ catalog: value: SC-34(02)[02] class: sp800-53a prose: the media is controlled after such information has been recorded onto the media; + links: + - href: '#sc-34.2_smt' + rel: assessment-for + links: + - href: '#sc-34.2_smt' + rel: assessment-for - id: sc-34.2_asm-examine name: assessment-method props: @@ -122850,6 +133227,9 @@ catalog: value: SC-35 class: sp800-53a prose: system components that proactively seek to identify network-based malicious code or malicious websites are included. + links: + - href: '#sc-35_smt' + rel: assessment-for - id: sc-35_asm-examine name: assessment-method props: @@ -123013,6 +133393,9 @@ catalog: value: SC-36[01] class: sp800-53a prose: '{{ insert: param, sc-36_odp.01 }} are distributed across {{ insert: param, sc-36_odp.02 }};' + links: + - href: '#sc-36_smt' + rel: assessment-for - id: sc-36_obj-2 name: assessment-objective props: @@ -123020,6 +133403,12 @@ catalog: value: SC-36[02] class: sp800-53a prose: '{{ insert: param, sc-36_odp.03 }} are distributed across {{ insert: param, sc-36_odp.04 }}.' + links: + - href: '#sc-36_smt' + rel: assessment-for + links: + - href: '#sc-36_smt' + rel: assessment-for - id: sc-36_asm-examine name: assessment-method props: @@ -123168,6 +133557,9 @@ catalog: value: SC-36(01)(a) class: sp800-53a prose: 'polling techniques are employed to identify potential faults, errors, or compromises to {{ insert: param, sc-36.01_odp.01 }};' + links: + - href: '#sc-36.1_smt.a' + rel: assessment-for - id: sc-36.1_obj.b name: assessment-objective props: @@ -123175,6 +133567,12 @@ catalog: value: SC-36(01)(b) class: sp800-53a prose: '{{ insert: param, sc-36.01_odp.02 }} are taken in response to identified faults, errors, or compromise.' + links: + - href: '#sc-36.1_smt.b' + rel: assessment-for + links: + - href: '#sc-36.1_smt' + rel: assessment-for - id: sc-36.1_asm-examine name: assessment-method props: @@ -123282,6 +133680,9 @@ catalog: value: SC-36(02) class: sp800-53a prose: '{{ insert: param, sc-36.02_odp }} are synchronized.' + links: + - href: '#sc-36.2_smt' + rel: assessment-for - id: sc-36.2_asm-examine name: assessment-method props: @@ -123427,7 +133828,7 @@ catalog: prose: 'Employ the following out-of-band channels for the physical delivery or electronic transmission of {{ insert: param, sc-37_odp.02 }} to {{ insert: param, sc-37_odp.03 }}: {{ insert: param, sc-37_odp.01 }}.' - id: sc-37_gdn name: guidance - prose: Out-of-band channels include local, non-network accesses to systems; network paths physically separate from network paths used for operational traffic; or non-electronic paths, such as the U.S. Postal Service. The use of out-of-band channels is contrasted with the use of in-band channels (i.e., the same channels) that carry routine operational traffic. Out-of-band channels do not have the same vulnerability or exposure as in-band channels. Therefore, the confidentiality, integrity, or availability compromises of in-band channels will not compromise or adversely affect the out-of-band channels. Organizations may employ out-of-band channels in the delivery or transmission of organizational items, including authenticators and credentials; cryptographic key management information; system and data backups; configuration management changes for hardware, firmware, or software; security updates; maintenance information; and malicious code protection updates. + prose: Out-of-band channels include local, non-network accesses to systems; network paths physically separate from network paths used for operational traffic; or non-electronic paths, such as the U.S. Postal Service. The use of out-of-band channels is contrasted with the use of in-band channels (i.e., the same channels) that carry routine operational traffic. Out-of-band channels do not have the same vulnerability or exposure as in-band channels. Therefore, the confidentiality, integrity, or availability compromises of in-band channels will not compromise or adversely affect the out-of-band channels. Organizations may employ out-of-band channels in the delivery or transmission of organizational items, including authenticators and credentials; cryptographic key management information; system and data backups; configuration management changes for hardware, firmware, or software; security updates; maintenance information; and malicious code protection updates. For example, cryptographic keys for encrypted files are delivered using a different channel than the file. - id: sc-37_obj name: assessment-objective props: @@ -123435,6 +133836,9 @@ catalog: value: SC-37 class: sp800-53a prose: '{{ insert: param, sc-37_odp.01 }} are employed for the physical delivery or electronic transmission of {{ insert: param, sc-37_odp.02 }} to {{ insert: param, sc-37_odp.03 }}.' + links: + - href: '#sc-37_smt' + rel: assessment-for - id: sc-37_asm-examine name: assessment-method props: @@ -123576,6 +133980,9 @@ catalog: value: SC-37(01) class: sp800-53a prose: '{{ insert: param, sc-37.01_odp.01 }} are employed to ensure that only {{ insert: param, sc-37.01_odp.02 }} receive {{ insert: param, sc-37.01_odp.03 }}.' + links: + - href: '#sc-37.1_smt' + rel: assessment-for - id: sc-37.1_asm-examine name: assessment-method props: @@ -123716,6 +134123,9 @@ catalog: value: SC-38 class: sp800-53a prose: '{{ insert: param, sc-38_odp }} are employed to protect key organizational information throughout the system development life cycle.' + links: + - href: '#sc-38_smt' + rel: assessment-for - id: sc-38_asm-examine name: assessment-method props: @@ -123833,6 +134243,9 @@ catalog: value: SC-39 class: sp800-53a prose: a separate execution domain is maintained for each executing system process. + links: + - href: '#sc-39_smt' + rel: assessment-for - id: sc-39_asm-examine name: assessment-method props: @@ -123916,6 +134329,9 @@ catalog: value: SC-39(01) class: sp800-53a prose: hardware separation is implemented to facilitate process isolation. + links: + - href: '#sc-39.1_smt' + rel: assessment-for - id: sc-39.1_asm-examine name: assessment-method props: @@ -124021,6 +134437,9 @@ catalog: value: SC-39(02) class: sp800-53a prose: 'a separate execution domain is maintained for each thread in {{ insert: param, sc-39.02_odp }}.' + links: + - href: '#sc-39.2_smt' + rel: assessment-for - id: sc-39.2_asm-examine name: assessment-method props: @@ -124176,6 +134595,9 @@ catalog: value: SC-40[01] class: sp800-53a prose: 'external {{ insert: param, sc-40_odp.01 }} are protected from {{ insert: param, sc-40_odp.02 }}.' + links: + - href: '#sc-40_smt' + rel: assessment-for - id: sc-40_obj-2 name: assessment-objective props: @@ -124183,6 +134605,12 @@ catalog: value: SC-40[02] class: sp800-53a prose: 'internal {{ insert: param, sc-40_odp.03 }} are protected from {{ insert: param, sc-40_odp.04 }}.' + links: + - href: '#sc-40_smt' + rel: assessment-for + links: + - href: '#sc-40_smt' + rel: assessment-for - id: sc-40_asm-examine name: assessment-method props: @@ -124300,6 +134728,9 @@ catalog: value: SC-40(01) class: sp800-53a prose: 'cryptographic mechanisms that achieve {{ insert: param, sc-40.01_odp }} against the effects of intentional electromagnetic interference are implemented.' + links: + - href: '#sc-40.1_smt' + rel: assessment-for - id: sc-40.1_asm-examine name: assessment-method props: @@ -124414,6 +134845,9 @@ catalog: value: SC-40(02) class: sp800-53a prose: 'cryptographic mechanisms to reduce the detection potential of wireless links to {{ insert: param, sc-40.02_odp }} are implemented.' + links: + - href: '#sc-40.2_smt' + rel: assessment-for - id: sc-40.2_asm-examine name: assessment-method props: @@ -124519,6 +134953,9 @@ catalog: value: SC-40(03) class: sp800-53a prose: cryptographic mechanisms are implemented to identify and reject wireless transmissions that are deliberate attempts to achieve imitative or manipulative communications deception based on signal parameters. + links: + - href: '#sc-40.3_smt' + rel: assessment-for - id: sc-40.3_asm-examine name: assessment-method props: @@ -124629,6 +135066,9 @@ catalog: value: SC-40(04) class: sp800-53a prose: 'cryptographic mechanisms are implemented to prevent the identification of {{ insert: param, sc-40.04_odp }} by using the transmitter signal parameters.' + links: + - href: '#sc-40.4_smt' + rel: assessment-for - id: sc-40.4_asm-examine name: assessment-method props: @@ -124761,6 +135201,9 @@ catalog: value: SC-41 class: sp800-53a prose: '{{ insert: param, sc-41_odp.01 }} are {{ insert: param, sc-41_odp.02 }} disabled or removed on {{ insert: param, sc-41_odp.03 }}.' + links: + - href: '#sc-41_smt' + rel: assessment-for - id: sc-41_asm-examine name: assessment-method props: @@ -124928,6 +135371,9 @@ catalog: value: SC-42a. class: sp800-53a prose: '{{ insert: param, sc-42_odp.01 }} is/are prohibited;' + links: + - href: '#sc-42_smt.a' + rel: assessment-for - id: sc-42_obj.b name: assessment-objective props: @@ -124935,6 +135381,12 @@ catalog: value: SC-42b. class: sp800-53a prose: 'an explicit indication of sensor use is provided to {{ insert: param, sc-42_odp.05 }}.' + links: + - href: '#sc-42_smt.b' + rel: assessment-for + links: + - href: '#sc-42_smt' + rel: assessment-for - id: sc-42_asm-examine name: assessment-method props: @@ -125045,6 +135497,9 @@ catalog: value: SC-42(01) class: sp800-53a prose: 'the system is configured so that data or information collected by the {{ insert: param, sc-42.01_odp }} is only reported to authorized individuals or roles.' + links: + - href: '#sc-42.1_smt' + rel: assessment-for - id: sc-42.1_asm-examine name: assessment-method props: @@ -125160,6 +135615,9 @@ catalog: value: SC-42(02) class: sp800-53a prose: '{{ insert: param, sc-42.02_odp }} are employed so that data or information collected by {{ insert: param, sc-42.01_odp }} is only used for authorized purposes.' + links: + - href: '#sc-42.2_smt' + rel: assessment-for - id: sc-42.2_asm-examine name: assessment-method props: @@ -125303,6 +135761,9 @@ catalog: value: SC-42(04) class: sp800-53a prose: '{{ insert: param, sc-42.04_odp.01 }} are employed to facilitate an individual’s awareness that personally identifiable information is being collected by {{ insert: param, sc-42.04_odp.02 }} ' + links: + - href: '#sc-42.4_smt' + rel: assessment-for - id: sc-42.4_asm-examine name: assessment-method props: @@ -125424,6 +135885,9 @@ catalog: value: SC-42(05) class: sp800-53a prose: 'the {{ insert: param, sc-42.05_odp }} configured to minimize the collection of information about individuals that is not needed are employed.' + links: + - href: '#sc-42.5_smt' + rel: assessment-for - id: sc-42.5_asm-examine name: assessment-method props: @@ -125578,6 +136042,9 @@ catalog: value: SC-43a. class: sp800-53a prose: 'usage restrictions and implementation guidelines are established for {{ insert: param, sc-43_odp }};' + links: + - href: '#sc-43_smt.a' + rel: assessment-for - id: sc-43_obj.b name: assessment-objective props: @@ -125592,6 +136059,9 @@ catalog: value: SC-43b.[01] class: sp800-53a prose: 'the use of {{ insert: param, sc-43_odp }} is authorized within the system;' + links: + - href: '#sc-43_smt.b' + rel: assessment-for - id: sc-43_obj.b-2 name: assessment-objective props: @@ -125599,6 +136069,9 @@ catalog: value: SC-43b.[02] class: sp800-53a prose: 'the use of {{ insert: param, sc-43_odp }} is monitored within the system;' + links: + - href: '#sc-43_smt.b' + rel: assessment-for - id: sc-43_obj.b-3 name: assessment-objective props: @@ -125606,6 +136079,15 @@ catalog: value: SC-43b.[03] class: sp800-53a prose: 'the use of {{ insert: param, sc-43_odp }} is controlled within the system.' + links: + - href: '#sc-43_smt.b' + rel: assessment-for + links: + - href: '#sc-43_smt.b' + rel: assessment-for + links: + - href: '#sc-43_smt' + rel: assessment-for - id: sc-43_asm-examine name: assessment-method props: @@ -125727,6 +136209,9 @@ catalog: value: SC-44 class: sp800-53a prose: 'a detonation chamber capability is employed within the {{ insert: param, sc-44_odp }}.' + links: + - href: '#sc-44_smt' + rel: assessment-for - id: sc-44_asm-examine name: assessment-method props: @@ -125820,6 +136305,9 @@ catalog: value: SC-45 class: sp800-53a prose: system clocks are synchronized within and between systems and system components. + links: + - href: '#sc-45_smt' + rel: assessment-for - id: sc-45_asm-examine name: assessment-method props: @@ -125956,6 +136444,9 @@ catalog: value: SC-45(01)(a) class: sp800-53a prose: 'the internal system clocks are compared {{ insert: param, sc-45.01_odp.01 }} with {{ insert: param, sc-45.01_odp.02 }};' + links: + - href: '#sc-45.1_smt.a' + rel: assessment-for - id: sc-45.1_obj.b name: assessment-objective props: @@ -125963,6 +136454,12 @@ catalog: value: SC-45(01)(b) class: sp800-53a prose: 'the internal system clocks are synchronized with the authoritative time source when the time difference is greater than {{ insert: param, sc-45.01_odp.03 }}.' + links: + - href: '#sc-45.1_smt.b' + rel: assessment-for + links: + - href: '#sc-45.1_smt' + rel: assessment-for - id: sc-45.1_asm-examine name: assessment-method props: @@ -126067,6 +136564,9 @@ catalog: value: SC-45(02)(a) class: sp800-53a prose: a secondary authoritative time source is identified that is in a different geographic region than the primary authoritative time source; + links: + - href: '#sc-45.2_smt.a' + rel: assessment-for - id: sc-45.2_obj.b name: assessment-objective props: @@ -126074,6 +136574,12 @@ catalog: value: SC-45(02)(b) class: sp800-53a prose: the internal system clocks are synchronized to the secondary authoritative time source if the primary authoritative time source is unavailable. + links: + - href: '#sc-45.2_smt.b' + rel: assessment-for + links: + - href: '#sc-45.2_smt' + rel: assessment-for - id: sc-45.2_asm-examine name: assessment-method props: @@ -126175,6 +136681,9 @@ catalog: value: SC-46 class: sp800-53a prose: 'a policy enforcement mechanism is {{ insert: param, sc-46_odp }} implemented between the physical and/or network interfaces for the connecting security domains.' + links: + - href: '#sc-46_smt' + rel: assessment-for - id: sc-46_asm-examine name: assessment-method props: @@ -126285,6 +136794,9 @@ catalog: value: SC-47 class: sp800-53a prose: '{{ insert: param, sc-47_odp }} are established for system operations and operational command and control.' + links: + - href: '#sc-47_smt' + rel: assessment-for - id: sc-47_asm-examine name: assessment-method props: @@ -126410,6 +136922,9 @@ catalog: value: SC-48 class: sp800-53a prose: '{{ insert: param, sc-48_odp.01 }} are relocated to {{ insert: param, sc-48_odp.02 }} under {{ insert: param, sc-48_odp.03 }}.' + links: + - href: '#sc-48_smt' + rel: assessment-for - id: sc-48_asm-examine name: assessment-method props: @@ -126536,6 +137051,9 @@ catalog: value: SC-48(01) class: sp800-53a prose: '{{ insert: param, sc-48.01_odp.01 }} are dynamically relocated to {{ insert: param, sc-48.01_odp.02 }} under {{ insert: param, sc-48.01_odp.03 }}.' + links: + - href: '#sc-48.1_smt' + rel: assessment-for - id: sc-48.1_asm-examine name: assessment-method props: @@ -126650,6 +137168,9 @@ catalog: value: SC-49 class: sp800-53a prose: 'hardware-enforced separation and policy enforcement mechanisms are implemented between {{ insert: param, sc-49_odp }}.' + links: + - href: '#sc-49_smt' + rel: assessment-for - id: sc-49_asm-examine name: assessment-method props: @@ -126764,6 +137285,9 @@ catalog: value: SC-50 class: sp800-53a prose: 'software-enforced separation and policy enforcement mechanisms are implemented between {{ insert: param, sc-50_odp }}.' + links: + - href: '#sc-50_smt' + rel: assessment-for - id: sc-50_asm-examine name: assessment-method props: @@ -126892,6 +137416,9 @@ catalog: value: SC-51a. class: sp800-53a prose: 'hardware-based write-protect for {{ insert: param, sc-51_odp.01 }} is employed;' + links: + - href: '#sc-51_smt.a' + rel: assessment-for - id: sc-51_obj.b name: assessment-objective props: @@ -126906,6 +137433,9 @@ catalog: value: SC-51b.[01] class: sp800-53a prose: 'specific procedures are implemented for {{ insert: param, sc-51_odp.02 }} to manually disable hardware write-protect for firmware modifications;' + links: + - href: '#sc-51_smt.b' + rel: assessment-for - id: sc-51_obj.b-2 name: assessment-objective props: @@ -126913,6 +137443,15 @@ catalog: value: SC-51b.[02] class: sp800-53a prose: 'specific procedures are implemented for {{ insert: param, sc-51_odp.02 }} to re-enable the write-protect prior to returning to operational mode.' + links: + - href: '#sc-51_smt.b' + rel: assessment-for + links: + - href: '#sc-51_smt.b' + rel: assessment-for + links: + - href: '#sc-51_smt' + rel: assessment-for - id: sc-51_asm-examine name: assessment-method props: @@ -127184,6 +137723,9 @@ catalog: value: SI-01a.[01] class: sp800-53a prose: a system and information integrity policy is developed and documented; + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.a-2 name: assessment-objective props: @@ -127191,6 +137733,9 @@ catalog: value: SI-01a.[02] class: sp800-53a prose: 'the system and information integrity policy is disseminated to {{ insert: param, si-01_odp.01 }};' + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.a-3 name: assessment-objective props: @@ -127198,6 +137743,9 @@ catalog: value: SI-01a.[03] class: sp800-53a prose: system and information integrity procedures to facilitate the implementation of the system and information integrity policy and associated system and information integrity controls are developed and documented; + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.a-4 name: assessment-objective props: @@ -127205,6 +137753,9 @@ catalog: value: SI-01a.[04] class: sp800-53a prose: 'the system and information integrity procedures are disseminated to {{ insert: param, si-01_odp.02 }};' + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.a.1 name: assessment-objective props: @@ -127226,6 +137777,9 @@ catalog: value: SI-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses purpose;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-2 name: assessment-objective props: @@ -127233,6 +137787,9 @@ catalog: value: SI-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses scope;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-3 name: assessment-objective props: @@ -127240,6 +137797,9 @@ catalog: value: SI-01a.01(a)[03] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses roles;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-4 name: assessment-objective props: @@ -127247,6 +137807,9 @@ catalog: value: SI-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses responsibilities;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-5 name: assessment-objective props: @@ -127254,6 +137817,9 @@ catalog: value: SI-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses management commitment;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-6 name: assessment-objective props: @@ -127261,6 +137827,9 @@ catalog: value: SI-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses coordination among organizational entities;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.a-7 name: assessment-objective props: @@ -127268,6 +137837,12 @@ catalog: value: SI-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy addresses compliance;' + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#si-1_smt.a.1.a' + rel: assessment-for - id: si-1_obj.a.1.b name: assessment-objective props: @@ -127275,6 +137850,15 @@ catalog: value: SI-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, si-01_odp.03 }} system and information integrity policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#si-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#si-1_smt.a.1' + rel: assessment-for + links: + - href: '#si-1_smt.a' + rel: assessment-for - id: si-1_obj.b name: assessment-objective props: @@ -127282,6 +137866,9 @@ catalog: value: SI-01b. class: sp800-53a prose: 'the {{ insert: param, si-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the system and information integrity policy and procedures;' + links: + - href: '#si-1_smt.b' + rel: assessment-for - id: si-1_obj.c name: assessment-objective props: @@ -127303,6 +137890,9 @@ catalog: value: SI-01c.01[01] class: sp800-53a prose: 'the current system and information integrity policy is reviewed and updated {{ insert: param, si-01_odp.05 }};' + links: + - href: '#si-1_smt.c.1' + rel: assessment-for - id: si-1_obj.c.1-2 name: assessment-objective props: @@ -127310,6 +137900,12 @@ catalog: value: SI-01c.01[02] class: sp800-53a prose: 'the current system and information integrity policy is reviewed and updated following {{ insert: param, si-01_odp.06 }};' + links: + - href: '#si-1_smt.c.1' + rel: assessment-for + links: + - href: '#si-1_smt.c.1' + rel: assessment-for - id: si-1_obj.c.2 name: assessment-objective props: @@ -127324,6 +137920,9 @@ catalog: value: SI-01c.02[01] class: sp800-53a prose: 'the current system and information integrity procedures are reviewed and updated {{ insert: param, si-01_odp.07 }};' + links: + - href: '#si-1_smt.c.2' + rel: assessment-for - id: si-1_obj.c.2-2 name: assessment-objective props: @@ -127331,6 +137930,18 @@ catalog: value: SI-01c.02[02] class: sp800-53a prose: 'the current system and information integrity procedures are reviewed and updated following {{ insert: param, si-01_odp.08 }}.' + links: + - href: '#si-1_smt.c.2' + rel: assessment-for + links: + - href: '#si-1_smt.c.2' + rel: assessment-for + links: + - href: '#si-1_smt.c' + rel: assessment-for + links: + - href: '#si-1_smt' + rel: assessment-for - id: si-1_asm-examine name: assessment-method props: @@ -127492,6 +138103,9 @@ catalog: value: SI-02a.[01] class: sp800-53a prose: system flaws are identified; + links: + - href: '#si-2_smt.a' + rel: assessment-for - id: si-2_obj.a-2 name: assessment-objective props: @@ -127499,6 +138113,9 @@ catalog: value: SI-02a.[02] class: sp800-53a prose: system flaws are reported; + links: + - href: '#si-2_smt.a' + rel: assessment-for - id: si-2_obj.a-3 name: assessment-objective props: @@ -127506,6 +138123,12 @@ catalog: value: SI-02a.[03] class: sp800-53a prose: system flaws are corrected; + links: + - href: '#si-2_smt.a' + rel: assessment-for + links: + - href: '#si-2_smt.a' + rel: assessment-for - id: si-2_obj.b name: assessment-objective props: @@ -127520,6 +138143,9 @@ catalog: value: SI-02b.[01] class: sp800-53a prose: software updates related to flaw remediation are tested for effectiveness before installation; + links: + - href: '#si-2_smt.b' + rel: assessment-for - id: si-2_obj.b-2 name: assessment-objective props: @@ -127527,6 +138153,9 @@ catalog: value: SI-02b.[02] class: sp800-53a prose: software updates related to flaw remediation are tested for potential side effects before installation; + links: + - href: '#si-2_smt.b' + rel: assessment-for - id: si-2_obj.b-3 name: assessment-objective props: @@ -127534,6 +138163,9 @@ catalog: value: SI-02b.[03] class: sp800-53a prose: firmware updates related to flaw remediation are tested for effectiveness before installation; + links: + - href: '#si-2_smt.b' + rel: assessment-for - id: si-2_obj.b-4 name: assessment-objective props: @@ -127541,6 +138173,12 @@ catalog: value: SI-02b.[04] class: sp800-53a prose: firmware updates related to flaw remediation are tested for potential side effects before installation; + links: + - href: '#si-2_smt.b' + rel: assessment-for + links: + - href: '#si-2_smt.b' + rel: assessment-for - id: si-2_obj.c name: assessment-objective props: @@ -127555,6 +138193,9 @@ catalog: value: SI-02c.[01] class: sp800-53a prose: 'security-relevant software updates are installed within {{ insert: param, si-02_odp }} of the release of the updates;' + links: + - href: '#si-2_smt.c' + rel: assessment-for - id: si-2_obj.c-2 name: assessment-objective props: @@ -127562,6 +138203,12 @@ catalog: value: SI-02c.[02] class: sp800-53a prose: 'security-relevant firmware updates are installed within {{ insert: param, si-02_odp }} of the release of the updates;' + links: + - href: '#si-2_smt.c' + rel: assessment-for + links: + - href: '#si-2_smt.c' + rel: assessment-for - id: si-2_obj.d name: assessment-objective props: @@ -127569,6 +138216,12 @@ catalog: value: SI-02d. class: sp800-53a prose: flaw remediation is incorporated into the organizational configuration management process. + links: + - href: '#si-2_smt.d' + rel: assessment-for + links: + - href: '#si-2_smt' + rel: assessment-for - id: si-2_asm-examine name: assessment-method props: @@ -127715,6 +138368,9 @@ catalog: value: SI-02(02) class: sp800-53a prose: 'system components have applicable security-relevant software and firmware updates installed {{ insert: param, si-02.02_odp.02 }} using {{ insert: param, si-02.02_odp.01 }}.' + links: + - href: '#si-2.2_smt' + rel: assessment-for - id: si-2.2_asm-examine name: assessment-method props: @@ -127836,6 +138492,9 @@ catalog: value: SI-02(03)(a) class: sp800-53a prose: the time between flaw identification and flaw remediation is measured; + links: + - href: '#si-2.3_smt.a' + rel: assessment-for - id: si-2.3_obj.b name: assessment-objective props: @@ -127843,6 +138502,12 @@ catalog: value: SI-02(03)(b) class: sp800-53a prose: '{{ insert: param, si-02.03_odp }} for taking corrective actions have been established.' + links: + - href: '#si-2.3_smt.b' + rel: assessment-for + links: + - href: '#si-2.3_smt' + rel: assessment-for - id: si-2.3_asm-examine name: assessment-method props: @@ -127954,6 +138619,9 @@ catalog: value: SI-02(04) class: sp800-53a prose: 'automated patch management tools are employed to facilitate flaw remediation to {{ insert: param, si-02.04_odp }}.' + links: + - href: '#si-2.4_smt' + rel: assessment-for - id: si-2.4_asm-examine name: assessment-method props: @@ -128078,6 +138746,9 @@ catalog: value: SI-02(05) class: sp800-53a prose: '{{ insert: param, si-02.05_odp.01 }} are installed automatically to {{ insert: param, si-02.05_odp.02 }}.' + links: + - href: '#si-2.5_smt' + rel: assessment-for - id: si-2.5_asm-examine name: assessment-method props: @@ -128185,6 +138856,9 @@ catalog: value: SI-02(06) class: sp800-53a prose: 'previous versions of {{ insert: param, si-02.06_odp }} are removed after updated versions have been installed.' + links: + - href: '#si-2.6_smt' + rel: assessment-for - id: si-2.6_asm-examine name: assessment-method props: @@ -128447,6 +139121,9 @@ catalog: value: SI-03a.[01] class: sp800-53a prose: '{{ insert: param, si-03_odp.01 }} malicious code protection mechanisms are implemented at system entry and exit points to detect malicious code;' + links: + - href: '#si-3_smt.a' + rel: assessment-for - id: si-3_obj.a-2 name: assessment-objective props: @@ -128454,6 +139131,12 @@ catalog: value: SI-03a.[02] class: sp800-53a prose: '{{ insert: param, si-03_odp.01 }} malicious code protection mechanisms are implemented at system entry and exit points to eradicate malicious code;' + links: + - href: '#si-3_smt.a' + rel: assessment-for + links: + - href: '#si-3_smt.a' + rel: assessment-for - id: si-3_obj.b name: assessment-objective props: @@ -128461,6 +139144,9 @@ catalog: value: SI-03b. class: sp800-53a prose: malicious code protection mechanisms are updated automatically as new releases are available in accordance with organizational configuration management policy and procedures; + links: + - href: '#si-3_smt.b' + rel: assessment-for - id: si-3_obj.c name: assessment-objective props: @@ -128482,6 +139168,9 @@ catalog: value: SI-03c.01[01] class: sp800-53a prose: 'malicious code protection mechanisms are configured to perform periodic scans of the system {{ insert: param, si-03_odp.02 }};' + links: + - href: '#si-3_smt.c.1' + rel: assessment-for - id: si-3_obj.c.1-2 name: assessment-objective props: @@ -128489,6 +139178,12 @@ catalog: value: SI-03c.01[02] class: sp800-53a prose: 'malicious code protection mechanisms are configured to perform real-time scans of files from external sources at {{ insert: param, si-03_odp.03 }} as the files are downloaded, opened, or executed in accordance with organizational policy;' + links: + - href: '#si-3_smt.c.1' + rel: assessment-for + links: + - href: '#si-3_smt.c.1' + rel: assessment-for - id: si-3_obj.c.2 name: assessment-objective props: @@ -128503,6 +139198,9 @@ catalog: value: SI-03c.02[01] class: sp800-53a prose: 'malicious code protection mechanisms are configured to {{ insert: param, si-03_odp.04 }} in response to malicious code detection;' + links: + - href: '#si-3_smt.c.2' + rel: assessment-for - id: si-3_obj.c.2-2 name: assessment-objective props: @@ -128510,6 +139208,15 @@ catalog: value: SI-03c.02[02] class: sp800-53a prose: 'malicious code protection mechanisms are configured to send alerts to {{ insert: param, si-03_odp.06 }} in response to malicious code detection;' + links: + - href: '#si-3_smt.c.2' + rel: assessment-for + links: + - href: '#si-3_smt.c.2' + rel: assessment-for + links: + - href: '#si-3_smt.c' + rel: assessment-for - id: si-3_obj.d name: assessment-objective props: @@ -128517,6 +139224,12 @@ catalog: value: SI-03d. class: sp800-53a prose: the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the system are addressed. + links: + - href: '#si-3_smt.d' + rel: assessment-for + links: + - href: '#si-3_smt' + rel: assessment-for - id: si-3_asm-examine name: assessment-method props: @@ -128679,6 +139392,9 @@ catalog: value: SI-03(04) class: sp800-53a prose: malicious code protection mechanisms are updated only when directed by a privileged user. + links: + - href: '#si-3.4_smt' + rel: assessment-for - id: si-3.4_asm-examine name: assessment-method props: @@ -128828,6 +139544,9 @@ catalog: value: SI-03(06)(a) class: sp800-53a prose: 'malicious code protection mechanisms are tested {{ insert: param, si-03.06_odp }} by introducing known benign code into the system;' + links: + - href: '#si-3.6_smt.a' + rel: assessment-for - id: si-3.6_obj.b name: assessment-objective props: @@ -128842,6 +139561,9 @@ catalog: value: SI-03(06)(b)[01] class: sp800-53a prose: the detection of (benign test) code occurs; + links: + - href: '#si-3.6_smt.b' + rel: assessment-for - id: si-3.6_obj.b-2 name: assessment-objective props: @@ -128849,6 +139571,15 @@ catalog: value: SI-03(06)(b)[02] class: sp800-53a prose: the associated incident reporting occurs. + links: + - href: '#si-3.6_smt.b' + rel: assessment-for + links: + - href: '#si-3.6_smt.b' + rel: assessment-for + links: + - href: '#si-3.6_smt' + rel: assessment-for - id: si-3.6_asm-examine name: assessment-method props: @@ -129017,6 +139748,9 @@ catalog: value: SI-03(08)(a) class: sp800-53a prose: '{{ insert: param, si-03.08_odp.01 }} are detected through the kernel application programming interface on {{ insert: param, si-03.08_odp.02 }};' + links: + - href: '#si-3.8_smt.a' + rel: assessment-for - id: si-3.8_obj.b name: assessment-objective props: @@ -129024,6 +139758,12 @@ catalog: value: SI-03(08)(b) class: sp800-53a prose: '{{ insert: param, si-03.08_odp.03 }} is/are performed.' + links: + - href: '#si-3.8_smt.b' + rel: assessment-for + links: + - href: '#si-3.8_smt' + rel: assessment-for - id: si-3.8_asm-examine name: assessment-method props: @@ -129168,6 +139908,9 @@ catalog: value: SI-03(10)(a) class: sp800-53a prose: '{{ insert: param, si-03.10_odp }} are employed to analyze the characteristics and behavior of malicious code;' + links: + - href: '#si-3.10_smt.a' + rel: assessment-for - id: si-3.10_obj.b name: assessment-objective props: @@ -129182,6 +139925,9 @@ catalog: value: SI-03(10)(b)[01] class: sp800-53a prose: the results from malicious code analysis are incorporated into organizational incident response processes; + links: + - href: '#si-3.10_smt.b' + rel: assessment-for - id: si-3.10_obj.b-2 name: assessment-objective props: @@ -129189,6 +139935,15 @@ catalog: value: SI-03(10)(b)[02] class: sp800-53a prose: the results from malicious code analysis are incorporated into organizational flaw remediation processes. + links: + - href: '#si-3.10_smt.b' + rel: assessment-for + links: + - href: '#si-3.10_smt.b' + rel: assessment-for + links: + - href: '#si-3.10_smt' + rel: assessment-for - id: si-3.10_asm-examine name: assessment-method props: @@ -129543,6 +140298,9 @@ catalog: value: SI-04a.01 class: sp800-53a prose: 'the system is monitored to detect attacks and indicators of potential attacks in accordance with {{ insert: param, si-04_odp.01 }};' + links: + - href: '#si-4_smt.a.1' + rel: assessment-for - id: si-4_obj.a.2 name: assessment-objective props: @@ -129557,6 +140315,9 @@ catalog: value: SI-04a.02[01] class: sp800-53a prose: the system is monitored to detect unauthorized local connections; + links: + - href: '#si-4_smt.a.2' + rel: assessment-for - id: si-4_obj.a.2-2 name: assessment-objective props: @@ -129564,6 +140325,9 @@ catalog: value: SI-04a.02[02] class: sp800-53a prose: the system is monitored to detect unauthorized network connections; + links: + - href: '#si-4_smt.a.2' + rel: assessment-for - id: si-4_obj.a.2-3 name: assessment-objective props: @@ -129571,6 +140335,15 @@ catalog: value: SI-04a.02[03] class: sp800-53a prose: the system is monitored to detect unauthorized remote connections; + links: + - href: '#si-4_smt.a.2' + rel: assessment-for + links: + - href: '#si-4_smt.a.2' + rel: assessment-for + links: + - href: '#si-4_smt.a' + rel: assessment-for - id: si-4_obj.b name: assessment-objective props: @@ -129578,6 +140351,9 @@ catalog: value: SI-04b. class: sp800-53a prose: 'unauthorized use of the system is identified through {{ insert: param, si-04_odp.02 }};' + links: + - href: '#si-4_smt.b' + rel: assessment-for - id: si-4_obj.c name: assessment-objective props: @@ -129592,6 +140368,9 @@ catalog: value: SI-04c.01 class: sp800-53a prose: internal monitoring capabilities are invoked or monitoring devices are deployed strategically within the system to collect organization-determined essential information; + links: + - href: '#si-4_smt.c.1' + rel: assessment-for - id: si-4_obj.c.2 name: assessment-objective props: @@ -129599,6 +140378,12 @@ catalog: value: SI-04c.02 class: sp800-53a prose: internal monitoring capabilities are invoked or monitoring devices are deployed at ad hoc locations within the system to track specific types of transactions of interest to the organization; + links: + - href: '#si-4_smt.c.2' + rel: assessment-for + links: + - href: '#si-4_smt.c' + rel: assessment-for - id: si-4_obj.d name: assessment-objective props: @@ -129613,6 +140398,9 @@ catalog: value: SI-04d.[01] class: sp800-53a prose: detected events are analyzed; + links: + - href: '#si-4_smt.d' + rel: assessment-for - id: si-4_obj.d-2 name: assessment-objective props: @@ -129620,6 +140408,12 @@ catalog: value: SI-04d.[02] class: sp800-53a prose: detected anomalies are analyzed; + links: + - href: '#si-4_smt.d' + rel: assessment-for + links: + - href: '#si-4_smt.d' + rel: assessment-for - id: si-4_obj.e name: assessment-objective props: @@ -129627,6 +140421,9 @@ catalog: value: SI-04e. class: sp800-53a prose: the level of system monitoring activity is adjusted when there is a change in risk to organizational operations and assets, individuals, other organizations, or the Nation; + links: + - href: '#si-4_smt.e' + rel: assessment-for - id: si-4_obj.f name: assessment-objective props: @@ -129634,6 +140431,9 @@ catalog: value: SI-04f. class: sp800-53a prose: a legal opinion regarding system monitoring activities is obtained; + links: + - href: '#si-4_smt.f' + rel: assessment-for - id: si-4_obj.g name: assessment-objective props: @@ -129641,6 +140441,12 @@ catalog: value: SI-04g. class: sp800-53a prose: '{{ insert: param, si-04_odp.03 }} is provided to {{ insert: param, si-04_odp.04 }} {{ insert: param, si-04_odp.05 }}.' + links: + - href: '#si-4_smt.g' + rel: assessment-for + links: + - href: '#si-4_smt' + rel: assessment-for - id: si-4_asm-examine name: assessment-method props: @@ -129753,6 +140559,9 @@ catalog: value: SI-04(01)[01] class: sp800-53a prose: individual intrusion detection tools are connected to a system-wide intrusion detection system; + links: + - href: '#si-4.1_smt' + rel: assessment-for - id: si-4.1_obj-2 name: assessment-objective props: @@ -129760,6 +140569,12 @@ catalog: value: SI-04(01)[02] class: sp800-53a prose: individual intrusion detection tools are configured into a system-wide intrusion detection system. + links: + - href: '#si-4.1_smt' + rel: assessment-for + links: + - href: '#si-4.1_smt' + rel: assessment-for - id: si-4.1_asm-examine name: assessment-method props: @@ -129863,6 +140678,9 @@ catalog: value: SI-04(02) class: sp800-53a prose: automated tools and mechanisms are employed to support a near real-time analysis of events. + links: + - href: '#si-4.2_smt' + rel: assessment-for - id: si-4.2_asm-examine name: assessment-method props: @@ -129985,6 +140803,9 @@ catalog: value: SI-04(03)[01] class: sp800-53a prose: automated tools and mechanisms are employed to integrate intrusion detection tools and mechanisms into access control mechanisms; + links: + - href: '#si-4.3_smt' + rel: assessment-for - id: si-4.3_obj-2 name: assessment-objective props: @@ -129992,6 +140813,12 @@ catalog: value: SI-04(03)[02] class: sp800-53a prose: automated tools and mechanisms are employed to integrate intrusion detection tools and mechanisms into flow control mechanisms. + links: + - href: '#si-4.3_smt' + rel: assessment-for + links: + - href: '#si-4.3_smt' + rel: assessment-for - id: si-4.3_asm-examine name: assessment-method props: @@ -130174,6 +141001,9 @@ catalog: value: SI-04(04)(a)[01] class: sp800-53a prose: criteria for unusual or unauthorized activities or conditions for inbound communications traffic are defined; + links: + - href: '#si-4.4_smt.a' + rel: assessment-for - id: si-4.4_obj.a-2 name: assessment-objective props: @@ -130181,6 +141011,12 @@ catalog: value: SI-04(04)(a)[02] class: sp800-53a prose: criteria for unusual or unauthorized activities or conditions for outbound communications traffic are defined; + links: + - href: '#si-4.4_smt.a' + rel: assessment-for + links: + - href: '#si-4.4_smt.a' + rel: assessment-for - id: si-4.4_obj.b name: assessment-objective props: @@ -130195,6 +141031,9 @@ catalog: value: SI-04(04)(b)[01] class: sp800-53a prose: 'inbound communications traffic is monitored {{ insert: param, si-04.04_odp.01 }} for {{ insert: param, si-04.04_odp.02 }};' + links: + - href: '#si-4.4_smt.b' + rel: assessment-for - id: si-4.4_obj.b-2 name: assessment-objective props: @@ -130202,6 +141041,15 @@ catalog: value: SI-04(04)(b)[02] class: sp800-53a prose: 'outbound communications traffic is monitored {{ insert: param, si-04.04_odp.03 }} for {{ insert: param, si-04.04_odp.04 }}.' + links: + - href: '#si-4.4_smt.b' + rel: assessment-for + links: + - href: '#si-4.4_smt.b' + rel: assessment-for + links: + - href: '#si-4.4_smt' + rel: assessment-for - id: si-4.4_asm-examine name: assessment-method props: @@ -130332,6 +141180,9 @@ catalog: value: SI-04(05) class: sp800-53a prose: '{{ insert: param, si-04.05_odp.01 }} are alerted when system-generated {{ insert: param, si-04.05_odp.02 }} occur.' + links: + - href: '#si-4.5_smt' + rel: assessment-for - id: si-4.5_asm-examine name: assessment-method props: @@ -130503,6 +141354,9 @@ catalog: value: SI-04(07)(a) class: sp800-53a prose: '{{ insert: param, si-04.07_odp.01 }} are notified of detected suspicious events;' + links: + - href: '#si-4.7_smt.a' + rel: assessment-for - id: si-4.7_obj.b name: assessment-objective props: @@ -130510,6 +141364,12 @@ catalog: value: SI-04(07)(b) class: sp800-53a prose: '{{ insert: param, si-04.07_odp.02 }} are taken upon the detection of suspicious events.' + links: + - href: '#si-4.7_smt.b' + rel: assessment-for + links: + - href: '#si-4.7_smt' + rel: assessment-for - id: si-4.7_asm-examine name: assessment-method props: @@ -130646,6 +141506,9 @@ catalog: value: SI-04(09) class: sp800-53a prose: 'intrusion-monitoring tools and mechanisms are tested {{ insert: param, si-04.09_odp }}.' + links: + - href: '#si-4.9_smt' + rel: assessment-for - id: si-4.9_asm-examine name: assessment-method props: @@ -130762,6 +141625,9 @@ catalog: value: SI-04(10) class: sp800-53a prose: 'provisions are made so that {{ insert: param, si-04.10_odp.01 }} is visible to {{ insert: param, si-04.10_odp.02 }}.' + links: + - href: '#si-4.10_smt' + rel: assessment-for - id: si-4.10_asm-examine name: assessment-method props: @@ -130887,6 +141753,9 @@ catalog: value: SI-04(11)[01] class: sp800-53a prose: outbound communications traffic at the external interfaces to the system is analyzed to discover anomalies; + links: + - href: '#si-4.11_smt' + rel: assessment-for - id: si-4.11_obj-2 name: assessment-objective props: @@ -130894,6 +141763,12 @@ catalog: value: SI-04(11)[02] class: sp800-53a prose: 'outbound communications traffic at {{ insert: param, si-04.11_odp }} is analyzed to discover anomalies.' + links: + - href: '#si-4.11_smt' + rel: assessment-for + links: + - href: '#si-4.11_smt' + rel: assessment-for - id: si-4.11_asm-examine name: assessment-method props: @@ -131033,6 +141908,9 @@ catalog: value: SI-04(12) class: sp800-53a prose: '{{ insert: param, si-04.12_odp.01 }} is/are alerted using {{ insert: param, si-04.12_odp.02 }} when {{ insert: param, si-04.12_odp.03 }} indicate inappropriate or unusual activities with security or privacy implications.' + links: + - href: '#si-4.12_smt' + rel: assessment-for - id: si-4.12_asm-examine name: assessment-method props: @@ -131181,6 +142059,9 @@ catalog: value: SI-04(13)(a)[01] class: sp800-53a prose: communications traffic for the system is analyzed; + links: + - href: '#si-4.13_smt.a' + rel: assessment-for - id: si-4.13_obj.a-2 name: assessment-objective props: @@ -131188,6 +142069,12 @@ catalog: value: SI-04(13)(a)[02] class: sp800-53a prose: event patterns for the system are analyzed; + links: + - href: '#si-4.13_smt.a' + rel: assessment-for + links: + - href: '#si-4.13_smt.a' + rel: assessment-for - id: si-4.13_obj.b name: assessment-objective props: @@ -131202,6 +142089,9 @@ catalog: value: SI-04(13)(b)[01] class: sp800-53a prose: profiles representing common traffic are developed; + links: + - href: '#si-4.13_smt.b' + rel: assessment-for - id: si-4.13_obj.b-2 name: assessment-objective props: @@ -131209,6 +142099,12 @@ catalog: value: SI-04(13)(b)[02] class: sp800-53a prose: profiles representing event patterns are developed; + links: + - href: '#si-4.13_smt.b' + rel: assessment-for + links: + - href: '#si-4.13_smt.b' + rel: assessment-for - id: si-4.13_obj.c name: assessment-objective props: @@ -131223,6 +142119,9 @@ catalog: value: SI-04(13)(c)[01] class: sp800-53a prose: traffic profiles are used in tuning system-monitoring devices; + links: + - href: '#si-4.13_smt.c' + rel: assessment-for - id: si-4.13_obj.c-2 name: assessment-objective props: @@ -131230,6 +142129,15 @@ catalog: value: SI-04(13)(c)[02] class: sp800-53a prose: event profiles are used in tuning system-monitoring devices. + links: + - href: '#si-4.13_smt.c' + rel: assessment-for + links: + - href: '#si-4.13_smt.c' + rel: assessment-for + links: + - href: '#si-4.13_smt' + rel: assessment-for - id: si-4.13_asm-examine name: assessment-method props: @@ -131346,6 +142254,9 @@ catalog: value: SI-04(14)[01] class: sp800-53a prose: a wireless intrusion detection system is employed to identify rogue wireless devices; + links: + - href: '#si-4.14_smt' + rel: assessment-for - id: si-4.14_obj-2 name: assessment-objective props: @@ -131353,6 +142264,9 @@ catalog: value: SI-04(14)[02] class: sp800-53a prose: a wireless intrusion detection system is employed to detect attack attempts on the system; + links: + - href: '#si-4.14_smt' + rel: assessment-for - id: si-4.14_obj-3 name: assessment-objective props: @@ -131360,6 +142274,12 @@ catalog: value: SI-04(14)[03] class: sp800-53a prose: a wireless intrusion detection system is employed to detect potential compromises or breaches to the system. + links: + - href: '#si-4.14_smt' + rel: assessment-for + links: + - href: '#si-4.14_smt' + rel: assessment-for - id: si-4.14_asm-examine name: assessment-method props: @@ -131463,6 +142383,9 @@ catalog: value: SI-04(15) class: sp800-53a prose: an intrusion detection system is employed to monitor wireless communications traffic as the traffic passes from wireless to wireline networks. + links: + - href: '#si-4.15_smt' + rel: assessment-for - id: si-4.15_asm-examine name: assessment-method props: @@ -131571,6 +142494,9 @@ catalog: value: SI-04(16) class: sp800-53a prose: information from monitoring tools and mechanisms employed throughout the system is correlated. + links: + - href: '#si-4.16_smt' + rel: assessment-for - id: si-4.16_asm-examine name: assessment-method props: @@ -131684,6 +142610,9 @@ catalog: value: SI-04(17) class: sp800-53a prose: information from monitoring physical, cyber, and supply chain activities are correlated to achieve integrated, organization-wide situational awareness. + links: + - href: '#si-4.17_smt' + rel: assessment-for - id: si-4.17_asm-examine name: assessment-method props: @@ -131813,6 +142742,9 @@ catalog: value: SI-04(18)[01] class: sp800-53a prose: outbound communications traffic is analyzed at interfaces external to the system to detect covert exfiltration of information; + links: + - href: '#si-4.18_smt' + rel: assessment-for - id: si-4.18_obj-2 name: assessment-objective props: @@ -131820,6 +142752,12 @@ catalog: value: SI-04(18)[02] class: sp800-53a prose: 'outbound communications traffic is analyzed at {{ insert: param, si-04.18_odp }} to detect covert exfiltration of information.' + links: + - href: '#si-4.18_smt' + rel: assessment-for + links: + - href: '#si-4.18_smt' + rel: assessment-for - id: si-4.18_asm-examine name: assessment-method props: @@ -131946,6 +142884,9 @@ catalog: value: SI-04(19) class: sp800-53a prose: '{{ insert: param, si-04.19_odp.01 }} is implemented on individuals who have been identified by {{ insert: param, si-04.19_odp.02 }} as posing an increased level of risk.' + links: + - href: '#si-4.19_smt' + rel: assessment-for - id: si-4.19_asm-examine name: assessment-method props: @@ -132064,6 +143005,9 @@ catalog: value: SI-04(20) class: sp800-53a prose: '{{ insert: param, si-04.20_odp }} of privileged users is implemented.' + links: + - href: '#si-4.20_smt' + rel: assessment-for - id: si-4.20_asm-examine name: assessment-method props: @@ -132186,6 +143130,9 @@ catalog: value: SI-04(21) class: sp800-53a prose: '{{ insert: param, si-04.21_odp.01 }} of individuals is implemented during {{ insert: param, si-04.21_odp.02 }}.' + links: + - href: '#si-4.21_smt' + rel: assessment-for - id: si-4.21_asm-examine name: assessment-method props: @@ -132339,6 +143286,9 @@ catalog: value: SI-04(22)(a) class: sp800-53a prose: 'network services that have not been authorized or approved by {{ insert: param, si-04.22_odp.01 }} are detected;' + links: + - href: '#si-4.22_smt.a' + rel: assessment-for - id: si-4.22_obj.b name: assessment-objective props: @@ -132346,6 +143296,12 @@ catalog: value: SI-04(22)(b) class: sp800-53a prose: '{{ insert: param, si-04.22_odp.02 }} is/are initiated when network services that have not been authorized or approved by authorization or approval processes are detected.' + links: + - href: '#si-4.22_smt.b' + rel: assessment-for + links: + - href: '#si-4.22_smt' + rel: assessment-for - id: si-4.22_asm-examine name: assessment-method props: @@ -132480,6 +143436,9 @@ catalog: value: SI-04(23) class: sp800-53a prose: '{{ insert: param, si-04.23_odp.01 }} are implemented on {{ insert: param, si-04.23_odp.02 }}.' + links: + - href: '#si-4.23_smt' + rel: assessment-for - id: si-4.23_asm-examine name: assessment-method props: @@ -132613,6 +143572,9 @@ catalog: value: SI-04(24)[01] class: sp800-53a prose: 'indicators of compromise provided by {{ insert: param, si-04.24_odp.01 }} are discovered;' + links: + - href: '#si-4.24_smt' + rel: assessment-for - id: si-4.24_obj-2 name: assessment-objective props: @@ -132620,6 +143582,9 @@ catalog: value: SI-04(24)[02] class: sp800-53a prose: 'indicators of compromise provided by {{ insert: param, si-04.24_odp.01 }} are collected;' + links: + - href: '#si-4.24_smt' + rel: assessment-for - id: si-4.24_obj-3 name: assessment-objective props: @@ -132627,6 +143592,12 @@ catalog: value: SI-04(24)[03] class: sp800-53a prose: 'indicators of compromise provided by {{ insert: param, si-04.24_odp.01 }} are distributed to {{ insert: param, si-04.24_odp.02 }}.' + links: + - href: '#si-4.24_smt' + rel: assessment-for + links: + - href: '#si-4.24_smt' + rel: assessment-for - id: si-4.24_asm-examine name: assessment-method props: @@ -132739,6 +143710,9 @@ catalog: value: SI-04(25)[01] class: sp800-53a prose: visibility into network traffic at external system interfaces is provided to optimize the effectiveness of monitoring devices; + links: + - href: '#si-4.25_smt' + rel: assessment-for - id: si-4.25_obj-2 name: assessment-objective props: @@ -132746,6 +143720,12 @@ catalog: value: SI-04(25)[02] class: sp800-53a prose: visibility into network traffic at key internal system interfaces is provided to optimize the effectiveness of monitoring devices. + links: + - href: '#si-4.25_smt' + rel: assessment-for + links: + - href: '#si-4.25_smt' + rel: assessment-for - id: si-4.25_asm-examine name: assessment-method props: @@ -132949,6 +143929,9 @@ catalog: value: SI-05a. class: sp800-53a prose: 'system security alerts, advisories, and directives are received from {{ insert: param, si-05_odp.01 }} on an ongoing basis;' + links: + - href: '#si-5_smt.a' + rel: assessment-for - id: si-5_obj.b name: assessment-objective props: @@ -132956,6 +143939,9 @@ catalog: value: SI-05b. class: sp800-53a prose: internal security alerts, advisories, and directives are generated as deemed necessary; + links: + - href: '#si-5_smt.b' + rel: assessment-for - id: si-5_obj.c name: assessment-objective props: @@ -132963,6 +143949,9 @@ catalog: value: SI-05c. class: sp800-53a prose: 'security alerts, advisories, and directives are disseminated to {{ insert: param, si-05_odp.02 }};' + links: + - href: '#si-5_smt.c' + rel: assessment-for - id: si-5_obj.d name: assessment-objective props: @@ -132970,6 +143959,12 @@ catalog: value: SI-05d. class: sp800-53a prose: security directives are implemented in accordance with established time frames or if the issuing organization is notified of the degree of noncompliance. + links: + - href: '#si-5_smt.d' + rel: assessment-for + links: + - href: '#si-5_smt' + rel: assessment-for - id: si-5_asm-examine name: assessment-method props: @@ -133077,6 +144072,9 @@ catalog: value: SI-05(01) class: sp800-53a prose: '{{ insert: param, si-05.01_odp }} are used to broadcast security alert and advisory information throughout the organization.' + links: + - href: '#si-5.1_smt' + rel: assessment-for - id: si-5.1_asm-examine name: assessment-method props: @@ -133316,6 +144314,9 @@ catalog: value: SI-06a.[01] class: sp800-53a prose: '{{ insert: param, si-06_odp.01 }} are verified to be operating correctly;' + links: + - href: '#si-6_smt.a' + rel: assessment-for - id: si-6_obj.a-2 name: assessment-objective props: @@ -133323,6 +144324,12 @@ catalog: value: SI-06a.[02] class: sp800-53a prose: '{{ insert: param, si-06_odp.02 }} are verified to be operating correctly;' + links: + - href: '#si-6_smt.a' + rel: assessment-for + links: + - href: '#si-6_smt.a' + rel: assessment-for - id: si-6_obj.b name: assessment-objective props: @@ -133337,6 +144344,9 @@ catalog: value: SI-06b.[01] class: sp800-53a prose: '{{ insert: param, si-06_odp.01 }} are verified {{ insert: param, si-06_odp.03 }};' + links: + - href: '#si-6_smt.b' + rel: assessment-for - id: si-6_obj.b-2 name: assessment-objective props: @@ -133344,6 +144354,12 @@ catalog: value: SI-06b.[02] class: sp800-53a prose: '{{ insert: param, si-06_odp.02 }} are verified {{ insert: param, si-06_odp.03 }};' + links: + - href: '#si-6_smt.b' + rel: assessment-for + links: + - href: '#si-6_smt.b' + rel: assessment-for - id: si-6_obj.c name: assessment-objective props: @@ -133358,6 +144374,9 @@ catalog: value: SI-06c.[01] class: sp800-53a prose: '{{ insert: param, si-06_odp.06 }} is/are alerted to failed security verification tests;' + links: + - href: '#si-6_smt.c' + rel: assessment-for - id: si-6_obj.c-2 name: assessment-objective props: @@ -133365,6 +144384,12 @@ catalog: value: SI-06c.[02] class: sp800-53a prose: '{{ insert: param, si-06_odp.06 }} is/are alerted to failed privacy verification tests;' + links: + - href: '#si-6_smt.c' + rel: assessment-for + links: + - href: '#si-6_smt.c' + rel: assessment-for - id: si-6_obj.d name: assessment-objective props: @@ -133372,6 +144397,12 @@ catalog: value: SI-06d. class: sp800-53a prose: '{{ insert: param, si-06_odp.07 }} is/are initiated when anomalies are discovered.' + links: + - href: '#si-6_smt.d' + rel: assessment-for + links: + - href: '#si-6_smt' + rel: assessment-for - id: si-6_asm-examine name: assessment-method props: @@ -133498,6 +144529,9 @@ catalog: value: SI-06(02)[01] class: sp800-53a prose: automated mechanisms are implemented to support the management of distributed security function testing; + links: + - href: '#si-6.2_smt' + rel: assessment-for - id: si-6.2_obj-2 name: assessment-objective props: @@ -133505,6 +144539,12 @@ catalog: value: SI-06(02)[02] class: sp800-53a prose: automated mechanisms are implemented to support the management of distributed privacy function testing. + links: + - href: '#si-6.2_smt' + rel: assessment-for + links: + - href: '#si-6.2_smt' + rel: assessment-for - id: si-6.2_asm-examine name: assessment-method props: @@ -133623,6 +144663,9 @@ catalog: value: SI-06(03)[01] class: sp800-53a prose: 'the results of security function verification are reported to {{ insert: param, si-06.03_odp }};' + links: + - href: '#si-6.3_smt' + rel: assessment-for - id: si-6.3_obj-2 name: assessment-objective props: @@ -133630,6 +144673,12 @@ catalog: value: SI-06(03)[02] class: sp800-53a prose: 'the results of privacy function verification are reported to {{ insert: param, si-06.03_odp }}.' + links: + - href: '#si-6.3_smt' + rel: assessment-for + links: + - href: '#si-6.3_smt' + rel: assessment-for - id: si-6.3_asm-examine name: assessment-method props: @@ -133887,6 +144936,9 @@ catalog: value: SI-07a.[01] class: sp800-53a prose: 'integrity verification tools are employed to detect unauthorized changes to {{ insert: param, si-07_odp.01 }};' + links: + - href: '#si-7_smt.a' + rel: assessment-for - id: si-7_obj.a-2 name: assessment-objective props: @@ -133894,6 +144946,9 @@ catalog: value: SI-07a.[02] class: sp800-53a prose: 'integrity verification tools are employed to detect unauthorized changes to {{ insert: param, si-07_odp.02 }};' + links: + - href: '#si-7_smt.a' + rel: assessment-for - id: si-7_obj.a-3 name: assessment-objective props: @@ -133901,6 +144956,12 @@ catalog: value: SI-07a.[03] class: sp800-53a prose: 'integrity verification tools are employed to detect unauthorized changes to {{ insert: param, si-07_odp.03 }};' + links: + - href: '#si-7_smt.a' + rel: assessment-for + links: + - href: '#si-7_smt.a' + rel: assessment-for - id: si-7_obj.b name: assessment-objective props: @@ -133915,6 +144976,9 @@ catalog: value: SI-07b.[01] class: sp800-53a prose: '{{ insert: param, si-07_odp.04 }} are taken when unauthorized changes to the software, are detected;' + links: + - href: '#si-7_smt.b' + rel: assessment-for - id: si-7_obj.b-2 name: assessment-objective props: @@ -133922,6 +144986,9 @@ catalog: value: SI-07b.[02] class: sp800-53a prose: '{{ insert: param, si-07_odp.05 }} are taken when unauthorized changes to the firmware are detected;' + links: + - href: '#si-7_smt.b' + rel: assessment-for - id: si-7_obj.b-3 name: assessment-objective props: @@ -133929,6 +144996,15 @@ catalog: value: SI-07b.[03] class: sp800-53a prose: '{{ insert: param, si-07_odp.06 }} are taken when unauthorized changes to the information are detected.' + links: + - href: '#si-7_smt.b' + rel: assessment-for + links: + - href: '#si-7_smt.b' + rel: assessment-for + links: + - href: '#si-7_smt' + rel: assessment-for - id: si-7_asm-examine name: assessment-method props: @@ -134194,6 +145270,9 @@ catalog: value: SI-07(01)[01] class: sp800-53a prose: 'an integrity check of {{ insert: param, si-07.01_odp.01 }} is performed {{ insert: param, si-07.01_odp.02 }};' + links: + - href: '#si-7.1_smt' + rel: assessment-for - id: si-7.1_obj-2 name: assessment-objective props: @@ -134201,6 +145280,9 @@ catalog: value: SI-07(01)[02] class: sp800-53a prose: 'an integrity check of {{ insert: param, si-07.01_odp.05 }} is performed {{ insert: param, si-07.01_odp.06 }};' + links: + - href: '#si-7.1_smt' + rel: assessment-for - id: si-7.1_obj-3 name: assessment-objective props: @@ -134208,6 +145290,12 @@ catalog: value: SI-07(01)[03] class: sp800-53a prose: 'an integrity check of {{ insert: param, si-07.01_odp.09 }} is performed {{ insert: param, si-07.01_odp.10 }}.' + links: + - href: '#si-7.1_smt' + rel: assessment-for + links: + - href: '#si-7.1_smt' + rel: assessment-for - id: si-7.1_asm-examine name: assessment-method props: @@ -134313,6 +145401,9 @@ catalog: value: SI-07(02) class: sp800-53a prose: 'automated tools that provide notification to {{ insert: param, si-07.02_odp }} upon discovering discrepancies during integrity verification are employed.' + links: + - href: '#si-7.2_smt' + rel: assessment-for - id: si-7.2_asm-examine name: assessment-method props: @@ -134426,6 +145517,9 @@ catalog: value: SI-07(03) class: sp800-53a prose: centrally managed integrity verification tools are employed. + links: + - href: '#si-7.3_smt' + rel: assessment-for - id: si-7.3_asm-examine name: assessment-method props: @@ -134556,6 +145650,9 @@ catalog: value: SI-07(05) class: sp800-53a prose: '{{ insert: param, si-07.05_odp.01 }} are automatically performed when integrity violations are discovered.' + links: + - href: '#si-7.5_smt' + rel: assessment-for - id: si-7.5_asm-examine name: assessment-method props: @@ -134670,6 +145767,9 @@ catalog: value: SI-07(06)[01] class: sp800-53a prose: cryptographic mechanisms are implemented to detect unauthorized changes to software; + links: + - href: '#si-7.6_smt' + rel: assessment-for - id: si-7.6_obj-2 name: assessment-objective props: @@ -134677,6 +145777,9 @@ catalog: value: SI-07(06)[02] class: sp800-53a prose: cryptographic mechanisms are implemented to detect unauthorized changes to firmware; + links: + - href: '#si-7.6_smt' + rel: assessment-for - id: si-7.6_obj-3 name: assessment-objective props: @@ -134684,6 +145787,12 @@ catalog: value: SI-07(06)[03] class: sp800-53a prose: cryptographic mechanisms are implemented to detect unauthorized changes to information. + links: + - href: '#si-7.6_smt' + rel: assessment-for + links: + - href: '#si-7.6_smt' + rel: assessment-for - id: si-7.6_asm-examine name: assessment-method props: @@ -134807,6 +145916,9 @@ catalog: value: SI-07(07) class: sp800-53a prose: 'the detection of {{ insert: param, si-07.07_odp }} are incorporated into the organizational incident response capability.' + links: + - href: '#si-7.7_smt' + rel: assessment-for - id: si-7.7_asm-examine name: assessment-method props: @@ -134954,6 +146066,9 @@ catalog: value: SI-07(08)[01] class: sp800-53a prose: the capability to audit an event upon the detection of a potential integrity violation is provided; + links: + - href: '#si-7.8_smt' + rel: assessment-for - id: si-7.8_obj-2 name: assessment-objective props: @@ -134961,6 +146076,12 @@ catalog: value: SI-07(08)[02] class: sp800-53a prose: '{{ insert: param, si-07.08_odp.01 }} is/are initiated upon the detection of a potential integrity violation.' + links: + - href: '#si-7.8_smt' + rel: assessment-for + links: + - href: '#si-7.8_smt' + rel: assessment-for - id: si-7.8_asm-examine name: assessment-method props: @@ -135081,6 +146202,9 @@ catalog: value: SI-07(09) class: sp800-53a prose: 'the integrity of the boot process of {{ insert: param, si-07.09_odp }} is verified.' + links: + - href: '#si-7.9_smt' + rel: assessment-for - id: si-7.9_asm-examine name: assessment-method props: @@ -135203,6 +146327,9 @@ catalog: value: SI-07(10) class: sp800-53a prose: '{{ insert: param, si-07.10_odp.01 }} are implemented to protect the integrity of boot firmware in {{ insert: param, si-07.10_odp.02 }}.' + links: + - href: '#si-7.10_smt' + rel: assessment-for - id: si-7.10_asm-examine name: assessment-method props: @@ -135336,6 +146463,9 @@ catalog: value: SI-07(12) class: sp800-53a prose: 'the integrity of {{ insert: param, si-07.12_odp }} is verified prior to execution.' + links: + - href: '#si-7.12_smt' + rel: assessment-for - id: si-7.12_asm-examine name: assessment-method props: @@ -135478,6 +146608,9 @@ catalog: value: SI-07(15) class: sp800-53a prose: 'cryptographic mechanisms are implemented to authenticate {{ insert: param, si-07.15_odp }} prior to installation.' + links: + - href: '#si-7.15_smt' + rel: assessment-for - id: si-7.15_asm-examine name: assessment-method props: @@ -135583,6 +146716,9 @@ catalog: value: SI-07(16) class: sp800-53a prose: 'processes are prohibited from executing without supervision for more than {{ insert: param, si-07.16_odp }}.' + links: + - href: '#si-7.16_smt' + rel: assessment-for - id: si-7.16_asm-examine name: assessment-method props: @@ -135694,6 +146830,9 @@ catalog: value: SI-07(17) class: sp800-53a prose: '{{ insert: param, si-07.17_odp }} are implemented for application self-protection at runtime.' + links: + - href: '#si-7.17_smt' + rel: assessment-for - id: si-7.17_asm-examine name: assessment-method props: @@ -135826,6 +146965,9 @@ catalog: value: SI-08a.[01] class: sp800-53a prose: spam protection mechanisms are employed at system entry points to detect unsolicited messages; + links: + - href: '#si-8_smt.a' + rel: assessment-for - id: si-8_obj.a-2 name: assessment-objective props: @@ -135833,6 +146975,9 @@ catalog: value: SI-08a.[02] class: sp800-53a prose: spam protection mechanisms are employed at system exit points to detect unsolicited messages; + links: + - href: '#si-8_smt.a' + rel: assessment-for - id: si-8_obj.a-3 name: assessment-objective props: @@ -135840,6 +146985,9 @@ catalog: value: SI-08a.[03] class: sp800-53a prose: spam protection mechanisms are employed at system entry points to act on unsolicited messages; + links: + - href: '#si-8_smt.a' + rel: assessment-for - id: si-8_obj.a-4 name: assessment-objective props: @@ -135847,6 +146995,12 @@ catalog: value: SI-08a.[04] class: sp800-53a prose: spam protection mechanisms are employed at system exit points to act on unsolicited messages; + links: + - href: '#si-8_smt.a' + rel: assessment-for + links: + - href: '#si-8_smt.a' + rel: assessment-for - id: si-8_obj.b name: assessment-objective props: @@ -135854,6 +147008,12 @@ catalog: value: SI-08b. class: sp800-53a prose: spam protection mechanisms are updated when new releases are available in accordance with organizational configuration management policies and procedures. + links: + - href: '#si-8_smt.b' + rel: assessment-for + links: + - href: '#si-8_smt' + rel: assessment-for - id: si-8_asm-examine name: assessment-method props: @@ -135980,6 +147140,9 @@ catalog: value: SI-08(02) class: sp800-53a prose: 'spam protection mechanisms are automatically updated {{ insert: param, si-08.02_odp }}.' + links: + - href: '#si-8.2_smt' + rel: assessment-for - id: si-8.2_asm-examine name: assessment-method props: @@ -136076,6 +147239,9 @@ catalog: value: SI-08(03) class: sp800-53a prose: spam protection mechanisms with a learning capability are implemented to more effectively identify legitimate communications traffic. + links: + - href: '#si-8.3_smt' + rel: assessment-for - id: si-8.3_asm-examine name: assessment-method props: @@ -136211,6 +147377,9 @@ catalog: value: SI-10 class: sp800-53a prose: 'the validity of the {{ insert: param, si-10_odp }} is checked.' + links: + - href: '#si-10_smt' + rel: assessment-for - id: si-10_asm-examine name: assessment-method props: @@ -136357,6 +147526,9 @@ catalog: value: SI-10(01)(a) class: sp800-53a prose: 'a manual override capability for the validation of {{ insert: param, si-10_odp }} is provided;' + links: + - href: '#si-10.1_smt.a' + rel: assessment-for - id: si-10.1_obj.b name: assessment-objective props: @@ -136364,6 +147536,9 @@ catalog: value: SI-10(01)(b) class: sp800-53a prose: 'the use of the manual override capability is restricted to only {{ insert: param, si-10.01_odp }};' + links: + - href: '#si-10.1_smt.b' + rel: assessment-for - id: si-10.1_obj.c name: assessment-objective props: @@ -136371,6 +147546,12 @@ catalog: value: SI-10(01)(c) class: sp800-53a prose: the use of the manual override capability is audited. + links: + - href: '#si-10.1_smt.c' + rel: assessment-for + links: + - href: '#si-10.1_smt' + rel: assessment-for - id: si-10.1_asm-examine name: assessment-method props: @@ -136505,6 +147686,9 @@ catalog: value: SI-10(02)[01] class: sp800-53a prose: 'input validation errors are reviewed within {{ insert: param, si-10.02_odp.01 }};' + links: + - href: '#si-10.2_smt' + rel: assessment-for - id: si-10.2_obj-2 name: assessment-objective props: @@ -136512,6 +147696,12 @@ catalog: value: SI-10(02)[02] class: sp800-53a prose: 'input validation errors are resolved within {{ insert: param, si-10.02_odp.02 }}.' + links: + - href: '#si-10.2_smt' + rel: assessment-for + links: + - href: '#si-10.2_smt' + rel: assessment-for - id: si-10.2_asm-examine name: assessment-method props: @@ -136619,6 +147809,9 @@ catalog: value: SI-10(03)[01] class: sp800-53a prose: the system behaves in a predictable manner when invalid inputs are received; + links: + - href: '#si-10.3_smt' + rel: assessment-for - id: si-10.3_obj-2 name: assessment-objective props: @@ -136626,6 +147819,12 @@ catalog: value: SI-10(03)[02] class: sp800-53a prose: the system behaves in a documented manner when invalid inputs are received. + links: + - href: '#si-10.3_smt' + rel: assessment-for + links: + - href: '#si-10.3_smt' + rel: assessment-for - id: si-10.3_asm-examine name: assessment-method props: @@ -136718,6 +147917,9 @@ catalog: value: SI-10(04) class: sp800-53a prose: timing interactions among system components are accounted for in determining appropriate responses for invalid inputs. + links: + - href: '#si-10.4_smt' + rel: assessment-for - id: si-10.4_asm-examine name: assessment-method props: @@ -136838,6 +148040,9 @@ catalog: value: SI-10(05) class: sp800-53a prose: 'the use of information inputs is restricted to {{ insert: param, si-10.05_odp.01 }} and/or {{ insert: param, si-10.05_odp.02 }}.' + links: + - href: '#si-10.5_smt' + rel: assessment-for - id: si-10.5_asm-examine name: assessment-method props: @@ -136941,6 +148146,9 @@ catalog: value: SI-10(06) class: sp800-53a prose: untrusted data injections are prevented. + links: + - href: '#si-10.6_smt' + rel: assessment-for - id: si-10.6_asm-examine name: assessment-method props: @@ -137075,6 +148283,9 @@ catalog: value: SI-11a. class: sp800-53a prose: error messages that provide the information necessary for corrective actions are generated without revealing information that could be exploited; + links: + - href: '#si-11_smt.a' + rel: assessment-for - id: si-11_obj.b name: assessment-objective props: @@ -137082,6 +148293,12 @@ catalog: value: SI-11b. class: sp800-53a prose: 'error messages are revealed only to {{ insert: param, si-11_odp }}.' + links: + - href: '#si-11_smt.b' + rel: assessment-for + links: + - href: '#si-11_smt' + rel: assessment-for - id: si-11_asm-examine name: assessment-method props: @@ -137249,6 +148466,9 @@ catalog: value: SI-12[01] class: sp800-53a prose: information within the system is managed in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, guidelines, and operational requirements; + links: + - href: '#si-12_smt' + rel: assessment-for - id: si-12_obj-2 name: assessment-objective props: @@ -137256,6 +148476,9 @@ catalog: value: SI-12[02] class: sp800-53a prose: information within the system is retained in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, guidelines, and operational requirements; + links: + - href: '#si-12_smt' + rel: assessment-for - id: si-12_obj-3 name: assessment-objective props: @@ -137263,6 +148486,9 @@ catalog: value: SI-12[03] class: sp800-53a prose: information output from the system is managed in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, guidelines, and operational requirements; + links: + - href: '#si-12_smt' + rel: assessment-for - id: si-12_obj-4 name: assessment-objective props: @@ -137270,6 +148496,12 @@ catalog: value: SI-12[04] class: sp800-53a prose: information output from the system is retained in accordance with applicable laws, Executive Orders, directives, regulations, policies, standards, guidelines, and operational requirements. + links: + - href: '#si-12_smt' + rel: assessment-for + links: + - href: '#si-12_smt' + rel: assessment-for - id: si-12_asm-examine name: assessment-method props: @@ -137390,6 +148622,9 @@ catalog: value: SI-12(01) class: sp800-53a prose: 'personally identifiable information being processed in the information life cycle is limited to {{ insert: param, si-12.01_odp }}.' + links: + - href: '#si-12.1_smt' + rel: assessment-for - id: si-12.1_asm-examine name: assessment-method props: @@ -137548,6 +148783,9 @@ catalog: value: SI-12(02)[01] class: sp800-53a prose: '{{ insert: param, si-12.02_odp.01 }} are used to minimize the use of personally identifiable information for research;' + links: + - href: '#si-12.2_smt' + rel: assessment-for - id: si-12.2_obj-2 name: assessment-objective props: @@ -137555,6 +148793,9 @@ catalog: value: SI-12(02)[02] class: sp800-53a prose: '{{ insert: param, si-12.02_odp.02 }} are used to minimize the use of personally identifiable information for testing;' + links: + - href: '#si-12.2_smt' + rel: assessment-for - id: si-12.2_obj-3 name: assessment-objective props: @@ -137562,6 +148803,12 @@ catalog: value: SI-12(02)[03] class: sp800-53a prose: '{{ insert: param, si-12.02_odp.03 }} are used to minimize the use of personally identifiable information for training.' + links: + - href: '#si-12.2_smt' + rel: assessment-for + links: + - href: '#si-12.2_smt' + rel: assessment-for - id: si-12.2_asm-examine name: assessment-method props: @@ -137712,6 +148959,9 @@ catalog: value: SI-12(03)[01] class: sp800-53a prose: '{{ insert: param, si-12.03_odp.01 }} are used to dispose of information following the retention period;' + links: + - href: '#si-12.3_smt' + rel: assessment-for - id: si-12.3_obj-2 name: assessment-objective props: @@ -137719,6 +148969,9 @@ catalog: value: SI-12(03)[02] class: sp800-53a prose: '{{ insert: param, si-12.03_odp.02 }} are used to destroy information following the retention period;' + links: + - href: '#si-12.3_smt' + rel: assessment-for - id: si-12.3_obj-3 name: assessment-objective props: @@ -137726,6 +148979,12 @@ catalog: value: SI-12(03)[03] class: sp800-53a prose: '{{ insert: param, si-12.03_odp.03 }} are used to erase information following the retention period.' + links: + - href: '#si-12.3_smt' + rel: assessment-for + links: + - href: '#si-12.3_smt' + rel: assessment-for - id: si-12.3_asm-examine name: assessment-method props: @@ -137892,6 +149151,9 @@ catalog: value: SI-13a. class: sp800-53a prose: 'mean time to failure (MTTF) is determined for {{ insert: param, si-13_odp.01 }} in specific environments of operation;' + links: + - href: '#si-13_smt.a' + rel: assessment-for - id: si-13_obj.b name: assessment-objective props: @@ -137899,6 +149161,12 @@ catalog: value: SI-13b. class: sp800-53a prose: 'substitute system components and a means to exchange active and standby components are provided in accordance with {{ insert: param, si-13_odp.02 }}.' + links: + - href: '#si-13_smt.b' + rel: assessment-for + links: + - href: '#si-13_smt' + rel: assessment-for - id: si-13_asm-examine name: assessment-method props: @@ -138005,6 +149273,9 @@ catalog: value: SI-13(01) class: sp800-53a prose: 'system components are taken out of service by transferring component responsibilities to substitute components no later than {{ insert: param, si-13.01_odp }} of mean time to failure.' + links: + - href: '#si-13.1_smt' + rel: assessment-for - id: si-13.1_asm-examine name: assessment-method props: @@ -138127,6 +149398,9 @@ catalog: value: SI-13(03) class: sp800-53a prose: 'transfers are initiated manually between active and standby system components when the use of the active component reaches {{ insert: param, si-13.03_odp }} of the mean time to failure.' + links: + - href: '#si-13.3_smt' + rel: assessment-for - id: si-13.3_asm-examine name: assessment-method props: @@ -138286,6 +149560,9 @@ catalog: value: SI-13(04)(a) class: sp800-53a prose: 'the standby components are successfully and transparently installed within {{ insert: param, si-13.04_odp.01 }} if system component failures are detected;' + links: + - href: '#si-13.4_smt.a' + rel: assessment-for - id: si-13.4_obj.b name: assessment-objective props: @@ -138293,6 +149570,12 @@ catalog: value: SI-13(04)(b) class: sp800-53a prose: '{{ insert: param, si-13.04_odp.02 }} are performed if system component failures are detected.' + links: + - href: '#si-13.4_smt.b' + rel: assessment-for + links: + - href: '#si-13.4_smt' + rel: assessment-for - id: si-13.4_asm-examine name: assessment-method props: @@ -138420,6 +149703,9 @@ catalog: value: SI-13(05) class: sp800-53a prose: '{{ insert: param, si-13.05_odp.01 }} {{ insert: param, si-13.05_odp.02 }} is provided for the system.' + links: + - href: '#si-13.5_smt' + rel: assessment-for - id: si-13.5_asm-examine name: assessment-method props: @@ -138564,6 +149850,9 @@ catalog: value: SI-14[01] class: sp800-53a prose: 'non-persistent {{ insert: param, si-14_odp.01 }} that are initiated in a known state are implemented;' + links: + - href: '#si-14_smt' + rel: assessment-for - id: si-14_obj-2 name: assessment-objective props: @@ -138571,6 +149860,12 @@ catalog: value: SI-14[02] class: sp800-53a prose: 'non-persistent {{ insert: param, si-14_odp.01 }} are terminated {{ insert: param, si-14_odp.02 }}.' + links: + - href: '#si-14_smt' + rel: assessment-for + links: + - href: '#si-14_smt' + rel: assessment-for - id: si-14_asm-examine name: assessment-method props: @@ -138675,6 +149970,9 @@ catalog: value: SI-14(01) class: sp800-53a prose: 'the software and data employed during system component and service refreshes are obtained from {{ insert: param, si-14.01_odp }}.' + links: + - href: '#si-14.1_smt' + rel: assessment-for - id: si-14.1_asm-examine name: assessment-method props: @@ -138827,6 +150125,9 @@ catalog: value: SI-14(02)(a) class: sp800-53a prose: '{{ insert: param, si-14.02_odp.01 }} is performed;' + links: + - href: '#si-14.2_smt.a' + rel: assessment-for - id: si-14.2_obj.b name: assessment-objective props: @@ -138834,6 +150135,12 @@ catalog: value: SI-14(02)(b) class: sp800-53a prose: information is deleted when no longer needed. + links: + - href: '#si-14.2_smt.b' + rel: assessment-for + links: + - href: '#si-14.2_smt' + rel: assessment-for - id: si-14.2_asm-examine name: assessment-method props: @@ -138946,6 +150253,9 @@ catalog: value: SI-14(03)[01] class: sp800-53a prose: connections to the system are established on demand; + links: + - href: '#si-14.3_smt' + rel: assessment-for - id: si-14.3_obj-2 name: assessment-objective props: @@ -138953,6 +150263,12 @@ catalog: value: SI-14(03)[02] class: sp800-53a prose: 'connections to the system are terminated after {{ insert: param, si-14.03_odp }}.' + links: + - href: '#si-14.3_smt' + rel: assessment-for + links: + - href: '#si-14.3_smt' + rel: assessment-for - id: si-14.3_asm-examine name: assessment-method props: @@ -139059,6 +150375,9 @@ catalog: value: SI-15 class: sp800-53a prose: 'information output from {{ insert: param, si-15_odp }} is validated to ensure that the information is consistent with the expected content.' + links: + - href: '#si-15_smt' + rel: assessment-for - id: si-15_asm-examine name: assessment-method props: @@ -139169,6 +150488,9 @@ catalog: value: SI-16 class: sp800-53a prose: '{{ insert: param, si-16_odp }} are implemented to protect the system memory from unauthorized code execution.' + links: + - href: '#si-16_smt' + rel: assessment-for - id: si-16_asm-examine name: assessment-method props: @@ -139295,6 +150617,9 @@ catalog: value: SI-17 class: sp800-53a prose: '{{ insert: param, si-17_odp.01 }} are implemented when {{ insert: param, si-17_odp.02 }} occur.' + links: + - href: '#si-17_smt' + rel: assessment-for - id: si-17_asm-examine name: assessment-method props: @@ -139478,6 +150803,9 @@ catalog: value: SI-18a.[01] class: sp800-53a prose: 'the accuracy of personally identifiable information across the information life cycle is checked {{ insert: param, si-18_odp.01 }};' + links: + - href: '#si-18_smt.a' + rel: assessment-for - id: si-18_obj.a-2 name: assessment-objective props: @@ -139485,6 +150813,9 @@ catalog: value: SI-18a.[02] class: sp800-53a prose: 'the relevance of personally identifiable information across the information life cycle is checked {{ insert: param, si-18_odp.02 }};' + links: + - href: '#si-18_smt.a' + rel: assessment-for - id: si-18_obj.a-3 name: assessment-objective props: @@ -139492,6 +150823,9 @@ catalog: value: SI-18a.[03] class: sp800-53a prose: 'the timeliness of personally identifiable information across the information life cycle is checked {{ insert: param, si-18_odp.03 }};' + links: + - href: '#si-18_smt.a' + rel: assessment-for - id: si-18_obj.a-4 name: assessment-objective props: @@ -139499,6 +150833,12 @@ catalog: value: SI-18a.[04] class: sp800-53a prose: 'the completeness of personally identifiable information across the information life cycle is checked {{ insert: param, si-18_odp.04 }};' + links: + - href: '#si-18_smt.a' + rel: assessment-for + links: + - href: '#si-18_smt.a' + rel: assessment-for - id: si-18_obj.b name: assessment-objective props: @@ -139506,6 +150846,12 @@ catalog: value: SI-18b. class: sp800-53a prose: inaccurate or outdated personally identifiable information is corrected or deleted. + links: + - href: '#si-18_smt.b' + rel: assessment-for + links: + - href: '#si-18_smt' + rel: assessment-for - id: si-18_asm-examine name: assessment-method props: @@ -139628,6 +150974,9 @@ catalog: value: SI-18(01) class: sp800-53a prose: '{{ insert: param, si-18.01_odp }} are used to correct or delete personally identifiable information that is inaccurate, outdated, incorrectly determined regarding impact, or incorrectly de-identified.' + links: + - href: '#si-18.1_smt' + rel: assessment-for - id: si-18.1_asm-examine name: assessment-method props: @@ -139735,6 +151084,9 @@ catalog: value: SI-18(02) class: sp800-53a prose: data tags are employed to automate the correction or deletion of personally identifiable information across the information life cycle within organizational systems. + links: + - href: '#si-18.2_smt' + rel: assessment-for - id: si-18.2_asm-examine name: assessment-method props: @@ -139834,6 +151186,9 @@ catalog: value: SI-18(03) class: sp800-53a prose: personally identifiable information is collected directly from the individual. + links: + - href: '#si-18.3_smt' + rel: assessment-for - id: si-18.3_asm-examine name: assessment-method props: @@ -139931,6 +151286,9 @@ catalog: value: SI-18(04) class: sp800-53a prose: personally identifiable information is corrected or deleted upon request by individuals or their designated representatives. + links: + - href: '#si-18.4_smt' + rel: assessment-for - id: si-18.4_asm-examine name: assessment-method props: @@ -140044,6 +151402,9 @@ catalog: value: SI-18(05) class: sp800-53a prose: '{{ insert: param, si-18.05_odp }} and individuals are notified when the personally identifiable information has been corrected or deleted.' + links: + - href: '#si-18.5_smt' + rel: assessment-for - id: si-18.5_asm-examine name: assessment-method props: @@ -140200,6 +151561,9 @@ catalog: value: SI-19a. class: sp800-53a prose: '{{ insert: param, si-19_odp.01 }} are removed from datasets;' + links: + - href: '#si-19_smt.a' + rel: assessment-for - id: si-19_obj.b name: assessment-objective props: @@ -140207,6 +151571,12 @@ catalog: value: SI-19b. class: sp800-53a prose: 'the effectiveness of de-identification is evaluated {{ insert: param, si-19_odp.02 }}.' + links: + - href: '#si-19_smt.b' + rel: assessment-for + links: + - href: '#si-19_smt' + rel: assessment-for - id: si-19_asm-examine name: assessment-method props: @@ -140304,6 +151674,9 @@ catalog: value: SI-19(01) class: sp800-53a prose: the dataset is de-identified upon collection by not collecting personally identifiable information. + links: + - href: '#si-19.1_smt' + rel: assessment-for - id: si-19.1_asm-examine name: assessment-method props: @@ -140400,6 +151773,9 @@ catalog: value: SI-19(02) class: sp800-53a prose: the archiving of personally identifiable information elements is prohibited if those elements in a dataset will not be needed after the dataset is archived. + links: + - href: '#si-19.2_smt' + rel: assessment-for - id: si-19.2_asm-examine name: assessment-method props: @@ -140496,6 +151872,9 @@ catalog: value: SI-19(03) class: sp800-53a prose: personally identifiable information elements are removed from a dataset prior to its release if those elements in the dataset do not need to be part of the data release. + links: + - href: '#si-19.3_smt' + rel: assessment-for - id: si-19.3_asm-examine name: assessment-method props: @@ -140593,6 +151972,9 @@ catalog: value: SI-19(04) class: sp800-53a prose: direct identifiers in a dataset are removed, masked, encrypted, hashed, or replaced. + links: + - href: '#si-19.4_smt' + rel: assessment-for - id: si-19.4_asm-examine name: assessment-method props: @@ -140696,6 +152078,9 @@ catalog: value: SI-19(05)[01] class: sp800-53a prose: numerical data is manipulated so that no individual or organization is identifiable in the results of the analysis; + links: + - href: '#si-19.5_smt' + rel: assessment-for - id: si-19.5_obj-2 name: assessment-objective props: @@ -140703,6 +152088,9 @@ catalog: value: SI-19(05)[02] class: sp800-53a prose: contingency tables are manipulated so that no individual or organization is identifiable in the results of the analysis; + links: + - href: '#si-19.5_smt' + rel: assessment-for - id: si-19.5_obj-3 name: assessment-objective props: @@ -140710,6 +152098,12 @@ catalog: value: SI-19(05)[03] class: sp800-53a prose: statistical findings are manipulated so that no individual or organization is identifiable in the results of the analysis. + links: + - href: '#si-19.5_smt' + rel: assessment-for + links: + - href: '#si-19.5_smt' + rel: assessment-for - id: si-19.5_asm-examine name: assessment-method props: @@ -140812,6 +152206,9 @@ catalog: value: SI-19(06) class: sp800-53a prose: the disclosure of personally identifiable information is prevented by adding non-deterministic noise to the results of mathematical operations before the results are reported. + links: + - href: '#si-19.6_smt' + rel: assessment-for - id: si-19.6_asm-examine name: assessment-method props: @@ -140915,6 +152312,9 @@ catalog: value: SI-19(07)[01] class: sp800-53a prose: de-identification is performed using validated algorithms; + links: + - href: '#si-19.7_smt' + rel: assessment-for - id: si-19.7_obj-2 name: assessment-objective props: @@ -140922,6 +152322,12 @@ catalog: value: SI-19(07)[02] class: sp800-53a prose: de-identification is performed using software that is validated to implement the algorithms. + links: + - href: '#si-19.7_smt' + rel: assessment-for + links: + - href: '#si-19.7_smt' + rel: assessment-for - id: si-19.7_asm-examine name: assessment-method props: @@ -141018,6 +152424,9 @@ catalog: value: SI-19(08) class: sp800-53a prose: a motivated intruder test is performed on the de-identified dataset to determine if the identified data remains or if the de-identified data can be re-identified. + links: + - href: '#si-19.8_smt' + rel: assessment-for - id: si-19.8_asm-examine name: assessment-method props: @@ -141132,6 +152541,9 @@ catalog: value: SI-20 class: sp800-53a prose: 'data or capabilities are embedded in {{ insert: param, si-20_odp }} to determine if organizational data has been exfiltrated or improperly removed from the organization.' + links: + - href: '#si-20_smt' + rel: assessment-for - id: si-20_asm-examine name: assessment-method props: @@ -141259,6 +152671,9 @@ catalog: value: SI-21 class: sp800-53a prose: 'the {{ insert: param, si-21_odp.01 }} is refreshed {{ insert: param, si-21_odp.02 }} or is generated on demand and deleted when no longer needed.' + links: + - href: '#si-21_smt' + rel: assessment-for - id: si-21_asm-examine name: assessment-method props: @@ -141413,6 +152828,9 @@ catalog: value: SI-22a. class: sp800-53a prose: '{{ insert: param, si-22_odp.01 }} for {{ insert: param, si-22_odp.02 }} are identified;' + links: + - href: '#si-22_smt.a' + rel: assessment-for - id: si-22_obj.b name: assessment-objective props: @@ -141420,6 +152838,12 @@ catalog: value: SI-22b. class: sp800-53a prose: 'an alternative information source is used for the execution of essential functions or services on {{ insert: param, si-22_odp.03 }} when the primary source of information is corrupted or unavailable.' + links: + - href: '#si-22_smt.b' + rel: assessment-for + links: + - href: '#si-22_smt' + rel: assessment-for - id: si-22_asm-examine name: assessment-method props: @@ -141566,6 +152990,9 @@ catalog: value: SI-23a. class: sp800-53a prose: 'under {{ insert: param, si-23_odp.01 }}, {{ insert: param, si-23_odp.02 }} is fragmented;' + links: + - href: '#si-23_smt.a' + rel: assessment-for - id: si-23_obj.b name: assessment-objective props: @@ -141573,6 +153000,12 @@ catalog: value: SI-23b. class: sp800-53a prose: 'under {{ insert: param, si-23_odp.01 }} , the fragmented information is distributed across {{ insert: param, si-23_odp.03 }}.' + links: + - href: '#si-23_smt.b' + rel: assessment-for + links: + - href: '#si-23_smt' + rel: assessment-for - id: si-23_asm-examine name: assessment-method props: @@ -141868,6 +153301,9 @@ catalog: value: SR-01a.[01] class: sp800-53a prose: a supply chain risk management policy is developed and documented; + links: + - href: '#sr-1_smt.a' + rel: assessment-for - id: sr-1_obj.a-2 name: assessment-objective props: @@ -141875,6 +153311,9 @@ catalog: value: SR-01a.[02] class: sp800-53a prose: 'the supply chain risk management policy is disseminated to {{ insert: param, sr-01_odp.01 }};' + links: + - href: '#sr-1_smt.a' + rel: assessment-for - id: sr-1_obj.a-3 name: assessment-objective props: @@ -141882,6 +153321,9 @@ catalog: value: SR-01a.[03] class: sp800-53a prose: supply chain risk management procedures to facilitate the implementation of the supply chain risk management policy and the associated supply chain risk management controls are developed and documented; + links: + - href: '#sr-1_smt.a' + rel: assessment-for - id: sr-1_obj.a-4 name: assessment-objective props: @@ -141889,6 +153331,9 @@ catalog: value: SR-01a.[04] class: sp800-53a prose: 'the supply chain risk management procedures are disseminated to {{ insert: param, sr-01_odp.02 }}.' + links: + - href: '#sr-1_smt.a' + rel: assessment-for - id: sr-1_obj.a.1 name: assessment-objective props: @@ -141910,6 +153355,9 @@ catalog: value: SR-01a.01(a)[01] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses purpose;' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-2 name: assessment-objective props: @@ -141917,6 +153365,9 @@ catalog: value: SR-01a.01(a)[02] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses scope; ' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-3 name: assessment-objective props: @@ -141924,6 +153375,9 @@ catalog: value: SR-01a.01(a)[03] class: sp800-53a prose: '{{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses roles;' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-4 name: assessment-objective props: @@ -141931,6 +153385,9 @@ catalog: value: SR-01a.01(a)[04] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses responsibilities;' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-5 name: assessment-objective props: @@ -141938,6 +153395,9 @@ catalog: value: SR-01a.01(a)[05] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses management commitment;' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-6 name: assessment-objective props: @@ -141945,6 +153405,9 @@ catalog: value: SR-01a.01(a)[06] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses coordination among organizational entities;' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.a-7 name: assessment-objective props: @@ -141952,6 +153415,12 @@ catalog: value: SR-01a.01(a)[07] class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy addresses compliance.' + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for + links: + - href: '#sr-1_smt.a.1.a' + rel: assessment-for - id: sr-1_obj.a.1.b name: assessment-objective props: @@ -141959,6 +153428,15 @@ catalog: value: SR-01a.01(b) class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.03 }} supply chain risk management policy is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines;' + links: + - href: '#sr-1_smt.a.1.b' + rel: assessment-for + links: + - href: '#sr-1_smt.a.1' + rel: assessment-for + links: + - href: '#sr-1_smt.a' + rel: assessment-for - id: sr-1_obj.b name: assessment-objective props: @@ -141966,6 +153444,9 @@ catalog: value: SR-01b. class: sp800-53a prose: 'the {{ insert: param, sr-01_odp.04 }} is designated to manage the development, documentation, and dissemination of the supply chain risk management policy and procedures;' + links: + - href: '#sr-1_smt.b' + rel: assessment-for - id: sr-1_obj.c name: assessment-objective props: @@ -141987,6 +153468,9 @@ catalog: value: SR-01c.01[01] class: sp800-53a prose: 'the current supply chain risk management policy is reviewed and updated {{ insert: param, sr-01_odp.05 }};' + links: + - href: '#sr-1_smt.c.1' + rel: assessment-for - id: sr-1_obj.c.1-2 name: assessment-objective props: @@ -141994,6 +153478,12 @@ catalog: value: SR-01c.01[02] class: sp800-53a prose: 'the current supply chain risk management policy is reviewed and updated following {{ insert: param, sr-01_odp.06 }};' + links: + - href: '#sr-1_smt.c.1' + rel: assessment-for + links: + - href: '#sr-1_smt.c.1' + rel: assessment-for - id: sr-1_obj.c.2 name: assessment-objective props: @@ -142008,6 +153498,9 @@ catalog: value: SR-01c.02[01] class: sp800-53a prose: 'the current supply chain risk management procedures are reviewed and updated {{ insert: param, sr-01_odp.07 }};' + links: + - href: '#sr-1_smt.c.2' + rel: assessment-for - id: sr-1_obj.c.2-2 name: assessment-objective props: @@ -142015,6 +153508,18 @@ catalog: value: SR-01c.02[02] class: sp800-53a prose: 'the current supply chain risk management procedures are reviewed and updated following {{ insert: param, sr-01_odp.08 }}.' + links: + - href: '#sr-1_smt.c.2' + rel: assessment-for + links: + - href: '#sr-1_smt.c.2' + rel: assessment-for + links: + - href: '#sr-1_smt.c' + rel: assessment-for + links: + - href: '#sr-1_smt' + rel: assessment-for - id: sr-1_asm-examine name: assessment-method props: @@ -142191,6 +153696,9 @@ catalog: value: SR-02a.[01] class: sp800-53a prose: a plan for managing supply chain risks is developed; + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-2 name: assessment-objective props: @@ -142198,6 +153706,9 @@ catalog: value: SR-02a.[02] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the research and development of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-3 name: assessment-objective props: @@ -142205,6 +153716,9 @@ catalog: value: SR-02a.[03] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the design of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-4 name: assessment-objective props: @@ -142212,6 +153726,9 @@ catalog: value: SR-02a.[04] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the manufacturing of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-5 name: assessment-objective props: @@ -142219,6 +153736,9 @@ catalog: value: SR-02a.[05] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the acquisition of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-6 name: assessment-objective props: @@ -142226,6 +153746,9 @@ catalog: value: SR-02a.[06] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the delivery of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-7 name: assessment-objective props: @@ -142233,6 +153756,9 @@ catalog: value: SR-02a.[07] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the integration of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-8 name: assessment-objective props: @@ -142240,6 +153766,9 @@ catalog: value: SR-02a.[08] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the operation and maintenance of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.a-9 name: assessment-objective props: @@ -142247,6 +153776,12 @@ catalog: value: SR-02a.[09] class: sp800-53a prose: 'the supply chain risk management plan addresses risks associated with the disposal of {{ insert: param, sr-02_odp.01 }};' + links: + - href: '#sr-2_smt.a' + rel: assessment-for + links: + - href: '#sr-2_smt.a' + rel: assessment-for - id: sr-2_obj.b name: assessment-objective props: @@ -142254,6 +153789,9 @@ catalog: value: SR-02b. class: sp800-53a prose: 'the supply chain risk management plan is reviewed and updated {{ insert: param, sr-02_odp.02 }} or as required to address threat, organizational, or environmental changes;' + links: + - href: '#sr-2_smt.b' + rel: assessment-for - id: sr-2_obj.c name: assessment-objective props: @@ -142268,6 +153806,9 @@ catalog: value: SR-02c.[01] class: sp800-53a prose: the supply chain risk management plan is protected from unauthorized disclosure; + links: + - href: '#sr-2_smt.c' + rel: assessment-for - id: sr-2_obj.c-2 name: assessment-objective props: @@ -142275,6 +153816,15 @@ catalog: value: SR-02c.[02] class: sp800-53a prose: the supply chain risk management plan is protected from unauthorized modification. + links: + - href: '#sr-2_smt.c' + rel: assessment-for + links: + - href: '#sr-2_smt.c' + rel: assessment-for + links: + - href: '#sr-2_smt' + rel: assessment-for - id: sr-2_asm-examine name: assessment-method props: @@ -142421,6 +153971,9 @@ catalog: value: SR-02(01) class: sp800-53a prose: 'a supply chain risk management team consisting of {{ insert: param, sr-02.01_odp.01 }} is established to lead and support {{ insert: param, sr-02.01_odp.02 }}.' + links: + - href: '#sr-2.1_smt' + rel: assessment-for - id: sr-2.1_asm-examine name: assessment-method props: @@ -142654,6 +154207,9 @@ catalog: value: SR-03a.[01] class: sp800-53a prose: 'a process or processes is/are established to identify and address weaknesses or deficiencies in the supply chain elements and processes of {{ insert: param, sr-03_odp.01 }};' + links: + - href: '#sr-3_smt.a' + rel: assessment-for - id: sr-3_obj.a-2 name: assessment-objective props: @@ -142661,6 +154217,12 @@ catalog: value: SR-03a.[02] class: sp800-53a prose: 'the process or processes to identify and address weaknesses or deficiencies in the supply chain elements and processes of {{ insert: param, sr-03_odp.01 }} is/are coordinated with {{ insert: param, sr-03_odp.02 }};' + links: + - href: '#sr-3_smt.a' + rel: assessment-for + links: + - href: '#sr-3_smt.a' + rel: assessment-for - id: sr-3_obj.b name: assessment-objective props: @@ -142668,6 +154230,9 @@ catalog: value: SR-03b. class: sp800-53a prose: '{{ insert: param, sr-03_odp.03 }} are employed to protect against supply chain risks to the system, system component, or system service and to limit the harm or consequences from supply chain-related events;' + links: + - href: '#sr-3_smt.b' + rel: assessment-for - id: sr-3_obj.c name: assessment-objective props: @@ -142675,6 +154240,12 @@ catalog: value: SR-03c. class: sp800-53a prose: 'the selected and implemented supply chain processes and controls are documented in {{ insert: param, sr-03_odp.04 }}.' + links: + - href: '#sr-3_smt.c' + rel: assessment-for + links: + - href: '#sr-3_smt' + rel: assessment-for - id: sr-3_asm-examine name: assessment-method props: @@ -142815,6 +154386,9 @@ catalog: value: SR-03(01)[01] class: sp800-53a prose: 'a diverse set of sources is employed for {{ insert: param, sr-03.01_odp.01 }};' + links: + - href: '#sr-3.1_smt' + rel: assessment-for - id: sr-3.1_obj-2 name: assessment-objective props: @@ -142822,6 +154396,12 @@ catalog: value: SR-03(01)[02] class: sp800-53a prose: 'a diverse set of sources is employed for {{ insert: param, sr-03.01_odp.02 }}.' + links: + - href: '#sr-3.1_smt' + rel: assessment-for + links: + - href: '#sr-3.1_smt' + rel: assessment-for - id: sr-3.1_asm-examine name: assessment-method props: @@ -142932,6 +154512,9 @@ catalog: value: SR-03(02) class: sp800-53a prose: '{{ insert: param, sr-03.02_odp }} are employed to limit harm from potential adversaries identifying and targeting the organizational supply chain.' + links: + - href: '#sr-3.2_smt' + rel: assessment-for - id: sr-3.2_asm-examine name: assessment-method props: @@ -143049,6 +154632,9 @@ catalog: value: SR-03(03) class: sp800-53a prose: the controls included in the contracts of prime contractors are also included in the contracts of subcontractors. + links: + - href: '#sr-3.3_smt' + rel: assessment-for - id: sr-3.3_asm-examine name: assessment-method props: @@ -143193,6 +154779,9 @@ catalog: value: SR-04[01] class: sp800-53a prose: 'valid provenance is documented for {{ insert: param, sr-04_odp }};' + links: + - href: '#sr-4_smt' + rel: assessment-for - id: sr-4_obj-2 name: assessment-objective props: @@ -143200,6 +154789,9 @@ catalog: value: SR-04[02] class: sp800-53a prose: 'valid provenance is monitored for {{ insert: param, sr-04_odp }};' + links: + - href: '#sr-4_smt' + rel: assessment-for - id: sr-4_obj-3 name: assessment-objective props: @@ -143207,6 +154799,12 @@ catalog: value: SR-04[03] class: sp800-53a prose: 'valid provenance is maintained for {{ insert: param, sr-04_odp }}.' + links: + - href: '#sr-4_smt' + rel: assessment-for + links: + - href: '#sr-4_smt' + rel: assessment-for - id: sr-4_asm-examine name: assessment-method props: @@ -143336,6 +154934,9 @@ catalog: value: SR-04(01)[01] class: sp800-53a prose: 'unique identification of {{ insert: param, sr-04.01_odp }} is established;' + links: + - href: '#sr-4.1_smt' + rel: assessment-for - id: sr-4.1_obj-2 name: assessment-objective props: @@ -143343,6 +154944,12 @@ catalog: value: SR-04(01)[02] class: sp800-53a prose: 'unique identification of {{ insert: param, sr-04.01_odp }} is maintained.' + links: + - href: '#sr-4.1_smt' + rel: assessment-for + links: + - href: '#sr-4.1_smt' + rel: assessment-for - id: sr-4.1_asm-examine name: assessment-method props: @@ -143464,6 +155071,9 @@ catalog: value: SR-04(02)[01] class: sp800-53a prose: 'the unique identification of {{ insert: param, sr-04.02_odp }} is established for tracking through the supply chain;' + links: + - href: '#sr-4.2_smt' + rel: assessment-for - id: sr-4.2_obj-2 name: assessment-objective props: @@ -143471,6 +155081,12 @@ catalog: value: SR-04(02)[02] class: sp800-53a prose: 'the unique identification of {{ insert: param, sr-04.02_odp }} is maintained for tracking through the supply chain.' + links: + - href: '#sr-4.2_smt' + rel: assessment-for + links: + - href: '#sr-4.2_smt' + rel: assessment-for - id: sr-4.2_asm-examine name: assessment-method props: @@ -143607,6 +155223,9 @@ catalog: value: SR-04(03)[01] class: sp800-53a prose: '{{ insert: param, sr-04.03_odp.01 }} are employed to validate that the system or system component received is genuine;' + links: + - href: '#sr-4.3_smt' + rel: assessment-for - id: sr-4.3_obj-2 name: assessment-objective props: @@ -143614,6 +155233,12 @@ catalog: value: SR-04(03)[02] class: sp800-53a prose: '{{ insert: param, sr-04.03_odp.02 }} are employed to validate that the system or system component received has not been altered.' + links: + - href: '#sr-4.3_smt' + rel: assessment-for + links: + - href: '#sr-4.3_smt' + rel: assessment-for - id: sr-4.3_asm-examine name: assessment-method props: @@ -143754,6 +155379,9 @@ catalog: value: SR-04(04)[01] class: sp800-53a prose: '{{ insert: param, sr-04.04_odp.01 }} are employed to ensure the integrity of the system and system components;' + links: + - href: '#sr-4.4_smt' + rel: assessment-for - id: sr-4.4_obj-2 name: assessment-objective props: @@ -143761,6 +155389,12 @@ catalog: value: SR-04(04)[02] class: sp800-53a prose: '{{ insert: param, sr-04.04_odp.02 }} is conducted to ensure the integrity of the system and system components.' + links: + - href: '#sr-4.4_smt' + rel: assessment-for + links: + - href: '#sr-4.4_smt' + rel: assessment-for - id: sr-4.4_asm-examine name: assessment-method props: @@ -143923,6 +155557,9 @@ catalog: value: SR-05[01] class: sp800-53a prose: '{{ insert: param, sr-05_odp }} are employed to protect against supply chain risks;' + links: + - href: '#sr-5_smt' + rel: assessment-for - id: sr-5_obj-2 name: assessment-objective props: @@ -143930,6 +155567,9 @@ catalog: value: SR-05[02] class: sp800-53a prose: '{{ insert: param, sr-05_odp }} are employed to identify supply chain risks;' + links: + - href: '#sr-5_smt' + rel: assessment-for - id: sr-5_obj-3 name: assessment-objective props: @@ -143937,6 +155577,12 @@ catalog: value: SR-05[03] class: sp800-53a prose: '{{ insert: param, sr-05_odp }} are employed to mitigate supply chain risks.' + links: + - href: '#sr-5_smt' + rel: assessment-for + links: + - href: '#sr-5_smt' + rel: assessment-for - id: sr-5_asm-examine name: assessment-method props: @@ -144068,6 +155714,9 @@ catalog: value: SR-05(01) class: sp800-53a prose: '{{ insert: param, sr-05.01_odp.01 }} are employed to ensure an adequate supply of {{ insert: param, sr-05.01_odp.02 }}.' + links: + - href: '#sr-5.1_smt' + rel: assessment-for - id: sr-5.1_asm-examine name: assessment-method props: @@ -144194,6 +155843,9 @@ catalog: value: SR-05(02)[01] class: sp800-53a prose: the system, system component, or system service is assessed prior to selection; + links: + - href: '#sr-5.2_smt' + rel: assessment-for - id: sr-5.2_obj-2 name: assessment-objective props: @@ -144201,6 +155853,9 @@ catalog: value: SR-05(02)[02] class: sp800-53a prose: the system, system component, or system service is assessed prior to acceptance; + links: + - href: '#sr-5.2_smt' + rel: assessment-for - id: sr-5.2_obj-3 name: assessment-objective props: @@ -144208,6 +155863,9 @@ catalog: value: SR-05(02)[03] class: sp800-53a prose: the system, system component, or system service is assessed prior to modification; + links: + - href: '#sr-5.2_smt' + rel: assessment-for - id: sr-5.2_obj-4 name: assessment-objective props: @@ -144215,6 +155873,12 @@ catalog: value: SR-05(02)[04] class: sp800-53a prose: the system, system component, or system service is assessed prior to update. + links: + - href: '#sr-5.2_smt' + rel: assessment-for + links: + - href: '#sr-5.2_smt' + rel: assessment-for - id: sr-5.2_asm-examine name: assessment-method props: @@ -144351,6 +156015,9 @@ catalog: value: SR-06 class: sp800-53a prose: 'the supply chain-related risks associated with suppliers or contractors and the systems, system components, or system services they provide are assessed and reviewed {{ insert: param, sr-06_odp }}.' + links: + - href: '#sr-6_smt' + rel: assessment-for - id: sr-6_asm-examine name: assessment-method props: @@ -144476,6 +156143,9 @@ catalog: value: SR-06(01) class: sp800-53a prose: '{{ insert: param, sr-06.01_odp.01 }} is/are employed on {{ insert: param, sr-06.01_odp.02 }} associated with the system, system component, or system service.' + links: + - href: '#sr-6.1_smt' + rel: assessment-for - id: sr-6.1_asm-examine name: assessment-method props: @@ -144595,6 +156265,9 @@ catalog: value: SR-07 class: sp800-53a prose: '{{ insert: param, sr-07_odp }} are employed to protect supply chain-related information for the system, system component, or system service.' + links: + - href: '#sr-7_smt' + rel: assessment-for - id: sr-7_asm-examine name: assessment-method props: @@ -144744,6 +156417,9 @@ catalog: value: SR-08 class: sp800-53a prose: 'agreements and procedures are established with entities involved in the supply chain for the system, system components, or system service for {{ insert: param, sr-08_odp.01 }}.' + links: + - href: '#sr-8_smt' + rel: assessment-for - id: sr-8_asm-examine name: assessment-method props: @@ -144858,6 +156534,9 @@ catalog: value: SR-09 class: sp800-53a prose: a tamper protection program is implemented for the system, system component, or system service. + links: + - href: '#sr-9_smt' + rel: assessment-for - id: sr-9_asm-examine name: assessment-method props: @@ -144964,6 +156643,9 @@ catalog: value: SR-09(01) class: sp800-53a prose: anti-tamper technologies, tools, and techniques are employed throughout the system development life cycle. + links: + - href: '#sr-9.1_smt' + rel: assessment-for - id: sr-9.1_asm-examine name: assessment-method props: @@ -145137,6 +156819,9 @@ catalog: value: SR-10 class: sp800-53a prose: '{{ insert: param, sr-10_odp.01 }} are inspected {{ insert: param, sr-10_odp.02 }} to detect tampering.' + links: + - href: '#sr-10_smt' + rel: assessment-for - id: sr-10_asm-examine name: assessment-method props: @@ -145308,6 +156993,9 @@ catalog: value: SR-11a.[01] class: sp800-53a prose: an anti-counterfeit policy is developed and implemented; + links: + - href: '#sr-11_smt.a' + rel: assessment-for - id: sr-11_obj.a-2 name: assessment-objective props: @@ -145315,6 +157003,9 @@ catalog: value: SR-11a.[02] class: sp800-53a prose: anti-counterfeit procedures are developed and implemented; + links: + - href: '#sr-11_smt.a' + rel: assessment-for - id: sr-11_obj.a-3 name: assessment-objective props: @@ -145322,6 +157013,9 @@ catalog: value: SR-11a.[03] class: sp800-53a prose: the anti-counterfeit procedures include the means to detect counterfeit components entering the system; + links: + - href: '#sr-11_smt.a' + rel: assessment-for - id: sr-11_obj.a-4 name: assessment-objective props: @@ -145329,6 +157023,12 @@ catalog: value: SR-11a.[04] class: sp800-53a prose: the anti-counterfeit procedures include the means to prevent counterfeit components from entering the system; + links: + - href: '#sr-11_smt.a' + rel: assessment-for + links: + - href: '#sr-11_smt.a' + rel: assessment-for - id: sr-11_obj.b name: assessment-objective props: @@ -145336,6 +157036,12 @@ catalog: value: SR-11b. class: sp800-53a prose: 'counterfeit system components are reported to {{ insert: param, sr-11_odp.01 }}.' + links: + - href: '#sr-11_smt.b' + rel: assessment-for + links: + - href: '#sr-11_smt' + rel: assessment-for - id: sr-11_asm-examine name: assessment-method props: @@ -145461,6 +157167,9 @@ catalog: value: SR-11(01) class: sp800-53a prose: '{{ insert: param, sr-11.01_odp }} are trained to detect counterfeit system components (including hardware, software, and firmware).' + links: + - href: '#sr-11.1_smt' + rel: assessment-for - id: sr-11.1_asm-examine name: assessment-method props: @@ -145585,6 +157294,9 @@ catalog: value: SR-11(02)[01] class: sp800-53a prose: 'configuration control over {{ insert: param, sr-11.02_odp }} awaiting service or repair is maintained;' + links: + - href: '#sr-11.2_smt' + rel: assessment-for - id: sr-11.2_obj-2 name: assessment-objective props: @@ -145592,6 +157304,12 @@ catalog: value: SR-11(02)[02] class: sp800-53a prose: 'configuration control over serviced or repaired {{ insert: param, sr-11.02_odp }} awaiting return to service is maintained.' + links: + - href: '#sr-11.2_smt' + rel: assessment-for + links: + - href: '#sr-11.2_smt' + rel: assessment-for - id: sr-11.2_asm-examine name: assessment-method props: @@ -145700,6 +157418,9 @@ catalog: value: SR-11(03) class: sp800-53a prose: 'scanning for counterfeit system components is conducted {{ insert: param, sr-11.03_odp }}.' + links: + - href: '#sr-11.3_smt' + rel: assessment-for - id: sr-11.3_asm-examine name: assessment-method props: @@ -145826,6 +157547,9 @@ catalog: value: SR-12 class: sp800-53a prose: '{{ insert: param, sr-12_odp.01 }} are disposed of using {{ insert: param, sr-12_odp.02 }}.' + links: + - href: '#sr-12_smt' + rel: assessment-for - id: sr-12_asm-examine name: assessment-method props: @@ -146059,12 +157783,24 @@ catalog: text: National Institute of Standards and Technology (2013) Digital Signature Standard (DSS). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 186-4. rlinks: - href: https://doi.org/10.6028/NIST.FIPS.186-4 + - uuid: ff989cdc-649d-4f45-8f61-9309c9680933 + title: FIPS 196 + citation: + text: National Institute of Standards and Technology (1997) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 196. + rlinks: + - href: https://doi.org/10.6028/NIST.FIPS.196 - uuid: 736d6310-e403-4b57-a79d-9967970c66d7 title: FIPS 197 citation: text: National Institute of Standards and Technology (2001) Advanced Encryption Standard (AES). (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 197. rlinks: - href: https://doi.org/10.6028/NIST.FIPS.197 + - uuid: e9d6c5f2-b3aa-4a28-8bea-a0135718d453 + title: FIPS 198-1 + citation: + text: National Institute of Standards and Technology (2008) Standards for Security Categorization of Federal Information and Information Systems. (U.S. Department of Commerce, Washington, D.C.), Federal Information Processing Standards Publication (FIPS) 198-1. + rlinks: + - href: https://doi.org/10.6028/NIST.FIPS.198-1 - uuid: 628d22a1-6a11-4784-bc59-5cd9497b5445 title: FIPS 199 citation: @@ -147035,3 +158771,7 @@ catalog: rlinks: - href: https://doi.org/10.6028/NIST.SP.800-53r5 media-type: application/pdf + - uuid: 5a5ffcb9-2272-484e-8d47-4483a0585dec + title: NIST SP 800-53 content and other OSCAL content examples + rlinks: + - href: https://github.com/usnistgov/oscal-content/releases/